Build a stunning handcrafted website with IT Acumens

Main Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Topics - manimarank

Chat Box / Quiz : Backup & recovery
Nov 20, 2008, 07:20 PM
Quiz : Backup & recovery

Question #31

This is a method of offloading backup procedures from a server so that the time ordinarily devoted to backup functions can be used to carry out other server tasks.

a. serverless backup
b. LAN-free backup
c. mirrored backup
d. timed backup
e. hard backup

Click to see if you are correct.

Question #32

This is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.

a. EDM (Electronic Document Management)
b. COLD (Computer Output to Laser Disk)
c. imaging system
d. compression
e. microfiche

Click to see if you are correct.

Question #33

This is a magnetic tape and drive system used for computer data storage and archiving. It can hold 40 gigabytes (GB) of data when compression is used, and can transfer data at speeds of up to 3 megabytes per second (Mbps) without compression and 6 Mbps with compression.

a. Mammoth
b. advanced intelligent tape (AIT)
c. linear tape-open (LTO)
d. digital linear tape (DLT)
e. REO speedwagon (REO)

Click to see if you are correct.

Question #34

This is a way of recording information onto magnetic tape. It was used to record TV programs in the 1960s, and has been used in high-end tape-backup products. It's also the same technology used in digital audio tapes.

a. quadruplex machine
b. linear
c. optical
d. helical scan
e. Vera (Vision Electronic Recording Apparatus)

Click to see if you are correct.

Question #35

This data replication technique ensures data integrity because updates to directories and bitmaps are constantly written to a serial log on disk before the original disk log is updated. In the event of a system failure, the data on the disk can be restored to its pre-crash configuration.

a. warehousing
b. scoreboarding
c. journaling
d. mining
e. cloning

Click to see if you are correct.

Question #36 expert W. Curtis Preston identifies six main steps to identifying any good disaster recovery plan. Which of the following is not one of them?

a. define unacceptable loss
b. watch your server speed
c. organize everything
d. document what you have
e. test test test

Click to see if you are correct.

Question #37

Backup and recovery expert W. Curtis Preston says there are five golden rules for backup. Which of the following is not one of these rules?

a. Back it up or give it up.
b. If it has not been backed up, it cannot be recovered.
c. If it has not been backed up off-site, it will not survive a fire.
d. If it has not been tested with a recovery, it is not a backup.
e. Tape rules -- it's the only way to go for backup.

Click to see if you are correct.

Question #38

Disk mirroring provides data protection in the case of disk failure because data is constantly updated to both disks, where each relies upon a common controller. However, there is an inherent problem in disk mirroring. What is it?

a. Drive reliability is eliminating the need for mirroring
b. Access to data is threatened if the controller fails
c. Data can't be mirrored remotely
d. Mirroring can't handle planned outages
e. Data sets can't be kept in synch

Click to see if you are correct.

Question #39

This is one method of ensuring data availability in which every write written to the primary side is written "in-order" to the remote side before the application sees an "I/O complete" message.

a. timed backup
b. local backup
c. synchronous replication
d. asynchronous replication
e. duplication

Click to see if you are correct.

Question #40

Which of the following is a disaster recovery don't?

a. Always back up data catalogs and directories
b. Run similarly designed backup and storage environments
c. Synchronize desktop and laptop data to the server
d. Place backup facilities near each other
e. Have monitoring, job execution and security features prepared
Chat Box / Are you a Know-IT-All?
Nov 20, 2008, 11:17 AM
In 1968, what computer code did President Lyndon Johnson approve as a national standard?
Chat Box / QUIZ:"Storage"
Nov 15, 2008, 11:33 AM
Data storage technologies quiz

Sit down, grab a pencil and some paper, and list what you think are the top 10 data storage technologies of 2006. Then, take our quick quiz to see how many match up to our top 10 picks. 1. Sometimes called oversubscription, this is a way to quickly get capacity to an application.

2. This is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console.

3. This technology can be used to protect data in flight across a network and at rest on tape in the data center.

4. This is an alternative to the Fibre Channel framework of the traditional SAN.

5. This is an architecture and specification for data flow between processors and I/O devices that promises greater bandwidth and almost unlimited expandability.

6. This is a storage technology that makes it possible to access a remote data center as though it were local.

7. This technology makes data retrieval straightforward by storing it in such a way that an object cannot be duplicated or modified once it has been stored; thus, its location is unambiguous.

8. This is a storage system in which all the data in an enterprise is backed up whenever any change is made.

9. This is sometimes called data reduction or commonality factoring and is another space-saving technology intended to eliminate redundant files on a storage system.

10. This technology is the assignment of different categories of data to different types of storage media in order to reduce total storage cost.

How did you score?
9-10 correct: You're a real hot techie tamale
6-8 correct: You're hot tech talented for sure
3-5 correct: You've got hot tech troubles
0-2 correct: Ho hum, just a tech tadpole
Chat Box / Quiz: Compliance
Nov 14, 2008, 12:04 PM
Quiz: Compliance

1. This job title describes a corporate official in charge of overseeing and managing compliance issues within an organization.
What is it?

2. This is legislation enacted in response to the high-profile Enron and WorldCom financial Removed to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise.
What is it?

3. This is legislation enacted in the United States that places restrictions on unsolicited bulk mail (UBE), such as requiring valid sender contact information and opt-out mechanisms.
What is it?

4. This is a state of accordance with established standards, specifications, or legislation.
What is it?

5. This is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure that facilities processing classified or other sensitive material are using trusted computer systems and components.
What is it?

6. This is legislation with two sections: Title I deals with protecting health insurance coverage for people who lose or change jobs; Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems (IT industry references are usually about HIPPA Title II).
What is it?

7. This is an organization that represents the music recording industry's intellectual property rights.
What is it?

8. This is legislation designed to stimulate competition that specifies: how local telephone carriers can compete; how and under what circumstances local exchange carriers (LEC) can provide long-distance services; and the deregulation of cable TV rates.
What is it?

9. This is a registry of phone numbers in the United States that telemarketers are prohibited from calling in most circumstances.
What is it?

10. This is an international organization made up of companies using or manufacturing DVD-related products.
What is it?
Chat Box / quiz:"Business Intelligence"
Nov 14, 2008, 12:00 PM
Quiz: Business Intelligence

1. This is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.
a. customer managed relationship
b. data mining
c. permission marketing
d. one-to-one marketing
e. batch processing

2. In an Internet context, this is the practice of tailoring Web pages to individual users' characteristics or preferences.
a. Web services
b. customer-facing
c. client/server
d. customer valuation
e. personalization

3. This is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
a. clickstream analysis
b. database marketing
c. customer relationship management
d. CRM analytics
e. B2C

4. This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions.
a. best practice
b. data mart
c. business information warehouse
d. business intelligence
e. business warehouse

5. This is a systematic approach to the gathering, consolidation, and processing of consumer data (both for customers and potential customers) that is maintained in a company's databases.
a. database marketing
b. marketing encyclopedia
c. application integration
d. service oriented integration
e. business technology management

6. This is an arrangement in which a company outsources some or all of its customer relationship management functions to an application service provider (ASP).
a. spend management
b. supplier relationship management
c. hosted CRM
d. Customer Information Control System
e. online transaction processing

7. This is an XML-based metalanguage developed by the Business Process Management Initiative (BPMI) as a means of modeling business processes, much as XML is, itself, a metalanguage with the ability to model enterprise data.
a. BizTalk
c. e-biz
d. ebXML
e. ECB

8. This is a central point in an enterprise from which all customer contacts are managed.
a. contact center
b. help system
c. multichannel marketing
d. call center
e. help desk

9. This is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests, spending habits, and so on.
a. customer service chat
b. customer managed relationship
c. customer life cycle
d. customer segmentation
e. change management

10. In data mining, this is a technique used to predict future behavior and anticipate the consequences of change.
a. predictive technology
b. disaster recovery
c. phase change
d. Digital Silhouettes
e. predictive modeling
Chat Box / quiz: "Messaging and E-Mail"
Nov 14, 2008, 11:46 AM
Email marketing quiz

Take the quiz:

1. This is a technique used by legitimate marketers to customize email offerings for specific customers.

Read the answer about marketing technique

2. Used by spammers to make recipients think an email message came from someone other than them, this technique might convince a user that a spam email came from someone they'd actually like to hear from.

Read the answer on spam email

3. This is the term for an email message returned to the sender by the recipient's server as undeliverable, often because the email is -- rightly or wrongly -- determined to be spam.

Read the answer on returned emails

4. A type of Web-based marketing, this type of email allows recipients to buy goods and services directly from an email message, without being redirected to the retailer's Web site.

Read the answer on email purchases

5. This self-explanatory term is a more formal way of saying "spam."

Read the answer on spam email

6. This is a term for the number of times that users click on links in a message or on a Web site -- it's much higher for legitimate marketing emails than for spam.

Read the answer on email links

7. This is a program used to detect unwanted messages. A frequent problem is that they may also prevent delivery of some legitimate email marketing messages.

Read the answer on email programs

8. In this type of email campaign, advertisements are sent to targeted groups of customers.

Read the answer on email campaigns

9. Also known as permission-based email, this is one proposed requirement for marketers that could greatly decrease the amount of spam.

Read the answer on permission-based emails

10. Never used by legitimate marketers, this is a type of program that a spammer uses to troll the Internet seeking email addresses.
Gift / Prizes Request / Top up Request
Nov 13, 2008, 08:54 PM
User Name : manimarank
Date  : 13 nov 08
Status : normal
Postcount : 84
Information : airtel prepaid inside TN
Total No of Post you made so far : Ex 674 posts : 741
Type of the Gift : Mobile Topup
Select Your Service Provider : Airtel Prepaid

Here by i declare that , before sending this request. I have verified my todays post. So Please check the topup status and confirm it.
[blink]Note : You will be given Warning if you are trying to test this Form or Found Fake[/blink]
The Sidewinder X6 is a gaming keyboard worthy of standing up against Logitech's G15 - a long time favorite with enthusiasts.


Comfortable keys, Large volume and backlight dials, Swappable Numpad (doubles up as macro keys), Plenty of programmable macro keys, Aggressively priced, Killer looks.


Lack of USB ports.
Asus has added yet another netbook to their current Eee PC line-up for India. Asus announced Eee PC 904HA for the Indian market. We reported about the specifications of Eee PC 904 back in July.

With Eee PC 904HA, Asus promises to offer larger storage with a 160GB SATA HDD with 10GB Eee Storage online and longer battery life of up to 7 hours. This model will be available for Rs. 22,999.

The ASUS 904HA features an Intel Atom N270 processor and an 8.9-inch LED backlight display offering 1024 x 600 resolution. Not surprising, but again, this model of the Eee PC comes with a Windows XP operating system. By bundling a 160GB SATA HDD in this model, Asus plans to offer more storage. However, it would've been great if they could offer more storage in their Eee PC 1000H model for India.

Featuring the Super Hybrid Engine technology of Asus, the 6-cell battery promises 7 hours of battery life. The remaining features are similar to their other Eee PC models - a built-in 1.3 megapixel cam, a Mic, a WLAN (802.11 b/g), and a 1GB DDR2 RAM.

Interested folks can also check out Asus's Eee PC microsite for India.

Asus now has competitors like MSI, Lenovo, Acer, and others in the netbook market in India.
Samsung P3 PMP Breaks Cover

It took more than a year for Samsung to reveal YP-P2 PMP's successor. Now the buzz is that Samsung is ready with the upgraded version of P2 -- the P3.

Samsung P3 is almost identical to P2 but now its entire chassis is made of aluminum. It's also got storage upgrade, which now goes from 4GB to 32GB, widget-like user interface and haptic feedback. Haptic technology is nothing but a vibration when a user touches the screen to give him a feeling of tactile feedback.

Other features remain the same like the 3-inch WQVGA screen (480 x 272 pixels), Bluetooth with A2DP, DNSe 2.0 for audio playback enhancement, mono speaker, FM tuner and a microphone. The expected battery life is 30 hours for audio and around 5 hours for video.

The price or availability is still a mystery as Samsung is expected to make it official in CES next year. For the time being, all we can do is ogle at the pictures of the player.

Supported formats:
Video: MPEG-4/WMV/H.264
What was intended to be a harmless software update turned out to be a hassle for many AVG users yesterday. Apparently, the virus scanner released yesterday contained an incorrect virus signature. The signature led to a user alert about a Trojan in the critical Windows system file user32.dll. The Trojan, PSW.Banker4.APSA or Generic9TBN was mistakenly identified as being infecting the system file. The scanner then advised users to delete this file. Doing so caused Windows to crash and go in to a reboot cycle.

Users with the latest and previous versions of AVG were equally affected. However, the issue was noticed only with systems using Windows XP. AVG has since then issued a patch, which corrects this problem. For people who have been affected by this please visit the AVG support forums for help wit the fix. There are separate sections for users with AVG 7.5 and AVG 8.0.

AVG has also issued an announcement apologizing users for the inconvenience caused which says, "Affected users unable to use their PCs should contact their AVG reseller or ask a friend to download the information and fix tool for them. After running the fix tool, users should run the AVG update program to download and install the correct AVG update. AVG sincerely regrets the inconvenience users have experienced. We are working to remedy the problem and ensure that any other potential vulnerabilities are identified and eliminated before they can impact users."

AVG is a popular free antivirus suite and is known for its dedicated user base.
It's official folks. Sony Ericsson's latest and possibly greatest handset, their Windows Mobile 6.1 enabled Xperia X1 is due for launch on November 28th 2008 - that's in a couple of weeks. Of course it's initially launching in the US so it'll be a little while before it gets here.

"The Xperia X1 continues the Sony Ericsson tradition of delivering the highest quality experiences and the most advanced technology available today," said Karen Morris, vice president of marketing, Sony Ericsson North America. "The most exciting scenarios enabled by the Xperia X1 will be created by consumers - enabling them to customize and personalize their device and content to fit their lifestyle and personality."

The Xperia X1's unique panel user interface is at the heart of the device's ability to create and adapt consumers' personal choices. With up to 9 panels, it's easy to find and enjoy the information and entertainment content they want. Sony Ericsson is busy working with third-party developers to create a wealth of new applications and new panels that will soon be available for download.

"Windows Mobile gives people the ability to easily navigate between their business and personal lives," said Todd Peters, vice president of marketing, Mobile Communications Business, Microsoft. "The panel user interface found only in the Xperia X1 is bringing unique experiences to consumers who want more from their converged devices."

As Sony Ericsson's most advanced phone to date, the Xperia X1 brings together a large, 3-inch wide VGA display touchscreen and a full QWERTY keyboard all wrapped into a sleek silver metal-finished arc slider handset. The Xperia X1 supports 3G networks, enabling audio and video streaming, high-speed internet surfing, multimedia messaging and email on the go. In addition to delivering 3G mobile broadband speeds, the Xperia X1 supports Wi-Fi to meet the needs of consumers' always connected lifestyles. In the tradition of Sony Ericsson, the Xperia X1 also offers a 3.2 megapixel camera, video streaming, video playback and video recording, and the ability to enjoy all their digital music.

"The Xperia X1 complements Sony Electronics' family of Windows-based devices and leverages the company's heritage of providing beautifully designed, highly functional, portable electronics," said John Kodera, vice president of product marketing, Sony Electronics. "The Xperia X1 delivers the highest quality entertainment, communication and personalization options for consumers."

The Xperia X1 will be available unlocked through Sony Electronics and its authorized retailers. Pre-orders of the Xperia X1 will be available through the Sony Style Web site at beginning today. This premium device will be sold unlocked for an MSRP of Rs. 39, 119 ($799.99), giving consumers the freedom to choose their own mobile operator and data plan.
It seems like HTC was not content with being the first to introduce a handset with the Android OS (G1) or a full touch screen handset with a WVGA resolution in their HTC Touch HD. They apparently are looking to be a very dominant company when it comes to setting a bar. Their latest is the worlds first handset to incorporate an integration of GSM and WiMAX technology in a single handset called the HTC MAX 4G for the Russian provider of Mobile WiMAX Scartel (brand Yota).

With its 3.8 inch, 800×480 pixel resolution display and 8 Gigs of internal memory running on a Windows Mobile 6.1 OS, the handset will give users a lot more than they bargained for. Other features include TV out capability, VoIP, a 3.5mm earphone socket for the handsfree and of course HTC's TouchFLO 3D UI.

As of now it's going to be out only in Russia considering their WiMAX capabilities so it just might be a while before it gets here. In the meantime there's plenty more we can expect from the company like the HTC HD Touch PRO and more importantly the G1.
Building on the success of the E71, Nokia has announced the latest addition to its Eseries range, the Nokia E63.

"Our research shows that people want a device that deals with both their personal and professional lives, but helps them to separate the two. When someone sits down at lunch, they want to update their social network or browse their personal email account and they don't want work getting in the way of that. It's another great case of technology adapting to the people that use it," says Soren Petersen, Senior Vice President, Nokia. "The Nokia E63 is a new proposition for Eseries - a messaging device where people will be just as involved in their social network as they are in their business network."

The Nokia E63 can switch modes with a single key press, switching from a view of corporate mail, appointments and intranet data, to a personal mode with a picture of friends, personal email and shortcuts to favorite hobby blogs or websites. Petersen adds, "The amazing response we have seen to the Nokia E71, which has very quickly become the best selling model in its category, let us know that we are heading in the right direction. People want a rich experience when using messaging, social networks and the Internet. With the Nokia E63 you can enjoy the web, update your status and work meaningfully with multiple email accounts."

The Nokia E63 also includes Files on Ovi, a service where people can get remote access to their PC files even when their computer is offline. Anyone buying the handset will have access to 1GB of online file storage for free.

The Nokia E63 will be available in ruby red or ultramarine blue with a range of multimedia features.  Record and view images and videos with the digital camera and bright landscape display, listen to music downloaded from the Nokia Music Store, or a number of other sources, via the standard 3,5 mm audio jack or customize the device through the thousands of applications available for download.

The Nokia E63 is expected to begin shipping in the coming weeks for an estimated retail price of EUR 199, before taxes and subsidies.
Chat Box / Quiz:"HARDWARE"
Nov 13, 2008, 11:32 AM
Quiz: Blade servers

Blade servers. They're one of the biggest topics in the data center right now. They take up less room than racks, which is good because as your server needs increase, your data center size doesn't. The focus turns to consolidation, and that's where blades come in.

So what's the problem? Two things. Heat and power. It's great that blade servers save space, but they're also working just as hard as the rack servers, which means despite the smaller size, they're giving off more heat. Which means that using blade servers can produce more heat than rack servers. The same thing goes for power requirements. Even so, data center managers are still finding that the TCO is more favorable with blades than racks, which is why, in today's data centers, you're more likely to find--you guessed it--blades.

We've created this quiz to test (and refresh) your blade server knowledge.

1. A server ________ is a thin, modular electronic circuit board containing one, two, or more microprocessors and memory, that is intended for a single, dedicated application (such as serving Web pages) and that can be easily inserted into a _______ server, which is a space-saving rack with many similar servers.

2. The place where a blade server is housed is called a _________.

3. Each blade is a server in its own right, often used for a single _____________.

4. People like blades over racks because blades offer more power in less ________.

5. A fully populated blade rack weighs nearly one _________ .

6. Excessive heat can affect the performance, availability and __________ of blade servers.

7. Many data centers suffer from abandoned ________ issues which create an air dam and may keep cooling units and chillers from operating at peak efficiencies--not all data centers need to revamp their power and cooling to accomodate blades.

8. Before buying a full chassis of blades, enterprises ought to make certain they have a sufficient workload to justify the cost. A good rule of thumb is that a half-populated chassis will cost as much to run and operate as an equal number of ______ servers.

9. Lots of cold air leaks out of a multitude of openings in the _______ tiles, doing virtually nothing.

10. Another issue, besides heat in a data center, is the _________--which is why data centers should have a vapor barrier.
Chat Box / "CROSSWORD challenge"
Nov 13, 2008, 11:23 AM


2. The organization or structure for a database
5. To make a change to stored data
6. A standard interactive programming language
7. A standard database access technology -- developed by Microsoft
9. Stored procedures that may automatically execute
10. A series of facts or statements
12. A list of keys or keywords
14. This term is used to represent a missing value
16. The process of organizing data to minimize redundancy
17. What a user of a database enters


1. Information that is organized so that it can easily be managed
3.'s DB2 UDB expert
4. A computer's representation of a fact about an entity
8. To copy files or databases so that they will be preserved
9. Data that is arranged in rows and columns
11. A data file that has no structured relationships between its records
13. The collection of all possible values of an attribute
15. Developer of DB2
Chat Box / DO U AWARE OF "Word Scramble"!!!
Nov 11, 2008, 11:59 AM
Word scramble # 4: Web development

Need a little break from the monotony? Have a little fun while testing your Web development terminology out. Unscramble these 24 Web development-related words. Give it a try!

1. AVJA                                     
3. IAEGNERTTD E2JE                 
4. PEERWSEBH                           
5. ASVLIU EAG                           
7. EWB ECESSRVI           
9. EBCFEAW                 
10. CEDO TNEPSPIS         
16. LQS
24. THML 

Did you enjoy this puzzle?
Chat Box / Quiz:"INTERNET"
Nov 11, 2008, 11:42 AM
Ajax quiz: Do you speak Geek?

1. What combination of technologies gives AJAX its name?
B. Asynchronous JavaScript and XML
C. Autonomic Computing and DHTML
D. Atlas and XML

2. Which one of these legendary Greek mythical figures or places is the code name for Microsoft's version of AJAX ?
A. Oracle
B. Atlas
C. Hercules
D. Delphi

3. Whoops! Stop the presses! The answer to Question #2 has expired already. What has Microsoft renamed its free Web client framework?
B. Live ASP
D. .NET Designer

4. Which Web browser is the least optimized for Microsoft's version of AJAX?
A. Firefox
B. Opera
C. Safari
D. Internet Explorer

5. Which one of these technologies is NOT used in AJAX?
D. Flash

6. Microsoft has released a control toolkit for developers. Is it open source?

7. AJAX has been used by developers worldwide to create mashups , combinations of databases of publicly available information from, Craigslist, eBay, Google Maps and others. What's the most important element for a developer to create a mashup?

8. Which one of the following functionalities is not (currently) made possible by AJAX?
A. Drag 'n drop of objects
B. Dropdown menus
C. Symbian browser support
( Hint: Scroll down to the second-to-last paragraph for the answer. )

9. Which programming language used in Visual Studio shares its name with a musical note?
Nov 11, 2008, 11:34 AM
quiz:IIS 6 Administration

1. What's a good way to ensure your paging file doesn't become fragmented?

a. Make the paging file size dynamic.
b. Make the paging file size static.
c. Make the paging file large and keep it on a single drive.
d. Install MPDFRG.EXE and set it to run automatically.

2. By default, the number of active connections in the queue waiting for server attention is 25. During heavy load, you can increase this to...

a. 50
b. 64
c. 80
d. 128

3. This is NOT a good trick for improving performance:

a. Minimize FTP user isolation.
b. Use ISAPI extensions instead of ISAPI filters.
c. Set up remote virtual directories.
d. Keep websites and FTP servers on different machines.

4. IIS supports how many concurrent CGI applications by default?

a. 2
b. 4
c. 6
d. 7

5. IIS has a feature for monitoring the health of multiple worker processes servicing an application pool called...

a. HTTP keep-alive
b. IIS monitoring services
c. Application failsafe
d. Rapid-fail protection

6. When looking at the Memory:pages/sec-counter, a number under 20 indicates...

a. Everything is just fine and dandy; have some coffee and relax.
b. You need more RAM.
c. Compare the number to the network card bandwidth to locate possible bottlenecks.
d. Increase the cache allotment.

7. This tool simulates multiple browsers simultaneously connecting to IIS to get content or run apps:

a. Web Application Stress Tool
b. Microsoft Operations Manager
c. Traffic Volume Manager Tool
d. Microsoft Traffic Management Tool

8. HTTP compression only works with web browsers developed after...

a. 1996
b. 1997
c. 1998
d. 1999

9. Application pool settings do NOT apply to this type of applications...

b. CGI
c. ASP

10. This is NOT a good way to boost ASP.NET application performance:

a. Trap exceptions instead of using them to direct program flow.
b. Disable session state, unless you actively plan to use it.
c. Use storied procedures instead of ad hoc queries when accessing back-end SQL data.
d. Never leave caching turned on.
Chat Box / Quiz:"WIRELESS & MOBILE"
Nov 10, 2008, 08:37 PM
Quiz: Educating end users

You receive an unsolicited text message on your mobile phone saying "Thank you for joining Tel-a-Joke. Your account will be charged $1 a day for this service. You may cancel your membership at any time by visiting" What do you do?

    * a. Cancel the account. You never signed up.
    * b. Ignore the message. You never signed up.
    * c. Forward the message to your friends. They love jokes.

You and your co-worker just came back from the latest trade show. Your co-worker took a dozen photos of ergonomic office chairs using his cell phone's camera. You took photos of workstations the same way. How do you share the photos?

    * a. Swap memory cards.
    * b. Move photos to a flash drive and view them on a computer.
    * c. Trade phones.
    * d. Choice A or B.
    * e. Choice B or C.

You're sitting in a plane waiting for take off. Suddenly, you realize that you haven't seen your laptop since you sent it through the security x-ray machine. What do you do?

    * a. Ask the stewardess if you have enough time to go back to look for it.
    * b. Call airport security on your cell phone and ask them to send your laptop on the next plane.
    * c. Panic and start planning how you're going to explain it to your boss.
    * d. All of the above.

You've decided to buy a smartphone. Which mobile device platform carries the least risk for viruses or other malware attacks?

    * a. Symbian
    * b. Blackberry
    * c. Microsoft

True or false: Some mobile malware can call a device, make the device answer silently without the user's knowledge, and turn the device into a remote bug.

    * a. True
    * b. False

True or false: By default, most Bluetooth devices operate in an unprotected "non-secure" mode.

    * a. True
    * b. False

True or false: A mobile device can be programmed to scream like a woman if it's stolen.

    * a. True
    * b. False

Why are some network administrators so afraid of portable USB storage devices like flash drives that they resort to putting Crazy Glue in company computer USB ports?

    * a. Administrators can't manage USB devices through Group Policy.
    * b. The devices can accidentally spread malicious software through the network.
    * c. The devices can be used to quickly and surreptitiously steal sensitive data.
    * d. All of the above

You're at a convention in Las Vegas. Sometime after lunch you realize that you must have forgotten your company smartphone in the taxi you took to the convention hall. In your mind, you can picture it sitting right on top of the folder next to you in the cab. The folder's missing in action too. What do you do?

    * a. Try to remember the name of the cab company and call them.
    * b. Call your network administrator back in Boston.
    * c. Buy another smartphone.

How many unclaimed laptops did Heathrow Airport auction off in 2006?

    * a. 30
    * b. 730
    * c. 1,730
    * d. 3,307
Chat Box / Quiz:"SAP"
Nov 10, 2008, 11:31 AM
Quiz: Back to basics with mySAP SRM

1. True or False: The terms Supplier Relationship Management (SRM) and Enterprise Buyer (EBP) are the same, and can be used interchangeably.

a) True
b) False

2. Which of the following is not a standard scenario available for SRM:

a) Self Service Procurement
b) Plan Driven Procurement
c) Service Procurement
d) Extended Classic Scenario
e) Catalog Content Management
f) Spend Analysis
g) Strategic Sourcing

3. The following technical component(s) is/are mandatory for the Self Service Scenario in SRM 5.0:

a) SAP SRM Server 5.5
b) SAP Catalog Content Management 2.0 (CCM)
c) XI Content for SAP SRM Server 5.5
d) Live Auction Cockpit (LACWPS) 5.0

4. Which of the following reports update the status of the follow-on documents within the shopping cart history?


5. What is the function of the RSWUWFMLEC report in EBP?

a) To transfer purchase orders from EBP to the back-end system in a standalone scenario.
b) To allow printing of the shopping cart.
c) To send notifications for work items via e-mail to e-mail recipients.
d) To provide the ability for approval preview in the shopping cart.

6. The following statements are true for the Extended Classic Implementation scenario:

a) The leading document is created in SRM and a copy of the document is transferred to the back-end SAP system.
b) The follow-on documents of confirmation and invoice can only be entered in the SAP back-end system.
c) The purchase order can be changed in SAP R/3.
d) The SAP Portal is not compatible with the Extended Classic Implementation scenario of SRM.

7. Which of the following statements are correct about the organization structure in EBP?

a) SRM users can be created simply by using the SU01 transaction.
b) An organization structure is required. The self service scenario cannot be implemented without the organization structure.
c) The inheritance administration of attributes from PPOMA can be configured in table T77OMATTR.
d) The report BBP_CHECK_CONSISTENCY checks the consistency of the organization plan.

8. What statement(s) is correct regarding Plan Driven Procurement in SRM?

a) It is one of the business scenarios in SRM.
b) It only supports the sourcing or procurement of requirements generated in APO.
c) The requirements created in the back-end system can be transferred to EBP where a shopping cart is created, and can then utilize the workflow start conditions rules to get approval(s).
d) The report BBP_EXTREQ_TRANSFER is utilized in the SAP backend to transfer the relevant requisitions to EBP.

9. Which of the following is true concerning the workflows in SRM?

a) There is only one workflow template provided by SAP for the shopping cart workflow. All others need to be customized based on the project.
b) The approval preview allows the end user to visualize all required approvals in a graphical and tabular format.
c) As an alternative to the workflows supplied in the standard system, you can use the SLAPPROVER workflow to ensure more flexible assignment of users. This is a one-step approval workflow.
d) "Ad-hoc" approval functionality provides the ability to dynamically insert approvers or reviewers within the approval chain for a document.

10. What elementary step(s) is/are associated with workflow customizing in SRM?

a) The workflows to be used have to first be activated in customizing.
b) The organization buffer of the organizational plan has to be refreshed first, using the transaction SWU_OBUF.
c) The IMG activity, "Maintain Standard Settings for SAP Business Workflow" can be configured by any user with access to this transaction.
d) Workflow start conditions need to be configured by business objects (eg. BUS2121 for the shopping cart).

11. What does the transaction "BBPGETVD" do?

a) It transfers the materials from the back-end SAP R/3 system into EBP.
b) It transfers the terms of payment of the vendors from the backend into EBP.
c) It replicates the vendors from the back-end system into the vendor organization (PPOMA_BBP).
d) All vendor master records are transferred from the backend and the business partner numbers are entered for these vendors in EBP.

12.Which statement(s) concerning master data in SRM is/are correct?

a) Material Master Data is transferred from the SAP backend to EBP using middleware.
b) Product Categories correspond to material groups in the SAP backend.
c) Business partner master records correspond to the vendor master records in the SAP backend.
d) The vendors are downloaded into SRM from the SAP backend via the middleware.

13. What statements pertaining to the OCI interface are correct?

a) OCI allows organizations to connect their EBP systems with online catalogs like Office Depot, Dell, and Grainger and transfer their catalog data into the EBP shopping carts.
b) OCI describes the data exchange between the EBP and external catalog applications.
c) The OCI is the Open Content Interface that ensures that the correct content is transferred to EBP from the catalog.
d) If products are contained in the catalog and are already maintained in the product master, EBP does not require any inbound parameters for transfer of the product data, since this data is already known in EBP.
e) The OCI interface contains inbound and outbound parameters.

14. Which of the following are correct as of release SRM 4.0?

a) Customer-specific fields can be created for the shopping cart, purchase order, and contract documents in SRM.
b) The procurement card functionality in EBP can be implemented in the Classic and Extended Classic scenario.
c) ITS can now be utilized integrated with the Web Application Server 6.40. This can decrease the total cost of ownership (TCO).
d) Archiving documents is not supported in SRM.

15. What statements pertaining to the account assignment in SRM are correct?

a) A real-time validation occurs in the SAP back-end system.
b) A G/L account has to be assigned to the product category for the validation of the accounts.
c) A local validation in EBP independent of a back-end system is also possible.
d) The only account assignment categories available in SRM are Cost Center (CC) and Asset (AS).
There is much to consider if you plan to migrate from Visual Basic 6 to Visual Basic .NET -- how long it will take, what needs to be done to your code base and whether an application will work the same once it is in .NET. There are also differences between the languages that must be considered. This quiz addresses some of the questions that will come up as you contemplate a VB 6-to-VB.NET migration.

1. If you know you want to migrate your Visual Basic 6 application to VB.NET, what is the first thing you should do?
A) Open the Visual Basic Upgrade Wizard, get a cup of coffee and watch it run.
B) Assess the VB 6 application; find out what controls it uses, what projects are in there and so on.
C) Cancel all social plans for the next couple months and start rewriting the app in .NET.
D) Schedule meetings with end users to see what features they want to add to the app.

2. Some bits of a Visual Basic 6 application, like most APIs, can be easily migrated to VB.NET; other parts are not so straightforward. Which of the following will NOT have to be re-architected during a VB 6-to-VB.NET migration?
A) DHTML pages
B) ActiveX documents
C) OLE controls
D) ADO to ADO via Interop

3. True or False: The Visual Basic Upgrade Wizard will convert all the code in your VB 6 application to VB.NET code for you.
A) True
B) False

4. Does the Visual Basic Upgrade Wizard support ASP to ASP.NET migrations?
A) Yes, in all cases.
B) Yes, in some cases.
C) No, not at all.

5. Which of the following is the LEAST compelling reason to migrate an application from Visual Basic 6 to Visual Basic .NET?
A) You want to take advantage of ASP.NET features such as its caching abilities.
B) The application relies heavily on third-party controls or dynamic link libraries (DLLs).
C) The application's original developers were new to Visual Basic and/or used some "out of the box" development approaches.
D) Your company's business processes do not change all that often.
E) The application uses COM+ components in a high-traffic Web environment.

Now that we've looked at migrating applications, we're going to consider migrating you the developer. See what you know about some of the differences between VB 6 and VB.NET and how to prepare yourself.

6. This programming language model is used sparingly in VB 6 but is one of the cornerstones of VB.NET. Knowing the ins and outs of it will make an application migration project easier and also prepare you for additional work in VB.NET. What is the model?
A) Modular programming
B) Aspect-oriented programming
C) Object-oriented programming
D) Reflective programming

7. As expected, Visual Basic 2005 comes with lots and lots of improvements over VB 6 and VB 2003. Which of the following is NOT out-of-the-box functionality in Visual Basic 2005?
A) Refactoring
B) Debugger ToolTips
C) Code snippets
D) Snap lines for graphical form-building

8. Data query building can sometimes be a bone of contention for VB 6 developers, since it involves SQL or XQuery. Microsoft is introducing a series of changes to the .NET Framework, such as a unified programming model for querying objects, databases and XML, that should make data queries much easier. What is the name for this set of technologies?
A) Rosario
B) Orcas
C) Yukon

9. When Visual Studio 2005 and SQL Server 2005 were introduced to the world, Microsoft decided to revamp its certification process. Once Windows Vista is released, the titles of Microsoft Certified Professional (MCP), Microsoft Certified Application Developer (MCAD), and Microsoft Certified Solution Developer (MCSD) will no longer apply. Which of the following titles is NOT a category in Microsoft's new three-tiered certification framework?
A) Microsoft Certified Application Developer
B) Microsoft Certified Technology Specialist
C) Microsoft Certified Architect
D) Microsoft Certified IT Professional

10. You and a friend from college, who works at a company across town, get together for dinner. You explain that you are in the middle of a VB 6-to-VB.NET migration and indicate that it is a bit of a challenge. Your friend says, "You should've just migrated to C#. It's cheaper and easier." Is your friend right?
A) Yes
B) No
Chat Box / ""R O B O T ""
Nov 10, 2008, 11:19 AM
WHAT IS robot???

A robot is a machine designed to execute one or more tasks repeatedly, with speed and precision. There are as many different types of robots as there are tasks for them to perform.

A robot can be controlled by a human operator, sometimes from a great distance. But most robots are controlled by computer, and fall into either of two categories: autonomous robots and insect robots. An autonomous robot acts as a stand-alone system, complete with its own computer (called the controller). Insect robots work in fleets ranging in number from a few to thousands, with all fleet members under the supervision of a single controller. The term insect arises from the similarity of the system to a colony of insects, where the individuals are simple but the fleet as a whole can be sophisticated.

Robots are sometimes grouped according to the time frame in which they were first widely used. First-generation robots date from the 1970s and consist of stationary, nonprogrammable, electromechanical devices without sensors. Second-generation robots were developed in the 1980s and can contain sensors and programmable controllers. Third-generation robots were developed between approximately 1990 and the present. These machines can be stationary or mobile, autonomous or insect type, with sophisticated programming, speech recognition and/or synthesis, and other advanced features. Fourth-generation robots are in the research-and-development phase, and include features such as artificial intelligence, self-replication, self assembly, and nanoscale size (physical dimensions on the order of nanometers, or units of 10-9 meter).

Some advanced robots are called androids because of their superficial resemblance to human beings. Androids are mobile, usually moving around on wheels or a track drive (robots legs are unstable and difficult to engineer). The android is not necessarily the end point of robot evolution. Some of the most esoteric and powerful robots do not look or behave anything like humans. The ultimate in robotic intelligence and sophistication might take on forms yet to be imagined.

The term robot first appeared in a 1920 play by Czech writer Karel Capek, R.U.R.: Rossum's Universal Robots. In the play, the robots eventually overthrow their human creators. The Czech word "robota" means "forced labor".
Chat Box / what is REAL TIME?
Nov 10, 2008, 11:00 AM
Real time is a level of computer responsiveness that a user senses as sufficiently immediate or that enables the computer to keep up with some external process (for example, to present visualizations of the weather as it constantly changes). Real-time is an adjective pertaining to computers or processes that operate in real time. Real time describes a human rather than a machine sense of time.

In the days when mainframe batch computers were predominant, an expression for a mainframe that interacted immediately with users working from connected terminals was online in real time.
Chat Box / what is REAL TIME CLOCK?
Nov 10, 2008, 10:57 AM
A real-time clock (RTC) is a battery-powered clock that is included in a microchip in a computer motherboard. This microchip is usually separate from the microprocessor and other chips and is often referred to simply as "the CMOS" (complementary metal-oxide semiconductor). A small memory on this microchip stores system description or setup values - including current time values stored by the real-time clock. The time values are for the year, month, date, hours, minutes, and seconds. When the computer is turned on, the Basic Input-Output Operating System (BIOS) that is stored in the computer's read-only memory (ROM) microchip reads the current time from the memory in the chip with the real-time clock.
Gift / Prizes Request / topup request
Nov 08, 2008, 07:16 PM
User Name : manimarank
Date  : 08 nov 08
Status : normal
Postcount : 52
Information : airtel prepaid inside TN
Total No of Post you made so far : Ex 674 posts : 571
Type of the Gift : Mobile Topup
Select Your Service Provider : Airtel Prepaid

Here by i declare that , before sending this request. I have verified my todays post. So Please check the topup status and confirm it.
[blink]Note : You will be given Warning if you are trying to test this Form or Found Fake[/blink]
Chat Box / Quiz: Web Management Basics
Nov 08, 2008, 04:50 PM
1. This is a place to store the files for Web pages that are frequently requested (or that have been recently requested) to speed up page delivery and reduce network traffic.
a. buffer
b. capacitor
c. cache
d. incubator

2. This term means dividing the amount of work that a computer has to do between two or more computers so that more work gets done in the same amount of time and, in general, all users get served faster.
a. shared hosting
b. routing
c. load balancing
d. colocation

3. This is a program that serves the files that form Web pages to Web users. Every computer on the Internet that contains a Web site must have one of these.
a. Web server
b. autoresponder
c. application server
d. dynamic DNS service

4. This locates a specific page on the World Wide Web.
a. domain name
b. URL
c. path
d. IP address

5. This is programming that protects the resources of a private network from users from other networks.
a. cybernetics
b. firewall
c. server-side include
d. intranet

6. This is the set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page.
b. ASP
c. Java
d. GIF89a

7. This is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
a. ISP
b. ASP
c. SAP
d. OSP

8. This is an application program that provides a way to look at and interact with all the information on the World Wide Web.
a. link checker
b. browser
c. access provider
d. avatar

9. In the Web hosting business, this refers to the rental and exclusive use of a computer that includes a Web server, related software, and connection to the Internet, housed in the Web hosting company's premises.
a. colocation
b. reseller hosting
c. virtual hosting
d. dedicated hosting

10. Using a World Wide Web browser, this is a saved link to a Web page that has been added to a list of saved links.
a. blog
b. bookmark
c. bookmark portal
d. bogie
Steven Spielberg, Will Smith Thinking Of Remaking 'Oldboy''
According to an article in Variety magazine, Steven Spielberg and Will Smith seem rather interested in making an American remake of a 2003 film 'Oldboy' directed by Korean director Park Chanwook.

A cult hit, Oldboy is the centrepiece of Chanwook's revenge trilogy, an intensely violent saga about a man held hostage for 15 long years, who is then mysteriously released and allowed to go on a brutal spree of revenge that involves eating a live octopus, commiting incest, including slicing out his own tongue.  In short, it is nothing like what either Spielberg or Will Smith do e.g. mainstream, family-friendly, sensitive pictures.

All those who are used to the mainstream fare of Spielberg and Smith, must be having a fit of apoplexy, however, sooner or later someone in Hollywood was bound to do a remake of this violent film, and with Speilberg and Smith opting to do it, at least it is not being rehashed by hacks.  The duo are both not only at the top of their respective careers as actor and director, they are also creative and able to sell even the grimmest to mainstream audiences.

With Spielberg and Smith still in early discussions to collaborate on the revenge drama, according to Variety, DreamWorks is in the midst of acquiring rights to remake the 2003 Chan-wook film.  Presumably, Smith will play the lead role in the American remake.  While, Spielberg has hinted around the bush about his next directing effort, he has had Tintin and Abraham Lincoln's biopic on his plate for a while now.

Undoubtedly, a combination of Spielberg and Smith combined can pull this off, though one can only hope no aliens form part of the film, no matter how cute E.T. was and how he tugged at our heartstrings.

Chat Box / "kid-friendly SEARCH ENGINE"
Nov 08, 2008, 11:06 AM
The computer helper: Kid-friendly searching

Kids love the Internet. Unfortunately, as every parent knows, there's a lot of trouble they can get into while wandering through cyberspace. The challenge is to allow youngsters to learn from and enjoy the Internet while keeping them safe from harmful influences. That's the focus of this week's questions.

Q: My kids have their own accounts on my computer. I would like to set up their Web browsers so that a kid-friendly search engine appears automatically. Can you recommend some?

A: Yes, there are several search engines that are aimed specifically at kids. One of the most innovative new entrants is KidZui (, which is both a browser and learning environment that was created by parents for kids. You'll need to download the KidZui browser, sign up, and then click a link in an activation e-mail that you'll receive in order to get started. Once signed up, your child can begin using KidZui, and you'll likely be impressed immediately.

The KidZui interface is not only colourful and filled with Internet-based learning and entertainment opportunities, but it also simplifies the Web in virtually every way, from making the search field friendlier in appearance to presenting search results as a series of animated "snapshots" of the Web pages themselves. Sounds are integrated into the interface, too. When you click a search result, for instance, a fun sound introduces the page.

KidZui starts out full screen, and with its immersive and self- contained feeling, your child may never leave its confines, which is good because all content is deemed child safe. Your child can click on categories such as games, science, animals, sports, and "awesome stuff" to stay entertained and educated for hours. Best of all, as the parent who sets up KidZui for your child, you'll receive an e- mail message at the end of each KidZui session in which a report of your child's activities is recorded - including searches conducted and sites viewed.

You could also turn to kid-friendly versions of the most powerful search engines. The first is Ask for Kids (, based on the Ask Jeeves search engine. With a friendly interface adorned by special category buttons for "school," "movies," "games," and "video," Ask Kids presents learning opportunities at every turn for youngsters who conduct searches here. Search for "hamster," for instance," and in addition to a list of search results, kids will see a dictionary definition of a hamster as well as additional relevant search categories, including "hamster care."

Yahoo! Kids ( is another good option, although the page seems more static - updated less frequently with current goings-on - than the other sites. Yahoo! Kids is bright and colourful and contains top-of-the-age links to games, music, movies, jokes, sports, and more.

Google is conspicuously absent from the kid-safe search engine mix. Google's SafeSearch site ( purportedly filters out potentially harmful sites, but a test showed that the filtering results were less than impressive.

Q: How can I know if a Web contains content appropriate for my family before I visit it? We are using Windows.

A: You'll need to employ one or several content filtering options available to you.

There are controls in Internet Explorer that will help to block harmful or malicious sites. You should spend some time adjusting these controls to meet your preferences, since most of them are set to very low thresholds by default.

In Internet Explorer, open the Tool menus, and select Internet Options. From the resulting Internet Options dialog box, select the Content tab, and then click the Enable button in the Content Advisor section.

In the Content Advisor dialog box, you'll see a list of categories of sites that you can control. Categories include "content that creates fear, intimidation, etc.," "content that sets a bad example for young children," and "depiction of drug use." Scroll through the list of options, selecting each that you wish to enforce, and use the slider to determine the level of restriction. Then click the OK button. You'll be asked to supply a password so that no one can change the settings without your permission.

The content restrictions work surprisingly well. When someone tries to visit a restricted site, a dialog box pops up before the page is loaded, indicating to the user that the site contains restricted content and is blocked.

Firefox, the second most popular Web browser, has plenty of controls that help to prevent phishing and protect your privacy, but to get the kind of content protection you seek, you'd have to turn to add-ons.

The most secure type of filtering will come from a dedicated filtering software packages such as Net Nanny ( or Safe Eyes (, both available for PC and Mac. These solutions are more elegant - and effective - for Windows XP users because they work regardless of which Web browser you use - and they can control content seen not only over the Web but within instant messengers and e-mail.

Q: What can I do to keep my child safe on the Web?

A: First, take the steps discussed above - Set up a kid-friendly home page and employ good filtering software. If you're using Windows Vista, you have filtering software built in to the operating system. Look in the Vista Control Panel, set up a user account for your child, and then apply the content filter to that new user account.

In addition, you should talk to your child about what constitutes safe behaviour. Tell your child never to give out an e-mail address or personal information to people they don't know and not to open e- mail messages or attachments from unknown sources, either. Your child should also be told always to consult you if he or she visits a Web site or receives some form of communication over the Internet that makes him or her feel uncomfortable.

As a parent, you can go a long way toward ensuring safety by limiting your child's time online - and monitoring, when possible, the online activities he or she engages in.

Non Engineer's Discussion !!! / "ANIMATIONS"
Nov 08, 2008, 10:52 AM
Animation industry to grow at 27% CAGR: NASSCOM

Indian Animation industry would see growth at the rate of 27% CAGR in the coming years. The animation industry can cross $1163 million mark by 2012. It is forecasted in a report titled 'NASSCOM Animation and Gaming India 2008' by the industry body NASSCOM. It is specially included with a session on 'Super Pitch' to show its commitment for further development of Indian animation industry.

Animation industry includes entertainment, education, custom content development and multimedia/web design. Education sector would record highest growth rate at about 40 per cent per annum. Gaming industry is expected to value at $1,060 million by 2012 at a CAGR of 50 per cent. It currently stands at Rs 996.4 crore.

NASSCOM president, Som Mittal said that India would soon become hub of animation and gaming industry. It has already surpassed its counterparts by delivering projects of international standards. The country maintains highly skilled staff, growing maturity of animation studios, number of co-production ventures, intellectual property, growing consumer demand and cost attractiveness.
Gift / Prizes Request / topup request
Nov 07, 2008, 08:56 PM
User Name : manimarank
Date  : 7 nov 08
Status : Urgent
Postcount : 39
Information : airtel prepaid inside TN
Total No of Post you made so far : Ex 674 posts : 525
Type of the Gift : Mobile Topup
Select Your Service Provider : Airtel Prepaid

Here by i declare that , before sending this request. I have verified my todays post. So Please check the topup status and confirm it.
[blink]Note : You will be given Warning if you are trying to test this Form or Found Fake[/blink]
Chat Box / what is DB?
Nov 07, 2008, 08:45 PM
In electronics and communications, the decibel (abbreviated as dB, and also as db and DB) is a logarithmic expression of the ratio between two signal power, voltage, or current levels. In acoustics, the decibel is used as an absolute indicator of sound power per unit area. A decibel is one-tenth of a Bel, a seldom-used unit named for Alexander Graham Bell, inventor of the telephone.

Suppose a signal has a power of P1 watts, and a second signal has a power of P2 watts. Then the power amplitude difference in decibels, symbolized SdBP, is:

SdBP = 10 log10 (P2 / P1)

Decibels can be calculated in terms of the effective voltage if the load impedance remains constant. Suppose a signal has an rms (root-mean-square) voltage of V1 across a load, and a second signal has an rms voltage of V2 across another load having the same impedance. Then the voltage amplitude difference in decibels, symbolized SdBV, is:

SdBV = 20 log10 (V2 / V1)

Decibels can also be calculated in terms of the effective current (amperage) if the impedance remains constant. Suppose a signal delivers an rms (root-mean-square) amperage of A1 through a load, and a second signal delivers an rms amperage of A2 through another load having the same impedance. Then the current amplitude difference in decibels, symbolized SdBA, is:

SdBA = 20 log10 (A2 / A1)

When a decibel figure is positive, then the second signal is stronger than the first signal. When a decibel figure is negative, then the second signal is weaker than the first signal. In amplifiers, the gain, also called the amplification factor, is often expressed in decibels. A circuit amplifies only if the decibel figure for the output-to-input power ratio (SdBP) is positive.

In sound, decibels are defined in terms of power per unit surface area on a scale from the threshold of human hearing, 0 dB, upward towards the threshold of pain, about 120-140 dB. As examples: the sound level in the average residential home is about 40 dB, average conversation is about 60 dB, typical home music listening levels are about 85 dB, a loud rock band about 110 dB, and a jet engine close up is 150dB.

Decibel units are commonly used in audio equalizers, both the hardware kind and the software kind, as a convenient reference point while editing. Boosting an equalizer band whose center point is 1000 by 3 dB means that you have raised the volume level of that frequency band by 3 dB as it relates to the other frequencies in the sound. A typical equalizer has a range for boosting or diminishing a sound level of +/-18 dB.
every IT's want to know...

YESZZ,nothing but

what is Y2K?

Y2K is an abbreviation for "year 2000." As that year approached, many feared that computer programs storing year values as two-digit figures (such as 99) would cause problems. Many programs written years ago (when storage limitations encouraged such information economies) are still being used. The problem was that when the two-digit space allocated for "99" rolled over to 2000, the next number was "00." Frequently, program logic assumes that the year number gets larger, not smaller - so "00" was anticipated to wreak havoc in a program that hadn't been modified to account for the millennium. This situation was sometimes referred to as "the Y2K problem" or "the millenium bug."

So pervasive was the problem in the world's legacy application payroll, billing, and other programs that a new industry sprang up dedicated to helping companies solve the problem. IBM and other major computer manufacturers, software houses, and consultants offered tools and services to address this problem.

Given the automation of modern life, some feared widespread and severe disruption to critical services as the year 1999 ticked over to the year 2000. However, very few serious problems were reported.
Nov 07, 2008, 06:23 PM
Zero Administration for Windows is Microsoft's initiative to help make its operating system easier to install and manage. The goal is to reduce the ownership costs of PCs, particularly in large corporations with many thousands of desktop computers to support.

Microsoft introduced Zero Administration in November 1996, at a time when Oracle and Sun were touting their own approach of "network computers" as a new way of doing corporate applications with less overhead than traditional PCs. Microsoft responded with its concept of Zero Administration. The idea was to include in all of Microsoft's Windows operating systems features that would simplify the time it took to install and maintain the system on thousands of machines -- and at the same time reduce the costs of keeping PCs in corporate America.

Microsoft provides Zero Administration packs for Windows NT and Windows 98. These packs include features to automatically send out operating-system and application software updates throughout the company from one workstation, and having these updates roll back to the previous version if something goes wrong during the process.

For Windows 2000, Zero Administration's Group Policy feature lets administrators set rights and permissions for network and application access on the group level instead of having to do it for each individual user. If everyone in the legal department needs the same permissions and rights to applications, administrators need set this up only once for all the employees in the department.
Chat Box / what is ZERO-DAY EXPLOIT?
Nov 07, 2008, 06:19 PM

A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known. Ordinarily, after someone detects that a software program contains a potential exposure to exploitation by a hacker, that person or company can notify the software company and sometimes the world at large so that action can be taken to repair the exposure or defend against its exploitation. Given time, the software company can repair and distribute a fix to users. Even if potential hackers also learn of the vulnerability, it may take them some time to exploit it; meanwhile, the fix can hopefully become available first.

With experience, however, hackers are becoming faster at exploiting a vulnerability and sometimes a hacker may be the first to discover the vulnerability. In these situations, the vulnerability and the exploit may become apparent on the same day. Since the vulnerability isn't known in advance, there is no way to guard against the exploit before it happens. Companies exposed to such exploits can, however, institute procedures for early detection of an exploit.

A study released by Symantec in early 2004 found that although the number of vulnerabilities discovered was about the same in 2003 as in 2002, the time between the vulnerability and exploits based on it had narrowed. According to the infoAnarchy wiki, "14-day" groups and "7-day" groups carry out an exploit within 14 or 7 days of a product's market release. Conducting a zero-day exploit establishes crackers as members of the elite, because they must have covert industry connections to gain the inside information needed to carry out the attack.
Chat Box / what is ZERO?
Nov 07, 2008, 06:12 PM
what would u say,if a query is raised to u like WHAT IS ZERO?



In mathematics, zero, symbolized by the numeric character 0, is both:

1. In a positional number system, a place indicator meaning "no units of this multiple." For example, in the decimal number 1,041, there is one unit in the thousands position, no units in the hundreds position, four units in the tens position, and one unit in the 1-9 position.

2. An independent value midway between +1 and -1.

In writing outside of mathematics, depending on the context, various denotative or connotative meanings for zero include "total failure," "absence," "nil," and "absolutely nothing." ("Nothing" is an even more abstract concept than "zero" and their meanings sometimes intersect.)

Notation for placeholders in positional numbers is found on stone tablets from ancient (3,000 B.C.) Sumeria. Yet, the Greeks had no concept of a number like zero. In terms of modern use, zero is sometimes traced to the Indian mathematician Aryabhata who, about 520 A.D., devised a positional decimal number system that contained a word, "kha," for the idea of a placeholder. By 876, based on an existing tablet inscription with that date, the kha had become the symbol "0". Meanwhile, somewhat after Aryabhata, another Indian, Brahmagupta, developed the concept of the zero as an actual independent number, not just a place-holder, and wrote rules for adding and subtracting zero from other numbers. The Indian writings were passed on to al-Khwarizmi (from whose name we derive the term algorithm ) and thence to Leonardo Fibonacci and others who continued to develop the concept and the number.

Various arithmetic operations that include zero have sometimes been the subject of dispute such as the result of dividing zero by zero. The answer is that it can't be done. Although early mathematicians tried to wrestle some sort of result out of this operation, later ones have decided that this problem just won't bear any fruit. This is viewed as another case where language allows us to ask a question that really doesn't make sense to ask.
Chat Box / Quiz: Writing for business
Nov 07, 2008, 02:51 PM
Is your prose as good as your code?

1. Which one is correct?
a. The government approved a program that will give iPods to disadvantaged children.
b. The government approved a program which will give iPods to disadvantaged children.

2. Which one is correct?
a. Bacon and eggs are Bill Gates' favorite breakfast.
b. Bacon and eggs is Bill Gates' favorite breakfast.

3. Which one is correct?
The spyware infestation had a startling ________ on network performance.
a. affect
b. effect

4. Which one is correct?
Poor network performance ___________ everyone's work.
a. affected
b. effected

5. Which one is correct?
a. The next topic he addressed was the many instances of identity theft.
b. The next topic he addressed were the many instances of identity theft.

6. Which one is correct?
a. The recent divestiture, combined with rising costs, are expected to affect profits.
b. The recent divestiture, combined with rising costs, is expected to affect profits.

7. Which one is correct?
a. While answering the e-mail, the phone rang and interrupted me.
b. While answering the e-mail, I was interrupted by the phone ringing.

8. Which one is correct?
a. Unlike spam or spyware, spim is not under investigation by the federal government.
b. Unlike spam or spyware, the federal government is not investigating spim.

9. Which sentence is preferable?
a. "I'm not going to stand for it," Carly said.
b. "I'm not going to stand for it," fumed Carly.

10. Which sentence is preferable?
a. This issue was decided by the committee.
b. The committee decided this issue.
It's a mess. Victims everywhere you look. People slumped at their computers, networks unraveling, browsers hijacked, disappearing e-mail. Your job: Analyze the scene, solve the crime.

1. Does that strange blue glow from one computer screen mean anything? But first we have to figure out what to call it.
[Clue: The computer is not a Mac.]

2. Probably just a blue herring. Let's look at one of the bodies and it's not going to be pretty. What will we call the thoughts of the network administrator that have been strewn all over the carpet?
[Clue: You do one of these when you need to pass on everything you know about something.]

3. Aha! This programmer's body is riddled with spaghetti code. Could it be that he was assaulted by a . . . ?
[Clue: They don't make programs more popular than this kind. This kind will really slay you.]

4. And suppose the program got fed up with this programmer and turned the tables on him? Hmmm. That could mean that this programmer was doing some . . . ?
[Clue: If you're trying to fix a program, you may want to try several approaches at once to see if one of them works.]

5. But wait! There! On the carpet as big as anything! Probably about size 12-D, we'd say.
[Clue: Robinson Crusoe found one of these that Friday had left behind. The one he found had toes, though.]

6. Possibly it's time for scientific tools. Let's recreate everything with drawings and move them around using . . . (darn it, we forget what we call this; can you help?)
[Clue: Two words, we remember that. The first word means "science used in law" and the second means "the process of making things look alive." I mean how helpful can we get? We just can't remember it ourself or is it ourselves?]

7. One of the computers in this room is still alive, it looks like. In fact, it looks suspiciously like Suspect #1 because it happens to be a . . . ?
[Clue: These servers are relatively thin and a bit cutting-edge. The answer is not Ockham's razor, by the way.]

8. However, as we all know, it's never going to be Suspect #1. And besides we just noticed a page of the calendar has been torn off the wall and Victim #3 is holding it clutched in her hand. On the page someone has scrawled with photonic ink the words "Black Tuesday." Which someone on our crime scene investigation team just happens to recall is known as . . . ?
[Clue: It's the day in the month that Microsoft comes out with all its "fixes."]

9. Cancel the investigation. Someone just came in and said that they did it. They didn't give us their last name but we know what it is. Their first name was "Jack" and middle initial "T." We doubt that you'll be able to figure out his last name.
[Clue: This program is used to burn music files to a CD.)]

10. Although we did get lucky this time, we nevertheless believe in using all the tools at our command, including that of our crime-fighting brains. Time and again, we learned it's the only way to come up with an . . . ?
[Clue: Hercules Poirot often comes up with this kind of solution. That's why we always dress up on the job.]
Chat Box / Quiz: The robots are coming!
Nov 07, 2008, 02:49 PM
Sure -- NOW they vacuum and scrub the floor -- but what happens when they wise up? The following could be required information when the robots take over. How much do you know about our artificially intelligent friends?

1. The word "robot" was coined in 1920. Is the term:
a. an abbreviation of "row" and "boat," for an early version that did just that?
b. derived from a Czech word meaning "forced labor?"
c. named for the creator of the first robot, Robert Botsworth?

2. One of the earliest known working robots was da Vinci's self-propelled car, circa 1478. Was it run by steam pressure or springs?

3. What's the term for a robot that is designed to resemble a human?

4. Which of the following is NOT one of Issac Asimov's Three Laws of Robotics:
a. Robots must not meet in secret.
b. Robots must never harm human beings.
c. Robots must protect themselves without violating the other rules.

5. If the shape-shifting chembot is developed, it could travel over considerable distances carrying an embedded payload, change shape and size as required, and then reconstitute to its original form. What organization recently put out an RFP for its design?

6. Used with satellites, space probes, and mobile robots, this term describes is the wireless transmission and reception of measured quantities for the purpose of remotely monitoring environmental conditions or equipment parameters. What is it?

