tag:blogger.com,1999:blog-89511606225788312112024-03-13T11:25:31.946-07:00friends4everA FRIEND IN NEED IS A FRIEND INDEED ::
Someone who comes to your aid when you're in difficulty is a true friend, unlike others who disappear when trouble arises. Meaning of the phrase is misunderstood sometimes as "a needy person becomes a friend to obtain help from others".
WE TRY TO HELP YOUUnknownnoreply@blogger.comBlogger37125tag:blogger.com,1999:blog-8951160622578831211.post-62245760165519780972014-03-17T07:16:00.001-07:002014-03-17T11:04:51.876-07:00social cataloging!<span style="font-family: Georgia, Times New Roman, serif;">Hello friends, we are widely using internet for shopping and trading. our previous post was regarding e-shopping(online shopping, particularly in India.) Now we are going to discuss social cataloging!</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-FyGDYaIbptA/UvM1vIQI5eI/AAAAAAAAAgU/CXYdtZtqeVc/s1600/SOCIAL+CATALOGUES.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-FyGDYaIbptA/UvM1vIQI5eI/AAAAAAAAAgU/CXYdtZtqeVc/s1600/SOCIAL+CATALOGUES.JPG" height="195" width="320" /></a></div>
<br />
Fo<span style="font-family: Georgia, Times New Roman, serif;">r this, lets start with the meaning of catalog(catalogue).<i><span style="color: red;"> Catalog is a<span style="background-color: white;"> list or itemized display, as of titles, course offerings, or articles for exhibition or sale, usually including descriptive information or illustrations.</span></span></i></span><br />
<div style="background-color: white;">
<span style="color: #38761d; font-family: Georgia, Times New Roman, serif;"><i><b>Now a days we find two types of catalogs: physical catalog and digital catalog.</b></i></span></div>
<div style="background-color: white;">
<span style="font-family: Georgia, Times New Roman, serif;"><b><i><u><span style="color: purple;">Physical catalog </span></u></i></b><span style="color: #222222;">is a paper based, pamphlet or booklet which in which the catalog is printed. its distributed physically by post or by other means to everyone! Its widely called printed catalog. its main purpose is to showcase the company and its offerings.</span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-Sm8eV_Tn_Ok/Uyb_eCT_YfI/AAAAAAAAAhk/xJE5ZlbeRu8/s1600/PC.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-Sm8eV_Tn_Ok/Uyb_eCT_YfI/AAAAAAAAAhk/xJE5ZlbeRu8/s1600/PC.jpg" height="237" width="320" /></a></div>
<div style="background-color: white; color: #222222; font-size: 13px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></div>
<div style="background-color: white;">
<span style="font-family: Georgia, Times New Roman, serif;"><b><u><span style="color: purple;">Cyber/ Digital Catalog</span></u></b><span style="color: #222222;"> is an Internet-based presentation of a set of items available for purchase, including description, price, and ordering information; also called electronic catalog and web catalog.The comparatively lower costs of on-line catalogs, compared to print catalogs requiring paper, printing, and postage, lowers the entry barriers to catalog selling. A great difference between on-line catalog and print catalog selling is that on-line catalog customers find the marketer rather than the marketer finding them. Consequently, on-line catalog customers tend to differ demographically and in purchase behavior from print catalog customers. On-line catalogs give the marketer worldwide exposure, 24-hour accessibility, and the ability to quickly change price and product. In addition to selling, on-line catalogs are used to increase brand awareness, increase product usage, generate print catalog requests, collect prospect addresses and demographics, and provide two-way communication with customers.</span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-1PtNsdioIxQ/UycDZZr-jhI/AAAAAAAAAhw/spjJD3PejNw/s1600/DC.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-1PtNsdioIxQ/UycDZZr-jhI/AAAAAAAAAhw/spjJD3PejNw/s1600/DC.JPG" height="222" width="320" /></a></div>
<div style="background-color: white; color: #222222; font-size: 13px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></div>
<div style="background-color: white;">
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;"><span style="font-size: x-small;"> </span>To date, one of the biggest on-line catalog successes is Amazon.com, which is serving as a model for on-line catalog marketers. An online catalog might refer to:</span></div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;">The retail product offerings of an online shopping service(amazon, flipkart, ebay,...)</span></div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><b><i><u><span style="color: purple;">An electronic library catalog</span></u></i></b><span style="color: #222222;">( Project Madurai,Traditional Knowledge Digital Library, Bookshare,...)An electronic library is a focused collection of digital objects that can include text, visual material, audio material, video material, stored as electronic media formats, along with means for organizing, storing, and retrieving the files and media contained in the library collection.</span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-sCyOoU9iRKw/UycDnPxamJI/AAAAAAAAAh4/tKDT14h-4zY/s1600/BS.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-sCyOoU9iRKw/UycDnPxamJI/AAAAAAAAAh4/tKDT14h-4zY/s1600/BS.JPG" height="242" width="320" /></a></div>
<div style="font-size: 13px;">
<span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;"><br /></span></div>
<div>
<span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Digital libraries can vary immensely in size and scope, and can be maintained by individuals, organizations, or affiliated with established physical library buildings or institutions, or with academic institutions. The electronic content may be stored locally, or accessed remotely via computer networks. An electronic library is a type of information retrieval system.</span></div>
<div>
<h4>
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: #b45f06;">Role of E catalogs:</span></span></h4>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;">Now a days social cataloging is playing a major role in our lives. Its a type of ecatalog and is defined as "A social cataloging application is a web application designed to help users to catalog things—books, CDs, etc.—owned or otherwise of interest to them. The phrase refers to two characteristics that generally arise from a multi-user cataloging environment:</span></div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;">The ability to share catalogs and interact with others based upon shared items;</span></div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;">The enrichment or improvement of cataloging description through either explicit cooperation in the production of cataloging metadata or through the analysis of implicit data( for example people who like teddy bear also like other soft toys!)"</span></div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></div>
<h4>
<span style="color: #b45f06; font-family: Georgia, Times New Roman, serif;">Social cataloging applications:</span></h4>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><b><span style="color: magenta;">Books</span></b><span style="color: #222222;">: Goodreads, Google Books, LibraryThing.</span></span></div>
<div>
<div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;"><b><i>LibraryThing</i></b> is a social cataloging web application for storing and sharing book catalogs and various types of book metadata. It is used by authors, individuals, libraries, and publishers.The primary feature of LibraryThing ("LT") is the cataloging of books by importing data from libraries through Z39.50( application layer communications protocol for searching and retrieving information from a database over a TCP/IP computer network) connections and from six Amazon.com stores. </span><br />
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">Users can import information from 690 libraries, including the <i><b>British Library, Canadian National Catalogue, Library of Congress, National Library of Australia, and Yale University.</b></i> Should a record not be available from any of these sources, it is also possible to input the book information via a blank form!</span><br />
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">Other Book cataloging sites works in similar fashion! <b><i>University of mysore</i></b> is listed as a partner by <b><i>Google Books.</i></b> On March 28, 2013, Amazon announced its acquisition of Goodreads for an undisclosed amount. </span><br />
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">On the <i><b>Goodreads</b></i> website, users can add books to their personal bookshelves, rate and review books, see what their friends are reading, participate in discussion boards and groups on a variety of topics, and get suggestions for future reading choices based on their reviews of previously read books. Once a user has added friends to his profile, he will see the friends' shelves and reviews and can comment on friends' pages. Goodreads organizes offline opportunities as well, such as IRL book exchanges and "literary pub crawls".The website facilitates reader interactions with authors through the interviews, giveaways, authors' blogs, and profile information. There is also a special section for authors with suggestions on promoting their works on the Goodreads site, aimed at helping them reach their target audience.</span><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">In addition, it has a presence on Facebook, Pinterest, Twitter, and other social networking sites.</span><br />
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;"><br /></span></div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><b><span style="color: magenta;">Data</span></b><span style="color: #222222;">: Jumper 2.0</span></span></div>
</div>
<div>
<div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">Jumper is Enterprise 2.0 software that empowers users to compile and share collaborative bookmarks by crowd-sourcing their knowledge, experience and insights using knowledge tags. ApexKB (formerly Jumper 2.0), is an open source web application script for collaborative search and knowledge management powered by a shared enterprise bookmarking engine that is a fork of KnowledgebasePublisher. Users tag, link, and rate structured data and unstructured data sources, including relational databases, flat file databases, medical imaging, content management systems, and any network file system. It is an interactive, user-submitted recommendation engine which uses peer and social-networking principles to reference any information located in distributed storage devices, either inside or outside the firewall, and capture the collective knowledge about that content, media, or data.</span><br />
<span style="color: #a64d79; font-family: Georgia, Times New Roman, serif;"><u><b>Features</b></u></span><br />
<br />
<ul>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Search any content, media, data, or people</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Reference data in any distributed storage system</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Create true Global Namespaces</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Build Faceted classification systems</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">User published data profiling</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Hyperdata linking of distributed data</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Group-based permissions</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Object level access controls</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">User and user role management</span></li>
<li><span style="color: #222222; font-family: Georgia, 'Times New Roman', serif;">Descriptive tag (metadata)</span></li>
</ul>
<br />
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;"></span></div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: magenta;"><b><br /></b></span></span></div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: magenta;"><b>Devices</b></span><span style="color: #222222;">: gdgt</span></span></div>
</div>
<div>
<div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;"></span></div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">gdgt also known as Engadget is a news, reviews and opinion outlet with obsessive coverage of cutting edge gadgets, consumer electronics and the science and technology they're built upon. Its currently operates a total of ten blogs—four written in English and six international versions with independent editorial staff. Engadget has in the past ranked among the top five in the "Technorati top 100" and was noted in TIME for being one of the best blogs of 2010, although it has not appeared in that listing in the past several years.</span><br />
<div style="color: #222222;">
<br /></div>
</div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: magenta;"><b>Films</b></span><span style="color: #222222;">: Internet Movie Database</span></span></div>
</div>
<div>
<div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;"></span></div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;"><b><i>hope you all know, IMDb? </i></b>Internet Movie Database (abbreviated IMDb) is an online database of information related to films, television programs and video games, taking in actors, production crew, fictional characters, biographies, plot summaries and trivia. Actors and crew can post their own résumé and upload photos of themselves for a yearly fee. U.S. users can also view over 6,000 movies and television shows from CBS, Sony and various independent film makers.</span><br />
<div style="color: #222222;">
<br /></div>
</div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: magenta;"><b>Music</b></span><span style="color: #222222;">: Discogs, Last.fm, Libre.fm, Rate Your Music</span></span></div>
</div>
<div>
<div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;"></span></div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">Discogs, short for discographies, is a website and database of information about audio recordings, including commercial releases, promotional releases, and bootleg or off-label releases. The Discogs servers, currently hosted under the domain name discogs.com. While the site lists releases in all genres and on all formats, it is especially known as one of the largest online databases of electronic music releases, and of releases on vinyl media. Discogs currently contains more releases than there are English-language Wikipedia pages, at 4.7 million releases, by 3.25 million artists, across nearly 600,000 labels, contributed from over 185,000 contributor user accounts – with these figures constantly growing as users continually add previously unlisted releases to the site over time. Last.fm, Libre.fm, Rate Your Music works similarly!</span></div>
<div>
<br /></div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><b><span style="color: magenta;">Scholarly citations</span></b><span style="color: #222222;">: Bibster, CiteULike, Connotea, refbase</span></span></div>
</div>
<div>
<div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;"></span></div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">Bibster is a Java-based system which assists researchers in managing, searching, and sharing bibliographic metadata (e.g. from BibTeX files) in a peer-to-peer network. In the everyday life of researchers, one has to search for publications or their correct bibliographic metadata. Currently, people search with engines like Google and CiteSeer(a public search engine and digital library for scientific and academic papers, primarily in the fields of computer and information science,)Another method is by simply asking other people that are likely to know how to obtain the desired information.At the moment bibliographic data has to be handled manually and as a result it is not always possible to have an overview over these data masses. It is a time consuming business to search for special topics or publications, be it locally or on several bibliographic databases.</span><br />
<div>
<div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">CiteULike is a web service which allows users to save and share citations to academic papers. Based on the principle of social bookmarking, the site works to promote and to develop the sharing of scientific references amongst researchers. In the same way that it is possible to catalog web pages (with Furl and delicious) or photographs (with Flickr), scientists can share citation information using CiteULike.When browsing issues of research journals, small scripts stored in bookmarks (bookmarklets) allow one to import articles from repositories like PubMed, and CiteULike supports many more. Then the system attempts to determine the article metadata (title, authors, journal name, etc.) automatically. Users can organize their libraries with freely chosen tags and this produces a folksonomy of academic interests.Connotea was a free online reference management service for scientists, researchers, and clinicians,discontinued in March 2013. It was one of a breed of social bookmarking tools, similar to CiteULike.</span></div>
<div>
<div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">Conotea was aimed primarily at scientists, and while users could bookmark any webpage they chose, it incorporated special functionality for certain academic resources.</span></div>
<div>
<div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">refbase is web-based institutional repository and reference management software which is often used for self-archiving.It can import and export a variety of standard bibliographic formats, including BibTeX, Endnote, RIS, ISI, MODS XML, PubMed, Medline, RefWorks, and Copac. It can generate formatted bibliographies and citations in LaTeX, RTF, HTML, and PDF. refbase also has advanced search features and can generate RSS feeds from searches. Links using DOIs and URLs can be added, as can links to files. refbase supports the Search/Retrieve via URL (SRU) and OpenSearch web services as well as COinS and unAPI metadata.refbase packages have been put in the official Gentoo Linux and Mandriva Linux repositories and has been used by the United States Geological Survey.</span></div>
<div style="color: #222222;">
<br /></div>
</div>
</div>
</div>
</div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: magenta;"><b>Places and products</b></span><span style="color: #222222;">: KartMe</span></span></div>
</div>
<div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;"></span></div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">KartMe is a social networking website and mobile application that specializes in social cataloging. Members organize and share favorite links, products and places in lists called "Karts". The mobile application was an Apple "Staff Pick". The full service has been called a beauty lifesaver, a step beyond bookmarking and useful for home design projects.</span><br />
<div>
<br /></div>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: magenta;"><b>Recipes</b></span><span style="color: #222222;">: KeepRecipes</span></span></div>
<div style="color: #222222;">
<span style="font-family: Georgia, Times New Roman, serif;"></span></div>
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;">KeepRecipes is a social networking website and mobile application that specializes in social cataloging. Members organize and share favorite recipes from any website. KeepRecipes was started by the team from KartMe. They began by launching charity cookbooks with the most renowned chefs in the world!</span><br />
<span style="color: #222222; font-family: Georgia, Times New Roman, serif;"><br /></span></div>
</div>
<div>
<br /></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-39058372947012881302014-01-05T10:45:00.002-08:002014-01-05T10:49:59.823-08:00How a typical online store works?<h2>
<span style="font-family: Georgia; line-height: 15pt;"><span style="color: purple; font-size: large;">Fore
ground:</span></span></h2>
<div style="background: white; line-height: 12.0pt; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 7.5pt;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">To begin with, we will look at a
straightforward online store like Amazon.com or flipkart.com. Such stores sell
physical objects like books, DVDs and clothing, and digital information like
MP3 music files, digital videos and software.<o:p></o:p></span></div>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">Most
online stores have the same fundamental structure:<o:p></o:p></span></div>
<ol start="1" type="1">
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l4 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">An interface that allows you to search for products or services<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l4 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">A shopping basket where you can list items you wish to purchase<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l4 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">A checkout procedure<o:p></o:p></span></li>
</ol>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">Some
online stores will require you to create an account with them before you can
purchase anything. Others will allow you to do once-off purchases without
signing up for an account.<o:p></o:p></span></div>
<h3>
<span style="color: #39a6ca; font-family: Georgia; font-size: 12pt; font-weight: normal;">Why sign up for an account at an online store?</span></h3>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">An
account can be useful:<o:p></o:p></span></div>
<ul type="disc">
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l3 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">It allows the site to record your credit card and contact
information so that you do not have to re-enter it every time you want to
make a purchase.<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l3 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">It can keep a record of things you bought in the past.<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l3 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">It can generate suggestions for things you might want to buy,
based on your past browsing and purchasing record.<o:p></o:p></span></li>
</ul>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">Some
sites offer additional benefits to account holders, such as:<o:p></o:p></span></div>
<ul type="disc">
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l7 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">Member discounts and special offers<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l7 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">Newsletters or updates on the items you purchased<o:p></o:p></span></li>
</ul>
<h3>
<span style="color: #39a6ca; font-family: Georgia; font-size: 12pt; font-weight: normal;">The checkout process</span></h3>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">Most
sites make it very easy to buy online. Every step is clear, and you will have
many chances to change your mind. You can cancel the process at any point and
see the total you will pay, including shipping costs, before you make the
payment.<o:p></o:p></span></div>
<h3 style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt;">
<span style="color: #ff0173; font-family: Georgia; font-size: 12.0pt; font-weight: normal; mso-bidi-font-family: Helvetica;">Example: Amazon.com<o:p></o:p></span></h3>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">In
this example, we are assuming that you have searched for and found an item you
wish to buy on Amazon.com.<o:p></o:p></span></div>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">Choose
the item you want, and add it to your shopping cart by clicking on the “Add to
Cart” button. The “Buy with 1-Click” option means that you will bypass the
checkout procedure described below and buy the item immediately.<o:p></o:p></span></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-Cloy9OVxVG4/UsmIWHgvH9I/AAAAAAAAAeY/TgQgK-_YdNg/s1600/001.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-Cloy9OVxVG4/UsmIWHgvH9I/AAAAAAAAAeY/TgQgK-_YdNg/s1600/001.JPG" /></a></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">If you
first want to check what you are about to buy, you can go to your “shopping
basket” by clicking on the shopping basket icon at the top of any page. The
shopping basket is a page that keeps track of all the items you wish to buy or
have bought in the past. Notice the “Save for later” and “Delete” buttons in
the screenshot below.<o:p></o:p></span></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-X62P9vKIpaE/UsmIe8cVn6I/AAAAAAAAAeg/7wG31Zn7i8s/s1600/002.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-X62P9vKIpaE/UsmIe8cVn6I/AAAAAAAAAeg/7wG31Zn7i8s/s1600/002.JPG" height="278" width="320" /></a></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">If you
are ready to buy, click the “Proceed to Checkout” button. This button takes you
to a page where you can specify how you wish to pay for the items in your cart.<o:p></o:p></span></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-y9ZV5CDVzcg/UsmInJihLSI/AAAAAAAAAeo/TxqQ7pd-r_Q/s1600/003.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-y9ZV5CDVzcg/UsmInJihLSI/AAAAAAAAAeo/TxqQ7pd-r_Q/s1600/003.JPG" /></a></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">This
will take you to a series of pages in which you can fill in your personal
details, your postal address and your payment method – for example, your credit
card number. There may be several “continue” buttons. These will take you to
the next page, and won’t trigger payment.<o:p></o:p></span></div>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">When
you have filled in all the necessary information, you will be shown a final
page on which all the details are displayed.<o:p></o:p></span></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-ZTeFl8yOCQ0/UsmIwW-F0XI/AAAAAAAAAew/SPDGmwABMPw/s1600/004.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-ZTeFl8yOCQ0/UsmIwW-F0XI/AAAAAAAAAew/SPDGmwABMPw/s1600/004.JPG" /></a></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">If you
are satisfied, you can click on the “Place your order” button. This button will
trigger payment. On other sites, this button may be called “purchase”, “submit
payment”, “pay now” or something similar. Don’t click on this button more than
once, as in some cases it could result in more than one order being placed.<o:p></o:p></span></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-2z_TEv0uLB0/UsmI_GpvlTI/AAAAAAAAAe4/EdEi4sshfTI/s1600/005.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-2z_TEv0uLB0/UsmI_GpvlTI/AAAAAAAAAe4/EdEi4sshfTI/s1600/005.JPG" /></a></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<div style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in;">
<span style="color: #333333; font-family: Georgia; mso-bidi-font-family: Helvetica;">Once
your order is processed, the site will give you feedback on its success. This
may take the form of a page containing an order number, or an email with the
details of your transaction. This is important information. You will need it if
anything goes wrong with your order or if you are not satisfied with the
product you purchased.<o:p></o:p></span></div>
<h3>
<span style="color: #39a6ca; font-family: Georgia; font-size: 12pt; font-weight: normal;">Some tips for pain-free checking out</span></h3>
<ul type="disc">
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l6 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">Stay calm. You can change your order or cancel at any stage –
right until the final stage of submitting payment. Many sites even allow
you to cancel the purchase after that point, but that is obviously not
ideal.<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l6 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">Don’t hit the “back” button of your browser, as this may
confuse the process. If possible, look for “edit”, “delete order” or
“cancel” buttons in the shopping site itself.<o:p></o:p></span></li>
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l6 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">Only hit the final button if you are sure. An incomplete
checkout won’t be processed, and no payment will be made.<o:p></o:p></span></li>
</ul>
<h2 style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12.75pt;">
<span style="color: #39a6ca; font-family: Georgia; font-size: 12pt; font-weight: normal;">Shopping safely<o:p></o:p></span></h2>
<ul type="disc">
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l2 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">Check the URL in the address bar. If you are about to enter
sensitive information on a website, always have a quick look at the URL of
the site in the browser’s address bar. If it is a secure site, the URL
will start with the letters “https”. A normal site will have the letters
“http” without the final “s”.<o:p></o:p></span></li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-MePScvjArU8/UsmJVjgtprI/AAAAAAAAAfA/Tg5tvUBkFBs/s1600/006.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-MePScvjArU8/UsmJVjgtprI/AAAAAAAAAfA/Tg5tvUBkFBs/s1600/006.JPG" height="30" width="320" /></a></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<ul type="disc">
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l5 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">Look for the lock. Your browser will display a small lock icon.