7. Which sense does the field of haptics replicate for the user?
a. vision
b. hearing
c. taste
d. touch
c. smell

8. Based on a Greek word meaning "steersman" or "governor," this is the science or study of control or regulation mechanisms in human and machine systems. What is it?

9. DARPA's early cyborg insect experiment using wasps was ill-fated. Why?

10. If self-replicating robots ever take over, the resulting situation is sometimes referred to as a gray goo scenario. In this context, what are self-replicating humans sometimes called?
Chat Box / Quiz: Talkin' tech turkey
Nov 07, 2008, 02:47 PM
What are we thankful for? In a word -- you, our readers! We'd like to take this opportunity to say thank you for contributing to and helping us to keep the site growing and useful. Please join us for our traditional Thanksgiving quiz-feast of tasty IT terms.

1. This is a derogatory term for someone who tends to spend a great deal of leisure time in front of the computer, perhaps coming to resemble a beloved tuber of the holiday table. (Hint: It sounds like a very bad idea for a genetically modified food.)
What is it?

2. In a spreadsheet or a database, this is a data structure used to organize information. (Hint: Its Thanksgiving namesake might feature a cornucopia centerpiece.)
What is it?

3. This is a numerical constant that represents the ratio of a circle's circumference to its diameter on a flat plane surface. (Hint: Would you prefer pumpkin or pecan?)
What is it?

4. This is an object-oriented programming interface from Sun Microsystems that lets you build components that can be deployed in a network on any major operating system platform. (Hint: Grind 'em up!)
What is it?

5. On a Web site this is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy. (Hint: An overstuffed turkey might leave this on the floor on the way to the stove.)
What is it?

6. This Unix command execution program developed at Bell Labs is a comprehensive combined version of other major UNIX shells. (Hint: It sounds like something discarded after husking maize for the Thanksgiving dinner)
What is it?

7. This is a false, or phantom, signal that appears in a wireless receiver. (Hint: It sounds like a word you might call to try and catch your Thanksgiving turkey.)
What is it?

8. In communications, this is the addition of a small number of binary digits to a transmission unit in order to fill it up to a standard size. (Hint: It sounds like a savory turkey side-dish made with -- computer data.)
What is it?

9. In wireless communications, this is a line that connects the antenna to the receiver. (Hint: You might use this term to describe the queue for the buffet.)
What is it?

10. This is a computer system, especially in the entertainment industry, that combines disparate hardware and software-controlled lighting, sound, and visual effects into a single, synchronized system. (Hint: If you do this, you might not have to loosen your belt buckle after dinner.)
What is it?
Chat Box / Quiz: SQL Server 2000
Nov 07, 2008, 02:45 PM
DIRECTIONS: Match the SQL Server statement in the right-hand column with its description in the left-hand column.

How to take the quiz:
After reading the question, write down the letter of your answer choice. Check your answers by using the answer key at the end of the quiz.

1._____ This allows you to read ten rows from a table.

2. _____This is used to show the text for a given stored procedure.

3._____ This is used to ensure a null field is returned as zero.

4._____ This is used to show all object names in the current database matching a pattern.

5. _____This is used to show the table definition.

6. _____This is used to show all DTS packages that match a pattern.

7._____ This is used to show all constraints for table names in the current database matching a pattern.

8._____ This is used to run UPDATE STATISTICS against all user-defined tables in the current database.

9._____ This is used to show all stored procedures in the current database that match a pattern.

10._____ This is used to ensure an empty string is returned as null.



c) select * from all_CONS_COLUMNS where table_name like '%PATTERN%'


e) select distinct name from msdb.dbo.sysdtspackages where name LIKE '%PATTERN%'

f) select * from TABLE_NAME where rowcount <= 10



i) select TOP 10 * from TABLE_NAME

j) select distinct name from msdb.dbo.sysobjects where name LIKE '%PATTERN%'

k) EXECUTE sp_helptext TABLE_NAME

l) select * from sysobjects where name LIKE '%PATTERN%'

m) select NULLIF(FIELD_NAME, '') from TABLE_NAME

n) EXEC sp_updatestats

o) select * from sysobjects where xtype = 'P' and name LIKE '%PATTERN%'

p) select * from sysobjects where uid = 1 and name LIKE '%PATTERN%'
Chat Box / Quiz: Nano, nano!
Nov 07, 2008, 02:43 PM
Good things come in small packages -- really, really small packages. Somewhat paradoxically, nanotech is getting bigger all the time. How much do you know about the finer details? (We bet you know -- or can guess -- more than you'd think!)

1. Nano is a prefix meaning "extremely small." When quantifiable, it translates to one-billionth. Nano comes from a Greek word meaning:
a. flea
b. dwarf
c. grandmother

2. Admiral Grace Hopper famously used segments of wire to illustrate how far an electrical signal could travel in a nanosecond. How long were the pieces of wire?

3. Paul Saffo of the Institute for the Future in Palo Alto, California, believes nanotech-based analog computing will be "the foundational technology of the next decade." We know that digital data has two possible states. In theory, how many states can analog data have?

4. Because of its soccer ball-like shape, the fullerene is named for Buckminster Fuller (It's also sometimes called a "buckytube."). What structure is Fuller most famous for inventing?
a. the geodesic dome
b. the wind tunnel
c. the virtual reality CAVE

5. Optimally, atomic storage would store a bit of data in a single atom. How many atoms might a single grain of sand hold?
a. ten million
b. ten billion
c. ten million billion

6. In nanotechnology, this is a process in which devices whose diameters are of atomic scale, on the order of nanometers, create copies of themselves. What is it?

7. In Michael Crichton's novel Prey , the scenario in Question 6 goes horribly awry. What is the term for that catastrophic, nanorobot-created situation?

8. Molecular manufacturing deals with the design and manufacture of electronic circuits and mechanical devices built at the molecular level of matter. What is molecular manufacturing better known as?

9. A qubit is a particle so small that the addition or removal of a single electron changes its properties in some useful way. What is qubit short for?

10. Spintronics is an emerging field of nanoscale electronics involving the detection and manipulation of the spin of this subatomic particle. What is it?
Last year was a big year for penguins, from their appearance in Oscar-winning documentaries to wholesale adoption of Linux by South America's largest economy. What does 2006 hold in store?

TechTarget's experts went in search of the hottest news and trends at this year's Linuxworld with high hopes of learning where the penguin might be marching next.
(Hint: It wasn't to go fishing off the coast of Antarctica!)

Want to read up on the conference before taking the quiz? Read this article first.

How to take the quiz:
- After reading the question, click on the answer to go to the definition or TechTarget news article.
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.

1. All conferees, whether dressed in (penguin) suits or (penguin) t-shirts, were excited about this server program, which is fast becoming a key corporate medium for facilitating internal team discussions, maintaining system documentation and encouraging community-driven product knowledge bases.
a. collaborative authoring
b. wiki
c. Samba
d. WebDav
e. contextual collaboration

2. This was the hottest hardware on display, described in loving detail by MIT Media Lab co-founder Nicholas Negroponte's keynote speech. What was it?
a. the $50 Linux-based PDA
b. the $300 Linux-based tablet PC
c. the $10 Linux-based disposable cell phone
d. the $100 Linux-based laptop
e. the $500 Linux-based automatic penguin feeder

3. The product from Question #2 runs on a slimmed-down version of Fedora Core. What has this version of Linux been dubbed by the penguin-loving masses?
a. Lithe Linux
b. Skinny Linux
c. Sexy Linux
d. Linux Lite
e. Flat-top Fedora

4. Question #2's answer has a host of features that will allow it to function in the developing world, the audience that Negroponte is targeting for its release. What are they?
a. The ability to form ad hoc networks, creating both LAN in villages and sharing internet access
b. The ability to create its own power, in the absence of a power grid, by use of a human-powered hand crank
c. The ability to survive immersion or brief exposure to flame
d. A & B
e. All of the above

5. Another much discussed topic at Linuxworld was the emergence of two distinct desktop environments in Linux. What are they? GNOME & _____
a. KDE
b. ELF

6. Given the two competing environments, a new initiative has sprung up to bridge the gap. "The Portland Project" was created by this non-profit that promotes Linux adoption. What is it?
c. OMG
d. OBL

7. As a trend, this sever software concept was unavoidable at this year's Linuxworld, from Dell CTO Kevin Kettler's keynote speech to numerous startups selling their newest versions. What is it?
a. shelling
b. immersion
c. visualization
d. virtualization
e. vitalization

8. Which of these hot technology trends is driving the adoption of Question #7's answer?
a. Network computing
b. Utility computing
c. Blade servers
d. Outsourcing
e. Multi-core processing

9. Knowledge management in the open source world has gotten even hotter. What company's offbeat name is attached to the launch of a wiki-based knowledge store designed to help organizations better organize scattered data pools of IT documentation?
a. Skink
b. Skunk
c. Splunk
d. Slink
e. Stringk

10. Given the amount of money that is now firmly committed to the Linux market, it's no surprise that licensing and copy right issues continue to circulate throughout the community. A "GPL" lists terms and conditions for copying, modifying and distributing free software. What does GPL stand for?
a. Granted Public License
b. Gleeful Private Leave
c. Giant Public Lease
d. Guaranteed Public License
e. General Public License

Mobile device security and compliance regulations can be as hard to pin down as a strong connection for your smartphone. Test your knowledge of risk areas and compliance rules in this quiz.

1. True or False: Every month, more than 13 million mobile phones are left in taxis in large cities throughout the U.S. and Europe.

2. This is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive, iPhone, iPod or other MP3 player. What is it?

3. This client/server protocol and software enables communication between remote and central servers for authentication and authorization of dial-in users. What is it?

4. Which wireless protocol is more secure, Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)?

5. You can create an isolated wireless network by adding a different SSID to an access point as a simple way to improve security. What does SSID stand for?

6. Allowing workers to connect to an organization's servers using a wireless network introduces a host of risks. Most security experts recommend the use of a mobile ______, a network configuration in which mobile devices access an intranet securely while moving from one physical location to another. What is it?

7. True or False: If you don't protect the financial data used in commercial transactions on mobile devices, you could be subject to a $10,000 fine.

8. If a mobile device is lost, mobile compliance regulations may require that a company demonstrate that:
A) The device was encrypted
B) The device never accessed a customer records database
C) Both

9. A _______ portal can be used to redirect all requests from unknown clients on a wireless network to a special Web page where users must authenticate themselves with valid credentials before they gain access to the Internet. What is it?

10. True or False: When you work for a privately held company, your mobile device policies must comply with Sarbanes-Oxley (SOX) regulations.
Chat Box / Quiz: iSeries (AS/400) History
Nov 07, 2008, 11:44 AM
2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years. How much do you know about the iSeries and its early beginnings? Take our quiz and find out.

1. When the AS/400 was introduced in June 1988, how many processor models were there?

a. 5
b. 6
c. 7
d. 8

2. When IBM introduced the AS/400, it touted its superior performance over the System/36 and the System 38 computers. What kind of performance did the AS/400 offer over the System/36?

a. 5 times the performance
b. 7 times the performance
c. 8 times the performance
d. 10 times the performance

3. Approximately how many applications were available for the AS/400 when the first one shipped in 1988?

a. 1,500
b. 2,000
c. 2,500
d. 3,000

4. What year was IBM's Rochester, Minn., plant completed?

a. 1956
b. 1957
c. 1958
d. 1959

5. The 250,000th AS/400 was sold in 1994 to which company?

a. Coca-Cola Co.
b. Pepsi-Cola Co.
c. Dr Pepper/Seven-Up, Inc.
d. National Beverage Corp.

6. During 1998, IBM says it sold an AS/400 to a customer every

a. 5 minutes of every workday
b. 8 minutes of every workday
c. 10 minutes of every workday
d. 12 minutes of every workday

7. When was the relational database included in OS/400 branded DB2 UDB?

a. December 1997
b. February 1998
c. June 1998
d. February 1999

8. What year was native Lotus Domino for the AS/400 announced?

a. 1997
b. 1998
c. 1999
d. 2000

9. In what year was the AS/400 renamed the eServer iSeries?

a. 1998
b. 1999
c. 2000
d. 2001

10. Today, how many operating system environments can be run simultaneously from a single iSeries server?
a. 2
b. 3
c. 4
d. 5

Bonus question: OS/400 was the first operating system to be certified Year 2000-ready by the ITAA. What year was this and which versions of the operating system?
Chat Box / Quiz: iSeries (AS/400) Commands
Nov 07, 2008, 11:41 AM

The iSeries (AS/400) is one of IBM's greatest success stories. It is widely installed in large enterprises at the department level, in small corporations, in government agencies, and in almost every industry segment.

NOTICE:This quiz has a slightly different format. Your goal will be to match the command or function key in the BELOW OPTIONS with its description in the ABOVE.

1._____ This command is used to display all active jobs.

2. _____This command is used to display the file description for a specified file.

3._____ This command is used to display messages in a queue.

4._____ This command allows you to work with a specified user's profile.

5. _____This command is used to start the database utility so you can look at and make changes to the database.

6. _____This command is used to display file field descriptions.

7._____ This command allows you to look at scheduled jobs.

8._____ This command allows you to run a query on a file without parameters.

9._____ This function key takes you to the major commands menu.

10._____ This command is used to display the contents of a database file.

i) F10
m) F4
v) F9

BONUS QUESTION: In what year did IBM introduce the Application System/400?

Chat Box / Quiz: Eureka!
Nov 07, 2008, 11:35 AM
Quizz: Eureka!
IT's all about the light bulb moments. If it weren't for those flashes of brilliance, we'd be freezing in the dark, without the comfort of TV or iPod. (Our computers wouldn't work very well either.) How much do you know about the light bulb moments that brought us to the current state of technology?

1. Speaking of light bulbs, if we switched from incandescent to solid state lighting, we could cut associated power demand by 50%. What is solid state lighting based on?

2. Thomas Edison is generally credited for alternating current and Marconi is almost inevitably called the inventor of radio. Who's the real inventor of both?

3. The real Law of Attraction, this is the force that pulls you toward your SO -- and everything else on earth. Kudos to Isaac Newton for pinning down the concept. What is it?

4. This multipurpose electromagnetic energy comes in handy for wireless transmission and is also very popular for a common domestic use. Perry Spencer had the inspiration for the latter purpose when a chocolate bar melted in his pocket. What is it?

5. You might have heard the buzz around this invention -- if you're under 30, that is. It's a device that emits a high-pitched sound that's inaudible to most mature folk but almost unbearable to teenagers. What is it?

6. Chester Carlson invented this now very prevalent technology in the 1930s. At the time, Kodak, IBM, General Electric and RCA thought it was useless and all turned Carlson away. What is it?

7. The zoopraxiscope, invented by Eadweard Muybridge and first shown in 1879, led to the creation of __________, one of the most popular diversions of all time. What is it?

8. This device, created by Selwyn Wright, is capable of blocking noise, such as snoring, music and chattering co-workers. What is it?

9. Another sound idea, this could make it possible for you to watch a shoot-em-up TV show while a companion seated next to you enjoyed classical music. It's a technology that makes it possible to focus sound much as a laser focuses light. What is it?

10. This device, invented by three scientists at the Bell Laboratories in 1947, is the basic element of the integrated circuit. What is it?
Chat Box / Quiz: DSL
Nov 07, 2008, 11:34 AM
Quizzz: DSL

DSL (Digital Subscriber Line) is a technology for bringing high-bandwidthinformation to homes and small businesses over ordinary copper telephonelines. Test your knowledge and find out if your brain cells are "alwayson".

1. This is the protocol used to "gather" DSL traffic from usersand forward it to a Digital Subscriber Line Access Multiplexer, which consolidatestraffic across the backbone network.
a. Forward DNS lookup
b. Transmission Control Protocol
c. asynchronous transfer mode
d. Accelerated Hub Architecture

2. This form of DSL uses most of the channel to transmit downstream to the userand only a small part to receive information from the user.
a. VoIP
b. Asymmetric Digital Subscriber Line
d. cable modem

3. This trademarked version of DSL that is somewhat slower thanADSL but has the advantage that a "splitter" does not need to be installedat the user's end.
a. unified messaging
b. Consumer DSL
c. G.lite
d. Netcaster

4. This device divides the incoming signal into low frequencies to sendto voice devices, and high frequencies for data to the computer.
a. multicast router
b. interface device
c. sequencer
d. splitter

5. This is a network device, usually at a telephone company centraloffice, that receives signals from multiple customer DSL connections and puts the signals on a high-speed backbone line.
a. MBone
b. repeater
c. hub

6. This is the leading method of signal modulation for DSL servicein which the usable frequency range is separated into 256 frequency bands(or channels) of 4.3125KHz each.
a. pulse code modulation
b. discrete multitone
c. frequency-division multiplexing
d. Signaling System 7

7. This is a technology from US Robotics (now 3Com) for the downstream transmission of data over ordinary phone lines at 56 Kbps.
a. Y-modem
b. xDSL
c. Z-modem
d. x2

8. This term is used to describe multiple signals or streams of information sent at the same time in the form of a single, complex signal and then recovered as separate signals at the receiving end.
a. multicast
b. multilink bundle
c. multiplexing
d. multithreading

9. This type of DSL is used for wideband digital transmissionwithin a corporate site and between the telephone company and a customer.It is symmetrical, meaning that an equal amount of bandwidth is availablein both directions.
a. BAL
b. High bit-rate DSL
c. vBNS
d. wideband code-division multiple access

10. This was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
a. carrierless amplitude/phase
b. pulse code modulation
c. quadrature amplitude modulation
d. phase-shift keying
Chat Box / Quiz: Do you speak geek?
Nov 07, 2008, 11:32 AM
Quizzz: Do you speak geek?

How many answers can you guess without peeking? Let us know!

1. M2M is a type of technology that supports wired or wireless communication between computers or computing devices. What does M2M stand for?
a. mobile-to-mobile
b. machine-to-machine

2. What do Lucinda, Poor Richard and Vivaldi have in common? They are all _________s.

3. What's the name of the program your computer's processor uses to get the system started when you turn it on?

4. Named for a seafood delicacy that requires careful handling (it can be deadly if not properly prepared!), this is an encryption algorithm that can be used as a replacement for DES or IDEA. What is it?

5. BMP, TIFF, GIF and JPEG. Are they vector images or raster images?

6. Which wireless transmission refers to energy whose wavelengths are longer than those of visible light, but shorter than those of radio waves?
a. microwave
b. infrared

7. This sounds like a spy from another country; in networking, it's a router serving as a mobility agent for a mobile node. What is it?

8. From the Latin word for full, we get this term for a space to house heating, ventilation and air conditioning (HVAC) and communications cabling. What is it?

9. A DSS is a computer program that analyzes business data and presents it so that users can make business decisions more easily. What does DDS stand for?
a. dynamic support system
b. decision support system
c. documentation and support system

10. Yikes! This is an open source Java compiler from IBM. What is it?
Chat Box / Quiz: Data Storage
Nov 07, 2008, 11:30 AM
Quizzz: Data Storage

Computer storage is the holding of data in an electromagnetic form for access by a computer processor. Primary storage is data in random access memory (RAM) and other "built-in" devices. Secondary storage is data on hard disk, tapes, and other external devices.

1. This is a utility that rearranges your discontiguous files and freespace on your computer so that your files are stored in contiguous unitsand free space is consolidated in one contiguous block.
a. degaussing
b. patch
c. defragmenter
d. parser
e. logicalblock addressing

2. This is a company that provides computer storage space and relatedmanagement to other companies.
a. vortal
b. storagearea network
c. storagemedium
d. bastion host
e. storageservice provider

3. This is a format for storing and backing up computer data on tapethat evolved from the Digital Audio Tape (DAT) technology.
a. TapeArchive
b. DigitalData Storage
c. virtualtape system
d. AudioInterchange File Format
e. dataaggregation

4. This is a storage management system especially designed for movinglarge files and large amounts of data around a network.
a. hierarchicalstorage management
b. enterpriseresource management
c. highperformance storage system
d. distributedfile system
e. holographicstorage

5. This is a form of static random access memory whose contents aresaved when a computer is turned off or loses its external power source.
a. SynchBurstSRAM
b. staticIP
c. nonvolatilestorage
d. magnetoresistiverandom access memory
e. directmemory access

6. This is a centralized repository for business information that providescommon data management and protection, as well as data sharing functions,through connections to numerous (and possibly dissimilar) computer systems.
a. callcenter
b. enterprisestorage network
c. GrandCentral Station
d. networkinformation system
e. ADSTARDistributed Storage Management

7. This is programmable read-only memory that can be erased by shiningan intense ultraviolet light through a window in the memory chip so thatthe memory can be re-used.
a. SequentialCouleur avec Memoire
b. virtualmemory
c. gratinglight valve technology
d. extremeultraviolet lithography
e. erasableprogrammable read-only memory

8. This is a way of storing the same data in different placeson multiple hard disks.
a. doubledata rate synchronous dynamic random access memory
b. redundantarray of independent disks
c. network-attachedstorage
d. extendeddata output (EDO) RAM
e. randomaccess method of accounting and control

9. This is a data storage technology that allows information tobe written to a disk a single time and prevents the drive from erasingthe data.
a. writeonce / read many
b. backupdomain control
c. singleinstruction multiple data
d. permanentvirtual circuit
e. compactdisk / read-only-memory, extended architecture

10. This is what might occur when a program or process tries to storemore data in a temporary data storage area than it was intended to hold.
a. programtemporary fix
b. bluescreen of death
c. fatalexception
d. sharedmemory
e. bufferoverflow
Chat Box / Quiz: Database Basics
Nov 07, 2008, 11:28 AM
Quizzz: Database Basics

1. This is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.
a. relational database
b. array
c. file allocation table
d. splay tree
e. Venn diagram

2. This is a standard interactive and programming language for getting information from and updating a database.
a. Dynamic Data Exchange
b. Structured Query Language
d. Erlang programming language
e. WebLogic

3. In creating a database, this is the process of organizing it into tables insuch a way that the results of using the database are always unambiguous.
a. probability
b. normalization
c. data modeling
d. Query by Example
e. virtual organization

4. In 1977, this company set out to prove that the prevailing theory that relationship databases lacked commercial viability, was wrong.
a. Hewlett-Packard
b. Oracle
c. Cognos
d. Solaris
e. Sybase

5. This family of products is IBM's cross-platform relational database management system.
a. DBA
b. B2B
c. PHP
d. RDF
e. DB2

6. This type of database, which can be used to mine data for business trends, doesn't require SQL queries, but instead allows a user to ask questions like "How many Aptivas have been sold in Nebraska so far this year?".
a. line information database
b. High Performance Storage System
c. object-oriented database management system
d. multidimensional database
e. functional specification

7. This is an open standard application programming interface (API) for accessing a database.
a. Universal Data Access
b. Open Database Connectivity
c. Topic Map Query Language
d. Open Data-Link Interface
e. command line interface

8. This term, used to describe a database that occupies magnetic storage in the terabyte range, describes a database that contains billions of table rows.
a. Very Large Database
b. holographic storage
c. Cold Fusion
d. giant
e. Electronic Data Interchange

9. This is a collection of descriptions about data objects that is created for the benefit of programmers and others who might need torefer to them.
a. data dictionary
b. stored procedure
c. Virtual File Allocation Table
d. Virtual Address eXtension
e. catalog

10. This term is used to describe the process of forecasting, or simply discovering patterns in data that can lead to predictions about the future.
a. customer relationship management
b. PERT chart
c. data mining
d. enterprise risk management
e. histogram
Quizzz: Customers and Call Centers

1. In a call center, this is a line of people waiting to be handled, usually in sequential order starting at the beginning or top of the line or sequence.
a. feed line
b. first-order logic
c. grumble line
d. queue

2. This is an information industry term for methodologies, software, and usually Internet capabilities that help an enterprise handle customers in an organized way.
a. ROI
b. SCM
c. SAP
d. CRM

3. This is is a central point in an enterprise from which customer interactions are managed via phone, fax, e-mail and other channels.
a. data center
b. contact center
c. network operations center
d. Information Technology Information Sharing and Analysis Center

4. This is a scoring process used to help a company determine which customers the company should target in order to maximize profit.
a. customer valuation
b. spend management
c. mean opinion score
d. business impact analysis

5. This is a software-enabled technique that allows a call center representative to interact with a customer by taking over the customer's computer to show them something.
a. remote wakeup
b. collaborative browsing
c. Remote Method Invocation
d. show control

6. This is the ability of a machine or program to recognize and carry out voice commands or take dictation from customers, often resulting in call center cost savings.
a. brain-machine interface
b. collaborative robot
c. smart matter
d. speech recognition

7. This is what you call it when an organization's customer service representatives are geographically dispersed.
a. geographic information system
b. Remote Procedure Call
c. virtual call center
d. Direct Inward Dialing

8. This is a form of electronic support, allowing customers to access information and perform routine tasks over the Internet, without requiring any interaction with a representative of an enterprise.
a. Web self-service
b. remote-control software
c. self-scanning checkout
d. self-assembly

9. This is properly addressing the customer's need the first time they call, thereby eliminating the need for the customer to follow up with a second call.
a. e-support
b. first call resolution
c. automatic repeat request
d. Quality of Service

10. This is a term used to describe the progression of steps a customer goes through when considering, purchasing, using, and maintaining loyalty to a product or service.
a. thought recognition
b. total cost of ownership
c. decision support system
d. customer life cycle
Chat Box / Quiz: Cryptography
Nov 07, 2008, 11:23 AM
Quizzz: Cryptography

"OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger Club, circa 1943.)

1) This is an encryption/decryption key known only to the party or parties that exchange secret messages.
a) e-signature
b) digital certificate
c) private key
d) security token

2) This was commonly used in cryptography during World War II.
a) tunneling
b) personalization
c) van Eck phreaking
d) one-time pad

3) Today, many Internet businesses and users take advantage of cryptography based on this approach.
a) public key infrastructure
b) output feedback
c) Encrypting File System
d) single signon

4) This is the name for the issuer of a PKI certificate.
a) man in the middle
b) certificate authority
c) Resource Access Control Facility
d) script kiddy

5) Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.
a) DSS
c) Secure HTTP
d) Pretty Good Privacy

6) This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
a) Rijndael
b) Kerberos
c) Blowfish
d) IPsec

7) This is the inclusion of a secret message in otherwise unencrypted text or images.
a) masquerade
b) steganography
c) spoof
d) eye-in-hand system

8 In password protection, this is a random string of data used to modify a password hash.
a) sheepdip
b) salt
c) bypass
d) dongle

9) This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.
a) footprinting
b) hash function
c) watermark
d) Electronic Code Book

10) This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
a) chaffing and winnowing
b) cryptanalysis
c) serendipity
d) brute force cracking
Chat Box / Quiz: Authentication Methods
Nov 07, 2008, 11:21 AM
Quizzz: Authentication Methods

There are quite a few ways to authenticate users who want access to your organization's network resources. Depending on how critical the data is that you're protecting, one method may or may not provide the level of protection you want. Take this quiz to test your knowledge of authentication methods and learn more about them.

1.) This two-level scheme for authenticating network users functions as part of the Web's Hypertext Transfer Protocol.
a. SSL
b. LUHN formula
c. IPsec
e. secret key

2.) This type of authentication device consists of a reader/scanner and software that encrypts and converts the scanned information into digital form so it can be compared with previous records.
a. biometric
b. brain fingerprinting
c. security ID
d. stateful inspection
e. honeypot

3.) This secure method for authenticating a request for a service in a computer network was developed through the Athena Project at the Massachusetts Institute of Technology.
a. AES
b. Carnivore
c. Automated Fingerprint Identification System
d. Internet Key Exchange
e. Kerberos

4.) This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.
a. private key
b. digital certificate
c. smart card
d. ownership tag
e. PIN

5.) This is an older authentication protocol common to Unix networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
a. DRP
d. GPO
e. C2

6.) Microsoft's Passport was an example of this technology. It allows users to register their personal information once to access multiple applications.
a. relative identifier
b. biometric verification
c. single signon
d. Microsoft Point-to-Point Encryption
e. slag code

7.) This security management product for OS/390 gives access to a computer system only to users who have the authorization to use a requested resource.
a. ACF2
b. Resource Access Control Facility
c. Media Access Control layer
d. Remote Authentication Dial-In User Service
e. Electronic Code Book

8.) This small hardware device is a type of security token that provides two-factor authentication.
a. key fob
b. dongle
c. SSL card
d. Clipper
e. keychain drive

9.) A primary goal of this consortium is to promote interoperability among biometric applications.
c. Twofish
d. BioAPI
e. Tempest

10.) This is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
a. OFB
b. BO2K
d. DES
Chat Box / Quiz: Artificial Intelligence
Nov 07, 2008, 11:17 AM
The empires of the future are the empires of the mind... Winston Churchill

1) This is a system of programs and data structures that approximates the operation of the human brain.
a) Intelligent Network
b) decision support system
c) neural network
d) genetic programming

2) This is the tendency for people to think of inanimate objects as having human-like characteristics.
a) aliasing
b) personalization
c) self-replication
d) anthropomorphism

3) This is a programming language that was designed for easy manipulation of data strings. It was developed in 1959 by John McCarthy and is still commonly used today in artificial intelligence (AI) programming.
b) assembly language
c) machine code
d) Ruby

4) This is an approach to computing developed by Dr. Lotfi Zadeh based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic. Dr. Lotfi Zadeh developed this approach while working on the problems computers had understanding natural language.
a) cyberwoozling
b) fuzzy logic
c) Smalltalk
d) arachnotaxis

5) This is a type of computer program that simulates the judgement and behavior of a human or organization that possesses expert knowledge and experience in a particular field.
a) expert system
b) cyborg
c) autonomous system
d) cybrarian

6) This is a program that allows the computer to recognize human movement such as waving, finger pointing, or change in eye direction and identify the motions as specific means of interaction.
b) show control
c) gesture recognition
d) motion plan

7) This is the ability of a computer to use binocular vision to differentiate between objects. The computer uses high-resolution cameras, a large amount of random access memory (RAM), and an artificial intelligence (AI) program to interpret data.
a) DiffServ
b) model-view-controller
c) machine vision
d) eye-in-hand system

8 This is a program that gathers information or performs some other service on a regular schedule without a human being's immediate presence.
a) aggregator
b) agile applet
c) page
d) intelligent agent

9) This is a program that allows the computer to simulate conversation with a human being. "Eliza" and "Parry" are early examples of programs that can at least temporarily fool a real human being into thinking they are talking to another person.
a) Speech Application Program Interface
b) chatterbot
c) speech recognition
d) Amiga

10) This is the potential ability of the human brain to accept an implanted mechanical device, such as a computer, as a natural part of its representation of the body.
a) virtual machine
b) self-assembly
c) serendipity
d) brain-machine interface
Chat Box / What is a K-12?
Nov 07, 2008, 11:05 AM
K-12, a term used in education and educational technology in the United States, Canada, and possibly other countries, is a short form for the publicly-supported school grades prior to college. These grades are kindergarten (K) and the 1st through the 12th grade (1-12). (If the term were used, "13th grade" would be the first year of college.)

Most communities in the United States and Canada (and wherever else the term is used) are just beginning to provide modern information technology at the K-12 levels.
Gift / Prizes Request / Topup Request
Nov 06, 2008, 07:56 PM
User Name : manimarank
Date  : 6 nov 08
Status : Urgent
Postcount : 51
Information : airtel prepaid inside TN
Total No of Post you made so far : Ex 674 posts : 486
Type of the Gift : Mobile Topup
Select Your Service Provider : Airtel Prepaid

Here by i declare that , before sending this request. I have verified my todays post. So Please check the topup status and confirm it.
[blink]Note : You will be given Warning if you are trying to test this Form or Found Fake[/blink]
Polling Station / Ur dream company
Nov 06, 2008, 07:28 PM
hi acumens,

this poll results may tell wat is our future!...

so kindly everyone contribute ur vote.

thanks in advance.
Chat Box / WHAT IS AN e?
Nov 06, 2008, 04:44 PM

An eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer, such as Microsoft's free Reader application, or a book-sized computer that is used solely as a reading device, such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less.

Although it is not necessary to use a reader application or device in order to read an Ebook (most books can be read as PDF files), they are popular because they enable options similar to those of a paper book - readers can bookmark pages, make notes, highlight passages, and save selected text. In addition to these familiar possibilities, eBook readers also include built-in dictionaries, and alterable font sizes and styles. Typically, an eBook reader hand-held device weighs from about twenty-two ounces to three or four pounds and can store from four thousand to over half a million pages of text and graphics. A popular feature is its back-lit screen (which makes reading in the dark possible).

Some eBooks can be downloaded for free or at reduced cost, however, prices for many eBooks - especially bestsellers - are similar to those of hardcover books, and are sometimes higher. Most eBooks at Barnes and Noble, for example, are comparable in price to their traditional print versions.
Chat Box / Happy Programmer Day
Nov 06, 2008, 04:38 PM
Q: When is Programmer Day?
A: Programmer Day is the 256th day of every year, September 13th or the 12th on leap years.

Q:Why the 256th Day of the year?
A: A byte can have 256 possible values, bytes are very important to programmers. Not because they are required for programs to work, but because the payroll system and Krispy Kreme doughnut cash registers require them.

Q: How is Programmer Day celebrated?
A: Anyway you want! Here are some suggestions:
# Speak in code (or pseudocode) all day - Thanks to Sam Pospischil!
# Decorate a tree with zeros and ones to make a binary tree
# Make Happy Programmer Day cards using ASCII art
# Have a contest for the best binary pun / programming joke

Q: Your logo has 1111 1111 that's 255, not 256, right?
A: While 1111 1111 = 255 as a direct conversion, it's the 256th value so it is correct. January 1st is 0000 0000 so if you celebrate Programmer Day on the 255th day you're guilty of an off by one error.
Macromedia nicknames

    * MM = Macromedia
    * FW = Fireworks
    * FL = Flash
    * FH = Freehand
    * StMX/MX2004 = Studio MX/MX2004
Web Browser (popular) nicknames

    * FF = Firefox
    * IE = Internet Explorer
    * Moz = Mozilla
    * NN = Netscape (Navigator)
    * AOL = America Online (not a browser but considered one)
WEB/TECH acronyms

    * DB = Database
    * HTTP = HyperText Transfer Protocal
    * HTTPS = HyperText Transmission Protocol, Secure
    * SMTP = Simple Mail Transfer Protocol
    * POP or POP3 = Post Office Protocol
    * DTD = Document Type Definition
    * URL (or URI) = Uniform Resource Locator (Universal Resource Identifier) ... web address/links
    * SSL = Secure Sockets Layer
    * WWW = World-Wide Web
    * FTP = File Transfer Protocal
    * DOM = the Document Object Model
    * IP number = Internet address
    * TCP/IP = Transmission Control Protocol over Internet Protocol
    * RTSP = Real Time Streaming Protocol
    * VoIP = Voice over IP
    * MIME = Multipurpose Internet Mail Extensions
    * W3C = World Wide Web Consortium
    * (web slang) ul = upload
    * (web slang) dl = download
    * P2P = Peer-to-Peer
Web Language acronyms

Server-Side (Server Models)

    * PHP = PHP: Hypertext Preprocessor
    * ASP & ASP.NET (or .NET) = Active Server Pages
    * CFML or CFM or CF = ColdFusion
    * JSP = Java Server Pages

Server-Side (others)

    * SQL = Structured Query Language
    * CGI = Common Gateway Interface
    * SSI = Server-Side Include


    * XHTML = Extensible HyperText Markup Language
    * HTML = HyperText Markup Language
    * CSS = Cascading Style Sheets
    * XML = Extensible Markup Language
    * JS = JavaScript
    * DOM = the Document Object Model
    * DHTML = Dynamic HTML
    * XSL = Extensible Stylesheet Language
    * XSLT = Extensible Stylesheet Language Transformations
    * SGML = Standard Generalized Markup Language (father to XHTML/XML)
Chat Box / International System of Units
Nov 06, 2008, 03:52 PM
The International System of Units (abbreviated SI from systeme internationale , the French version of the name) is a scientific method of expressing the magnitudes or quantities of important natural phenomena. There are seven base units in the system, from which other units are derived. This system was formerly called the meter-kilogram-second (MKS) system.

All SI units can be expressed in terms of standard multiple or fractional quantities, as well as directly. Multiple and fractional SI units are defined by prefix multipliers according to powers of 10 ranging from 10 -24 to 10 24 .

SI base units:
The meter (abbreviation, m) is the SI unit of displacement or length. One meter is the distance traveled by a ray of electromagnetic (EM) energy through a vacuum in 1/299,792,458 (3.33564095 x 10 -9 ) second. The meter was originally defined as one ten-millionth (0.0000001 or 10 -7 ) of the distance, as measured over the earth's surface in a great circle passing through Paris, France, from the geographic north pole to the equator.

The kilogram (abbreviation, kg) is the SI unit of mass. It is defined as the mass of a particular international prototype made of platinum-iridium and kept at the International Bureau of Weights and Measures. It was originally defined as the mass of one liter (10 -3 cubic meter) of pure water.

The second (abbreviation, s or sec) is the SI unit of time. One second is the time that elapses during 9.192631770 x 10 9 cycles of the radiation produced by the transition between two levels of Cesium 133. It is also the time required for an EM field to propagate 299,792,458 (2.99792458 x 10 8 ) meters through a vacuum.

The kelvin (abbreviation K), also called the degree Kelvin (abbreviation, o K), is the SI unit of temperature. One Kelvin is 1/273.16 (3.6609 x 10 -3 ) of the thermodynamic temperature of the triple point of pure water (H 2 O).

The ampere (abbreviation, A) is the SI unit of electric current. One ampere is the current that would produce a force of 0.0000002 (2 x 10 -7 ) newton between two straight, parallel, perfectly conducting wires having infinite length and zero diameter, separated by one meter in a vacuum. One ampere represents 6.24 x 10 18 unit electric charge carriers, such as electrons, passing a specified fixed point in one second.

The candela (abbreviation, cd) is the SI unit of luminous intensity. It is the electromagnetic radiation, in a specified direction, that has an intensity of 1/683 (1.46 x 10 -3 ) watt per steradian at a frequency of 540 terahertz (5.40 x 10 14 hertz).

The mole (abbreviation, mol) is the SI unit of material quantity. One mole is the number of atoms in 0.012 kilogram of the most common isotope of elemental carbon (C-12). This is approximately 6.022169 x 10 23 , and is also called the Avogadro constant.

SI derived units include the hertz , the newton , the pascal (unit of pressure or stress) , the ohm , the farad , the joule , the coulomb , the tesla , the lumen , the becquerel , the siemen , the volt , and the watt .
The power-of-10 multipliers and the power-of-2 multipliers for a given word prefix are almost, but not quite, the same. For example, the power-of-10 definition of kilo- (k) refers to 1,000, while the power-of-2 definition (K) refers to 1,024. As if this is not confusing enough, when referring to a data speed of one kilobit per second (1 kbps), analysts generally mean 1,000 bits per second (103 bps), but when talking about one kilobyte (1 KB) of data storage, they usually mean 1,024 bytes (210 B). This prevailing confusion could be eliminated (some computer scientists believe) by adopting special prefixes referring to the binary quantities. The proposed scheme is as follows.

kilobinary    kibi-    Ki    210
megabinary    mebi-    Mi    220
gigabinary    gibi-    Gi    230
terabinary    tebi-    Ti    240
petabinary    pebi-    Pi    250
exabinary    exbi-    Ei    260
The prefix multipliers kilo- (k or K), mega- (M), giga- (G), tera- (T), peta- (P), and exa- (E) are ambiguous. In most of the physical sciences, and when describing quantities of objects generally, these multipliers refer to powers of 10. However, when used to define data quantity in terms of bytes, they refer to powers of 2. The following table denotes the most often-used prefixes and their meanings.

Prefix      Symbol(s)     Power of 10     Power of 2
kilo-        k or K **       103                  210
mega-    M                     106            220
giga-    G                     109            230
tera-    T                     1012            240
peta-    P                     1015            250
exa-    E                     1018 *            260
* Not generally used to express data speed
** k = 103 and K = 210
Chat Box / 52 Emoticons
Nov 06, 2008, 11:49 AM
"An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message."

52 Emoticons

:-)   Smile
;-)   Smile with a wink
:<})   User with mustache, smiling
:-||   Mad
:-(   Sad
:' -(   Crying
:~   Also crying
:-))   Really happy
:-D   Big grin
:-*   A kisz
:-P~   A lick
:-o   Wow! or I'm surprised
:-|   Grim
:-P   Sticking out your tongue
:-   User happens to be Popeye
:-/   Perplexed
=:O   Frightened (hair standing on end)
=8O   Bug-eyed with fright
:-}   Embarassed smile
:-)<>>>>>   Basic Smiley with a necktie
;-^)   Tongue in cheek
%*@:-(   Hung over
:-~~~   Drooling
>:)   Perplexed look
.)   Keeping an eye out for you
8:-)   Glasses on forehead
8:[   Normal smiling face of a gorilla
0:-)   Angel
]:-|[   Robot
(:V)   Duck
3:-o   Cow
:-]   Vampire
(_8-(|)   Homer Simpson
C|:-=   Charlie Chaplin
=|:-)=   Abe Lincoln
*<:-)   Santa Claus
-:-)   User sports a mohawk and admires Mr. T
(:)-)   Scuba diver
:-'|   User has a cold
:-{}   User with heavy lipstick
:-)8   User is well dressed
>:-<    Mad
*#:-)   Scotsman wearing his Scottish tam
%-^   User is another Picasso
#-)   User partied all night
<:I   Dunce
:-|   "Have an ordinary day!" Smiley
:}{:   Kisses (stolen from June bug)
oooo(0) (0)oooo   Toes
(-_-)   Secret smile
#.-o   "Oh, nooooooo Mr. Bill!!!"
12x @>--->---   A dozen roses
0     The operation completed successfully.
1    Incorrect function.
2    The system cannot find the file specified.
3    The system cannot find the path specified.
4    The system cannot open the file.
5    Access is denied.
6    The handle is invalid.
7    The storage control blocks were destroyed.
8    Not enough storage is available to process this command.
9    The storage control block address is invalid.
10    The environment is incorrect.
11    An attempt was made to load a program with an incorrect format.
12    The access code is invalid.
13    The data is invalid.
14    Not enough storage is available to complete this operation.
15    The system cannot find the drive specified.
16    The directory cannot be removed.
17    The system cannot move the file to a different disk drive.
18    There are no more files.
19    The media is write protected.
20    The system cannot find the device specified.
21    The device is not ready.
22    The device does not recognize the command.
23    Data error (cyclic redundancy check).
24    The program issued a command but the command length is incorrect.
25    The drive cannot locate a specific area or track on the disk.
26    The specified disk or diskette cannot be accessed.
27    The drive cannot find the sector requested.
28    The printer is out of paper.
29    The system cannot write to the specified device.
30    The system cannot read from the specified device.
31    A device attached to the system is not functioning.
32    The process cannot access the file because it is being used by another process.
33    The process cannot access the file because another process has locked a portion of the file.
36    Too many files opened for sharing.
38    Reached the end of the file.
39    The disk is full.
50    The network request is not supported.
51    The remote computer is not available.
52    A duplicate name exists on the network.
53    The network path was not found.
54    The network is busy.
55    The specified network resource or device is no longer available.
56    The network BIOS command limit has been reached.
57    A network adapter hardware error occurred.
58    The specified server cannot perform the requested operation.
59    An unexpected network error occurred.
60    The remote adapter is not compatible.
61    The printer queue is full.
62    Space to store the file waiting to be printed is not available on the server.
63    Your file waiting to be printed was deleted.
64    The specified network name is no longer available.
65    Network access is denied.
66    The network resource type is not correct.
67    The network name cannot be found.
68    The name limit for the local computer network adapter card was exceeded.
69    The network BIOS session limit was exceeded.
70    The remote server has been paused or is in the process of being started.
71    No more connections can be made to this remote computer at this time because there are already as many connections as the computer can accept.
72    The specified printer or disk device has been paused.
80    The file exists.
82    The directory or file cannot be created.
83    Fail on INT 24.
84    Storage to process this request is not available.
85    The local device name is already in use.
86    The specified network password is not correct.
87    The parameter is incorrect.
88    A write fault occurred on the network.
89    The system cannot start another process at this time.
100    Cannot create another system semaphore.
0     The operation completed successfully.
1    Incorrect function.
2    The system cannot find the file specified.
3    The system cannot find the path specified.
4    The system cannot open the file.
5    Access is denied.
6    The handle is invalid.
7    The storage control blocks were destroyed.
8    Not enough storage is available to process this command.
9    The storage control block address is invalid.
10    The environment is incorrect.
11    An attempt was made to load a program with an incorrect format.
12    The access code is invalid.
13    The data is invalid.
14    Not enough storage is available to complete this operation.
15    The system cannot find the drive specified.
16    The directory cannot be removed.
17    The system cannot move the file to a different disk drive.
18    There are no more files.
19    The media is write protected.
20    The system cannot find the device specified.
21    The device is not ready.
22    The device does not recognize the command.
23    Data error (cyclic redundancy check).
24    The program issued a command but the command length is incorrect.
25    The drive cannot locate a specific area or track on the disk.
26    The specified disk or diskette cannot be accessed.
27    The drive cannot find the sector requested.
28    The printer is out of paper.
29    The system cannot write to the specified device.
30    The system cannot read from the specified device.
31    A device attached to the system is not functioning.
32    The process cannot access the file because it is being used by another process.
33    The process cannot access the file because another process has locked a portion of the file.
36    Too many files opened for sharing.
38    Reached the end of the file.
39    The disk is full.
50    The request is not supported.
51    Windows cannot find the network path. Verify that the network path is correct and the destination computer is not busy or turned off. If Windows still cannot find the network path, contact your network administrator.
52    You were not connected because a duplicate name exists on the network. Go to System in Control Panel to change the computer name and try again.
53    The network path was not found.
54    The network is busy.
55    The specified network resource or device is no longer available.
56    The network BIOS command limit has been reached.
57    A network adapter hardware error occurred.
58    The specified server cannot perform the requested operation.
59    An unexpected network error occurred.
60    The remote adapter is not compatible.
61    The printer queue is full.
62    Space to store the file waiting to be printed is not available on the server.
63    Your file waiting to be printed was deleted.
64    The specified network name is no longer available.
65    Network access is denied.
66    The network resource type is not correct.
67    The network name cannot be found.
68    The name limit for the local computer network adapter card was exceeded.
69    The network BIOS session limit was exceeded.
70    The remote server has been paused or is in the process of being started.
71    No more connections can be made to this remote computer at this time because there are already as many connections as the computer can accept.
72    The specified printer or disk device has been paused.
80    The file exists.
82    The directory or file cannot be created.
83    Fail on INT 24.
84    Storage to process this request is not available.
85    The local device name is already in use.
86    The specified network password is not correct.
87    The parameter is incorrect.
88    A write fault occurred on the network.
89    The system cannot start another process at this time.
100    Cannot create another system semaphore.
Chat Box / Chat Abbreviations A2Z
Nov 06, 2008, 10:53 AM
Chat Abbreviations

A3   Anyplace, anywhere, anytime
ADN    Any day now
AFAIK    As far as I know
AFK    Away from keyboard
ARE    Acronym-rich environment
ASAP    As soon as possible
A/S/L?    Age/sex/location?
Windows / Linux / 216 Web browser-safe colors
Nov 05, 2008, 07:49 PM
216 Web browser-safe colors

#000000    #000033    #000066    #000099    #0000CC    #0000FF
#003300    #003333    #003366    #003399    #0033CC    #0033FF
#006600    #006633    #006666    #006699    #0066CC    #0066FF
#009900    #009933    #009966    #009999    #0099CC    #0099FF
#00CC00 #00CC33 #00CC66 #00CC99 #00CCCC    #00CCFF
#00FF00    #00FF33    #00FF66    #00FF99    #00FFCC     #00FFFF
#330000    #330033    #330066    #330099    #3300CC    #3300FF
#333300    #333333    #333366    #333399    #3333CC    #3333FF
#336600    #336633    #336666    #336699    #3366CC    #3366FF
#339900    #339933    #339966    #339999    #3399CC    #3399FF
#33CC00 #33CC33 #33CC66 #33CC99 #33CCCC    #33CCFF
#33FF00    #33FF33    #33FF66    #33FF99    #33FFCC            #33FFFF
#660000    #660033    #660066    #660099    #6600CC    #6600FF
#663300    #663333    #663366    #663399    #6633CC    #6633FF
#666600    #666633    #666666    #666699    #6666CC    #6666FF
#669900    #669933    #669966    #669999    #6699CC    #6699FF
#66CC00 #66CC33 #66CC66 #66CC99 #66CCCC    #66CCFF
#66FF00    #66FF33    #66FF66    #66FF99    #66FFCC     #66FFFF
#990000    #990033    #990066    #990099    #9900CC    #9900FF
#993300    #993333    #993366    #993399    #9933CC    #9933FF
#996600    #996633    #996666    #996699    #9966CC    #9966FF
#999900    #999933    #999966    #999999    #9999CC    #9999FF
#99CC00 #99CC33 #99CC66 #99CC99 #99CCCC    #99CCFF
#99FF00    #99FF33    #99FF66    #99FF99    #99FCC    #99FFFF
#CC0000 #CC0033 #CC0066 #CC0099 #CC00CC #CC00FF
#CC3300 #CC3333 #CC3366 #CC3399 #CC33CC #CC33FF
#CC6600 #CC6633 #CC6666 #CC6699 #CC66CC #CC66FF
#CC9900 #CC9933 #CC9966 #CC9999 #CC99CC #CC99FF
#CCFF00    #CCFF33    #CCF66    #CCFF99    #CCFFCC #CCFFFF
#FF0000    #FF0033    #FF0066    #FF0099    #FF00CC    #FF00FF
#FF3300    #FF3333    #FF3366    #FF3399    #FF33CC    #FF33FF
#FF6600    #FF6633    #FF6666    #FF6699    #FF66CC    #FF66FF
#FF9900    #FF9933    #FF9966    #FF9999    #FF99CC    #FF99FF
#FFCC00    #FFCC33    #FFCC66    #FFCC99    #FFCCCC #FFCCFF
#FFFF00    #FFFF33    #FFFF66    #FFFF99    #FFFFCC    #FFFFFF
Windows / Linux / "Links" Folder - Remove
Nov 05, 2008, 07:35 PM
There are two methods that can be used to hide the Links folder, one using the registry and the other using file attributes. Both methods are detailed below:  Using the Registry: Open your registry and find the key below.

Set the value of "LinksFolderName" to equal a blank string. Open IE and delete the Links folder from the Favorites menu.

The next time you start Internet Explorer the Links folder will not be recreated.

Using File Attributes: Using Explorer find the location of your Favorites folder (e.g. C:\Documents and Settings\Joe Bloggs\Favorites) within that folder will be a sub-folder named Links.

Select the Links folder and right-click (or secondary click) and select Properties, check the Hidden checkbox and click OK.

From now on the Links folder should be hidden from the Favorites list. This works for any other folder or link on the favorites menu as well. Note: The Links folder must be manually deleted from the favorites menu. This tweak stops it being automatically recreated.

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar

Value Name: LinksFolderName
Data Type: REG_SZ (String Value)
Go into C:\Windows and create a new shortcut. Paste this in the path: %windir%\System32\rundll32.exe user32.dll,LockWorkStation.  Click next and rename it, click finish.

Then Control Panel/Scheduled Tasks/Add Scheduled Task/Next/Browse. Find the new shortcut, select it, pick daily, next. Type in a password for the Scheduled Task/Confirm, Next, Finish.  Double click the new scheduled task you just made, Schedule Tab/Schedule Task/Select when Idle, enter time allotment, ok.

     Tip:  Resume without a password - If you have a screen saver activating, go to that tab and uncheck "On resume display
              welcome screen".
     Tip:  Disable Screensaver from Becoming Active:  Start/Run/Regedit

HKEY_USERS\.DEFAULT\Control Panel\Desktop. Value Name: ScreenSaveActive, Data Type: REG_SZ (String Value), Value Data: (0 = disabled, 1 =enabled). Change the value of 'ScreenSaveActive' to '0' to disable the screen saver. Restart Windows for the change to take effect. Note: Windows has a default screen saver called login.scr, which runs even if no screen saver has been selected.
Windows / Linux / CONVERTING FAT32 to NTFS
Nov 05, 2008, 07:28 PM
Converting a partition from FAT32 to NTFS can be done by an inbuilt utility in the Windows XP operating system — but it is important to realise that it is a one-way process. You cannot convert back, except possibly by use of Partition Magic 7.01, and that is not always successful. Windows XP has no tool for converting from NTFS to FAT32.

There are a couple of things to do in advance if the conversion is to be efficient. If you do not take these preliminary steps, you are liable to end up with only 512 byte clusters, which is not a good idea.

What happens is that FAT32 partitions formatted by most Windows versions except Windows XP itself (and possibly Windows 2000) have an odd multiple of 2 kilobytes in the "system" sectors before the data area, where the File Allocation Tables themselves and clustering start. Therefore, clusters 4 KB in size are not aligned on 4 KB boundaries, as NTFS will want. CONVERT.EXE, finding it cannot use 4K clusters, gives up and makes the clusters only 512 bytes (one half KB) instead. (For a table of the varying default cluster sizes used by FAT16, FAT32, and NTFS for partitions of varying sizes, click here.)

It is, therefore, important to realign the partition before conversion, by moving all the data area up to a 4K boundary. (This will absorb odd sectors at the far end which otherwise would not get used). For this, I suggest BootIT NG, from This is a shareware program, priced at US$30 but with a 30-day fully functional trial. You may well find it valuable also for its Disk Imaging and Partition Management capabilities.

Download the BOOTITNG.ZIP file to its own folder, extract the contents of the ZIP file, then run BOOTITNG.EXE, which will make a bootable floppy. Boot this floppy. For purposes of Partition Management, there is no need to install the program to hard disk, so click Cancel Install, thus entering Maintenance. Click Partition Work. Highlight the partition you intend to convert. Click Slide, which has an option check box to Align for NTFS only. Click OK. As it has to move almost every sector on the entire partition, this will take a very long time — schedule it for a meal break, or start it to run overnight. (If it finishes quickly, that probably means that the partition was properly aligned already.)

Then restart the computer, boot Windows XP, being sure to logon as an Administrator, and defragment the disk. This ensures that there is, as far as possible, a contiguous area for the NTFS Master File Table. It is best if there is a fairly substantial amount of free space while you do it.

Now use the Windows XP convert tool: Go to Start | All Programs | Accessories | Command Prompt (or, from a Run box, type CMD) and, assuming you intend to convert C:, give the command:


Note the name of the disk in the first line, and the Volume Serial Number (for example, 3F4E-2D1B) in the second. Then type:


It will ask for that name in confirmation. Then it will ask two further questions. Reply Y each time to set up conversion to happen at the next boot, then restart the machine. (If you are converting a partition other than the operating system's partition, you may find that it runs without rebooting.) After returning to Win XP, the hard disk will work for two or three minutes, tidying up. Leave things alone during this time.

Consult the Hints in the Windows Product Activation article (under What About Formatting a Hard Disk?) regarding the resetting of the volume serial number, which will have been changed. The hints given will assure that you do not lose a Windows Product Activation "life."
FAT & NTFS File Systems in Windows XP


Files in Windows XP can be organised on the hard disk in two different ways.

    * The old FAT (File Allocation Table) file system was developed originally (when the original IBM PCs came out) for MS-DOS on small machines and floppy disks. There are variants — FAT12 is used on all floppy disks, for example — but hard disk partitions in Windows XP can be assumed to use the FAT32 version, or 32-bit File Allocation Table.

    * Later, a more advanced file system was developed for hard disks in Windows NT, called NTFS (the "NT File System"). This has matured, through several versions, into the latest one that exists alongside FAT in Windows XP.

The file system used goes with an individual partition of the disk. You can mix the two types on the same physical drive. The Windows XP operating system is the same, whichever file system is used for its partition, so it is a mistake (and source of confusion) to speak of "a FAT disk reading an NTFS partition." It is the operating system, not the disk, that does the reading.

Actual files are unaffected by which file system they are on; that is merely a matter of a method of storage. An analogy would be letters stored in an office. They might be in box-files on shelves (FAT) or in suspended folders in file cabinets (NTFS); but the letters themselves would be unaffected by the choice of which way to store them, and could be moved from one storage place to the other. Similarly, files can be moved between folders on an NTFS partition and folders on a FAT partition, or across a network to another machine that might not even be running Windows.

EXAMPLE: Consider the downloading to your computer of a file through a link on a web page. You click on the link, and the file is copied across the Internet and stored on your hard drive. If you download the file from this present site, the file is stored on a computer running Unix, which uses neither FAT nor NTFS. The file itself is not affected when it is copied from a Windows computer to the Unix-based server, or copied from that server to your Windows-based computer.

However, if a machine has two different operating systems on it, dual booted, they may not both be able to read both types of partition. DOS (including an Emergency Startup boot floppy), Windows 95/98, and Windows ME cannot handle NTFS (without third party assistance). Early versions of Windows NT cannot handle FAT32, only FAT16. So, if you have such a mixed environment, any communal files must be held on a partition of a type that both operating systems can understand — meaning, usually, a FAT32 partition. (See the article Planning Your Partitions on this site, under the section "Multiple Operating Systems," for a table of which file system each recent version of Windows can use and understand.)


There are three considerations that affect which file system should be chosen for any partition:

   1. Do you want to use the additional capabilities that only NTFS supports?
      NTFS can provide control of file access by different users, for privacy and security. The Home Edition of Windows XP only supports this to the limited extent of keeping each user's documents private to him or herself. Full file-access control is provided in Windows XP Professional, as is encryption of individual files and folders. If you use encryption it is essential to back up the encryption certificates used — otherwise, if the partition containing your "Documents and Settings" has to be reformatted, the files will be irretrievably lost.

   2. Considerations of Stability and Resilience
      NTFS has stronger means of recovering from troubles than does FAT. All changes to files are "journalized," which allows the system to roll back the state of a file after a crash of the program using it or a crash of the system. Also, the structure of the file system is less likely to suffer damage in a crash, and is therefore more easily reinstated by CheckDisk (CHKDSK.EXE). But in practical terms, the stability of FAT is adequate for many users, and it has the benefit that a FAT partition is accessible for repair after booting from a DOS mode startup floppy, such as one from Windows 98. If an NTFS partition is so damaged that it is not possible to boot Windows, then repair can be very difficult.

   3. Considerations of economy and performance
      In a virtual memory system like Windows XP, the ideal size of disk clusters matches the internal "page size" used by the Intel processors — 4 kilobytes. An NTFS partition of almost any size you are likely to meet will use this, but it is only used in FAT32 up to an 8 GB partition. Above that, the cluster size for FAT increases, and the wastefulness of the "cluster overhang" grows. (For a table of the varying default cluster sizes used by FAT16, FAT32, and Win XP's version of NTFS, for partitions of varying sizes, click here.)

      On the other hand NTFS takes much more space for holding descriptive information on every file in that file's own block in the Master File Table (MFT). This can use quite a large proportion of the disk, though this is offset by a possibility that the data of a very small file may be stored entirely in its MFT block. Because NTFS holds significant amounts of these structures in memory, it places larger demands on memory than does FAT.

      Searching directories in NTFS uses a more efficient stucture for its access to files, so searching a FAT partition is a slower process in big directories. Scanning the FAT for the pieces of a fragmented file is also slower. On the other hand, NTFS carries the overhead of maintaining the "journalized" recovery.

Also, of course, in a dual boot system, there may be the overriding need to use FAT on a partition so that it can also be read from, say, Windows 98.


Leaving matters of access control and dual use aside, as partition sizes grow, the case for NTFS gets stronger. Microsoft definitely recommends NTFS for partitions larger than 32 GB — to the extent that Windows XP will not format a FAT partition above that size. However, with smaller sizes, FAT is likely to be more efficient — certainly below 4 GB, and probably below 8 GB. I suggest that NTFS should be used for partitions of 16 GB or above, where the FAT 32 cluster size goes up to 16 KB, the intermediate region (that is, partitions between 8 and 16 GB in size) being largely a matter of taste.