Depending on the browser you use, it may be in the status bar at the
bottom of the browser or in the address bar at the top.<o:p></o:p></span></li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-ogRfCPFPvwI/UsmJbn5h-3I/AAAAAAAAAfI/t-CY6ijJr0s/s1600/007.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-ogRfCPFPvwI/UsmJbn5h-3I/AAAAAAAAAfI/t-CY6ijJr0s/s1600/007.JPG" /></a></div>
<div align="center" style="background-color: white; background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 7.5pt 0in; text-align: center;">
<br /></div>
<ul type="disc">
<li class="MsoNormal" style="background: white; color: #333333; line-height: 12.0pt; mso-list: l1 level1 lfo9; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Georgia; mso-bidi-font-family: Helvetica;">Take care when sharing your information. Never give your credit
card number over the telephone unless you initiated the call. Never
respond to an email that asks for sensitive information.<o:p></o:p></span></li>
</ul>
<div>
<span style="color: #333333; font-family: Georgia;"><span style="line-height: 16px;"><br /></span></span></div>
<div>
<span style="color: #333333; font-family: Georgia;"><span style="line-height: 16px;"><br /></span></span></div>
<h2>
<span style="font-family: Georgia;"><o:p><span style="font-size: large;"><span style="color: blue;">Back Ground:</span></span></o:p></span></h2>
<span style="background-color: white; color: #111111; font-family: Georgia; font-size: 12pt; line-height: 15pt;">eCommerce stands for Electronic Commerce, which is in itself a broad term for selling on the internet through a website, electronically. With the ability to process credit cards electronically on the internet, just about anything can be sold on the web.</span><span style="color: #111111; font-family: Georgia; font-size: 12pt;">eCommerce websites are built differently, but they all use the same basic functions. The ability to accept credit cards is clearly a defining factor. Most times the credit does not actually process through your website, for security reasons, but processes through a payment gateway<b><i>(like paypal.)</i></b> A payment gateway is a company that works with the credit card companies to be sure that all credit card transactions are processed securely and credit card numbers are not stored by small businesses. </span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-Y1Qqpkuf1mk/UsmiR3LKAhI/AAAAAAAAAfY/W1h4xlEFLIc/s1600/bg.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-Y1Qqpkuf1mk/UsmiR3LKAhI/AAAAAAAAAfY/W1h4xlEFLIc/s1600/bg.JPG" height="188" width="320" /></a></div>
<span style="background-position: initial initial; background-repeat: initial initial; color: #111111; font-family: Georgia; font-size: 12pt; font-weight: normal;"><br /></span><span style="background-position: initial initial; background-repeat: initial initial; color: #111111; font-family: Georgia; font-size: 12pt; font-weight: normal;"><br /></span><span style="background-position: initial initial; background-repeat: initial initial; color: #111111; font-family: Georgia; font-size: 12pt; font-weight: normal;">You must have an account with a payment gateway to accept credit card on your website. Although your transactions
will process through a gateway, the viewer will never know or be directed away
from your website. Your website will be guarded with 128-bit encryption using
an SSL certificate, making fraud nearly impossible. When a purchase is made the
money will be transferred directly into your businesses' bank account.<span class="apple-converted-space"> </span></span><br />
<span style="background-position: initial initial; background-repeat: initial initial; color: #111111; font-family: Georgia; font-size: 12pt; font-weight: normal;">When
an order is placed, the customer's purchase and payment information will come
into your administration section. You will login with your desired username and
password to view this information.</span><br />
<div>
<div>
<div class="MsoNormal" style="background: white; line-height: 12.0pt; margin-left: .5in; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span class="apple-converted-space"><span style="font-family: Georgia, Times New Roman, serif; font-size: x-small;">
</span></span></div>
</div>
</div>
Unknownnoreply@blogger.com23tag:blogger.com,1999:blog-8951160622578831211.post-8005274224914856832014-01-03T06:26:00.000-08:002014-01-03T08:17:19.475-08:00Ecommerce in India<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<h2>
<i><span style="color: #351c75;">First of all, WE </span><span style="color: #c27ba0;">WISH YOU A VERY HAPPY NEW YEAR 2014 </span><span style="color: #351c75;">AND ON THIS OCCASION, WE WISH TO PUBLISH THIS POST<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-yQf7oAg-sdE/UsbhHQyE33I/AAAAAAAAAa8/fke5Tx5ns8c/s1600/online+shopping.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-yQf7oAg-sdE/UsbhHQyE33I/AAAAAAAAAa8/fke5Tx5ns8c/s1600/online+shopping.JPG" height="306" width="400" /></a></div>
</span></i></h2>
<h3>
<span style="color: red;"><i style="font-weight: normal;"> India's e-commerce market grew at a staggering 88 per cent in 2013 to USD 16 billion, riding on booming online retail trends and defying slower economic growth and spiraling inflation.</i></span></h3>
<br /><u><b><span style="color: #38761d;">WHY: </span></b></u><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The increasing Internet penetration and availability of more payment options boosted the e-commerce industry in 2013. Unique to India (and potentially to other developing countries), cash on delivery is a preferred payment method.</span><b style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;"> India has a vibrant cash economy as a result of which 80% of Indian e-commerce tends to be Cash on Delivery. </b><span style="color: magenta; font-family: Georgia, Times New Roman, serif;"><b><i>According to the survey, India's e-commerce market, which stood at $2.5 billion in 2009, reached $8.5 billion in 2012 and rose 88 per cent to touch $16 billion in 2013. The survey estimates the country's e-commerce market to reach USD 56 billion by 2023, driven by rising online retail.</i> </b></span><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">As per responses by traders and organised retailers who participated in the survey, online shopping grew at a rapid pace in 2013<span style="color: #45818e;"> <i><u>due to aggressive online discounts, rising fuel prices and availability of abundant online options.</u></i></span>To make the most of increasing online shopping trends, more companies are collaborating with daily deal and discount sites. The prominent points like<u><i> <span style="color: #134f5c;">ease of shopping from home, home delivery, no traffic congestions to be faced </span></i></u>are some of the factors helping E-commerce industry grow in India.</span> <br /><br /><a href="http://4.bp.blogspot.com/-aog5O79eIlc/UsWtNs2jqaI/AAAAAAAAAac/FgPWgvu1VII/s1600/why.JPG"><img border="0" height="222" src="https://4.bp.blogspot.com/-aog5O79eIlc/UsWtNs2jqaI/AAAAAAAAAac/FgPWgvu1VII/s1600/why.JPG" width="400" /></a><br /><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /> And then there are factors which is hampering E-commerce growth in India like <span style="color: red;"><u><i>lack of trust , not able to touch and feel the item </i></u></span>which consumers want to purchase etc. Let us see one very interesting infographic about why people do not buy online in India.</span><br /><br /><br /> <br /> <br /><b><u><span style="color: #38761d;"> WHAT: </span></u></b>The products that are sold most are in the tech and fashion category, including mobile phones, ipads, accessories, MP3 players, digital cameras and jewellery, among others.<br /><br /><a href="http://2.bp.blogspot.com/-GNfg5-Fn8mA/UsWtdcQb1SI/AAAAAAAAAak/gGaCOyDq3hQ/s1600/wat.JPG"><img border="0" height="400" src="https://2.bp.blogspot.com/-GNfg5-Fn8mA/UsWtdcQb1SI/AAAAAAAAAak/gGaCOyDq3hQ/s1600/wat.JPG" width="393" /></a><br /><br /><br /><br /> <br /><b><u><span style="color: #38761d;"> WHO: </span></u></b><span style="font-family: Georgia, Times New Roman, serif;">According to a survey, <span style="color: #b45f06;">India has Internet base of around 150 million as of August, 2013.</span> Among the cities, <span style="color: red;">Mumbai </span>topped the list of online shoppers followed by<span style="color: red;"> Delhi, </span>while<span style="color: red;"> Kolkata</span> ranked third! In which, <span style="color: #bf9000;">65% </span>of online shoppers are<span style="color: #bf9000;"> male</span> while <span style="color: #0b5394;">35% are female. </span><br /><br /><a href="http://3.bp.blogspot.com/-96xxgAC7pQU/UsWtfA_bjKI/AAAAAAAAAaw/hHgzPhy8HJI/s1600/13.JPG"><img border="0" height="212" src="https://3.bp.blogspot.com/-96xxgAC7pQU/UsWtfA_bjKI/AAAAAAAAAaw/hHgzPhy8HJI/s1600/13.JPG" width="400" /></a><br /><br />Besides,age-wise analysis revealed that <span style="color: red;">35% are aged between 18-25 years</span>, <span style="color: #38761d;">55% between 26-35 years</span>,<span style="color: red;"> 8% in the age group of 36-45 years</span>, while only 2<span style="color: #38761d;">% are in the age group of 45-60 years.</span> Having close to 10 per cent of Internet penetration in India throws a very big opportunity for online retailers to grow and expand as future of Internet seems very bright.</span><br /><br /><br /><b><u><span style="color: #38761d;">WHERE:<i> </i></span></u></b><b><i>Top 10 Online stores in India are</i></b><i>:</i><br /><br /><br /><b><i><span style="color: red;">1. Flipkart-</span></i></b> is an Indian e-commerce company founded in 2007, by Sachin and Binny Bansal and head-quartered in Bangalore, Karnataka. It is considered as the e-commerce company that made online shopping popular in India. Though e-commerce investment opportunities are shrinking in past 1.5 years, Flipkart continue to be dominant player in the online shopping in the sub-continent. In last 3 years nearly 53 e-commerce Indian firms have raised $853M from venture capital, but only 11 have managed to raise further rounds of funding. They are continuously proving themselves to be gigantic, unbeatable leader in e-commerce (India) and shutting down all doors for new or existent competitors, there by alarming possibility of ‘’Lets Shop it’’ being replaced soon by ‘’Lets Flip-kart it’’ in near future,<br /><br /><br /><b><i><span style="color: red;">2. eBay India-</span></i></b> is stepping up investment in India to boost its share of a market dominated by domestic players such as Flipkart and fend off encroachment from arch-rival Amazon.com. The e-commerce company dipped a toe into the Indian market seven years ago and stuck with a cautious approach, even as local upstarts made splashy grabs for business in a tiny but growing market., <br /><br /><br /><b><i><span style="color: red;">3. Snapdeal-</span></i></b> started in February 2010 as a daily deals platform but expanded in September 2011 to become an e-commerce company via a marketplace model.With 20 million registered users, SnapDeal is one of the first and largest online marketplace in India offering an assortment of 4 million+ products across diverse categories from over 20,000 sellers, shipping to 4000 towns and cities in India.In the 3rd round of funding of $50 million eBay came out as the largest investor in Snapdeal.The investment also includes a commercial partnership under which eBay will get access to Snapdeal’s 20 million registered users, logistics software and distribution network.from its co-founder we came know that Snapdeal will offer a limited number of products on eBay India and eBay too will list its merchandise on Snapdeal, following the partnership, <br /><br /><br /><b><i><span style="color: red;">4. Amazon India- </span></i></b>market place is a platform where third party retailers can sell books, movies and TV shows. Entry of Amazon in the Indian market will increase competition for existing market leaders like Flipkart.<br /><br /><br /><b><i><span style="color: red;">5. Myntra- </span></i></b>established by Mukesh Bansal, Ashutosh Lawania, and Vineet Saxena in February 2007, it has been funded by Venture Capital funds like IndoUS, IDG & Accel Partners. It currently offers products from more than 350 Indian and international brands in fashion and casual lifestyle products, <br /><a href="http://4.bp.blogspot.com/-uVog0SUeHFo/UsbhIJmZKvI/AAAAAAAAAbI/NgLf7aXclF8/s1600/online.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" src="http://4.bp.blogspot.com/-uVog0SUeHFo/UsbhIJmZKvI/AAAAAAAAAbI/NgLf7aXclF8/s1600/online.JPG" height="400" width="396" /></a><br /><br /><b><i><span style="color: red;">6. Shopclues-</span></i></b> is an online retail website, headquartered in Gurgaon, India. The company was founded in the Silicon Valley, USA. As per the citation, ShopClues joined as 35th entrant in the Indian e-commerce in 2011 and is reported to have made its way to the list of the top 6 and is known to be popular among shoppers in the 18–24 years age group who regularly shop from the wide assortment of items including mobile phones, laptops, tablets, electronics,home décor, footwear, apparel, fashion accessories, books & music, etc., <br /><br /><br /><b><i><span style="color: red;">7. Domino's-</span></i></b> domino's pizza is a familiar pizza chain in the world and you can order pizza online. Domino's India group was very successful in offering its services through Cash on Delivery.This company shipped about 3.7 crore pizzas in the year, equaling to 1 lakh pizzas sold per day.The pizzas sold for a total of Rs 600 crore, translating into an average price of Rs 162 per pizza.The business operated via 380 stores in 90 cities; that is, approximately four stores per city. Each store sold approximately 1 lakh pizzas a year or about 300 pizzas a day. That’s about 25 pizzas an hour. The company recorded a net profit of Rs 90 crore. This equals to Rs 25 per pizza or a 15 per cent margin on the sale price. thus proving that CoD is not too bad for an online store , <br /><br /><b><i><span style="color: red;"><br /></span></i></b><div>
<b><i><span style="color: red;">8. freecharge-</span></i></b> was started in August, 2010 by Kunal Shah of Accelyst Solutions Pvt. Ltd. It provides online facility to recharge any prepaid mobile phone in India. By January 2012, the number of registered users of the website were 1.5 million which increased to 2.8 million by November 2012. The company currently has a patent pending status for its business model., It provides online facility to recharge any prepaid mobile phone in India. The amount paid by the user for recharge is returned in form of shopping coupons of some of the top retailers in India, thereby making the recharge virtually free.<br /><br /><br /><b><i><span style="color: red;">9. Jabong- </span></i></b>is an Indian fashion and lifestyle e-commerce portal, started operations in January 2012. It retails apparel, footwear, accessories, beauty products, fragrances, home accessories and other fashion and lifestyle products. The company is headquartered in Gurgaon, NCR. In March 2013, Jabong was shipping 6000-7000 orders a day. In March 2013, the annual revenues of Jabong was estimated to be 100-150 mn USD. In less than 20 months, Jabong.com became the third-most visited online shopping website.During September 2013 Jabong was shipping 14000 orders on daily basis out of which 60% were from small towns.and <br /><br /><br /><b><i><span style="color: red;">10. Tradus- </span></i></b>is an online auction company that operates in Europe. The company, a subsidiary of South African media group Naspers since March 2008, operates across Europe using many different brands. Tradus operates a business model similar to eBay. Therefore it tends to concentrate in countries where eBay is either not present nor is the market leader and where Tradus is (or can be) market leader.<br /><br /><h4>
<span style="color: #990000; font-family: Courier New, Courier, monospace;"><i>Despite of growth in ecommerce industry in India, many companies are losing the battle! according to an analysis, its said the CoD model in India is the main cause of the shut downs.</i></span></h4>
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-Olnw2NXR9d0/UsbiXWkOV7I/AAAAAAAAAbM/sw7_uZTal_c/s1600/cod.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-Olnw2NXR9d0/UsbiXWkOV7I/AAAAAAAAAbM/sw7_uZTal_c/s1600/cod.JPG" /></a></div>
<div>
About 100 to150 e-commerce ventures have folded up in 2011. Over two dozen have already shut shop this year. The mortality rate is high, especially among the e-retailers, and we expect the numbers to increase manifold this year. The market structure right now doesn't allow profitability and hence not a single company in the space has posted profits so far. Price war among the firms, many of whom burned huge cash on promotions and marketing, ended up going under or getting acquired by larger players.<br /><br />One of the other major factor apart from price war is cash on delivery mode which hurts bottom line of cos like Flipkart, Snapdeal due to extra associated costs.<b><i> Ecommerce companies may be growing at an explosive pace, but their overdependence on cash-on-delivery mode of payment remains worrisome, particularly since online retail ventures in India are not yet profitable.</i></b><i><span style="color: #bf9000;">Cash-on-delivery, where customers pay for products at the time of receiving them, still accounts for up to 60% of transactions, according to a study by Internet and Mobile Association of India and audit firm KPMG.</span></i> This, despite sales at some of these ventures expanding at over 500% annually. With the additional processes required for cash-on-delivery orders, their longer payment cycle, higher instances of returns and associated costs are hurting margins.These transactions add about 3% additional costs which translates to an increase in cost by at least 30 per transaction for E-commerce companies. <b><i><span style="color: red;">"Extra costs are incurred for the additional verification calls for cash-on-delivery orders, collection charges by courier companies as well as two-way transportation charges in case of returned goods.The problem of returns is that we have to bear the courier charges for the return and goods can get damaged during the returns process."</span> says the business head!</i></b></div>
<h2>
<b><i><span style="color: blue;">ALL THE BEST to the online shoping sites in India!</span></i></b></h2>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F4.bp.blogspot.com%2F-aog5O79eIlc%2FUsWtNs2jqaI%2FAAAAAAAAAac%2FFgPWgvu1VII%2Fs1600%2Fwhy.JPG&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://4.bp.blogspot.com/-aog5O79eIlc/UsWtNs2jqaI/AAAAAAAAAac/FgPWgvu1VII/s1600/why.JPG" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F3.bp.blogspot.com%2F-96xxgAC7pQU%2FUsWtfA_bjKI%2FAAAAAAAAAaw%2FhHgzPhy8HJI%2Fs1600%2F13.JPG&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://3.bp.blogspot.com/-96xxgAC7pQU/UsWtfA_bjKI/AAAAAAAAAaw/hHgzPhy8HJI/s1600/13.JPG" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F2.bp.blogspot.com%2F-GNfg5-Fn8mA%2FUsWtdcQb1SI%2FAAAAAAAAAak%2FgGaCOyDq3hQ%2Fs1600%2Fwat.JPG&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://2.bp.blogspot.com/-GNfg5-Fn8mA/UsWtdcQb1SI/AAAAAAAAAak/gGaCOyDq3hQ/s1600/wat.JPG" -->Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-18250316792626244792013-05-30T11:17:00.000-07:002013-05-30T11:17:38.714-07:00ABC Fruits and veggies!<div class="separator" style="clear: both; text-align: center;">
<br /><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/oIcnVf5ABuw?feature=player_embedded' frameborder='0'></iframe></div>
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-31653535229513529672013-02-15T04:39:00.002-08:002013-02-15T05:26:24.506-08:00Document/Books File Formats and softwares<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;">In our daily routine, we
come across many documents/ books. These <span style="background-color: white;">usually have to adhere to a specific<span class="apple-converted-space"> </span></span><span style="background: white;">file format<span class="apple-converted-space"> </span>in order to be useful. A<span class="apple-converted-space"> </span></span><b>file format</b><span class="apple-converted-space"> is a<span class="apple-converted-space"> </span></span>text<span class="apple-converted-space"> </span>or<span class="apple-converted-space"> </span>binary<span class="apple-converted-space"> </span>format for storing<span class="apple-converted-space"> </span>documents<span class="apple-converted-space"> </span>on a<span class="apple-converted-space"> </span>storage
media, especially for use by<span class="apple-converted-space"> </span>computers. <o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-Mrc0UoA8MfI/UR4qESn10dI/AAAAAAAAAS8/XPjzNcskTE8/s1600/ebooks+and+documents.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="186" src="http://4.bp.blogspot.com/-Mrc0UoA8MfI/UR4qESn10dI/AAAAAAAAAS8/XPjzNcskTE8/s320/ebooks+and+documents.JPG" width="320" /></a></div>
<div class="MsoNormal">
<br /></div>
<h4>
<span style="background-color: white; background-position: initial initial; background-repeat: initial initial; color: #993366; text-transform: uppercase;"><span style="font-family: Arial, Helvetica, sans-serif;">Some of the
common Documents/ Ebooks we See:</span></span></h4>
<div class="MsoNormal" style="background: white; line-height: 14.4pt; margin-bottom: 1.2pt; margin-left: 1.2pt; mso-margin-top-alt: auto;">
</div>
<div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 14.4pt; margin-bottom: 1.2pt; margin-left: 1.2pt;">
<span style="color: red;"><b><span style="font-family: Arial;">.doc</span></b><span class="apple-converted-space"><span style="font-family: Arial;"> (</span></span><b><span style="font-family: Arial;">Word
document)</span></b><span class="apple-converted-space"><span style="font-family: Arial;"> </span></span></span><span style="font-family: Arial;">— Structural binary format developed by Microsoft. <b>.<span style="color: red;">docx</span></b><span style="color: red;"> (</span><span style="color: red; font-weight: bold;">Office Open XML</span><span style="color: red;">)</span><span class="apple-converted-space"> is </span>XML-based
standard for office documents, ISO standard. <b><span style="color: red;">.OXPS</span></b><span style="color: red;"><b><span class="apple-converted-space"> (</span>Open XML Paper
Specification) </b></span>All the above specified formats are supported by <u><b>Microsoft word.</b></u><o:p></o:p></span></div>
<div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 14.4pt; margin-bottom: 1.2pt; margin-left: 1.2pt;">
<span style="font-family: Arial;"><br /></span></div>
<div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 14.4pt; margin-bottom: 1.2pt; margin-left: 1.2pt;">
<b><span style="color: blue; font-family: Arial;">.Pdf </span></b><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">–</span><span style="font-family: Arial; line-height: 14.4pt;"> Open standard for documents exchange.
ISO standards from 2001, 2005, 2008. It is readable on almost every platform
with free or open source readers. Open source PDF creators are also available. We
can view PDF files using </span><u style="font-family: Arial; line-height: 14.4pt;"><b>Adobe reader,</b></u><span style="font-family: Arial; line-height: 14.4pt;"> </span><b style="font-family: Arial; line-height: 14.4pt;"><u>Adobe acrobat</u></b><span style="font-family: Arial; line-height: 14.4pt;"> and </span><b style="font-family: Arial; line-height: 14.4pt;"><u>acrobat.com</u></b><span style="font-family: Arial; line-height: 14.4pt;">. Here is a
video regarding its differences</span></div>
<div align="Center" class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 14.4pt; margin-bottom: 1.2pt; margin-left: 1.2pt;">
<span style="font-family: Arial, Helvetica, sans-serif;">
<iframe allowfullscreen="" frameborder="0" height="296" scrolling="no" src="http://tv.adobe.com/embed/123/7231/" title="AdobeTV Video Player" width="515"></iframe></span></div>
<div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 14.4pt; margin-bottom: 1.2pt; margin-left: 1.2pt;">
<b><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></b></div>
<div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 14.4pt; margin-bottom: 1.2pt; margin-left: 1.2pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b><span style="color: #38761d;">.Txt</span></b><span class="apple-converted-space"> </span></span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">–</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><b style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"><span style="color: #38761d;">ASCII</span></b><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">nebo</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">Unicode</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">plaintext</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">Text
file.We can use it with</span><b style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> <u>notepad</u></b><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">, a familiar one!</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><b><span style="color: red;">.prc</span>;<span style="color: red;"> .mobi</span> </b>- <b><span style="color: red;">Mobipocket<span class="apple-converted-space"> </span>e-book</span></b> format is based on the<span class="apple-converted-space"> </span>Open eBook<span class="apple-converted-space"> </span>standard using<span class="apple-converted-space"> </span>XHTML<span class="apple-converted-space"> </span>and can include JavaScript<span class="apple-converted-space"> </span>and frames. It also supports native<span class="apple-converted-space"> </span>SQL<span class="apple-converted-space"> </span>queries
to be used with embedded databases. There is a corresponding e-book reader,<u><b> Mobipocket Reader</b></u>.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<br /></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b><span style="color: blue;">.epub</span> </b>–<span style="color: blue;"> <b>EPUB/
OEBPS</b></span><span class="apple-converted-space"> </span>format is an open
standard for e-books created by the<span class="apple-converted-space"> </span>International
Digital Publishing Forum<span class="apple-converted-space"> </span>(IDPF).
It combines three IDPF open standards. We have an <u><b>Epub reader</b></u> for these documents. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<br /></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: #38761d;"><b>.pdb</b> </span>–<span style="color: #38761d;"> <b>Palm
media/ EREADER</b></span> is a<span class="apple-converted-space"> </span>freeware<span class="apple-converted-space"> </span>program for viewing Palm Digital Media
electronic books which use the pdb format used by many Palm applications.
Versions are available for<span class="apple-converted-space"> </span>iPhone,<span class="apple-converted-space"> </span>PalmOS<span class="apple-converted-space">, </span>Android,<span class="apple-converted-space"> </span>Symbian,<span class="apple-converted-space"> </span>BlackBerry,<span class="apple-converted-space"> </span>desktop<span class="apple-converted-space"> </span>Windows, Macintosh,... The reader
shows text one page at a time, as paper books do. Some Ereaders like <b><u>nook</u>, <u>ereader.com</u></b> supports these file types.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<br /></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<span style="color: red; font-family: Arial, Helvetica, sans-serif;"><b>.lit</b> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">–<span style="color: red;"> </span></span><b style="color: red; font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">Microsoft
LIT</b><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> are DRM-protected LIT files are only readable in the proprietary</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">Microsoft Reader</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">program, as the .LIT format, otherwise
similar to Microsoft's</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">CHM</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">format, includes</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">Digital Rights Management</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">features. Other third party readers,
such as</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;">Lexcycle Stanza, can read
unprotected LIT files. <b><u>Microsoft lit reader </u></b>is the best software available for these files</span></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<br /></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="color: blue;">.lrf; .lrx; .lrs</b> – <span class="mw-headline"><b><span style="color: blue;">Broadband eBooks</span></b> (BBeB)</span> format is used
by<span class="apple-converted-space"> </span>Sony Corporation. It is a
proprietary format, but some reader software for general-purpose computers,
particularly under Linux, have the capability to read it, like<b><u> sony Ereader</u></b>. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<br /></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="color: #38761d;">.chm </b>– <b style="color: #38761d;">Compiled Html</b>
format is a proprietary format based on HTML. Multiple pages and embedded
graphics are distributed along with proprietary<span class="apple-converted-space"> </span>metadata<span class="apple-converted-space"> </span>as a single compressed file. <span style="background-position: initial initial; background-repeat: initial initial;"><o:p></o:p></span></span><b style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"><u>Microsoft lit reader</u></b><span style="font-family: Arial, Helvetica, sans-serif; line-height: 14.4pt;"> can be used.</span></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
</div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: red;"><b>.</b><b>fb2</b> </span></span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 19.1875px;">–</span><span style="color: red; font-family: Arial, Helvetica, sans-serif;"> <b>FictionBook</b><sup><a href="http://en.wikipedia.org/wiki/Comparison_of_e-book_formats#cite_note-8"></a></sup></span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif;"><span style="color: red;"> </span>is a popular<span class="apple-converted-space"> </span></span><span style="font-family: Arial, Helvetica, sans-serif;">XML-based e-book format, supported by free
readers such as<span class="apple-converted-space"><b> </b></span></span><span style="font-family: Arial, Helvetica, sans-serif;"><u><b>FBReader</b></u>,</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif;"> </span><span style="font-family: Arial, Helvetica, sans-serif;"><u><b>Okular</b></u>,<b><u>CoolReader</u></b>,</span><b><u><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif;"> </span><span style="font-family: Arial, Helvetica, sans-serif;">Bebook</span></u></b><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif;"> </span><span style="font-family: Arial, Helvetica, sans-serif;">and</span><span class="apple-converted-space" style="font-family: Arial, Helvetica, sans-serif;"><b><u> </u></b></span><span style="font-family: Arial, Helvetica, sans-serif;"><b><u>STDU
Viewer</u></b>.</span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: blue;"><b>.ibooks</b> </span>–<span style="color: blue;"> <b>Apple Ibook</b> </span><span style="background-position: initial initial; background-repeat: initial initial;">format is created with the free<span class="apple-converted-space"> </span></span><span style="background-position: initial initial; background-repeat: initial initial;">iBooks Author<span class="apple-converted-space"> </span><u><b>ebook layout software</b></u> from<span class="apple-converted-space"> </span></span>Apple Inc.. This proprietary format is based on the<span class="apple-converted-space"> </span>EPUB<span class="apple-converted-space"> </span>standard, with some differences in the CSS tags used in an
ibooks format file, thus making it incompatible with the EPUB open standard.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="color: #38761d;">.azw; .kf8</b> – <span class="apple-converted-space"> </span><b style="color: #38761d;">Amazon.com kindle</b> also released<span class="apple-converted-space"> </span>Kindle Format 8, their new
file format. The .kf8 file format supports a subset of HTML5 and CSS3 features,
with some additional nonstandard features; the new data is stored within a
container which can also be used to store a MOBI content document. <b><u>Amazon Kindle</u></b> has a </span><span style="font-family: Arial, Helvetica, sans-serif; line-height: 19.1875px;">proprietary software.</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: red;"><b>.exe or .html</b> </span>–<span style="color: red;"> <b><span style="background-position: initial initial; background-repeat: initial initial;">Eveda </span>/ A<span class="apple-converted-space"> </span></b></span><b><span style="color: red;">multimedia ebook</span> </b><span style="background-position: initial initial; background-repeat: initial initial;">is<span class="apple-converted-space"> </span></span><span style="background-position: initial initial; background-repeat: initial initial;">media<span class="apple-converted-space"> </span>and<span class="apple-converted-space"> </span></span>book<span class="apple-converted-space"> </span>content<span class="apple-converted-space"> </span>that utilizes a combination of different book<span class="apple-converted-space"> </span>content formats. <u><b>Adobe software </b></u>are used for creating this type of ebook and <b><u>adobe digital edition </u></b>software supports these files<o:p></o:p></span></div>
<br />
<div class="MsoNormal" style="line-height: 14.4pt;">
<br /></div>
<div class="MsoNormal" style="line-height: 14.4pt;">
<span style="font-family: Arial, Helvetica, sans-serif;">Surprisingly, this list only shows a small number out here. There are a variety of documents/ Ebooks, I have not mentioned
because they are proprietary or software-specific, or because they are just not
really used.</span><span style="font-family: Arial;"><o:p></o:p></span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-87388207552074402142013-02-14T23:32:00.001-08:002013-02-14T23:36:28.373-08:00How do I download or save a YouTube video to my computer?<h3>
<span style="color: #134f5c;">Everyone asks the same,I want to download or save a YouTube video to my computer. </span></h3>
YouTube has been designed to only allow users to watch and view videos on their website. Many users want to save their favorite videos to their computer so they can watch them without being connected to the Internet or so they can watch them on other devices. Below are the steps required for downloading and watching YouTube videos on your computer for free.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-QLEQKi7Y0hc/UR3jcNjX4UI/AAAAAAAAASs/pmtFrUMbgXk/s1600/video.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="227" src="http://1.bp.blogspot.com/-QLEQKi7Y0hc/UR3jcNjX4UI/AAAAAAAAASs/pmtFrUMbgXk/s1600/video.JPG" width="320" /></a></div>
<br />
<h4>
<b><u><span style="color: red;">Caution:</span></u></b> These services can be used to save any flash videos online and can be used to save adult related videos, which unfortunately means when viewing these pages you may be subjected to adult related content.</h4>
<h3>
<span style="color: #660000;">Getting the YouTube file to your computer </span></h3>
Today, there are several online websites that allow you to enter theURL of the video you wish to save to your computer, and get a link to download the file. Below is a short list of some of the more popular free websites.<br />
<br />
<h4>
<a href="http://www.savevid.com/">savevid.com</a></h4>
<h4>
<a href="http://keepvid.com/">keepvid.com</a></h4>
<br />
Below is a brief description of how to save a video using Savevid. These steps are often very similar with other services used to save YouTube and other flash videos online.<br />
1. Go to the YouTube video page andcopy the URL of the video you wish to save. For example, below is a URL to a video on YouTube.<br />
<h4>
<span style="color: blue;"> i.e., under the video>>in about/share/... options </span><span style="color: #674ea7;">CLICK ON</span> <span style="color: red;">SHARE</span><span style="color: blue;">>>under </span><span style="color: red;">share this video</span><span style="color: blue;"> you have </span><span style="color: red;">URL</span><span style="color: blue;">>>copy it</span></h4>
2. Once this address has been copied, visit SaveVid/KeepVid and paste that URL into the URL text field, then click the Submit or Download button.<br />
<br />
<h4>
<b><u><span style="color: red;">Caution:</span></u></b> It asks you to run some Java applications. You must trust the website and run those apps!</h4>
3. If done properly, the page should open a new window or display a link to each of the video formats that can be saved. Savevid/KeepVid will give you the option to save the video as FLV, 3GP, MP4 and WebM format. If you're wanting to watch this video on the computer we recommend saving the video as MP4 format.<br />
<br />
<h3>
<span style="color: #660000;">Converting the YouTube video to a different movie format</span></h3>
There are dozens of different software programs and online services available that will allow you to convert FLV files into another format. Below is a short listing of some of the free services and products we recommend.<br />
<b><i><u><span style="color: orange;">Media Convert -</span></u></i></b> An excellent online service that can convert FLV files into dozens of other formats.<br />
<h4>
<a href="http://www.media-convert.com/">media-convert.com</a></h4>
<span style="color: orange;"><b><i><u>Vixy -</u></i></b> </span>Another great online service that allows you to download and save YouTube video files to another format.<br />
<h4>
<a href="http://vixy.net/">vixy.net</a></h4>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-14099529225359596422012-10-13T11:35:00.002-07:002012-10-13T11:35:45.223-07:00Oct 2nd-International Day of Non-ViolenceThe International Day of Non-Violence is observed on 2 October, the birthday of Mohandas Gandhi. This day is referred to in India as Gandhi Jayanti. In January 2004, Iranian Nobel laureate Shirin Ebadi had taken a proposal for an International Day of Non-Violence from a Hindi teacher in Paris teaching international students to the World Social Forum in Bombay. The idea gradually attracted the interest of some leaders of India's Congress Party ("Ahimsa Finds Teen Voice", The Telegraph, Calcutta) until a Satyagraha Conference resolution in New Delhi in January 2007 initiated by Sonia Gandhi and Archbishop Desmond Tutu called upon the United Nations to adopt the idea. On 15 June 2007 the United Nations General Assembly voted to establish 2 October as the International Day of Non-Violence. The resolution by the General Assembly asks all members of the UN system to commemorate 2 October in "an appropriate manner and disseminate the message of non-violence, including through education and public awareness." The United Nations Postal Administration in New York City prepared a special cachet to commemorate this event, following a request from the Indian Ambassador at the Permanent Mission of India to the UN. The boxed pictorial cachet design was prepared by the UNPA and was limited to cancellation at UNPA's NY location (not Geneva and Vienna). The UNPA has indicated that all outgoing UNPA mail between October 2 and 31 carried the cachet. Information on various philatelic material carrying this cachet is summarized at a website dedicated to Gandhi philately and can be accessed <br />
____________________________________________<br />
<b>GANDHI JI</b> As we all know,Mohandas Karamchand Gandhi was the preeminent leader of Indian nationalism in British-ruled India. Employing non-violent civil disobedience, Gandhi led India to independence and inspired movements for non-violence, civil rights and freedom across the world was born on 2 October 1869 in Porbandar, a coastal town which was then part of the Bombay Presidency, British India. He was born in his ancestral home, now known as Kirti Mandir. His father, Karamchand Gandhi (1822–1885), who belonged to the Hindu Modh community, served as the diwan (a high official) of Porbander state, a small princely state in the Kathiawar Agency of British India. His grandfather was Uttamchand Gandhi, also called Utta Gandhi. His mother, Putlibai, who came from the Pranami Vaishnava community, was Karamchand's fourth wife, the first three wives having apparently died in childbirth. Jain ideas and practices powerfully influenced Gandhi, particularly through his mother, who was a devout Jain. In May 1883, the 13-year-old Mohandas was married to Kasturbai Makhanji (her first name was usually shortened to "Kasturba", and affectionately to "Ba") in an arranged child marriage, according to the custom of the region. In the process, he lost a year at school. Recalling the day of their marriage, he once said, "As we didn't know much about marriage, for us it meant only wearing new clothes, eating sweets and playing with relatives." However, as was prevailing tradition, the adolescent bride was to spend much time at her parents' house, and away from her husband. In 1885, when Gandhi was 15, the couple's first child was born, but survived only a few days. Gandhi's father, Karamchand Gandhi, had also died earlier that year. Mohandas and Kasturba had four more children, all sons: Harilal, born in 1888; Manilal, born in 1892; Ramdas, born in 1897; and Devdas, born in 1900. At his middle school in Porbandar and high school in Rajkot, Gandhi remained a mediocre student. He shone neither in the classroom nor on the playing field. One of the terminal reports rated him as "good at English, fair in Arithmetic and weak in Geography; conduct very good, bad handwriting." He passed the matriculation exam at Samaldas College in Bhavnagar, Gujarat, with some difficulty. Gandhi's family wanted him to be a barrister, as it would increase the prospects of succeeding to his father's post His Principles, practices and beliefs are Truth and Satyagraha,Nonviolence,Vegetarianism and fasting,Celibacy, Nai Talim; Basic Education, Swaraj; Self-Rule. Gandhian economics of seperation of india and so on! On 30 January 1948, Gandhi was shot while he was walking to a platform from which he was to address a prayer meeting. The assassin, Nathuram Godse, was a Hindu nationalist with links to the extremist Hindu Mahasabha, who held Gandhi responsible for weakening India by insisting upon a payment to Pakistan.By Hindu tradition the ashes were to be spread on a river. Gandhi's ashes were poured into urns which were sent across India for memorial services.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-67962826761593823492012-09-05T11:14:00.002-07:002012-09-05T11:14:29.331-07:00The Story Behind Teacher's DayOn the occasion of teachers day i would like to post something about Dr.Sarvepalli RadhaKrishna. He was born on sept 5, 1888 to Sarvepalli VeeraSwami and Sitamma, in a poor telugu niyogi-bramhin family at Tiruttani. He had his school education at Tiruttani and Tirupati <em><span style="background-color: white; color: #666666; font-size: x-small;">(it is also said that he used to travel on his foot for schooling and got scholarships for education)</span></em><span style="font-size: small;">; college education at Vellore and Chennai.He graduated from there in 1906 with a Master's degree in Philosophy.Radhakrishnan wrote his thesis for the M.A. degree on "The Ethics of the Vedanta and its Metaphysical Presuppositions",which was published when he was only 20.Being a financially constrained student at the time, when a cousin/Friend, after graduating from the same college, passed on his textbooks in philosophy to Radhakrishnan, it automatically decided his academic course.</span><br />
He married <em>SivaKamaSundari</em> when he was 16 and they had 6 children(5daughters and a son, Sarvepalli Gopal).They had successful companionship for more than 50 years,till her death.<br />
<h2>
<span style="color: red;">CAREER</span></h2>