Ideally, a disk is initially formatted in the file system which is to be used permanently — NTFS, for example, can then put the Master File Table in its optimal location in the middle of the partition.

However, on an upgrade of an existing system, the file system is left as it is. For example, an upgraded Windows 98 system will be on FAT32. Also, some computer makers ship new computers with all partitions formatted as FAT32. These can be converted to NTFS if that seems more suitable to your needs. If you use the method described here, the result will be nearly as satisfactory as if a fresh format to NTFS had been done.

But this conversion is a one-way process. Windows XP provides a native tool for converting FAT to NTFS, but no tool for converting NTFS to FAT. It may be possible to convert NTFS to FAT using Partition Magic 7.01, but the result is uncertain. It you attempt it, it is essential that you first decrypt all encrypted files, or they will be forever inaccessible. (For this reason, Partition Magic will stop if it finds one.) If it is a new machine, too, be sure that your warranty will not be compromised by doing a file system conversion.

A further aspect that needs caution is that the conversion may result in the NTFS permissions on the partition and its folders being not the simple general access that might be expected. It is certainly important that the conversion be done when logged in as an Administrator.


Will a backup or image made from NTFS remain NTFS if I restore to a newly formatted partition?

This depends on the approach of the particular backup program you use. It may make an exact image of the partition, including the file system's structures, in which case the restored partition will be exactly as the original. (Indeed, any format of the drive before restoring the drive image not only is unnecessary, but all that it accomplishes will be overwritten when you restore the image.) Or, the software may work on a file-by-file basis, in which case the files themselves will be restored — to whatever file system has been used in formatting the partition to which you restore them. But, again, note that a file-by-file restore from a backup of NTFS to a FAT partition will result in encrypted files being unreadable, because there is no way to decrypt them on FAT!
This article describes file and folder compression performance in Windows 2000 and Windows NT 4.0.
While NTFS file system compression can save disk space, compressing data can adversely affect performance. NTFS compression has the following performance characteristics. When you copy or move a compressed NTFS file to a different folder, NTFS decompresses the file, copies or moves the file to the new location, and then recompresses the file. This behavior occurs even when the file is copied or moved between folders on the same computer. Compressed files are also expanded before copying over the network, so NTFS compression does not save network bandwidth.

Because NTFS compression is processor-intensive, the performance cost is more noticeable on servers, which are frequently processor-bound. Heavily loaded servers with a lot of write traffic are poor candidates for data compression. However, you may not experience significant performance degradation with read-only, read-mostly, or lightly loaded servers.

If you run a program that uses transaction logging and that constantly writes to a database or log, configure the program to store its files on a volume that is not compressed. If a program modifies data through mapped sections in a compressed file, the program can produce "dirty" pages faster than the mapped writer can write them. Programs such as Microsoft Message Queuing (also known as MSMQ) do not work with NTFS compression because of this issue.

Because user home folders and roaming profiles use lots of read and write operations, Microsoft recommends that you put user home folders and roaming profiles on a volume that does not have NTFS compression on the parent folder or on the volume root. Individual users may still enable compression on their folders, but the overall number of compressed files and folders is smaller. On servers that host compressed volumes, you should use careful performance monitoring to determine whether the CPU has enough capacity to support the compress/decompress operations that are being performed.

For additional information, see the "File and Folder Compression" and "Compression Performance" sections in the Microsoft
This article provides a description of the process that Convert.exe uses to convert a disk partition from file allocation table (FAT) to the NTFS file system. The article also discusses the space that is required for conversion.

Back to the top
The conversion of a disk partition from FAT to NTFS requires a certain amount of free disk space for building the NTFS disk structures. FAT and NTFS use very different on-disk structures to represent the allocation of space for files. These structures are often referred to as "metadata" or "file system overhead."

Back to the top
FAT and NTFS Overhead
FAT metadata consists of a boot sector, one or more file allocation tables, a root directory structure of fixed size, and a variable amount of space for each subdirectory. The space for each subdirectory is related to the number of files that are in the subdirectory.

Another kind of overhead is associated with both FAT and NTFS. Both file systems allocate disk space in clusters of a fixed size. The exact size of these allocation units or clusters is determined at format time, and the defaults are dependent on the size of the volume. On volumes of similar size, the default cluster size for NTFS is smaller than the default cluster size for FAT.

Because space for file data can be allocated only in whole cluster amounts, even a 1-byte file uses a whole cluster's worth of disk space on a FAT volume. (Space usage issues for NTFS are similar but slightly more complicated, and those issues are not covered in detail in this article.)

Like FAT, the NTFS file system has a certain amount of fixed-size overhead and a certain amount of per-file overhead. NTFS also has several advanced features, including recoverability, security, and support for very large volumes. Because of these advanced features, the NTFS metadata overhead is somewhat larger than the FAT metadata overhead. On the other hand, because NTFS cluster overhead is smaller than FAT cluster overhead, it is often possible to store at least as much on an NTFS volume as on a FAT volume, even without using NTFS file compression.

Back to the top
The Conversion Process
To guard against corruption that can be caused by failure during conversion, the Convert.exe utility must build the NTFS metadata by using only the space that the FAT file system considers to be free space. That way, if the conversion does not succeed, the FAT representation of the user files is still valid.

A complicating factor for this strategy is that one sector of NTFS data must occupy a specific location on the disk, and a very limited number of other structures must occupy adjacent sectors.

In the conversion process, Convert.exe performs these tasks:
1.   Convert.exe relocates FAT clusters to create space for the fixed-location NTFS structure and other adjacent data, and then saves the new FAT. If the necessary sectors cannot be made available (for example, if the sectors are unreadable), the conversion process stops. The FAT volume is in the same condition as before the attempted conversion.
2.   In the free space in the FAT volume, Convert.exe creates the elementary NTFS data structures, that is, the fixed-size tables and structures that are common to any NTFS volume. The size of these tables depends on the size of the volume but does not depend on the number of files on the volume.
3.   Convert.exe creates the NTFS master file table and directory listings in the free space on the FAT volume. The space required for this step is variable and depends on the total number of files on the FAT volume.
4.   In the NTFS bitmap, Convert.exe marks as "free" those NTFS clusters that are being used by FAT-specific structures. After the conversion is complete, NTFS can reclaim the FAT metadata overhead as free space.
5.   Finally, Convert.exe writes the NTFS boot sector. This final action causes the volume to be recognized as NTFS rather than FAT. (If the conversion fails at any earlier step, the volume is still recognized as a valid FAT volume.)
Because a crash can occur at any time, the conversion process minimizes the chance of disk corruption.

Almost all of the writes are to free FAT space, so failure preserves the FAT intact. The only times when Convert.exe writes to space that is not free--that is, the times at which a failure can cause problems--are:
•   At the end of step 1, when Convert.exe overwrites the FAT.

The algorithm for relocating clusters guarantees that if a failure does take place during this stage, Chkdsk can fix the disk with no loss of data.
•   In step 5, when Convert.exe writes the boot sector.

The system partition is the active, primary partition that starts the computer. If a failure occurs while the system partition is being converted, there is a chance that the computer could be unable to start. It is not likely that such a failure will occur, but if it does occur, you can still use a (floppy) boot disk to start the computer.

Back to the top
The Computation Process
Before starting the conversion process, Convert.exe performs a computation to figure out how much free space is required, based on the number of preexisting files on the FAT volume and on the size of the volume. For standard hardware (a hard drive that has 512 bytes per sector), the computation is done like this:
1.   Start by taking the size of the volume, in bytes, and dividing by 100. If this value is less than 1,048,576, use 1,048,576. If the value is larger than 4,194,304, use 4,194,304.
2.   Add the size of the volume in bytes, divided by 803.
3.   Add the number of files and directories that are on the volume, multiplied by 1,280.
4.   Add 196,096.
If there is extended attribute information on the FAT volume, Convert.exe also considers the additional space that is required. (Extended attribute information is normally not present. It is a consideration only if the computer had been running OS/2 and extended attributes were in use.)

The computation that is described closely approximates the computation that Convert.exe performs. The exact result on any given system may differ slightly.

The computation yields the amount of free space that Convert.exe requires before attempting a conversion. The computation includes an allowance for the possibility of encountering bad sectors in the free space in the FAT volume.

If a volume has just enough free space to begin the conversion, and if a significant fraction of drive space is discovered to be unusable, the conversion process may fail. However, because the design is for the volume to automatically fall back to being recognized as FAT, failure does not necessarily produce any disk corruption.

Back to the top
Special Considerations
If you use the Convert.exe command, be aware of these considerations:
•   You must specify that the drive is to be converted when the computer restarts. Otherwise, you cannot convert the current drive.
•   If Convert.exe cannot lock the drive (for example, the system volume or the current drive), Convert.exe offers to convert the drive next time the computer restarts.
•   The location of the master file table (MFT) is different on volumes that have been converted from previous versions of NTFS, so volume performance might not be as good on volumes that are converted from Windows NT.
•   Compared with volumes that are initially formatted with NTFS, volumes that are converted from FAT to NTFS lack some performance benefits. On converted volumes, the MFT can become fragmented. In addition, on converted boot volumes, NTFS permissions are not applied after the volume is converted.
Windows XP supports two disk file systems: the file allocation table (FAT) file system and the NTFS file system. This article explains how to convert a FAT partition into an NTFS partition and discusses the considerations that you must take into account.
Windows XP includes the Convert.exe utility for converting a FAT partition to an NTFS partition. Convert.exe is simple to use, but there are some limitations that you should consider before using the utility.

You should consider the following limitations before you convert a FAT partition to NTFS:
•   The conversion is a one-way process. After you convert a partition to NTFS, you cannot convert the partition back to FAT. To restore the partition as a FAT partition, the partition would have to be reformatted as FAT, which erases all data from the partition. Data would then be restored from backup.
•   Removing Windows XP to revert to Windows 98 or to Windows Millennium Edition (Me) is not an option after you convert any drive on the computer to NTFS.
•   You cannot convert the system partition of a RISC-based computer to NTFS. The ARC specification requires that the system partition be FAT. It is possible to create a small (1-megabyte) FAT partition for the system partition and then install Windows on an NTFS partition (the boot partition).
•   Convert.exe requires that a certain amount of free space be present on the drive in order to convert the file system.For additional information about the amount of free space that is required for a conversion, click the article number below to view the article in the Microsoft Knowledge Base:
156560 ( Free Space Required to Convert FAT to NTFS
NOTE: Although there is little chance for corruption or data loss during the conversion from FAT to NTFS, it is a good idea to perform a full backup of the data on the drive that it is to be converted before you run the convert command. Before you proceed, it is also a good idea to verify the integrity of the backup.

To convert a FAT partition to NTFS, follow these steps:
1.   Click Start, click Run, type cmd, and then click OK.
2.   At the command prompt, type CONVERT driveletter: /FS:NTFS.
3.   Convert.exe attempts to convert the partition to NTFS.
While Convert is running, you may receive the following error message:
Convert cannot gain exclusive access to the driveletter:, so it cannot convert it now. Would you like to schedule it to be converted the next time the system restarts (Y/N)?
You receive this error message under any of the following three conditions:
•   If you run the CONVERT command while the current directory is on the drive that is to be converted (for example, if you type CONVERT F: /FS:NTFS at the F:\> prompt).

To resolve this, either click Yes in the error message and then restart the computer, or change to a directory on another drive and retype the command.
•   If a program has a file open on the drive that is to be converted.

To resolve this, either click Yes in the error message and let the drive be converted next time the computer is restarted, or close any programs that may be using files on the drive. Remember that this also applies to users who connect to files over the network and to a paging file that resides on the drive.
•   If you attempt to convert the partition from which the operating system is running.

It is not possible to convert the boot partition while the operating system is running. To convert the boot partition, it is always necessary to run the CONVERT command, click Yes in the error message, and then restart the computer. The partition is converted the next time the computer is restarted. As an alternative, you can start the computer in an installation of Windows XP that is on a different partition, and convert the boot partition from that installation of Windows XP.
For additional information about the differences between the FAT and NTFS file systems, along with the advantages and disadvantages of each, click the article number below to view the article in the Microsoft Knowledge Base:
100108 ( Overview of FAT, HPFS, and NTFS File Systems
This article describes how to clear the Past Items list in the Customize Notifications window.
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 ( How to back up and restore the registry in Windows

To clear the Past Items list, perform the following steps:
1.   Delete the IconStreams and PastIconsStream values from the following registry key:
2.   Open Task Manager, click the Processes tab, click Explorer.exe, and then click End Process.
3.   In Task Manager, click File, click New Task, type explorer, and then click OK.
Restore Safely Remove Hardware Icon (Line 5)

Manual Fix:

Restore Safely Remove Hardware icon:
RunDll32.exe shell32.dll,Control_RunDLL hotplug.dll
Start/Run/Regedit:  You may need to create the key if it does not already exist.


Value Name: NoTrayItemsDisplay
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = enable restriction)

Create a new DWORD value, or modify the existing value, called 'NoTrayItemsDisplay' and edit the value according to the settings below. Exit your registry, you may need to restart or log out of Windows for the change to take effect.
Delete the IconStreams and PastIconsStream values from the following registry key:


Remove Past Items From the Notification Area (Line 53)

Once done, Open Task Manager, click the Processes tab, click Explorer.exe, and then click End Process. In Task Manager, click File, click New Task, type explorer, and then click OK.
This happens for most Auto-Logon users.  Three methods/workarounds: Log off and Log back on, password protect your account or disable SSDP and uPNP Services.

Automated Edit:

Disable SSDP and uPNP Services (Line 156)

Manual Edit:

Right click My Computer/Manage. Expand Services and Applications then Click on Services. A list of services appears in the right column. Scroll down to the the SSDP and uPnP Service. Right click each, choose properties. Change the text next to "Startup type:" to Disabled.

Or, if you are running XP SP1 uninstall UPnP from Add/Remove Windows Components.

Hide or Show Inactive Icons in the Notification Area (Line 53)

Tip:  Volume Control disappears in the Notification Area.  Once present, run this edit.

Save Settings on Exit (Line 54)

To use the Regedit: Save the REG File to your hard disk. Double click it and answer yes to the import prompt. REG files can be viewed in Notepad by right clicking on the file and selecting Edit.
Windows / Linux / Notepad
Nov 05, 2008, 06:59 PM
Change the Default Action for Script Files. Normally scripting files are run when double clicked, once applied this
tweak will cause them to be shown in Notepad instead. This is useful to avoid accidental execution especially with the prevalence of script based viruses.

Open your registry (Start/Run/Regedit) and for each key below change the value of "(Default)" to equal "Edit". This will change the default action so that the script will be loaded in Notepad.exe (or another specified text editor).

JS Files

JSE Files

VBE Files

VBS Files

WSH Files

WSF Files

In addition you can change the default editor for each script type be changing the "(Default)" value under the [...\Shell\Edit\Command] sub-key.

Restart Windows for the change to take effect.

Note: Scripts can still be executed normally by right-clicking the file and selecting "Open" from the context menu.

Registry Settings
Value Name: (Default)
Data Type: REG_SZ (String Value)
Value Data: ("Edit" = set Edit as default)
This document explains how to use the SYMClean utility. SYMClean is typically used in any of the following situations:

- When the Windows® Add/Remove Programs utility fails to fully remove Norton SystemWorks 2002/2001.
- You encountered problems while installing Norton SystemWorks, and a technician advised you to use SYMClean.
- You see a message while installing Norton SystemWorks that indicates that a previous version was detected, even though you already uninstalled the previous version.

SYMClean is designed to remove leftover Norton SystemWorks files and registry entries that may be interfering with the Norton SystemWorks installation.

Important: Do not use this document to remove Norton SystemWorks 2003 or later. SYMClean has not been updated to remove those versions. If Add or Remove Programs failed to completely remove Norton SystemWorks 2003 or later, then read Using the Norton Removal Tool. That document provides a completely automated removal tool for Norton 2003 or later products.

Before you begin:

    * If you have not already tried to uninstall Norton SystemWorks automatically, use the Windows uninstall utility rather than the SYMClean utility to uninstall Norton SystemWorks. SYMClean is a small program that should be used for emergency manual uninstallation only after you have tried to uninstall Norton SystemWorks using the Windows uninstall utility.
    * SYMClean 2003 does not remove Norton SystemWorks 2003/2004 or its component products. It is designed to remove only older versions of Norton SystemWorks and its components. Using SYMClean to remove Norton SystemWorks 2003/2004 results in an incomplete uninstallation, and requires that you perform a manual uninstallation to more fully remove Norton SystemWorks. For more information on what items SYMClean removes, read the document Introduction to SYMClean.

Windows / Linux / How to Install NetBeui???
Nov 05, 2008, 06:48 PM
1. Insert your Windows XP CD-ROM into the CD-ROM drive and browse to the Valueadd\MSFT\Net\NetBEUI folder.
2. Copy Nbf.sys to the %SYSTEMROOT%\System32\Drivers directory.
3. Copy Netnbf.inf to the %SYSTEMROOT%\Inf hidden directory.
4. Click Start, click "Control Panel", and then double-click "Network Connections".
5. Right-click the adapter you want to add NetBEUI to, and then click Properties.
6. On the General tab, click Install.
7. Click Protocol, and then click Add.
8. Click to select "NetBEUI Protocol" from the list and then click OK.
9. Restart your computer if you receive a prompt to complete the installation.

     Tip:  Copy NBF.SYS and NETNBF.INI from the Win2K installation to a floppy. Remove all "CopyFile" and
              "DestinationDir" related comments from the inf. Open network connections/properties/install/protocol/have
              disk/..Add NetBeui
NetBEUI (NetBIOS Extended User Interface) is a new, extended version of NetBIOS, the program that lets computers communicate within a local area network. NetBEUI (pronounced net-BOO-ee) formalizes the frame format (or arrangement of information in a data transmission) that was not specified as part of NetBIOS. NetBEUI was developed by IBM for its LAN Manager product and has been adopted by Microsoft for its Windows NT, LAN Manager, and Windows for Workgroups products. Hewlett-Packard and DEC use it in comparable products.

NetBEUI is the best performance choice for communication within a single LAN. Because, like NetBIOS, it does not support the routing of messages to other networks, its interface must be adapted to other protocols such as Internetwork Packet Exchange or TCP/IP. A recommended method is to install both NetBEUI and TCP/IP in each computer and set the server up to use NetBEUI for communication within the LAN and TCP/IP for communication beyond the LAN.
After you use the Windows Disk Management snap-in tool to mark your primary partition as active, the computer may not start, and you may receive the following error message:
NTLDR is missing.

Press Ctrl+Alt+Del to restart.

This behavior occurs if the partition marked as active does not contain the Windows boot files or the boot files for another operating system. On Intel-based computers, the system partition must be a primary partition that has been marked as active for startup purposes. This partition must be located on the disk that the computer gains access to at startup. There can be only one active system partition at a time. If you want to use another operating system, you must first mark its system partition as active before restarting the computer.

IMPORTANT Before performing the steps listed below, make sure that you have a good backup of your critical data files.

To resolve this behavior, use one of the following procedures:
•   Try changing the active partition by booting to a floppy disk and then using disk utilities to manually change the active partition:
1.   Boot to a command prompt by using a Microsoft Windows 95, Microsoft Windows 98, or Microsoft Windows Millennium Edition (Me) boot floppy disk.
2.   At the command prompt, type fdisk, and then press ENTER.
3.   When you are prompted to enable large disk support, click Yes.
4.   Click Set active partition, press the number of the partition that you want to make active, and then press ENTER.
5.   Press ESC.
6.   Remove the boot floppy disk, and then restart the computer.
•   Boot the computer by using a Windows XP boot disk. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
305595 ( How to create a bootable floppy disk for an NTFS or FAT partition in Windows XP
•   If the partition that has been incorrectly marked as active is formatted in the FAT file system, the FAT32 file system, or the NTFS file system, you may be able to use the Windows Recovery Console to correct the behavior. For additional information, click the article number below to view the article in the Microsoft Knowledge Base:
314058 ( Description of the Windows XP Recovery Console
NOTE: The system partition refers to the disk volume that contains the files that are needed to start Windows (for example, Ntldr,Boot.ini, and On Intel x86-based computers, the system partition must be a primary partition that is marked active. On Intel x86 computers, this is always drive 0, the drive that the system BIOS searches when the operating system starts.

Using the Recovery Console, copy the Ntldr file from the Windows XP CD-ROM to the root directory of the current active partition. Follow these steps:
1.   Start your computer by using the Windows XP Setup floppy disks or by using the Windows XP CD-ROM.
2.   At the "Welcome to Setup" screen, press F10, or press R to repair.
3.   Press C to start the Recovery Console.
4.   Copy the Ntldr file from the Windows XP CD-ROM to the root of your system partition by using the following commands, pressing ENTER after each command:
a.    Type cd .. to go to the root of drive C.

Note that there is a space between the d and the two periods (..).
b.    Type the letter of the CD-ROM drive.
c.    Type cd i386.
d.    Type Copy ntldr c:.
e.    Type Copy c:.
f.    Type Bootcfg /add.

For more information, click the following article number to view the article in the Microsoft Knowledge Base:
291980 ( A discussion about the Bootcfg command and its uses
g.    Type Exit.
If the partition was not formatted by using Windows, you might also need to run the Recovery Console fixboot command to make the active partition bootable.
After you can boot into Windows, it is recommended that you use the Windows Disk Management snap-in tool to reset the original system partition as the active partition, and then restart the computer.
According to reports, the celebrated American actor, Will Smith, has been taking advice from "Slumdog Millionaire" director Danny Boyle, in an effort to fulfill his promise to star in a Bollywood movie.

Smith is serious about trying his luck in a different genre of pictures, as he made several trips to visit Boyle on set in India. Boyle said: "While we were filming there, Will Smith came over twice. There's a massive coming together of Bollywood and Hollywood. It'll only take one person to bring them together and it will be huge."

Will Smith has also been taking advice from Boyle on the working style of Bollywood. He also sought out Indian actor Anil Kapoor, who confirmed that the actor recently came to visit him at his residence.

There seems to be little doubt about the fact that the "I am Legend" man has now really made up his mind to be part of an entirely diverse style of movie making experience, atypical to the eastern world.

In fact, Smith's growing interest in Bollywood is an indication that the appreciation that the film "Slumdog Millionaire" is receiving from the international crowd is making the option of being part of a cross over film shot completely in India, or with a good percentage of Indian creative contribution, an attractive one for the Hollywood actors.
000   Data file (GEOWorks)
000-20009   Used to number old (backup) versions of files (for example, CONFIG.SYS when changed by an installation program); also used to number related data files for multiple users of a small-scale PC application
001-999   Database index files used by (Superbase)
113   Backup data file (Iomega Backup)
1ST   Documenting wizard list (Microsoft Visual FoxPro)
7z - File Format   7-Zip open source file archive format with high compression ratio
8   Source file (Assembly) (Similar to Microsoft Assembler)
netCDF   Network Common Data Form
In order to mollify antitrust regulators who are threatening to block the alliance, a list of concessions has reportedly been submitted by Google Inc. and Yahoo Inc. This list will deflate their proposed Internet advertising partnership.

During the weekend, the U.S. Justice Department received the revisions from the two companies.

On Monday, a very well known journal posted on its Web Site, "Google and Yahoo are now willing to limit the amount of revenue generated from the partnership and shorten the deal's duration. Google's advertising customers would also be given the option to not have their commercials appear on Yahoo's Web site."

Yahoo, under this new plan, would be limited to getting no more than 25% of its search advertising revenue from Google. Further, after two years, their partnership would expire. This is quite opposite to the original contract that was signed in June. It was supposed to get expire after 10 years and there was no restriction on Yahoo on how frequently it could draw upon Google's technology for displaying ads alongside its search results.

Earlier, Yahoo was hopeful that Google's system will let it increase its revenue by $800 million annually. However, now the new contract would cut that amount to half due to the imposed restrictions.

"Putting a 25 percent limit on its revenue from Google's system would mean limit Yahoo's take to about $400 million annually, based on Yahoo's search advertising sales during the past four quarters," added the report posted on the Web Site.

Representatives from Google and Yahoo though declined to comment anything on the Journal's report, did admit of being in talks with the Justice Department in hopes of winning clearance to join forces. 
Los Angeles - BMW is launching a fleet of 500 electric-powered MINI cars for private and business customers in the United States with a prototype to be unveiled at the Los Angeles Motor Show this month.

The zero-emission MINI E, powered by a 150 kW/205 hp electric engine that gets its energy from a lithium-ion battery pack, would be leased to customers in California, New York and New Jersey inn 2009, the car maker said.

The exterior of the MINI E is hardly distinguishable from the standard MINI with the exception of an "E" symbol on the bodywork. In the dashboard, a battery loading indicator replaces the rev counter. The dials are in dark grey and the numbers are in yellow. The load volume is indicated in percentages.

The MINI E is also painted in dark silver with the roof in pure silver colour.

BMW lists acceleration from zero to 100 km/h in 8.5 seconds with the top speed electronically regulated at 152 km/h. One loading charge of 2.5 hours gives the car a range of 240 kilometres.

The battery pack, which consists of 5,088 battery cells linked to 48 modules, is positioned in three elements behind the two front seats. Each car comes with a so-called Wallbox that can be installed in the electric socket of a garage, enabling shorter loading time.

Slight modifications have been made to the bodywork for optimal weight distribution. The brakes are combined with a newly developed electric pump while EPS (Electrical Power Assisted Steering) is equivalent to the unit in the standard MINI. As soon as the driver takes their foot off the accelerator, the electric motor functions like a generator, producing energy for the battery.

The MINI E is produced in Oxford, England and at BMW's main factory in Munich, Germany. The basic body components are put together in Oxford with the electric engine, battery unit, transmission and other electric components fitted in Munich. Production is to be concluded by the end of 2008.

By making the 500 cars available to selected customers in urban centres, the car maker hopes to gain important know-how for the mass production of electric vehicles in the near future, the company said in a statement. The fleet is supported by a team of technicians based on both the U. S. east and west coasts. BMW is also looking at extending the project to Europe.
SBI Card would release a financial package for defaulting clients. SBI card is the joint venture company of State Bank of India and GE Money. SBI card intends to help those customers who have been good at repaying in the past, but have failed to repay following the turbulent global financial conditions. The company y would restructure its card-portfolio to check further defaults.

SBI Card CEO, Diwakar Gupta said that the company can enhance the tenure of the loan and revise interest rates to help customers. The company is charging interest between 3.1-3.35 percent and it may be revised to around 2.5 percent. He said that the company is working as per industry standards and there is no problem of delinquencies as its delinquencies are not more than the average delinquencies of other firms.

The company has also decided to launch co-branded credit cards for more efficient SBI Cards & Payments Services. It has tied up with state owned Dena Bank, which have credit card holder base of 10,000. The Executive Director, Bhaskar Sen said that it has decided to avail services of professional organization for credit cards as the company is interested to provide more efficient banking services. It would also expand its base in small towns across the country.
 Democratic presidential nominee Barack Obama has created history by defeating his Republican rival John McCain to become the first Black President of the United States.

The 47-year-old Democratic senator from Illinois swept to victory over his Republican opponent McCain by building an Electoral College majority of 367 votes to McCain's 168 at the time of filing the story.

Meanwhile, McCain has conceded defeat to Obama, telling supporters "the failure is mine."

McCain told his election-night rally in his hometown of Phoenix that he had congratulated his opponent in a phone call. He thanked his wife Cindy, children, his mother and friends for their support "during the ups and downs of this campaign".

McCain also thanked controversial running mate Sarah Palin, "one of the best campaigners I have ever seen and an impressive new voice in our party."

Obama climbed over the top at 11 p. m. ET with wins in California, Oregon, Washington and Hawaii. It takes 270 electoral votes to win.

But Obama delivered a crushing defeat earlier in the night by clinching Ohio, Pennsylvania and Virginia, states that were key to McCain's presidential electoral strategy, FOX News reported.

And the Democratic nominee took a commanding lead over his Republican rival with a slew of victories in reliable East Coast and Midwestern territory.

Obama has so far won New York, Massachusetts, New Hampshire, Maryland, Rhode Island, Connecticut, New Jersey, Delaware, Vermont and the District of Columbia.

He also won all four electoral votes in Maine and scored a victory in his home state of Illinois, as well as in Iowa, Wisconsin, Minnesota, Michigan and the southwestern state of New Mexico.

McCain has won Texas and Georgia, as well as Idaho, South Dakota, South Carolina, Mississippi, Utah, Louisiana, Arkansas, North Dakota, Kansas, Wyoming, Alabama, Oklahoma, Tennessee, West Virginia and Kentucky. He won three of Nebraska''s five electoral votes.

The Democratic nominee has so far amassed 297 electoral votes to McCain's 145,

Pennsylvania, with its 21 electoral votes, was one of the few states that voted Democratic in the 2004 presidential election that McCain was actively pursuing.

But McCain's narrow path to victory was made airtight after he lost Ohio and its 20 electoral votes, and Virginia's 13.

He would have had to score an upset in a major Democratic state to recover, as well as win Florida and a number of other states President Bush won four years ago that Obama is contesting.

Thousands of supporters on Tuesday night filled Chicago's Grant Park, where Obama will hold his election celebration.
Bharti Airtel has announced its launch of Airtel digital TV in collaboration with its technology partner NDS which will secure, enable and enhance its direct-to-home (DTH) service.

Announcing the DTH launch, N. Arjun, executive director of Bharti Telemedia, said in a statement that, with the support of NDS, the telecom major would provide "superior, state-of-the-art services to our DTH service customers".

He said the DTH service was launched with VideoGuard conditional access (CA) and MediaHighway customised multi-lingual electronic program guide (EPG).

The CA and DRM technology of NDS protects over 95.4 million digital devices around the world and secures service revenues of over $40 billion worldwide. Middleware from NDS has been deployed in over 98.7 million devices, the statement added.

The technology solutions of NDS have flexibility to allow Bharti Airtel to introduce future enhancements.
Windows / Linux / folder guard:part 15
Nov 04, 2008, 08:31 PM
How to get started with Folder Guard:

You don't have to be a computer "geek" to be able to use Folder Guard: we designed it so that it could be used by anyone, even if you don't have much experience with computers yet.

IMPORTANT: First of all, a word of warning: Folder Guard is a powerful tool and should be used responsibly. Using it thoughtlessly, you can inadvertently make your computer inaccessible. For example, it is very easy with Folder Guard to prevent access to the Desktop folder, and make Windows start with a blank screen after you reboot. DO NOT try to protect folders with your important documents until you have tested Folder Guard on some practice folder, that contains no important documents (or at least make sure you have the copies of the documents saved in some other folder before trying to hide them with Folder Guard.) Only after you have tried Folder Guard to protect a test folder and got used to the way it works and operates, you can try to use it for protection of the "real" documents and folders. Also, it's always a good idea to back up your hard disk before trying any new software, including Folder Guard!

So, how to get started with Folder Guard? It's as easy as 1, 2, 3...

1. Download.

Visit our Download Center and download a file with the evaluation version of Folder Guard. Save the file somewhere on your hard disk, in a folder where you usually save the programs you download form the Internet.

2. Install.

If you installed other software packages before, you should have no problem installing Folder Guard, too. You may find detailed installation instructions here.

3. Test drive.

If you are not familiar with Folder Guard, we suggest first to try a very simple task: use Folder Guard to hide just one test folder on your hard disk. Folder Guard now includes the Quick Start Wizard that can guide you through the steps necessary to configure such protection. Or, you can use a detailed step-by-step description of this procedure here, and also in the "Quick Start Guide" section of the Help file included in the evaluation version.

After you have practiced with the test folder and get used to the way Folder Guard works, you may wish to try other things: please refer to Folder Guard Help for the description of its commands and suggestions on its use.

4. Purchase a license or Uninstall.

If you find Folder Guard suitable for your requirements, and you want to continue using it beyond the evaluation period, please visit our Online Store and purchase a license. You will receive a "license key" which you will need to enter into the evaluation version, to make it work in the fully-licensed mode (the instructions are provided along with the license key).

If, however, you discover that Folder Guard does not solve the problem you want to solve, you can remove it from your computer at any time, you can find the instructions on how to uninstall Folder Guard here. Before removing the program, though, you may wish to contact our technical support, and we will try to help you with configuring and using Folder Guard.
Windows / Linux / folder guard:part 14
Nov 04, 2008, 08:30 PM
How Folder Guard works
Overview Editions of Folder Guard

Relax, you don't have to read or understand this section in order to use Folder Guard. We have provided this information only in case you are really curious. You can safely skip this section and go to the next one.

As you probably know, most Windows programs don't work with files and folders directly; they rely on the support provided by the Windows operating system to work with files and folders. (It makes each program able to work with wide range of the storage devices, letting Windows take care of the details). For example, if you use Windows Notepad to open a text document, the Notepad program first prepares a special request for the contents of the disk and sends this request to Windows. Having received the request, Windows searches its internal data structures and the contents of the disks, and returns the results back to Notepad, which in turn shows the files and folders to you in the Open File window. After you have selected the file and pressed OK, Notepad prepares another request for opening the file you have selected, and sends it to Windows, as well. Windows reads the appropriate bytes of data from the disk and returns them back to Notepad, that shows them to you in its window. In reality, the procedure is much more complex: even a simple operation like the one described above may take hundreds of different requests sent back and forth between the program and Windows, before you can see the results on the screen. All such requests and actions are performed by the programs transparently to you, and you don't even have to know what is going on under the Windows hood, unless you really want to.

Folder Guard works by intercepting the system requests that Windows programs and Windows itself exchange between each other. Folder Guard analyses the requests and the data they contain, and uses the attributes of the files and folders that you have set up with Folder Guard to allow or deny such requests. For example, if you designated a file to be read-only, and some program sends a request to read information from this file, Folder Guard allows such request to go through without intervention, and passes the results from Windows back to the program. If, however, a program sends a request to write some data into such file, Folder Guard intercepts it, and returns it back to the program without passing it to Windows. This prevents the file from being overridden (as per the read-only attribute), and makes the program display an error message such as "Access denied" or similar.

That's how Folder Guard works.
Windows / Linux / folder guard:part 13
Nov 04, 2008, 08:28 PM
How to uninstall Folder Guard
How to install Folder Guard Free vs. Continued use

To completely uninstall Folder Guard, it's not enough to simply delete its program files from the installation folder. To completely remove Folder Guard from your computer, follow the instructions below.

IMPORTANT: If your computer is configured for several user accounts, login into the same user account that you were logged in when you installed Folder Guard. If you use Windows XP Fast User Switching, log off from all other accounts before trying to uninstall Folder Guard.

NOTE: If you have enabled the stealth mode of operation of Folder Guard, it has hidden the Uninstall Folder Guard command from the Start menu, as well as from the Add/Remove Programs list of Windows Control Panel. To restore these commands, run Folder Guard and use its Tools - Advanced - Stealth Mode command the turn the stealth mode off, then exit Folder Guard before continuing.
Method 1

Click on the Start button at the bottom of your screen, choose Programs - Folder Guard - Uninstall from the menu, and follow the instructions.
Method 2

Open Windows Control Panel, open the Add/Remove Programs item and use it to uninstall Folder Guard.
Method 3

Run the Setup utility of Folder Guard with the command line switch /U. That is, choose Start - Run, and enter the following command:

If you use a 32-bit version of Windows:

"C:\Program Files\Folder Guard\Setup.exe" /U

If you use a 64-bit version of Windows:

"C:\Program Files\Folder Guard\Setup64.exe" /U

(This command assumes that you have installed Folder Guard into the folder C:\Program Files\Folder Guard; if not, please enter the correct path to Setup.exe (or Setup64.exe) in the command line above. Also note the double quotes around the path, as well as a space character in front of the /U switch, they are important parts of the command and necessary for it to work properly).

You will be prompted to enter your Master Password before the uninstalling could be continued. This is necessary to protect Folder Guard from being removed by unauthorized users. If you forget your password, use the Emergency Recovery Utility to reset it.

You may also be prompted to restart your computer, in order to deactivate Folder Guard and release the files that are currently in use by Windows, before they can be uninstalled.
Windows / Linux / folder guard:part 12
Nov 04, 2008, 08:24 PM
How to install Folder Guard
System requirements How to uninstall Folder Guard

    * Login to Windows as the administrator, or as a power user. If you login as a regular or limited user, you may not be able to install or use this software.

    * To begin the installation, simply run the installation file. If you do not have the installation file, please visit our web site to download the latest version:

    * Note that if you have a previous version of this software already installed on your computer, the installation utility may prompt you to restart the computer, in order to be able to replace the files currently in use by Windows.

    * The installation program will walk you through the process of setting up Folder Guard. You will be prompted to read and accept the End User License Agreement, and to select the installation options such as the folder where to copy the files.

    * After you press the Finish button, the installation program will copy the files into the specified folder and configure Windows for using Folder Guard.

    * IMPORTANT: Make a backup copy of the installation file of Folder Guard that you have downloaded from our web site, as well as a copy of the message with your license key, on a floppy or other removable disk, because if you ever need to reinstall the software, you will need both, the installation file and your licensing information to install the program in the fully-licensed mode. It's not enough to store the files on your hard disk, because when (not if) it crashes, you will lose the files. (Yes, hard disks do crash, believe us!) We provide for download from our web site the latest versions of the installation files only. When we release an updated version, we remove the older version from the download area, so the installation file with the version that you have purchased may not be available for download in the future. Remember, it's your responsibility to backup your important files! If you do misplace your license key or the installation file that we no longer offer for download, please use this link to order a replacement:
Windows / Linux / folder guard:part 11
Nov 04, 2008, 08:23 PM
How to restrict downloading programs with Opera browser:

If you don't want other users of your computer to download and install unauthorized software from the Internet, you can set up such a restriction with Folder Guard.

The following instructions assume that your web browser is Opera 6, installed into the folder C:\Program Files\Opera. (See also similar instructions for Internet Explorer).

The idea of the protection of the Opera downloads is similar to that of Internet Explorer, however, it requires a few extra steps, because of the fact that if the user of Opera selects the destination folder for the file before the download is completed, the Opera browser may download the file into the destination folder directly, bypassing its cache folder. This requires a few extra steps in configuring Opera, and also protecting its configuration file.

Step 1. Configuring Opera browser

Run Opera, choose File - Preferences from its menu, and select the File types set of settings. In the list of the file types, find an entry for the exe files, select it, and click on Edit to display the File type dialog box:

Select the options as shown above and click OK (but do not close the File types list yet!). Repeat the same procedure for other downloadable file types, such as zip, rar, arc, cab, and others. In the following example we will set up the protection for the exe and zip files only. However, you should add other file extensions to this list, depending on what kind of program packages your users are likely to download). Keep in mind, that there may be several entries for each file extension: for example, the zip extension has two entries. You should configure all such entries in the same as shown above for the exe extension.

Step 2. Creating the filter

Close Opera when finished the previous step, then run Folder Guard, switch to its Filters view, and use the Filters - New command to create a new filter. (For more information about the filters, see Folder Guard Help.) Fill out the Properties window for the new filter as follows:

(Note the quotes around the names of the folders, they are important!) Note also that we have entered the masks of only two most popular file formats for the programs, *.exe and *.zip. There are, however, other formats for distributing programs via the Internet, for example, *.rar, *.arc, *.cab, and so on. If you are concerned that other users may download and use such software packages, you should add the appropriate masks to the Apply to files area. If you do, don't forget to change the configuration of Opera for each such file type as described above!

Step 3. Activating the filter

Rename the new filter to "Opera downloads" (or to any other name you like), and activate it by assigning the no access attribute to it:

Step 4. Protecting the Opera configuration file (optional)

Opera keeps its configuration settings in the file Opera6.ini, located in its installation folder (usually it is C:\Program Files\Opera ). You may wish to protect this file with the "read-only" attribute of Folder Guard, to prevent users from permanently changing its settings. (On the other hand, you may not want to do that, if you want other users to be able to change the preferences of Opera. ) If you do want to protect this file, switch to the Folder View of Folder Guard (by choosing View - Folders from its menu), then use the Edit - Add file command to add the Opera6.ini file to the list of objects that you want to be protected with Folder Guard (See How to hide a file for the details about protecting files with Folder Guard). Finally, assign the read-only attribute to the Opera6.ini file:

Step 5. Enabling the protection

Now save the changes and enable the protection, as usual (For details, see How to hide a folder). The filter you have set up above should prevent Opera from downloading the exe and zip files from the Internet, and thus prevent users from installing unauthorized software on your computer. Note that even if a user changes the preferences of Opera to require it to prompt for a destination folder, the downloads still should not be possible (an attempt to download may cause Opera to simply hang). The best way to avoid such problems would be for the makers of Opera to implement password protection of its preferences. (Please contact Opera technical support about this and other suggestions you may have regarding the Opera browser.)
Chat Box / 10000 views
Nov 04, 2008, 07:02 PM
hi acumens,

:acumen first time in posting stats...a post reaches 10000 views ....posted by thiruvasagamani.

click the link below to see that post,
Resignation letter sample,14092.0.html

lets all congratulate him & his contribution should be continuing forever....

thanks keep posting.
Windows / Linux / folder guard:part X
Nov 04, 2008, 03:22 PM
How to restrict downloading programs with Internet Explorer:

If you don't want other users of your computer to download and install unauthorized software from the Internet, you can set up such a restriction with Folder Guard.

The following instructions assume that your copy of Windows is installed into the folder C:\Windows, and that your web browser is Internet Explorer. (See also similar instructions for Opera browser).

The idea of the protection is based on the fact that when Internet Explorer is downloading a file, it stores it in its Temporary Internet Files folder, along with the images and other files necessary to display the web pages when browsing. Only after the file has been successfully downloaded into the temporary folder, Internet Explorer moves it to the destination folder for your choice. This gives us an idea of how to prevent the downloads: we need to prevent Internet Explorer from being able to create program files (such as the .exe and *.zip files) in the temporary folder. However, we must still allow Internet Explorer to store files of other types (such as image files), to be able to display the web pages properly when browsing the Internet. This is just the type of a problem that can be easily solved using the "filters" of Folder Guard.

Step 1. Creating the filter

Run Folder Guard, switch to its Filters view, and use the Filters - New command to create a new filter. (For more information about filters, see Folder Guard Help.) Fill out the Properties window for the new filter as follows:

Be sure to enter the correct path to the Temporary Internet Files folder in the Apply to folders box. The paths shown on the picture should work if you have Windows 95, 98, or Me. However, if you have Windows 2000 or Windows XP, replace each occurrence of C:\Windows\Temporary Internet Files with C:\Documents and Settings\*\Local Settings\Temporary Internet Files. That is, your Apply to folders box should look like:

"C:\Documents and Settings\*\Local Settings\Temporary Internet Files";
"C:\Documents and Settings\*\Local Settings\Temporary Internet Files\*"

(Note the quotes around the names of the folders, they are important!)

Note also that we have entered the masks of only two most popular file formats for the programs, *.exe and *.zip. There are, however, other formats for distributing programs via the Internet, for example, *.rar, *.arc, *.cab, and so on. If you are concerned that other users may download and use such software packages, you should add the appropriate masks to the Apply to files area.

Step 2. Activating the filter

Rename the new filter to "IE downloads" (or to any other name you like), and activate it by assigning the no access attribute to it:

Step 3. Enabling the protection

Now save the changes and enable the protection, as usual (See How to hide a folder for details). The filter you have set up above should prevent Internet Explorer from downloading the exe and zip files from the Internet, and thus prevent users from installing unauthorized software on your computer.
Windows / Linux / folder guard:part IX
Nov 04, 2008, 03:21 PM
How to disable the CANCEL button on the Windows Me/98/95 login window:

(NOTE: This page applies to the DOS-based versions of Windows only, namely Windows 95,98, and ME. The NT-based editions such as Windows XP and 2000 do not have this problem.)

The problem: You have set up several Windows passwords for the users working with your computer. You hope that from now on a user will have to enter a correct user name and password before s/he will be allowed to start working with Windows. This protection, however, can be easily bypassed: an unauthorized user can just press the Cancel button at the logon prompt and start using the computer as the "default" user.

With the Monitor user logon feature of Folder Guard Classic Edition, you can solve this problem by configuring it to disable the CANCEL button on the login window.

First, run Folder Guard, choose the File - Settings command from the menu, and select the Protection page. Make sure that the Enable protection at Windows startup and Monitor user logon options are checked:

Now click on the Options button next to Monitor user logon to display the Logon monitoring options window:

If you want to just disable the Cancel button on the Windows logon prompt, then check the No Default user option in the Default user area.

Or, if you want to be able to use the Cancel button sometimes yourself, but stop other users from pressing it, you may want to protect the button with a password. To do that, clear the No Default user option in the Default user area, and check the Ask password option instead. Then click on the Password button and enter a password of your choice.

While you are setting up these options, you may also want to check the Validate user name option as well, to prevent users from creating new user accounts by entering new user names into the login box.

Finally, enable the protection, as usual (see the How to hide a folder page for the details), and from now on, the Cancel button on the Windows login box would be either disabled, or it would work only after you have entered the correct password that you have set up above:
Windows / Linux / folder guard:part VIII
Nov 04, 2008, 03:19 PM
How to prevent users from reformatting hard drives:

If you use Window Me/98, you can use the Protect - Permissions command of Folder Guard Classic Edition to remove the permissions to format drives from the selected users:

(This option is not offered on Windows Vista/XP/2000/2003, because these versions of Windows contain built-in means of restricting user access to the reformatting commands.)
Windows / Linux / folder guard:part VII
Nov 04, 2008, 03:18 PM
How to prevent users from running programs from the removable disks:

If other users of your computer often install unauthorized programs or run games from the removable disks (such as floppy, Zip, CD-ROM drives, etc.), cluttering your hard drive and sometimes even infecting it with the viruses, you would probably want to restrict their ability to run programs from the removable drives. The obvious solution could be to use Folder Guard to assign the "no access" to the removable drive and that would stop it all, but what if you still want the users to be able to use the removable drive to backup their documents, or to open files other than programs? No problem, Folder Guard is flexible enough to allow for such protection.

The tool of choice in a situation like this would be the "filters" of Folder Guard. Filters let you fine-tune the protection Folder Guard based on the names of the files, folders they are located in, and the module names accessing the files. For example, with filters you can allow one program access files in a particular folder, while all other programs would be denied such access, and so on. Folder Guard comes with several pre-configured filters, designed to perform various tasks, which you can see by choosing the View - Filters command from its menu.

To solve the problem of users running the programs from the removable drives, we need to create a new filter, which would apply only to the executable files located on the removable drives, but would not apply to all other files. Then, we would assign the "no access" to such a filter, and that would restrict access to the programs on the removable drives, while allowing access to the rest of the files.

For the sake of example, we will create a filter that would apply only to the files located on the floppy drive A:. If you want to pally it to other removable files that you may have as well, you will need to modify the instructions below accordingly.

Step 1. Create a new filter

Choose the View - Filters command from Folder Guard menu to switch to the window that shows the filters of Folder Guard, and then choose the Filters - New command to create a new filter. Fill out the "Properties for New Filter" dialog box as follows:

We want this filter to apply to the executable files only, and the executable files usually have the extensions .exe, .com, that's why we have entered these extensions in the "Apply to files" mask. Also, since we want the filter to apply only to the files on the floppy drive A:, we have entered the mask "A:*" in the "Apply to folders" area. (If you have a CD-ROM drive D:, and you want to prevent running programs from it, too, then you should enter the "Apply to folders" mask as follows: "A:;D:*"). Finally, the text in the "Comments" area is just a note for yourself about what we are doing, you can enter any other text there, or leave it empty, if you want.

Now press OK and enter some meaningful name for the filter you've just created:

Step 2. Restrict access to the files of the filter

This is done in the same way as with regular folders and files: simply use the Protect - Access menu or the toolbar button to assign the "no access" attribute to the filter we've created (note that you cannot restrict the "visiblity" of the files defined by a filter, only access to such files may be restricted):

Step 2. Enable the protection

Again, this step is no different than enabling the protection when hiding the files and folders: in Folder Guard, choose Tools - Enable Protection from the menu. If you have already closed the Folder Guard window, then choose the Start - Programs - Folder Guard - Toggle Protection.

Now try to run a program from the removable drive you have protected - it should not be possible. If you try to open any other file, you should be able to do that without any restrictions.
Windows / Linux / folder guard:part VI
Nov 04, 2008, 03:17 PM
How to prevent users from installing unauthorized programs with Folder Guard:

To stop other users of your computer from installing programs without your permission, evaluate the possible ways of getting unauthorized programs to run, and restrict them. The most common ways are:

1. Installing programs from the floppy, CD-ROM, or other removable disks.

    Restrict the ability of the users to run programs from the removable drives.

2. Downloading programs from the Internet.

    Restrict the ability of the users to download programs from the Internet.

3. Receiving programs as the email attachments.

    Configure your email software to stop users from opening the email attachments.

Windows / Linux / folder guard:part V
Nov 04, 2008, 03:16 PM
Set up user-specific restrictions

With Folder Guard, you can set up different restrictions for different users of your computer. For instance, you can make a folder visible when you log in to Windows, but remain hidden when some other user logs in. Folder Guard uses the built-in Windows user accounts, that is it distinguishes between different users by the names they enter when they log in to computer.

To control which restrictions should apply to which users, use the User List of Folder Guard. (If it is not visible when you open the main window of Folder Guard, choose the View - User List command from the menu to make it visible.)

The User List originally contains only one item: Default. This user name is used to set up the restrictions that would apply to all users for whom no user-specific restrictions have been set up. To create restrictions that would apply to specific users, first use the User list command on the Protect menu to add the user names to the User List. Then, to set up the restrictions for a user, simply select that user's name in the User List, and assign the desired attributes to the folders: they would be applied to the selected user only.

For example, if you want to hide the folder named A Private Folder located on the C: drive from all users except yourself, first select the Default name in the User List, and apply the hidden and no access attributes to this folder:

(More information on how to hide folders with Folder Guard is available here.) Now use the User list command on the Protect menu to add your login name to the User List. (In this example we assume that your login name is Admin.)

Finally, select your user name (Admin in this example) in the User List and assign the visible and full access attributes to the same folder:

That's it, the user-specific protection of the folder has been set up! To see how the folder will be protected for each user, simply select the user's name in question in the User List, and the images displayed next to the folders will show how each user will be able to see and access each folder.

Of course, if you have other users, you can set up restrictions specific to them, too. For instance, if you want some users to be able to see and open files from your private folder, but not to save any changes to them, you would assign the read-only attribute to the folder for such users. If you don't assign any user-specific attributes to a folder, then when such a user logs in to the computer, the restrictions specified for the Default user would apply.
Windows / Linux / folder guard:part IV
Nov 04, 2008, 03:14 PM
How to restrict access to Control Panel with Folder Guard:

It is not obvious, but the commands that appear in Windows Control Panel are handled by the special system files of the type "Control Panel extension" (their names have the extension .CPL). For example, the DESK.CPL file is responsible for the Display command of Control Panel, TIMEDATE.CPL - for the Date and Time command, and so on. (Some of the .CPL files are responsible for more than one command of Control Panel).

This information gives us a method of restricting access to the commands of Control Panel with Folder Guard: we simply need to restrict access to the appropriate .CPL file with Folder Guard, that would make Windows unable to use that file, and it would effectively prevent access to the appropriate command of Control Panel.

Here is the list of the common .CPL files and the Control Panel commands each of the files is responsible for:

.CPL file   Control Panel command(s)
ACCESS.CPL   Accessibility Options
APPWIZ.CPL   Add/Remove Programs
DESK.CPL   Display
HDWWIZ.CPL   Add/Remove Hardware
INETCPL.CPL   Internet settings, user accounts on Windows 95,98,Me
INTL.CPL   Regional settings
JOY.CPL   Game Controllers
MAIN.CPL   Fonts, Keyboard, Mouse, PC Card (PCMCIA), Printers
MMSYS.CPL   Sounds
MODEM.CPL   Modems
NCPA.CLP   Network connections
NETCPL.CPL   Network settings
NUSRMGR.CPL   User manager on Windows XP
ODBCCP32.CPL   ODBC Data Source Administrator
PASSWORD.CPL   Passwords
POWERCFG.CPL   Power Management
SYSDM.CPL   System
TELEPHON.CPL   Telephony
THEMES.CPL   Desktop Themes

(You may have other CPL files, or not all of the files listed above, depending on your version of Windows and other software installed on your computer).

How to use this list? Very simple:

    * Find the command of Control Panel in the table that you want to restrict with Folder Guard;

    * Determine the name of the .CPL file that is responsible for that command;

    * Run Folder Guard and use its Edit - Add file command to add the desired .CPL file(s) to the main window of Folder Guard. (See How to hide a file for more information on how to protect files with Folder Guard). The .CPL files are usually located in the Windows system folder, such as C:\Windows\System, C:\Windows\System32, and similar. Note that you may not actually see the .CPL extensions when browsing the system folder, your Windows Explorer may be configured not to display the known file name extensions. If this is the case, look for the files of the type "Control Panel extension".

    * Now assign the no access attribute to the .CPL file you want to protect. For example, if you want to restrict access to the Display Properties command of Control Panel, you need to assign the no access attribute to the desk.cpl file:

    * Finally, enable the protection, as usual, and observe the effect: the command that you have restricted may still be visible in Control Panel, but when you attempt to use it, nothing should happen, the command should not work.
Windows / Linux / folder guard:part III
Nov 04, 2008, 03:13 PM
Use Quick Start Wizard of Folder Guard

Folder Guard now includes Quick Start Wizard that can guide you through the steps necessary to protect a folder on your computer. It is not necessary to use Quick Start Wizard; you can achieve the same effect using the commands of Folder Guard directly. However, if you are not familiar with Folder Guard and want to get up to speed with it quickly, Quick Start Wizard is a good starting point.

Quick Start Wizard is initially configured so that it automatically starts whenever you run Folder Guard:

The Welcome page of Quick Start Wizard

If you don't want it to start automatically, simply clear the Run Quick Start Wizard every time I start Folder Guard option on the Welcome page. You can run Quick Start Wizard anytime by choosing the Tools - Quick Start Wizard command from the main menu of Folder Guard.

When you press the Next button, Quick Start Wizard prompts you to select the folder you want to protect:

Select the folder to protect

Note that at this point no protection is actually taking place: the Quick Start Wizard is only gathering information about the folder you want to protect and how exactly you want to protect it. You will be prompted to enable the protection at a later point.

The next page lets you specify the protection method for the folder you've selected:

The folder protection method

If you want to lock the folder with a password, select the first option offered, and also click on the button to set up the unlocking password for the folder. In this case, Quick Start Wizard will apply the empty and no access attributes to the folder for you, to make it restricted.

The second option lets you specify the protections attributes of the folder, such as read-only, or hidden. If you want to hide the folder, or to make it read-only, then select this option and the following pages will let you to select the desired protection attributes for the folder.

At this point Folder Guard is ready to start protecting the folder according to the choices you have made. Or, you can choose to set up the protection for another folder (or even start over from scratch) before enabling the protection:

Enable protection of the folders

Finally, Quick Start Wizard asks you whether you want to configure your computer so that the protection will be enabled automatically for you each time Windows starts up:

Enable protection at Windows startup

Normally you would want to select the first option; however, if you want to enable the protection only temporarily, select the second option instead.

Note that you can run Quick Start Wizard again, after closing it, by choosing the Tools - Quick Start Wizard command from the main menu of Folder Guard.

Note also that Quick Start Wizard lets you perform only the most basic operations. For the more complex tasks, such as protecting files, setting up different protection settings for different users, configuring the filters, etc., use the commands of Folder Guard directly.
Windows / Linux / folder guard:part II
Nov 04, 2008, 03:11 PM
Lock files and folders with passwords:

You don't have to assign a separate password for each folder you want to protect with Folder Guard, because you can use the Master password to disable the protection from all folders with a single command. (Use the Start - Programs - Folder Guard - Toggle Protection command to Master password of Folder Guard and disable protection of all folders.)

If, however, you want to be able to unprotect individual files or folders, while keeping the rest of the objects protected, Folder Guard lets you do that, too.

Now, while you are still in Folder Guard, highlight the file or folder that you want to "unlock" independently on the others, and choose Edit - Unlocking Password command from the menu or toolbar:

Choose a password and press OK. Note that a little yellow key sign has appeared next to the folder's icon; this is the indication that this folder has an unlocking password assigned to it.

One more thing to do: choose File - Settings from the menu, select the Misc page, and make sure that the Add lock/unlock commands to the Windows shortcut menu option is checked:

If you use Windows Me, 98, or 95, then you also need to enable the Monitor user logon option, on the Startup page of the Settings dialog box. If the Monitor user logon option was not enabled before, you will need to restart the computer for the new settings to take effect. (This is not necessary if you use Windows XP, 2000, or later versions of Windows.)

Now enable the protection, as usual (see this article for the details) and look at the object you have protected through a Windows Explorer window. The object should be visible (we have not assigned the hidden attribute to it, remember?). However, when you attempt to open it, a prompt for the unlocking password should appear on the screen:

If you have entered a correct unlocking password, the folder should become unprotected and you should be able to work with the files and subfolders it contains without restrictions. If you don't enter the correct unlocking password, the folder will remain protected.

Another way to display the password prompt is to right-click on the protected file or folder with the mouse, to display its shortcut menu, that should contain the Unlock command:

(If there is no Unlock command on the menu, check that you have assigned an unlocking password to this particular object as described above, and also that you have enabled the option to add the Lock/Unlock commands to the shortcut menu. Again, see above for the details.)

If the folder is already unlocked, then the Lock command would be shown on the shortcut menu (instead of Unlock), which you can use to lock the folder back, after you have finished working with the files it contains.
Windows / Linux / folder guard:part I
Nov 04, 2008, 03:07 PM
How to hide a folder with Folder Guard:

It's actually very easy to hide a folder with Folder Guard: it takes only a few mouse clicks (if you know where to click, of course  ). Basically, you need to run Folder Guard, locate and select the folder you want to hide, and assign the hidden attribute to the folder (Yes, it's really that easy!). After you have enabled the protection, that folder, as well as all files and subfolders contained therein, will be hidden from all users of your computer. Only you will be able to make the folder visible again by entering a valid password.

Note that Folder Guard now offers Quick Start Wizard that makes the procedure of setting up the protection of folders especially easy and fast. You may want to use Quick Start Wizard to hide a folder, or use the instructions below to set up the protection directly. The end result should be the same.

IMPORTANT: First of all, a word of warning: Folder Guard is a powerful tool and should be used responsibly. Using it thoughtlessly, you can inadvertently make your computer inaccessible. For example, it is very easy with Folder Guard to prevent access to the Desktop folder, and make Windows start with a blank screen after you reboot. DO NOT try to protect folders with your important documents until you have tested Folder Guard on some practice folder, that contains no important documents (or at least make sure you have the copies of the documents saved in some other folder before trying to hide them with Folder Guard.) Only after you have tried Folder Guard to protect a test folder and got used to the way it works and operates, you can try to use it for protection of the "real" documents and folders. Also, it's always a good idea to back up your hard disk before trying any new software, including Folder Guard!

Step 1. Getting your system ready

Let's create a test folder that we will hide with Folder Guard. In this demonstration, we will create a folder named Test on the Desktop, however, you can create a different folder in a different place, just make appropriate adjustments while following the instructions.

To create a folder on the desktop, right-click within an empty space of your desktop and choose New - Folder from the shortcut menu:

Rename the newly created folder to Test:

Step 2. Run Folder Guard and select the Test folder

Click on the Start button, and choose Programs - Folder Guard - Folder Guard from the Start menu. The main window of Folder Guard should appear on the screen shortly:

If you know where the test folder is located on your hard disk, you may just click on the little squares with the + signs to find the folder and select it. In our case, the Test folder is a subfolder of the Desktop folder, so we have to find the Desktop folder first. You can use the Edit - Go to special folder command of Folder Guard to quickly find the location of the this and other special Windows folders:

(The actual list of folders displayed in this window may differ on your computer, depending on the version number and edition of Windows that you use). Select Desktop in the list, click OK, and Folder Guard should highlight the Desktop folder for you:

Expand the Desktop folder (by clicking on the little square with the + sign next to it), and you will see the Test folder we've just created.

Step 3. Make the folder hidden

Now let's assign the appropriate attributes to the Test folder, by using the buttons on the toolbar. Make sure the Test folder is still selected, and click on the Hidden button on the toolbar (or choose Protect - Visibility - Hidden from the menu of Folder Guard) to assign the hidden attribute to the folder:

Hide folder by assigning the Hidden attribute to it

This way, you are giving Folder Guard the instructions to hide the folder and its contents from browsing. Notice that the icon next to the name of the folder have changed, reflecting the attribute you have just assigned. Notice also that the name of the folder is now shown in a bold typeface; this indicates that the folder has a non-default attribute assigned to it. (See Folder Guard Help for more information about the attributes). Keep in mind also, that at this point no protection is actually taking place: we are only setting up the protection, but we will actually enable it a bit later (see the next step below).

Step 4. Prevent access to the folder

While we are protecting a folder, it's a good idea to also restrict access to the folder you want to hide, because otherwise someone using your computer could guess the location of the folder and be able to open files from it, even if it's hidden. To completely prevent access to the files located in the folder, assign the no access attribute to it, either by choosing the Protect - Access - No access command from the menu, or by clicking on the appropriate button on the toolbar:

Prevent access to the folder by assigning the No Access attribute to it

Notice that the green checkmark that was displayed next to the folder name has now disappeared, and a little image of a red stop sign has appeared in its place. This is how Folder Guard gives us visual feedback about the results of our actions.

Step 5. Enable the protection and test the results.

Now it's time to enable the protection and test the results: choose Tools - Enable Protection from the menu, or click on the Toggle Protection button on the toolbar:

Look at the place on your desktop where the Test folder previously was: you cannot see it anymore!

Now choose the Tools - Disable Protection command from the menu, or click on the Toggle Protection button on the toolbar, and the folder should become visible again. (Although its location on the Desktop may change). That's how Folder Guard works!
Windows / Linux / Welcome to Folder Guard
Nov 04, 2008, 02:58 PM
Welcome to Folder Guard

Folder Guard® is a powerful computer security software that you can use to control access to files, folders, and other Windows resources, such as Control Panel, Start Menu, and so on. You can use Folder Guard to lock your personal files and folders with passwords, to stop other users from peeking into your records. You can even completely hide your private folders from virtually all applications, and such folders would remain invisible until you enter a valid password. You can also protect sensitive system files from modification or destruction, disable access to the removable drives, restrict access to Control Panel, and more.
You may be unable to select the Make this folder private option on the Sharing tab in the properties for a folder. The option may be unavailable.

This issue can occur for either of the following reasons:
•   The folder is not in your user profile (Drive_letter:\Documents and Settings\User_name, where Drive_letter is the drive on which Windows XP is installed and User_name is your user name). The Make this folder private option is available only for files in your user profile (the My Documents folder and its subfolders, and the Cookies, Desktop, Start Menu, or Favorites folders).
•   The Windows folder is located on a drive that is formatted with the FAT or FAT32 file systems. The Make this folder private option requires the NTFS file system.

To resolve this issue:
1.   If the folder you are trying to make private is not located in your profile (Drive_letter:\Documents and Settings\User_name, where Drive_letter is the drive on which Windows XP is installed and User_name is your user name), move it to your My Documents, My Music, or My Pictures folder and then select the Make this folder private option (if it is available).
2.   If the Make this folder private option is still unavailable in the My Documents folder, you may need to convert the Windows drive to NTFS as follows.

WARNING: Converting the drive to NTFS removes your previous operating system backup. Do not convert to NTFS if you may later need to uninstall Windows XP. Also, do not convert drive C to NTFS if you dual-boot Microsoft Windows 95, Microsoft Windows 98, or Microsoft Windows Millennium Edition (Me) on the same computer, and do not convert other drives to NTFS if you dual-boot Windows 95, Windows 98, or Windows Me on the same computer and need access to the drive from Windows 95, Windows 98, or Windows Me.
a.    Click Start, and then click Run.
b.    In the Open box, type cmd, and then click OK.
c.    In the command prompt window, type the following line, and then press ENTER
convert drive_letter: /fs:ntfs
where drive_letter is the drive on which Windows XP is installed. For example, typing convert d: /fs:ntfs converts drive D to NTFS format.

d.    Press Y, and then press ENTER to continue if you agree to remove your previous operating system backup (if appropriate).
e.    Press Y, and then press ENTER to dismount the volume.
f.    Press Y, and then press ENTER to schedule the conversion for the next time the computer restarts.
g.    Restart your computer.
The Windows volume is converted to NTFS when your computer restarts, and the Make this folder private option should be available for folders in your profile.

This behavior is by design.

If you want to make a file in a private folder available to others, move it to the Shared Documents, Shared Pictures, or Shared Music folder.

For additional information about file sharing and permissions, click the following article number to view the article in the Microsoft Knowledge Base:
304040 ( How to configure file sharing in Windows XP
The Windows Setup program configures Microsoft Windows XP to use the friendly Welcome logon screen and the shutdown buttons if your computer is installed as a home computer. A home computer is a computer that does not specify a network domain.

This article describes how to use the classic logon screen that Windows XP-based computers use when they are joined to a domain. The classic logon screen looks similar to the following example:

Log On to Windows
    User name: _____________
    Password:  _____________

Use the classic logon screen
To temporarily use the classic logon screen, press CTRL+ALT+DEL two times on the Welcome logon screen.

To configure Windows XP to use the classic logon and shutdown screens for every logon session, follow these steps:
1.   Click Start, and then click Control Panel.
2.   Double-click User Accounts.
3.   Click Change the way users log on or off.
4.   Clear the Use the Welcome screen check box.
Note If you turn off the Welcome logon screen, you also turn off the Fast User Switching option.

Require users to press CTRL+ALT+DEL before the classic logon screen appears
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 ( How to back up and restore the registry in Windows

If you want users to have to press CTRL+ALT+DEL before the classic logon appears like a Windows XP-based computer that is joined to a domain, follow these steps:
1.   Click Start, click Run, type regedit in the Open box, and then click OK.
2.   Click the Winlogon subkey at the following registry location:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
3.   Click Edit, click New, and then click DWORD value.
4.   To change the value name, type DisableCAD, and then press ENTER.
5.   Keep the data value set to 0. The data value set appears as 0x00000000(0).

For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
314493 ( How to change the Windows Logon screen saver in Windows XP
1. Find that file in a few quick clicks

You don't need to remember folder names to be organized anymore. Save time by instantly tracking down any document, photo, e-mail message, song, video, file, or program on your PC using Instant Search.

Just open the Start menu and begin typing in the Instant Search box—Windows Vista searches file names, application names, the full text of all files, and metadata, and then displays the results right away.
See everything you have open at a glance   
2. See everything you have open at a glance

Have you lost track of what files and programs you've opened? Flip through all your open files and windows with a simple click of your mouse using Windows Flip 3DA—you're just one click away from everything you're working on.

Plus, in Windows Aero,A when you rest your mouse pointer on the taskbar, you can see thumbnail images of the windows you have open without having to expand them—so you can find what you're looking for at a glance.
Keep photos organized—and ready to share   
3. Keep photos organized—and ready to share

Is your collection of digital photos getting out of hand? You don't have to search through folders to track down the ones you want. Now you can tag your photos with a date, keyword, rating, or any label you choose so you can find them quickly and easily in Windows Photo Gallery.

You can also use Photo Gallery to fix and edit photos, and then share them with family and friends through slideshows, e-mail, or prints—so everything you need for photos is in one place.
Create a custom movie without a fine arts degree   
4. Create a custom movie without a fine arts degree

Making a great home movie just got easier. Use Windows Movie Maker to blend videos and photos into a rich movie, complete with your own soundtrack, titles, and credits.

When your masterpiece is ready to share with family and friends, you can easily create a professional-looking DVD in Windows DVD Maker.U
Keep track of your music—and play it anywhere   
5. Keep track of your music—and play it anywhere

The larger your collection of digital music grows, the harder it can be to organize and keep track of it. But now you can easily scroll, flip, browse through, and play your entire music library in Windows Media Player 11. You can even create new playlists of your favorite tracks with a single click.

You can keep your music moving with you by easily synchronizing your portable music device. Or you can share the contents of your entire library with other computers on your home network or with digital media devices such as Xbox 360.
Surf multiple waves of the web at once   
6. Surf multiple waves of the web at once

Do you like to jump from website to website? Satisfy your appetite for multitasking without having to open several browser windows. You can open multiple webpages in one window and easily click between them with the tabbed browsing feature in Windows Internet Explorer 7—plus, you can see thumbnail images of all your open webpages at a glance with Quick Tabs.
Record and watch TV on your time   
7. Record and watch TV on your time

Watch TV on your own schedule—not the TV networks' schedule. If your PC has a TV tuner, you can record, watch, and pause live television on your desktop or mobile PC using Windows Media Center.M

With multiple TV tuners, you can even record one channel while watching another. When and where you watch your shows is now up to you.
Bring your TV and PC together to take home entertainment to a new level   
8. Bring your TV and PC together—and take home entertainment to a new level

Tired of huddling around the PC for entertainment? Connect your PC to one or more televisions in your home using a Windows Media CenterM Extender like Xbox 360, and enjoy all your digital entertainment on the big screen—from photo slideshows, home videos, and digital music to live and recorded TV shows and movies.
Keep the things you need most at your fingertips   
9. Keep the things you need most at your fingertips

No need to open a web browser to check traffic and weather, open a calculator to add up a few numbers and open an application to see your calendar. Now you can put mini-applications called gadgets right on your desktop, where you can see and use them whenever the mood strikes. Just use the Windows Sidebar pane to store and organize your favorite gadgets.
Help your kids stay safer   
10. Help your kids stay safer

Worried about your kids' computer use or about what they may encounter online? Now you can give your kids a safer experience and set PC usage boundaries for them by using the centralized Parental Controls in Windows Vista. You can even restrict games and websites based on your family's values.

Plus, you can better protect your PC and your personal information, as well as your family, with built-in security tools like Windows Defender and anti-spam and phishing filters.
This article provides descriptions of the registry entries for policies that you can apply to the Start menu in Microsoft Windows XP.

Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
( How to back up and restore the registry in Windows

You can use the Group Policy editor (Gpedit.msc) under the following location to configure Start menu features:
User Configuration \ Administrative Templates \ Start Menu and Taskbar
Note: Except when noted, all of these registry settings are under the following registry key:
The registry entries are DWORD values. A value of 1 is enabled, and a value of 0 is disabled.

Policy:Disable the new simple Start Menu
Description:Disables the new simple Start menu and forces the classic
Start menu.
Registry Value:"NoSimpleStartMenu"

Policy:Remove pinned programs list from the Start menu
Description:Removes the pinned programs list from the Start menu. Also
removes the Internet and E-mail checkboxes from the Start menu
customization CPL.
Registry Value:"NoStartMenuPinnedList" 

Policy:Remove frequent programs list from the Start Menu
Description:Removes the frequently-used programs list from the Start
Registry Value:"NoStartMenuMFUprogramsList"

Policy:Remove More Programs list from the Start menu
Description:Removes the More Programs list from the Start menu.
Registry Value:"NoStartMenuMorePrograms"

Policy:Remove common program groups from Start Menu
Description:Removes items in the All Users profile from the More
Programs list on the Start menu.
Registry Value:"NoCommonGroups"

Policy:Gray unavailable Windows Installer programs Start Menu shortcuts
Description:Displays partially installed programs in gray text on the
Start menu.
Registry Value:"GreyMSIAds"

Policy:Disable and remove links to Windows Update
Description:Removes the Windows Update link from the More Programs list
in Start menu, from the Tools menu in IE, and blocks user access to
Registry Value:"NoWindowsUpdate"

Policy:Remove user folders from the Start Menu
Description:Removes all user-specific folders except My Documents (My
Pictures, My Music, Favorites, and Recent Documents) from the Start menu.
Also removes the corresponding checkboxes from the Start menu
customization CPL.
Registry Value:This is a combination of the following:
"NoStartMenuMyMusic", "NoSMMyPictures","NoFavoritesMenu",

Policy:Prohibit user from changing user folder paths
Description:Prevents users from changing the path to the My Pictures,
My Music, Favorites, and Recent Documents folders.
Registry Value:"DisableMyPicturesDirChange", "DisableMyMusicDirChange",

Policy:Remove My Documents folder from the Start Menu
Description:Removes My Documents folder from the Start menu and
corresponding checkbox from the Start menu customization CPL.
Registry Value:"NoSMMyDocs"

Policy:Prohibit user from changing My Documents path
Description:Prevents users from changing the path to the My Documents
Registry Value:"DisablePersonalDirChange"

Policy:Remove Recent Documents item from Start Menu
Description:Removes the Recent Documents folder from the Start menu. Also
removes the corresponding checkbox from the Start menu customization CPL.
Registry Value:"NoRecentDocsMenu" 

Policy:Maximum number of recent documents
Description:Specifies the number of shortcuts displayed on the Recent
Documents submenu.
This policy exist under the following location in Group Policy:

User Configuration \ Administrative Templates \ Windows Components
Registry Value:"MaxRecentDocs" 

Policy:Clear history of recent documents on exit
Description:Deletes all shortcuts shown in the Recent Documents menu when
the user logs off.
Registry Value:"ClearRecentDocsOnExit"

Policy:Remove Favorites item from Start Menu
Description:Prevents users from adding the Favorites item to the Start
menu. Also removes the corresponding checkbox from the Start menu
customization CPL.
Registry Value:"NoFavoritesMenu"

Policy:Remove My Computer from the Start Menu
Description:Removes the My Computer item from the Start Menu and the
corresponding checkbox from the Start menu customization CPL.
Registry Value:"{20D04FE0-3AEA-1069-A2D8-08002B30309D}" under

Policy:Remove Network Connections from the Start Menu
Description:Removes the Network Connections item from the Start menu
and the corresponding checkbox from the Start menu customization CPL.
Registry Value:"NoNetworkConnections"

Policy:Remove Network Places from the Start Menu
Description:Removes the Network Places item from the Start menu and the
corresponding checkbox from the Start menu customization CPL.
Registry Value:"NoStartMenuNetworkPlaces"

Policy:Do not add shares of recently used documents to Network Places
Description:Remote shared folders are not added to Network Places whenever
you open a document in the shared folder.
Registry Value:"NoRecentDocsNetHood"

Policy:Remove Help item from Start Menu
Description:Removes the Help item from the Start menu, but does not
disable Help files from running.
Registry Value:"NoSMHelp"

Policy:Remove Search item from Start Menu
Description:Removes the Search item from the Start menu and disables some
Windows Explorer search elements.
Registry Value:"NoFind"

Policy:Remove Run item from Start Menu
Description:Removes the ability to execute programs from the Run option
on the Start menu, Task Manager, or by pressing Winkey + R. Also removes
the corresponding checkbox from the Start menu customization CPL.
Registry Value:"NoRun"

Policy:Add "Run in Separate Memory Space" check box to Run dialog box
Description:Allows 16-bit programs to run in a dedicated Virtual DOS
Machine (VDM) process.
Registry Value:"MemCheckBoxInRunDlg"

Policy:Do not use the search-based method when resolving shell shortcuts
Description:Prevents the system from conducting a comprehensive search of
the target drive to resolve a shortcut.
Registry Value:"NoResolveSearch"

Policy:Do not use the tracking-based method when resolving shell shortcuts
Description:Prevents the system from using NTFS features to resolve a
Registry Value:"NoResolveTrack"

Policy:Force Logoff to the Start Menu
Description:Forces the Logoff button to the Start menu and prevents users
from removing the Logoff option from the Start menu.
Registry Value:"ForceStartMenuLogoff"

Policy:Disable Logoff on the Start Menu
Description:Removes the "Logoff" button from the Start menu and prevents
users from adding the Logoff button to the Start menu.
Registry Value:"StartMenuLogoff"

Policy:Disable and remove the Turn Off Computer button
Description:Removes the "Turn Off Computer" button from the Start Menu and
prevents shutting down Windows using the standard shutdown user interface.
Registry Value:"NoClose"

Policy:Disable and remove the Undock PC command
Description:Removes the "Undock PC" button from the Start Menu and
prevents undocking of the PC (laptop).
Registry Value:"NoStartMenuEjectPC"

Policy:Disable drag-and-drop menus on the Start Menu
Description:Prevents users from modifying the Start menu by dragging and
dropping items. Other methods of customizing the Start menu are still
Registry Value:"NoChangeStartMenu"

Policy:Disable changes to Taskbar and Start Menu settings
Description:Removes the Taskbar &amp; Start Menu item from the Control
Panel, and removes the Properties item from the Start menu (and button)
context menu.
Registry Value:"NoSetTaskbar"

Policy:Disable user tracking
Description:Prevents the system from remembering the programs run, paths
followed, and documents used.
Registry Value:"NoInstrumentation"

Policy:Remove user name from Start Menu
Description:Removes the user name from the Start menu.
Registry Value:"NoUserNameInStartMenu"
xp_no_logoff.vbs - Disable/Enable Log Off on Start Menu
© Doug Knox - rev 04/12/2002

This small VB Script utility will remove the Log Off option from XP's Start Menu.

This is done by changing the adding/changing the StartMenuLogoff value in:


Usage: Download the xp_no_logoff.vbs file, and save this file to your hard drive. Navigate to where you saved the file and double click it. A confirmation dialog will appear when finished.  You will need to log off/back on or restart your computer for the change to take effect.  VB Script files can be viewed in Notepad or any text editor, as to the specific Registry key and value that are updated.
When you are using Remote Desktop and connect to a Windows XP Professional computer, the Log Off and Shutdown commands are missing from the Start menu.

The Classic Start menu does not have these commands.

By default, Disconnect is the only command that is listed on the Classic Start menu. By default, the Log Off command is available when you use the standard Start menu. To return the Log Off command to the Classic Start menu:
1.   Right-click the taskbar, and then click Properties.
2.   Click the Start Menu tab.
3.   The option for Classic Start menu should be selected. Click Customize.
4.   Under Advanced Start menu options, click to select the Display Log Off check box, click OK, and then click OK.

This behavior is by design.

The Shutdown command is not available on the Start menu to shut down, restart, or place a remote computer in a sleep state (for example, standby or hibernation) when you are using Remote Desktop. To shut down a remote computer when you are using Remote Desktop, press CTRL+ALT+END, and then click Shutdown. Or, use the shutdown command at a command prompt. For additional information about the shutdown command, type shutdown /? at a command prompt.
This article describes how to use the Language bar in Windows XP. The Language bar is a floating toolbar that appears on your desktop automatically when you add handwriting recognition, speech recognition, or an Input Method Editor (IME) as a method of inserting text.

You can use the Language bar to switch easily between tasks and perform tasks related to entering text. For example, if you are entering text with a handwriting input device, use the buttons on the Language bar to open the Writing Pad window, from which you can insert handwritten text into your document.

The buttons and options that are displayed on the Language bar depend on the text services you have installed, and on the program that is currently active. For example, Microsoft Word 2002 supports speech recognition, but Notepad does not. If both programs are running, the speech buttons are displayed when Word is active, but disappear when you make Notepad the active program. If you add a second language or keyboard layout, you can display the Language bar from the taskbar.

You can move the Language bar anywhere on your screen, minimize it to the taskbar, or make it nearly transparent. If you do not use it, you can close it. You should remove text services that you do not use becuase they require computer memory and can affect performance.

To Show the Language Bar
To show the Language bar (using Classic view in Control Panel):
1.   Click Start, click Control Panel, and then double-click Regional and Language Options.
2.   On the Languages tab, under Text services and input languages, click Details.
3.   Under Preferences, click Language Bar.
4.   Select the Show the Language bar on the desktop check box.
•   The Language bar is displayed automatically if you install a text service such as handwriting, speech, or an Input Method Editor (IME). However, if you close the Language bar, you can use this procedure to redisplay it.
•   If you minimized the Language bar to the taskbar, click the Language icon on the taskbar, and then click Show the Language bar.
•   After the Language bar is displayed, you can right-click it to display a shortcut menu. Use this menu to change settings for the Language bar, such as docking it on the taskbar or adding text labels.

To Hide the Language Bar
To hide the Language bar, right-click the Language bar, and then use any of the following methods:
•   Click Minimize to reduce the Language bar to an icon on the taskbar. This option removes the Language bar from your desktop but keeps it active and available.
•   Click Close the Language bar to turn off the Language bar and remove it from your desktop.
•   To perform Language bar functions without having the Language bar on your desktop, right-click the Language bar, and then click Additional icons in taskbar. You can then minimize the Language bar and click the text service icons on the taskbar to perform actions.
•   Closing the Language bar does not remove any text services. If you are not using a service, such as handwriting or speech recognition, you should remove it. Text services require computer memory and might affect performance.
•   You can also minimize the Language bar by clicking Minimize on the Language bar.
•   You cannot close the Language bar if you have installed an Input Method Editor (IME).

To Turn Text Services On or Off
To turn text services on or off (using Classic view in Control Panel):
1.   Click Start, click Control Panel, and then double-click Regional and Language Options.
2.   On the Languages tab, under Text services and input languages, click Details.
3.   Under Preferences, click Language Bar.
4.   To turn text services off, select the Turn off advanced text services check box.
5.   To turn text services on, clear the check box.
6.   Click Yes if you are prompted to confirm your selection.
•   Use this procedure to turn off handwriting recognition, speech recognition, and some accessibility features temporarily. These services can affect performance, and if you are not using them with your current program, you can turn them off temporarily.
•   If you are not using a text service at all, you should remove it.
•   Turning off text services does not affect multiple languages or keyboards that you have added under Installed services in the Text Services and Input Languages dialog box.

For additional information about using speech in Windows XP, click the article numbers below to view the articles in the Microsoft Knowledge Base:
( How to Install and configure Speech Recognition in Windows XP
( WD2002: Part 1: Speech and Handwriting Recognition Frequently Asked Questions
For more detailed information about using Microsoft speech recognition, click Help on the Language bar.

For the most up-to-date information about speech recognition developments at Microsoft, please visit the following Microsoft Web site:
Prague - South Korean carmaker Hyundai started production at a new factory in the Czech Republic Monday.

The new company in Nosovice, which lies about 320 kilometres east of Prague, is expected to produce about 200,000 vehicles annually, Radio Prague reported.

About 1.1 billion euros (1.41 billion dollars) has been invested in the factory, which should employ about 3,000. The factory will initially do finishing work on production of the i30, a compact car designed for European markets.

Hyundai, along with its subsidiary Kia, is one of the world's 10 biggest automakers.
Microsoft India has launched Live Search Maps that offers access to detailed listings and street maps for 9 cities, business listings across 29 cities and access to highway networks to 20,000 cities and towns in India.

Live Search Maps for India is on Microsoft's Live Search Service, allowing users to search for geographical information, places of general interest and business listings both on the PC and Mobile at and This is the first version of its local mapping service for India with the key features developed by the Microsoft India Development Center (MSIDC) based in Hyderabad.

Key features include Street Maps, Location Search, Business Listing Search, Routing or Directions for Navigation and options for users to print, share collections through email, blogs on Windows Live.

The maps include addresses, roads, localities, landmarks and places of general interest like monuments, restaurants, hotels and other places of interest across cities like Delhi, Mumbai, Chennai, Kolkata, Bangalore, Hyderabad, Pune, Ahmedabad and Jaipur.

It also includes business listings for Mumbai, Delhi, Pune, Bangalore, Hyderabad, Chennai, Ahmedabad, Kolkata, Agra, Allahabad, Amritsar, Bhubaneshwar, Chandigarh, Cochin, Coimbatore, Jaipur, Jalandhar, Kanpur, Lucknow, Ludhiana, Mangalore, Nagpur, Nasik, Patiala, Patna, Rajkot, Surat, Vadodara and Vishakapatnam.

Live Search Maps India is powered by the Microsoft Virtual Earth
How do you pronounce IT?

802.11    "eight-oh-two-dot-eleven"
ABAP    "ah-bop"
ACL    "aye-cee-el" or "aye-kull"
acronym    "AK-ruh-nihm"
APAR    "AY-pahr"
ASCII    "ASK-ee"
BAPI    "BAH- pee"
Beowulf    "bay-oh-woolf"
cache    "cash"
canonicalization "KA-nahn-nihk-uhl-ih-ZAY-shun"
CICS    "kicks or cee-eye-cee-ess"
CISSP    "cee-eye-ess-ess-pee"
CLEC    "cleck or cee-leck"
COMMAREA    "COM -area"
daemon    "DEE-mon or DAY-mon"
data    "DAY-tuh"
Debian    "deb-ee-an"
DOS    "doss"
EBCDIC    "EHB-suh-dik"
FAQ    "fack or eff-ay-q"
Fibre    "fie-burr"
Freethem.K    "free-thum-KAY (do not pronounce the dot)"
FUD    "fud"
gibibyte    "GIH-bee-bite"
GIF    "giff (with a hard "g" as in goat) or jiff (as in the peanut butter)"
GNOME    "GUH-nome or nome (rhymes with home)"
GNU    "ga-noo or noo"
grok    "grahk"
GUI    "GOO-ee"
heterogeneous    "het-ter-o-GENE-ee-us"
HIPAA    "HIP-puh"
IDS    "eye-dee-ess"
IPsec    "EYE-pee-sec"
iSCSI    "EYE-scuzzy"
ITIL    "EYE-till "
J2EE    "jay-TWO-ee-ee or, by some, jah-TOO-ee"
keitai    "kay-tie"
Kerberos    "KERR-berr-ross"
KLOC    "KAY-lock"
LAN    "lan (rhymes with man)"
LEC    "lehk"
Linux    "LIH-nux"
LOB    "ell-oh-bee"
LPAR    "EL-par"
LU-LU    "loo-loo"
mebibyte    "MEH-bee-byte"
MIPS    "mihps"
MySQL    "my-ess-q-el"
NAS    "nazz"
NetBEUI    "NET-boo-ee"
nuclear    "new-klee-er"
OS X    "OH-ESS-ten"
parity    "PAIR-ih-tee"
PC-cillin    "PEE-CEE SIHL-uhn (rhymes with penicillin)"
PEBCAK    "PEEB-kak"
POSIX    "PAH-zihcks"
PostgreSQL    "post-gree-es-q-el"
QAM    "kyoo-ay-ehm"
queue    "just like the letter q, "kyoo""
RACF    "rack-EFF"
Rijndael    "RAIN-dahl"
router    "rowt-ter (US) or root-ter (UK)"
SaaS    "sah-ss, rhymes with "glass""
SAML    "sah-muhl"
SAP    "ess-ay-pee"
SAPScript "   ess-ay-pee-script "
SATA    "SAY-tuh"
schema    "SKI-muh"
SFA    "ess-eff-ay "
Siebel   "SEE-bull"
SIP    "sihp"
SOA    "soh-ah"
Sophos    "SO-fohs"
SQL    "ess-q-el or SEE-kwehl (both are used)"
SuSE    "sue-sah"
sysop    "SISS-op"
UDDI    "you-die or ewe-dee-dee-eye"
URL    "yew-are-el "
VAR    "vahr"
vi    "vee-aye"
VoIP    "vee-oh-eye-pee "
WAN    "wan (rhymes with man)"
wav file    "WAVE-file"
WebDAV    "WEB-daav"
Wi-Fi    "WHY-FY (rhymes with sky)"
Windows Me    "WIHN-dohs EHM-EE"
WLAN    "double-you-lan"
WSCI    "wiz-key"
WSDL    "wiz-dull"
WYSIWYG    "WIZ-ee-wig"
Xanadu    "ZAN-ah-doo"
Statistics indicate that the average Web site is 5 megabytes (MB) or smaller. But how much room you need depends on what kind of site you want. How many kilobytes (KB) will that graphic really use? How big are your database files? What happens if all these files exceed the limit of your Web host? These are all essential questions to ask early on in the Web-building process.

Judging Your Storage Needs

Web sites contain many different kinds of files and all of them need room. Text files tend to be small in comparison to images, but still they take up space. The amount of text in an average print page takes up between 1 KB and 3 KB of storage when it's converted into a Web page. On the other hand, a picture is literally worth a thousand words on the Web button-sized images can be 1 KB to 5 KB in size, and larger images can be 30 KB to 60 KB or more.

Video and audio can be very large, from 500 KB to 10 MB or more. If you intend to use streaming media, be sure you know how large your streaming media files will be. Downloadable files such as MP3s vary in size from 2 MB to 5 MB. Programs and drivers can be that size or greater. Adobe portable document format (PDF) files can vary from under 100 KB to 800 KB or more. Be sure you know how large your database files will be, too, before you shop for a Web host they can be very large.

Exploring Every Plan

Most Web hosts offer a variety of plans, ranging from small amounts of storage space (5 MB to 20 MB) to vast amounts (50 MB to 500 MB+) at a higher cost. Some Web hosts offer "unlimited" storage space, but it is rarely truly unlimited. Read the Web host's agreement closely to see if a limit is mentioned in the text. Also, e-mail the Web host directly and ask for an exact storage space limit. Sometimes, it's surprisingly small.

Exceeding Your Limit

Sometimes even the best-planned site can go over the storage space limit, and Web hosts' policies vary with regard to customers who exceed their limits. Some hosts will charge extra for each MB over the limit, some will contact you to see if you wish to move up to another plan, and others will terminate your service without warning. Check with the host to learn what charges might be applied to your account should you exceed their storage space limits.

Careful estimates for your site and research on your Web host's plans and policies can allow you not only to find satisfaction with a Web host, but also to find the most cost-efficient plan for your needs.
This page provides tables and other information about how many bytes are required (how much computer storage) for various information objects or purposes; it also summarizes some facts that have been gathered about how much information exists in the world and, where appropriate, how much computer storage this requires.

How many bytes for anything
A binary decision    =1  bit
A single text character    =1 byte
A typical text word    =10 bytes
A typewritten page    =2 kilobyte s ( KB s)
A low-resolution photograph    =100 kilobytes
A short novel    =1 megabyte ( MB )
The contents of a 3.5 inch floppy disk    =1.44 megabytes
A high-resolution photograph    =2 megabytes
The complete works of Shakespeare    =5 megabytes
A minute of high-fidelity sound    =10 megabytes
One meter (or close to a yard) of shelved books    =100 megabytes
The contents of a CD-ROM    =500 megabytes
A pickup truck filled with books    =1 gigabyte GB )
The contents of a DVD    =17 gigabyte s
A collection of the works of Beethoven    =20 gigabytes
A library floor of academic journals    =100 gigabytes
50,000 trees made into paper and printed    =1 terabyte ( TB )
An academic research library    =2 terabytes
The print collections of the U.S. Library of Congress    =10 terabytes
The National Climactic Data Center database    =400 terabytes
Three years' of EOS data (2001)    =1 petabyte ( PB )
All U.S. academic research libraries =   2 petabytes
All hard disk capacity developed in 1995    =20 petabytes
All printed material in the world    =200 petabytes
Total volume of information generated in 1999    =2 exabyte s ( EB s)
All words ever spoken by human beings =   5 exabytes
Melbourne, November 3 : Tobey Maguire, who rose to fame with his role as Peter Parker in the Spider-Man films, has been signed on for Spider-Man 4 and 5 too.

The 33-year-old actor is set to work with director Sam Raimi, who too has been roped in for the future instalments, reports the Daily Telegraph.

Though the plot remains unknown, Maguire will be shooting back to back for the two movies much like the 'Lord of the Rings'.

However, it remains yet to be revealed whether Kirsten Dunst will be returning as Maguire's on-screen love interest in the adaptation of the hit comic book.

According to the Hollywood Reporter, playwright David Lindsay-Abaire might just soon write the script after finalising his talks with Columbia Pictures.
Virginia (USA), Nov. 3: With less than 48 hours to go before American voters decide on who their 44th President will be, the Indian American community appears to have already decided that the United States is ready to have its first Afro-American head of state.

In their view, Illinois Senator Barack Obama is on all counts, a transformational candidate, a man who has the potential to lead the country, a candidate who will bring fresh energy to the White House and to the administration in Washington.

"To his advantage, Obama is from all accounts, a transformational candidate who has been able to go beyond race, who is very thoughtful, very contemplative and in that sense, he looks more presidential and ultimately people want a leader who doesn''t necessarily look like them or so on, but someone who can lead and he seems to have that," Jaikishen Desai, a senior economist at the World Bank, told ANI in an interview.

He further went on to say that "In politics, people say something and when they come in power, they do something else, that''s a different thing.

When asked to comment on the issue of outsourcing, Desai said that the Democratic camp seemed to be in favor of greater checks and curbs than the Republican camp.

"Right now, there might be little negativism towards outsourcing. But I think, the downturn of the world economy will have more effect (on outsourcing). There might be small differences between McCain and Obama (on the issue)," he said.

On the longer-term issues like Iran and China's relationship with the United States, he said: "I guess Obama''s effect would be more positive in these."

Referring specifically to the meltdown of the American economy, Desai said: "Ultimately, if the wage difference is more, it would cause a loss."

He was, however, confident about the American economy making a comeback.

"Yes it can come back. But according to me, there can be more things that can create a difference like banks which set up offshore units to take advantage of the tax loopholes. Because, these days the sentiments are against the Wall Street and the financial world, there can be little difference on outsourcing. But the trend has been set and it's difficult to say whether Obama or McCain''s presidential victory would make a difference," Desai said.

Some Indian Americans like Sumathi Subramanium, a healthcare professional, said that the Induian American community is looking for change in the United States, and therefore, it should come as no surprise that they were rooting for Obama as opposed to Republican candidate John McCain.

"I think he (Obama) represents fresh energy, I think, you know, it's Indian Americans who are also looking for change in the country as opposed to people who have sort of seen George Bush over the last eight years and John McCain probably is going to be more of the same for them," said Subramanium.

The comments from the Indian Americans came as both camps (Obama and McCain) are positioning themselves for a long night on Tuesday. Both expect the closing stages of the race to be tight, as there is a potential for fraudulent voter registration.

The latest Investor''s Business Daily-TechnoMetrica poll out Sunday showed the race with just a 2-point spread, with Obama at 46.7 percent, McCain with 44.6 percent and 8.7 percent of the 844 likely voters still undecided.

McCain''s team points to several other polls showing the race tightening as the nation comes into the home stretch this election season.

His campaign manager, Rick Davis, told "FOX News Sunday" not to discount McCain, who was the underdog in the primaries and came roaring back.

"Look, this election is moving very quickly. There is no doubt that John McCain is increasing his margins in almost every state in the country right now. And I think that what we''re in for is a slam-bang finish. I mean, it''s going to be wild. I think that we are able to close this campaign," Davis said.

As for the Obama camp, chief strategist David Axelrod said that the McCain camp is deluding itself into thinking he can stage an historic comeback. He also said that he is worried about potential new voters not going to the polls because they believe Obama has it wrapped up.

Campaign manager David Plouffe said the Obama team expects at least 130 million voters this election, particularly from states where Democratic registration has increased this year.

Both sides are also talking about criticism about the voter registration process and how so many millions more people are on the rolls. Plouffe said that any fraud would be investigated, but obvious fraudulent registrants won''t make it into the booth.
Lenovo has introduced its "e" IdeaPad S10e netbook designed for students.

"Following the popularity of our recently introduced consumer netbooks, we are expanding our IdeaPad netbook line with models customized to the unique needs of students, teachers and education customers," said Scott DiValerio, president, Americas, and senior vice president, Lenovo."With technology choices including solid state drive storage, Windows or Linux operating systems and flexible warranties, we're enabling our customers to use Lenovo netbooks in a variety of settings, from instruction in the classroom to wherever they study, collaborate and learn." 

The Lenovo netbook provides basic functionality for word processing and light multimedia capabilities. A built-in webcam on the 10.1 inch display makes creating and sharing video messaging simple. The laptop also features Quick Start that allows students to quickly check email, browse the Internet, conduct video conferencing, view photos or listen to music without having to fully boot the operating system.

The netbook comes equipped with a 4 GB solid state drive for reliability or a hard disk drive up to 160 GB, Intel Atom processor, several choices of memory sizes and a variety of ports for expansion. Users can connect through Ethernet, WiFi and optional Bluetooth. Outfitted with a standard ExpressCard 34 slot, the netbook can also be enabled for mobile broadband. Choices of operating systems include Microsoft Windows XP Home or SUSE Linux Enterprise Desktop from Novell.

Lenovo is offering flexible warranties extending up to three years and shorter warranty periods covering limited parts replacement. 

The IdeaPad S10e netbook will be available starting at the end of November through Lenovo education sales and business partners.
Logitech has introduced the Logitech V550 Nano Cordless Laser Mouse for notebooks, featuring the Clip-and-Go dock that lets users clip the Mouse to the laptop - and go.

"Logitech research revealed that the vast majority of people who use a notebook PC are mobile both within and outside the home," said Subrotah Biswas, Country Manager, India & SAARC, Logitech. "To meet the demands associated with increased mobility, the V550 Mouse offers a complete set of features to make it easier to use a mouse with a notebook when moving from the kitchen to the living room or from one's desk to a meeting. Now, you won't have to choose between grabbing your mouse or a cup of coffee."

The V550 Nano features the Plug-and-Forget Nano-receiver that once plugged into the computer stays nearly flush against the side of the computer (protruding just 8 mm), so it doesn't have to be unplugged when users stow their laptop. The V550 offers up to 18 months of battery life and saves additional power by automatically turning off when it's docked or when the Nano-receiver is stored inside the mouse.

The mouse's scroll wheel can spin freely to let users move quickly through long documents and Web pages. By pressing down on the wheel, users can switch to click-to-click scrolling mode and scroll precisely through lists, slides or photos. In addition, the button directly below the scroll wheel allows users to switch between applications.

The V550 Nano is offered in two colors - gray with silver accents and silver with cool-blue accents.

Two Clip-and-Go docks - one silver, one black - and a setup kit come bundled with the purchase of every Logitech mouse.

The V550 Nano is compatible with both PC and Mac computers, and the Clip-and-Go dock is compatible with all notebook styles.

The Logitech V550 Nano Cordless Laser Mouse for Notebooks is available at a suggested retail price of Rs. 3,115, comes with a 3-year replacement warranty and is distributed by Neoteric and Rashi Peripherals.
LG has revealed a new mobile camera phone, but if you're expecting a third 8MP camera phone you'll have to wait. Their latest offering is a 3 megapixel slider with a host of features that range from internal GPS with Yahoo! Maps and Bluetooth

The LG KS500 comes equipped with a QVGA display sporting a 240 x 320 pixel resolution and 262K colors. According to reports the handset will support external memory via microSD cards and come with 100MB of internal memory. An optical touch pad is also part of the handset's features.

There's no pricing or availability date provided yet so stay tuned.
Teenagers commonly experience mood swings and are not always approachable, and this behaviour can make it hard for parents to differentiate such emotional fluctuations from genuine depression.

Experts say it's important for parents to monitor their teenager's moods and seek treatment when warranted.

"Parents should make an appointment with a paediatrician, if their teenager falls into a deep depression or if there is a distinct change in the teenager's behaviour that lasts more than two weeks," said Ulrich Fegeler of Germany's association of paediatricians in Cologne.

A medical examination can rule out other diseases such as under active thyroid and help with the search for a psychiatric counsellor. As in adults, some teenagers who are depressed are also more prone to suicide.

A depressed teenager can experience restlessness, anxiety, difficulty concentrating and a defiant attitude, changing from one to the other. They commonly have problems achieving, withdraw into themselves, suffer a lack of drive, fear the future and have problems with self esteem.

"Irritability, a low tolerance for frustrations and a quick temper also can indicate depression in puberty," said Fegeler.

Statistically, the incidence of psychological diseases increases greatly from age 12. Painful experiences such as a break-up and loss, as well as certain parenting styles and hereditary factors, can trigger depression.

An estimated one in 10 teenagers suffers a depressive phase at least once before reaching adulthood. As in the adult population, females are two to three times more likely than males to be affected
After braving the global financial crisis for months, the creaks are getting wider in the market value of steel empire created by the world`s richest Indian Lakshmi Mittal, with about USD 50 billion knocked off from the net worth of NRI business tycoon himself, reports agency sources.

While the US and European markets started their downslide way back in August-September last year, ArcelorMittal, the world`s largest steelmaker, continued to gain value till about five months ago and its share price scaled a life-time high of USD 104.77 on June 5 at the US bourses.

However, the valuation has now dipped to below the one-fourth of its record high level and the company`s shares, which are listed at NYSE as well as on some European bourses, are currently trading near USD 25 level.

During these five months, the company`s market capitalisation has also plummeted to USD 37.3 billion, from a high of over USD 150 billion. Accordingly, the net worth of Lakshmi Mittal, who along with his family members hold a 43.02% equity, has also dipped to just about USD 16 billion from as high as about USD 66 billion on June 5.

According to the company`s latest shareholding data, the Mittal family owns 623.285 million shares of the company, while the remaining holding is in the form of public holding and treasury shares.

Source: IRIS NEWS DIGEST (03 November 2008)
Although videoconferencing has become a billion-dollar substitute for flying business people to meetings, it leaves distant participants less likely to make sound judgments about speakers being viewed over a screen, according to a study published in a journal of the Institute for Operations Research and the Management Sciences (INFORMS®).

"Videoconferencing in the Field: A Heuristic Processing Model" is by Carlos Ferran of Pennsylvania State University Great Valley and Stephanie Watts of Boston University. It appears in vol. 54, number 9 of the INFORMS flagship journal Management Science.

The researchers find that attendees of videoconferences must work harder to interpret information delivered during a conference than they would if they attended face-to-face.

A field study of medical professionals reveals differences in information processing: participants attending a seminar via videoconference are more influenced by the likeability of the speaker than by the quality of the arguments presented, whereas the opposite pattern is true for participants attending in person.

"Important business decisions may suffer if videoconferencing is used to make them without adjusting the process to take its differences into account," says Prof. Ferran.

Professors Ferran and Watts offer guidelines for understanding when videoconferencing is most appropriate and for improving the design of videoconferencing equipment:

    * Videoconferencing may not be appropriate for decision making when some stakeholders are present face-to-face and others attend via video, because these two groups are likely to process information differently.
    * Videoconferencing equipment may be improved by the addition of features that reduce cognitive workload, such as support for turn taking, audio localization, and personal distance location.
    * Videoconference presenters can use heuristic cues to increase the influence of their message.

The research was conducted in a medical setting. (The name of the medical organization was not released by the researchers).

Medical professionals were surveyed as they attended 1 of 19 different live interactive seminars, either face-to-face or via videoconference. The seminars spanned a 12-week period, comprising part of the teaching activities of an urban healthcare consortium. Each interactive one-hour seminar was delivered live by a different physician in a large auditorium, followed by questions and answers. These seminars were simultaneously broadcasted via videoconference to a number of smaller sites. Both face-to-face and remote attendees could ask questions. Attendees were primarily residents, attendings, and local physicians specializing in pediatrics, psychiatry, or orthopedics.
Wealthy Hong Kong may be teetering on the brink of a global recession but a prestige car number plate can still fetch more than 46,000 US dollars, auctioneers said Monday.

The car registration number 1234 fetched 360,000 Hong Kong dollars (46,445 US dollars) at Sunday's government auction where a total of 280 unusual plates raised just short of 345,000 US dollars.

However, of the 280 plates put up for auction, some 30 failed to reach their reserve price in a sign that the economic downturn is beginning to bite in one of the world's richest cities.

Hong Kong shares have been among the worst hit in the recent downturn, with the Hang Seng Index shedding more than 25 per cent of its value in the past six weeks alone.
Microsoft Internet Explorer Is Not Restored as the Default Internet Browser After Uninstalling Netscape Navigator

After you uninstall Netscape Navigator, Microsoft Internet Explorer is not restored as the default Internet browser and is not shown as the Internet link on the Start menu.

This behavior occurs because the Netscape removal program does not restore a default browser.

To resolve this behavior, when you open Internet Explorer, and you are prompted to set Internet Explorer as your default browser, click Yes. If you are not prompted to set Internet Explorer as your default browser, follow these steps:
1.   In Control Panel, double-click Network and Internet connections, and then click Internet Options.
2.   On the Programs tab, click to select the Internet Explorer should check to see whether it is the default browser check box, and then click OK.
3.   Open Internet Explorer, and then click Yes when you are prompted to make it the default browser.
The third-party products that are discussed in this article are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, regarding the performance or reliability of these products.
When you are making a Dial-Up Networking connection, if you try to save your password by clicking to select the Save Password check box, your password may not be saved. This problem may occur even when you successfully connect to the server, and when your password has not changed. This problem may also occur if your user name contains characters that are not allowed in a file name; for example, the user name "user/name" may result in a .pwl file name of User/name.pwl.

This problem can be caused by any of the following situations:
•   Your password list (.pwl) file is damaged.
•   The Rna.pwl file (if it exists) is damaged.
•   Password caching is disabled.
•   Automatic logon is enabled.
•   One or more of the files that are associated with Dial-Up Networking is missing or damaged.
•   User profiles are disabled, but the ProfilesList key is present in the registry.
Note This problem can occur after you install the Windows 95 Password List update that is included with Windows 95 Service Pack 1 (SP1).

For additional information about this update, click the article number below to view the article in the Microsoft Knowledge Base:
( Descriptionof Microsoft Windows 95 Service Pack 1 Updates

Note An additional cause is that the Client for Microsoft Networks is not installed. To resolve this: install client for Microsoft Networks.

Windows 2000
Verify that the Network settings of the Dial-up Networking connectoid are correct:
1.   Right-click the Dial-up Networking connectiod, and then click Properties.
2.   Click the Network tab, and then confirm that Client for Microsoft Networks is installed and that it is selected.

Windows 95 and Windows 98
1.   Rename your .pwl file.

Note If you are using a personal certificate, export it before you rename your .pwl file. If you do not, the personal certificate may be unavailable when you send mail. For additional information, click the article number below to view the article in the Microsoft Knowledge Base:
190296 ( OLEXP: Unable to use Personal Certificates in Outlook Express
To rename your .pwl file, type the following line at a command prompt, and then press the ENTER key (where Windows is the name of the Windows folder and user_name is the user name that you use to log on to Windows):
ren c:\Windows\
After you rename your .pwl file, restart the computer.

When the Enter Network Password or Welcome To Windows dialog box appears, type the password that you normally use, and then click OK. When you are prompted to confirm the password that you entered, type the password again in the Confirm New Password box, and then click OK.

Note If there are no .pwl files present on the drive (for example, if you press the ESC key when you are prompted for a password when Windows starts) password caching is not enabled. You must first log on to the network to create a .pwl file.
2.   Rename the Rna.pwl file in the Windows folder; to do so, type the following line at a command prompt, and then press the ENTER key (where Windows is the name of the Windows folder):
ren c:\Windows\rna.pwl
After you rename the Rna.pwl file, restart the computer.

Note The Rna.pwl file may not exist on the computer. This file is not required in some configurations.
3.   Verify that password caching is enabled; to do so, you need to use Registry Editor.

Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 ( How to back up and restore the registry in Windows
View the DisablePwdCaching value (a DWORD value) in the following registry key:
If password caching is disabled, the DisablePwdCaching value has a value data of 1. To enable password caching, change the value data to 0.

Note If the DisablePwdCaching value does not exist, add this DWORD value with a data value of 0 to the preceding registry key. You may need to remove this value altogether and then restart the computer to make caching work.
5.   Disable automatic logon. To do so, delete the AutoLogon value (a binary value) from the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Network\Real Mode Net
6.   Remove Dial-Up Networking, and then reinstall it:
a.    In the Network properties, record each Network component and its configuration information:
1.   Click Start, point to Settings, click Control Panel, and then double-click Network.
2.   Click a component on the Configuration tab, click Properties, and then record all of the component's settings. Repeat this process with another component until you record all of the component configuration information.
b.    Click Start, point to Settings, click Control Panel, and then double-click Add/Remove Programs.
c.    Click the Windows Setup tab.
d.    Click Communications, and then click Details.
e.    Click to clear the Dial-Up Networking check box, click OK, and then restart the computer if you are prompted to do so.
f.    Repeat steps a through c.
g.    Click to select the Dial-Up Networking check box, and then click OK.

Note You may receive version conflict error messages during this process. If this occurs, click No when you are prompted to keep a newer version of each file.
h.    If you are using the Microsoft Network (MSN) version 2.51, reinstall the MSN program.
7.   Even though user profiles are disabled, remove the ProfilesList key from the registry.For additional information about how to remove this key from the registry, click the article number below to view the article in the Microsoft Knowledge Base:
( How to Disable and Delete User Profiles
If you are running Windows 95, you may need to add Transmission Control Protocol/Internet Protocol (TCP/IP) to the Network properties. To do this, follow these steps:
1.   Click Start, point to Settings, click Control Panel, and then double-click Network.
2.   Click Add, click Protocol, click Microsoft in the Manufacturers box, click TCP/IP, and then click OK.

For more information, click the following article number to view the article in the Microsoft Knowledge Base:
( No Windows or network logon dialog box at startup
( Save Password check box is unavailable
Microsoft Internet Explorer may appear to stop responding (hang) when it opens, but the animated globe in the upper-right corner of the browser window may continue to spin, and you may receive a "Detecting proxy settings..." message in the status bar.

This issue may occur if Internet Explorer is trying to locate a proxy server. This behavior can occur for either of the following reasons:
•   The Proxy Auto-Discovery feature is turned on. This feature may make it appear that Internet Explorer is not responding.
•   Your computer is on a network that includes a Dynamic Host Configuration Protocol (DHCP) server that does not include Web Proxy Auto-Discovery (WPAD) information in its DHCP packets. This may prevent Internet Explorer from locating a proxy server.

To resolve this issue, turn off the Proxy Auto-Discovery feature. To do so, use the appropriate method.

Connect to Internet Through a Dial-Up Networking Connection
If you connect to the Internet through a dial-up networking connection, follow these steps:
1.   Click Start, point to Settings, click Control Panel, and then double-click Internet.
2.   Click the Connection tab, click the appropriate connection, and then click Settings.
3.   Click to clear the Automatically detect settings check box, click OK, and then click OK.

Connect to Internet Through a Local Area Network
If you connect to the Internet through a Local Area Network (LAN), follow these steps:
1.   Click Start, point to Settings, click Control Panel, and then double-click Internet.
2.   Click the Connection tab, and then click LAN Settings.
3.   Click to clear the Automatically detect settings check box, click OK, and then click OK.
4.   Restart your computer.

To work around this issue, quit Internet Explorer, and then restart it.

The automatic detection of browser settings is based on Web Proxy AutoDiscovery (WPAD). Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) support the automatic detection of browser settings. With the appropriate settings, DHCP servers that support the DHCPINFORM message and DNS servers can automatically detect and configure a browser's proxy settings. For additional information, see the "Configuring Central Automatic Configuration Servers" section in Chapter 13 ("Setting Up Servers") of the Internet Explorer 5 Resource Kit. To do so, visit the following Microsoft Web site:
HCL Infosystems, India's premier information enabler and leading ICT System Integrator, has received a multi-year contract from Delhi Police to provide solutions and technologies that would enable the police force to access automated information.

The company quoted that it has modernized the police control room through ICT as part of the contract.

The control room consists of multimedia contact centre, and has the ability to track all PCR vans fitted with GPS devices and to coordinate their movements.

The Dial 100 solution contains Calling Line Identification and Direct Inward Dialing to help in identification and routing of calls. It also provides connectivity to mobile PCR vans through two-way radios/GPRS.

HCL Infosystems has reported an 8.3% drop in its net profit for the first quarter ending September 2008 compared to the corresponding period last fiscal.

The company had posted net profit worth Rs 67.40 crore compared to Rs 73.49 crore in the same quarter previous year.
This article describes how to reinstall or to repair Internet Explorer in Windows XP. You may have to do this if you have problems with Internet Explorer because of damaged files or missing registration information.

Note In some cases, the steps to reinstall or to repair Internet Explorer 6 will also resolve problems in Microsoft Outlook Express.

You may have to reinstall or to repair Internet Explorer in Windows XP if you have problems with Internet Explorer because of damaged files or missing registration information. You may also decide to reinstall or to repair Internet Explorer 6 to resolve problems with Outlook Express in Windows XP.

Methods to follow if you have Internet Explorer 6
Any of the methods in this article may resolve your problem. Feel free to select the one that you are most comfortable with.
Method 1: Install Internet Explorer 7
You may be able to resolve problems with Internet Explorer 6 if you install Internet Explorer 7. Installing Internet Explorer 7 probably will not resolve problems with Outlook Express.

For information about how to install Internet Explorer 7, visit the following Microsoft Web site:
Note After you install Internet Explorer 7, you can repair damaged files or missing registration information in Internet Explorer 7. To do this, follow these steps:
1.   Start Internet Explorer 7.
2.   On the Tools menu, click Internet Options.
3.   On the Advanced tab, click Reset.
4.   In the Reset Internet Explorer Settings dialog box, click Reset to confirm.
Method 2: Install Windows XP Service Pack 2
If you do not want to install Internet Explorer 7, or for some reason cannot do so, you may be able to resolve problems with Internet Explorer 6 by installing Windows XP Service Pack 2. Additionally, installing Windows XP Service Pack 2 may help resolve issues with Outlook Express because Windows XP Service Pack 2 includes both Internet Explorer 6 Service Pack 2 and Outlook Express Service Pack 2.
To install Windows XP Service Pack 2, follow these steps:
1.   Visit the following Microsoft Web site: (
2.   Click Express Install (Recommended).
3.   If your computer qualifies, Windows XP Service Pack 2 will be one of the updates that is automatically selected. Click Install.
4.   Review the Microsoft Software License Terms. Then, if you agree with it, accept it.
For more information how to obtain the latest Windows XP service pack, click the following article number to view the article in the Microsoft Knowledge Base:
( How to obtain the latest Windows XP service pack
Method 3: Repair Internet Explorer 6 and Outlook Express 6 by using the System File Checker in Windows XP
If you already have Windows XP Service Pack 2 installed, and you do not want to install Internet Explorer 7, you may be able to resolve problems with Internet Explorer 6 by running the System File Checker. Additionally, running the System File Checker may help resolve issues with Outlook Express 6.

To run the System File Checker, follow these steps:
1.   Click Start, click Run type sfc /scannow, and then press ENTER.
2.   Follow the prompts throughout the System File Checker process.
3.   Restart the computer when System File Checker process is complete.
Method 4: Reinstall Internet Explorer 6 by using the Ie.inf file
If you already have Windows XP Service Pack 2 installed, and you do not want to install Internet Explorer 7, you may be able to resolve problems with Internet Explorer 6 by using the Ie.inf file to reinstall Internet Explorer 6. To do this, follow these steps:
1.   Click Start, click Run, type %systemroot%\inf, and then press Enter.
2.   Find the Ie.inf file that is located in Windows\Inf folder.
3.   Right-click the Ie.inf file, and then click Install.
4.   Restart the computer when the file copy process is complete.

Method to follow if you have Internet Explorer 7
If you have Internet Explorer 7, you can repair damaged files or missing registration information in Internet Explorer 7. To do this, follow these steps:
1.   Start Internet Explorer 7.
2.   On the Tools menu, click Internet Options.
3.   On the Advanced tab, click Reset.
4.   In the Reset Internet Explorer Settings dialog box, click Reset to confirm.

Method to follow if you have Outlook Express 6
If you already have Outlook Express 6 installed on your computer, we recommend that you use Windows Live Mail instead of Outlook Express 6.

Windows Live Mail is an e-mail program that you install on your computer. Windows Live Mail stores messages on your computer. This means that you can access, read, and compose e-mail messages even when you are not connected to the Internet. Windows Live Mail works with popular Web-based e-mail services such as Hotmail, AOL mail, Google mail, and Yahoo! mail. Windows Live Mail is built to automatically configure many popular e-mail services.

To install Windows Live Mail, visit the following Microsoft Web site. (

Troubleshooting for advanced computer users
This section is intended for advanced computer users. If you are not comfortable with advanced troubleshooting, you might want to ask someone for help or contact support. For information about how to do this, visit the following Microsoft Web site: (

If the methods listed in this article do not resolve the issue, you may be able to resolve the issue by performing an in-place upgrade (reinstallation) of Windows XP. For more information how to complete an in-place upgrade, click the following article number to view the article in the Microsoft Knowledge Base:
( How to perform an in-place upgrade (reinstallation) of Windows XP

After you perform an in-place upgrade, visit the following Microsoft Web site to install the latest software updates available for Windows XP: (

For more information about Windows XP Service Pack 2, visit the following Microsoft Web site: (
For more information about how to help protect your personal computer, visit the following Microsoft Web site: (
For more information about how to obtain and to install Windows XP Service Pack 2, visit the following Microsoft Web site: (
For more information about how to obtain Windows XP Service Pack 2, click the following article number to view the article in the Microsoft Knowledge Base:
( How to obtain the latest Windows XP service pack
For more information about how to install Windows XP Service Pack 2, click the following article number to view the article in the Microsoft Knowledge Base:
( Detailed installation walkthrough for Windows XP Service Pack 2
Tip:  Clicking on a link opens in a new window and is empty:  Start/Run/CMD. Type this command: REGSVR32
         URLMON.DLL. Ok/Reboot.  Then go to:  IE/Tools/Internet Options/Programs/Reset Web Settings.

Tip:  Re-install Internet Explorer -  Go to Start/Run, and type : "rundll32.exe setupapi,InstallHinfSection DefaultInstall 132

Tip:  No Home Page - Right Click Internet Explorer Shortcut/Properties/Shortcut Tab. Place this In the target field:
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" –nohome

Tip:  Get MailTo Hyperlinks in IE to Open OE - Windows Explorer/Tools/Folder Options/File Types. Highlight
         URL:MailTo Protocol/Advanced/Edit. Under Application used to perform action it should read:

Tip:  Speed up Internet Explorer - Find your IE icon and right click on it. Select properties and then click on the Shortcut
         tab. In the Target line at the very end, add -nohome to get a speed boost.

Tip:  Speed up Browsing in Internet Explorer - Start/Run/Regedit
         In the right pane find: {D6277990-4C6A-11CF-8D87-00AA0060F5BF} Value and delete it.

Tip:  Add Internet Explorer Toolbar Buttons - 1. Go to Start/Run, 2. Type in gpedit.msc, 3. Go to user configuration -
         Windows Settings - IE Maintenance - Browser UI. Then click on browser toolbar customizations.

Tip:  To restore the IE logo:  Start/Run/Regedit- HKEY_CURRENT_USER\Software\Microsoft\Internet
         Explorer\Toolbar.  In the Toolbar key, if you see the BrandBitmap and SmBrandBitmap values on the right, delete

Tip:  To restore Windows Update to Tools in IE6 - Start/Run/Regedit - HKEY_CURRENT_USER\
         Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. If you see the NoWindowsUpdate value on the right,
         make sure it has a DWORD value of 0 (disabled) or just delete it. Reboot.
London, Nov 1 : If you're a phone freak and love James Bond, then here's the perfect handset for you: Sony Ericsson has launched 'C902 Cyber-Shot'.

The limited edition Titanium silver version of the phone, used by Daniel Craig in the latest 007 thriller 'Quantum of Solace, will be up for grabs in a few weeks.

The phone has a cool five megapixel digital camera and is one of the slimmest in the market, reports The Sun.

And the Bond version comes with a secret memory card loaded with a host of 007 content including a demo game, trailer from the film, behind-the-scenes interviews with the stars and wallpapers and screen savers.

For those techie lots, the handset also has Sony''s cool BestPic feature which takes nine snaps in quick succession so you can choose the best.

The set boasts illuminated touch-sensitive keys for the camera and a Photo flash.

The phone will be out on shelves from this month
London, November 1 : Michael Jackson has confirmed that he's preparing to make a comeback with a tour soon.

The 'King of Pop' revealed his plans in a statement trashing rumours claiming that he will be joining his family on a reunion tour.

The 50-year-old, whose career had taken a beating in 2005 following a child abuse trial against him for which he was later acquitted, further said that he was already getting ready to offer his fans with something new.

"My brothers and sisters have my full love and support, and we've shared many great experiences," the Sun quoted him as saying.

"But at this time I have no plans to record or tour with them.

"I am now in the studio developing new and exciting projects that I look forward to sharing with my fans in concert soon," he added.
Windows / Linux / Renaming Desktop Icons
Nov 01, 2008, 04:11 PM
You can easily rename various Desktop (System Icons).