In April 1909,Sarvepalli Radhakrishnan was appointed to the Department of Philosophy at <em>the Madras Presidency College</em>. Thereafter, in 1918, Radhakrishnan was selected as Professor of Philosophy by the <em>University of Mysore</em>. In 1921 he was appointed as a professor in philosophy to occupy the <em>King George V Chair of Mental and Moral Science</em> at the <em>University of Calcutta</em>. Radhakrishnan represented the <em>University of Calcutta</em> at the Congress of the Universities of the British Empire in June 1926 and the International Congress of Philosophy at <em>Harvard University</em> in September 1926. Another important academic event during this period was the invitation to deliver the Hibbert Lecture on the ideals of life which he delivered at <em>Harris Manchester College, Oxford</em> in 1929 and which was subsequently published in book form as "An Idealist View of Life". In 1929 Radhakrishnan was invited to take the post vacated by Principal J. Estlin Carpenter at <em>Harris Manchester College</em>. This gave him the opportunity to lecture to the students of the <em>University of Oxford</em> on Comparative Religion. For his services to education he was knighted by George V in the June 1931 Birthday Honours, and formally invested with his honour by the Governor-General of India, the Earl of Willingdon, in April 1932. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-49LccDMG7PI/UEePwRTdNbI/AAAAAAAAASU/jw0yMU4DyJg/s1600/Dr_-Sarvepalli-Radhakrishnan-Celebrating-Teachers-Day-in-India2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" hea="true" height="320" src="http://3.bp.blogspot.com/-49LccDMG7PI/UEePwRTdNbI/AAAAAAAAASU/jw0yMU4DyJg/s320/Dr_-Sarvepalli-Radhakrishnan-Celebrating-Teachers-Day-in-India2.jpg" width="276" /></a></div>
However, he ceased to use the title after Indian independence, preferring instead his academic title of 'Doctor'.He was having a title called sir also . He was the Vice-Chancellor of <em>Andhra University</em> from 1931 to 1936. In 1936 Radhakrishnan was named Spalding Professor of Eastern Religions and Ethics at the University of Oxford, and was elected a Fellow of All Souls College. In 1939 Pt. Madan Mohan Malaviya invited him to succeed him as the Vice-Chancellor of <em>Banaras Hindu University</em> (BHU). He served as its Vice-Chancellor till January 1948. When India became independent in 1947, Radhakrishnan represented India at UNESCO (1946–52) and was later Ambassador of India to the Soviet Union, from 1949 to 1952. He was also elected to the Constituent Assembly of India. Along with Ghanshyam Das Birla and some other social workers in the pre-independence era, Radhakrishnan formed the Krishnarpan Charity Trust.Among the many other honours he received were the <i>Bharat Ratna </i>(1954) and <i>The Order of Merit </i>(1963).<br />
<h2>
<span style="color: red;">POLITICS:</span> </h2>
Radhakrishnan was elected as the third Vice President of India in 1952. He was elected as the second President of India (1962–1967). When he became President, some of his students and friends requested him to allow them to celebrate his birthday, 5 September. He replied, <i>"Instead of celebrating my birthday, it would be my proud privilege if 5 September is observed as Teachers' Day."</i><br />
<b><span style="color: #6aa84f;">His birthday has since been celebrated as Teachers' Day in India</span> </b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-83972196635784566852012-06-03T06:41:00.000-07:002012-06-03T06:41:35.830-07:00Virus and how to protect your PC from viruses<div align="center">
<span style="color: #6600cc;"><span style="font-family: georgia;"><span style="font-size: 130%;"><em><strong>VIRUS</strong></em> </span></span></span></div>
<div aligm="center">
</div>
<div align="left">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-8GSlZjRP3Og/T8ot8P3-o1I/AAAAAAAAAR4/8dsx93EJBQI/s1600/virus%2Blife%2Bcycle.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="http://3.bp.blogspot.com/-8GSlZjRP3Og/T8ot8P3-o1I/AAAAAAAAAR4/8dsx93EJBQI/s400/virus%2Blife%2Bcycle.gif" width="400" /></a></div>
<em><span style="color: #993399;">computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability.</span></em> A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.<br />
<strong>Resident Viruses</strong>:This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.<br />
<strong> Direct Action Viruses</strong>:The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.<br />
<strong>Overwrite Viruses</strong>:Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.<br />
<strong>Boot Virus</strong>:This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.<br />
<strong>Macro Virus</strong>:Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.<br />
<strong>Directory Virus</strong>:Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.<br />
<strong>Polymorphic Virus</strong>:Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.<br />
<strong>File Infectors</strong>:This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.<br />
<strong>Companion Viruses</strong>:Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).<br />
<strong>FAT Virus</strong>:The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer. This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.<br />
<strong>Worms</strong>:A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system .It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.<br />
<strong>Trojans or Trojan Horses</strong>:Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.They appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system.<br />
<strong>Logic Bombs</strong>:They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. They are intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company. </div>
<div align="center">
<span style="color: #6600cc;"><span style="font-family: georgia;"><span style="font-size: 130%;"><em><strong>VIRUS PREVENTION</strong></em></span></span></span></div>
<br />
<div align="left">
<em><span style="color: #993399;">Here are some ways to protect you PC From viruses:</span>
</em><br />
<em>1.Install a reliable anti virus, firewall, anti-spyware and anti-malware.</em><br />
<em>
2.Avoid suspicious WebSites.
</em><br />
<em>3.Never Open an e-mail attachments without scanning.
</em><br />
<em>4.Set up automatic and scheduled scans.
</em><br />
<em>5.Monitor Your Downloads. </em><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-7N3kQ-TNW6Y/T8ot8aNtfNI/AAAAAAAAASE/kxLa-mmGv6E/s1600/hackers.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="338" src="http://3.bp.blogspot.com/-7N3kQ-TNW6Y/T8ot8aNtfNI/AAAAAAAAASE/kxLa-mmGv6E/s400/hackers.JPG" width="400" /></a></div>
6.Genuine update of your antivirus.
<br />
7.Mindful Knowledge of you PC.
<br />
8.Never accept a unknown download request or online dialog box when surfing the net.
<br />
9.Donot download an executable program unless you know the program.
<br />
10.Be Prepared to lockdown, when you hear of Virus! </div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-13123378389974403862010-08-16T06:26:00.003-07:002010-11-20T22:18:36.304-08:00KIDS POST<div><br /><br /><div>Hey,here are some interesting items for kids.................!</div><div> </div><div><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 400px; DISPLAY: block; HEIGHT: 258px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5541881629655740978" border="0" alt="" src="http://1.bp.blogspot.com/_AhAi67KlM_Y/TOi3-uLksjI/AAAAAAAAARM/cXwvjtvbVaI/s400/alphanumerics.JPG" /></div><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dyQEEDE_sotT4wL59pBv06VK-TL5ImvXGd9D8-q3arg-ldpCQkfSau3WCb1p-GvGhaGeclniUkkvgwz4Si7Pg' class='b-hbp-video b-uploaded' frameborder='0'></iframe><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 400px; DISPLAY: block; HEIGHT: 259px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5541881459397780194" border="0" alt="" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/TOi30z66YuI/AAAAAAAAARE/_pS78Ycxuw0/s400/fruits.JPG" /><br /><br /><div></div></div><br /><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dwpcgupV0UW51F20-In27L4JBdKctMZmtN-dMipLGhs53toClIP_Wtn2Ks4Po7-nzOUK75d3LtO8kzb8EgXIQ' class='b-hbp-video b-uploaded' frameborder='0'></iframe>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-29114653066360617632010-08-16T06:26:00.001-07:002010-10-07T09:31:48.543-07:0042nd Engineer's Day<a href="http://www.ieindia.org/tech/sir_m_v_photo.jpg"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 354px; DISPLAY: block; HEIGHT: 472px; CURSOR: hand" border="0" alt="" src="http://www.ieindia.org/tech/sir_m_v_photo.jpg" /></a><br /><div></div><br />In India, Engineers' Day is celebrated on 15 September every year.The day is the birthday of Sir Mokshagundam Visvesvarayya, an eminent Indian engineer.He was also called the precursor of economic planning in India. He took an interest not in engineering alone, but was capable of applying his talent to many allied matters connected with the development of the nation. His learned discourse on economic planning in India entitled 'Planned Economy for India and Reconstructing India' was the first available document on the planning effort of the country and it is still held as the parent source matter for economic planners.<br />To commemorate the birthday of Bharat Ratna Sir M Visvesvaraya, the Council of the Institution decided to observe <strong>September 15 as the Engineers' Day every year</strong>. This is celebrated throughout the country through all the Centres of the Institution with learned discourses on a theme specified by the Council every year.<br /><span style="font-size:130%;">ABOUT SIR M. VISVESVARAYA</span><br />As earlier Said, <em>Sir Mokshagundam Visvesvarayya</em> born on 15 September 1860, was a notable Indian engineer, scholar, and statesman born at Muddenahalli, near Kanivenarayanapura, in present-day Chikballapur District of Karnataka State. . He was a recipient of the Indian Republic's highest honour, the Bharat Ratna, in 1955. He was knighted as a Commander of the Indian Empire by King George V for his myriad contributions to the public good. He is held in high regard as the first and pre-eminent engineer of India.<br /><span style="color:#993399;"><strong>Career as Engineer and Diwan of Mysore:</strong></span> Upon graduating as an engineer, Visvesvaraya took up a job with the Public Works Department (PWD) of Bombay.<br />-Later invited to join the Indian Irrigation Commission and was successful in Deccan.<br />-designed and patented a system of automatic weir water floodgates that were first installed in 1903 at the Khadakvasla Reservoir near Pune.<br />-The same system was installed at the Tigra Dam in Gwalior and the Krishnaraja Sagara (KRS) Dam in Mandya/ Mysore, Karnataka.<br />-In 1906-07, Government of India sent him to Eden(Africa) and was successful in water supply and drainage system Project there.<br />-Visvesvaraya achieved celebrity status when he designed a flood protection system for the city of Hyderabad from floods.<br />-He was instrumental in developing a system to protect Vishakapatnam port from sea erosion.<br />-He was instrumental in charting out the plan for road construction between Tirumala and Tirupati.<br />-During his period of service with the Government of Mysore state, he was responsible for the founding of, (under the Patronage of Mysore Government) the Mysore Soap Factory, the Parasitoide Laboratory, the Mysore Iron & Steel Works (now known as Visvesvaraya Iron and Steel Limited) in Bhadravathi, the Sri Jayachamarajendra Polytechnic Institute, the Bangalore Agricultural University, the State Bank of Mysore, The Century Club, Mysore Chambers of Commerce and numerous other industrial ventures. He encouraged private investment in industry during his tenure as Diwan of Mysore.<br />He was known for sincerity, time management and dedication to a cause.<br /><span style="color:#993399;"><strong>Honours:</strong></span> In 1915, while he was the Diwan of Mysore, Visvesvaraya was made Knight Commander of the Order of the Indian Empire by the British for his myriad contributions to the public good. After India attained independence, Sir M. Visvesvaraya was given the nation's highest honour, the Bharat Ratna, in 1955.<br />THIS Great and Eminent Engineer Physically expired on 14 April 1962 but is still alive in all his PROJECTS which remains in OUR COUNTRY! Lets Salute the Legendary Person who inaugurated the Revolutionary Development in INDIA...Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-18623583466450344272010-08-16T06:25:00.000-07:002010-10-04T07:38:08.019-07:00The 17 Most Dangerous Places on the Web<div align="left"><span style="font-size:130%;"><em><span style="font-family:trebuchet ms;">The scariest sites on the Net? They're not the ones you might suspect. Here's what to watch for and how to stay safe.</span></em></span><span style="font-family:trebuchet ms;"><br /></span>Those photos of Jessica Alba may be murder on your PC. That Google search result that looks as if it answers all your questions may do nothing but create a serious tech headache. The fun you had watching that hilarious video you downloaded may not be worth the misery it can cause your system. </div><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 241px; DISPLAY: block; HEIGHT: 414px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5524193159900785234" border="0" alt="" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/TKngaRaHalI/AAAAAAAAAQc/k7naaN9Fbg0/s400/17most.JPG" /><br />You've been warned that the Internet is something of a security minefield--that it's easy to get in trouble. You can do everything you can think of to protect yourself and still be taken by a malware infection, a phishing scam, or an invasion of on¬¬line privacy. We'd like to provide a little help. Here are some of the hazards you may encounter, how dangerous they are, and what you can do to stay out of harm's way.<br />Not all Web dangers are created equal. Thankfully, our friends at the Department of Homeland Security have made our work of classifying Web threats a little easier. Will you get taken just by visiting that unfamiliar site? Or will you have to look for trouble? Let our threat level indicator be your guide.<br /><strong><span style="color:#ffcc66;">Threat 1 >></span></strong> <span style="color:#ffcc33;">Malicious Flash files that can infect your PC<br /><strong>The Place: Websites that use Flash</strong><br /></span>Adobe's Flash graphics software has become a big malware target in recent years, forcing the company to push out frequent security patches. But another danger you might not know about is associated with Flash cookies. Flash cookies are small bits of data that their creators can use to save Flash-related settings, among other things. But like regular cookies, Flash cookies can track the sites you visit, too. Worse still, when you delete your browser's cookies, Flash cookies get left behind.<br />If You Have to Go There: To help protect against Flash-based attacks, make sure you keep your Flash browser plug-ins up-to-date. And you can configure the Flash plug-in to ask you before it downloads any Flash cookies.<br /><span style="color:#ff6600;"><strong>Threat 2 >></strong> Shortened links that lead you to potentially harmful places<br /><strong>The Place: Twitter</strong></span><br />Scammers love Twitter since it relies so much on URL shorteners, services that take long Internet addresses and re¬¬place them with something briefer.<br />And it's very simple to hide malware or scams behind shortened URLs. A shortened link that supposedly points to the latest Internet trend-du-jour may be a Trojan horse in disguise.<br />If You Have to Go There: Simply don't click links. Of course, that takes some of the fun out of Twitter. The other option is to use a Twitter client app. TweetDeck and Tweetie for Mac have preview features that let you see the full URL before you go to the site in question.<br />Some link-shortening services, such as Bit.ly, attempt to filter out malicious links, but it seems to be a manual process, not an automatic one. TinyURL has a preview service you can turn on.<br /><span style="color:#ffcc66;"><strong>Threat 3 <span style="color:#ffcc33;">>></span></strong></span><span style="color:#ffcc33;"> E-mail scams or attachments that get you to install malware or give up personal info</span><br /><strong><span style="color:#ffcc33;">The Place: Your e-mail inbox<br /></span></strong>Although phishing and infected e-mail attachments are nothing new, the lures that cybercrooks use are constantly evolving, and in some cases they're becoming more difficult to distinguish from legitimate messages. My junk mailbox has a phishing e-mail that looks like a legitimate order confirmation from Amazon. The only hint that something's amiss is the sender's e-mail address.<br />If You Have to Go There: Don't trust anything in your inbox. Instead of clicking on links in a retailer's e-mail, go directly to the retailer's site.<br /><strong><span style="color:#ff0000;">Threat 4 >></span></strong> <span style="color:#cc0000;">Malware hiding in video, music, or software downloads<br /><strong>The Place: Torrent sites</strong></span><br />Torrent sites (such as BitTorrent) are often used for sharing pirated music, videos, or software, and are a trove of malware. No one vets the download files--they may be malware in disguise.<br />Ben Edelman, privacy researcher and assistant professor at Harvard Business School, thinks torrent sites are the most dangerous places to visit, since they don't have a business model or reputation to defend (by comparison, many porn sites rely on being deemed trustworthy). "The [torrent] customers, they really don't want to pay," he says.<br />If You Have to Go There: It's probably best to avoid torrent sites entirely, given their untrustworthy content, but if you must visit, use a secondary PC to protect your main system. Use antivirus software, and keep it up¬¬dated. Scan downloaded files and wait a couple of days be¬¬fore opening them. Brand-new malware can be tricky to catch, but the delay in opening may allow your antivirus software to get the necessary signatures.<br /><span style="color:#ffcc66;"><strong>Threat 5 >></strong></span> <span style="color:#ffcc33;">Malware in photos or videos of scantily clad women<br /><strong>The Place: ‘Legitimate' porn sites</strong></span><strong><br /></strong>Porn sites have a reputation of being less secure than mainstream sites, but that assumption doesn't tell the whole story. "There is no doubt that visiting Websites of ill-repute is deadly dangerous. If you make a habit of it, it's a given that you'll be attacked at some point," says Roger Thompson, chief research officer with security firm AVG. "Unfortunately, staying away from those sites won't keep you safe by itself, because innocent sites get hacked all the time, and are used as lures to draw victims to the attack servers."<br />And as mentioned earlier, many porn sites operate as actual, legitimate businesses that want to attract and retain customers. That said, it may be hard to tell the "legit" porn sites from malware-hosting sites that use porn as a lure.<br />If You Have to Go There: Be suspicious of video downloads, or sites that require you to install video codecs to view videos (see the next threat, below). Using tools like AVG's LinkScanner and McAfee's SiteAdvisor (or SiteAdvisor for Firefox) can help you weed out the malicious sites.<br />And, again, consider visiting such sites on a secondary machine. You don't want your browser history on the family PC.<br /><span style="color:#ff6600;"><strong>Threat 6 >></strong> Trojan horses disguised as video codecs, infecting your PC with malware<br /><strong>The Place: Video download sites, peer-to-peer networks</strong></span><strong><br /></strong>If you watch or download video online, you've likely been told to download a video codec--a small piece of software that provides support for a type of video file--at least once. Usually, these bits of software are perfectly legitimate (for example, the popular DivX codec), but some less-than-reputable download services or video sites may direct you to download a piece of malware disguised as a codec. Security software company Trend Micro provides a good example of what these attacks look like.<br />If You Have to Go There: Your safest option is to stick with well-known video sites such as YouTube and Vimeo. And for catching up on the latest episodes of your favorite TV shows, sites and services like Hulu, TV.com, ABC.com, and iTunes are safer than peer-to-peer networks.<br /><span style="color:#009900;"><strong>Threat 7 >></strong></span> <span style="color:#009900;">Geolocation--your smartphone and perhaps other parties know where you are </span><a href="http://2.bp.blogspot.com/_AhAi67KlM_Y/TKng9x2ro-I/AAAAAAAAAQk/8WZMSAA9zrk/s1600/177.JPG"><span style="color:#009900;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 182px; FLOAT: right; HEIGHT: 358px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5524193769905955810" border="0" alt="" src="http://2.bp.blogspot.com/_AhAi67KlM_Y/TKng9x2ro-I/AAAAAAAAAQk/8WZMSAA9zrk/s320/177.JPG" /></span></a><span style="color:#009900;"><br /><strong>The Place: Your smartphone</strong><br /></span>The smartphone market is still in its infancy, really, and so are the threats. One possible concern is the use--or abuse--of geolocation. Although plenty of legitimate uses for location data exist, the potential for inappropriate uses also exists. In one case, a game listed on the Android Market was in reality a client for a spy app. In a less invidious example, a site called pleaserobme.com showed that--for a time--a stream of FourSquare check-ins indicated that a person was away from their home (the site's goal, mind you, wasn't to condone theft, but to raise awareness of the issue).