Click Start, Run and enter REGEDIT.  Navigate to the following Registry brach:


The Desktop Icons are located in the sub keys as follows:

My Network Places: {208D2C60-3AEA-1069-A2D7-08002B30309D}
My Computer: {20D04FE0-3AEA-1069-A2D8-08002B30309D}
My Documents: {450D8FBA-AD25-11D0-98A8-0800361B1103}
Recycle Bin:{645FF040-5081-101B-9F08-00AA002F954E}
Default IE Icon: {871C5380-42A0-1069-A2EA-08002B30309D}

Double click the Default value in the above keys and enter the text you desire.  Right click on the Desktop and select Refresh to see the changes.

To undo the changes, just right click on the Default value and select Delete.  Refresh the Desktop to see that things are back to normal.
Windows / Linux / Windows System Tray Icons
Nov 01, 2008, 04:09 PM

Systray.exe is a tool for system taskbar notifications. The taskbar provides a location for programs and hardware devices to display icons. For example, if your computer supports advanced power management (APM), a Battery Meter icon may be displayed on the taskbar.


The following icons provided by Systray.exe may be displayed on the taskbar:
•   Battery Meter
•   PC Card Status
•   Volume Control
•   Quickres
•   Task Scheduler
Other parts of the system may provide additional taskbar icons, for example:
•   Windows Explorer provides the printer status icon
•   Microsoft Exchange or Microsoft Outlook provides the mail status icon
•   The Accessibility status indicator program (Accstat.exe) displays keyboard accessibility icons
•   Microsoft Fax adds the Fax Rendering and Fax Status icons

This article explains how to remove and restore the default desktop icons under My Computer, My Documents, My Network Places, and Internet Explorer.


1.   Click Start, and then click Control Panel.
2.   Double-click Display, click the Desktop tab, and then click Customize Desktop.
3.   Click to select the check boxes for the desktop items that you want to display, or click to clear the check boxes for the desktop items that you want to remove.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\ CurrentVersion\Hotfix. Periodically Microsoft releases Hot Fix's to patch bugs in Windows and other products, this key contains information about which Hot fix's have been installed.

Some of the Hotfixes (Mostly security updates) do not have an uninstall feature, these will not appear in the Add and Remove list. If a Hotfix does appear in the Add and Remove list then it can be uninstalled just like any other program. If you uninstall the Hotfix, you will lose the benefits of that patch. This should only be done if you can determine that you are experiencing negative effects from the particular Hotfix.

If you simply do not want them to appear in the Add and Remove list and you are sure that you will not need the uninstall option, you can remove items from that list by using a registry tweak.

Go to Start, Run, type in REGEDIT and press OK. This will open the registry editor. Navigate to the following key.

HKEY CURRENT USER\Software\Microsoft\Windows\CurrentVersion\Uninstall

Expand this branch and look at the list. The Hotfixes are all listed by a "Q" number that corresponds to the entry in the Add and Remove list. Make sure that you back up each Key before deleting it. Select the key and then select File/Export and include the Q number in the name of the file. Right click the entries you want to remove and select Delete.
Windows / Linux / Fixing a hijack
Nov 01, 2008, 03:48 PM
Any of the products below will completely remove most hijackers, unless it is one which has just started spreading.

Spybot S&D [recommended]
Aluria Spyware Eliminator

StartPage Guard 1.3

How to Block Comet Cursor in Internet Explorer 5 and 6

Windows / Linux / Home Page Hijacking
Nov 01, 2008, 03:45 PM
If the Tabs have been removed from Internet Explorer/Tools/Internet Options and/or you receive a restriction warning message, run this edit (or from line 268 here).  It will restore all tabs and lift the restriction.

Check your settings here:  Start/Run/Regedit

HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel\HomePage
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page

IE/Tools/Internet Options/General/Home Page/Address.  If the feature is disabled (greyed out), download this script.  Lock Home Page:  reg file  Unlock Home Page:  reg file

Ever downloaded a 'Free' program only to find out it was Spyware?  (Banner Advertiser Supported)  Or even worse, many will hide the Spyware functions and not tell you.  At the time of this release there were 762 known Spyware programs and Spy Chaser lists them and lets you enter a program name to see if it's on this list.

Many of those programs don't uninstall the Spyware even after uninstalling the main program leaving files on your system and entries in the registry you might never get rid of.  For the list:

Windows / Linux / raid data recovery
Nov 01, 2008, 11:29 AM
A Redundant Array of Independent Drives, more commonly referred to by its acronym, RAID, is a form of data storage that records your data across numerous different hard disks. The major benefit from having this type of data storage setup is that if one of the drives falters or crashes, the backup drives are readily available insuring that you don't skip a beat and / or lose any of your valuable documents, applications, programs, etc.

RAID systems can be extremely securing sources of data storage due to the fact that they mirror the exact same data across multiple platforms. There are numerous levels of RAID service, the major difference being the number of platforms over which the same data is mirrored. (You will know immediately when you have a problem with one of the drives, and can act on it at that point. I.E, there is really no reason to exceed a certain number of drives over which the data is shared, because the chances are you will correct the problem after it occurs and have the drive up and running again without too much hassle. Basically, there isn't much of a need to install more than 2 or maybe 3 drives over which the data is shared)

RAID service is sometimes referred to by other names including disk mirroring, disk striping, and/or fault tolerance. The following is a short list of the RAID levels and their corresponding features. These levels are as follows:

    * Level 0: Although this level provides data striping it does not provide redundancy. This improves the performance of the drive, but it doesn't deliver any kind of fault tolerance.
    * Level 1: This level provides disk mirroring; a tool with which data is written across two drives so that if 1 fails, the other remains as a backup.
    * Level 3: This level is more or less the same as Level 0, with the one difference that it does provide a certain degree of fault tolerance.
    * Level 5: This level provides users with data striping at the byte level, along with stripe error correction info. The result is superior performance and good fault tolerance.

The most common levels of RAID that are employed are levels 1, 3 & 5. Whereas RAID systems have generally been solely associated with business use in the past due to excess costs, the recent falling prices of hard drives has allowed for a RAID crossover into the personal / home use sector. If you are looking for an extremely secure data storage system that affords quicker retrieval of data and up-to-the-minute data backup, then you should continue your RAID research to learn more.
Man's greatest fear has finally been revealed – and it has nothing to do with marriage – it's the relegation of their football team.

That' the conclusion of a new survey, which found that Brit blokes are more scared of their football team being relegated than marriage.

Forty per cent of the males surveyed said the thought of their team being demoted gave them the most sleepless nights.

While 34 per cent said that the prospect of proposing gave them the creeps, reports the Daily Star.

And bee-hived songstress Amy Winehouse was voted more alarming than parachuting from a plane.

Meeting the girlfriend''s parents made number eight and being rejected by a girl was at number five.

Large insects came last in the poll by men''s magazine NUTS.

Brit men's Top Ten Fears:

1 Football team being relegated

2 Proposing to girlfriend

3 Losing looks/hair/ageing

4 Being made to look stupid in front of mates

5 Being rejected when asking a girl on a date

6 Small children and babies

7 Amy Winehouse

8 Meeting girlfriend's parents

9 Free falling

10 Large insects
Hyderabad-based MIC Electronics has entered into Memorandum of Understanding (MoU) with Italian-based Ceracchi Illuminazione, to get access to European markets and others like Russia, Morroco and Eastern European countries.

Ceracchi Illuminazione is a renowned lightening company in Italy for design, development and marketing of light-emitting-diode (LED) lightening solutions.

Other than this, the company also announced the commissioning of their 100% export oriented unit (EOU) facility at Cherapally in Hyderabad on Oct. 29, 2008. The company stated that with the new facility, the production capacity of LED display modules had doubled.

MIC Electronics is a global leader in the design, development and manufacture of LED video displays, high-end electronic and telecommunication equipment, and development of telecom software since 1988.

Shares of the company gained Rs 3.10, or 8%, to end at Rs 38.60. The total volume of shares traded was 115,597 at the BSE.
Life Insurance Corporation of India (LIC), the largest insurance organizations in the country is all set to open a representative office in Singapore next month.

According to the source, the upcoming office will initially explore opportunity for selling insurance products to the people of Indian origin.

Additionally, the insurance giant is also planning to expand its footprints into Australia and New Zealand. At present, LIC has international operations in seven countries - UK, Mauritius, Fiji, Nepal, Gulf, Saudi Arabia and Bahrain.

Recently, Life Insurance Corporation of India (LIC) International has begun selling policies to non-Indians in Bahrain, where it posted a growth of 46% in the first nine months of this year compared with the corresponding period last year.
Karur Vysya Bank (KVB) has informed that it has signed a memorandum of understanding (MoU) with SME Rating Agency of India
(Smera) to enable its SME Borrowers to get rated themselves.

Under the arrangement, Smera will provide data about external credit rating by considering the financial position and qualitative factors that have a bearing on the credit worthiness of the SME and Karur Vysya Bank will finance the SME.

According to sources, the MoU plans a co-operation between the two institutions for financing of SME by leveraging the strengths of both the organisations.

The Karur Vysya Bank has 239 branches spread across 11 states and 2 union territories.
Spending more and more time on the internet is leading to evolutionary change, as besides changing people's lifestyle, it is also altering the way an individual's brain works, reports the Times of India.

According to Gary Small, a neuroscientist at UCLA in California, evolutionary change due to constant net surfing is set to put the tech-savvy at the top of the new social order. Based on studies, Small claims that internet searching and text messaging has made brains more adept at filtering information and making quick decisions.  He said, "We are changing the environment. The average young person now spends nine hours a day exposing their brain to technology. Evolution is an advancement from moment to moment and what we are seeing is technology affecting our evolution."

However, the influence of technology could have drawbacks, as one might be left with only virtual friends and fall victim to Attention Deficit Disorder. Small said that people with a mixture of technological and social skills would top the social order. He said, "They will know when the best response to email or instant message is to talk, rather than sit and continue to email." Mentioning the sensitivity of the brain towards changes in the environment, he said, "The brain is very specialised in its circuitry, and if you repeat mental tasks over and over it will strengthen certain neural circuits and ignore others."

A study of 24 adult web users revealed that the areas of the brain of the experienced internet users had double the activity during decision-making and complex reasoning as compared to the internet beginners. This multitasking may become cause for concern, as the constant search of new information may create stress and damage neural networks. Small said, "There is also the big problem of neglecting human contact skills and losing the ability to read emotional expressions and body language."
Updated for the RTM release of Windows XP
With the inclusion of a new consumer-oriented version of Windows XP, there has been some confusion surrounding the differences between this product, Windows XP Home Edition, and its more upscale sibling, Windows XP Professional Edition. During a visit to Redmond in February where Windows XP Beta 2 and the new Whistler ("Luna") user interface was first unveiled, and in various meetings since then, I've been able to discuss this new Windows version with Microsoft executives and product managers. Beyond the obvious--Microsoft is targeting Home Edition at consumers and Professional at business users and power users--Group Vice President Jim Allchin said that the company was working hard to further differentiate the products. "With XP, the home version is what it is," Allchin said. "But where we're going, we've named them appropriately. In the future, this will make more sense. We will do more value add in Pro in the future."

"Divide them into managed and unmanaged environments," added John Frederiksen, the General Manager of the PC Experience Solution Group, noting that some smaller businesses would probably install Home Edition regardless of the target marketing. "Some small businesses have administrators, some don't. Home Edition is not a managed OS. It's optimized for that consumer market. A lot of the OEM PCs marketed to consumers are bought by small businesses. In terms of naming, we wanted to continue the Professional name. For the consumer product, we tested the name Windows Me again, the year names, like Windows 2002, and a lot of other stuff. But Home Edition tested the best. The feedback said that Home Edition suggested it was customized for the home, which it was. We feel like the name reflects its purpose."

Windows XP Home Edition Overview
Windows XP Home Edition includes a number of enhancements over Windows 2000 Professional. These include:

    * Improved software (application) and hardware compatibility
    * Simplified security
    * Simplified log-on featuring new "welcome" screen
    * Fast user switching
    * A new user interface featuring context-sensitive, task-oriented Web views
    * Enhanced support for digital media (movies, pictures, music)
    * DirectX 8.1 multimedia libraries for gaming

Professional Edition: Superset of Home Edition
At its most basic level, XP Professional is a business- and power-user oriented superset of Home Edition. Because this orientation, it includes features that wouldn't be appropriate, or would be too complex, for the typical home user. The most obvious difference is security, which is vastly simplified in Home Edition. Each interactive user in XP Home is assumed to be a member of the Owners local group, which is the Windows XP equivalent of the Windows 2000 Administrator account: This means that anyone who logs on to a Home Edition machine has full control. Likewise, the Backup Operators, Power Users, and Replicator groups from Windows 2000/XP Pro are missing from Home Edition, and a new group, called Restricted Users, is added. Hidden administrative shares (C$, etc.) are also unavailable in Home Edition.

"Professional Edition is a strict superset of Home Edition," confirmed Chris Jones, Vice President of the Windows Client Group. "Everything you can do in Home Edition, you can do in Pro. So we do think there are home users who will buy Pro." Jones' distinction is a good one: With Windows XP, the Professional Edition is finally a superset of all the desktop clients that came before (Windows Me and Windows 2000 Professional) as well as of its new sibling. So when discussing the differences between the editions, it's best to simply describe those features in Pro that you can't get in Home Edition.

Pro features that aren't in Home Edition
The following features are not present in Windows XP Home Edition.

    * Power user Remote Desktop - All versions of Windows XP--including Home Edition--support Remote Assistance, which is an assisted support technology that allows a help desk or system administrator to remotely connect to a client desktop for troubleshooting purposes. But Only Pro supports the new Remote Desktop feature, which is a single-session version of Terminal Services with two obvious uses: Mobile professionals who need to remotely access their corporate desktop, and remote administration of clients on a network. You can access a Windows XP Remote Desktop from any OS that supports a Terminal Services client (such as Windows 98 and, interestingly XP Home). XP Home can act as the client in a Remote Desktop session; only Pro can be the server.
    * Multi-processor support - Windows XP Pro supports up to two microprocessors, while Home Edition supports only one.
    * Automated System Recovery (ASR) - In a somewhat controversial move, Microsoft has removed the Backup utility from the default Windows XP Home Edition, though it is available as an optional installation if you can find it on the CD-ROM (hint: it's in the /valueadd folder). The reason for this the integration of Microsoft's new Automated System Recovery (ASR) tool into Backup. In Pro, ASR will help recover a system from a catastrophic error, such as one that renders the system unbootable. ASR-enabled backups are triggerable from XP Setup, allowing you to return your system to its previous state, even if the hard drive dies and has to be replaced. Unlike consumer-oriented features such as System Restore, ASR is not automatic: It must manually be enabled from within the Backup utility in Windows XP Pro. In any event, while there is a Backup utility available for Home Edition, you cannot use ASR, even though mentions of this feature still exist in the UI. Confusing? Yes. But it's better than no Backup at all, which was the original plan.
    * Dynamic Disk Support - Windows XP Professional (like its Windows 2000 equivalent) supports dynamic disks, but Home Edition does not (instead, HE supports only the standard Simple Disk type). Dynamic disks are not usable with any OS other than Windows 2000 or Windows XP Pro, and they cannot be used on portable computers. Likewise, Home Edition does not include the Logical Disk Manager.
    * Fax - Home Edition has no integrated fax functionality out of the box, though it is an option you can install from the XP Home CD.
    * Internet Information Services/Personal Web Server - Home Edition does not include the IIS Web server 5.1 software found in Pro.

    * Security Encrypting File System - Windows XP Professional supports the Encrypting File System (EFS), which allows you encrypt individual files or folders for local security (EFS is not enabled over a network). EFS-protected files and folders allows users to protect sensitive documents from other users.
    * File-level access control - Any user with Administrator privileges can limit access to certain network resources, such as servers, directories, and files, using access control lists. Only Windows XP Professional supports file-level access control, mostly because this feature is typically implemented through Group Policy Objects, which are also not available in Home Edition.
    * "C2" certification - Microsoft will attempt to have Windows XP Professional certified with the "C2" security designation, a largely irrelevant status, but one which will not be afforded to Home Edition.

    * Management Domain membership - Home Edition cannot be used to logon to an Active Directory domain. For obvious reasons, the Domain Wizard is also missing in Home Edition.
    * Group Policy - Since Home Edition cannot be used to logon to an Active Directory domain, Group Policy--whereby applications, network resources, and operating systems are administered for domain users--is not supported either.
    * IntelliMirror - Microsoft lumps a wide range of semi-related change and configuration management technologies under the IntelliMirror umbrella, and none of these features are supported in the consumer oriented Home Edition. IntelliMirror capabilities include user data management; centrally-managed software installation, repair, updating, and removal; user settings management; and Remote Installation Services (RIS), which allows administrators to remotely install the OS on client systems.
    * Roaming profiles - This feature allows users to logon to any computer in an Active Directory network and automatically receive their customized settings. It is not available in Home Edition, which cannot logon to an Active Directory domain.

    * Corporate deployment Multi-language support - Only Windows XP Professional will ship in a Multi-Language version or support multiple languages in a single install.
    * Sysprep support - Windows XP Pro will support the System Preparation (Sysprep) utility, while Home Edition will not.
    * RIS support - See the IntelliMirror heading in the previous section; Home Edition does not support RIS deployments.

    * 64-bit Edition Microsoft is shipping a 64-bit version of Windows XP for Intel Itanium systems that mirrors the Professional Edition feature-set.

      Networking features
    * The following networking features are not included in Home Edition: The user interface for IPSecurity (IPSec)
    * SNMP
    * Simple TCP/IP services
    * SAP Agent
    * Client Service for NetWare
    * Network Monitor
    * Multiple Roaming feature

      User interface features
    * Windows XP Home Edition has some different default settings that affect the user interface. For example, Guest logon is on by default in Home, but off in Pro. The Address bar in Explorer windows is on in Pro by default, but off in Home. During the beta period, Microsoft had intended to use a business-oriented shell theme ("Professional") by default in Pro and the "Luna" consumer theme in Home Edition. But feedback from corporate users suggested that everyone liked the consumer-oriented Luna theme better, and development of the Professional theme was cancelled. Other user interface features that are present in Pro but not Home include: Client-side caching
    * Administrative Tools option on the Start menu (a subset of the Admin tools are still present in Home, however).
During the Windows startup process, the computer may stop responding (hang), and you may receive the following error message:
*** Hardware Malfunction
Call your hardware vendor for support
*** The system has halted ***
One of the following error messages may also be included:
NMI: Parity Check / Memory Parity Error
NMI: Channel Check / IOCHK
NMI: Fail-safe timer
NMI: Bus Timeout
NMI: Software NMI generated
NMI: Eisa IOCHKERR board x

This behavior can occur if a hardware component malfunctions, or if there are damaged or incompatible drivers installed.

To try to resolve this behavior, use the following troubleshooting techniques. Because Windows can display only basic error messages when hardware malfunctions occur, troubleshooting can be difficult. Most equipment problems center around the motherboard, the RAM on a motherboard or on an adapter, or the cache memory on a motherboard or on an adapter.

To troubleshoot basic hardware problems, try one or more of the following:

Check the Memory
Remove any extra memory modules that are in the computer, leaving only the least amount that is required for the computer to start and run Windows. Restart the computer to see whether the error messages persist.

If the error does not reappear, the issue is isolated to one or more of the RAM modules that you removed from the computer. Continue to remove and replace the minimum amount of RAM required, using the memory modules that you removed. When the error returns, you have isolated the individual memory module that is responsible for the problem.

This process may require you to restart your computer several times to pinpoint the specific memory module that is not working correctly.
Replace the defective RAM module.

Microsoft has released a software memory diagnostic tool, Windows Memory Diagnostic. Windows Memory Diagnostic tests the Random Access Memory (RAM) on your computer for errors. To download this tool, visit the following Microsoft Web site: (

Check the Adapters
Remove any adapters that are not required to start the computer and run Windows. In many cases, you can start your computer with only the drive subsystem controller and the video adapter.

If the error message does not appear, one of the adapters that you removed is the source of the problem. Reinstall each adapter separately, restarting after each adapter is installed, to see whether the error returns. If the error does not return after you reinsert all of the adapters, it is possible that one of the adapter cards just needed to be reseated. After your computer is running again, monitor the computer to make sure that the error does not return.
If reseating the adapters does not solve the problem, replace the adapter that is causing the error.

Check the Computer BIOS/Configuration
Verify that you have installed the latest revisions for your computer's BIOS or firmware configuration software. Go into the BIOS and set load Fail-safe defaults or BIOS defaults, disable any antivirus protection in the BIOS, and then set Plug and Play OS to No.

The type of hardware that your computer uses and the design of the motherboard determine what part of your computer's firmware can actually be updated. Various manufacturers provide diagnostic tools for troubleshooting.
Update the BIOS, the firmware, and/or the EISA configuration.

If none of these procedures isolates or resolves the issue, the problem can be narrowed down to the motherboard, drive subsystem controller, hard drive, or the video adapter. Advanced RAID or other caching controllers can have RAM, processor chips, or both that could also be the problem. If the simplest configuration contains one of these advanced adapters, resolving the problem may require use of additional troubleshooting or diagnostic software, possibly using duplicate hardware.

Check For Updated Drivers
For additional information about updating drivers and managing devices in Windows XP, click the article number below to view the article in the Microsoft Knowledge Base:
283658 ( HOW TO: Manage Devices in Windows XP

Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article.
After you install Microsoft Windows XP, hard disk performance may be slower than you expect.

NOTE: Hard disk performance may be even slower when your computer performs many small hard disk read/write operations.

This behavior may occur in the following situation:
•   You use Small Computer System Interface (SCSI) hard disks in the computer.

•   The hard disks are formatted as NTFS.

To resolve this problem, obtain the latest service pack for Windows XP. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
322389 ( How to Obtain the Latest Windows XP Service Pack
Hotfix information
A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing this specific problem. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix.

If the hotfix is available for download, there is a "Hotfix download available" section at the top of this Knowledge Base article. If this section does not appear, contact Microsoft Customer Service and Support to obtain the hotfix.

Note If additional issues occur or if any troubleshooting is required, you might have to create a separate service request. The usual support costs will apply to additional support questions and issues that do not qualify for this specific hotfix. For a complete list of Microsoft Customer Service and Support telephone numbers or to create a separate service request, visit the following Microsoft Web site: (
Note The "Hotfix download available" form displays the languages for which the hotfix is available. If you do not see your language, it is because a hotfix is not available for that language.
File information
The English version of this fix should have the following file attributes or later:

   Date         Time   Version      Size     File name
   28-Sep-2001  17:51  5.1.2600.14  516,224  Ntfs.sys

Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows XP Service Pack 1.
In Windows 2000 there are several ways to troubleshoot issues related to the Hardware Abstraction Layer (HAL) that may occur as a result of misdetection, an outdated or non-compliant Advanced Configuration and Power Interface (ACPI) Basic Input/Output System (BIOS), or an incorrectly or manually installed computer type. This article describes some of the methods you can use to troubleshoot issues related to the HAL.

NOTE: In this article, the term "computer type" and "HAL" have the same meaning, and may be interchanged.

Back to the top
Determine Your Computer Type
To determine the computer type you are using:
1.   Click Start, point to Settings, click Control Panel, and then double-click System.
2.   Click the Hardware tab, and then click Device Manager to view what is listed under the Computer branch. The following is the list of supported computer types.

Possible values for the HAL under Standard computers include:
ACPI Multiprocessor PC
ACPI Uniprocessor PC
Advanced Configuration and Power Interface (ACPI) PC
MPS Multiprocessor PC
MPS Uniprocessor PC
Standard PC
Possible values for the HAL under Compaq include:
Compaq SystemPro Multiprocessor or 100% Compatible
Possible values for the HAL under SGI include:
Silicon Graphics Visual Workstation

Back to the top
View or Change Installed Computer Type
To view or change the installed computer type:

WARNING: Note that you should not attempt to change from an ACPI HAL to a standard HAL or from a standard HAL to a ACPI HAL under any circumstances. Doing so will result in your computer not starting properly or at all. This occurs because the Plug and Play device tree that would be currently loaded is for ACPI, and it does not get reconstructed or revert to a standard HAL Plug and Play device tree. Because of this (the device tree structures being drastically different), the system is unaware of any hardware changes after the computer restarts to include the location of the boot device. Microsoft does not recommend or support this procedure as it will result in data loss.
1.   Click Start, point to Settings, click Control Panel, and then double-click System.
2.   Click the Hardware tab, and then click Device Manager to view what is listed under the Computer branch. As an example, "Standard PC", the detected computer type Windows 2000 installed on your computer, or an entry such as "Advanced Configuration Power Interface (ACPI) PC" may be listed.
3.   To change the installed computer type, click the Driver tab, and then click Update Drivers.

NOTE: You can only change or update your HAL from Device Manager under Computer Type when changing from a Standard PC HAL to a Standard Multiprocessor PC HAL, because changing from an ACPI HAL to a Standard HAL can result in your not being able to start your computer.
If you are unable to start your computer properly as a result of the wrong computer type (HAL) being installed after Windows 2000 Setup, start the Emergency Repair process:
1.   Start your computer by using the Windows 2000 Setup floppy disks, or with the Windows 2000 CD-ROM if your computer supports starting from a CD-ROM.
2.   At the Welcome to Setup screen, press R to repair.
3.   At the Windows 2000 Repair Options screen, press R to repair using the emergency repair process.
4.   Press M to manually select repair options and ensure that "Verify Windows 2000 system files" and "Inspect startup environment" features are selected, or press F to run all repair options.
5.   Once complete, the originally installed HAL and associated files should be restored. Remove the CD-ROM or floppy disk and then restart your computer.

NOTE: The incorrectly installed computer type is still visible in Device Manager.
6.   To ensure the correct computer type is visible in Device Manager, when you restart your computer, press F8, choose Last Known Good Configuration, and then press ENTER.
7.   Click the appropriate hardware profile (if more than one profile exists). On the hardware profile, click Configuration Recovery, press ENTER, and then permit Windows 2000 to start.
The optimum method to change from an ACPI HAL to a Standard HAL is to re-install Windows 2000 as an upgrade:
1.   Start Windows 2000 Setup as an upgrade.
2.   To automatically disable ACPI support and allow Windows 2000 to detect automatically or manually change and install the correct (Standard HAL) computer type that your computer supports, use either of the following methods:

•   To Auto detect the computer type:

Press F7 when Setup generates the following informational message:
Press F6 if you need to install a third party SCSI or RAID driver.
NOTE: You do not receive a visual indicator that auto detection is taking place when you press F7; proceed normally with setup until it is completed.
•   To Manually Select your computer type:

Press F5, and then manually choose the correct Standard computer type by using the following list:
i386 source File   Computer Type
*hal.dll   Compaq SystemPro Multiprocessor or 100% Compatible
*halapic.dll   MPS Uniprocessor PC
*halapic.dll   MPS Multiprocessor PC
*hal.dll   Standard PC
*halborg.dll   SGI mp

NOTE: You do not have to use the reinstallation method to update from a Standard PC HAL to a MPS Multiprocessor PC HAL, you can use the Update Drivers feature in Device Manager for this. However, you must reinstall Windows 2000 when going to an ACPI HAL computer type on a computer that was using the Standard computer type, and then permit Windows 2000 to automatically detect the correct computer type.
If the Emergency Repair process cannot locate your repair information or if the repair information is invalid, recover your Windows 2000 installation by starting the Recovery Console:
1.   Start your computer with the Windows 2000 Setup floppy disks, or with the Windows 2000 CD-ROM if your computer supports starting from CD-ROM. At the Welcome to Setup screen, press R to repair, and then press C to start the Recovery Console.

NOTE: For information about using the Recovery Console, please click the article number below to view the article in the Microsoft Knowledge Base:
229716 ( Description of the Windows 2000 Recovery Console
2.   After you log on to your computer, from the %SystemRoot%\System32 folder of your original Windows 2000 installation, use the command console to copy and rename the following files as noted in the following lists. First determine which HAL and kernel files your computer requires by using the following list of supported computer types:

NOTE: Those marked with an asterisk character are Standard computer types (non-ACPI).

i386 source file: i386\\halmacpi.dll
Computer type: ACPI Multiprocessor PC
Copy to this folder: winnt\System32
Rename to this file name: hal.dll

i386 source file: i386\\halaacpi.dll
Computer type: ACPI Uniprocessor PC
Copy to this folder: winnt\System32
Rename to this file name: hal.dll

i386 source file: i386\\halacpi.dll
Computer type: Advanced Configuration and Power Interface (ACPI) PC
Copy to this folder: winnt\System32
Rename to this file name: hal.dll

i386 source file: *i386\\halsp.dll
Computer type: Compaq SystemPro Multiprocessor or 100% Compatible
Copy to this folder: winnt\System32
Rename to this file name: hal.dll

i386 source file: *i386\\halapic.dll
Computer type: MPS Uniprocessor PC
Copy to this folder: winnt\System32
Rename to this file name: hal.dll

i386 source file: *i386\\halmps.dll
Computer type: MPS Multiprocessor PC
Copy to this folder: winnt\System32
Rename to this file name: hal.dll

i386 source file: *i386\\hal.dll
Computer type: Standard PC
Copy to this folder: winnt\System32
Rename to this file name: hal.dll

i386 source file: *i386\\halborg.dll
Computer type: SGI mp
Copy to this folder: winnt\System32
Rename to this file name: hal.dll

3.   As indicated in the following table, copy all the appropriate kernel files common for your system (Uniprocessor vs. Multiprocessor) and the appropriate HAL file based on your computer supported computer type from the Windows 2000 CD-ROM (i386\ or installed service pack to the corresponding folder listed in the table under your original Windows 2000 installation, and then rename them (if required) to Ntoskrnl.exe and Hal.dll, respectively.

Common Multiprocessor kernel files   Copy to the following directory   Rename to the following filename
i386\\ntkrnlmp.exe   winnt\System32   ntoskrnl.exe
i386\\ntkrpamp.exe   winnt\System32   ntkrnlpa.exe
i386\\kernel32.dll   winnt\System32   kernel32.dll
i386\\ntdll.dll   winnt\System32   ntdll.dll
i386\\win32k.sys   winnt\System32\drivers   win32k.sys
i386\\winsrv.dll   winnt\System32   winsrv.dll
Common Uniprocessor kernel files   Copy to the following directory   Rename to the following filename
i386\\ntoskrnl.exe   winnt\System32   ntoskrnl.exe
i386\\ntkrnlpa.exe   winnt\System32   ntkrnlpa.exe
i386\\kernel32.dll   winnt\System32   kernel32.dll
i386\\ntdll.dll   winnt\System32   ntdll.dll
i386\\win32k.sys   winnt\System32   win32k.sys
i386\\winsrv.dll   winnt\System32   winsrv.dll
4.   Expand the Ntdll.dll file from the original Windows 2000 CD-ROM (i386\ or installed service pack to the %SystemRoot%\system32 folder of your original Windows 2000 installation.

For example:
drive:\i386\ /f:ntdll.dll c:\winnt\system32
where drive is the drive letter of your CD-ROM drive containing the Windows 2000 Server CD-ROM.
5.   Expand the Win32k.sys file from the original Windows 2000 CD-ROM (i386\ or installed service pack to the %SystemRoot%\system32 folder of your original Windows 2000 installation.
6.   Expand the Kernel32.dll and Winsrv.dll from the Windows 2000 CD-ROM (i386\ or installed service pack to the %SystemRoot%\system32 folder of your original Windows 2000 installation. For example, type the following commands expand drive:\i386\ /F:kernel32.dll %systemroot%\system32\kernel32.dll

expand drive:\i386\ /F:winsrv.dll %systemroot%\system32\winsrv.dll

where drive is your CD-ROM drive letter.

7.   Restart your computer.
For related information, please click the article number below to view the article in the Microsoft Knowledge Base:
234558 ( How to Add Support for Multiple Processors in Windows 2000
WARNING: Windows 2000 displays the list of compatible computer types that can be installed when you use Device Manager to manually update. Doing anything beyond what is listed as compatible is likely to result in not being able to start your computer correctly or at all. If you do have "Advanced Configuration Power Interface (ACPI) PC" listed as your computer type or after updating to the latest ACPI BIOS, then you cannot update to the "ACPI Multiprocessor PC" through Device Manager and may result in not being able to start your computer correctly or at all. In the case of an ACPI HAL, for Windows 2000 to support or recognize both CPUs using an ACPI HAL, you must first update to the latest ACPI BIOS which is fully compliant, then re-install Windows 2000 as an upgrade so it can automatically detect and install ACPI Multiprocessor PC; if it does not, your BIOS in not fully compliant yet.

You can use Safe mode to start Windows using a minimal set of drivers and services. If a faulty driver or program is causing problems, you may be able to use Safe mode to bypass the problem and start Windows so that you can diagnose the problem. However, Safe mode may not work in all situations.


Safe mode may not work in these situations:
•   A mass storage driver (SCSI or IDE) is damaged or has been accidentally removed.
•   The Ntoskrnl.exe or Hal.dll file is damaged.
•   A program replaced system files that are critical to the operation of Windows.
To diagnose a problem with Safe mode, follow these steps:
1.   Try all versions of Safe mode to see if Windows will start.
2.   If no version of Safe mode will start, try using the command console to replace or rename a faulty driver or to disable or enable a service.
3.   If the command console does not resolve the issue, you may need to restore the system from a backup.
For more information about the command console or other Windows recovery options, please consult your Windows documentation.

For additional information, click the article number below to view the article in the Microsoft Knowledge Base: How to Install the Windows Recovery Console
He''s famously known as Kiefer Sutherland, but the actor''s full name actually consists of five middle titles - Kiefer William Frederick Dempsey George Rufus Sutherland.

Fox News has compiled a list of 10 celebrities'' names whose middle names are not so well-know.

The list includes - Ali ''Gertrude'' Larter, Jennifer ''Love'' Hewitt, Samuel ''Leroy'' Jackson, Beyonce ''Giselle'' Knowles, Orlando ''Jonathan Blanchard'' Bloom, Russell ''Ira'' Crowe, Mel ''Columcille Gerard'' Gibson, Jennifer ''Joanna'' Aniston ''Anastassakis'', Ashley ''Tyler Ciminella'' Judd.

The top 10 middle names are as follows:

1. Kiefer ''William Frederick Dempsey George Rufus'' Sutherland.

2. Ali ''Gertrude'' Larter.

3. Jennifer ''Love'' Hewitt.

4. Samuel ''Leroy'' Jackson.

5. Beyonce ''Giselle'' Knowles.

6. Orlando ''Jonathan Blanchard'' Bloom.

7. Russell ''Ira'' Crowe.

8. Mel ''Columcille Gerard'' Gibson.

9. Jennifer ''Joanna'' Aniston ''Anastassakis''

10. Ashley ''Tyler Ciminella'' Judd.
Bangalore, Oct 31 : Wipro Technologies, the global IT services business of Wipro Limited announced that its Business Process Outsourcing division, Wipro BPO, is setting up a Shared Services centre for AmBev, the largest brewery company in Latin America with leading brands like Brahma, Becks, Stella and Antarctica.

The Shared Services Centre will provide services to AmBev across Latin America in the areas of Finance and Accounting, Order Management, Customer Services and HR Services. The partnership is expected to provide significant financial benefits and leverage transformation opportunities across AmBev operations in the region. These services will be provided from Wipro''s facility at Curitiba in Brazil.

Renato Nahas Batista, Zonal Vice President at AmBev said, "The partnership with Wipro will focus on transforming the existing Shared Service Centre and provide services across Latin America for AmBev. We are happy to be a part of Wipro''s expansion plans for Brazil and Latin America".

"Wipro''s capability to transform processes, implement SAP and provide world class service delivery is a strength that is unmatched by competition. Our robust delivery structure combines process, quality and finance and accounting expertise along with SAP consultants. This forms a team that can provide end to end service and take complete ownership", says Ashutosh Vaidya, Head, Wipro BPO.

Wipro''s Consumer Products Industry practice has a team for Food and Beverage industry with over 400 well-qualified associates. This division focuses on helping Food and Beverage companies re-engineer the way they meet end consumer''s needs through Information Technology solutions.

Wipro BPO is a critical partner to its customers in achieving their business goals. Over 20,000 people, operate out of 9 different locations (India and Eastern Europe). Wipro BPO services customers in various industries including Banking and Capital Markets, Insurance, Travel and Hospitality, Hi-Tech Manufacturing, Telecom and Healthcare sectors. Wipro BPO also has deep expertise in delivering process specific solutions in areas like Finance and Accounting, Procurement, HR Services, Loyalty Services and Knowledge Services.
Health Minister Anbumani Ramadoss has expressed "disappointment" over alcohol advertisements at airports across the country and has written to Civil Aviation Minister Parful Patel for their removal.

According to the health ministry, Ramadoss has written to the civil aviation ministry for removal of advertisements of alcoholic drinks on display at airports in Delhi and elsewhere across the country in August but no action was taken.

"However, the minister for health and family welfare has found that the hoardings and advertisements are still on display at the various airports, including the Delhi Airport," a health ministry release said Friday.

Citing various "scientific and technical studies", Ramadoss has written to Patel to issue instructions to the concerned authorities, "as advertisements of alcoholic drinks are already legally banned in electronic and print media."
Returning from hibernation sets the inactivity timer to five minutes on a Windows XP-based computer

After a Microsoft Windows XP-based computer returns (or "wakes up") from hibernation, it may enter hibernation again after five minutes of inactivity, regardless of the settings you have configured in the Power Options tool in Control Panel.
The computer's BIOS performs a full boot while it returns from hibernation and clears any wakeup signals that might be active. Therefore, Windows cannot determine why the computer woke up. Windows then returns to hibernation after five minutes of inactivity to avoid certain situations. For example, Windows may then return to hibernation to prevent a program from waking up the computer and causing the battery to drain while the computer is not being used.

This problem may also occur in Windows Vista. After you wake a Windows Vista-based computer from hibernation, the computer may enter hibernation again after two minutes of inactivity. For more information, click the following article number to view the article in the Microsoft Knowledge Base: You may experience problems after you resume a Windows Vista-based computer from sleep or from hibernation
The page you were looking for is currently not available. The address may not be correct, or there may be a temporary problem with this site.

Please try one of the following options to continue your search:

    * Check the address for typing errors.
    * Click the Back button and try a different option.
    * Try this page again later.

Please try one of the following options for assistance:

    * Solution Centers
      Review common support questions, issues, and new information for Microsoft products.
    * Searching the Knowledge Base
      Review tips on how to receive the best search results.
    * Get Assisted Support for a Product
      Support options for your product could include phone, chat, or e-mail assistance.
    * Visit Microsoft Technical Communities
      Interact with Microsoft employees, experts, and your peers to share knowledge and news about Microsoft products and related technologies.
    * TechNet
      Search the online support site that provides detailed "how-to" information for IT professionals concerning Microsoft products.
    * MSDN
      Search the online support site that provides detailed information for development professionals concerning Microsoft products.
    * Customer Service
      Visit the guide to a full range of customer service resources and information available at Microsoft.
Standby & Hibernate Issues in Windows XP:

*Can't Enter Standby or Hibernate If a Direct3D-Based Screen Saver Is Running
*Problems If Computer Is Set to Standby After 45 or More Minutes

*Standby Mode Is Delayed 30 Seconds By Raspti.sys
*Unable to Use Power Management Features

*Power Management Settings Don't Migrate/Upgrade to XP
*HOW TO: Verify Unsigned Device Drivers in Windows XP

*OpenGL Screen Saver Prevents Power Management Standby Mode
*Cannot Enter Standby with Diamond Multimedia Stealth II G460

*How to Enable the Wake from Standby Option for a USB Mouse
*Mouse Resumes Computer from Standby Mode If Option Is Disabled

*No HyperTerminal Connection to Remote Computer
*System Standby Disconnects Modem Connections

*No Hibernate Button Is Present After Clicking Turn off Computer
*Cannot Shut Down, Restart, Log Off, Stand By, or Hibernate

*UPnP Clients Are Not Detected When the Computer in Standby Mode
*Computer with IBM ScrollPoint Mouse Does Not Enter Standby Mode

*HyperTerminal File Transfer Does Not Survive Standby/Hibernation
*Scanner Does Not Work After Computer Returns from Standby

*Remote Assistance Stopped by Standby/Hibernate/Fast User Switch
*Computer w/ ATI Rage Pro AGP 2X Video Adapter Cannot Standby

*Cannot Wake Acer System from Standby by PS/2 Mouse or Keyboard
*ErrMsg: The Device Driver for the ATI 3D RAGE Pro AGP 2X...

*System with ATi Xpert 98 XL Video Card Does Not Go into Standby
*Bad Display on Sony VAIO PCG-F520 After Resume via IntelliMouse

*No Warning Appears When Battery Is Low or Critical on Portable
*Resuming from Standby After Warm Undock Corrupts Video

*Windows XP Stops Responding at the Welcome Screen

   Laptop Computer Reaches 100 Percent CPU Usage After Removal
When you are using a docked computer, the computer may not be able to shut down, restart, log off, stand by, or hibernate. When you try to use any of these commands, the computer may appear to stop responding (hang).

Some types of docking stations may suspend the undocking process until the docking station is physically detached. If you leave the computer intact after you request undocking by clicking the Eject PC or Undock Computer command, or by pressing the undock switch, the computer may not be able to shut down, restart, log off, stand by, or hibernate because the pending undock process blocks all other operating system processes.


If you experience the symptom that is described in this article, physically detach the computer from the docking station after you request undocking by clicking the Eject PC or Undock Computer command, or by pressing the undock switch on the computer.

Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article.


For Windows 2000, Microsoft recommends that Original Equipment Manufacturers (OEMs) implement their devices such that the docking station suspends the undocking process until the docking station is physically detached if an IEEE 1394 controller exists in the computer and an IEEE 1394 device is installed in the docking station. This prevents Windows from potentially damaging data, which could occur if the device restarts if an OEM has designed a docking station system that cannot be isolated from the computer electrically. For additional technical information, see the "ACPI Docking for Windows Operating Systems" white paper at the following Microsoft Web site:
Windows / Linux / Hibernate Setting Missing
Oct 31, 2008, 02:17 PM
Click on the start button and select turn off computer. Then hold down the shift key and the hibernate button will be shown. Click it and your computer will enter into hibernation.

     Tip:  When you try to put your computer into Hibernate or Suspend mode while the system is writing data to a compact
              disc (CD), the computer may not enter Hibernate or Suspend mode. You may receive the following error message
              (or a similar one):

The device driver for the '%device name%' device is preventing the machine from entering hibernation/suspend. Please close all applications and try again. If the problem persists, you may need to update this driver.

You receive neither an informational message that the system is writing to a CD nor an error message that offers you the choice of stopping the CD write process or waiting until the process is complete.

This behavior occurs because you cannot put a computer into Hibernate or Suspend mode while the system is writing to a CD.  To work around this behavior, wait until the CD write operation is complete before you try to put the computer into Hibernate or Suspend mode.

Because the computer has already started to enter Hibernate or Suspend mode, some devices may already be turned off. For example, a USB mouse or scanner may be offline until you complete the Hibernate or Suspend process.
Windows / Linux / Help and Support
Oct 31, 2008, 02:07 PM
Help and Support

This issue can occur if one or more of the PCHealth components in your
computer are damaged.

To resolve this issue:

1. It is important to note if you have recently made alterations to your
computer before this problem occurred, or if the Help and Support Center
ever worked correctly. If you have recently made alterations to your
computer before this problem occurred, try to undo the changes you made or
uninstall the hardware or software that could have caused the issue. After
you do so, test to determine if the issue is resolved, and if it is, skip
the remaining steps. If the issue is not resolved, continue to the next

2. Remove the .cab files from the Packagestore folder, and then rebuild the
original Help and Support Center:

a. Click Start, click Run, type "cmd" (without the quotation marks), and
then click OK to open a command prompt. Type "net stop helpsvc" (without
the quotation marks), and then press ENTER.

b. Type "cd /d windir\pchealth\helpctr" (without the quotation marks),
where windir is the Windows folder, and then press ENTER.

c. Type "rd packagestore /s /q" (without the quotation marks), and then
press ENTER.

d. Type "cd binaries" (without the quotation marks), and then press

e. Type "start /w helpsvc /svchost netsvcs /regserver /install" (without
the quotation marks), and then press ENTER.

f. If any of the following processes are running, stop them:


To stop a process, right-click the taskbar, and then click Task
Manager. Click the Processes tab, click the process you want to stop, and
then click End Process.

g. At the command prompt, type "net start helpsvc" (without the
quotation marks), and then press ENTER.

3. If the Help and Support Center has not been customized by an OEM, skip
to the next step. If the Help and Support Center has been customized by an
OEM, completely refresh the Help and Support Center:

a. Click Start, click Run, type "cmd" (without the quotation marks), and
then click OK to open a command prompt. Type "net stop helpsvc" (without
the quotation marks), and then press ENTER.

b. Type "cd /d windir\pchealth\helpctr" (without the quotation marks),
where windir is the Windows folder, and then press ENTER.

c. Type "rd packagestore /s /q" (without the quotation marks), and then
press ENTER.

d. Type "rd installedskus /s /q" (without the quotation marks), and then
press ENTER.

e. Type "cd binaries" (without the quotation marks), and then press

f. Type "start /w helpsvc /svchost netsvcs /regserver /install" (without
the quotation marks), and then press ENTER.

g. Type "start /w helpsvc /register" (without the quotation marks), and
then press ENTER.

h. If any of the following processes are running, stop them:


To stop a process, right-click the taskbar, and then click Task
Manager. Click the Processes tab, click the process you want to stop, and
then click End Process.

i. At the command prompt, type "net start helpsvc" (without the
quotation marks), and then press ENTER.

NOTE: The preceding procedure should not negatively affect an
OEM-customized Help and Support Center. However, it does remove any other
.cab files from the Packstorage folder, such as the Windows XP support
tools (which adds their table of contents into the Help and Support

4. If the preceding steps do not resolve the issue, use the Windows XP
CD-ROM to start your computer, and then run a repair (in-place upgrade)
Windows / Linux / Hard drive Repair
Oct 31, 2008, 02:01 PM
Title: Harddrive Repair
Description: Data recovery, hard drive repair,
recover files, tools, information and guide.

Title: Data Recovery
Description: Hard drive recovery tools and tips,
guide for data recovery and repair.

Title: Quick Data Recovery
Description: Info on data recovery and tools for
repairing your hard drive.
Windows / Linux / Hard Disk - Cleaning
Oct 31, 2008, 01:54 PM
Hard disks keep getting bigger and bigger, but somehow we still run out of space. MP3s and other media files are immensely popular–and simply immense. Programs are bigger, and data files are bigger. Windows Explorer isn't much help. It will tell you the size of all selected files in a folder, but nothing about the files in that folder's subfolders.

Enter DiskPie2 a utility to identify the biggest consumers of disk space. Pie charts let you see at a glance which folders and file types are taking up the most space. The charts are highly customizable, and can be printed.

An Explorer view lets you navigate to the folder you want to chart, and as a bonus displays the number of bytes in and below the selected folder. DiskPie2 also can display and print a report of the largest files in the selected folder. Armed with the information that DiskPie provides, you can decide how best to allocate the space on your disk.

TreeSize:  Every hard disk is too small if you just wait long enough. TreeSize tells you where precious space has gone to. TreeSize can be started from the context menu of a folder or drive and shows you the size of this folder, including its subfolders. You can expand this folder in Explorer-like style and you will see the size of every subfolder. Scanning is done in a thread, so you can already see results while TreeSize is working. The space, which is wasted by the file system can be displayed and the results can be printed in a report. TreeSize is Mailware for Windows 9x/NT/2000/XP.
Windows / Linux / Gina DLL
Oct 31, 2008, 01:51 PM
A replacement GINA DLL, used by 3rd party networking and remote access products can prevent Windows XP from allowing the use of the new Welcome Screen.  To resolve this issue, click Start, Run and enter REGEDIT.  Go to:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\Current Version\WinLogon.

In the right pane, right click on the entry for GinaDLL and select Delete

Tip:  Specify a Replacement GINA Authentication DLL

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. Value Name: GinaDLL, Data Type: REG_SZ (String Value). Create a new String value, or modify the existing value, called 'GinaDLL' and edit the value:"c:\winnt\system32\mygina.dll". Note: You will need to change this value if Windows is installed in the Windows directory.

Exit your registry, you may need to restart or log out of Windows for the change to take effect.
Windows / Linux / Google - Auto Search
Oct 31, 2008, 11:32 AM
TweakUI/Internet Explorer/Search/Create
Prefix: Google or just "g"

To disable the Search Companion feature and use the Classic Internet Search feature from Internet Explorer 5.0 open Internet Explorer, click the Search button on the toolbar. Click Change Preferences, and then click Change Internet search behavior. Click With Classic Internet Search, and then click OK. Restart Internet Explorer for the changes to take effect.

To change the autosearch URL, open the Search sidebar again and click Customize. Then click AutoSearch settings and select "Google Sites".

To re-enable the Search Companion feature, click Customize on the Search bar. Click Use Search Companion in the Customize Search Settings dialog box, and then click OK. Restart Internet Explorer for the changes to take effect.
'Mamma Mia! The Movie' named UK's top-grossing British film of all time

'Mamma Mia! The Movie' has been declared as the biggest grossing British flick of all time at the UK box-office.

With actors like Meryl Streep, Pierce Brosnan, Colin Firth, Colin Davis, Rachel McDowall and many more, the flick has knocked down hits like Harry Potter to be on the top spot.

The film has made 66,995,224 pounds in the UK.

'Removed Royale' moves down a place to number three and the top 10 is completed by the other 'Harry Potter' films, 'The Full Monty', 'Bridget Jones'' Diary' and 'Love Actually', reports Guardian. Co. UK

Only the film Titanic has made more in Britain - 69million pounds - a figure that Mamma Mia could still pass given how widely screened it still is.

Its popularity flies in the face of the film''s critical reception.

The Guardian''s Peter Bradshaw complained that no film had ever had a more irrelevant story, adding: "The characters are forever dancing and smiling and bursting into Abba songs like Stepford cyborgs when you flip the secret panel behind their heads and press the Life-Affirming Behaviour button."

Worldwide, the film is already one of the most profitable movies ever and recently crossed the 500million dollars box office mark.
Acer has announced the launch of its 18.5" LCD monitor, X 193HQ, for the Indian market.

The X 193HQ features a slim profile with an adaptable black color scheme and rear-cable management. The control buttons are located below the panel to enable easy cleaning and intuitive use.

Available at Rs. 8,500, X 193HQ complies with Windows Vista operating systems.The wide viewing angle of the monitor maintains color consistency and image clarity.

The Acer Empowering Key allows full access to the Acer eColor Management onscreen interface and enables varied advanced controls for ultimate image quality. Bundled with the unique Adaptive Contrast Management (ACM) tool, this monitor automatically detects image signals and intelligently controls the backlight brightness to make the black 'blacker' in a dark scene, and make the white 'whiter' in a bright environment.

"Acer has always been at the forefront in supporting the latest technologies
that enhance customer experience", said S. Rajendran, Chief Marketing Officer, Acer India. "Setting a new standard for quality and value, Acer X Series monitors are an attractive and functional addition to any home. With the X 193HQ, we have once again pushed the boundaries of digital lifestyle with advanced product features and eye-catching style."

Acer X 193HQ LCD monitor is currently available in the major cities across India.
Apple and AT&T's decision to subsidize the price of the iPhone 3G is paying off with an increase in sales to lower-income folks.

Comscore released data earlier this week indicating that while most iPhone users are in the $100,000-a-year income bracket, those earning between $25,000 a year and $75,000 a year are the fastest-growing segment of new iPhone customers. iPhone adoption among those making $25,000 to $50,000 a year has grown 48 percent since June, according to the report.

"Fastest-growing" is always one of my favorite research terms because it usually implies "smallest." Comscore says 43 percent of iPhone owners make more than $100,000 a year, but thinks those Joe-Hockey-Sixpack-Moms out there are starting to realize they can get away with just an iPhone and pare down the multiple devices they used to use for making calls, listening to music, or playing games.

The fact that they only have to spend $199 to acquire an iPhone these days--monthly fees aside--probably helps. There's no guarantee that iPhone sales maintain their torrid pace as the way this economy is going, but last quarter, at least, people who might be struggling found the money for iPhones.
British telecom firm Vodafone has clinched a strategic partnership with Russia-based Mobile TeleSystems (MTS) OJSC, which includes collaboration on future technological developments.

According to the sources, the non-equity partnership agreement has been signed to offer clientele with high quality communication services.

The pact would also offer Mobile TeleSystems (MTS) access to products, services and devices from Vodafone for its markets of operation in Russia, Ukraine, Uzbekistan, Turkmenistan and Armenia.

The sources further revealed that Vodafone will also open a representative office in Moscow with the aim to work together with MTS on future offerings and customer services. The conglomerate's products will be made available to MTS's 87 million subscribers, including more than 60 million customers in Russia.

The company officials said that MTS will be able to draw on Vodafone's expertise in setting up and developing third generation (3G) networks and mobile broadband increase quality and further improve the efficiency of its operations.

According to the reports, the joint venture with MTS will give Vodafone valuable insight into the opportunities of the important telecommunications markets of Russia and the Commonwealth of Independent States (CIS), which are among the fastest growing in the globe.

While commenting on the partnership, Mr. Mikhail Shamolin, MTS CEO and President stated,"Vodafone's commercial insights and technical expertise will translate into significant operational efficiencies for MTS over the long-term as we transition our networks to 3G and beyond."
Chat Box / Adhesive Tape Used To Take X-Rays
Oct 24, 2008, 07:13 PM
Inexpensive but is it possible?

Researchers at the University of California, Los Angeles (UCLA) have invented a new use for the cheap transparent adhesive tape other than using it to glue things -- can now be used for taking x-ray images.

Researchers claim that just by peeling the tape in a vacuum tube can generate x-rays. They even showed a proof of concept by taking an x-ray of one of the researcher's fingers.

The scientists believe this simple discovery is a major breakthrough and advancements in the research can benefit developing countries with such low-cost x-ray machines that require little or no electricity.
Rajkot, Oct 24 : Tata motors'' decision to make low cost Nano car in Gujarat has kindled hopes of a lucrative business among the auto-parts making small-scale industrial units in Rajkot.

Rajkot has established itself as a hub for the auto parts ancillary units and, supplies auto parts to automobile manufacturers including Tata, Mitsubishi and Mahindra and Mahindra.

Around 40-50 manufacturers and over 250 sub manufacturers are based here and produce over 300 types of auto parts.

Industry experts feel that the setting up of Nano car plant in Gujarat will give an boost to the manufacturing units in Rajkot.

"When the plant was in Singur, that time also quite a few manufacturers from Rajkot were supplying parts to Nano car, Tata Nano project, as original component. So, this is a benefit to Rajkot industries since, they are coming to Gujarat and all main plant manufacturers would wish that their ancillary should be in the nearest periphery of the main plant," said Hitesh Bagdai, resident, Rajkot Chambers Of Commerce and Industry (RCCI).

According to the manufacturers, the setting up of the Nano plant in the state will also help them in cutting down on their logistics cost as they would save around 1.6 million rupees a month on transportation alone.

Experts say the entry of Tata motors is also bound to encourage other auto giants to come to Gujarat and aid the growth of auto parts manufacturing industry in terms of business and also generate more employment opportunities.

"There are many engineering colleges in the city and people qualifying from there used to go to Maharashtra or other states for work. Now with Nano coming, more employment will be generated and they can get a chance to work here only," said Suresh Patel of Amul Industries which manufactures auto parts for Nano car. (ANI)
Chat Box / what u think abt scientists???
Oct 24, 2008, 06:59 PM
hi acumens,

i always have a thought abt scientists.bcoz creation involves only by 2 persons one by the god the other is man-made creations

for eg,.god's creation is nature,me ,u ,v ,all ....
           man's creation is religion,cast,atom,light,

in the god, i don't know any body in particular...somebody is up there[v say know supreme power]

in man, i know 2 persons,one the legend einstein[E=mc^2] & the other is abdul kaalam[Missile Man of India]

but im having a general opinion that they r not human beings at no im trying to say that they r not ordinary folks bcoz they use their brain's power thrice than the normal humen use their brain.its true.simply scientists are born genius.

i shared my thoughts.let v know wat all feel/ thought about scientists.

thanks 4 sharing...
It's been a while since we did a full-fledged review of a home theater system, but that doesn't mean the market is lagging. Yamaha is one of the more popular players in the entry-level home theater segment in India, and its products are generally good and reasonably priced. The device we intend to review today is one of Yamaha's newer models, the YHT195.

This home-theater-in-a-box comprises an HTR-6130 model AV receiver and NS-E270/C270 front and centre speakers, along with a matching SW-P270 subwoofer. The speakers have light silver cabinets, along with lighter grey grilles. The sub, likewise. The satellite speakers weigh a little less than a kilo each, and are neat little rectangular boxes. The center speaker is sleek and flatter in shape, as it rests on its broad base in the, well, center.

The sub is a medium-sized unit when looked at in perspective, with a non-skid pad on its base. The weight is also moderately light, at 8.5 kilos. Included in the package are 22 AWG black speaker wires bundled neatly for connections. The terminals at the back of the speaker and receiver are of the spring clip-on type, making connections easy. The back of the sub has the power switch/LED, volume control, input terminal, and voltage selector (240V for us).

As for the receiver, this unit is silver too (black option available), with a typical façade consisting of a central LED display and a couple of button rows. The left side has a stout round power button, while the right has a huge power knob, which is smooth to use.

Features and Specs
AV receivers these days come with a plethora of options and connectivity. Proprietary features in this one include YPAO, Yamaha's automatic room calibration (mic included). Another is Cinema DSP, which is basically a fancy DSP mode that's rather like Scene. There are options to set the crossover frequencies for the subwoofer, and the unit supports Dolby Digital/Pro Logic 2 and DTS.

Connections include 2 HDMI-ins, 1 HDMI-out, 3 component-ins, a 5.1 analog audio-out, and a host of composite-outs. There are 3 digital audio-ins: one coaxial and 2 optical-ins. A 'zone 2' speaker terminal allows attachment of an extra pair of speakers in another room.

The system has 500W of total RMS power, at 100W per channel, plus 50W for the subwoofer. The speakers are rated at 6 ohms.

While playing the system we used a PS3 via HDMI through to Sony Bravia X series; and another input was my HTPC soundcard via optical cable, to test pure audio. Setting up the speakers in our acoustically treated room was easy; we did not need the YPAO. Nonetheless, the calibration took less time and performed fine.

First off, the frequency response was quite impressive, though not absolutely refined. We were playing pure stereo music like Jamiroquai and Sarah McLachlan CD. The high mids were a little crisper than usual, though tolerable. Bass was better, with the sub doing its bit, and making its presence felt all right, though again the crossover point had to be tweaked in the AV receiver (or the bass sounds boomy). For our room it was at about 100Hz. The sound was loud enough for an average-sized room, and there was no distortion.

PS3 games came next, with all their surround-sound glory. This time I liked the performance better. This is typical of HTIBs; they are actually meant for surround-sound entertainment, not critical audio. The sub thudded out the SFX quite nicely, even in Blu-ray movies such as Pan's Labyrinth and Ratatouille.

I then switched back to stereo CDs, this time to check the CINEMADSP modes. There were many of them, and let me just say they didn't appeal to me. Except of course Dolby Pro Logic, a tried-and-tested feature that does a good job of creating artificial surround sound.

This system costs Rs 26,000, and is one of the more reasonable products available in its realm. The performance is very good for games and movies, though music lovers and audiophiles might find the sound a little insensitive. It's great for someone looking for a 5.1 sound system for the living room, and the price is right too. Check it out.
Transcend has launched two 2.5-inch portable hard drives – StoreJet 25C and StoreJet 25M – in 500GB capacities.

The hard drives come bundled with StoreJet elite software package, which features Website AutoLogin, Mobile Favorites with NoTrace Internet browsing, Secret-Zip 256-bit AES file encryption, Mobile E-mail, Online Update, and intelligent backup scheduling/ security/ file compression functions. The drives are also equipped with a high-speed USB 2.0 interface that's capable of data transfer rates of 480Mbps.

The drives will ship with a two-year warranty and cost Rs 13,300.
Apple has launched its new MacBook family here in India just a week after it was launched in the US. Also launched was the LED Cinema Display.

The MacBooks start at Rs. 79,700 and go up to Rs. 1.60 lakh.

Check out this link for the MacBook family specs.

The LED Cinema Display features a 24-inch LED-backlit widescreen display with built-in iSight video camera, mic and speakers in a thin aluminum and glass enclosure. Designed for the new MacBook family, the LED Cinema Display includes an integrated MagSafe charger, three USB 2.0 ports and the new Mini DisplayPort, making it easy for MacBook users to quickly connect and power their notebooks as well as use their favorite peripherals.     

The LED Cinema Display will be available from November through Apple's authorized resellers for Rs. 60,900.
Technology has revealed a new addition to their Data Traveler range of USB products. The new Data Mini Slim USB Flash drive is designed to offer users an easy and colorful way to transport and share music, photos and other digital files.

Available in black, blue or pink with gray bottom casings, the new USB drives also have a slightly fashionable look to them and are easily connected to a keychain while storing up to 4GB of content. The new DT Mini Slim has dimensions of 1.529 x 0.645 x 0.253, making it one of the smallest USB drives available.

"Kingston USB drives have always provided great functionality by allowing consumers to carry large quantities of information everywhere they go," said Nitin Malhotra, Kingston Country Manager, India. "The DT Mini Slim lets anyone safely store and share their favorite media content everywhere they go with a little class and color, in an ultra-small form factor."

Kingston's new DataTraveler Mini Slim USB drives are available in 2GB and 4GB capacities. The new DT Mini Slim is backed by a two-year warranty and Kingston's service and support. The 2GB versions are available for Rs. 455, but oddly Kingston has not yet provided the pricing on the 4GB model.
Google has introduced Gmail for mobile version 2.0 for J2ME-supported and BlackBerry phones.

Google has rearchitected the entire client to push all the processing to the background and improve the client-side caching scheme.

This means that there is an overall performance improvement while users can manage multiple accounts. Users can save multiple email drafts in their mobile phone, so that they can pick and choose what they would like to send later. This also includes basic offline support. Users can compose and read recent emails even when there is no signal and Any outgoing messages will be saved in the outbox on the phone and sent automatically when coverage returns.

Gmail for mobile 2.0 is available in over 35 languages now though, not all features are available for all phones.

Go to in your mobile browser to download the new Gmail for mobile for your phone.
New York - Left up to Hollywood, Barack Obama would be a clear shoe-in for the White House on November 4.

The Democratic presidential nominee, age 47, has received unparalleled support from the traditionally liberal and glamourous US entertainment industry.

Steven Spielberg, Tom Hanks, George Clooney, Leonardo DiCaprio, Jodie Foster, Scarlett Johannson and Halle Berry - those are just a few of the prominent names on the list of Obama's campaign workers.

Republican rival John McCain, 72, has fewer, but equally large names, on his side: Clint Eastwood, Sylvester Stallone and Tom Selleck.

Political activism has a long tradition in Hollywood, interrupted only by the McCarthy era, when writers and actors were blacklisted as communists during 1950s Cold War hysteria.

This year's political passions are particularly strong as Oscar winner Susan Sarandon (Dead Man Walking) threatened to emigrate if a Republican is elected. Matt Damon quipped in a YouTube interview that imagining Sarah Palin as president was like something out of a "really bad Disney movie."

From the other side of the political coin, Oscar winner and the old conservative reliable Jon Voight (Coming Home) said Obama "falls short in any way" one looks at him.

It's not clear how much influence such prominent advocates have on voters. The polling institute Pew Research Center determined that stars have little influence on the outcome.

Yet not only actors but authors, artists and many scientists are passionate in pushing Obama, their clear favorite, for the presidency.

Just days before, a group of 65 US Nobel Prize recipients issued a dramatic call to support the Democratic ticket.

"The country urgently needs a visionary leader who can ensure the future of our traditional strengths in science and technology," read their manifesto.

The bestselling author Stephen King, Nobel literature laureate Toni Morrison, cult writer Paul Auster and many others hope that a black president would send a signal to the pockets of racism that persist around the country despite four decades of civil rights progress.

"I think that the importance to blacks would be tremendous," author Philip Roth said in a recent interview.

Superstar Angelina Jolie says it's not Obama's race, but his engagement for human rights and world justice that motivate her to support him.

If star power doesn't affect the final voters' decisions, it at least puts coins into campaign coffers. Rock stars Bruce Springsteen and Billy Joel raised 7 million dollars for Obama's campaign last week, playing hits like Glory Days and Born to Run to serenade voters in the final election phase.

In addition, Obama has taken in nearly 6 million dollars from entertainment firms, compared to a meagre 1 million dollars for McCain.

TV talk show queen Oprah Winfrey was the first star to climb into the ring with Obama very early this year.

She has since receded to the sidelines, taking a low profile to spare Obama from the verbal beating he has taken from the McCain campaign, which has sought to portray him as a celebrity of little substance and no understanding of common people. Those taunts grew stronger after Berlin drew his largest crowd ever, of 200,000, to the famous Victory Column in July.

Only once did Obama turn down a star who wanted to do battle for him.

When the popular young actress Lindsay Lohan, whose fight against alcohol and drug addiction is well known, offered to hold a series of events for young voters, the Obama campaign gave a polite no.

"That is not exactly the kind of high-profile star who would be a positive for us," the campaign noted
London, Oct 24 : James Bond's Aston Martin DB5 has been voted 'Most Iconic British Car Ever' in a new poll.

The car, which features in five 007 films including 'Removed Royale' in 2006, beat the Jaguar E-Type, which came second, reports the Sun.

Third on the list was 'Mini Cooper' followed by Aston Martin V8 Vantage at number four.

Austin Mini rounded off the top five in the survey for TV channel Dave.

Meanwhile, the Reliant Robin was voted the most embarrassing motor in the survey.

The top ten 'Most Iconic British Car Ever' are

1 Aston Martin DB5

2 Jaguar E-Type

3 Mini Cooper

4 Aston Martin V8 Vantage

5 Austin Mini

6 Rolls Royce Phantom

7 Lotus Elise

8 Lotus Esprit

9 Bentley Blower

10 AC/Shelby Cobra
With the launch of the Xperia X1 getting closer and closer (sometime towards the end of November) it seems like the handset is still undergoing a few cosmetic changes with the UI. Personally it all looks pretty good to me as the additions to the UI, at least from the images going around, are going to give the handset a much wider appeal.

Image Source

The latest is a thumb optimized interface. Like most of the other higher-end WinMob handsets, for example, HTC's Touch FLO and the Omnia's quick access menu, this new system will allow users to completely negate the stylus option of input. Enlarged icons and options will allow users to navigate simply with their fingers.

I'm quite excited especially after the preview and I can't wait to see what the finished product will be like, so stay tuned. When we know you'll know. Considering the current financial situation let's just hope SE can keep the price decently placed.
Trying to keep up with HTC's TouchFLO, ASUS has launched the P552w PDA phone which features Glide – the innovative touch-responsive user interface that ASUS has designed for navigation. The Global launch was in September of this year and the handset is now getting ready to hit Indian shelves.

Running on a Microsoft Windows Mobile 6.1 Professional OS,
the P552w is equipped with a 624MHz processor, internal GPS with Google integration, and Gester technology that enables users to perform a variety of navigational actions – such as selecting, zooming, scrolling and flipping through shortcust menus much like HTC's TouchFLO. Their versions are called Multi-Home, Anytime Launcher, EziPhoto, and EziMusic. The handset also supports WLAN, Bluetooth and of course features USB connectivity. It comes equipped with a 2MP camera as well.

Through a specialized feature called ASUS SMS Location Link, users can send a link embedded in an SMS of their location that when clicked on will show up on the receiver's handset on Google Maps. ASUS P552w also features a convenient Google Search Bar on the 'Today' screen that makes it easier to perform online queries. The ASUS P552w also houses applications that enable easy access to web content like RSS newsfeeds, YouTube movies and photos on Flickr.

The ASUS P552w PDA phone is available for Rs. 27,900 and should offer other i-Killers like the Touch Diamond some heavy competition. But let's wait and see.
Windows / Linux / Frequently Used Programs
Oct 24, 2008, 04:38 PM
If FUP are not being listed:  Check the number of programs to be listed: Right click the Start button/Properties/Customize/Number of Programs...

The number is also listed here:  Start/Run/Regedit

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. In the right pane,
check the Value Data under Start_MinMFU.

     Tip:  To prevent a program from being displayed in the Most Frequently Used Programs list:

1. Start Registry Editor (Regedit.exe).
2. Add an empty string value named NoStartPage to the following registry key, where <Program name.exe> is the name
   of the executable file that is used to start the program:  HKEY_CLASSES_ROOT\Applications\<Program name.exe>
3. Quit Registry Editor, and then restart the computer.

This setting allows you to decide which programs may be shown in the most frequently used programs list on the Windows Start menu.  Start/Run/Regedit and navigate to:  HKEY_CLASSES_ROOT\Applications

To stop a specific application appearing on the MFU program list open its sub-key and create a new empty string value called "NoStartPage".  To allow an application to be shown in the list delete the "NoStartPage" value. Restart Windows
for the change to take effect.
Windows / Linux / How to Format Windows XP
Oct 24, 2008, 04:34 PM
How to Format Windows XP -  MVP Michael Stevens

If you want to format for a clean install, simply boot from the XP CD (you will need to set the bios order to boot from the
CD) and when it finishes it's scan for previous Windows installations choose the XP partition you want to format and setup
will delete, format and do a clean install.

If you want the remove XP to reinstall a previous OS, you can use a Windows 98/Me startup disk to format the partition if
it is Fat 32, or use fdisk to delete the non-dos partition if it is NTFS. Note that you can only use fdisk to delete primary
NTFS partitions.

Obtain a Win 98/Me startup disk here.  There is also special XP system startup disk. Scroll
down to the bottom of the page.

If you cannot boot from the CD and need to delete an extended NTFS partition, you can download the image file to
create a 6 floppy disk start up set that will allow you to run Recovery Console.

There are Home and Pro specific versions.

If you want to format a NTFS or Fat32 partition that is not the system partition, you can do this with XP's Disk Manager.

On the Start menu, right-click My Documents, and then click Properties. Click the Sharing tab, and then click to select
the Make this folder private so that only I have access to it check box. Click Apply, and then click OK.

Note: You cannot make your folders private if your drive is not formatted as NTFS.

Home Edition: Set Permissions for Shared Files and Folders. Boot into safe mode and logon to the 'Administrator'
account. Right click the folder in question/Sharing and Security/Make Folder Private.

To view the Security tab for a file or folder in XP, hold down the Ctrl key while right-clicking the file or folder, and select Properties. If you are in a domain instead of a workgroup, this approach is unnecessary.

You Cannot Select the "Make This Folder Private" Option

     Tip:  Hide Files and Folders inside of Windows XP

Windows Explorer/Tools/Folder Options/View/Show Hidden Files and Folders. Right click the folder to be
hidden/Sharing and Security/General Tab/Hidden/Apply Changes to.../

Hide your private files and folders from other users. Restrict access to important system files and be in full control of the
way your files and programs are used by other users of your computer.
Folder Backgrounds - Customizing

Select the folder you want to use for your background wallpaper. You MUST convert the folder you want to use to
a SYSTEM folder.  At the command prompt screen (Start/Run/CMD) which looks something like this: c:\> type this command: attrib +s c:\myfolder and then hit the return key.

Copy and paste the script below into Notepad and change the line that says IconArea_Image to point to the directory
and the file that you want to use for the background image.



The last line in the script tells Windows what color the font will be when you read the files in that folder. For instance:

0x00000000 = black
0x00FF0000 = blue
0x0000FF00 = green
0x000000FF = red
0x00C000C0 = purple

Now save the file you just created as desktop.ini and place it into the directory you just converted into a system folder.
Now close that folder and then reopen.  (From a Newsgroup post made by Alberich)

     Tip:  If a folder uses the wrong background picture and you can't change it:  Start/Run/Regedit and remove this key:

Added Note:

Question: One of my special folders (e.g. My Documents, My Music, My Pictures, Shared Documents, etc) has lost
its name, lost its icon, or has the wrong Task Pane template, how can I get it back?

Answer: This problem can occur if the hidden desktop.ini file in the special folder is corrupt or missing. Here are the
steps to fix this problem:

Open the special folder, then in the address bar type \desktop.ini at the end of the path and press enter. This will open Notepad.

If, instead of opening Notepad, you get a message saying Windows cannot find the file right click in the folder and select properties, then go to the Customize tab and click Change Icon then click OK and click OK again. This will create a desktop.ini with the correct Hidden and System attributes. Now you can repeat the first step.

   1.     In Notepad change the text of the file to the correct text specified below (My Documents, My Music,
              My Pictures, My Videos, Favorites, Shared Documents, Shared Music, Shared Pictures, Shared Videos).
              Then save the file and exit Notepad.
   2.     Log Off all the way and then Log In.

Note: When the text of one of these files contains Douglas Thrift replace it with your own user name.
My Documents

    Owner=Douglas Thrift
    PersonalizedName=My Documents

My Music

    Owner=Douglas Thrift
    PersonalizedName=My Music

My Pictures

    Owner=Douglas Thrift
    PersonalizedName=My Pictures

My Videos

    Owner=Douglas Thrift
    PersonalizedName=My Videos



Shared Documents


Shared Music


Shared Pictures


Shared Videos

1.  Check your recent documents that point to the A: drive. And/or try clearing My Recent Documents.

2.  Do a search for *.lnk, then delete any references to A: that are not "Send To" or similar "shortcuts".

3.  Right click the My Computer icon/Manage. Services and Applications/Services/Shell Hardware Detection and set
     it to Automatic. Or Programs/Administrative Tools/Services/In the right pane set "Shell Hardware Detection" service
     to automatic.

4.  Start/Run/gpedit.msc/User Configuration/Administrative Templates/Windows Components/Windows Explorer.
     In the right pane double click Hide these specific drives from my computer. Enable then use the drop box.

5.  Do a Start/Run/CMD then type in the path command. Is a: listed in the search path?

6.  Some AV software will automatically scan the floppy drive at both startup and shutdown.

7.  This may be a reappearance of the NTFS bug on showing color. Explorer, Tools, Folder Options, View uncheck
     "Show encrypted or compressed NTFS folders in color"

8.  In the BIOS set the PC to boot first to drive C, not the A. And also, go into the boot section in the bios and and
    turn off floppy drive seek at boot.

9.  Task Scheduler can cause floppy seeking on startup. Even is you choose to *Stop using Task Scheduler* (but do
     not Disable the service) in the Scheduled Tasks>Advanced Options, you will still get the thrashing - you have to
    *disable* the service altogether to get rid of the thrashing.

10. Log off then log back on
Files - Recovery

Find any lost and deleted data on your drive (e.g. hard disk) even if the partition table is lost or the drive has been
quick-formatted Lost Data, that is the result of a system crash can also be recovered.  More information here.

Files - Remove/Delete

Close all open apps. Open a command prompt and navigate to the directory with the offending files. Then open the Task Manager and click on the Processes tab. select "Explorer.Exe" under Image Name. Click "End Process".

Now you will only have the command prompt and the task manager. In the Command Prompt, DEL the offending files
(DEL *.mpg, DEL mus*.avi, DEL test.wmv, etc.)

The files should now delete without a problem. Now go back to the task manager and click on the Applications tab. Click
the "New Task..." button. in the dialog, type Explorer.Exe and click OK.

Process Explorer shows you information about which handles and DLLs processes have opened or loaded.  Use the
search function to find every handle that Explorer.Exe has open and close them (right-click on the file and choose
'close handle'). Then delete the file(s) in question.

Files - Rename

How to Rename Multiple Files with Windows Explorer. Start Windows Explorer. To do so, click Start, point to All
Programs, point to Accessories, and then click Windows Explorer. Select multiple files in a folder. To do so, press and
hold down the CTRL key while you are clicking files. After you select the files, press F2. Type the new name, and then
press ENTER.

NOTE: When you complete the preceding steps, the highlighted state of all files except one disappears, so it may appear
as if you are only renaming one file. However, after you press ENTER, all of the files are renamed. When you rename multiple files, all of the renamed files have the same name with a number in parentheses appended to the name to make
the new file name unique. For example, if you type BUDGET as the new name, the first file is named BUDGET. All of
the remaining selected files are named BUDGET( x ), where x is a unique number, starting with (1).
Windows 2000 and XP include a feature called Windows File Protection (WFP), part of the System File Checker,
which is intended to avoid some of the common DLL consistency issues. This feature may also block valid attempts to change system files and it can therefore be disabled using this tweak.

Open your registry (Start/Run/Regedit) and find the key below.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]

Value Name: SFCDisable
Data Type: REG_DWORD (DWORD Value)
Value Data: 0 = enabled (default), ffffff9d = disabled

Change the value of "SFCDisable" to equal "ffffff9d" to disable WFS or "0" to enable it. The other valid hexadecimal
values are:
# 1 - disabled, prompt at boot to re-enable
# 2 - disabled at next boot only, no prompt to re-enable
# 4 - enabled, with popups disabled
# ffffff9d - for completely disabled

Restart Windows for the change to take effect.

Additional Steps for  Windows XP
This setting is disabled in Windows XP, and needs to re-enabled using a hex editor and changing SFC.DLL (or SFC_OS.DLL for Windows XP) following these instructions:

   1. Make a backup the SFC_OS.DLL in the C:\WINDOWS\SYSTEM32 directory.
   2. Make an additional copy of SFC_OS.DLL called SFC_OS1.DLL and open it in a hex editor.
   3. At offset 0000E2B8 (0E2B8h) you should find the values "8B" and "C6". Do not continue if you are unable to
          find these values.
   4. Change the values "8B C6" to read "90 90" and save the changes.
   5. Run these commands to update the system files:

      copy c:\windows\system32\sfc_os1.dll c:\windows\system32\sfc_os.dll /y
      copy c:\windows\system32\sfc_os1.dll c:\windows\system32\dllcache\sfc_os.dll /y

   6. If you are prompted to insert the Windows CD, click Cancel.
   7. Restart Windows for the change to take effect.

Once these files have been updated apply the registry setting above.
Set, view, change, or remove special permissions for files and folders
To set, view, change, or remove special permissions for files and folders:
1.   Click Start, click My Computer, and then locate the file or folder where you want to set special permissions.
2.   Right-click the file or folder, click Properties, and then click the Security tab.
3.   Click Advanced, and then use one of the following steps:
•   To set special permissions for an additional group or user, click Add, and then in Name box, type the name of the user or group, and then click OK.
•   To view or change special permissions for an existing group or user, click the name of the group or user, and then click Edit.
•   To remove an existing group or user and the special permissions, click the name of the group or user, and then click Remove. If the Remove button is unavailable, click to clear the Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here check box, click Remove, and then skip steps 4 and 5.
4.   In the Permissions box, click to select or click to clear the appropriate Allow or Deny check box.
5.   In the Apply onto box, click the folders or subfolders where you want these permissions applied.
6.   To configure security so that the subfolders and files do not inherit these permissions, click to clear the Apply these permissions to objects and/or containers within this container only check box.
7.   Click OK two times, and then click OK in the Advanced Security Settings for FolderName box, where FolderName is the folder name.
CAUTION: You can click to select the Replace permission entries on all child objects with entries shown here that apply to child objects. Include these with entries explicitly defined here check box. Therefore,all subfolders and files have all their permission entries reset to the same permissions as the parent object.If you do this, after you click Apply or OK, you cannot undo this operation if you click to clear the check boxes.

Important: If you are not joined to a domain and you want to view the Security tab:
1.   Click Start, and then click Control Panel.
2.   Click Appearance and Themes, and then click Folder Options.
3.   Click the View tab, and then click to clear the Use simple file sharing [Recommended] check box in the Advanced settings box.
•   The Everyone group does not include the Anonymous Logon permission in Windows XP.
•   If you click to select the Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here check box, the file or folder inherits permission entries from the parent object.
•   You can set permissions only on drives that are formatted to use NTFS .
•   If the check boxes in the Permissions box are not available, the permissions are inherited from the parent folder.
•   To change permissions, you must be the owner or have permission to change permissions by the owner.
•   Groups or users who have Full Control permissions for a folder can delete the files and the subfolders in that folder, regardless of the permissions that protect the files and the subfolders.
File and folder special permissions
The following table describes file and folder special permissions.

Special Permissions   Full Control   Modify   Read & Execute   List Folder Contents   Read   Write
Traverse Folder/Execute File   yes   yes   yes   yes   no   no
List Folder/Read Data   yes   yes   yes   yes   yes   no
Read Attributes   yes   yes   yes   yes   yes   no
Read Extended Attributes   yes   yes   yes   yes   yes   no
Create Files/Write Data   yes   yes   no   no   no   yes
Create Folders/Append Data   yes   yes   no   no   no   yes
Write Attributes   yes   yes   no   no   no   yes
Write Extended Attributes   yes   yes   no   no   no   yes
Delete Subfolders and Files   yes   no   no   no   no   no
Delete   yes   yes   no   no   no   no
Read Permissions   yes   yes   yes   yes   yes   yes
Change Permissions   yes   no   no   no   no   no
Take Ownership   yes   no   no   no   no   no
Synchronize   yes   yes   yes   yes   yes   yes

IMPORTANT: Groups or users who are granted Full Control on a folder can delete any files in that folder regardless of the permissions that protect the file.

Note Although the List Folder Contents and the Read & Executefolder permissions appear to have the same special permissions, these permissions are inherited differently. List Folder Contents is inherited by folders but not files and it only appears when you view folder permissions. Read & Execute is inherited by both files and folders and is always present when you view file or folder permissions.

Note In Windows XP Professional, the Everyone group does not include the Anonymous Logon group.

Back to the top
Special permissions defined
You can set any or all the following special permissions on files and folders.

Traverse Folder/Execute File
For folders: The Traverse Folder permission applies only to folders. This permission allows or denies the user from moving through folders to reach other files or folders, even if the user has no permissions for the traversed folders. Traverse Folder takes effect only when the group or user is not granted the Bypass Traverse Checking user right. The Bypass Traverse Checking user right checks user rights in the Group Policy snap-in. By default, the Everyone group is given the Bypass Traverse Checking user right.

For files: The Execute File permission allows or denies access to program files that are running.

If you set the Traverse Folder permission on a folder, the Execute File permission is not automatically set on all files in that folder.

List Folder/Read Data
The List Folder permission allows or denies the user from viewing file names and subfolder names in the folder. The List Folder permission applies only to folders and affects only the contents of that folder. This permission is not affected if the folder that you are setting the permission on is listed in the folder list.

The Read Data permission applies only to files and allows or denies the user from viewing data in files.

Read Attributes
The Read Attributes permission allows or denies the user from viewing the attributes of a file or folder, such as read-only and hidden attributes. Attributes are defined by NTFS.

Read Extended Attributes
The Read Extended Attributes permission allows or denies the user from viewing the extended attributes of a file or folder. Extended attributes are defined by programs and they may vary by program.

Create Files/Write Data
The Create Files permission applies only to folders and allows or denies the user from creating files in the folder.

The Write Data permission applies only to files and allows or denies the user from making changes to the file and overwriting existing content by NTFS.

Create Folders/Append Data
The Create Folders permission applies only to folders and allows or denies the user from creating folders in the folder.

The Append Data permission applies only to files and allows or denies the user from making changes to the end of the file but not from changing, deleting, or overwriting existing data .

Write Attributes
The Write Attributes permission allows or denies the user from changing the attributes of a file or folder, such as read-only or hidden. Attributes are defined by NTFS.

The Write Attributes permission does not imply that you can create or delete files or folders,. It includes only the permission to make changes to the attributes of a file or folder. To allow or to deny create or delete operations, see Create Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and Delete.

Write Extended Attributes
The Write Extended Attributes permission allows or denies the user from changing the extended attributes of a file or folder. Extended attributes are defined by programs and may vary by program.

The Write Extended Attributes permission does not imply that the user can create or delete files or folders, it includes only the permission to make changes to the attributes of a file or folder. To allow or to deny create or delete operations, view the Create Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and Delete sections in this article.

Delete Subfolders and Files
The Delete Subfolders and Files permission applies only to folders and allows or denies the user from deleting subfolders and files, even if the Delete permission is not granted on the subfolder or file.

The Delete permission allows or denies the user from deleting the file or folder. If you do not have a Delete permission on a file or folder, you can delete the file or folder if you are granted Delete Subfolders and Files permissions on the parent folder.

Read Permissions
The Read Permissions permission allows or denies the user from reading permissions about the file or folder, such as Full Control, Read, and Write.

Change Permissions
The Change Permissions permission allows or denies the user from changing permissions on the file or folder, such as Full Control, Read, and Write.

Take Ownership
The Take Ownership permission allows or denies the user from taking ownership of the file or folder. The owner of a file or folder can change permissions on it, regardless of any existing permissions that protect the file or folder.

The Synchronize permission allows or denies different threads to wait on the handle for the file or folder and synchronize with another thread that may signal it. This permission applies only to multiple-threaded, multiple-process programs.
If the Security tab is not available and you cannot configure special permissions for users and groups, you may be experiencing the following issues :
•   The file or folder where you want to apply special permissions is not on an NTFS drive. You can set permissions only on drives that are formatted to use NTFS.
•   Simple file sharing is turned on. By default, simplified sharing is turned on.
In Microsoft Windows XP, special access permissions are customizable sets of permissions. This means that you can apply special access permissions to files or folders that are located on NTFS file system volumes. This article describes how to set, view, change, or remove special permissions for files and folders.

1 Permissions for files and folders
2 Troubleshooting
3 File and folder special permissions
4 Set, view, change, or remove special permissions for files and folders

* Permissions for files and folders
Folder permissions include Full Control, Modify, Read & Execute, List Folder Contents, Read, and Write. Each of these permissions consists of a logical group of special permissions that are listed and defined in the following sections.

Note This article assumes that you are using Windows XP on a domain. By default, simplified sharing is enabled in Windows XP if you are not connected to a domain. This means that the Security tab and advanced options for permissions are not available.

If you are not joined to a domain and want to view the Security tab, view the Set, view, change, or remove special permissions for files and folders section in this article.

For additional information about how to disable simplified file sharing, click the following article number to view the article in the Microsoft Knowledge Base:
307874 ( How to disable simplified sharing and set permissions on a shared folder in Windows XP

You may receive an error message if a file is missing, for example: Cannot find a device file that may be needed to run Windows or a Windows application. The Windows registry or SYSTEM.INI file refers to this device file, but the device
file no longer exists. Note that the file name may or may not be included in the error message.

How to Determine the Source to a File

*How to Troubleshoot File Error Messages

To determine the source of a file error message, first attempt to identify the name of the file or files from the error message, and then use one of the following methods.

-View the Properties for the File

To view the properties of a specific file: Right-click the file, and then click Properties. Click the Version tab.

In the Other Version Information box, the source company may be listed as well as the program or product with which the file is included. If the source company is a company other then Microsoft, use the links at the end of this article to obtain support from the manufacturer.

-Query the Microsoft Knowledge Base for the File Name

To query the Microsoft Knowledge Base, click the following link: (

Search for the terms "directory listing" for your product. When you do this, you receive a list of directory listing articles for the Microsoft products that install that file. If this method does not provide the information that you want, search again by using only the file name.

This method may also help you identify a file that is included with a third-party program as well as any known or reported issues.

-Error Message Because the File Is Missing or Damaged

If a missing or damaged file is causing an error message, use clean boot troubleshooting to determine from where the file is loaded.

For additional information about clean boot troubleshooting, click the article numbers below to view the articles in the Microsoft Knowledge Base:
How to Perform a Clean Boot in Windows Millennium Edition How to Perform Clean-Boot Troubleshooting for Windows 98 How to Troubleshoot Using the Msconfig Utility in Windows Me How to Troubleshoot Using the Msconfig Utility with Windows 98 How to Perform a Clean Boot in Windows 95

For additional information abt how to troubleshoot the error message,click the article number below to view the article in the Microsoft Knowledge Base: Err Msg: Cannot Find a Device File That May Be Needed...
Every File Extension in the World

This is a list of file extension names or suffixes that indicate the format or usage of a file and a brief description of that file extension. In general, if you have the program that uses that file extension, that program can be used to open or otherwise use the file.

A   Library file (Unix)
A   Object code library
A3L   Authorware 3.x library
A3M   Authorware MacIntosh file (unpackaged)
A3W   Authorware Windows file (unpackaged)
A4L   Authorware 4.x library
A4M   Authorware MacIntosh file (unpackaged)
A4P   Authorware file (packaged without runtime)
A5L   Authorware 5.x library
A5W   Authorware Windows file (unpackaged)
AA   Audible audio file (commonly used for downloadable audio books)
AAM   Authorware shocked file
AAS   Authorware shocked packet
AB   Applix Builder file
ABF   Adobe Binary Screen Font
ABK   Corel Draw AutoBackup
ABK   Backup file (PrintMaster Gold)
ABM   Audio album file (HitPlayer)
ABO   Applix Builder Turbo file
ABS   Standard GNU compiler output file for a PC platform
ABS   Sometimes used to denote an abstract (as in an abstract or summary of a scientific paper) AutoBackup
ABS   MPEG Audio Sound file
AC$   AutoCAD Undo Info file
ACA   HTTP animation file (Microsoft Agent)
ACA   Project Manager Workbench file
ACB   ACBM Graphic image
ACC   DR-DOS Viewmax file
ACD   Character definiton file (Microsoft Agent)
ACE   ACE Archiver Compression file
ACF   HTTP character file (Microsoft Agent)
ACI   ACI development appraisal (ACIWEB)
ACL   Corel Draw 6 keyboard accelerator file
ACM   Interplay compressed sound file (Fallout 1,2, Baulder's Gate)
ACM   Dynamic Link Library (DLL)
ACM   Windows system directory file
ACP   Microsoft Office Assistant Preview file
ACR   American College of Radiology file
ACS   Character structered storage file (Microsoft Agent)
ACT   FoxPro Foxdoc Action Diagram
ACT   Action Presentation
ACT   Documenting wizard action diagram (Microsoft Visual FoxPro)
ACT   Microsoft Office Assistant Actor file
ACV   Used to Compress and decompress audio data
AD   After Dark screensaver
Ada   Ada source text file (non-GNAT)
ADB   HP 100LX Organizer Appointment database
ADB   Ada source text body file (GNAT)
ADC   Scanstudio 16 color Bitmap Graphic file
ADD   OS/2 adapter driver file used in the boot process
ADF   Amiga disk file
ADI   AutoCAD device-independent binary plotter file
ADL   QEMM Mca adaptor description library
ADM   Windows NT policy template
ADM   After Dark MultiModule screensaver (Microsoft)
ADN   Lotus 1-2-3 Add-In file
ADP   FaxWorks Faxmodem setup file
ADP   Astound Dynamite file
ADP   Dynamic Page file (AOLserver)
ADR   Smart Address address book
ADR   After Dark Randomizer screensaver
ADS   Ada source text specification file (GNAT)
ADT   AdTech Fax file
ADT   HP NewWave datafile for card applications
ADX   Lotus Approach dBase Index
ADX   Archetype Designer Document
ADX   Dynazip Active Delivery script
ADZ   Packed ADF file (Extracts with WinZip)
AE   Author/Editor file (SoftQuad)
AEP   ArcExplorer project file
AF2   ABC FlowCharter 2.0 Flowchart
AF3   ABC Flowchart
AFC   Apple Sound file
AFI   Truevision Bitmap graphic
AFM   HP NewWave Cardfile application
AFM   Adobe metrics
AG   Applix graphic
AI   Corel Trace drawing
AI   Adobe Illustrator drawing
AIF   Audio Interchange File, a sound format used by Silicon Graphics and Macintosh applications
AIFC   Similar to AIF (compressed)
AIFF   Similar to AIF
AIM   AOL Instant Messenger Launch file
AIN   AIN Compressed archive
AIO   APL transfer file
AIS   Velvet Studio Instruments file
AIS   Xerox Arry of Intensity Samples Graphic
AIS   ACDSee Image Sequence
AIX   HP NewWave Cardfile Application data
AKB   HaleyAuthority Authority Knowledge Base File
AKW   Contains all A-keywords in the RoboHELP Help Project Index Designer not associated with topics
ALAW   European Telephony audio
ALB   JASC Image Commander album
ALI   Document file (SAP proprietary format)
ALIAS   Alias Image
ALL   WordPerfect for Windows General printer information file
ALL   Arts & Letters Library
ALS   Alias Image
ALT   WordPerfect Library Menu
AM   Applix SHELF Macro
AMF   DSMIA/Asylum module music (Crusader,No Remorse,Aladdin)
AMF   Music file (Advanced Module Format)
AMG   ACTOR System image
AMG   AMGC Compressed Archive File
AMI   Annotation file (Cocreate SolidDesigner)
AMS   Extreme's Tracker Module
AMS   Velvet Studio music module (MOD) File
AMU   Sony Photo Album
AN   Text file (Sterling Software) (Groundworks COOL Business Team Model)
ANC   Canon Computer Pattern Maker file that is a selectable list of pattern colors
ANI   Microsoft Windows Animated cursor
ANM   DeluxPaint Animation
ANN   Windows 3.x Help annotation
ANS   ANSI Text file
ANT   SimAnt for Windows saved game
AOM   Adobe Download Manager Online Manager Shortcut
AOM   Adobe After Effects Output Settings
AOS   Nokia 9000 Add-on software
AOT   Applicatio binary object template file (ZenWorks snAPPshot)
AP   WHAP Compressed Amiga archive
AP   Applix Presents file
APC   Lotus 1-2-3 Printer driver
APC   Compiled application file (Centura Team Developer)
APD   Lotus 1-2-3 Printer driver
APD   Dynamic application library file (Centura Team Developer)
APE   Winamp Plugins AVS File
APE   Monkey's Audio Lossless Audio Compression Format
APF   Project file (Allaire) (Created by Homesite)
APF   Lotus 1-2-3 Printer driver
API   Lotus 1-2-3 Printer driver
API   Application Program Interface; used by Adobe Acrobat
APL   APL Workspace file
APL   Application library file (Centura Team Developer)
APP   Symphony Add-in Application
APP   Generated application or active document (Microsoft Visual FoxPro)
APP   dBase Application Generator Object
APP   DR-DOS Executable Application
APP   FoxPro Generated Application
APP   Normal mode application file (Centura Team Developer)
APR   Employee Appraiser Performance Review file
APR   Lotus Approach 97 View file
APR   ArcView project file
APS   Advanced patching systems with error checking, (Similar to IPS)
APS   Microsoft Visual C++ file
APT   Text mode application file (Centura Team Developer)
APT   Lotus Approach Data view file
APX   Borland C++ Appexpert database
APX   Lotus Approach Paradox-Specific information file
AQ   Applix data
ARC   SQUASH Compressed archive
ARC   LH ARC (old version) compressed archive
ARF   Automatic Response file
ARI   Aristotle audio file
ARI   ARI Compressed archive
ARJ   Robert Jung ARJ compressed archive (ARJ)
ARK   ARC File Archiver CPM/Port archive
ARL   AOL v4.0 organizer file
ARR   Atari Cubase Arrangement
ART   Canon Crayola art
ART   Clip Art
ART   Ray Tracer file
ART   First Publisher Raster graphic
ART   AOL Image file compressed using the Johson-Grace compression algorithm
ART   Xara Studio drawing
ARX   AutoCAD Runtime Extension
ARX   ARX Compressed Archive
AS   Applix Spreadsheet
ASA   Microsoft Visual InterDev file
ASC   PGP armored encrypted file
ASC   ASCII text file
ASD   Lotus 1-2-3 Screen driver
ASD   Microsoft Advanced Streaming Format (ASF) description file; opens with NSREX
ASD   Astound Presentation
ASD   WinWord AutoSave file
ASE   Velvet Studio Sample file
ASF   Microsoft Advanced Streaming Format
ASF   StratGraphics Datafile
ASF   Lotus 1-2-3 Screen font
ASF   Music file (Electronic Arts)
ASH   TASM 3.0 Assembly language header
ASI   Borland C++/Turbo C Assembler Include file
ASM   Pro/E assembly file
ASM   Assembler Language source file
ASO   Astound Dynamite Object
ASP   Procomm Plus setup and connection script
ASP   Astound Presentation
ASP   Active Server Page (an HTML file containing a Microsoft server-processed script)
AST   Claris Works "assistant" file
AST   Astound multimedia file
ASV   DataCAD Autosave file
ASX   Microsoft Advanced Streaming Redirector file
ASX   Video file
ASX   Cheyenne Backup script
AT2   Aldus Persuasion 2.0 Auto Template
ATM   Adobe Type Manager data/info file
ATT   AT&T Group 4 bitmap
ATW   AnyTime Deluxe for Windows personal information manager file from Individual Software MultiModule screensaver
AU   Audio U-law (pronounced mu-law)
AU   Sun/NeXT/DEC/UNIX sound file
AUD   Audio file (Westwood Studios) (Kyrandia 3,C&C,RedAlert,C&C:TS)
AUP   Audacity project file
AUX   ChiWriter Auxilliary Dictionary file
AUX   TeX/LaTeX Auxilliary Reference file
AVA   Avagio Publication
AVB   Inculan Anti-Virus virus infected file
AVG   AVG Virus Information Database
AVI   Microsoft Audio Video Interleaved file for Windows movie
AVR   Audio Visual Research file
AVS   Stardent AVS-X Image
AVS   Application Visualization System file
AVX   File Extension (ArcView)
AW   Applix Words file
AW   HP AdvanceWrite Text file
AWD   FaxView Document image
AWE   Acrobat Bookmark XML File
AWK   AWK Script/Program
AWM   Animation Works Movie
AWR   Telsis file for digitally stored audio
AWS   StatGraphics Data file
AXL   ArcIMS XML project file
AXT   ASCII application object template (ZenWorks snAPPshot)
AXX   ARJ compressed file from a multi-volume archive (xx = a number from 01 to 99)
Windows / Linux / Favorite Icons are Missing
Oct 24, 2008, 12:01 PM
Favorite Icons are Missing

Custom icons are lost when you clean your cache. These are known as favicons.ico (Favorite Icons) and they
normally will only last until your Internet Explorer Temp files are cleared.

This program will allow you to save the favicons.ico (Favorite Icons) permanently in a different folder and re-associate
your favorites with the stored icons.

FavOrg - Restore and Save Favorite Icons (Line 108)

FavesToGo - Save Favorites Quickly (Line 108)


Create a folder called Icon Selection. Move all of the renamed favicons to this folder placed in the root directory of
C. Right click on the Icon, select Browse and navigate to your Icon Selection folder. Choose the renamed favicon and
click ok. These icons will be permanent.

When you right click on an icon, select browse and navigate to the Icon Selection folder. Choose the renamed favicon
you want and click ok. Your customized icons will be permanent.
Windows / Linux / Favorites Folder
Oct 24, 2008, 11:58 AM

Favorites Folder Location and Saving Tips

Tip:  Locate Dead Links in Favorites
Go to Windows Explorer\C:\Documents and Settings\<username>\Favorites.  Change the view to thumbnails.  If one is
listed 404, delete it.

Favorites - Prioritize

Elevate its priority on the Start menu by putting it at the top of the list. This ensures the program will remain on the Start
menu and cannot be bumped by other programs, even if you use the others more frequently.

Right-click the link to your favorite program on the Start menu and select Pin to Start Menu. Your program will be moved permanently to the top part of the list, just below your browser and e-mail programs.

Start Menu and Favorites Menu Not Listed in Alphabetical Order

     Tip:  Follow by example

Type in the URL. Add your User ID followed by a colon and then your password followed by an at sign (@) in front of
your the URL and after the http://   Example:

     Tip:  Custom icons are lost when you clean your cache. These are known as favicons.ico (Favorite Icons) and they
normally will only last until your Internet Explorer Temp files are cleared.
Bootvis is a Boot performance trace visualization tool for use with Windows XP systems. It gives a graphical view of what processes are doing what and when during boot and allow you to optimise your boot up. A very handy tool.

Download Bootvis:

This is a self extracting ZIP file. Double click the file you just downloaded and unzip it to the folder of your choice. Locate Bootvis.exe click on it. You will now see the GUI of bootvis.

Now go to File/New and choose "Next boot trace" or "Next boot and drivers chase". Leave everything else as is and get ready for a reboot in 15 seconds.

Then click on the Bootvis.exe, it will now output the results, once it has finished generating the report, you will see graphs 5
or 6 graphs. They look a bit confusing at this stage.

From the main menu .. Click on Trace >> optimize system, then reboot.

You will see a message box "Please wait for bootvis to load" ... about 20 seconds later another message box will appear "Optimizing system for boot performance" basically bootvis is rearranging the boot files for a faster startup
Windows / Linux / Email symbols
Oct 24, 2008, 11:24 AM
Symbol -  Meaning

:-) I'm smiling.
:-( I'm frowning.
:-< I'm real sad.
:-c I'm bummed out.
:-C I'm really bummed out!
:-I I'm grim.
:-/ I'm skeptical.
:-7 I'm smirking at my own wry comment.
:-> I have a devilish grin.
:-D I'm laughing.
:-o I'm shouting.
:-O I'm shouting really loud.
:-@ I'm screaming.
:-8 I talk from both sides of my mouth.
:-p I'm sticking my tongue out at you.
:-P I'm being tongue-in-cheek.
:-& I'm tongue-tied.
:-9 I'm licking my lips.
:-* My lips pucker for a kiss or pickle.
:-x My lips are sealed.
:-# I wear braces.
:-$ My mouth is wired shut.
:-? I smoke a pipe.
:-} I have a beard.
:-B I have buck teeth.
:-[ I'm a vampire.
:-{} I wear lipstick.
:-{) I have a mustache.
:-~) My nose runs.
:-)~ I'm drooling.
:-)-8 I have big breasts.
:*) I'm drunk.
:^) My nose is broken.
:~I I'm smoking.
:/i No smoking!
:~j I'm smoking and smiling.
:'-( I'm crying.
:'-) I'm so happy, I'm crying.
:) I'm a midget.
;-) I'm winking.
.-) I have just one eye,
,-) but I'm winking it.
?-) I have a black eye.
%-) Dizzy from staring at screen too long!
8-) I wear glasses.
B-) I wear cool shades, man.
g-) I wear pince-nez glasses.
P-) I'm a pirate.
O-) I'm a scuba diver.
|-O I'm yawning.
|^O I'm snoring.
X-( I just died.
8:-) My glasses are on my forehead.
B:-) My sunglasses are on my forehead.
O:-) I'm an angel.
+:-) I'm a priest.
[:-) I'm wearing a Walkman.
&:-) I have curly hair.
@:-) I have wavy hair.
8:-) I have a bow in my hair.
{:-) I wear a toupee,
}:-) but the wind is blowing it off.
-:-) I'm a punk rocker.
-:-( but real punk rockers don't smile.
[:] I'm a robot.
3:] I'm your pet,
3:[ but I growl.
}:-> I'm being devilish,
>;-> and lewdly winking.
=:-) I'm a hosehead.
E-:-) I'm a ham radio operator.
C=:-) I'm a chef.
=|:-)= I'm Uncle Sam.
<):-) I'm a fireman.
*<:-) I'm Santa Claus.
*:o) I'm Bozo the clown.
<:I I'm a dunce.
(-: I'm a lefty.
THIRUVANANTHAPURAM: The admissions to all professional degree courses in the State will close on October 31. The last phase allotment for professional courses, other than MBBS and BDS, was published on Wednesday.

The admissions to the MBBS and BDS seats were closed on September 30, the deadline fixed by the Medical Council of India (MCI). Allottees to all courses should remit fee/balance fee/deposit at selected branches of the SBT.

The colleges should download the list of allottees and to whom TCs are to be issued at 9.30 a.m. on October 23. Candidates should report for admission to the allotted colleges from October 28 to 30.

Non-joining report should be received from colleges on October 30.

Meanwhile, the CEE will conduct a special entrance examination to fill the vacant seats for SC/ST students at Nadakkavu Government Higher Secondary School for Girls from 10 a.m. to 12.30 p.m.

on October 29. Of the 32 seats reserved for scheduled tribes, 30 remained vacant following shortage of students with 50 percent marks for all subjects in the entrance examinations, the minimum qualification fixed by the MCI. The MCI had denied permission to admit these students saying that any relaxation in the minimum requirements for MBBS admission would affect the quality of medical education.

It was following the positive intervention by the Supreme Court that there was a consensus between the State Government and the MCI for conducting a separate entrance test even after the deadline for admissions to medical colleges ended.
HTC breaks our open-source hearts, G1 to be here in 2009

So here's the setup: an HTC event post the G1 launch. We were hoping, like any hot-blooded geek would, that HTC might at least dangle its Android phone for the Indian junta. Instead, they introduced the CDMA version of HTC Touch Diamond. Oh well...

Disappointed, we did the next best thing: We asked Ajay Sharma, country head, HTC (India) when we can expect the G1 in India. Intent to further break our heart, his retort was, "don't expect the G1 in the Indian market anytime soon. Earlier I said we could bring it to India by December or January, but it's going to take longer."

We weren't going to let him get away that easy, so we pressed him for details to which he said, "you would definitely see the G1 making its entry in India in 2009; some time around second half of 2009 ."

After vacating his erstwhile full-time position as Microsoft's chief software architect, Bill Gates who had referred to his retirement as a mere "re-ordering of his priorities", seems to have found one of his priorities. Apart from monitoring the day-to-day activities of his philanthropic Bill and Melinda Gates Foundation, he will now also head a new company, which goes by the name BGC3. According to initial reports, BGC3 will be a "think tank" company with a focus on technological and societal issues along with Gates' intellectual musings -- all of which may end up being used by Microsoft or by his foundation.

The BGC3, which according to some stands for the Bill Gates Catalyst -- with the "3" denoting the number of companies Bill has founded to date. Then there are some others who think it stands for Bill Gates Company Three: If you happen to be unaware, apart from Microsoft, Bill has also found Corbis -- the photo licensing agency and now, the third: BGC3.

The BGC3 is headquartered at Kirkland and does not seem to have huge plans like the software Goliath Microsoft -- it intends to remain in the sidelines of its larger, more illustrious sibling. On a side note, being Bill Gates does help. Reportedly, the offices of BGC3 are fully-stocked with Microsoft goodies complete with a Surface tabletop computer running a virtual guest book application... the logo looks cool too!
Samsung has announced yet another handset - the I7110 - that is based on S60 and Symbian OS. The handset, showcased for the first time at the Symbian Smartphone Show in London is a slim and sleek bar type smartphone that's only 12.9mm thick.

Geesung Choi, President of Samsung's Telecommunications Network Business, said, "The introduction of I7110, Samsung's new Symbian OS-based smartphone, is a testament of our strategic focus on the open OS phone portfolio. With a strong partnership with Symbian and the increased momentum in the smartphone market, Samsung will continue to offer a wide selection of mobile phones meeting the needs and lifestyles of today's consumers."

Based on Symbian OS v9.3, S60 3rd Edition, Feature Pack 2, the I7110 is equipped with a 2.6-inch AMOLED (Active Matrix Organic Light Emitting Diode) screen, boasts GPS with geo-tagging and navigation capabilities in pedestrian and driving modes and comes with a 5MP auto-focus camera with an LED flash that has 'smile shot' and 'blink shot' functions. The I7110 offers advanced video recording and play features as it supports multi-codec formats including DivX.

The I7110 comes equipped with HSDPA and Wi-Fi and also offers an 8-way optical mouse for navigation. It is A2DP compatible and supports external memory via microSD cards (up to 16GB). According to Samsung, the I7110 will provide users with upto 11 hours of talktime.

The Samsung I7110 will be available in Russia from November 2008 and will soon be introduced in other markets. The price hasn't been revealed yet.
London - The British team that already holds the world land speed record said Thursday it plans to build a 1,000-miles-an-hour (1,600 kilometres) car in the next three years.

The Bloodhound SSC (supersonic car) will be 13 metres long, six metres wide and be powered by a jet engine normally used on the Eurofighter, plus a rocket, said project leader Richard Noble.

"We have to defend our record," said Noble, whose team in 1997 produced the current record-holder which reached a speed of 1,228 kilometres (785 miles) an hour, breaking the sound barrier.

Noble said the new car would be faster than a bullet, covering the distance of four football fields in a second.

It would be driven by military pilot Andy Green, who drove the earlier record-breaking car in the Nevada deser
Tata Indicom has launched the first CDMA AM/FM enabled mobile phone – the Tata Indicom Radio Phone.

This new handset comes with a radio-inspired design with volume boosters for clarity of sound.

"In a bid to rationalize the divide between urban and rural consumers, Tata Indicom has pioneered the introduction of a CDMA AM/FM phone to enable the mobile music experience for consumers across markets. The introduction of AM/FM enabled radio phones will fulfill the growing need for music and information on the move", said Mr. Milesh Ruparel, President, Corporate Affairs, Tata Teleservices (Maharashtra) Limited.

The Tata Indicom Radio Phone has a recorder and separate one touch keys for both the AM/FM functions. The phone also comes equipped with a 1.8-inch TFT screen for better visibility and has Hindi SMS facility. The phone is available in different color options for Rs. 2199 at all leading Tata Indicom outlets.
Tata Indicom customers can select their own tariff plan.
Melbourne, Oct 23: A daily tipple can keep you happy, according to a new study.

Australian Unity Wellbeing Index has confirmed that those who drink one or two glasses of alcohol every day are the happiest people.

It found that happiness levels declined for older drinkers who had more than three drinks in a session, but not for those aged 18 to 26.

It also showed that those who exercise up to three times a week also were relatively happy but those who never drank were among the most miserable, recording "below normal wellbeing".
London, Oct 23: Russian archeologists have claimed that the Russians were the first people on the planet to cultivate land, breed cattle and make earthenware.

Russian tribes inhabited Khabarovsk Region in the Stone Age, the archeologists said after finding a 15,000-year-old hunters' settlement on the bank of the Amur River in Khabarovsk.

According to a report in Press TV, stone axes, knives, scrapers, arrowheads and baked earthenware have so far been unearthed in the area.

"It was the first earthenware on the globe, and though it was primitive, with plain decoration, and poorly baked, yet it was a significant landmark in the history of mankind," said Andrei Malyavin, an employee of Khabarovsk Archeology Museum.
The US military has launched a competition to find a design for a flying submarine, a week before the release of the latest James Bond film.

Bond drove a submersible Lotus Esprit in "The Spy Who Loved Me" and villain Scaramanga drove a flying AMC Matador coupé in "The Man With The Golden Gun" but the US group is looking for a vehicle that can do both, The Telegraph reported.

The Defense Advanced Research Projects Agency (DARPA), based in Arlington, Virginia, wants a flying submarine to help small teams of Special Forces to approach coastlines undetected.

The agency said that it wants the craft in order to "maintain its tactical advantage for future coastal insertion missions".

DARPA, which was set up in 1958 as a response to the surprise launch of the Soviet satellite Sputnik and is credited with the invention of the Internet, intends to spend billions developing the most promising design.

"DARPA has a budget of 3billion dollar," said spokeswoman Jan Walker.

"We issue these requests for submissions on a regular basis and we welcome ideas from anybody. We have regular large and small firms who we work with but we are open to submissions from anywhere," Walker added.

The competition specifies that the flying sub must be able to transport eight men and their equipment 1,150 miles (1,850km) by air, 115m (185km) by sea or 14m (22km) underwater - or a combination of the three - in less than eight hours, and then wait for up to three days to pick them up again.

Walker admitted that previous research in this field had included failed designs to make a submarine fly: "Prior attempts to demonstrate a vehicle with the manoeuvrability of both a submersible and an aircraft have primarily explored approaches that would endow slight capability to platforms that were largely optimised for underwater operations."

She added: "These attempts have been unsuccessful." The deadline for submitting entries is December 1
JAIPUR, India: A huge explosion Thursday at an illegal fireworks factory killed 18 people in western India, including 10 children, the police said.

The blast, which occurred before dawn, blew apart the workshop set up in a home in a slum in the town of Deeg, said police chief Rohit Mahajan. Seventeen people were wounded.

Mahajan said the force of the blast also brought down two neighboring homes, leading to the high death toll.

Deeg is some 120 miles northwest of Jaipur, the capital of India's Rajasthan state.

Thousands of illicit firework factories spring up every year in India ahead of Diwali, the Hindu festival of lights, when revelers fire them off in celebration. Diwali begins on Oct. 28.
A recent survey held in America brought to light that most of the American women office workers prefer computer to their husbands or boyfriends in as much as they spend nearly triple the amount of time with their computer (9.3 hours) compared to 3.6 hours with their life partner.

The online poll was conducted by Harris Interactive. Nearly 2600 women participated in the poll and a meager five per cent said that they wished they could spend more time with their life partners than with computer. The online poll indicates that nearly two-thirds of women spent more time with their computer than they did shopping or outdoors. And nearly eighty per cent of adult women spent more time with their PC than exercising, and forty per cent were with it more than with their family.

The results are explained in part by the fact that adult Americans spend an average of 8.2 hours in the office, compared to 7.6 hours asleep, the second most popular pastime.
Heavy rains over the past two days have disrupted normal life in Chennai. The rains have been occurring due to a low pressure in the Bay of Bengal.

Chennai, Oct 23 : Heavy rains over the past two days have disrupted normal life in Chennai. The rains have been occurring due to a low pressure in the Bay of Bengal.

Caused by a low pressure over the Bay of Bengal, rains have lashed parts of coastal India including Andhra Pradesh, Kerala and Lakshwadeep apart from Tamil Nadu.

"It's raining heavily and so we could not go to college. There is no electricity. If the rain stops, we will be able to get on with our routine life," said Karthick, a resident.

The state's meteorological department said the condition would remain the same for some more time.

"As far as the forecast of the next 24 hours is concerned, it is likely to rain most places of Tamil Nadu and Pondicherry. One and two places will experience heavy rainfall. As far as Chennai city is concerned, it will be intermittent spells, heavy at times," said Ramanan, director metrological department.
Ramallah - For three years Gina Khnouf, 18, played football at her school in Ramallah.

Today, a freshman at nearby Birzeit University, she is an important player in the newly-formed women's futsal (indoor football) team at the First Ramallah Sarriya Club.

Playing football, she says, "is a challenge because in our Arab society everyone thinks football is only for men."

She decided to break this taboo and prove that women can even be better players than men.

Sitting on the bench watching one of her teammates score during a practice match against Ramallah's leading men's futsal side, she tells Deutsche Presse-Agentur dpa that her family not only supports her decision to play, but even encourages it.

"They did not listen to what their friends and other people have said, that football is a men-only game and that it is not fit for women," she says.

Like her other 11 team mates, Khnouf is now preparing for the first-ever Palestinian women's futsal league games. The matches will kick off Sunday in the presence of the president of the world controlling body FIFA Joseph Blatter, who will arrive the same day in the Palestinian areas to inaugurate two new football fields and kick- start a couple of football matches.

"I am very excited about these games," Khnouf says. "These are our first league championship games and this means that from now on we are going to be recognized and respected football players."

A futsal game lasts only 15 minutes each half, with only five players per team on the pitch, although up to 12 players per team can be used in a match.

The closed-in field is less than half the size of a regular football field and it has rules that are relatively different to football, even though the play is identical and organized under FIFA regulations.

FIFA has decided that all member states should also have league games for women. Palestine has been a FIFA member since 1998 and women choose to play futsal, instead of regular football, mainly because the Palestinian areas did not have proper football fields until this year.

Simon Salameh, the Sarriya women's futsal team director whose daughter also plays on the team, says his group started from zero only a few years ago, and now does well in area league games. In their latest regional games in Jordan, the Palestinian team finished in fourth place.

He hopes that as the first Palestinian league games start and become an annual event, with FIFA recognition, a Palestinian women's national futsal team will soon start competing in FIFA games around the globe and his Sarriya group, who now practice three days a week in preparation for the league games, will be an important factor in the national squad.

The first Palestinian women's futsal team started at Bethlehem University, quickly followed by two other women's teams also in the Bethlehem area. They played friendly games against each other and in Arab countries.

They were then followed by two more teams in Ramallah and Jericho, before women athletes in Arab East Jerusalem decided this year to put together a women's team in a hurry.

With six teams in the Palestinian areas, the Palestinian Football Association was able to organize the first women's league games which will kick off on Sunday.

On the same day Blatter will inaugurate two new football fields built with FIFA financial support, supervision and standards. One is located in al-Bireh, Ramallah's attached city, and the other is found south of the city, just outside the Israeli-designated Jerusalem city limits in an area that is supposed to be part of the future Palestinian state.

The inauguration of the Jerusalem-area field, named after the late Jerusalem civic leader Faisal Husseini, will also witness a friendly match between the Palestinian and Jordanian national teams.

Blatter is expected to kick-start that game, which is the first official international game played in the Palestinian territories.

Since the football match is going to be held just outside Jerusalem city limits in an area that is still under Israeli military jurisdiction and not too far from an Israeli military outpost, the Palestinian Authority had to coordinate security arrangements for the presence of President Mahmoud Abbas and FIFA officials with the Israeli government.

But Palestinian national squad members from the Gaza Strip did not receive permission to come to the West Bank leaving the team without several of their leading players.

Yet, and in spite of the political complications on the ground, the football games, whether for men or women, will go on and Palestine hopes to prove itself as a nation deserving to live through these matches.
Aircel, India's fastest growing telecom service provider, announced that it has cut down ISD call rates for its pre-paid subscribers in Chennai and rest of Tamil Nadu circle.

According to the sources, the proposed scheme is meant for calls specifically made to Malaysia and Singapore.

Through this scheme, Aircel pre-paid subscriber can make ISD calls to Malaysia and Singapore at Rs 3 per minute by a recharge coupon worth Rs. 96.

While on the other hand, with a recharge coupon of Rs. 29, pre-paid customers can make calls to the same destinations at Rs. 3.5 per minute.

This scheme comes in view of the high number of Tamilians in Malaysia and Singapore.

According to the company officials, by using these recharge coupons, subscribers will be able to save 53% and 45% respectively.

This is in line with Aircel's attempt to make worldwide calling more affordable and thus deliver greater value to its growing subscriber base.

Aircel, a partnership between Maxis Communications Berhad of Malaysia and Apollo Hospital Enterprise of India, has proposals to become a full-fledged national operator by fiscal 2009. It is also the market leader in Tamil Nadu, Assam, North-East and Chennai.

At present,  Aircel is having deep rooted presence in 10 Telecom Circles (Kolkata, Assam, Bihar, Chennai, Himachal Pradesh, Jammu & Kashmir, North East, Orissa, Tamil Nadu and West Bengal).
Brings along GPS capabilities and cricket-related goodies

Motorola has launched the MotoMing A1200's successor, in the form of a GPS-enabled touchscreen phone -- the A1600. A1600 owners can freely access maps and landmarks of 30 major Indian cities, national and state highways. The phone also offers voice-guided, turn-by-turn navigation. These maps come loaded on a bundled 1GB microSD memory card.

Lloyd Mathias, senior director, India & South West Asia, Motorola Mobile Devices claimed, "Our GPS navigation service is free with no activation charges, independent of mobile networks can be used even without inserting the SIM card." The Motoming A1600 supports quadband GSM/GPRS/EDGE networks and Bluetooth for data transfer. Sporting a 2.4-inch touchscreen display, the A1600 features a 3.2-megapixel camera with 8X digital zoom, auto focus and LED Flash. Surprisingly, the phone doesn't offer FM Radio.

The A1600 has up to 27MB internal memory and a microSD slot that supports cards up to 4GB capacity.

To lure cricket-crazy Indians, the A1600 comes with pre-loaded videos that offer batting tips, three cricket games and access to download more Cricket related goodies. The Motoming A1600 is priced at Rs 14,599 (MRP: Rs. 15,847) and will be available at MOTOSTORE, MOTOSTORE Lite and other retail outlets.

Washington, Oct 23: Leaders of the world's richest nations and biggest emerging economies will gather in Washington on November 15 for an unprecedented summit on tackling the global financial crisis, the White House said.

US President George W Bush will host the summit 11 days after the US presidential election, but it is unclear whether the man Americans pick to succeed Bush -- Democrat Barack Obama or Republican John McCain -- will attend as well.