<br />As in this example showing restaurants in a San Francisco neighborhood, some smartphone apps, such as Yelp for iPhone, use your physical location to provide you with information on nearby businesses or points of interest.Apple recently updated its privacy policy to reflect changes in how it handles location data in iOS 4. The policy now states that "to provide location-based services on Apple products, Apple and our partners and licensees may collect, use and share precise location data." You can read more on Apple's new privacy terms and what they mean for you.<br />If You Have to Go There: Be particular about the location-based sites, apps, and services that you use. As shown in the screenshot at right services such as Yelp provide good examples of useful location-aware apps. On the other hand, weigh the privacy implications of services like FourSquare or the new Facebook Places feature, and consider how much you feel comfortable divulging. (Read more on how to retain privacy on FourSquare and Facebook Places.)<br /><span style="color:#ff6600;"><strong>Threat 8 >></strong> 'Poisoned' search engine results that go to malware-carrying Websites<br /><strong>The Place: Search engines</strong><br /></span>Search engine poisoning is the practice of building tainted sites or pages that are designed to rank high in a search on a given topic. For example, according to a recent study by the security firm McAfee, 19 percent of search results for "Cameron Diaz and screensavers" had some sort of malicious payload. Breaking news topics and Facebook are also common search targets for attackers.<br />If You Have to Go There: Pick and choose which sites to go to. Don't just blindly click search results; check each URL first to make sure that it really leads to the site you want. Although any site can be hacked, visiting the Washington Post's story on a hot news topic, for example, is probably a wiser choice than following a link to a site you've never heard of before.<br /><span style="color:#ff6600;"><strong>Threat 9 >></strong> Malicious PDFs that try to fool you into installing malware<br /></span><strong><span style="color:#ff6600;">The Place: Hacked Websites, plus your inbox</span><span style="color:#cc6600;"><br /></strong></span>As Microsoft has become more serious about Windows security over the past few years, would-be attackers have had to find new ways to infect PCs. <a href="http://4.bp.blogspot.com/_AhAi67KlM_Y/TKnh4SQj7iI/AAAAAAAAAQs/ArhOrYYtJ2o/s1600/threat9.JPG"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 320px; FLOAT: left; HEIGHT: 266px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5524194775036849698" border="0" alt="" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/TKnh4SQj7iI/AAAAAAAAAQs/ArhOrYYtJ2o/s320/threat9.JPG" /></a>Attacking flaws in Adobe Acrobat is one of these newer methods. So-called poisoned PDFs are PDF files that have been crafted in such a manner that they trigger bugs in Adobe Reader and Adobe Acrobat; posted on a hijacked Website, they may let an attacker commandeer your PC and access your files and personal info.<br />Feeling particularly paranoid? Uncheck 'Allow opening of non-PDF file attachments with external applications' (near the top) to head off certain PDF exploits.A newer variant takes an otherwise innocent-looking PDF document and inserts malware into it. Adobe Reader may pop up an alert asking if you want to run the malware, but hackers can edit those messages to trick you into opening the file.<br />How serious is this problem? In 2009, attacks using malicious PDFs made up 49 percent of Web-based attacks, according to security firm Symantec.<br />If You Have to Go There: First, always make sure that you're running the latest version of Adobe Reader.<br />You can also use a different PDF reader, such as Foxit Reader. This can protect you from attacks on holes in Adobe Reader itself, but it won't make you immune to all PDF attacks, such as the newer ones that embed malware inside the PDFs. Make sure, also, that you update to Adobe Reader 9.3.3 or later (Reader 8 users should update to version 8.3.3 or later); these updates change the way Adobe Reader handles non-PDF attachments and reduce the risk from such attacks.<br />You can turn off Adobe Reader's ability to open non-PDF attachments by going to Preferences, clicking Trust Manager, and unchecking Allow opening of non-PDF file attachments with external applications.<br />The next major release of Acrobat and Reader will provide a new "protected mode" against these attacks.<br /><span style="color:#ffcc66;"><strong>Threat 10 >></strong></span> <span style="color:#ffcc33;">Malicious video files using flaws in player software to hijack PCs<br /><strong>The Place: Video download sites</strong></span><br />Attackers have been known to exploit flaws in video players such as QuickTime Player and use them to attack PCs. The threats are often "malformed" video files that, like malicious PDFs, trigger bugs in the player software that let the attackers in to spy on you, plant other malware, and more.<br />If You Have to Go There: Keep your player software up-to-date. Apple and Microsoft periodically release patches for QuickTime and Windows Media Player, respectively. Avoid downloading videos at random. Stick to well-known video sites such as YouTube, or to download services like iTunes.<br /><span style="color:#ff0000;"><strong>Threat 11 >></strong></span> <span style="color:#ff0000;">Drive-by downloads that install malware when you visit a site<br /><strong>The Place: Hacked legitimate sites</strong><br /></span>A drive-by download occurs when a file downloads and/or installs to your PC without you realizing it. Such downloads can happen just about anywhere. Some sites are built to lure people into a drive-by download; but in a common attack method, criminals will hack a Web page, often on an otherwise legitimate site, and insert code that will download malware to your computer.<br />If You Have to Go There: The first thing to do is to keep your security software up-to-date, and to run regular malware scans. Many security suites can flag suspicious downloads.<br /><strong><span style="color:#ff0000;">Threat 12 >></span></strong><span style="color:#ff0000;"> Fake antivirus software that extorts money--and your credit card information<br /><strong>The Place: Your inbox, hacked legitimate sites</strong><br /></span>Fake antivirus programs look and act like the real thing, complete with alert messages. It isn't until you realize that these alerts are often riddled with typos that you know you're in trouble.<br />Most fake antivirus software is best described as extortionware: The trial version will nag you until you purchase the fake antivirus software-which usually does nothing to protect your PC. Once you send the criminals your credit card information, they can reuse it for other purposes, such as buying a high-priced item under your name.<br />You can get infected with a fake antivirus app in any number of ways. For example, in drive-by downloads (see the previous item), a malicious payload downloads and installs without the user realizing it or having any time to react.<br />If You Have to Go There: If you get an alert saying you're infected with malware, but it didn't come from the antivirus software you knowingly installed, stop what you're doing. Try booting into Safe Mode and running a scan using your legitimate antivirus software.<br />However, such a scan may not clean up all of the malware-either the scanner doesn't have a signature for one fragment, or that piece doesn't act like traditional malware. This may render behavioral detection (which spots malware based on how it acts on your system) useless. If all else fails, you may need to call in a professional.<br /><span style="color:#ffcc66;"><strong>Threat 13 >></strong></span> <span style="color:#ffcc00;">Fraudulent ads on sites that lead you to scams or malware<br /><strong>The Place: Just about any ad-supported Website</strong></span><strong><br /></strong>Hey--ads aren't all bad! They help sites pay the bills. But cybercriminals have taken out ads on popular sites to lure in victims. Last year, the New York Times site ran an ad from scammers, and earlier this year some less-than-scrupulous companies were gaming Google's Sponsored Links ad program and placing ads that looked like links to major companies' Websites.<br />"The bad guys have become very clever at exploiting online advertising networks, tricking them into distributing ads that effectively load malicious content--especially nasty, scaremongering pop-ups for rogue antispyware," says Eric Howes, director of research services for security firm GFI Software.<br />If You Have to Go There: Most large sites, such as PCWorld.com, have ad sales departments that work frequently with a core group of large advertisers, so it's probably safe to click a Microsoft ad on the New York Times site. But as the Google Sponsored Links incident shows, nothing is entirely fail-safe.<br /><strong><span style="color:#ffcc66;">Threat 14 >></span></strong><span style="color:#ffcc33;"> Questionable Facebook apps<br /><strong>The Place: Facebook</strong><br /></span>Facebook apps have long been an issue for security experts. You don't always know who's developing the apps, what they're doing with the data they may be collecting, or the developers' data security practices. Even though you have to approve apps before they can appear on your profile and access your personal information, from there the security of your data is in the developer's hands. <img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 320px; DISPLAY: block; HEIGHT: 217px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5524195506557493762" border="0" alt="" src="http://2.bp.blogspot.com/_AhAi67KlM_Y/TKnii3YrIgI/AAAAAAAAAQ0/o2zEjPtXeZ4/s320/threat14.JPG" /> <p align="left"><br />Take a few minutes to check your Facebook application settings to make sure that your app privacy settings are as you want them.If You Have to Go There: Be selective about the apps you add to your profile--don't take every quiz, for example. Check your privacy settings for Facebook apps, as well: Click the Ac¬¬count drop-down menu in the upper-right corner of Facebook's site, select Privacy Settings, and then click Edit your settings under ‘Applications and Websites'. There, you can control which apps have access to your data, and which of your friends can see what information from apps (such as quiz results); you can also turn off Facebook apps altogether.<br /><strong><span style="color:#009900;">Threat 15 >></span></strong> <span style="color:#009900;">Sites that lure you in, get you to sign up, then sell your e-mail address for spam<br /><strong>The Place: 'Free electronics' sites</strong><br /></span>You've no doubt seen sites around the Web blaring, Get a free iPad! Get a free notebook! A free iPod! It's easy! These sites aren't typically dangerous in the classical sense--you probably won't get infected with malware--but your personal information could be sold to other businesses, who can then use it to sell more stuff to you.<br />If You Have to Go There: Read the privacy policies. And then read them again. Also, beware of privacy policy loopholes--even though a site says that it won't sell your private data to third parties, depending on the language of the policy, they may still be able to give your information to "affiliates."<br /><span style="color:#ffcc66;"><strong>Threat 16 >></strong></span><span style="color:#ffcc33;"> Phishing 2.0 on social networks that tricks you into downloading malware or giving your Facebook login information to a criminal<br /><strong>The Place: Social networks</strong></span><span style="color:#cc9933;"><br /></span>Questionable Facebook apps and malicious shortened links aren't the only dangers lurking on social networks. Sites like Facebook have given rise to new forms of phishing. Scammers might hijack one person's Facebook account, then use it to lure that person's friend into clicking a malicious link, going to spam sites, or giving up their Facebook login information--thereby giving scammers one more Facebook account to hijack.<br />"One of the bigger dangers currently facing users is malware, adware, and spyware spread through social networks like Facebook and Twitter," says Eric Howes, director of malware research with Sunbelt Software. "Users may receive spam via these networks offering them free deals, links to interesting videos, or even widgets to enhance their Facebook profiles. In many cases what's really being pushed on users is adware, spyware, or even malicious software that can exploit users' PCs."<br />If You Have to Go There: Don't trust every link posted to Facebook, even if one of your friends posted it. Be especially suspicious if the post is out of the ordinary for that person. Check the person's wall or Twitter @-replies to see if anyone is concerned that the person's account has been compromised.<br />And if you suspect that your account has been hijacked, change your password immediately. Both Facebook and Twitter have resources to help you keep up-to-date on the latest threats on both sites. Facebook users should visit its security page; if you're on Twitter, be sure to follow @spam and @safety for Twitter security best practices.<br /><strong><span style="color:#009900;">Threat 17 >></span></strong> <span style="color:#006600;">Oversharing--exposing too much personal information on your social network profiles<br /><strong>The Place: Social networks</strong></span><br />How many times have you seen friends on Facebook or Twitter publicly divulge a bit more information than is necessary? Oversharing isn't just a matter of getting a little too personal--it can leave your private information viewable to the general public. But it's avoidable.<br />"There is a subtle danger that few people understand with the social networking sites, and that is the idea of information leakage," says AVG's Roger Thompson. "People, particularly teens, put all sorts of information online, without realizing that many more people than just their friends can see that data."<br />Oversharing could very well lead to more serious privacy issues further down the road, Thompson adds. "As today's young teens reach an age to apply for a credit card, I fully expect an onslaught of fraudulent card applications on their behalf, because they un¬¬wittingly di¬¬vulged so much information. Harvesting is going on now, and we have no idea who is doing the harvesting."<br />If You Have to Go There: This particular threat is relatively easy to avoid, in that a little common sense can go a long way: Just be mindful of what you post. Do you really need to publish your home address and phone number to your Facebook profile?<br />Finally, be certain to check your privacy settings to make sure that you're not divulging your deepest, darkest secrets to all 500 million Facebook users.<br /><span style="font-family:courier new;font-size:130%;"><strong><span style="font-size:180%;">Hosed!</span></strong><br /><strong><span style="color:#cc66cc;">What Happens When You Surf Unprotected?</span></strong></span><br /><br /></p><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 163px; DISPLAY: block; HEIGHT: 320px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5524196209318251442" border="0" alt="" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/TKnjLxX5S7I/AAAAAAAAAQ8/Nn_kTFNqjLU/s320/hosed.JPG" />Illustrations by Mark Todd11:45 a.m. I start the experiment with a pristine, clean PC running Windows Vista.<br />11:55 a.m. I need to check my e-mail. I download what appears to be a résumé file. Strange, I'm not hiring. I open it anyway. My screen flickers a little, but nothing starts. Hmm...<br />12:00 p.m. I start poking around on the Web, and start out easy. I run a Google search for free smilies, and sure enough, I find some. Who am I to refuse?<br />12:29 p.m. A couple smiley packs later, I am up to three browser toolbars. Junkware, but no malware...yet.<br />12:41 p.m. I download some random freebie antivirus software I've never heard of. Let's see what this does...<br />12:48 p.m. More random downloads, and my desktop is getting junked up. I now have icons for free games and 1000 free songs littered all over, plus more browser toolbars than I care to have.<br />12:55 p.m. IE is hating me right now. Still no signs of malware, but something's sure eating up system resources.<br />1:03 p.m. My PC locks up for a few moments.<br />1:25 p.m. After a restart, Windows throws up a warning about a program at C:\Users\PCW\AppData\Roaming\host32.exe. I have no idea what it is.<br />1:40 p.m. I think I killed IE. I can't launch it. Malware? But I uninstall a couple of toolbars, and it seems to work again.<br />3:00 p.m. It's unclear whether I've gotten infected by anything on the Web, but so far I haven't done anything too terribly risky. However, I've got to check my e-mail again; I'm expecting an important file from a friend.<br />3:05 p.m. Whoops. I think I clicked on the wrong file. I've got fake antivirus!<br />3:25 p.m. I now have three or four fake antivirus programs running. Malware has also planted three shortcut links to porn sites on my desktop. And whenever I open something in IE, a fake antivirus app kicks in with a fake warning.<br />4:13 p.m. Something just forced my PC to shut down and restart. I think I've successfully hosed this computer<br /><u><span style="color:#330000;"><strong><em>Tips from the Pros:</em></strong></span></u><br /><span style="font-family:georgia;color:#666666;">Top 5 Ways to Stay Safe Online<br /></span>Stay up-to-date, stay paranoid, stay protected. That's the message from the security experts we spoke with while developing this story. Here are a few of their top tips and suggestions for protecting your computer against malware and hackers.<br /><strong>1) Keep up on patches.</strong><br />Be sure to run Windows Update, as well as the software update features in the other programs that you use every day.<br /><strong>2) Be password smart.<br /></strong>As tempting as it is to use the same password in multiple places, don't. And use longer passwords, too-they're harder to crack. If you have lots of accounts to manage, use a password manager. (See "GPUs Power Games, Crack Passwords," for more on this issue.)<br /><strong>3) Use security software.<br /></strong>That may seem self-evident, but it can help block malware or software that is acting suspiciously, and security software companies are hard at work devising new ways to stop infections be¬¬fore they ever reach your PC. Check our antivirus and security software page regularly for the latest on security products.<br /><strong>4) If it sounds too good to be true... well, you know the rest.</strong><br />No, someone in a faraway land isn't really offering you millions of dollars. No, attractive women from Russia probably aren't seeking you out specifically. No, those aren't magic cure-all pills.<br /><strong>5) Assume that everyone's out to get you.</strong><br />PC security is one area where it pays to be paranoid. Just remember that no security software is fail-safe, and that you're still the one sitting at the keyboard. Assume that no site is safe. And don't automatically trust a link or file download, even if a friend sends it to you.<br /><u><strong><span style="color:#663333;">And a few final thoughts:<br /></span></strong></u><em><strong>From Eric Howes, director of research services for security firm GFI Software:<br /></strong><span style="font-family:georgia;color:#339999;">"The user is always the weak link. Even the best antimalware protection and security patches cannot protect a PC from malware if the user sitting at the keyboard is being irresponsible while surfing the Web."<br /></span><strong>From Roger Thompson, chief research officer, PC security firm AVG:</strong></em><br /><em><span style="font-family:georgia;color:#339999;">"Good software designed to detect this stuff (in our case, LinkScanner) helps, but unfortunately, these are areas where the problem is in relative infancy, and is going to get much worse."</span></em>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-40123254650802103402010-08-16T05:18:00.000-07:002010-08-16T06:00:42.221-07:00INDEPENDENCE DAY SPECIALS<div><strong>The National Flag of India </strong>is a horizontal rectangular tricolour of deep saffron, white and India green; with the Ashoka Chakra, a 24-spoke wheel, in blue at its centre.<img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 410px; DISPLAY: block; HEIGHT: 258px; CURSOR: hand" border="0" alt="" src="http://upload.wikimedia.org/wikipedia/commons/thumb/4/41/Flag_of_India.svg/800px-Flag_of_India.svg.png" /> It was adopted in its present form during a meeting of the Constituent Assembly held on 22 July 1947, when it became the official flag of the Dominion of India. The flag was subsequently retained as that of the Republic of India. In India, the term "tricolour" (Hindi: तिरंगा, Tirangā) almost always refers to the Indian national flag. The flag is based on the Swaraj flag, a flag of the Indian National Congress designed by <span style="color:#006600;">Pingali Venkayya</span>.<br /><br />India was under British rule in the 19th century. A number of flags with varying designs were used in the period preceding the Indian Independence Movement by the rulers of different princely states; the idea of a single Indian flag was first raised by the British rulers of India after the rebellion of 1857,<a href="http://upload.wikimedia.org/wikipedia/commons/thumb/4/4e/Flag_of_Imperial_India.svg/600px-Flag_of_Imperial_India.svg.png"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 366px; FLOAT: right; HEIGHT: 243px; CURSOR: hand" border="0" alt="" src="http://upload.wikimedia.org/wikipedia/commons/thumb/4/4e/Flag_of_Imperial_India.svg/600px-Flag_of_Imperial_India.svg.png" /></a> which resulted in the establishment of direct imperial rule. The first flag, whose design was based on western heraldic standard<a href="http://upload.wikimedia.org/wikipedia/commons/thumb/4/4e/Flag_of_Imperial_India.svg/600px-Flag_of_Imperial_India.svg.png"></a>s, was similar to the flags of other British colonies, including Canada and Australia; the blue banner included the Union Flag in the upper-left quadrant and a Star of India capped by the royal crown in the middle of the right half. To address the question of how the star conveyed "Indianness", Queen Victoria created the Knight Commander of the Order of the Star of India to honour services to the empire by her Indian subjects. Subsequently, all the Indian states received flags with symbols based on the heraldic criteria of Europe.<br />In April 1921, Mohandas Karamchand Gandhi wrote in his journal Young India about the need for an Indian flag, proposing a flag with the charkha or spinning wheel at the centre.The idea of the spinning wheel was put forth by Lala Hansraj, and Gandhi commissioned Venkayya to design a flag with the spinning wheel on a red and green banner, the red colour signifying Hindus and the green standing for Muslims. Gandhi wanted the flag to be presented at the Congress session of 1921, but it was not delivered on time, and another flag was proposed at the session. <a href="http://upload.wikimedia.org/wikipedia/commons/thumb/7/7f/1921_India_flag.svg/800px-1921_India_flag.svg.png"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 406px; FLOAT: right; HEIGHT: 229px; CURSOR: hand" border="0" alt="" src="http://upload.wikimedia.org/wikipedia/commons/thumb/7/7f/1921_India_flag.svg/800px-1921_India_flag.svg.png" /></a>Gandhi later wrote that the delay was fortuitous since it allowed him to realise that other religions were not represented; he then added white to the banner colours, to represent all the other religions. However, soon the Sikhs wanted the banner to include the black colour and Gandhi was forced to address these issues in his writings and speeches. Finally, owing to the religious-political sensibilities, in 1929, Gandhi moved towards a more secular interpretation of the flag colours, stating that red stood for the sacrifices of the people, white for purity, and green for hope.<br /><br />On 13 April 1923, during a procession by local Congress volunteers in Nagpur commemorating the Jallianwala Bagh massacre , the Swaraj flag with the spinning wheel, designed by Venkayya, was hoisted. This event resulted in a confrontation between the Congressmen and the police, after which five people were imprisoned. Over a hundred other protesters continued the flag procession after a meeting. Subsequently, on the first of May, Jamnalal Bajaj, the secretary of the Nagpur Congress Committee, started the Flag Satyagraha, gaining national attention and marking a significant point in the flag movement. The satyagraha, promoted nationally by the Congress, started creating cracks within the organisation in which the Gandhians were highly enthused while the other group, the Swarajists, called it inconsequential. Finally, at the All India Congress Committee meeting in July, at the insistence of Jawaharlal Nehru and Sarojini Naidu, Congress closed ranks and the flag movement was endorsed. The flag movement was managed by Sardar Vallabhbhai Patel with the idea of public processions and flag displays by common people. By the end of the movement, over 1500 people had been arrested across all of British India. <a href="http://upload.wikimedia.org/wikipedia/commons/thumb/5/5a/1931_Flag_of_India.svg/800px-1931_Flag_of_India.svg.png"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 363px; FLOAT: left; HEIGHT: 262px; CURSOR: hand" border="0" alt="" src="http://upload.wikimedia.org/wikipedia/commons/thumb/5/5a/1931_Flag_of_India.svg/800px-1931_Flag_of_India.svg.png" /></a><br />While the flag agitation got its impetus from Gandhi's writings and discourses, the movement received political acceptance following the Nagpur incident. News reports, editorials and letters to editors published in various journals and newspapers of the time attest to the subsequent development of a bond between the flag and the nation. Soon, the concept of preserving the honour of the national flag became an integral component of the freedom struggle. While Muslims were still wary of the Swaraj flag, it gained acceptance among Muslim leaders of the Congress and the Khilafat Movement as the national flag. Detractors of the flag movement, including Motilal Nehru, soon hailed the Swaraj flag as a symbol of national unity. Thus, the flag became a significant structural component of the institution of India. In contrast to the subdued responses of the past, the British Indian government took greater cognisance of the new flag, and began to define a policy of response. The British parliament discussed public use of the flag, and based on directives from England, the British Indian government threatened to withdraw funds from municipalities and local governments that did not prevent the display of the Swaraj flag. The Swaraj flag became the official flag of Congress at the 1931 meeting. However, by then, the flag had already become the symbol of the independence movement.<br />Indian Flag, the first stamp of independent India, released on 21 Nov 1947, was meant for foreign correspondence.[15][16]A few days before India gained its freedom in August 1947, the Constituent Assembly was formed. To select a flag for independent India, on 23 June 1947, the assembly set up an ad hoc committee headed by Rajendra Prasad and including Maulana Abul Kalam Azad, Sarojini Naidu, C. Rajagopalachari, K. M. Munshi and B.R. Ambedkar as its members. On 14 July 1947, the committee recommended that the flag of the Indian National Congress be adopted as the National Flag of India with suitable modifications, so as to make it acceptable to all parties and communities.<br /><br />The spinning wheel of the Congress flag was replaced by the Chakra (wheel) from the Lion Capital of Ashoka. <a href="http://upload.wikimedia.org/wikipedia/commons/d/d7/1947_India_Flag_3%C2%BD_annas.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 326px; FLOAT: left; HEIGHT: 252px; CURSOR: hand" border="0" alt="" src="http://upload.wikimedia.org/wikipedia/commons/d/d7/1947_India_Flag_3%C2%BD_annas.jpg" /></a>According to Sarvepalli Radhakrishnan, the chakra was chosen as it was representative of dharma and law. However, Nehru explained that the change was more practical in nature, as unlike the flag with the spinning wheel, this design would appear symmetrical. Gandhi was not very pleased by the change, but eventually came around to accepting it. The flag was proposed by Nehru at the Constituent Assembly on 22 July 1947 as a horizontal tricolor of deep saffron, white and dark green in equal proportions, with the Ashoka wheel in blue in the centre of the white band. Nehru also presented two flags, one in Khadi-silk and the other in Khadi-cotton, to the assembly. The resolution was approved unanimously.<br />It served as the national flag of the Dominion of India between 15 August 1947 and 26 January 1950, and has served as the flag of the Republic of India since then. </div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-6507071325347022382010-07-12T03:36:00.000-07:002010-07-12T03:41:22.327-07:00From College Campus to Corporate Climate<span id="advenueINTEXT" name="advenueINTEXT"> When the last days of your college life approach and you are about to graduate, the most prominent thought that would be playing on your mind is about getting your first job. While students begin to get nostalgic about their last days at college and stat cherishing the memories of time spent at college, the pre-dominant remains about starting their career. It is the most important stage of life where a completely new beginning awaits you. The fun and carefree time of the college life would be replaced by the responsibility and worries of finding a job. <span style="color: rgb(51, 102, 255);">The friends and the chit-chat with them would soon be replaced by colleagues and professional talk. The college canteen environment would soon be replaced by to-the-point office environment. </span><div id="logphoto" style="padding: 10px 10px 10px 0px; float: left;"> <span id="ad2o"> </span> </div> <br /><br /> So, how do you cope with this transition to get settled in your first job? This is a question that every student encounters when he/she begins the career path. With a little help and advice, you can settle down well at your workplace even without any experience to boast about. You might have to restrain yourself in the beginning but that does not mean that you become a different person. <span style="color: rgb(255, 0, 0);">Your workplace will be the place to shine your personality and hone your existent skills.</span> If you use the opportunities presented at the workplace well, you will really succeed in making a mark on your first job.<br /><br /> At college, you were expecting to absorb knowledge and you spent years doing just that. Tests and exams were conducted every now and then and based on your understanding and knowledge you were judged. At your professional life, you would be expected to put that knowledge to practical use and how well you can do that will define your success at your job. Tests would not be occasional. In fact, everyday would be like a new test and your performance and conduct would be under the scanner each day by your seniors and supervisors. <span style="color: rgb(255, 0, 0);">There may not be any formal exams but you would be working under tight deadlines most of the time and there would be little scope of error as your work would also impact the work of others if you are working in a team. Welcome to your first fresher job. </span><br /><br /> Now, to make the right first impression in your first job and to live up to that impression you would need to pump in a lot of effort initially. A little advice can help you here as you would be na've first. These small tips might sound insignificant but the fact remains that they will go a long way in cementing your position in your first job. These tips are about your general behavior and conduct at office and are not work-specific so they can apply to all fresher jobs across industries.<br /><br /> <span style="color: rgb(255, 0, 0);"> The first golden rule is that you remain punctual.</span> Always arrive at the workplace on time. If you are seen as a latecomer, you might lose initial respect in the eyes of your boss and co-workers. Stick to a fixed lunch hour and do not spend too much time taking breaks. Do not be seen around wasting time on personal calls or just chatting away. <span style="color: rgb(255, 0, 0);">Second ting that you keep in mind is to dress appropriately.</span> If there is a particular dress code at your workplace, follow it strictly. If the dressing sense is relaxed, make sure you still dress up decently and not like you are going to a college. <span style="color: rgb(51, 51, 255);">Don't wear too casual or holiday-mood kind of clothes.</span><br /><br /> <span style="color: rgb(255, 0, 0);">Another important thing that you must remember is that listening is a bigger virtue than speaking.</span> So, listen, listen and still listen more. Don't start throwing in your suggestions and comments till you have fully understood how things work at your office. Learn the rope of the game and observe as much as you can to understand how things have been working so far. If you start suggesting changes from the word go, you might come across as a threat to your fellow workers. So, be mindful of that. <span style="color: rgb(51, 102, 255);">Avoid office gossip and mind your manners and etiquette at all times.</span> Look around for a mentor under whose guidance you can learn and prosper in your career. Be inquisitive and ask questions to learn more. <span style="color: rgb(102, 51, 255);">There is no harm in asking relevant questions.</span> Following these small tips, you will get settled in the corporate culture and get a good head start for yourself. Thus, your first job will become a perfect launch pad for your career. </span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-12980633592919328652010-07-12T03:30:00.000-07:002010-07-12T03:32:52.307-07:00Lack of computer science engineers big challenge for IT<div style="font-weight: bold;" class="VerdanablckAsh12" id="fullnews">Bangalore: The IT sector has been hiring engineers from other engineering disciplines due to lack of computer science engineers in the country and this is probably one of the main hindrances to the growth of the Indian economy. NR Narayana Murthy feels the the growth of the IT sector is getting limited because of this.<br /><br />Infosys hired 20,000 to 22,000 people from non-computer science backgrounds last year. "Today, by and large, majority of the engineering graduates that we take come from non-computer science backgrounds. We have electrical engineers, mechanical engineers and civil engineers. Given that this country is on high economic growth path, we have come to a stage where we should take only computer science people and we don't take away engineers who can build factories, dams and power plants," said Murthy at the tenth Annual Convocation International Institute of Information Technology, Bangalore (IIIT-B). <div id="logphoto" style="padding: 10px 10px 10px 0px; float: left;"> <img src="http://www.siliconindia.com/news/newsimages/Narayana-Murthy2.jpg" width="194" height="287" /><br /> <div style="width: 200px; line-height: 15px;"> <span class="Verdana10Ash999"> </span> </div> </div> <br /><br />Murthy feels that there is a need to chalk out a plan to facilitate opportunities for state governments, the Central government and other inter state institutes to start more institutes which would focus on technical education.<br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-74286634718135909492010-06-16T04:31:00.002-07:002010-08-16T07:56:58.341-07:00INDIA<strong>LANGUAGES:</strong> The northern Indian languages from the Indo-European family evolved from Old Indo-Aryan such as Sanskrit, by way of the Middle Indo-Aryan Prakrit languages and Apabhraṃśa of the Middle Ages. There is no consensus for a specific time where the modern north Indian languages such as Hindi, Bengali, Marathi, Gujarati, Saraiki, Punjabi, Assamese, Sindhi and Oriya emerged, but AD 1000 is commonly accepted. Each language had different influences, with Hindi/Urdu and closely related Hindustani languages being strongly influenced by Persian.<br />The Dravidian languages of South India had a history independent of Sanskrit. The major Dravidian languages are Tamil, Telugu, Kannada and Malayalam. Though Dravidian in origin, over eighty percent of words in Malayalam are pure Sanskrit words. The Austro-Asiatic and Tibeto-Burman languages of North-East India also have long independent histories.<br /><br /><strong>RELIGION AND CULTURE:</strong>India is the birth place of Hinduism, Buddhism, Jainism and Sikhism, collectively known as Indian religions. Indian religions, also known as Dharmic religions are a major form of world religions along with Abrahamic ones. Today, Hinduism and Buddhism are the world's third- and fourth-largest religions respectively, with over 2 billion followers altogether, and possibly as many as 2.5 or 2.6 billion followers. India is also the birthplace for the Sikh, Jain, Lingayat, and Ahmadiyya faiths<br />India is one of the most religiously diverse nations in the world, with some of the most deeply religious societies and cultures. Religion still plays a central and definitive role in the life of most of its people.<br />The religion of 80% of the people is Hinduism. Islam is practiced by around 13% of all Indians. Sikhism, Jainism and especially Buddhism are influential not only in India but across the world. Christianity, Zoroastrianism, Judaism and the Bahá'í Faith are also influential but their numbers are smaller. Despite the strong role of religion in Indian life, atheism and agnostics also have visible influence along with a self-ascribed tolerance to other people.<br /><br />The culture of India has been shaped not only by its long history, unique geography and diverse demography, but also by its ancient heritages, which were formed during the Indus Valley Civilization and evolved further during the Vedic age, rise and decline of Buddhism, the Golden age, invasions from Central Asia, European colonization and the Indian independence movement.India's languages, religions, dance, music, architecture and customs differ from place to place within the country, but nevertheless possess a commonality. The culture of India is an amalgamation of these diverse sub-cultures spread all over the Indian subcontinent and traditions that are several millennia old.<br />Regarded by some historians as the "oldest living civilization of Earth", the Indian tradition dates back to 8,000 BC and has a continuous recorded history for over 2,500 years. Several elements of India's diverse culture — such as Indian religions, yóga and Indian cuisine — have had a profound impact across the world.<br /><br /><strong>GEOGRAPHY:</strong> The country lies to the north of the equator between 8°4' and 37°6' north latitude and 68°7' and 97°25' east longitude. It is the seventh-largest country in the world, with a total land area of 3,287,263 square kilometres (1,269,219 sq mi). India measures 3,214 km (1,997 mi) from north to south and 2,993 km (1,860 mi) from east to west. It has a land frontier of 15,200 km (9,445 mi) and a coastline of 7,517 km (4,671 mi).<br />India is divided into seven physiographic regions. They are<br />The northern mountains(the Himalayas, which includes the Kuen Lun and the Karakoram ranges and the northeast mountain ranges), Indo-Gangetic plains, Thar Desert, Central Highlands and Deccan Plateau, East Coast, West Coast, Bordering seas and islands.<br />India has 28 States and 7 Union Territories. There are total 626 Districts as per list founded on the official webpage of districts of India maintained by Govt of India.<br /><br /><strong>CLIMATE:</strong> The climate of India defies easy generalization, comprising a wide range of weather conditions across a large geographic scale and varied topography. Analyzed according to the Köppen system, India hosts six major climatic subtypes, ranging from desert in the west, to alpine tundra and glaciers in the north, to humid tropical regions supporting rain forests in the southwest and the island territories. Many regions have starkly different micro climates. The nation has four seasons: winter (January and February), summer (March to May), a monsoon (rainy) season (June to September), and a post-monsoon period (October to December).<br /><br /><strong>ECONOMY:</strong> The economy of India is the eleventh largest economy in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). Following strong economic reforms from the socialist inspired economy of a post-independence Indian nation, the country began to develop a fast-paced economic growth, as free market activities initiated in 1990 for international competition and foreign investment. India is an emerging economic power with a very large pool of human and natural resources, and a growing large pool of skilled professionals. Economists predict that by 2020, India will be among the leading economies of the world.<br />The Indian rupee (INR, Hindi:रुपया) is the official currency of India. The issuance of the currency is controlled by the Reserve Bank of India.<br /><br /><strong>FOREIGN RELATIONS AND ARMED FORCES:</strong> India has a long history of collaboration with several countries and is considered a leader of the developing world. India was one of the founding members of several international organizations, most notably the United Nations, the Non-Aligned Movement, the Asian Development Bank and the G20 industrial nations. India has also played an important and influential role in other international organizations like East Asia Summit, World Trade Organization, International Monetary Fund (IMF), G8+5 and IBSA Dialogue Forum. Regional organizations India is a part of include SAARC and BIMSTEC. India has taken part in several UN peacekeeping missions and in 2007, it was the second-largest troop contributor to the United Nations. India is currently seeking a permanent seat in the UN Security Council, along with the G4 nations.