"The President today is going to invite the leaders of a group of 20 countries ... to a summit in Washington, DC to discuss the financial markets and the global economy," White House spokeswoman Dana Perino told reporters.

"The leaders will review progress being made to address the current financial crisis, advance a common understanding of its causes and, in order to avoid a repetition, agree on a common set of principles for reform of the regulatory and institutional regimes for the world's financial sectors."

Such summits are usually planned a year in advance, but Perino said the financial crisis -- marked by plunging stock prices, collapsing banks and frozen credit -- calls for quick action.

"The time will be just about right to have it then, because a lot of the emergency measures that these countries have put forward are, hopefully, starting to have an impact," she said.

Created in 1999, the Group of 20 accounts for 90 per cent of the world economy and about two-thirds of the world's population.

It comprises the seven major industrialized nations -- Britain, Canada, France, Italy, Japan, Germany and the United States -- and Argentina, Australia, Brazil, China, India, Indonesia, Mexico, Russia, Saudi Arabia, South Africa, South Korea and Turkey.

It also takes in the 27-nation European Union, represented by France, which holds the rotating EU presidency. The International Monetary Fund and World Bank also participate in its meetings.

Principles hammered out at the summit "can be further developed by working groups for consideration in subsequent summits," Perino said, with another summit possible before the next US president is inaugurated on January 20.

"I believe that they will task financial experts in those countries to put meat on the bones when it comes to fleshing out the principles that we would be talking about," she said.

UN chief Ban Ki-moon will join the summit, his press office said.

But the news of the global summit failed to halt a sell-off as panic-selling returned to global stock markets.

The leading Dow Jones industrial index shed 5.6 percent, as fears of global recession stalked investors.

While in falls reminiscent of the worst of the turbulence of the last few weeks, prompted by gloomy outlooks and weak company results, European markets lost 4.0-5.0 percent while the Dow closed down 509.83 points at 8,523.83.

The global financial meltdown has led to calls for reform and joint action by G20 governments, with Europeans suggesting it is time to replace the Bretton Woods agreement that has guided international finance since World War II.

Asked if Bush retains sufficient authority to hold a summit in the final weeks of his tenure, Perino said: "I think all the leaders have agreed that we wanted to have this summit. They wanted the president to be able to host it."

She sidestepped a question as to whether the winner of the November 4 election -- Obama or McCain -- would attend, saying: "You don't want to box the next president in."

Obama, the favorite to be the next President, according to opinion polls, said questions about his participation were premature.

"I don't want to make commitments at this point in terms of our participation, my participation in something, before I've even won the election," he said.

French President Nicolas Sarkozy welcomed news of the summit, which he promoted at the UN General Assembly a month ago and discussed in detail with Bush at Camp David last weekend, his office in Paris said.

"This first summit will be followed by several others, in order to refound the international financial system and, through better regulation and more efficient oversight, ensure the crisis is not repeated," the Elysee Palace said.

Russia thinks it is "very important" the summit take place on US soil, as "the origins of the financial crisis are in the US financial system," presidential spokeswoman Natalia Timakova said.
ASUS CEO, Jerry Shen, in an interview with Laptopmag revealed the company's intent of introducing a Windows 7-based EEE PC in mid-2009. Woah! That's yet another Windows 7 bomb after AMD's mention. Shen makes it clear that only some models will support multi-touch function.

After selling four million EEE PCs so far, ASUS expects to sell about a million more till this year end. According to Shen, the screen size of 10-inches differentiates EEE PC from notebooks.

While ASUS plans to roll out touchscreen EEE PCs models, it has no plans to put Vista on its netbooks. A touchscreen tablet is also under consideration but ASUS will share more details on the same in the first quarter of next year. After the EEE Box, ASUS will introduce an iMac-like EeeTop (all-in-one PC) at the end of this month. Even the EEE Stick will be released as a separate accessory priced between $50 and $100, apart from being bundled with EEE PC models.

More Eee PC variants will rolled out in first and second quarter of 2009 at prices ranging from $250 to $700. Apart from that ASUS will announce two more products in January, at CES 2009. Battery life is the most crucial issue and to combat that ASUS is working on a technology called ExpressTest which improves boot-time and battery consumption. However, they're not looking forward to add more dual-core CPUs to EEE systems.

Diwali is normally a season of happiness and joy in India. However, given the somber atmosphere that prevails as the country's economy slumps and recession sets in, some predict a low-key Diwali. But I'm optimistic – while sales may be down at the moment, I have no doubt things will look up soon. So here is a list of products designed to cheer up any computing enthusiast this Diwali.

Acer Aspire One

One of the biggest developments in 2008 has easily been the introduction of netbooks. These light and portable machines have achieved a perfect balance between functionality and price and brought about a price point revolution in mobile computing. With this new segment emerging, there has been a rash of releases with each manufacturer trying to outdo one another.

In this mad rush, our clear favorite is Acer's Aspire One. The Aspire One has a styling reminiscent of the company's Gemstone Blue range and is designed to look more like a stylish high-end ultraportable than the budget laptop it actually is. Its lid has a mirrored finish, with a range of available colors: dark blue, green, red, black, and white.

The LCD panel is an 8.9 inch backlit LED panel with a native resolution of 1024 x 600 pixels, and offers a very good experience. Connectivity-wise, the Aspire One is similar to other netbooks. It has three USB ports, a 0.3 MP camera, a multi-format card reader, VGA-out and standard audio plugs for speakers/headphones.

The Aspire One is priced at Rs 21,000

Dell Studio 15

Dell, which has virtually monopolized the laptop market in India with its Inspiron range, recently introduced the Studio range – a hybrid creation combining the budget Inspiron and the stylish XPS. The new range has inherited design elements from the XPS M1330 and M1530 laptops, including a wedge-shaped profile and a drop hinge design. The range also borrows from the Inspiron laptops with regard to optional color-coordinated accessories and peripherals such as backpacks and slip covers, mice, and more.

While the design element makes the laptop looks funky, its specifications are pretty sound. It offers a variety of Intel C2D processors, 3GB RAM, 250GB HDD, and a 15.4-inch LCD panel.

Sony Vaio TZ38

The latest iteration of the Vaio TZ series is as impressive as its predecessors. It has a beautiful, slim body with dimensions of 227 x 198.2 x 22.5 mm, and weighs a mere 1.17 kg. The design is superb, with a thin frame that manages to mesh the lid, keyboard area, and underside in a very sturdy frame. The construction is very solid – it's made of nothing less than carbon fiber.

The screen is vintage Sony. It's a backlit matte-finish LED panel that offers a widescreen resolution of 1366 x 768 (16:9) in an 11.1 inch frame. For a small laptop, the TZ38 is well-equipped. It offers a dual-layer DVD-RW, fingerprint reader, 2 USB ports, a Firewire port, 2.0 EDR Bluetooth and a 3-in-1 media card reader. On the wireless front it supports 802.11n and this is a good thing.

The TZ38 sports an Intel C2D UV 7700 processor (1.33 GHz); 2GB of DDR-667 RAM, a 48GB SSD, and its graphics are powered by Intel GMA950 graphics subsystem. It costs Rs 1,40,000.

Apple iMac 20-inch

One could write reams on the iMac and still fall short. The now-iconic desktop range has seen sharp growth, ever since Intel became a staple feature in the Mac universe. The latest iteration of the 20-inch desktop
is now cheaper than before, and comes fairly loaded.

The 20-inch entry level iMac sports a 2.4 GHz processor, 2GB of RAM, a 20-inch Backlit LED panel , ATI HD 2400 XT GPU, and a 250GB HDD. The best part of course remains the Apple OSX, which in its current incarnation (Leopard) offers what's probably the most sophisticated GUI experience of any current-day OS. It's incredibly intuitive and, despite being fairly closed-source, can do everything a PC can – and do it arguably better.

HP Touchsmart PC

Taking a leaf out of Apple's book, HP recently introduced its Touchsmart PC which is designed in a manner similar to the Mac – an integrated CPU/monitor monolithic design. The Touchsmart however takes things a step further, by offering Tablet-like functionality. This, coupled with Windows Vista, makes for a very intriguing experience.

The Touchsmart comes fairly loaded, with a 2.16 GHz processor, 4GB of RAM, a 22-inch LCD panel with a native resolution of 1680 x 1050, and a 500GB HDD. We currently have the Touchsmart PC in our labs and have so far found it to be an excellent product. (The review should be live tomorrow.) It retails for Rs 87,000.
London: Retired spin legend Shane Warne has hailed Sachin Tendulkar on becoming Test cricket's highest run-getter, saying that a batsman of his class and skill deserved to be on top of the run heap.

"I just think he has a class about him. I just take my hat off to him. It's everything about him. The way he conducts himself on and off the field, the pressure he's under with a billion people watching him every time he goes out to bat, the way he handles decisions, he's pure skill," Warne said.

Warne would not forget the beating he got from the Indian master batsman during Australia's tour of India in 1998.

"Bowling to him in the mid-1990s was very difficult. At that time, I thought, I was at my best and a lot of the Australian bowlers were at their best, and the way he played quick bowling and spin bowling was just fantastic.

"It was always a challenge to bowl to him. You knew if you bowled well then you would get him out, if you were lucky. If you didn't bowl that well he would smash you all over the park," he added.

Warne had also rated Tendulkar ahead of Brian Lara as the best player in his recently released book 'Shane Warne's Century' in which he picked 100 cricketers he had played with or against.

He also said that though Australians were 'outplayed' by India in the second Test at Mohali, they could bounce back.

"Australia just didn't play that well. They are 1-0 down in the series and it will be tough for them. But I'm sure they'll bounce back. I thought India were fantastic. I thought their bowling was outstanding, their batting was good, and their tactics were good. They just generally outplayed Australia," he said.
Iconic kungfu master Bruce Lee was afraid of cockroaches as a kid, according to a TV series on his life.

The series, entitled The Legend of Bruce Lee, also reveals that the martial artist killed some cockroaches, and strung them together as a necklace, to overcome his fears.

Unlike most other films or TV series on Lee, the show has plenty of scenes showing Lee losing bouts to his opponents.

"Most people only know a Bruce Lee who was a super hero, someone who always won. But few understand that behind the glorious moments was also a vulnerable man," says Hong Kong actor Chan Kwok Kwan who plays the icon.

The series also shows Lee to be as a funny and tender boyfriend, and later a loving husband and father, reports the China Daily.

As regards Lee''s controversial death at the age of 32, the series shows that he died of overwork and the abuse of stimulants.
Bollywood superstar Shah Rukh Khan has confirmed that he will be going to Malacca for accepting the Malaysian honour — Darjah Mulia Seri Melaka (DMSM) award.

The award carries the title of Datuk and will be given by Malacca Yang di-Pertua Negri Tun Mohd Khalil Yaakob next month.

"Shah Rukh Khan has agreed to accept it and this was conveyed to the Governor's Office. He will try to make it in Novermber but the date of the ceremony has yet to be fixed," Star Online quoted Chief Minister Datuk Seri Mohd Ali Rustam, as saying.

Rustam said that former Finance Minister Tun Daim Zainuddin was making arrangements for the actor's trip to the country.

It was Zainuddin who pitched Mohd Khalil for honouring the actor.

Rustam also said that the award ceremony was not especially meant for the King Khan, but also for those who could not receive their awards on governor Khalil's 70th birthday on Oct 11.

He said that the award would ill also be given to Japan's Honda Motors chief executive officer Tokeo Fukui who was unable to attend the ceremony.

Rustam also defended the state's decision to confer a Datukship on Khan.

He said that the actor had helped promote Malacca to an international audience through his films 'One 2 Ka 4' and 'Don'.

He further said that a similar publicity on CNN would have cost the state a fortune.

He also said that the move to confer the award on the actor would prompt him to shoot more films here.
Bank of Baroda (BoB), which has major operations in the United Arab Emirates (UAE), has opened a new electronic banking service unit (EBSU) in Abu Dhabi.

India's Ambassador to the UAE Talmiz Ahmad and BoB chairman and managing director M.D. Mallya inaugurated the unit at the Mussafah area of the UAE capital, according to a BoB statement.

Speaking on the occasion, Mallya said the bank was going strong despite the ongoing global financial crisis.

"The clientele base of the bank is presently 33 million customers spread throughout the world with overseas presence in 25 countries with 72 offices," he said.

"The bank plans to expand by opening 10 more branches abroad during 2008-2009," he added.

In his speech, Ahmad described the bank as the best among all public sector banks in India with new initiatives being launched frequently.

He, however, stated that banks needed to exercise maximum caution in this time of financial crisis.

He also appreciated the fact that the new unit opened at Mussafah would cater to the needs of the humblest segment of that area.

Ashok Gupta, chief executive of BoB's Gulf operations, said with the opening of the customer centre at Mussafah, customers living in the vicinity would get banking services at their doorstep.

"Various services like collection of applications, account opening forms, cash withdrawal etc would be available to them," he said.

Also present on the occasion were prominent UAE-based businessmen Yusuf Ali and B.R. Shetty.

This is the second BoB EBSU in the UAE, the other one being in Jebel Ali, Dubai. The bank has six full-fledged branches in the UAE, which is home to around 1.5 million expatriate Indians.
WD has started shipping its Scorpio Blue 2.5-inch notebook hard drives with capacities up to 500 GB.

WD Scorpio Blue has a 3 Gb/s transfer rate, while including proprietary features that make the drive quiet, while running at cool operating temperatures. The WD Scorpio Blue 500 GB is the highest capacity 2.5-inch, standard form-factor (9.5mm) hard drive shipping-to-date.

"WD continues to provide the mobile market with high-capacity storage everywhere consumers and business professional travel," said Mr. Sharad Srivastava, Director Sales (India & South Asia), Western Digital. "Notebook
system manufacturers continue to improve performance, while adding data hungry features. The WD Scorpio Blue 400 GB and 500 GB hard drives provide the capacity needed to maximize the latest features and functions available in today's notebook computers, while relying on WD's exceptional reliability."

WD Scorpio Blue features WhisperDrive, ShockGuard and IntelliSeek.

The WD Scorpio Blue 500 GB (model WD5000BEVT) and the 400 GB (model WD4000BEVT) hard drives are shipping now at an MSRP of Rs. 10950 and Rs. 9450 respectively and come with a three-year limited warranty.
In its bid to clamp down on rampant software piracy, Microsoft Tuesday announced a global initiative under the banner of 'Global Anti-Piracy Awareness Day' that will include educating consumers as well as enforcing legal action.

Even though the initiative was rolled out in 49 countries, Microsoft's director of intellectual property in Australia told the Sydney Morning Herald newspaper that the Redmond-based software giant would not be able to solve the problem fully ever.

"Are we able to solve absolutely every problem? No... there are some people who will always not want to pay for something and there are always people who will want to exploit," she said in an interview to the Australian newspaper.

The program, launched in 49 countries spanning six continents, aims to combat the trade of pirated and counterfeit software.

The initiative includes intellectual property awareness campaigns, engagements with partner businesses, educational forums, local law enforcement training, and legal actions against alleged software counterfeiters and pirates.

"Software piracy and counterfeiting is a sophisticated global trade and Microsoft is committed to working with industry partners in India and around the world to stay a step ahead of this criminal industry," said Vipul Sant, director - original software initiative, Microsoft India.

For the India chapter, the company has tied up with the Kolkata-based Computer Association of Eastern India (COMPASS) and the Guwahati-based North East Computer Traders Association (NECTA) to educate members on the pitfalls and risks of piracy.

"Sustained industry efforts have helped reduce software piracy in India by four percentage points in as many years and we are committed to continuing on this path and working closely with the government, law enforcement agencies and our customer and partner communities to protect legitimate businesses from this illegal trade," Sant added.

As part of its enforcement measures, Microsoft has taken 15 civil enforcement actions against resellers indulging in hard-disk loading case, involving Microsoft Windows and Office.
Motorola's ROKR EM30, which is a lower end version of their ROKR E8 has just been launched in India. The only visible difference in these two handsets other than the color combos is the fact that the EM30 is sans a touch sensitive and Navigation Scroll wheel.

The EM30 features a 2-inch TFT display and although it may not have a touch sensitive keypad it does have specific application-centric keys that are activated depending on the application that's activated. Other features include a 2MP camera media player, FM radio with RDS and microSD card support (up to 8GB). The EM30 also has Bluetooth with A2DP, supports EDGE/GPRS and USB 2.0. You can also opt to use your own earphones since the handset has a standard 3.5mm earphone socket. CrystalTalk is of course Motorola's standard for all their new handsets and the EM30 is also compatible with downloads from Motorola's online MOTOMUSIC site.

The handset is priced at Rs. 8,959 which seems like a better price than the E8 obviously, but let's hope the handset fares better in the review. Stay Tuned.
mobiles under 3k
Nokia 1110i - Rs. 1,345
Bleu my214x - Rs. 1,649
Nokia 1650 - Rs. 1,759

mobiles under5k
Samsung X520 - 3,650
Sony Ericsson K510i - 3846
Samsung E250 - 4200
Sony Ericsson W200i - 4300
Nokia 3110 Classic - 4450
Motorola RIZR Z3 - 4999

mobiles under15k

Sony Ericsson W580i: Rs 10,150
Nokia E51: Rs.11,500
Motorola RAZR2 V8 (2GB): Rs. 12,500
HTC Touch: Rs.13,500
Sony Ericsson W760i: Rs.14,500
The world's first carbon nanotube-based colour e-paper

Samsung demoed a carbon nanotube based color electrophoretic display (e-paper) at the International Meeting on Information Display in Korea. The new color e-paper display measures 14.3-inch and is being jointly developed by Samsung and Unidym -- the developers of carbon nanotube transparent electrode used in e-paper devices.

The e-paper display allows viewing text and images in a bright daylight environment and is energy efficient since it doesn't refresh images constantly. That's why it scores over conventional flat display panels as far as battery life is concerned, and are ideal for handheld and mobile devices.
Even your keyboard's not safe

Here is some more worrisome news for the security obsessed individuals. Even with all kinds of anti-spyware and anti-keyloggers at his disposal, your sensitive data is still not safe from prying eyes. As a part a paper for the Lausanne Security and Cryptography Laboratory (LASEC), two researchers Martin Vuagnoux and Sylvain have displayed a rather easy way of finding out what exactly is being typed on your keyboard.

The researchers found out that most modern keyboards generate electromagnetic emanations that can be used to decipher the keystrokes remotely. They used some basic instruments to "sniff" these electromagnetic emissions, which eventually helped them to decipher the keystrokes typed.

All they needed was a wireless aerial, which was used to to sniff keystrokes from a computer located a meter away. Once the data is sniffed, it is converted into decipherable text with the software developed by Vuagnoux. This is somewhat similar to the Van Eck phreaking, a system developed in 1985 by Dutch researcher Wim van Eck to spy on computer monitors.

The researchers used as many as 11 keyboards ranging from the latest ones to the ones used in 2001 to test the vulnerability levels. To their dismay, all these keyboards were vulnerable to at least four of their attacks. The attacks can be carried out within a distance of 20 meters. Computers behind a wall too are not safe.
One emphasizes voice communication, the other affords easier data exchange

HP has unveiled two iPAQ branded Windows Mobile 6.1-based smartphones featuring new navigation control. The two new iPAQ smartphones -- Voice Messenger and Data Messenger were displayed on the HP website with dedicated pages each and are targeted at the business mobile users. The Voice Messenger has candy bar form factor while Data Messenger is a slider with touchscreen display.

The Voice Messenger has a 2.4-inch LED backlit display offering a 320x240 resolution, a 20-key QWERTY keypad, WLAN (the radio support includes 802.11 b/g with WPA2 security, 3G-ready supporting Quadband GSM/GPRS/EDGE, HSDPA, HSUPA and Tri-band UMTS). This phone sports Windows Mobile 6.1 Standard running on 128MB SDRAM, 256MB Flash ROM and also features 3.1-megapixel autofocus camera, A-GPS and has 1260mAh Lithium Polymer battery. Check out detail specifications here.

While the Data Messenger carries similar specs it mostly differs in its 2.8-inch 320x240 touchscreen display. Since it runs Windows Mobile 6.1 Professional, editing of documents through the Mobile Office pack will be possible; interestingly it sports the Opera browser as well. Surprisingly, this model has a 1140 mAh Lithium Polymer battery by default -- not a lot of juice for a touchscreen enabled device. However both phones feature a power save mode. For detail specifications of the Data Messenger, click here.

Both phones have an optical sensor that offers five-way navigation control.

The iPAQ Voice Messenger will ship on 5th November for $532 while Data Messenger will ship for whooping $665 on 22nd November. It might take a while to hit Indian shores and we'll keep you updated on the same.

Software & Technology giant Wipro has entered into a partnership with Sun Microsystems, to widen its reach within the Gulf Cooperation Council (GCC) countries such as UAE and Saudi Arabia.

Under the arrangement, Wipro would resell and integrate the entire suite of Sun systems, storage, software, and services to serve Sun's customers in the UAE, Saudi Arabia, Bahrain, Oman and Qatar.

The Sun-Wipro business relationship began almost two decades
ago in 1989, with Wipro in India selling 3/50 and 3/60 workstations.

At present, Wipro is the world's largest independent R&D services provider and the world's largest offshore third-party testing services provider.

Apart from this, the company is one of the world's top offshore Indian BPO service providers and the largest offshore technology infrastructure management services provider.

The firm has over 50 development centers, 743 clients and 92,000 employees in 53 countries across the world.
Oct 22, 2008, 11:38 AM
Speedy eaters seen likelier to get fat

LONDON (Reuters) - People who eat quickly until full are three times more likely to be overweight, a problem exacerbated by the availability of fast food and the decline of orderly dining habits, Japanese researchers said on Wednesday.

The findings, published in the British Medical Journal, highlight how eating styles, and not just what or how much is eaten, can contribute to an obesity epidemic fueled by the spread of Western-style affluence in many parts of the world.

The World Health Organization classifies around 400 million people as obese, 20 million of them under the age of five. The condition raises the risk of diseases like type 2 diabetes and heart problems.

For their study, Hiroyasu Iso and colleagues at Osaka University asked more 3,000 Japanese volunteers aged 30 to 69 about their eating. About half of the men and a little more than half of the women said they ate until full. About 45 percent of the men and 36 percent of the women said they ate quickly.

Those who said they ate until full and ate quickly were three times more likely to be fat than people in the "not eating until full and not eating quickly" group, the researchers found.

They cited as causes both the availability of cheap food in big portions and habits like watching television while eating.

To counteract the "supra-additive effect" of speedy or glut eating among children prone to obesity, parents should encourage them to eat slowly and in calm surroundings, the study found.
It's that time of the year when the country erupts in a fountain of light and sound. It's a time when spending insane amounts of money is considered... well, let's be honest, it isn't even a consideration for festive folk, and that comprises pretty much a rather chunk of the populace. So, if you're looking to buy a new mobile phone, here are some colorful choices for this season.

Samsung INNOV8 i8510 – Rs 46,000 (with 16GB card)

BlackBerry Bold 9000 – Rs 35,000

Nokia E71 – Rs 20,000

HTC Touch Diamond – Rs 26,000 

LG Secret KF750 – Rs 18,990 

Sony Ericsson W980 – Rs 22,800

It's the festive season again, so it's time to get out the playing cards and new clothes. It's also time to go shopping, and may I point out that LCD TVs are prime candidates? We have compiled a list of some worthy TVs, in all sizes. I would like to emphasize that this is not a comparison. Moreover, the prices mentioned are company prices, so you can expect to find better bargains at different retailers. Thanks to the cut-throat competition, we can expect some nice discounts.

Panasonic TX-32LX800
MRP: Rs 54,000
Lowest: Rs 51,500

Samsung LA37A550 Series 5
MRP: Rs.65,000
Lowest: Rs 53,900

LG60 47-inch Scarlet
MRP: Rs 1,02,000   
Lowest: Rs 85,500

Sony Bravia KLV-46X350A
MRP: Rs 2,49,990
Spice Mobiles has launched a new music handset, the S-580.

The handset features Dazzle Ring-tone that allows users to listen to a fresh ring tone every time they get a call. Using this latest feature, the phone shuffles and picks a new ring tone from the list of 10 user-selected ring tones on every new call. The phone comes fully loaded with MP3 player, FM recording, playback and supports expandable memory up to 2 GB. The FM recording and playback feature allows users to record their tracks from the radio and set them as ringtones.

The Spice S-580 has a chess design keypad, one-touch torch light, mobile tracker, call blacklist facilty and GPRS and WAP functions. It also features schedule SMS facility - schedule an SMS by typing the message and setting date and time of delivery. When the time comes, the SMS will automatically leave the message box.

The S-580 is priced at Rs. 2249.
Motorola has introduced the AURA, a phone inspired by luxury watches, handcrafted design and high performance racing engines.

The AURA has a circular display- the first on a mobile device - 16 million colors and 300 dpi resolution on the round LCD and a Grade 1, 62-carat sapphire crystal lens.

"AURA is Motorola's latest endeavor into the high-tier mobile device space and is the result of our continued inspiration to innovate in design, imagination and state-of-the-art handcraftsmanship," said Jim Wicks, corporate vice president and director of Consumer Experience Design, Mobile Devices, Motorola. "From the moment AURA owners hold their phones, they elevate their own experience in luxury and unmatched quality."

Encased in a stainless steel housing, the AURA has textures and patterns chemically etched into its surface. The Swiss-made main bearing, gears composed of Rockwell 50-55 hardened steel and 130 precision ball bearings work in tandem to drive the assisted-opening blade. Motorola likens the effect to that of opening a luxury car door rather than accessing a mobile device. Its custom-engineered rotating mechanism is composed of more than 200 high-precision individual parts, and the gears are protected from harsh conditions with the same coatings used in high-performance racing engines.

The AURA features Motorola's proprietary CrystalTalk technology and stereo Bluetooth.

AURA is expected to be available around the globe in Q4 2008. Pricing is unknown.
New Delhi : Ever got engaged in a fanciful musing of a castle in the air, or a date with Angelina Jolie or Brad Pitt? Daydreaming has long been derided as a lazy and non-productive pastime.

But it has also been able to breed many popular artistic careers, like being a composer, novelist or a film-maker, who develop new ideas.

"When a person is thinking or fantasizing about his unfulfilled wishes, desires, all that for which he is passionate about, he gets carried away by them and starts day-dreaming," says a well known psychologist Dr Aruna Broota.

But, in this fast-pace world, do people have time for day-dreaming? "Yes, they have enough time to day-dream. The fast-pace moving world has not deterred people from day-dreaming," says Dr Roma Kumar, the clinical psychologist at Ganga Ram Hospital.

Day-dreaming is a visionary fantasy or a reverie indulged in while awake. A daydreamer gets engaged in a fancy speculation, generally of happy and pleasant moments, hopes or ambitions. While for an observer, the day-dreamer has an expression-less stare to a distance, day-dreaming is very normal, feel experts.

"Day-dreaming is completely normal, in fact it is more than normal. It is like trying to think of the happy moments. The person goes back to that time to get more happiness," says Kumar.

Kumar however, adds that day-dreaming can be abnormal if it is beyond a limit.

"Generally day-dreaming is normal but if it is beyond certain limit and when it makes the person non-functional, it can be an obstacle on the path of progress," she says.

San Francisco: Yahoo Inc is expected to outline plans to cut expenses, which would include future job cuts, when it reports its quarterly earnings on Tuesday, a source familiar with the situation said on Sunday.

The Internet company will discuss the scale and timing of the future layoffs, but specific details on the exact jobs to be eliminated will not be disclosed, the source said.

Yahoo! was not immediately available to comment.

The Wall Street Journal reported that the future layoffs will exceed the 1,000 jobs Yahoo! previously said it would eliminate.

Some Yahoo! managers have also been asked to identify operating budget cuts of around 15 per cent, The Wall Street Journal reported in its electronic edition.

Earlier this year, Yahoo! rebuffed a $33 per share, or $47.5 billion, takeover offer by Microsoft Corp.

Since then, Yahoo! has shuffled its management team and announced new products to try to boost its flagging stock price.

Yahoo! recently hired consultants Bain & Co to help identify potential "structural changes".

Shares of Yahoo! closed on Friday at $12.90, down 9 cents, on Nasdaq.

Yahoo! also continues to weigh a combination with Time Warner Inc's AOL, The Wall Street Journal reported.

The two sides have started to discuss a value for AOL below the $8 billion to $10 billion that had previously been considered.

Last week, Microsoft Chief Executive Steve Ballmer said a Web-search advertising deal with Yahoo Inc made economic sense and may still be possible, though the two sides are not in any discussions.
London dreams as Bollywood meets Britain

LONDON: Indian and British filmmakers are expected to co-produce 10 new movies over the next two years as a bilateral film treaty kicks in, officials said on Tuesday.

"London Dreams", a film starring Salman Khan and Ajay Devgan, will be the first title under the co-production treaty that was approved by the Indian cabinet in April after months of delay.

British culture department officials said the treaty gives financial incentives, including tax-breaks and funding for Indian filmmakers.

"It's good for cinema and positive for cultural ties between India and the UK," said Simon Oliver of the department of culture.

Culture Minister Barbara Follet is to meet with Bollywood stars Salman Khan, Ajay Devgan and Asin and director Vipul Shah on the sets of "London Dreams" at Trafalgar Square in central London Wednesday in a symbolic start to the treaty, Oliver said.

"Indian film producers are very keen to promote this treaty, which has suffered from the usual bureaucratic delays in India," said Pervez Alam, director of India-EU Film Initiative, an organisation that promotes links between Indian and European filmmakers.

"There is a recognition in Britain that the Indian film industry today has muscle - and money-power. People don't want to miss out on that opportunity," Alam added.

A 2007 report by PriceWaterhouseCoopers, the professional services firm, said India and China are expected to drive the global entertainment and media industry to $2 trillion by 2011.
Taking note of the rising cases of cyber crimes, the government has set up a Resource Centre for Cyber Forensics (RCCF) at the Centre for Development of Advanced Computing (CDAC) at Thiruvananthapuram, the Lok Sabha was informed Tuesday.

The RCCF will develop a cyber forensics tool kit, carry out R&D in cyber forensics to meet the requirements of the law enforcement agencies and provide technical services including training to such agencies.

In a written reply in the Lok Sabha, Minister of State for Communications and IT Jyotiraditya M. Scindia said the government has introduced the Information Technology (Amendment) Bill, 2006 in parliament, which deals with, among other things, new forms of cyber crimes.

These include publishing of material containing sexually explicit acts in electronic form, 'video voyeurism', breach of confidentiality and leakage of data by service providers, he said.

They also include e-commerce frauds through impersonation commonly known as phishing, identity theft and offensive messages through communication service.

Scindia said the central government has developed several tools for cyber forensics, which includes disk forensics, network forensics and device forensics.

The government has been actively involved in providing support to law enforcement agencies in the analysis of cyber crime cases and over 200 cases have been submitted, he said.
Having the right technical skills is only half the battle for an IT contractor in tough economic times

Tech workers: Ready to be a free agent?

n these uncertain times, who isn't worried about job security? There are ominous signs aplenty: tech projects put on the chopping block, layoffs looming, and spotty full-time hiring opportunities on job boards. It's good to have a backup plan in case you're let go, and one plan is to prepare yourself to be a free agent.

A free agent has many names, among them "freelancer," "contractor," "temp," "consultant," and "contingency worker." Basically, all mean the same thing: working without the benefits or obligations of a full-time staffer.

Of course, free agents aren't in any better position than full-time employees during a downturn. Research firm Staffing Industry Analysts projects zero growth in IT staffing this year and a contraction of 5 percent in 2009. In fact, given that it's much less traumatic to cut contractors than to lay off regular employees, free agents will be among the first to be fired, says Barry Asin, chief analyst at Staffing Industry Analysts. Generally speaking, companies don't replace full-time employees with contingent ones, he adds.

Until the economy recovers, that is. On the upswing, free agents will be in more demand than their full-time counterparts, as companies typically use contractors to hedge their bets against a sudden market upswing going sour. This means IT workers facing potential layoffs should consider preparing for life as a free agent now in hopes of finding work in the future.

"The reason to have skilled temps is to protect a company against uncertainty, because typically temps -- at least in professional skills -- are more expensive on an hourly basis than traditional employees," Asin says. "When things start to improve, temp workers will be the first hired."

Making the case for free agency

Job market improvement, at least for technical work, may come sooner than you think. In fact, staffing firm Robert Half Technology (RHT) doesn't share Staffing Industry Analysts' gloomy job market outlook. In an RHT survey released last month of 1,400 CIOs, 11 percent said they expect to add staff in the fourth quarter of this year, whereas only 3 percent forecast personnel reductions.

In a shaky economic climate, free agents are well positioned to take some of those jobs. "We're actually seeing an increase in contract orders over some of our direct-placement orders," says John Estes, vice president at RHT, adding that his company's fourth quarter is off to a good start. "Companies are saying, 'We had forecasted to bring in full-time employees to help us get some of this work done but can't really afford the overhead and head count right now, so we're going to go with contractors.'"

One free agent techie with expertise in everything from Linux to Windows, networking to coding, claims to be as "busy as I've ever been." This free agent, speaking on condition of anonymity, notes that disaster recovery contract work has been "falling away a bit, but virtualization is huge."

What's hot, what's not, in the contract market

In a Forrester Research study released earlier this year, the hottest IT jobs -- contingent or otherwise -- included desktop virtualization expert, account manager, mobile operations and devices expert, service manager, business process analyst, and storage director. Other recession-proof IT jobs are in areas such as VoIP, software design, networking and systems administration, data warehousing, Web 2.0 technologies, and database administration.......To be continued
In a new study, scientists have figured out the baffling method of propulsion of tiny aquatic snails, which makes them walk on water.

According to a report in National Geographic News, Eric Lauga, a professor of mechanical and aerospace engineering
at the University of California, San Diego, led the study.

"How the snails were dragging themselves across a surface that they could not even grip was absolutely perplexing to us," said Lauga.

"Hanging on to the water's surface is not the issue for the snails. They are naturally buoyant, because they are so small," he added.

Even so, the snails need traction to move across the slippery surface.

By making small rippling motions with its foot, the snail creates traction for itself, Lauga and his colleagues found after studying videos of the snails.

"The snails' ability to move depends on water's tendency for its surface to resist disturbance. Water "wants" to stay flat," Lauga said.

When the snail ripples its foot, similar ripples are created on the water's surface. The ripples generate a downward force as the water flattens itself.

These ripples are just the right size for the snail to use to push itself along.

"If the ripples were too small, the snail would slip, as on ice," Lauga said. "If the ripples were too big, the snail could not 'grab' them," he added.

According to Howard Stone, a professor of engineering and applied mathematics at Harvard University, "I have seen other forms of fluid motion driven by surface undulations, but I do not recall having ever seen any study that demonstrated propulsion (like this) before."

"New insights on small- or large-scale propulsion open our minds to thinking about new ways to tackle problems. The mechanism shown in this paper as a means to propulsion is quite appealing," he added.

"It would be really interesting to build small-scale robotic versions of these snails to see if our understanding of their locomotion is correct and if we can recreate it," Lauga said.

While he doesn't see immediate practical applications for such devices, Launga said that, "in my wildest dreams, I can see James Bond
releasing robotic snails on water to spy on his enemies." (ANI)
MUMBAI (Reuters) - Reliance Communications Ltd, India's No. 2 mobile operator, said on Tuesday it has tied up with five computer hardware suppliers to offer its internet data card service bundled with their laptops.

The computer companies are Intel Corp, Acer, Asus, HCL Infosystems and Lenovo.

London, October 21 : Daniel Craig has credited former James Bond star Pierce Brosnan for making up his mind to take up the 007 role.

The 40-year-old revealed that it was the retiring Bond Brosnan who had urged him to 'go for it' following the film producers decision to cast him as the 007 Agent.

The Brit admitted that though he had never predicted the opportunity that had come his way, and would have regretted not accepting the offer.

Craig has revealed that he approached Brosnan at an awards show in Britain weeks before he landed the role and asked his fellow actor if he shoud proceed if he got the nod.

After dinner, after having enough to drink, I just went over and said, 'Look, it's not on the cards (but) it might be on the cards. If it were to be on the cards, what should I do?' And he said, 'Go for it. Just go for it. You've got to have a go at this,'" Contactmusic quoted Craig, as saying.

Craig, whose 'Removed Royale' had managed to break box-office records with the film collecting 600 million dollars and his latest Bond flick 'Quantum of Solace' is set to have a nationwide release on October 31.
NEW DELHI: Maruti Suzuki on Tuesday launched a new plant that will have annual installed capacity to produce 240,000 fuel-efficient petrol engines.

Maruti said the plant was part of a Rs 9000 crore ($1.8 billion) investment plan by it and its parent Suzuki Motor Corp.

The KB series engine will be used in Maruti's A-Star model.

"The new engine series is also an important step towards attaining the target sales of a million units in the domestic market by 2010/11," Managing Director Shinzo Nakanishi told reporters.

Maruti Suzuki, 54.2% owned by Suzuki, has said it will launch the A-Star in India in October and start exports from December or January.
Mumbai, Oct 21: Normal payment and settlement operations of the Reserve bank were affected on Tuesday as the employee union went on a "mass casual leave" to press their demands on pension related issues.

"Many employees have not come today," an RBI official told a news agency here.

In the wake of the strike call, the Apex bank had asked commercial banks to complete old transactions on Monday and had conducted two days` liquidity adjustment facility (LAF) auctions yesterday.

Employees are striking work to protest against the withdrawal of pension updation and issues relating to superannuation.

The United Forum of Reserve Bank Officers and Employees alleged that there was a move to drastically reduce pension to retired RBI employees.

Besides, the union demanded increase in the interest rate on Provident Fund and grant of family pension at the rate of 30 percent.

RBI had said that the "mass casual leave" is the cessation of work and concerted refusal to work. It had also noted that such an action amounted to an illegal strike.

Bureau Report
Three out of four children have seen images on the internet that disturbed them, an NSPCC poll suggests.

The charity is renewing its call for computer manufacturers and retailers to install security to stop children finding violent or sexual content.

The NSPCC, which polled visitors to its children's website, said it was "alarmed" by the accessibility of potentially disturbing material.

Some 377 of 497 votes cast claimed to have been disturbed by internet images.

One child posted a comment on a There4me message board saying: "I've seen violent images I didn't search for. I was freaked out."

   "Children are just a few clicks away from innocently stumbling across upsetting or even dangerous pictures and films"by Zoe Hilton,NSPCC policy adviser

Another said his eight-year-old sister's search for "pictures of animals" generated pornography adverts.

The NSPCC wants social networking and video hosting sites to remove offensive material within hours of finding it.

Policy adviser Zoe Hilton said the NSPCC was "alarmed" by how easy it was for children to access "disturbing internet material".

She said: "Children are just a few clicks away from innocently stumbling across upsetting or even dangerous pictures and films such as adult sex scenes, violent dog fights, people self-harming and children being assaulted."

'More effort'

Ms Hilton said that every child should be using a computer with child protection software.

"High-security parental controls installed in their computers would help shield them.

"Currently computer manufacturers and retailers leave it to parents to find and install software that filters out material unsuitable for children. This can be a complicated process for customers."

The charity wants retailers to ensure the software is installed before selling computers, and also manufacturers to start building such controls into their products.

She added: "Social networking sites must also put more effort and resources into patrolling their sites for harmful and offensive material and ensure their public complaints systems are clearly marked, easy-to-use and child-friendly.

"We would also recommend they give information on their sites about sources of help and advice, such as Childline, for children who have been affected by what they have seen."
London, Oct 21 (IANS) Although little is known about how the universe is structured, latest observations support the theory that large galaxies are clustered together in structures similar to giant soap bubbles, with tinier galaxies sprinkled on the surface of this "soapy" layer.A team led by Noah Brosch, director Tel Aviv University (TAU) owned Wise Observatory, is the first in the world to uncover what they believe are visible traces of a "filament" of dark matter - an entity on which galaxies meet, cluster and form. A filament can originate at the junction of two "soap bubbles", where the thin membrane is thicker.

Brosch, with his student Adi Zitrin and researchers from Cornell University, studied an area of the sky opposite the constellation Virgo, where 14 galaxies were forming in a line, according to a TAU release.

Pundits have called the line a "Bridge to Nowhere" because it seems to start and end in unknown locations. Strangely, 13 of these galaxies were simultaneously giving birth to new stars.

The odds of this occurrence are very rare, leading the researchers to believe that the galaxies might somehow be forming on this elusive filament, made entirely from dark matter, which attracts regular matter that then turns into new stars.

"There has long been a theoretical belief that this was the case," said Brosch, "but this new finding represents experimental results that such a filament really exists, and that possibly it is an entity made from dark matter which is aligning these galaxies."

Brosch compared the work of an astronomer to "looking for hairs of the beard of the Creator". This line of galaxies may be one such hair. Generally speaking, matter as we know it on earth makes up only a small percentage of our universe.

The composition of most of the universe is unknown - it's either dark matter (about a quarter of the universe) or dark energy (the other three-quarters). "Our studies show that you don't need to go to the edge of the universe to find dark matter. It may be only 15 million light years away, more or less in our backyard," said Brosch.

The research has massive implications for astronomy and the understanding of galaxy-formation. Due to the surprising closeness of this new grouping of galaxies to ours, it would only be a matter of technological advances - maybe a couple of hundred years - and a longer human lifespan before explorers could visit this unusual dark matter in person.

"Our technology is abysmally limited right now, but it could definitely happen," said Brosch.
The IPL has taken some significant steps to protect the interests of its eight franchises, including the addition of a performance clause to its player contracts that will see players lose 20% of their match fee - on a match-by-match basis - if they don't find a place in the playing XI from the next season. However, this clause will be applicable only to new contracts that will be signed from now on.

This was one of the key developments at a meeting, involving franchise representatives and IPL officials, which ended in Bangkok on Sunday. The meeting also resolved to hike the players' purchase cap from US$5 million to $7 million - this cap will not be applicable to the money that will be spent during a one-month trading window starting December 15 for existing players.

"This is a very significant development for the franchises," sources said. "This means that trading can be done for existing players with absolutely no budgetary limits."

The IPL, meanwhile, announced in a press release that it will hold its next players' auction in Mumbai on February 6. It had earlier been tentatively scheduled for January 29. The IPL also confirmed that the maximum number of foreign players in each squad has been increased from 8 to 10, though those in the playing XI will stay at four.

The meeting agreed to scrap the system of flying in players as temporary replacements, an allowance that saw cricketers like Dwayne Bravo, the West Indian allrounder, make a fleeting appearance in the first season early this year. But in a concession to the teams that had picked such players last time, the press release said that "all teams that had temporary replacements will have the first right to pick those players".

"The extra $2 million to purchase players is essentially for the new auction," sources said. "This will go a long way in levelling the playing field, especially with many of us expecting the English players to be available. The 10-player cap has also brought clarity to the field because there was an original limit of eight and then it was stretched to nine."

According to the sources, franchise can now offload players during the trading window - with the player's consent - but they will have to bear the difference to the player in case he is sold for less than his current fee. "On the other hand, if a player goes at an increased price, the difference will be shared by the selling franchise and the player," they said. The details of this arrangement are not known yet.

Franchises have also been assured more visibility on the ground, in terms of in-stadia visibility during matches, "while not infringing on the rights of the central sponsors".

The performance clause, incidentally, is also open to existing players but only if they sign new contracts. "It is doubtful how many of the existing players will agree to sign a new contract," the sources said. "But the idea behind the move is clear. It is a step for the future and will ensure that the money a franchise pays to a player is linked purely to performance, and nothing else." As per the previous arrangement, a player only needed to be "fit and available for selection" to be entitled to his full fee.

The meeting also heard views from various service providers involved with the first season of IPL to "ensure a better experience allround next time". "But on the whole the Bangkok meeting was held in an excellent, open atmosphere and it has left the franchises satisfied with the clarity achieved," the sources said. The 2009 IPL season has been tentatively scheduled to start from April 10.
A father took his 20-year old son to an Islamic court in northern Nigeria for idleness, asking that he be sent to prison for refusing to engage in productive activities, state news agency NAN said Friday.

"He is not listening to words and he is bringing shame to my family. I am tired of his nefarious deeds. Please put this boy in prison so that I can be free," Sama'ila Tahir, a market trader in the northeastern town of Bauchi, was quoted as saying.

Tahir told the court that his son had refused to go to school and accused him of belonging to a criminal gang.

The court sentenced the son to six months in prison and 30 strokes of the cane -- which were immediately administered on the premises -- for being disobedient to his parents, NAN said.
Forget sweating it out on the treadmill or long walks, for a leading nutritional scientist has found the secret to a long and healthy life, and it has nothing to do with cutting on the carbs: it's chocolate, coffee and tea.

Professor Gary Williamson, from the department of food science at Leeds University, has produced a list of 20 "lifespan essential" foodstuffs.

Besides chocolate, coffee and tea, the list includes apples, blackberries, blueberries, broccoli, cereal bran, cherries, cherry tomatoes, cranberries, oranges, peaches, plums, raspberries, red grapes, red onions, spinach and strawberries.

The veggies and fruits are rich in naturally occurring chemicals, known as polyphenols, which have been linked to a variety of health benefits including protection against heart disease.

The expert said that foodstuffs on the list, which is dominated by fruits and vegetables, can also help to slow down the ageing process by helping to protect cells from the natural damage that occurs over time.

"Epidemiology studies support the protective effects of polyphenol-rich foods. Lack of these components in the diet, because of low intake of fruit and vegetables, increases the risk of chronic disease," the Telegraph quoted the expert, as saying.

"This means that they are essential to fulfill the maximum individual lifespan, and so I propose that they are 'lifespan essential'," he added.

LONDON — United Airlines says one of its pilots has been arrested by police for being over the legal alcohol limit.

The airline says the first officer was due to join the crew of flight 955 from London's Heathrow Airport to San Francisco when he was arrested Sunday morning. London's Metropolitan Police say the 44-year-old was arrested following a breath test but has since been released on bail. .

United said Monday that the man — whose name was not given — was one of three pilots due to fly the plane to the United States. It says he has been removed from service and that the company is investigating the incident.

The legal limit for pilots is nine micrograms of alcohol in 100 milliliters of breath.

MSD Pharmaceuticals Pvt Ltd, a wholly owned Indian subsidiary of Merck & Co Inc (a global research-driven pharmaceutical company), launched the world's only vaccine, Gardasil, in India recently to prevent fatal onslaught of cervical cancer.

India has the highest number of cervical cancer in the world, according to the International Agency for Research on Cancer (IARC), a part of the World Health Organisation (WHO). It affects only women, mostly in late 40s or early 50s, through human contact. Every year, around 74, 000 patients die in the country out of 1,32,000 women diagnosed with this deadly disease.

"Across the world, around 2,80,000 women die of this disease every year and 27% of these deaths occur in India alone," said Anjana Narain, director (vaccine) of MSD. The virus called Human Papillomavirus (HPV), which infects mostly women, causes the disease. This virus gets transmitted through sexual contact and even preventive measures like contraceptives cannot prevent it from entering a woman's body, said Partho Basu, head of the department of gynaecological oncology, Chittaranjan National Cancer Institute.

"From infection, the virus takes 15-20 years to develop and attack as cervical cancer in a woman's body, so the preventive vaccine should be administered from the age of 9-26 years, so by the time a girl reaches her late 40s she is safeguarded," Basu added.

Gardasil is available in more than 100 countries now. "It was introduced by Merck & Co Inc in 2006 first in the US and since then, 36 million doses have been administered to women living across 108 countries," said Narain. A one-time dose given thrice in a span of a year, the vaccine should be administered between the age of 9 and 26 years, with per dose coming at a price of Rs 2,800. This type of cancer takes more life than any other form in the world, she added.

Next in the pipeline from MSD's kitty is a vaccine called rotavirus which will be administered to children suffering from acute diarrhoea, said Narain. Apart from this, MSD will focus on critical care, cardiovascular, metabolics and novel vaccines and medicines in the next two years, she said.
What do you do with your laptop that is beyond repair or the old desktop machine that your office administrator has junked to a store-room never to be seen for a few weeks or months? Most firms or individuals don't know how to safely dispose of these old machines, or electronic trash, making India one of the largest producers of electronic waste - or e-waste - in the world.

The numbers are big in India because more people in India use electronic items: nearly 200 million television sets in the next three years from the 60 million now; about 75 million computers in two years from the 15 million now. One more thing: earlier an average Indian would stretch his computer to be used for five or six years, now it is only two or three years.

Nearly 35,000 computers become outdated and useless in the Indian Silicon Valley Bangalore alone every year, which is home to nearly 1,300 information technology firms.

And then think of the millions of mobile phones that are in use in India. Waste experts say that almost 90 per cent of the used mobiles can be recycled.

Home to more than 1,200 foreign and domestic technology firms, Bangalore figures prominently in the danger list of cities faced with e-waste hazard.

Almost 1,100 tons of e-waste is produced in India everyday - only 10 tons are treated - and the number may double or triple in two or three years if a firm law is not in place. Because there is no separate e-waste landfill the situation is all the more alarming. Bangalore civic authorities for example have a plan to set up a separate 120-acre e-waste disposal facility but it is not operational yet.

It is like a slow poison and unless we act fast we will be deeply affected by it, points out Leo Saldanha of Environment Support Group. Toxic campaigners have found that many small industrial units that try to extract metal waste from dumped computers violate pollution control norms.

Officials have said that these units often let out these metal wastes into the regular sewage or storm water drains causing damage to the environment too.

Although India officially does not encourage import of e-waste from abroad the grey market abounds with computers and other peripherals that are assembled from this imported electronic trash. Some other countries in the region like Pakistan, Bangladesh and China too are countries where the obsolete e-waste is targeted.

Green groups like Greenpeace have been pushing the IT sector to lobby for a law that will effectively tackle the e-waste disposal. Even the Indian hardware manufacturer's organisation called Manufacturers Association of Information Technology (MAIT) has supported the introduction of such a move.

Some brands like Acer, HCL and Wipro have already voiced their support for a comprehensive e-waste law in India. Greenpeace has warned that the toxic content in e-waste cause irreversible environmental damage and public health nightmare when discarded recklessly. The international green group wants brand owners to bear the cost for take back and safe recycling of their respective end-of-life products. The principle of Individual Producer Responsibility (IPR) makes brands responsible for end of the life costs of their products by phasing out toxic chemicals and metals at the design stage, so that recycling will be safer and easier, it adds.

Greenpeace has also mooted bar coding or holograms or any other means to track computers and other electronic goods during their lifecycle. It wants all electronic good manufacturers to be RoHS complaint. RoHS stands for "the restriction of the use of certain hazardous substances in electrical and electronic equipment" and is mandatory in European Union and other developed nations in the West.

It is time for the electronic sector to go green. And the first step is to have an effective e-law in place.
London: Two Indian films have made quite an impression in the first week of the London film festival. Nandita Das's directorial debut, Firaaq as expected got rave reviews.

The film, starring Naseeruddin shah, Deepti Naval and Paresh Rawal, takes place in Gujarat a month after the 2002 riots. A story about prejudice, fear, love and hope, this movie is due for release in India in January

"I have shown it in Toronto, Chinese, Americans, Asians and Turks they have all seen it and what I am pleased about is that even though it's an Indian film, everyone connects," says Director, Nandita Das

And the audiences have connected with quite a different Indian movie as well. The spoof Tamil Western Quick gun murugan by director Shashank Ghosh has 9 rebirths, McDosas and a south Indian cowboy.

"It's a tribute to south Indian genre. We have used a south Indian cowboy and made him a bit 'western style' to make it modern. Am interested in seeing how the western audience reacts to it," says Shashank Ghosh.

Other Indian films in the festival include Santosh Sivan';s Tahaan, Ketan Mehta's Rang Rasiya and Shyam Bengal's Welcome to sajjanpur.
Polling Station / Ur First Month Salary.
Oct 18, 2008, 05:44 PM
hi acumens,

V like to know wat did u done r going to do, ur first month's salary...that cant be forgettable at all bcoz that's one of ur pleasent unforgettable happening/moment/ ur life.
so share with Us.And
:acumen Everyone can is ur rights & freedom. :agree

thanks 4 sharing. 
London: Director Guy Ritchie is to get at least £ 20 mln (nearly $35 million) in cash, and properties worth many more millions in his divorce settlement with pop superstar Madonna.

According to, the 40-year-old Ritchie will get the 1,200-acre country estate and a London pub. The money is to cover the London properties, which include a seven million pound family townhouse in Marylebone, a 10-bedroom, 6 million-pound property next door and two mews cottages worth £ 2 mln each.

The director also gets the pub in Mayfair, valued at about £ 2.25 mln- and the Ashcombe House estate in Berwick St John, Wilts, which is worth £ 10 mln.

The total value will be around £ 60 mln- enough for Guy to walk away satisfied, it was reported Friday night.

Madonna, 50, on tour in the US, keeps her New York and Los Angeles homes.

A source close to the couple said: "The negotiations were relatively painless. Guy knew what he wanted and Madonna knew what she was keen to keep. There was a spell when Guy was in a mood to dig his heels in, but he decided this arrangement seemed reasonable and a long battle over money would make life unbearable."

Madonna is being represented by well-known divorce lawyer Fiona Shackleton, who played a pivotal role in protecting Paul McCartney's fortune from his ex-wife Heather Mills this year.

Shackleton negotiated with Guy's lawyers in a day of frantic phone calls. They are expected to reach a compromise over their kids - Lourdes, 12, Rocco, eight, and David Banda, three.

Taking a dig at critics clamouring for his retirement, Sachin Tendulkar on Friday said he converted stones thrown at him into milestones.

"People sometimes throw stones and you converted them into milestones," Tendulkar said after surpassing West Indian legend Brian Lara's earlier record 11953 Test runs.

The master batsman, however, said becoming Test cricket's highest run getter was the biggest achievement of his career.

"It is definitely the biggest achievement in 19 years of my career. It can't happen overnight. The journey has been fantastic with ups and downs. It was a process of success," he said.

Tendulkar said he wanted not to think of the record much but it (the thought) kept on creeping in his subconscious mind.

"I wanted to shift the focus on cricket and not think of the record. But whoever I meet they keep on reminding me (of the record)," he said.

Asked what he decided to do before coming to bat today, Tendulkar said, "I knew I need 15 runs to get past Lara's record. But I had decided to keep it simple, concentrate on just watching the ball."

He said in his 19-year career he was not much concerned about creating personal records.

"I wanted to play my best game against the opposition not break records and while doing that if I break records, its a just a reflection of what I have been able to contribute as a player for Indian cricket," he said.

Tendulkar, however, could not hide the glee of achieving the world record against Australia, India's intense rivals of late.

"I would have preferred to get my record earlier. But it's nice that it has come at the right time. Australians are the top side and to get it against them was a special moment

and I treasure this."

He was, though, disappointed to get out on 88 today without making a hundred which would have made the match more memorable for him.

"It's disappointing that I got out, the aim was to stay there till the end and start afresh innings tomorrow but got a good ball. I thought I was a fraction late to judge that ball

and get on the front foot, rather than holding there because the new ball does different things."
Boston University's College of Engineering is a partner launching a major program, under a National Science Foundation grant, to develop the next generation of wireless communications technology based on visible light instead of radio waves.

Researchers expect to piggyback data communications capabilities on low-power light emitting diodes, or LEDs, to create "Smart Lighting" that would be faster and more secure than current network technology.

"Imagine if your computer, iPhone, TV, radio and thermostat could all communicate with you when you walked in a room just by flipping the wall light switch and without the usual cluster of wires," said BU Engineering Professor Thomas Little. "This could be done with an LED-based communications network that also provides light – all over existing power lines with low power consumption, high reliability and no electromagnetic interference. Ultimately, the system is expected to be applicable from existing illumination devices, like swapping light bulbs for LEDs."

This initiative, known as the Smart Lighting Engineering Research Center (, is part of an $18.5 million, multi-year NSF program awarded to Boston University, Rensselaer Polytechnic Institute and the University of New Mexico to develop the optical communication technology that would make an LED light the equivalent of a WiFi access point. This innovative alternative may one day replace most of today's lighting devices.

Rensselaer and UNM will work on creating novel devices along with systems applications to better understand the proliferation of smart lighting technologies plus materials needed for wireless devices to interface with the network. Together with BU, the three partners will have 30 faculty researchers plus students, postdoctoral researchers and visiting industry engineers as regular contributors to the research conducted by the Smart Lighting ERC.

Boston University researches will focus on developing computer networking applications, notably the solid state optical technology that will form the network's backbone. Funding for the BU portion of the program is expected to total about $1 million per year for the next 10 years plus additional funding from industrial partners and possibly the formation of new businesses by entrepreneurs.

"This is a unique opportunity to create a transcendent technology that not only enables energy efficient lighting, but also creates the next generation of secure wireless communications," Little added. "As we switch from incandescent and compact florescent lighting to LEDs in the coming years, we can simultaneously build a faster and more secure communications infrastructure at a modest cost along with new and unexpected applications."

Little envisions indoor optical wireless communications systems that use white LED lighting within a room – akin to the television remote control device – to provide Internet connections to computers, personal digital assistants, television and radio reception, telephone connections and thermostat temperature control.

With widespread LED lighting, a vast network of light-based communication is possible, Little noted. A wireless device within sight of an enabled LED could send and receive data though the air – initially at speeds in the 1 to 10 megabit per second range – with each LED serving as an access point to the network. Such a network would have the potential to offer users greater bandwidth than current RF technology.

Moreover, since this white light does not penetrate opaque surfaces such as walls, there is a higher level of security, as eavesdropping is not possible. LED lights also consume far less energy than RF technology, offering the opportunity to build a communication network without added energy costs and reducing carbon emissions over the long term.

"The innovative LED-based networking research that Smart Lighting ERC is conducting has the potential to be extremely positive and disruptive to the market," said Inder Monga, Leader, Advanced Networking Research at Nortel. "Nortel believes the era of hyperconnectivity is upon us and the potential new applications that this visible light-based networking could enable with its energy efficient qualities, privacy and its ubiquitous nature is very exciting."

The ability to rapidly turn LED lights on and off – so fast the change is imperceptible to the human eye – is key to the technology. Flickering light in patterns enables data transmission without any noticeable change in room lighting. And the technology is not limited to indoor lights; its first real test may very well come outdoors, in the automotive industry.

"This technology has many implications for automobile safety," Little said. "Brake lights already use LEDs, so it's not a stretch to outfit an automobile with a sensor that detects the brake lights of the car in front of it and either alerts an inattentive driver or actively slows the car."
London: In Britain, close to 2 million Indians are feeling the impact of the banking crisis.

The banking crisis in UK has hit Indians hard and it is not just the Indians who work in banks, but also those with shares in banks who are facing problems.

"Lot of Indians have got shares in the bank and what has happened now is that Gordon Brown (UK Prime Minister) has already said that there is not going to be any dividend for the next two years," says financial consultant Shantoo Ruparell.

But, Indians have some protective cushions of their own.

"Indians have more savings ratio, and they are prudent in investing. They never put all their eggs in one basket, they have diversification of their portfolio," Vasudev Patel, Director, Akshar Financial Services, says.

And the young too seem to be following the cautious way.

"You'd be surprised to see the number of 25-35 year old who have followed their parents or grandparents' footsteps in saving money for rainy days. And this is a rainy day now," says Nishma Gosrani.

The old Indian way, strong on saving and wary of overstretched borrowing might just be the right thing now.

And a lot of a shaken world is now headed that way, away from a financial model where you must spend what you do not have - on what you may not need.

Many IT execs have decided to cut overall spending, but relatively fewer are reducing the amount they put toward outsourcing services, according to a Forrester survey

IT service spending might not feel drastic cuts as high-tech leaders look to shave dollars off their budgets, because outsourcers and service providers could help them contain costs and streamline operations, industry analysts say.

A majority of IT executives report they are re-assessing how to invest what's left of their 2008 IT budgets . Many have decided to cut overall IT spending, but relatively fewer are reducing the amount they put toward outsourcing IT services, according to Forrester Research. A recent Forrester survey shows that while 46 percent of 258 Global 2000 enterprises have already cut back their IT budgets, only 21 percent have cut back on their IT services spend.