<br /><br />The Indian Armed Forces(भारतीय सशस्त्र सेनाएं) are the military forces of the Republic of India encompassing the Indian Army, the Indian Navy, the Indian Air Force and various other inter-service institutions.<br /><br /><strong>LAW AND CONSTITUTION:</strong> Law of India refers to the system of law which presently operates in India. It is largely based on English common law because of the long period of British colonial influence during the period of the British Raj. Much of contemporary Indian law shows substantial European and American influence. Various legislations first introduced by the British are still in effect in their modified forms today. During the drafting of the Indian Constitution, laws from Ireland, the United States, Britain, and France were all synthesized to get a refined set of Indian laws, as it currently stands. Indian laws also adhere to the United Nations guidelines on human rights law and the environmental law. Certain international trade laws, such as those on intellectual property, are also enforced in India.<br /><br />The Constitution of India is the longest written constitution for a country, containing 444 articles, 12 schedules, numerous amendments and 117,369 words. The date 26 January was chosen to commemorate the declaration of independence of 1930. It declares the Union of India to be a sovereign, socialist, secular, democratic republic, assuring its citizens of justice, equality, and liberty and to promote among them all fraternity; the words "socialist", "secular" and "integrity" and to promote among them all "Fraternity"; were added to the definition in 1976 by constitutional amendment. India celebrates the adoption of the constitution on 26 January each year as Republic Day. Dr B. R. Ambedkar , as chairman of the Constitution Drafting Committee, was the chief architect of the Indian Constitution.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8951160622578831211.post-66303361347094817552010-06-16T04:31:00.001-07:002010-07-06T05:14:28.844-07:00Freshers and Job Seeker-Beware of Fraudulent Recruiters<span style="font-family:georgia;color:#990000;"><strong><span style="color:#cc0000;">Hello Friends! Today's post is about Fraudulent Recruiters</span><br /></strong></span>Many of you are exposed to fraud recruiters and some also payed a lot of money and lost it.No one is ready to go with Legal proceedings, as common man is not ready to face the consequences later,i.e,.Enquiry and Such things.I also accept with you. I kindly request you to inform about such frauds to the people in your network,Here you create some Awareness so that they can escape from such.And this chain may continue and help many more friends. <strong><span style="font-family:verdana;color:#666600;">Here are some steps to escape from Frauds-<br /></span><br /><em>1.</em></strong>I kindly request you to <strong>enquire about the emails and offers which was mailed to you</strong>, if asked you to pay some amount to an Account of an individual.If you do not have any IT Employee in your network,ask your distant Friends and even their Relatives to help you.<br /><strong><em>2.</em></strong>The authorized mail from the company will be with the following IDs'<span style="color:#009900;">:"<strong>person/system-name@company/domain-name</strong>."</span><br /><strong><span style="font-size:130%;">Not</span></strong> with<span style="color:#ff0000;">"Companyname@web-MailServiceProvided."</span><br /><strong><em>3.</em></strong>If the mail is not from company site,even if you have applied for the job,<strong>check the company site about the vacancy</strong> and the recruitment details.<br /><br />Some companies mentioned such frauds in their Website.Seeing that, We thought of this post. Here are two examples which we found in our search,<span style="color:#009900;">COMPANY LOGOS THEY USED ARE OF <span id="SPELLING_ERROR_0" class="blsp-spelling-error">MNC's</span> AND WELL REPUTED ONES</span>-<br /><br /><br /><hr /><br /><br />Dear Applicant, This is inform you that your Resume has been short listed from ______.com and after our <span id="SPELLING_ERROR_1" class="blsp-spelling-error">hrd</span> had been short list you in the company ,so read carefully the attachment file .<br />Thank you<br /><span id="SPELLING_ERROR_2" class="blsp-spelling-error">Sonali</span> <span id="SPELLING_ERROR_3" class="blsp-spelling-error">puri</span><br /><span id="SPELLING_ERROR_4" class="blsp-spelling-error">XXXXXXX</span> Company<br /><br /><br /><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 320px; DISPLAY: block; HEIGHT: 255px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5490750133130740418" border="0" alt="" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/TDMQJ6OvwsI/AAAAAAAAAQE/6eBfc4pGrjU/s320/WIPRO1.jpg" /> Here, the Recipient mentioned that-"It says that my profile got selected, without applying for the post. Looks like the so-called-recruiter is desperate to hire people."<br />1.The mail was present in SPAM<br />2.The attachment was a picture,<span id="SPELLING_ERROR_5" class="blsp-spelling-error">JPEG</span> one.<br />3.The email was full of grammatical mistakes.<br /><hr /><br /><br />Dear Candidate,You <span id="SPELLING_ERROR_6" class="blsp-spelling-error">Resumme</span> has been selected by Company <span id="SPELLING_ERROR_7" class="blsp-spelling-error">HRD</span>. Your interview process schedule attached with this email. Kindly see<br />the attached file for more <span id="SPELLING_ERROR_8" class="blsp-spelling-error">detials</span>.<br />Thanks<br />Company <span id="SPELLING_ERROR_9" class="blsp-spelling-error">HRD</span>.<br /><br /><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 176px; DISPLAY: block; HEIGHT: 320px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5490753021095297986" border="0" alt="" src="http://3.bp.blogspot.com/_AhAi67KlM_Y/TDMSyAvJw8I/AAAAAAAAAQM/7lzU1YCHwsc/s320/offer+llatter+hcl.GIF" /><br />Here the Recipient said that he had applied for a vacancy in the company and was waiting.He said-"There are hundreds of incoming SPAM emails everyday,but this one got my attention.I found some peculiarity in the mail."and are mentioned below.<br />1.The mail was present in SPAM<br />2.The attachment was a picture,<span id="SPELLING_ERROR_10" class="blsp-spelling-error">GIF</span> one.<br />3.As you notice, the email was full of grammatical mistakes.<br /><br /><hr /><br />There are some more fraud offer letters, which you can find when you browse.So,Be careful and follow the guidelines which was mentioned above.<br /><br /><p><span style="color:#999900;">As this is a Recession Time,Frauds are Exploiting our weakness(job-search.)<span style="font-size:130%;"><strong>BEWARE OF SUCH FRAUDS<br /></strong></span></span><span style="color:#6600cc;"><strong>ALL THE BEST n we hope a Betterment in your career!</strong></span></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-29317685057738708012010-06-16T03:38:00.000-07:002010-06-16T04:46:33.790-07:00Admission Tips and Entrance test sites<p><strong>For engineering,management,arts,..</strong> such<span style="font-size:130%;"> <em><span style="font-family:courier new;color:#cc66cc;"><strong>Degree and Diploma Courses</strong></span></em></span>, before admissions, students should check whether the college is AICTE Approved one.<br />click- <a href="http://www.aicte-india.org/misapprovedinstitutions.htm" rel="nofollow">LIST of DEGREE colleges in INDIA(including engineering)</a><br />-<a href="http://www.aicte-india.org/misapprovedinstitutionsdiploma.htm" rel="nofollow">LIST of DIPLOMA colleges in INDIA</a></p><p>For <span style="color:#cc66cc;"><span style="font-size:130%;"><span style="font-family:courier new;"><strong><em>medical</em></strong></span> </span></span>check for MCI recognition. Here-<a href="http://mciindia.org/tools/medical_colleges/courses.htm" rel="nofollow">Speciality and Super-speciality Courses(P.G)</a><br />- <a href="http://www.mciindia.org/apps/search/viewRecognized_new.asp?CalledFrom=homepage" rel="nofollow">List of all recognized colleges in INDIA(34 pages)</a></p><p><strong>CATIIM: </strong><a href="http://www.catiim.in/">IIM home</a></p><p><strong>GRE and GMAT: </strong><a href="http://www.mba.com/mba/thegmat">Gmat official site</a><br />-<a href="http://www.ets.org/gre/">Gre Official site</a></p><p><strong>TOEFL: </strong><a href="http://www.ets.org/toefl/">Official Site</a></p><p><strong>COMEDK results:</strong><a href="http://www.comedk.org/">UG & PG courses</a></p><p><strong>AIIMS: </strong><a href="http://www.aiims.edu/aiims/events/exams-results.htm">Results portal</a></p><p><strong>JIPMER: </strong><a href="http://www.jipmer.edu/">Official site</a><br />-<a href="http://www.jipmer.edu/MBBS%20Results%202010-11.pdf">MBBS 2010 entrance exam results</a></p><p><strong>AIEEE: </strong><a href="http://cbseresults.nic.in/aieee/cbseaieee.htm">Results</a></p><p><strong>IIT-JEE: </strong><a href="http://jee.iitm.ac.in/counseling/marks/">Results</a></p><p><strong>GATE: </strong><a href="http://www.gate.iitb.ac.in/gate2010_website/result1.php">Results</a></p><p><strong>EAMCET results:</strong> <a href="http://www.apeamcet.org/viewresults.php" rel="nofollow">EAMCET-2010 results</a><br />click here for <a href="http://www.apeamcet.org/pdfs/Criteria%20for%20Ranking.pdf" rel="nofollow">criteria for ranking</a><br />Congrates to all the students!</p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-42015560325976750982010-05-21T23:47:00.001-07:002010-05-22T07:14:59.147-07:00Speech by Chetan Bhagat at Symbiosis...<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_AhAi67KlM_Y/S_d-EkE8rGI/AAAAAAAAANM/rhlMCTozM2U/s1600/image001.jpg"><span style="font-family:trebuchet ms;"><img style="MARGIN: 0pt 10px 10px 0pt; WIDTH: 220px; FLOAT: left; HEIGHT: 166px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5473982488961133666" border="0" alt="" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/S_d-EkE8rGI/AAAAAAAAANM/rhlMCTozM2U/s320/image001.jpg" /></span></a><span style="font-family:trebuchet ms;"><br /></span><span style="font-family:trebuchet ms;"><span style="COLOR: rgb(51,102,255)">Don't just have career or academic goals. Set goals to give you a balanced, successful life. I use the word balanced before successful. Balanced means ensuring your health, relationships, mental peace are all in good order.<br /><br /></span><span style="COLOR: rgb(51,102,255)">There is no point of getting a promotion on the day of your breakup. There is no fun in driving a car if your back hurts. Shopping is not enjoyable if your mind is full of tensions.</span><br /><br /><span style="COLOR: rgb(51,102,255)">"Life is one of those races in nursery school where you have to run with a marble in a spoon kept in your mouth. If the marble falls, there is no point coming first. Same is with life where health and relationships are the marble. Your striving is only worth it if there is harmony in your life. Else, you may achieve the success, but this spark, this feeling of being excited and alive, will start to die.</span><br /><br /><span style="COLOR: rgb(51,102,255)">One thing about nurturing the spark - don't take life seriously. Life is not meant to be taken seriously, as we are really temporary here. We are like a pre-paid card with limited validity. If we are lucky, we may last another 50 years. And 50 years is just 2,500 weekends. Do we really need to get so worked up?</span><br /><br /><span style="COLOR: rgb(51,102,255)">It's ok, bunk a few classes, scoring low in couple of papers, goof up a few interviews, take leave from work, Enjoy with your friends, fall in love, little fights with your loved Ones. We are people, not programmed devices.</span><br /><br /></span><span style="COLOR: rgb(255,0,0); FONT-WEIGHT: bold"><em><span style="font-family:trebuchet ms;color:#cc0000;">"Don't be serious, be sincere."!</span></em> </span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-40115067200003865042010-05-14T03:15:00.004-07:002010-07-06T06:04:59.750-07:00Programmer Help sites(Useful for you?)<h3><span style="font-size:100%;color:#cc33cc;">JAVA,JAVA Script,HTML</span></h3><p><a href="http://nighthacks.com/roller/jag/">James Gosling Blog</a><br /><a href="http://blogs.sun.com/CoreJavaTechTips/">Core Java Technologies Tech Tips</a><br /><a href="http://blogs.sun.com/JavaFundamentals/">Java Technology Fundamentals</a><br /><a href="http://www.javaworld.com/">Java World</a><br /><a href="http://www.quickit.com/">Quickit</a><br /><a href="http://www.web-source.net/bfm/welcome.ag.php">WebSource.Net</a><br /><a href="http://www.htmlcodetutorial.com/">HTML Tutorials</a><br /><a href="http://java.sun.com/developer/blogs/">SDN Technology Blogs</a> </p><p><span style="color:#993399;">Certified Programmes</span><span style="color:#993399;">:</span> <a href="http://in.sun.com/training/certification/java/scja.xml">Sun Certified Java Associate (SCJA)</a>, <a href="http://in.sun.com/training/certification/java/scjp.xml">Sun Certified Java Programmer (SCJP)</a>, <a href="http://in.sun.com/training/certification/java/scjd.xml">Sun Certified Java Developer (SCJD)</a>, <a href="http://in.sun.com/training/certification/java/scwcd.xml">Sun Certified Web Component Developer (SCWCD)</a>, <a href="http://in.sun.com/training/certification/java/scbcd.xml">Sun Certified Business Component Developer (SCBCD)</a>, <a href="http://in.sun.com/training/certification/java/scdjws.xml">Sun Certified Developer For Java Web Services (SCDJWS)</a>, <a href="http://in.sun.com/training/certification/java/scmad.xml">Sun Certified Mobile Application Developer (SCMAD)</a>, <a href="http://in.sun.com/training/certification/java/scea.xml">Sun Certified Enterprise Architect (SCEA)</a>.<br /><hr /><span style="font-size:100%;color:#cc33cc;"><strong>C,C++</strong></span> <p></p><p><a href="http://codepad.org/">Code Pad</a><br /><a href="http://www.cprogramming.com/">C Programming.com</a><br /><a href="http://www.mycplus.com/">My C-Plus</a><br /><a href="http://www.cplusplus.com/">C-Plus plus</a> <hr /><span style="font-size:100%;color:#cc33cc;"><strong>.NET</strong></span> <p></p><p><a href="http://www.asp.net/get-started">Asp.Net Official Website</a><br /><a href="http://www.vbtutor.net/vbtutor.html">Visual Basics Tutorials</a><br /><a href="http://www.vbdotnetheaven.com/">VB.net Heaven:Free..</a><br /><a href="http://www.csharp-station.com/Default.aspx">C# Station</a><br /><br /><span style="color:#993399;">Certified Programmes:</span><a href="https://mcp.microsoft.com/"><span style="color:#3333ff;">Microsoft Certified Professional</span> </a><hr /><span style="color:#cc33cc;">Others</span><br /><p></p><p><a href="http://www.programmingtutorials.com/">Programming Tutorials</a><br /><a href="http://www.w3schools.com/">W3 Schools</a><br /><br /><span style="color:#993399;">Certified Programmes: <strong><em>ORACLE-</em></strong><a href="http://education.oracle.com/pls/web_prod-plq-dad/db_pages.getpage?page_id=42#1">Data Base</a><span style="color:#000000;">,</span><a href="http://education.oracle.com/pls/web_prod-plq-dad/db_pages.getpage?page_id=42#2">MiddleWare</a><span style="color:#000000;">,</span><a href="http://education.oracle.com/pls/web_prod-plq-dad/db_pages.getpage?page_id=42#3">Applications</a><span style="color:#000000;">,</span><a href="http://education.oracle.com/pls/web_prod-plq-dad/db_pages.getpage?page_id=42#4">Server And Storage Systems</a><span style="color:#000000;">.</span><span style="color:#000000;"></span><br /><strong><em>Object Management Group-</em></strong> </span><span style="color:#3333ff;"><a href="http://www.omg.org/uml-certification/">UML</a><span style="color:#000000;">,</span><a href="http://www.omg.org/ocres/">RealTime And Embeded Specialist(R+E)</a><span style="color:#000000;">,</span><a href="http://www.omg.org/oceb/">BPM</a><span style="color:#000000;">,</span><a href="http://www.omg.org/ocsmp/index.htm">System Modelling Professional</a><span style="color:#000000;">.</span></span><br /><span style="color:#993399;"><strong><em>Software Testing-</em></strong><span style="color:#3333ff;"><a href="http://www.testinginstitute.com/cstp.php">Certified Software Testing Professional</a><span style="color:#000000;">,</span><a href="http://www.testinginstitute.com/ctm.php">Certified Test Manger</a></span><span style="color:#000000;">.<br /></span><span style="color:#3333ff;"></p></span><h4><p></p><p><em><span style="color:#cc33cc;"><span style="font-size:85%;">There are many more websites which are much more useful.But For CONVENIENCE, we are not able to specify them all. Hope these may help you. <span style="color:#663366;">ALL THE BEST..!</span></span></span></em></p><span style="font-family:courier new;font-size:85%;"><span style="color:#cc0000;">NOTE:</span>Please Comment our Posts for precision.THANK YOU!</span><br /></h4><br /></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-63428279472570439142010-05-14T03:15:00.003-07:002010-05-22T07:08:14.139-07:00Forbes list of billionaires<a href="http://1.bp.blogspot.com/_AhAi67KlM_Y/S_fk55mo1qI/AAAAAAAAAN8/5MThkI2E_OQ/s1600/billi.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 207px; height: 320px;" src="http://1.bp.blogspot.com/_AhAi67KlM_Y/S_fk55mo1qI/AAAAAAAAAN8/5MThkI2E_OQ/s320/billi.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5474095555458684578" /></a><br /><h4><br /><font color="violet">Details..</font><br /></h4><br /><b>#1 Carlos Slim Helu</b><br />$53.5 billion<br />Telecom, Mexico.<br />Telecom tycoon who pounced on privatization of Mexico's national telephone company in the 1990s becomes world's richest person for first time after coming in third place last year. Net worth up $18.5 billion in a year. Recently received regulatory approval to merge his fixed-line assets into American Movil, Latin America's biggest mobile phone company.<br /><br /><B>#2 Bill Gates</B><br />$53 billion<br />Microsoft, U.S.<br />Software visionary is now the world's second-richest man. Net worth still up $13 billion in a year as Microsoft shares rose 50% in 12 months, value of investment vehicle Cascade swelled. More than 60% of fortune held outside Microsoft; investments include Four Seasons hotels, Televisa, Auto Nation. Stepped down from day-to-day duties at Microsoft in 2008 to focus on philanthropy.<br /><br /><b>#3 Warren Buffett</b><br />$47 billion<br />Investments, U.S. <br />America's favorite investor up $10 billion in past 12 months on surging Berkshire Hathaway shares; says U.S. has survived economic "Pearl Harbor," but warns recovery will be slow. Shrewdly invested $5 billion in Goldman Sachs and $3 billion in General Electric amid 2008 market collapse. Recently acquired railroad giant Burlington Northern Santa Fe for $26 billion. <br /><br /><b>#4 Mukesh Ambani</b><br />$29 billion<br />Petrochemicals, oil and gas. India.<br />Global ambitions: His Reliance Industries, already India's most valuable company, recently bid $2 billion for 65% stake in troubled Canadian oil sands outfit Value Creations. Firm's $14.5 billion offer to buy bankrupt petrochemicals maker LyondellBasell was rejected. Since September company has sold Treasury shares worth $2 billion to be used for acquisitions. Late father, Dhirubhai, founded Reliance and built it into a massive conglomerate. <br /><br /><b>#5 Lakshmi Mittal</b><br />$28.7 billion<br />Steel, India.<br />London's richest resident oversees ArcelorMittal, world's largest steel maker. Net profits fell 75% in 2009. Mittal took 12% pay cut but improved outlook pushed stock up one-third in past year. Looking to expand in his native India; wants to build steel mills in Jharkhad and Orissa but has not received government approval. Earned $1.1 billion for selling his interest in a Kazakh refinery in December<br /><br /><b>#6 Lawrence Ellison</b><br />$28 billion<br />Oracle, U.S.<br />Oracle founder's fortune continues to soar; shares up 70% in past 12 months. Database giant has bought 57 companies in the past five years. Completed $7.4 billion buyout of Sun Microsystems in January; acquired BEA Systems for $8.5 billion in 2008. Studied physics at U. of Chicago; didn't graduate. Started Oracle 1977; took public a day before Microsoft in 1986.<br /><br /><b>#7 Bernard Arnault</b><br />$27.5 billion<br />Luxury goods, France.<br />Bling is back, helping fashion icon grab title of richest European as shares of his luxury goods outfit LVMH--maker of Louis Vuitton, Moet & Chandon--surge 57%. LVMH is developing upscale Shanghai commercial property, L'Avenue Shanghai, with Macau billionaire Stanley Ho.<br /><br /><b>#8 Eike Batista</b><br />$27 billion<br />Mining, oil. Brazil.<br />Vowing to become world's richest man--and he may be on his way. This year's biggest gainer added $19.5 billion to his personal balance sheet. Son of Brazil's revered former mining minister who presided over mining giant Companhia Vale do Rio Doce got his start in gold trading and mining.<br /><br /><b>#9 Amancio Ortega</b><br />$25 billion<br />Fashion retail, Spain.<br />Style maven lords over Inditex; fashion firm, which operates under several brand names including Zara, Massimo Dutti and Stradivarius, has 4,500 stores in 73 countries including new spots in Mexico and Syria. Set up joint venture with Tata Group subsidiary to enter India in 2010. Betting on Florida real estate: bought Coral Gables office tower that is currently home to Bacardi USA.<br /><br /><b>#10 Karl Albrecht</b><br />$23.5 billion<br />Supermarkets, Germany.<br />Owns discount supermarket giant Aldi Sud, one of Germany's (and Europe's) dominant grocers. Has 1,000 stores in U.S. across 29 states. Estimated sales: $37 billion. Plans to open New York City store this year. With younger brother, Theo, transformed mother's corner grocery store into Aldi after World War II. Brothers split ownership in 1961; Karl took the stores in southern Germany, plus the rights to the brand in the U.K., Australia and the U.S. Theo got northern Germany and the rest of Europe.<br /><br /><b>#11 Ingvar Kamprad & family</b><br />$23 billion<br />Ikea, Sweden.<br />Ikea's reputation under fire. In Russia company fired two top managers for allowing bribes to a power supplier. In France firm is facing an extended workers' strike. A former managing director has published a book exposing questionable ethics. Even Kamprad's frugal image is being questioned, as details of a fancier life (he reportedly drives a Porsche) emerge. Still, no one can question his success. <br /><br /><b>#12 Christy Walton & family</b><br />$22.5 billion<br />Wal-Mart, U.S.<br />World's largest retailer benefited as cash-strapped shoppers looked to discount merchandise at start of economic slump. Boost may have waned; recently reported 1.6% decline in same-store sales in its U.S. Wal-Mart and Sam's Club stores, warned of soft sales in current quarter. Still, shares are up 7% in past 12 months and family fortune rose a combined $13 billion, largely recovering losses from market crash.<br /><br /><b>#13 Stefan Persson</b><br />$22.4 billion<br />H&M, Sweden.<br />"Cheap chic" mogul is chairman of Hennes & Mauritz (H&M); promoted son, Karl-Johan, 34, to chief executive in July. Retailer is known for bringing on big names like Karl Lagerfeld, Stella McCartney to design affordable collections for its 1,900 stores. Continuing its designer collaborations with new shoe line with Jimmy Choo that debuted in November and knitwear line with Sonia Rykiel.<br /><br /><b>#14 Li Ka-shing</b><br />$21 billion<br />Diversified, Hong Kong.<br />Betting on recovery, upped stakes in publicly traded conglomerates Cheung Kong and Hutchison Whampoa. Through HW, Li is world's largest operator of container terminals, world's largest health and beauty retailer by number of outlets, a major supplier of electricity to Hong Kong and a real estate developer. Has a large holding in Canadian oil firm Husky Energy, which recently announced its third discovery in South China Sea. Asia's most generous individual has given out $1.4 billion to education, medical research.<br /><br /><b>#15 Jim C. Walton</b><br />$20.7 billion<br />Wal-Mart, U.S.<br />Sam Walton started as J.C. Penney clerk. Opened Benjamin Franklin five-and-dime in 1945; lost lease five years later. Founded Bentonville, Ark., general store with brother James in 1962. Today Walmart has $405 billion in annual sales, 2 million employees, more than 8,400 stores. Jim runs family's Arvest bank.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-46249574369658413302010-05-14T03:15:00.001-07:002010-05-20T05:24:09.195-07:00Operating systems<p><b>An operating system</b> is the software on a computer that manages the way different programs use its hardware, and regulates the ways that a user controls the computer.Operating systems are found on almost any device that contains a computer with multiple programs—from cellular phones and video game consoles to supercomputers and web servers.</p><br /><p>Operating systems can be categorized by technology, ownership, licensing, working state, usage, and by many other characteristics. In practice, many of these groupings may overlap.<br />Here is a link to the <b><a href="https://spreadsheets.google.com/ccc?key=0AlV5NfIGBLDNdGYzRkJGa3MwUlI4Rzd3X05oNnVHUmc&hl=en">List Of Operating systems</a></b></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-90375261296577632202010-05-12T07:11:00.000-07:002010-05-12T07:52:09.261-07:00The numbers<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_AhAi67KlM_Y/S-q3hO6BD9I/AAAAAAAAAK0/btA0EX1guos/s1600/image001.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 231px;" src="http://2.bp.blogspot.com/_AhAi67KlM_Y/S-q3hO6BD9I/AAAAAAAAAK0/btA0EX1guos/s320/image001.jpg" alt="" id="BLOGGER_PHOTO_ID_5470386478959890386" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_AhAi67KlM_Y/S-q3hWSOxfI/AAAAAAAAAK8/lciq5W4OLHI/s1600/image002.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 234px;" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/S-q3hWSOxfI/AAAAAAAAAK8/lciq5W4OLHI/s320/image002.jpg" alt="" id="BLOGGER_PHOTO_ID_5470386480940500466" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_AhAi67KlM_Y/S-q3holOiqI/AAAAAAAAALE/KlSt_gCd0Pg/s1600/image003.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 235px;" src="http://1.bp.blogspot.com/_AhAi67KlM_Y/S-q3holOiqI/AAAAAAAAALE/KlSt_gCd0Pg/s320/image003.jpg" alt="" id="BLOGGER_PHOTO_ID_5470386485852015266" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_AhAi67KlM_Y/S-q3iIqj1lI/AAAAAAAAALM/zFvDv-Qi2Og/s1600/image004.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 235px;" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/S-q3iIqj1lI/AAAAAAAAALM/zFvDv-Qi2Og/s320/image004.jpg" alt="" id="BLOGGER_PHOTO_ID_5470386494464317010" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_AhAi67KlM_Y/S-q3iefA3vI/AAAAAAAAALU/y2VnJbE69wE/s1600/image005.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 234px;" src="http://2.bp.blogspot.com/_AhAi67KlM_Y/S-q3iefA3vI/AAAAAAAAALU/y2VnJbE69wE/s320/image005.jpg" alt="" id="BLOGGER_PHOTO_ID_5470386500321468146" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_AhAi67KlM_Y/S-q6lJ-k_5I/AAAAAAAAAL8/xBOSUVbiyR0/s1600/image006.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 234px;" src="http://1.bp.blogspot.com/_AhAi67KlM_Y/S-q6lJ-k_5I/AAAAAAAAAL8/xBOSUVbiyR0/s320/image006.jpg" alt="" id="BLOGGER_PHOTO_ID_5470389844891205522" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_AhAi67KlM_Y/S-q6k5h9dUI/AAAAAAAAAL0/XOgQyk3-vi8/s1600/image007.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 235px;" src="http://1.bp.blogspot.com/_AhAi67KlM_Y/S-q6k5h9dUI/AAAAAAAAAL0/XOgQyk3-vi8/s320/image007.jpg" alt="" id="BLOGGER_PHOTO_ID_5470389840476206402" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_AhAi67KlM_Y/S-q6ksEIRbI/AAAAAAAAALs/tUivyBq3fCs/s1600/image008.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 234px;" src="http://3.bp.blogspot.com/_AhAi67KlM_Y/S-q6ksEIRbI/AAAAAAAAALs/tUivyBq3fCs/s320/image008.jpg" alt="" id="BLOGGER_PHOTO_ID_5470389836861425074" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_AhAi67KlM_Y/S-q9sNKSENI/AAAAAAAAAMc/bIMnaK-YDeY/s1600/image009.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 234px;" src="http://3.bp.blogspot.com/_AhAi67KlM_Y/S-q9sNKSENI/AAAAAAAAAMc/bIMnaK-YDeY/s320/image009.jpg" alt="" id="BLOGGER_PHOTO_ID_5470393264539570386" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_AhAi67KlM_Y/S-q9sylZPfI/AAAAAAAAAMk/0S687e9it_o/s1600/image010.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 234px;" src="http://1.bp.blogspot.com/_AhAi67KlM_Y/S-q9sylZPfI/AAAAAAAAAMk/0S687e9it_o/s320/image010.jpg" alt="" id="BLOGGER_PHOTO_ID_5470393274585398770" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_AhAi67KlM_Y/S-q9tAY1JvI/AAAAAAAAAMs/d_iSLAEBbsA/s1600/image011.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 235px;" src="http://2.bp.blogspot.com/_AhAi67KlM_Y/S-q9tAY1JvI/AAAAAAAAAMs/d_iSLAEBbsA/s320/image011.jpg" alt="" id="BLOGGER_PHOTO_ID_5470393278290798322" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_AhAi67KlM_Y/S-q9tjHjNnI/AAAAAAAAAM0/kU9HVjhYL8Y/s1600/image012.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 235px;" src="http://2.bp.blogspot.com/_AhAi67KlM_Y/S-q9tjHjNnI/AAAAAAAAAM0/kU9HVjhYL8Y/s320/image012.jpg" alt="" id="BLOGGER_PHOTO_ID_5470393287613560434" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_AhAi67KlM_Y/S-rAfD5rgzI/AAAAAAAAAM8/0jEgNbldvhw/s1600/image013.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 234px;" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/S-rAfD5rgzI/AAAAAAAAAM8/0jEgNbldvhw/s320/image013.jpg" alt="" id="BLOGGER_PHOTO_ID_5470396337250599730" border="0" /></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-20739086339413949502010-05-11T06:18:00.000-07:002010-05-11T07:47:15.449-07:00Erasing Your Digital Tracks on the Web<h3>We routinely enter personal information at various sites on the Web--and the Internet never forgets. Here are some sound ways to take your data back.</h3><br />The Internet never forgets. Search engines crawl and index every last byte of information available on the Web;<a href="http://3.bp.blogspot.com/_6Zs9wWKgyoc/SZlrUT9aVFI/AAAAAAAABPw/UKNOwt3LEdU/s320/keyhole-742659.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 300px; FLOAT: left; HEIGHT: 300px; CURSOR: hand" border="0" alt="" src="http://3.bp.blogspot.com/_6Zs9wWKgyoc/SZlrUT9aVFI/AAAAAAAABPw/UKNOwt3LEdU/s320/keyhole-742659.jpg" /></a> and once a piece of information goes online, some digital echo of it is virtually guaranteed to persist on a server somewhere.<br />We visit sites and create profiles throughout the Internet, often at sites that we don't even like and have no intention of ever visiting again. As if that's not enough, all kinds of data and details of our lives are in the public domain--cataloged, indexed, and only a quick Google search away.<br /><b>User Agreements and Privacy Statements</b><br />Luckily for you, Websites and virtually every company and government agency in the world have user agreements and privacy statements that explain exactly what the business or entity may and may not do with your sensitive, private details.<br />Almost half a billion people are members of Facebook, and you may very well be one of them. But have you read the Facebook Privacy Policy? If you're like most people, the answer is no, in which case you may be only vaguely (or not at all) aware of what that policy's mind-numbing text says with regard to the myriad ways that Facebook may share your information with other parties.<br />A lot of information is simply public domain--name, address, home value, criminal record, and more. Data that lies in the public domain was available before the advent of the Internet and the Web, but these technologies have made it exponentially easier to find. An answer that would have taken hours of manual sifting through documents to find now takes a Google search only seconds to produce.<br />Most Websites are up-front with users regarding their privacy and data-handling policies, but most users never take the time to read those policies and accept the sites' terms and conditions without a second thought. No wonder people seem surprised when they learn that their data is out in the open for all to see.<br /><b>Skeletons in Your Internet Closet</b><br />Have you ever googled yourself--that is, run a search for your own name on Google or any other search engine to see what information the Web has on the subject of you? Sites such as WhitePages.com, BeenVerified.com, and PublicRecords.com are all in the business of providing basic background checks based on the volumes of publicly available data stored online. A quick search for your name on WhitePages.com can reveal your home address, your home phone number, your age--within a certain range--and the names of other people who live in your home or are related to you.<br /><b>Who Owns Your Data?</b><br />The fundamental question--according to Linda Criddle, president of the Safe Internet Alliance--is, who owns your information? "We have to get the mindset to change, to say that consumers own their information. Whatever I choose to share with a given Website is granted under stewardship, but I can rescind that access at my discretion," Criddle says.<br />But even if that mindset existed today, the trick would still be how to successfully rescind access to data that has been shared and transmitted around the globe to social networking contacts, partner sites, and the general public.<br />You can't completely erase your digital identity, but you can take steps to clean it up and to assert your right to protect your privacy. The first thing you should do is to keep track of the various sites and profiles you have created on the Internet and to remove any you are no longer using.<br /><b>Your Facebook and Google Data</b><br />If you don't approve of the way Facebook manages or protects your data, you can delete your Facebook account.<a href="http://popularbiographies.files.wordpress.com/2010/04/mark-zuckerberg-facebook.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 512px; FLOAT: left; HEIGHT: 310px; CURSOR: hand" border="0" alt="" src="http://popularbiographies.files.wordpress.com/2010/04/mark-zuckerberg-facebook.jpg" /></a> However, Facebook's privacy policy explains that even if you take this action, various data footprints will remain. According to Facebook's privacy policy, third-party providers with whom you have shared information are authorized to retain that information according to the terms of the agreement with Facebook.<br />You do have some control, though. Tools like the Google Dashboard enable you to see and edit--or remove--information about you that various Google sites and services may be storing. The Google Dashboard provides links that jump you to the right places to manage <a href="http://www.labnol.org/wp/images/2008/02/google-accounts.gif"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 197px; FLOAT: left; HEIGHT: 209px; CURSOR: hand" border="0" alt="" src="http://www.labnol.org/wp/images/2008/02/google-accounts.gif" /></a> the privacy settings at different services--and your presence on each one.<br />Google provides links and resources that you can use to remove a page or site from Google search results, to remove specific content, or to report copyright infringement. Google also points out, however, that whatever content or Website page you want removed must also be removed from the Web or blocked from future indexing; otherwise, it will just end up back in Google's database.<br /><b>Your Data at Public Records Sites</b><br />WhitePages.com provides a link that you can click to edit the information it reports about you. In order to do so, however, you must first register with WhitePages.com. You can authenticate with WhitePages.com by using your Yahoo, Google, or WindowsLive ID profiles. It makes sense on some level: WhitePages.com needs to have some way of authenticating that you are who you say you are before allowing you to modify the information.<br />When you remove your entry, WhitePages.com warns that the data may not disappear right away (though it should within 24 hours), and it offers this additional note similar to Google's: "We take steps to block the re-publication of listing information once it has been removed. However, we continually publish new information from publicly available sources and third-party data suppliers."<br /><b>Erase Your Tweets</b><br />If you have posted tweets on Twitter that you'd rather not leave as a deathless gift to posterity on the Internet, you'll be relieved to know that the site permits you to delete off<a href="http://a3.twimg.com/profile_images/309568817/twitwipe-logo_avatar_bigger.png"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 73px; FLOAT: right; HEIGHT: 73px; CURSOR: hand" border="0" alt="" src="http://a3.twimg.com/profile_images/309568817/twitwipe-logo_avatar_bigger.png" /></a>ending tweets--albeit one at a time. If you have lots of unwanted tweets to deal with, you might be tempted to abandon the offending Twitter account and start fresh with a new one, but in that case the tweets would remain where you left them. Another option is to use a tool such as TwitWipe to wipe away your entire tweet history, while retaining your same Twitter account, authentication information, and third-party app connections.<br /><b>Conducting a Privacy Audit</b><br />The best way to start reducing online exposure of information about you is to run a background check on yourself. See what Google or WhitePages.com or BeenVerified.com have to say about you. Once you've done that, you should begin taking steps to clean up incorrect information or lingering skeletons.<br />If possible, locate the original source of the information--the site or service where your personal data first appeared--and remove it there, rather hopscotching through the numerous sites that may simply be reposting it. Either correct inaccurate information associated with your name (and with the various profiles you have on the Web) or simply delete those profiles entirely.<br />If you run into resistance when trying to deal with these sites, you can turn to organizations such as the Electronic Frontier Foundation and Chilling Effects for assistance. To prevent your information from being exposed on the Internet in the first place, use tools like the InPrivate browsing feature of Internet Explorer 8, or resort to proxy services such as Anonymizer or Hide My Ass to shield your personal data.<br />Tony Bradley is co-author of Unified Communications for Dummies. He tweets as @Tony_BradleyPCW. You can follow him on his Facebook page, or contact him by e-mail at <a href="mailto:tony_bradley@pcworld.com">tony_bradley@pcworld.com</a>.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-8951160622578831211.post-66637345975090854922010-05-10T07:48:00.000-07:002010-05-13T01:05:54.243-07:00Google's New Search Bar: An Unwelcome Change<div>Imagine my surprise last night when Google searches suddenly seemed more Bing-like, thanks to a navigation bar running along the left side of the screen.In case you haven't noticed or heard, Google is rolling out what it calls "contextually relevant, left-hand navigation," defining a new look for Google search. Inside the nav bar<br /><div><a href="http://chandrakantha.com/articles/indian_music/filmi_sangeet/media/1998_google2.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 425px; FLOAT: left; HEIGHT: 300px; CURSOR: hand" border="0" alt="" src="http://chandrakantha.com/articles/indian_music/filmi_sangeet/media/1998_google2.jpg" /></a> are links to other services such as Maps and Book Search, related search queries and additional tools for narrowing your results.<br />I don't like it. Maybe I'm just resistant to change, but the new search results immediately struck me as claustrophobic. I tried to find a way to bring back the old Google, but to no avail.(click on image to enlarge)<br />Technically, the addition of a nav bar doesn't take anything away from the main field of results. All you're losing is a bunch of unused white space. But cluttering the interface is not only redundant -- you'll find links to some of the same services at the top of the page, where they've always been - it's decidedly un-Google.<br />Until now, Google's search changes have been subtle. A map here, a little indent for news results there, a suggestion at the top of the screen to correct spelling or other errors. These <a href="http://4.bp.blogspot.com/_AhAi67KlM_Y/S-uyypKkZ0I/AAAAAAAAANE/v3sYRWRZ5IY/s1600/g.JPG"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 293px; FLOAT: left; HEIGHT: 320px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5470662755484985154" border="0" alt="" src="http://4.bp.blogspot.com/_AhAi67KlM_Y/S-uyypKkZ0I/AAAAAAAAANE/v3sYRWRZ5IY/s320/g.JPG" /></a>additions work because they're like mind readers, predicting the kind of information you want and placing it right in the search stream. By comparison, the nav bar is a distraction, drawing you away from the main search field where the good stuff is happening.<br />On that note, the nav bar results aren't even that helpful. The "video" button links to Google Video instead of YouTube. You're offered to search within a specific time period, such as "Latest" or "Past 24 hours," but there's no clear logic for how Google chooses its date ranges for each search. Related search queries are equally confusing: If I'm <a href="http://www.dofufa.info/wp-content/uploads/2009/12/chrome_google_ui_3.png"></a>searching for "Seinfeld," what are the odds that I'm also interested in searching for "Everybody Loves Raymond" and "Frasier?" Apparently Google thinks the probability is high.<br />The puzzling thing about Google's new look is that it riffs on Bing's navigation bar, but even Microsoft has admitted that people often ignore this feature of Bing. That's why Bing is playing around with tabs at the top of search results, leading people to Maps, Weather and other related sections of the site.<br />So basically, Bing's copying a feature that works quite well for Google, while Google is copying a feature that didn't work for Bing. If Google doesn't ditch the nav bar, I hope they at least let users revert back to what wasn't broken and didn't need fixing.</div></div>Unknownnoreply@blogger.com0