"The primary value proposition of a good IT services deal for enterprise IT buyers is lowered costs, improved processes and streamlined operations," says Paul Roehrig, principal analyst at Forrester Research.

That means IT executives that currently invest in outsourcing will continue that trend during cost-cutting times, and companies that might not have previously considered sending IT services to an external provider might turn to the delivery model to avoid adding head count or investing in new technology.

"For the enterprise, outsourcing could help the total spending go down even though outsourcing revenue for the service provider would go up," Roehrig says.

For instance, despite reported softness in the third quarter, global sourcing advisory firm TPI anticipates 2008 to outperform 2007 in terms of the outsourcing contracts awarded. The number of contracts awarded until this point is up 5 percent compared to last year, and the total contract value of the deals is up 19 percent. TPI estimates that the global outsourcing market will reach $88 billion in 2008, up 10 percent from the previous year. Specifically business process outsourcing is expected to increase a total of 14 percent to $22 billion, and information technology outsourcing is forecast to be up about 9 percent, bringing revenue to $66 billion.

"Infrastructure-oriented management of servers, desktops, and other IT components is expected to go unchanged, but application development work could be potentially impacted. There will be a downturn in discretionary projects in the short term, but application maintenance won't be affected," says Brian Smith, partner and managing director of financial services operations for TPI North America.

Still the outsourcing industry won't go completely unscathed, according to TPI. TPI reports that the outsourcing industry overall experienced a 22 percent drop in the number of deals from the second to third quarter this year, but the firm attributes that to IT executive caution in late 2007 and a lessened demand in the financial services industry. Still, TPI says it doesn't anticipate certain types of sourcing deals to be cut in reaction to more recent economic woes.

"Because the value for much of outsourcing is efficiency and process management, we don't see any reason the economy would significantly negatively affect those deals," Smith says. "Our view is the same pattern of activity we've seen in 2008 will repeat in 2009."
With election less than three weeks away, study predicts that voting systems in numerous states will fail on November 4

Several U.S. states still are not doing all they can to ensure the accuracy of votes over electronic voting machines, and 10 states received inadequate grades in three of four categories of safeguards, a report from three voting security advocacy groups said.

Somewhere in the United States, voting systems will fail on Election Day Nov. 4, predicted the report, released Thursday by Common Cause, Verified Voting and the Brennan Center for Justice at the New York University School of Law.

On Election Day, "voting systems will fail somewhere in the United States in one or more jurisdictions in the country," the report said. "Unfortunately, we don't know where. For this reason, it is imperative that every state prepare for system failures."

State protections against voting fraud and e-voting machine failure have improved greatly since the last U.S. presidential election, in 2004, said Pamela Smith, president of Verified Voting. But several states still refuse to take basic precautions to protect the integrity of voting systems, she said.

"There are some folks who still don't get it," Smith said.

The report details which states have not taken precautions against fraud or technical errors associated with e-voting machines and other voting systems:

-- Ten states -- Colorado, Delaware, Kentucky, Louisiana, New Jersey, South Carolina, Tennessee, Texas, Utah, Virginia -- received failing grades in three of four voting security areas.

-- Of the 24 states using direct recording electronic (DRE) machines, only three -- California, Indiana, and Ohio -- get satisfactory grades in all four categories, the report said. Colorado, Delaware, Louisiana, Nevada, Texas, Utah, Virginia, and West Virginia have no state-mandated requirement for emergency paper ballots to be available in precincts that use voting machines, in the case of voting machine failure.

-- Nine states -- Alabama, Illinois, Kentucky, Maine, New Jersey, South Carolina, Texas, Utah, and Virginia -- have requirements for ballot accounting that "fall far short" of the groups' recommended best practices.

-- Eighteen states, including Florida, New York, Texas, and Virginia, do not have adequate requirements in place for paper-record backups to e-voting or other nonpaper voting methods. Voter-verified paper records allow states to conduct recounts of voting machine totals, supporters say.

The bug had caused issues with the layout and functionality of Apps pages for several hours

Google has solved a problem that affected the layout and functionality of the "Start" pages of its Apps hosted collaboration and communications suite.

Although the bug had the potential to affect many customers, it manifested itself only in instances when Apps administrators had customized their organizations' Start page, said Rishi Chandra, Google Apps product manager.

The problem arose apparently Thursday afternoon U.S. Eastern Time and was finally solved at around noon on Friday.

Apps administrators who reported problems in the official Apps discussion forum described what they perceived as being an erratic Start page update designed to make it look and act more like iGoogle, the company's personalized home page service for consumers.

However, Chandra said that wasn't the case, although he understands why the administrators would interpret the incident that way, since the iGoogle logo replaced company logos in affected pages. The problem was caused by a system bug that altered Start pages layouts, broke some links and interfered with some "gadget" applications, like the one for Gmail, he said.

With a permanent fix now in place, all affected Start pages should have reverted back to their normal layout and operation without any loss of data or functionality, Chandra said. Google had prematurely declared the problem solved at around 8 p.m. on Thursday, but problem reports kept flowing in.

Google Apps is a hosted collaboration and communication suite aimed at workplace use, and its Start pages are designed as a portal main point of entry for end-users to their applications, such as Calendar and Gmail. Apps' Standard and Education versions are free, while its more sophisticated Premier edition costs $50 per user per year.

The problem was disruptive at New Hope Fellowship in Springdale, Arkansas, which uses the Apps Education edition. The church's Start page was hit intermittently by the bug between Thursday at around 2 p.m. and noon Friday.

"Our users were trained to access their mail through the Start page. Once that didn't work, they could not access e-mail, which is critical to our work. We had to send paper memos around on how to access the mail without going through the Start page. Very frustrating," said Josh Jenkins, New Hope Fellowship's media director and Apps administrator.

This wasn't the only problem New Hope Fellowship's 40 Google Apps users encountered this week. They also lost access to their e-mail due to an unrelated and prolonged Gmail outage that hit some Apps customers this week.

"Google must improve communication with business customers if they wish to be competitive in the corporate IT space. The 2-sentence 'we're working on it' blurbs posted in the [online discussion] groups are an unacceptable way to treat business clients," Jenkins said.

Susan Novotny, Apps Standard edition administrator at a national nonprofit with 30 users in Ontario, Canada, said that the occasional bugs that hit Google Apps "do shake my confidence a little."
Chat Box / IBM, HP lead the way on green IT
Oct 18, 2008, 11:04 AM
Google did not score well in the survey conducted by Gartner and the World Wildlife Fund

If your IT department has decided to "go green," you probably need help from your strategic IT vendors. But which ones?

In an attempt to find out, Gartner analyst Simon Mingay, in partnership with the World Wildlife Fund, sent an 82-question survey to 24 vendors worldwide. His goal was to try to determine which vendors were tackling climate change within their own company, as well as which ones were delivering green products and services to their customers.

A number of key vendors declined to participate, including AT&T , Microsoft , Oracle and Sun .

Of those vendors that did respond, IBM stood out in virtually every category, particularly when it came to its internal green initiatives. HP was also high on the list, with good overall performance.

Cisco  could be doing better, Mingay said. "There's a little bit more talking than doing," he said. Other companies that fall into the middle ground include Nortel , Dell and Lenovo.

Surprisingly, Google did not score well in the survey. The company has more than 1 million servers and therefore is a huge energy user, but it has no greenhouse gas targets, isn't very transparent about its green strategy and is not using much in the way of renewable energy, Mingay said. "We expected a higher score," he said.

Looking at global companies, British Telecom scored the highest of any vendor, while Ericsson and Fujitsu also demonstrated a high level of greenness.

The results of the survey were based on answers provided by the companies, and there was no attempt to verify the information, Mingay cautioned.

Network World is an InfoWorld affiliate

Cupertino (California): Apple Inc on Tuesday cut the price on its entry-level notebook computer to $999 and introduced a line of aluminum-clad machines starting at $1,299 in moves catering to budget-minded buyers at a time when recession fears loom over the global economy.

But shares of Apple, which have risen about 20 per cent since the company last week invited reporters to a notebook event, fell 3 per cent in heavy trade on the Nasdaq to $106.99 after first falling as much as 5 per cent.

Many analysts had expected the entry-level notebook price to fall to $899.

"Bad for the stock today, good for the stock over the next couple of months," said Piper Jaffray analyst Gene Munster, who said that the new machines looked good even if the new entry-level price was not as low as Wall Street had hoped.

Chief Executive Steve Jobs, looking thin but active, put the focus on the new line of MacBooks, although he took a few moments at the end to joke about his health.

His blood pressure was 110 over 70, he said. "And that's all we're going to be talking about Steve's health today," he added lightly, referring to concerns earlier this year that the cancer survivor's health was deteriorating.

He said he would not take questions on the economy or his health.

The new line of metal notebooks, starting at $1,299, are in what Gartner analyst Van Baker called the sweet spot of Apple's line.

Previously a white plastic-body machine held the spot.

"The biggest news is the $1,299 MacBook," he said.

The $999 price will be for an updated model of the white-body notebooks.

The new aluminum machines will use Nvidia Corp graphics and Intel Corp processors.

When asked if Apple would get into the market for small "netbook" notebook computers, Jobs said, "It's a nascent market," and that Apple would see how it went.

Apple also rolled out an $899 24-inch wide display for the new MacBooks.
Chat Box / Adobe ships Flash Player 10
Oct 15, 2008, 11:18 AM
3D capabilities highlighted in upgrade to rich Internet apps technology

Adobe Systems is shipping Wednesday its Adobe Flash Player 10 software, featuring built-in 3D capabilities as well as the ability for developers to add their own special effects.

Concurrent with Flash Player 10, Adobe is shipping Adobe Creative Suite (CS) 4, featuring tools for building creative content, the company said. Tools like Photoshop and Illustrator are featured, offering such functionality as vector graphics.

With Flash Player 10, Adobe is focusing on building "expressive" applications for the Web, said Tom Barclay, Adobe senior product marketing manager for Flash Player. Applications can be deployed including online video, rich Internet applications, online games, and other interactive experiences, according to the company.

Built-in support for 3D is featured, as opposed to the third-party support previously offered. Developers can work in 2D and transform 2D objects into the 3D space, Barclay said. Developers also can build their own 3D libraries, he said.

"It's very easy for developers to be able to add 3D," without knowing 3D math, said Barclay.

Version 10 also features the ability to build custom filters and effects via Adobe Pixel Bender technology, which previously was featured in Adobe After Effects CS4 software. Developers can build motion graphics and special effects.

A new text engine in Flash Player 10 offers multilingual text capabilities and flowable text that can be laid out vertically and horizontally. Other major features in version 10 include dynamic streaming for video playback, supporting multiple bit rates, and advanced audio processing, which enables development of applications like music sequencers.

Early impressions of Flash Player 10 were mostly positive.

"Almost every single feature that's in Flash 10 is going to have a direct impact on what we can do with our product," said Mitch Grasso, CEO and co-founder of SlideRocket, which provides presentation software in a SaaS format.

Just about everything in Flash 10 solves a problem or takes SlideRocket to a different level of performance, Grasso said. Pixel Bender offers special effects capabilities, he said. Typography control for layout of text in presentations also is beneficial, he said.

"The performance improvements that they've done for 3D and full-screen effects really help us," said Grasso. "I would have liked to see them go a little further with the hardware acceleration but that's hardly a criticism."

Flash Player competes with Microsoft's new Silverlight technology in the rich Internet application space. While acknowledging he has not had an in-depth look at Silverlight, Grasso did endorse Flash over Microsoft's offering.

"My impression of Silverlight is that it's just not where Flash is yet," Grasso said. It lacks such capabilities as integration with Adobe AIR (Adobe Integrated Runtime), for running online applications offline, Grasso said.

An Adobe partner, EffectiveUI, is leveraging Flash Player 10 in an application for Intelligence Gaming that provides training for soldiers via a head-mounted display offering 360-degree video, said Anthony Franco, president of EffectiveUI. The 360-degree video is very high-resolution, Franco said. "Flash Player [previously] couldn't handle the resolution of video that we needed this application to do," said Franco. Also enabled with version 10 is high-powered, 360-degree audio, he added.

Flash applications can be built using Adobe's open source Flex framework or with CS4. A key feature in CS4 is simplified workflow for designing across media. Visual performance improvements in Flash Player 10 are leveraged in the suite.

Users of Flash CS4 can apply tweens to objects instead of keyframes, offering greater control over animation attributes. A new Bones tool in Flash CS4 helps build more realistic animations between linked objects. A content-aware scaling tool in Photoshop CS4 recomposes an image as it is resized, preserving vital areas as it is resized, Adobe said.

Flash Player 10 will be offered as a free download on Adobe's Web site.

Innovations in Flash Player 10 will contribute to the Adobe Open Screen Project, such as work to bring Flash Player 10 to mobile devices, Adobe said. The Open Screen Project is an industry effort to provide rich, multi-screen experiences across PCs, devices, and consumer electronics.
ScienceDaily (Oct. 15, 2008) — Rob Cardinal was looking for an asteroid, but ended up finding a comet.

It is the first time a comet has been discovered at the University of Calgary's Rothney Astrophysical Observatory, which is located about 35 kilometres southwest of Calgary, and only the second Canadian discovery of a comet using a Canadian telescope in nearly a decade.

On Oct. 1, Cardinal thought he saw something move while observing a patch of sky near the North Celestial Pole while using the observatory's Baker-Nunn telescope. A subsequent computer analysis of the images taken showed a moving object that, although faint by visual standards, was actually exceptionally bright for what was a suspected asteroid at the time.

A few more pictures taken about a week later verified that a never-before-seen member of our solar system had been discovered. It was confirmed by other observations by astronomers in the U.S. and Japan and the Minor Planet Center, based at Harvard University, that it was a new comet. As per protocol, it was named after Cardinal and is officially designated as C/2008 T2 Cardinal.

"I was so excited when I found out," says the astronomer. "It's satisfying to see your hard work pay off."

Russ Taylor, the head of the Physics and Astronomy department, called the find a tribute to the team of scientists and the dark sky quality at the observatory.

"Alan Hildebrand, who holds the Canada Research Chair in Planetary Science, and his research team at the Rothney have put together the premier wide-field telescope for space imaging in Canada. The discovery of comet Cardinal is an exciting achievement," he said.

There is not much known yet about the Cardinal comet. U of C scientists are trying to determine more information about its orbit, whether its passing by Earth is periodic or whether it will only come by the sun once, which would mean its orbit is parabolic.

"The vast majority of the known comets, and the comets now being discovered, are found near a region of the sky called the ecliptic - that's because their orbits are similar to the orbits of the planets," says Phil Langill, the observatory's director.

"Comet Cardinal is on a very unusual orbit compared to normal solar system objects – it's almost 60 degrees out of alignment with all the others. It is currently near the north star. It was brilliant for Alan and Rob to search that part of the sky, because everyone else is looking where the likelihood of asteroid discovery is high."

Cardinal says the comet is visible right now only in the northern hemisphere until June and after that it will be visible, and likely brighter, in the southern hemisphere.

Langill says that if you could get hold of cometary material, you would be holding a 4.5 billion year old piece of history, with clues about how things were when the Sun and the solar system came together. Comet Cardinal is made up of bits of debris and ice left over when the solar system was created.

Langill adds he credits the local community for remembering to keep their lights off at night. The observatory has been working with the MD of Foothills to educate folks about smart lighting choices, light abatement, and what the astronomers at the U of C's observatory do.

"This discovery can, in part, be attributable to them," he says.
Wednesday, October 15, 2008 08:15 [IST]

NEW DELHI: India, the world's largest foodgrain producer, also has the world's largest hungry population, over 200 million. It ranks a poor 66th among 88 developing and transitional countries on the 2008 Global Hunger Index (GHI-2008), says a report by Washington-based International Food Policy Research Institute (IFPRI).

GHI-2008 measured hunger on three fronts - proportion of people undernourished or calorie deficient; child malnutrition (underweight children under 5 years of age) and child mortality rates (malnutrition or disease deaths of children under 5 years).

The report found that hunger was a major threat in 33 countries, including India, owing to rising food prices. The fact that food importers outnumbered exporters implied many more countries were likely to suffer from higher prices.

Despite years of robust economic growth, India scored worse than nearly 25 sub-Saharan countries like Kenya, Nigeria, Cameroon, Congo and Sudan, and all of South Asia, except Bangladesh, which ranked 70th. This was in spite of the fact that the per capita income in the African countries was much lower than India's.

India's slightly better performance over Bangladesh was because of higher agricultural productivity. But it fared worse than Bangladesh in child mortality.

Among the better-fed countries, Mauritius ranked 1st, followed by Jamaica, Moldova, Cuba and Peru. China ranked 15th, Thailand 23rd, Sri Lanka 39th, Nepal 57th and Pakistan 61st.

The figures were arrived at by making use of data from National Family Health Survey-3 and National Sample Survey Organisation.

India State Hunger Index (ISHI) was measured for the first time in this exercise. Among the 17 major Indian states, Madhya Pradesh had the most severe level of hunger, extremely alarming, followed by Jharkhand and Bihar. Hunger levels ranged from serious to extremely alarming, with 12 states in the alarming category. Not one state had low hunger or moderate hunger. The best state, Punjab, and others like Kerala, Haryana and Assam, fell in the serious bracket.

When compared to other countries in the index, Madhya Pradesh ranked 81st, level with Chad, and Punjab was 33rd, below Gabon, Honduras, and Vietnam. Maharashtra and Orissa were ranked 66th, equivalent to India while Gujarat ranked 69th with Haiti. Rajasthan, Uttar Pradesh and Tamil Nadu were 60th with Guinea.

Even states with high economic growth like Gujarat, Chhattisgarh, and Maharashtra had high levels of hunger, while states with relatively lower economic growth, like Punjab, achieved a lower hunger level.

"Hunger and malnutrition are often rooted in poverty. Part of the solution rests with increasing investments in agriculture and poverty reduction programmes," said Ashok Gulati, IFPRI director in Asia.

India's poor performance was driven by its high child under-nutrition and calorie insufficiency. Underweight children accounted for the greatest contribution to the ISHI in most states, followed by calorie deficiency and child mortality. In states like Kerala and Tamil Nadu calorie deficiency contributed as much as child underweight.
LONDON: Britain is set to cut nearly 10,000 jobs from its Ministry of Justice as part of a fresh round of budget cuts to battle the tough economic climate, The Times newspaper said on Tuesday.

The report said the government planned to make 900 million pounds ($1.58 billion) of savings at the department, which was created just 18 months ago. The job losses represent around a tenth of the division's workforce.

The Ministry of Justice could not immediately be reached for comment.
Hyderabad, Oct 15 (ANI): The country''s first International Exhibition and Conference on Civil Aviation "India Aviation 2008" will begin here today.

The four-day event is being jointly organised by the Ministry of Civil Aviation and the FICCI, with the United States being the partner country.

The exhibition, to be held at city''s Begumpet Airport, will showcase the development of Indian Civil Aviation sector and a theme pavilion displaying rare photographs and models will highlight its past, present and future.

Minister for Civil Aviation Praful Patel will inaugurate the event and Andhra Pradesh Chief Minister YS Rajasekhara Reddy will be the chief guest while eminent speakers from the aviation sector across the globe will present key-note addresses.

A fly-past by Surya Kirans from Indian Air Force (IAF) followed by para sailing, para-jumping and hot-air ballooning by Aero Club of India will mark the opening ceremony.

A new Airbus-319 will be inducted to Air India fleet, coinciding with the closure of inaugural function while another highlight will be arrival of the largest passenger aircraft in the world, Airbus A-380 from France.

The event will provide a platform to forge new partnerships between global and domestic companies. Around 35 CEOs from major aviation companies will discuss their future plans and policy issues. (ANI)
Chat Box / How to manage a worldwide IT team
Oct 14, 2008, 07:57 PM
Surviving the tech manager's global squeeze


More and more IT projects involve teams from around the world, and project leaders are asked to work 24/7. It's time to stop the madness.

It's the new reality of IT: working as part of a global team, with coworker and outsourcers all over the world, coordinated by a project manager at headquarters. But that reality can be ugly, as managers are stretched across time zones, with no such thing as being off the clock. Work quality, commitment, and communications vary considerably, putting the burden on the manager caught in the middle to make it all work -- from thousands of miles away.

For many companies, the results are bad: Thousands, sometimes millions of dollars in wasted efforts. Software and other tech projects that don't deliver as promised. Burned-out IT managers who leave if they can, and give up if they can't.

[ Frustrated at in your IT job? Check out InfoWorld Advice Line columnist Bob Lewis' sage advice | Looking for a change? Make sure you have the 30 skills every IT person should have. ]

Unfortunately, there's no easy solution. Making global project management work requires compromises all around, compromises to which executive management are often blind and that teams in different countries see only partially, making it hard to come to a common arrangement.

Caught in the middle: Stories from the inside
Consider the case of Jill (not her real name), a project manager in a global consumer products firm. She works in the United States, but the hardware and software development teams are in India, China, and Sweden. The Swedes refuse to work outside local business hours, so she has to have meetings with them between midnight and 7 a.m. in her time zone. The Indians typically give positive status reports but say nothing when they miss delivery schedules -- even when she asks directly -- so Jill can't trust what they say and has no idea what the project status really is. The Chinese often implement code strictly to specification, not raising issues when the intent of the project isn't supported by the specs. Quality suffers. They don't respond to her requests to raise such issues before completing the code.

Jill says her U.S. managers don't care about any of these issues, saying it's her problem to figure out and that all that matters is that something ships on schedule. She's still at the company, but actively looking to leave.

At a major pharmaceutical company, Darren (also not his real name), had a similar Alice in Wonderland experience, dealing with outsourcers in India. Darren knew that something was wrong with the offshoring project on his first day on the job, when he couldn't find the on-site relationship manager. It took a whole week to locate him. The pharmaceutical company never considered the outsourcing staff to be part of the team, Darren says. So -- surprise, surprise -- the offshore team wasn't well integrated with the company's own staff, there were big communication issues, and deadlines and project goals weren't being met.....To be continued.
Oct 14, 2008, 07:42 PM
New Delhi: As many as four people were injured when a crude bomb kept on a bicycle in Kanpur exploded on Tuesday evening.

The incident occurred in Karnalganj, a crowded and communally sensitive area.

Police have been deployed in the place, which is tense after the explosion.

Hari Prasad Verma, the Senior Superintendent of Police of Kanpur, told CNN-IBN as yet the blast was not being considered as a terrorist attack.
New Delhi: The Supreme Court on Tuesday asked the Centre to fill all vacant seats in central educational institutions for Other Backward Classes (OBC) with general category students by the end of October.

The order would benefit general category students hoping to get admissions. The court said that allowing vacant quota seats to be carried over to the next year would be a waste of a precious resource.

It also made it clear that the cut-off marks for OBC candidates cannot be lowered beyond 10 per cent from that of general category students.

The court on September 29 had disapproved the Government's plan to keep vacant for at least three years the seats reserved for backward category students in the state-run higher educational institutions if all such quota seats are not filled.

"Don't allow the seats to be vacant," a five-judge constitutional bench, headed by Chief Justice K G Balakrishnan had said.

"You cannot keep the OBC quota seats vacant as per our judgment. You want to keep the vacancy accumulate for three years? We have already clarified in our judgment and said categorically that the unfilled seats must go to general category. Keeping seats vacant will be counter-productive," the bench had said.

The bench was hearing a lawsuit seeking clarification on the court's April 10 verdict upholding the law for 27 percent quota for OBCs in state-run institutions of higher learning.

The plea sought to know from the apex court whether the seats, reserved for OBC students but left vacant owing to the their paucity, could be allocated to general category students.

It also sought to know whether the cut-off marks for the admission to the OBC students could be relaxed beyond 10 percent of the cut-off marks fixed for general category students.
Tata Motors Tuesday said its UK subsidiary Tata Motors European Technical Centre Plc has acquired majority stake in Norwegian electric vehicle firm Miljo Grenland Innovasjon, with which it is developing the electric car Indica in the country.

The company has acquired 50.3 percent holding in Miljo for 12 million krone (Rs.20 million), a company statement said.

"Miljo will produce electric vehicles based on Tata Motors' products, besides manufacturing state-of-the-art super polymer lithium ion batteries and the development of related technologies," it said.

The investment would help Tata Motors realise its strategy to develop convenient, affordable and sustainable mobility solutions through electric and hybrid vehicles, it added.

The first such vehicle to be developed by the company would be the electric version of Indica.

It is scheduled for launch in Europe next year. The car - Indica EV - would be capable of carrying four people with a predicted range of up to 200 km and acceleration of 60 km per hour in less than 10 seconds.
Islamabad: Pakistan and China are expected to sign a civil nuclear agreement during President Asif Ali Zardari's maiden state visit to the Communist nation, the country's envoy to Beijing said on Tuesday.

Both countries have always supported the peaceful use of civil nuclear energy and an agreement in this connection is expected to be signed during the President's visit to China which began on Tuesday, Ambassador Masood Khan said.

The two countries will ink several agreements in the fields of technology, agriculture and minerals. They will also sign an investment protocol to their existing free trade agreement to boost investments in Pakistan, he told Geo News channel.

Though Khan did not give details of the proposed civil nuclear pact, official sources were quoted by The Nation newspaper as saying that a nuclear deal with China would be the "main item" on Zardari's agenda.

An official told the newspaper that Zardari would seek a nuclear deal with China to meet Pakistan's increasing energy needs.

"What we need from our Chinese friends is the building of new nuclear reactors with their help and indications are already there that they will not disappoint us," the official said.

The government led by Zardari's Pakistan People's Party is under pressure from domestic political circles to seek a civil nuclear deal with China to match the atomic pact finalised between India and the US.

Prime Minister Yousuf Raza Gilani has urged the US to extend a similar deal to Pakistan and called on the world community not to discriminate between Pakistan and India in this regard
Chat Box / Mozilla Labs pursues Web dev tools
Oct 14, 2008, 11:15 AM
AJAX experts to lead Mozilla's effort to create development tools for the open Web

Dissatisfied with the Web development tools already available, researchers at the newly formed Developer Tools Lab at Mozilla Labs intend to find better options.

Announced Monday, the lab will be led by Dion Almaer and Ben Galbraith, who founded the Ajaxian Web site, which is focused on AJAX issues. The lab will center on research and development of developer tools for the "open" Web, according to the Mozilla Labs Web site.

"We've been talking to Mozilla for a while and thinking about how the Web has been lacking in tool support and how life has been too hard for developers," said Almaer, who until recently had worked at Google as a Web advocate. "We had a couple of ideas."

He acknowledged there are tools already on the market for Web development but said these have not changed drastically for a quite a while. Developers now build AJAX applications in a different fashion and are building complex systems on the Web. No tools really help developers with this, he said.

The labs' efforts will cover everything from services for developers to reference materials and a full-blown code editor, said Galbraith, who had worked as CIO at MediaBank before joining the lab. The tools will be free and offered by Mozilla; most likely, other vendors will participate as well, he said.

Issues like determining idiosyncrasies of different browsers will be addressed by the lab. A team of six to eight persons is being built up to staff the lab. Developers through the lab could have a service, such as a place to store code artifacts online.

Galbraith said the group's activities potentially could conflict with the Eclipse Foundation's Web Tools Platform Project activities, but it was still too early to tell.

Funding for the lab's activities will come from Mozilla and perhaps other vendors.
ScienceDaily (Oct. 14, 2008) — The more alcohol an individual drinks, the smaller his or her total brain volume, according to a new report.

Brain volume decreases with age at an estimated rate of 1.9 percent per decade, accompanied by an increase in white matter lesions, according to background information in the article. Lower brain volumes and larger white matter lesions also occur with the progression of dementia and problems with thinking, learning and memory. Moderate alcohol consumption has been associated with a lower risk of cardiovascular disease; because the brain receives blood from this system, researchers have hypothesized that small amounts of alcohol may also attenuate age-related declines in brain volume.

Carol Ann Paul, M.S., of Wellesley College, Mass., and colleagues studied 1,839 adults (average age 60) who were part of the Framingham Offspring Study, which began in 1971 and includes children of the original Framingham Heart Study participants and their spouses. Between 1999 and 2001, participants underwent magnetic resonance imaging (MRI) and a health examination. They reported the number of alcoholic drinks they consumed per week, along with their age, sex, education, height, body mass index and Framingham Stroke Risk Profile (which calculates stroke risk based on age, sex, blood pressure and other factors).

"Most participants reported low alcohol consumption, and men were more likely than women to be moderate or heavy drinkers," the authors write. "There was a significant negative linear relationship between alcohol consumption and total cerebral brain volume."

Although men were more likely to drink alcohol, the association between drinking and brain volume was stronger in women, they note. This could be due to biological factors, including women's smaller size and greater susceptibility to alcohol's effects.

"The public health effect of this study gives a clear message about the possible dangers of drinking alcohol," the authors write. "Prospective longitudinal studies are needed to confirm these results as well as to determine whether there are any functional consequences associated with increasing alcohol consumption. This study suggests that, unlike the associations with cardiovascular disease, alcohol consumption does not have any protective effect on brain volume."

This study was supported by a contract from the National Heart, Lung, and Blood Institute's Framingham Heart Study, National Institutes of Health; grants from the National Institute on Aging; and a grant from the National Institute of Neurological Disorders and Stroke.
ScienceDaily (Oct. 14, 2008) — The American Academy of Pediatrics (AAP) is doubling the amount of vitamin D it recommends for infants, children and adolescents. The new clinical report, "Prevention of Rickets and Vitamin D Deficiency in Infants, Children, and Adolescents," recommends all children receive 400 IU a day of vitamin D, beginning in the first few days of life.

The previous recommendation, issued in 2003, called for 200 IU per day beginning in the first two months of life.

The change in recommendation comes after reviewing new clinical trials on vitamin D and the historical precedence of safely giving 400 IU per day to the pediatric population. Clinical data show that 400 units of vitamin D a day will not only prevent rickets, but treat it. This bone-softening disease is preventable with adequate vitamin D, but dietary sources of vitamin D are limited, and it is difficult to determine a safe amount of sunlight exposure to synthesize vitamin D in a given individual. Rickets continues to be reported in the United States in infants and adolescents. The greatest risk for rickets is in exclusively breastfed infants who are not supplemented with 400 IU of vitamin D a day.

Adequate vitamin D throughout childhood may reduce the risk of osteoporosis. In adults, new evidence suggests that vitamin D plays a role in the immune system and may help prevent infections, autoimmune diseases, cancer and diabetes.

"We are doubling the recommended amount of vitamin D children need each day because evidence has shown this could have life-long health benefits," said Frank Greer, MD, FAAP, chair of the AAP Committee on Nutrition and co-author of the report. "Supplementation is important because most children will not get enough vitamin D through diet alone."

"Breastfeeding is the best source of nutrition for infants. However, because of vitamin D deficiencies in the maternal diet, which affect the vitamin D in a mother's milk, it is important that breastfed infants receive supplements of vitamin D," said Carol Wagner, MD, FAAP, member of the AAP Section on Breastfeeding Executive Committee and co-author of the report. "Until it is determined what the vitamin D requirements of the lactating mother-infant dyad are, we must ensure that the breastfeeding infant receives an adequate supply of vitamin D through a supplement of 400 IU per day."

The new recommendations include:

    * Breastfed and partially breastfed infants should be supplemented with 400 IU a day of vitamin D beginning in the first few days of life.
    * All non-breastfed infants, as well as older children, who are consuming less than one quart per day of vitamin D-fortified formula or milk, should receive a vitamin D supplement of 400 IU a day.
    * Adolescents who do not obtain 400 IU of vitamin D per day through foods should receive a supplement containing that amount.
    * Children with increased risk of vitamin D deficiency, such as those taking certain medications, may need higher doses of vitamin D.

Given the growing evidence that adequate vitamin D status during pregnancy is important for fetal development, the AAP also recommends that providers who care for pregnant women consider measuring vitamin D levels in this population.
Mumbai: India's biggest private carriers Jet Airways and
Kingfisher Airlines announced late on Monday night that
they have forged an alliance.

Jet Airways chairman Naresh Goyal and his Kingfisher Airlines
counterpart Vijay Mallya issued a joint press statement in
Mumbai after a marathon meeting.

The alliance is of wide-ranging proportions that will help both carriers reduce costs, synergise operations and improve services, say the allies.

The alliance will offer "a wider choice of air travel options to consumers with immediate effect. The two airlines will be able to rationalize their operations and derive the maximum synergies and thereby offer the best possible fares for the benefit of the consumers," said Goyal and Mallaya in the joint press statement.

There will, however, not be any mutual equity investments between the two companies, the statement added.

"The alliance will also enable a stabilization of the Indian aviation industry in the larger public interest, especially for the benefit of the customer during the current downturn of the world economies," the statement maintained.

In the current environment of high costs and declining growth this alliance has potential for substantial savings resulting in a benefit to the consumer.

The scope of the alliance will include:

    * Code-shares on both domestic and international flights subject to DGCA approval

    * Interline/special prorate agreements to leverage the joint network deploying 189 aircraft and offering 927 domestic and 82 international flights daily

    * Joint fuel management to reduce fuel expenses

    * Common ground handling of the highest quality

    * Cross selling of flight inventories using the common global distribution system platform

    * Joint network rationalization and synergies

    * Cross utilization of crew on similar aircraft types and commonality of training as also of the technical resources, subject to DGCA approval

    * Reciprocity in Jet Privilege and King Club frequent flier be continued.
Chennai: Refusing to acknowledge the political "party" formed by a group of his fans last week, Tamil superstar Rajinikanth Monday said no one could "force" him to enter politics.

He also warned of legal action against people using his name for political gains.

"While no one can stop me from entering the political arena, nobody can force me to do so as well. Legal action will be initiated against those who use my name for political ends," the actor said in a statement faxed to media offices.

He, however, said his fans were free to follow political parties of their choice.

This is the third time that the icon has turned down requests from fans to carve out a political career.

While his refusal in 1996 had seen his popularity zoom, it suffered a setback when he did the same five years later.

A fledgling group of his fans' associations in Coimbatore had announced the formation of a "party" a few days ago and expressed hope that the actor and his followers would endorse it.

Rajinikanth's announcement is seen as a snub to the move.

Rajinikanth cut short his shooting schedule in the US for his forthcoming venture Robot earlier this month to galvanise his fan clubs following the flop of his latest film Kuselan.
CHENNAI, INDIA: consumer Internet and enterprise services provider Sify Technologies Limited today announced that it received the Brandon Hall Excellence in Learning award for the third consecutive year.

Sify's entry, a 3D online training program developed using Second Life, won the Gold award in the 'Best Use of Virtual Worlds for Learning' category, said a press release.

The Brandon Hall Excellence in Learning Award is annually presented by the Brandon Hall Research, a leading research firm in training and development.
The award acknowledges exceptional work in the development and application of innovative learning technology.

Sify won Gold for the project titled "3 Hours – Execution of Forced Outage" developed for GE Contractual Services.

The objective of the training program was to elicit time-critical strategic behavior in response to a forced outage situation. Sify, using Second Life (SL)- the virtual 3D world, created an innovative online training environment with secured access, and provided the ability to closely mimic a virtual power plant in 3D, the release added.

CVS Suri, chief operating officer, Sify Technologies, said, "We are delighted to win a Gold Brandon Hall Award for the third time in a row. This award is a validation of our commitment to innovation, and high recognition of our meticulous design effort to provide our customers with the best of learning outcomes."

"The online 3D Virtual Learning Environment (VLE) was Sify's answer to the growing need among global organizations to combat the twin training issues of reaching out to the vast geographical spread of intended learners and providing constant observation by a training coordinator. This award is also a validation of the huge potential of the online training games market," he added.
Brandon Hall, Ph.D., chairman of the awards program, said.

"We are so impressed with the quality of this year's winning entries. These winners set the standard for what innovative learning looks like today."

The statement reported that it received a total of 246 entries and independent judges from around the world evaluated the entries.

This year's winners of the Brandon Hall Excellence in Learning Awards were honoured at the 2008 Innovations in Learning Conference, held in San Jose, California, the release added.

MUMBAI, INDIA: Sun Microsystems today announced that it has earned a leadership position in the India External Storage market in terms of Customer Revenue for the quarter ended June 30, 2008.

Sivasankaran Lakshminarayan, director- Storage Practice, Sun Microsystems India said, "Sun has earned the no.1 spot in the India external storage market. This underscores the fact that our strategy and products are in line with our customers' requirements."

"Sun today offers the strongest product portfolio across both open systems and mainframes and over the last few years, Sun External Storage has been gaining momentum in India with new customers across verticals and improved channel performance," he added.

As per IDC's Asia/Pacific Quarterly Disk Storage Systems Tracker, Q2 2008, September 2008 release, Sun Microsystems garnered 22 per cent market share in customer revenue terms for the period Q2 CY 2008 (April - June), said a press release.

The India External Storage market grew 48 per cent year on year  (Q2 2008 over Q2 2007) in customer revenue terms, whereas Sun's market share in the India External Storage market grew 103 per cent during the same period.

According to Sankalp Shrie, senior manager, Computing Products Research, IDC India, "Sun has been a leading player in the External Storage market in the country and the latest figures ratify this. The significant increase in Sun's market share (from 16 per cent in Q2 2007) can be attributed to product innovation combined with their excellent sales and marketing effort."

Sun Microsystems also announced that as per Gartner's Quarterly Statistics: Disk Array Storage, Asia/Pacific and Japan report, released in June 2008, it has earned a leadership position in the External Storage market in India with 22.2 per cent market share in revenue terms for the period Q2 CY08.
NEW DELHI,INDIA: Leading IT services, business solutions and outsourcing firm Tata Consultancy Services (TCS) today has a signed a deal with the Ministry of External Affairs (MEA), Government of India, for the Passport Seva Project (PSP), the largest mission-critical e-governance project valued at over Rs 1000 crore.

After implementation of the project, which will be managed by TCS, the Ministry expects that the process of issuing a new passport will be completed in three working days while passports issued under the Tatkal scheme will be dispatched on the same day, subject to address and police verification of applicants.

"This PSP, based on a public-private partnership model, aims to provide passport-related services to Indian citizens in a speedy, convenient and transparent manner. The government will open 77 passport filing centres across the country," said Shivshankar Menon, foreign secretary of Ministry of External Affairs.

During the last eight years, the number of passports issued has almost tripled from 2.2 million in 2000 to six million in 2008.

It is expected that the ministry will issue 10 million passports in 2011. The project will be implemented within a Buy-Own-Operate-Transfer or BOOT framework with pilot projects operation within 19 months. TCS will have end-to-end responsibility of implementing this project.

"We believe that this mission mode project of national importance will make delivery of passport services truly world class in nature. We are delightful to partner with the Ministry and will surely initiate special security for PSP," said S Ramadorai, CEO and managing director of TCS.

"This project reiterates TCS' commitment to help government deliver citizen services more efficiently through technology and process improvements and will transform passport service delivery to the citizens of India," he added.

The PSP would digitize the entire passport services lifestyle and allow online filing of applications. Applicants also have the alternative option of filing the Intelligent Character Recognition (ICR)-enabled form, which along with all relevant documents will be scanned and submitted at passport facilitation centres.

These centres will be the primary hubs that will support all activities like biometric capture, photograph, payment and verification and grant of passports in the presence of applicants for most cases.

Tanmoy Chakrabarty, VP of Global Government Business Group said, "After the successful implementation of the MCA-21 program, the PSP will enable citizens to enjoy the benefits of a technology-led, service oriented approach to passports while ensuring that the proper security, safety and safeguards are maintained".

A call centre would be established to help the applicants with information regarding passport procedures and the status of submitted requests.
©CyberMedia News
Music lovers who listen to their MP3 players at high volumes risk permanent hearing loss in just five years, scientists warned today.

Up to 10million people could be at risk, said the EU Scientific Committee on Emerging and Newly Identified Health Risks (SCENIHR).

The quality of music reproduction on the personal stereos is now so good that more people are turning up the volume.

A report from SCENIHR estimated that five to 10 per cent of personal music player users risk permanent deafness if they listen for more than an hour a day at high volume settings for at least five years.

And if that sounds like a low risk, European Commission officials pointed to the rising numbers of people who plug themselves into loud music every day just for journeys to and from school or work.

Add up the hours and the decibels, they said, and the number in the EU risking some permanent hearing loss is put at between 2.5 and 10million people.

An EU safety standard already exists restricting the noise level of personal music players to 100 decibels, but the scientists said the danger level is long-term exposure to music pumped into the ears above 89 decibels.

At that level, users of personal music players are exposed to higher noise levels than currently allowed in factories after just five hours listening.

The European Commission will now look into whether technical improvements could minimise damage.

The Commission ordered today's study from the independent committee because of the soaring numbers routinely exposed to high noise volumes through personal players.

EU Consumer Affairs Commissioner Meglena Kuneva, said the scientists had now clearly signalled "cause for concern" and she would be organising a conference early next year with governments, the music industry and consumers "to discuss the way forward".

Ms Kuneva said: 'I am concerned that so many young people, in particular, who are frequent users of personal music players and mobile phones at high acoustic levels, may be unknowingly damaging their hearing irrevocably.

'The scientific findings indicate a clear risk and we need to react rapidly. Most importantly we need to raise consumer awareness and put this information in the public domain.

'We need also to look again at the controls in place, in the light of this scientific advice, to make sure they are fully effective and keep pace with new technology.'

Meanwhile the Commission today offered some helpful advice - turn down the volume, or, if possible, set the machine's maximum usable volume at a lower level to save the ears while retaining the satisfaction of turning the music up full.

Officials say the problems of exposure to "leisure noise" are not new, but sales of personal music players have been soaring recently.

In the last four years, almost 250million "portable audio devices" are estimated to have been sold, as well as up to 165million MP3 players.

Between 50million and 100million people in the EU may be listening to portable music players on a daily basis.

One thing today's study does not address is the other risk to the personal music generation - a thump from their neighbours on trains and in streets from irritating noise "leakage" from their high volume music.

A Commission statement simply observed: 'Environmental sounds to which the general public is exposed - such as noise from traffic, construction, aircraft or from the neighbourhood - can be very irritating but are in most cases not loud enough to harm hearing.'

Baikonur (Kazakhstan): US video game magnate Richard Garriott blasted off into space aboard a Russian rocket on Sunday watched by his father, a NASA astronaut who went into space at the height of the Cold War.

The Russian Soyuz TMA-13 spacecraft lifted off in clear weather from the Baikonur Cosmodrome on the Kazakh steppes just after 1.00 pm (3 am EDT).

A video game developer from Texas, Garriott paid $35 million to fly into space alongside US astronaut Michael Fincke and Russian cosmonaut Yury Lonchakov.

Garriott's father, Owen, watched the blast off through binoculars on an observation platform and Garriott's girlfriend, Kelly Miller, burst into tears.

"I am very happy for him. It is one of the things he really wanted to do," Miller said as others opened Champagne to celebrate the successful launch.

"I can see he is really enjoying it like a little kid in the candy shop," Miller said.

Space officials said the Soyuz rocket had reached orbit safely and would dock with the International Space Station in about two days.

"He made it, he made it into orbit. It is marvelous," said Owen Garriott, a physicist who was selected as an astronaut by NASA for his scientific background. He spent 60 days in space in 1973 and another ten days in 1983.

After 10 days in space Garriott will return to Earth with the ISS's former crew aboard a Soyuz re-entry vehicle, a three-person capsule which has malfunctioned on its last two flights.

In April, a Soyuz capsule landed 420 km (260 miles) off course after explosive bolts failed to detonate before re-entry, sending the craft into a steep descent.

Last year, a Soyuz capsule carrying Malaysia's first astronaut also made a so-called "ballistic" landing, similarly blamed on faulty bolts.

New law will also enforce cigarette-style health warnings on drinks to curb binge drinking

LONDON: On Friday night the Envy nightclub in Notting Hill was offering groups of women free bottles of wine as part of the Crazy Sexy Cool Party promotion. This is not unusual. Pubs, bars and night clubs around the world have always discriminated in favour of women. But the British government wants to ban bars offering free alcohol to women in an attempt to curb public drunkenness.

Bars have been the main culprits in offering free drinks and happy hours to women in the hope that it will lure more men into their premises. Blighted with the curse of binge-drinking, the government wants to transform social attitudes towards drinking by breaking the association between alcohol and sexual, financial and social success.

A proposal drafted by the Home Office and the Department of Health marks a much-needed hardening of attitude towards the failure of a voluntary code to cut binge drinking. Hospital admissions linked to excessive drinking have more than doubled in the past 10 years. Past surveys have found that young women are the worst offenders of over-indulgence of alcohol and the related crimes.

The proposed mandatory code of practice includes such rules as cigarette-style health warnings where alcoholic drinks are sold, curb on promotional free wine, whiskey and beer tastings, and a ban on drinking games such as downing a glass in one and drink all you like offers.

Health experts have welcomed the move. They argue that finally the government has acknowledged that hopes that Britain would adopt a civilised culture towards drinking despite the introduction of 24-hour opening of pubs and bars have failed.
Chat Box / The legend's history
Oct 13, 2008, 12:19 PM
                                                                    Albert Einstein, 1921

     14 March 1879(1879-03-14)
     Ulm, Württemberg, Germany
     18 April 1955 (aged 76)
     Princeton, New Jersey, USA
            Germany, Italy, Switzerland, USA
            Germany (1879–96, 1914–33)
            Switzerland (1901–55)
            United States (1940–55)
          Ashkenazi Jewish
             Swiss Patent Office (Berne)
             University of Zurich
             Charles University, Prague
             ETH Zurich

             Prussian Academy of Sciences
             Kaiser Wilhelm Institute
             University of Leiden
             Institute for Advanced Study
Alma mater    
              ETH Zurich
              University of Zurich
Doctoral advisor    
                    Alfred Kleiner
Other academic advisors    
                                Heinrich Friedrich Weber
Notable students
                      Ernst G. Straus
Known for    
            General relativity
            Special relativity
            Brownian motion
            Photoelectric effect
            Mass-energy equivalence
            Einstein field equations
            Unified Field Theory
            Bose–Einstein statistics
            EPR paradox
Notable awards    
                   Nobel Prize in Physics (1921)
                   Copley Medal (1925)
                   Max Planck Medal (1929)

Chat Box / Was Einstein a great diplomat?
Oct 13, 2008, 11:09 AM
Albert Einstein, undoubtedly the greatest scientist the world ever produced, had diplomatic skills too, a new set of letters has revealed. The letters, penned by Einstein, contain his views on how to deal with a belligerent Soviet Union (now Russia) after World War II—all the four mails are to go under the hammer at an auction house in London later this week.

"Better to let Russia see that there is nothing to be achieved by aggression but there are advantages in joining (a world government): then the Russian regime's attitude will probably change and they will take part without compulsion," Einstein wrote to his correspondent Walter Marseille in 1948.

Psychoanalyst Marseille, who promoted the idea of a world government in a paper titled 'A Method to Enforce World Peace', had dispatched it to the scientist for his view.

In a later missive, Einstein again advocated a diplomatic approach: "The attitude of the Russians, it seems to me, clearly shows that they are deeply concerned about the military industrial situation, and that they would be prepared to make considerable concessions if some degree of relaxation was permitted." In a third letter he wrote to Marseille: "In my view it is much better, both morally and practically, to attempt to bring about a state of affairs in which the Russians, out of pure self interest, find it preferable to give up their separatist position."
European and Asian stocks fell sharply in response to the Dow's third biggest one-day point loss as finance ministers from the G7 leading industrial countries were due to meet in Washington Friday to discuss the current economic crisis.

A trader on Frankfurt's DAX stock exchange feels the pressure of Friday's plunge.

A trader on Frankfurt's DAX stock exchange feels the pressure of Friday's plunge.

Stock futures also pointed to another dismal opening on Wall Street -- industrials futures plunged 250 points ahead of the opening bell -- after the Dow plunged 679 points, or 7.3 percent, on Thursday to close at its lowest point since May 21, 2003.

London's FTSE, the CAC in Paris and the XETRA DAX in Frankfurt, Germany were all down 10 percent at one stage Friday before recovering a little lost ground.

In London banking shares which had regained some ground following the British government's $87 billion bailout announcement earlier in the week, suffered heavy falls.

Russian government financial officials again indefinitely suspended trading on its stock exchanges -- a move they have taken several times this week to avoid share price plunges and surges. Read Todd Benjamin's blog

Russia's lower house of parliament, the Duma, also approved measures worth $86 billion to assist banks hit by the credit freeze.

Austria suspended trading in Vienna after the opening bell brought a 10 percent plunge, but reopened after several hours.

In Asia Japan's Nikkei Exchange closed down 9.6 percent, its biggest one-day percentage loss since the stock market crash of October 1987, to close out its worst week in history despite the Bank of Japan injecting 4.5 trillion yen ($45 billion) into financial markets. Video Watch Todd Benjamin on the markets »

"Selling is unstoppable in New York and Tokyo," Yutaka Miura, a senior strategist at Shinko Securities Co. Ltd. in Tokyo told The Associated Press. "Investors were gripped by fear."

The Australian All Ordinaries index closed more than eight percent lower, and South Korea's KOSPI index finished the day off 4.3 percent.

"It's way oversold in my opinion, and we haven't reached the bottom yet," Roger Chandler, a senior private client adviser with ABN AMRO Morgans in Sydney, told AP.

Hong Kong's Hang Seng was down nearly eight percent and Mumbai's BSE SENSEX 6.6 percent.

India's central bank also tried to boost markets, making 400 billion rupees ($8.2 billion) available for the financial system. Video Watch panic-selling in the Asia markets »

The latest falls helped push oil to a new one-year low below $83 a barrel in Europe as fears a global recession is unavoidable took hold.
Don't Miss

    * Commentary: 'Substantial shift' needed
    * Business 360 blog
    * UK officials go to Iceland over bank deposits
    * Iceland nationalizes third bank
    * Hong Kong cuts rates again

Gold, always considered a safe haven in turbulent times, was trading at $918.00 per troy ounce, up from $883.50. Video Watch what investors could face next »

U.S. President George W. Bush was due to make an address to the American people on the economy later in the day.

The White House confirmed Thursday that the U.S. Treasury Department is looking at buying equity stakes in some U.S. banks.

Spokesperson Dana Perino confirmed reports that the U.S. could soon join the United Kingdom, Iceland and Italy in announcing a plan to inject capital directly into their troubled banking systems. Read Richard Quest's G7 blog

"These capital injections are something that Secretary (Henry) Paulson is actively considering," said Perino. She said she could not comment on the timing or extent of such investments.

The move would be made under the $700 billion Wall Street bailout passed by Congress on Friday.

But the possibility of Treasury intervention failed to reassure investors amid the ongoing credit crisis.

WASHINGTON (CNN) -- Congressional leaders Harry Reid and Nancy Pelosi urged President Bush Thursday to call an emergency meeting with the G8 to address international financial instability.
Harry Reid is one of two powerful Congressional leaders who urged an emergency meeting with the G8.

Harry Reid is one of two powerful Congressional leaders who urged an emergency meeting with the G8.

Reid, the Senate majority leader, and House Speaker Pelosi sent a letter urging Bush to set up the meeting, according to a statement released by the two Democrats.

"The American people and the world are looking to the United States for leadership," the letter urged.

"We are writing to support the call for an emergency meeting. ... Doing so will send a strong signal that world leaders recognize the severity of the crisis and that they are committed to taking strong, concerted action to resolve it."
Don't Miss

    * Paulson could face backlash at G-20 meeting
    * Zakaria: America can no longer live beyond its means
    * U.K. unveils bank rescue as stocks continue to slide
    * European stocks make early gains

The letter comes at a time that Congress passed a $700 billion bailout bill to abate the U.S. economic crisis. Since the bill was passed last week, U.S. and international stock markets have continued to plummet.

White House Press Secretary Dana Perino's responded to Reid and Pelosi's letter Thursday saying, "We've said we are open-minded about the idea for a meeting."

The G8 is made up of the United States, Japan, Germany, Britain, France, Italy, Canada and Russia.

SAN FRANCISCO (AFP) - Computer security specialists warn that hackers are using fake YouTube pages to trick people into opening their machines to diabolical software.

A deceptive YouTube attack evolving as it spreads on the Internet is part of a growing trend of hackers to prowl popular online social networking communities in which people trustingly share web links and mini-programs.

"We are seeing tools like this not just for YouTube, but for MySpace, Facebook, America Online instant messaging ...," Trend Micro software threat research manager Jamz Yaneza told AFP on Thursday.

"All the various social networking sites have been hit with some page or another."

Hackers using the YouTube attack send people links to what are said to be must-see snippets at the Google-owned video-sharing website.

The links, instead, connect to convincingly realistic replicas of YouTube pages and tell people that a software update is needed to view a requested video.

Agreeing to the update lets the hacker install malicious software that could log keystrokes, steal data, or even take over people's computers, according to David Perry of Trend Micro.

Victims are not likely to catch onto the invasion since the hackers' software is able to stealthily link to the real YouTube website and play a promised video.

"This works as your typical drive-by download," Yaneza said of hackers planting malicious software in machines while rerouting online traffic.

"Essentially this can be used as a tool to serve up everything -- botnets, key loggers. Visually, you can't differentiate this from your regular YouTube page, it is done so well."

While some computer users might be able to spy something unusual about the online address, or "URL," of a bogus page, the safest thing to do is not trust links and instead go directly to YouTube for recommended videos.

"The reason they are using YouTube now is that during the elections we are looking at YouTube a lot," Perry said of hackers. "It is using social networking software in an anti-social way -- anti-social networking."

Hackers at a recent gathering of software savants in Las Vegas told AFP that social networks are prime places to take advantage of people's trust.

While people may be wary of links or programs emailed to them by strangers, they eagerly open such offerings from "friends" in social networking communities.

Online evil doers can easily create false social networking profiles and even impersonate people who may be well known or respected. The imposter can then build a network of trusting contacts in online communities.

Estimates are that as much as 40 percent of social networking profiles are fakes, according to figures cited by Cloudmark Inc., a company specializing in protecting Internet messaging systems from spam and hackers.

A poll conducted in the United States in June for Cloudmark concluded that 83 percent of the people using social networking accounts received unwanted "friend" invitations or messages steering them to dubious websites.

"Friends" are granted access to pictures, message boards, contact lists and other personal data stored in social networking profiles.

"Unfortunately, the very qualities that make social networks successful -- the wide variety of communication channels, the openness of the networks and the size of the audience -- are also powerful lures for spammers and hackers," Cloudmark says.

Be wary of taking strangers in as friends at social networking websites and only install trusted applications when customizing profile pages with mini-programs, sometimes called "widgets," according to Cloudmark.

Security specialists say to also limit the amount of personal information revealed to the Internet through profile pages.

"Understanding the risks and knowing how to protect yourself is critical to avoiding scams and other threats" said Cloudmark chief technical officer Jaime de Guerre.

"As spammers, hackers and other online criminals broaden their scope to social networks (people) must be especially vigilant and employ safe practices while engaging in online communities."
TOKYO, Japan (AP) -- Smoke was detected Friday at a Japanese nuclear power complex that suffered a major accident a decade ago, but the operator said there was no release of radioactivity.

The smoke was found at a solid waste facility at the Tokaimura plant northeast of Tokyo in a room where metal waste is burned, said Masataka Sekine, a spokesman for operator Japan Atomic Power Co.

Sekine said the smoke never left the room and nobody was injured. The reactors are in another part of the plant and the facility continued operating, he said.

"We are investigating the cause of the smoke," he said.

In September 1999, an uncontrolled nuclear reaction occurred at the fuel reprocessing center in Tokaimura, a rural area 70 miles northeast of Tokyo. Two workers were killed and about 700 people were exposed to radiation.

Japan's nuclear power program has a history of accidents and lax oversight. In August, liquid containing uranium splashed out of a container at a nuclear fuel plant southwest of Tokyo, exposing two people to radiation.
 (CNN)  -- A U.S. spacecraft beamed hundreds of photos of Mercury back to Earth on Tuesday after a close encounter with the planet closest to the sun.

MESSENGER's photos are the highest-resolution ever captured of any portion of Mercury's surface.

The images show scientists never-before-seen landscapes on the planet's surface.

Four of the high-resolution images were made public at 10 a.m. ET Tuesday, posted by NASA on its MESSENGER Web site. Taken during a three-hour span before and after the spacecraft's closest approach to Mercury, the photos offer detailed new glimpses of the barren planet.

One shows the bright Kuiper crater just south of the center of the planet. Most of the terrain east of Kuiper had never before been photographed.

A close-up of Mercury's surface, the highest-resolution color image ever taken of the planet, shows a round basin about 83 miles in diameter and named Polygnotus, after a Greek painter.

Another close-up captures a region between the sunlit day side and dark night side of the planet, where shadows are long and prominent. Two long, jagged scarps -- visible fault lines -- appear to crosscut each other on the planet's surface. The easternmost scarp also cuts through a crater, meaning it formed after the impact that created the crater.

The MESSENGER spacecraft, launched in 2004, buzzed 124 miles (200 km) above Mercury's surface Monday at almost 15,000 mph.

It's the second Mercury flyby for MESSENGER -- formally known as the Mercury Surface, Space, Environment, Geochemistry and Ranging craft.

The NASA ship is more than halfway through a five-billion-mile journey that should take it around the sun 15 times and put it into the Mercury's orbit in March 2011.

The American spacecraft Mariner 10 flew by Mercury in 1974 and 1975, but MESSENGER is focusing on a part of the planet that was not viewed then or during the craft's first pass in January.

Photos taken during its first pass showed that volcanic eruptions produced many of Mercury's plains. They also revealed that the planet has contracted more than previously thought, NASA said.

"The results from MESSENGER's first flyby of Mercury resolved debates that are more than 30 years old," said Sean Solomon of the Carnegie Institution of Washington, the mission's principal investigator. "This second encounter will uncover even more information about the planet."

MESSENGER's major goal is to become the first spacecraft to enter Mercury's orbit. If that happens, it should help scientist understand the composition of Mercury's surface, NASA said.
 CAMBRIDGE, England (CNN) -- Professor Stephen Hawking, one of the world's great scientists, is looking to the stars to save the human race -- but pessimism is overriding his natural optimism.
Stephen Hawking, here delivering a lecture in May, spoke recently to CNN about his vision of the future.

Stephen Hawking, here delivering a lecture in May, spoke recently to CNN about his vision of the future.

Hawking, in an exclusive CNN interview, said that if humans can survive the next 200 years and learn to live in space, then our future will be bright.

"I believe that the long-term future of the human race must be in space," said Hawking, who is almost completely paralyzed by the illness ALS.

"It will be difficult enough to avoid disaster on planet Earth in the next 100 years, let alone next thousand, or million. The human race shouldn't have all its eggs in one basket, or on one planet. Let's hope we can avoid dropping the basket until we have spread the load."

Hawking is one of the few scientists known to a wide audience outside academia thanks to his best-selling books, a guest spot on "The Simpsons" and an ability to clearly explain the complexities of theoretical physics.

He has 12 honorary degrees, was awarded the CBE in 1982 and since 1979 has been at Cambridge University's Department of Applied Mathematics and Theoretical Physics, where he is Lucasian Professor of Mathematics -- a post once held by Isaac Newton.

Speaking at Cambridge's Centre for Mathematical Studies, he said: "I see great dangers for the human race. There have been a number of times in the past when its survival has been a question of touch and go. The Cuban missile crisis in 1963 was one of these. Video Watch the interview in full »

"The frequency of such occasions is likely to increase in the future. We shall need great care and judgment to negotiate them all successfully.

"But I'm an optimist. If we can avoid disaster for the next two centuries, our species should be safe, as we spread into space."

Twenty years ago, Hawking wrote "A Brief History of Time." Now he is looking forward to a space flight of his own next year.

He said: "I don't think the human race has a moral obligation to learn about space, but it would be foolish and short sighted not to do so. It may hold the key to our survival."
 NEW YORK (AP) -- The first phone that harnesses Google Inc.'s ambition to make the Internet easy to use on the go was revealed Tuesday, and it looks a lot like an iPhone.
Like the iPhone, the G1 has a high-resolution screen, making it easier to browse Web sites.

Like the iPhone, the G1 has a high-resolution screen, making it easier to browse Web sites.

T-Mobile USA showed off the G1, a phone that, like Apple Inc.'s iPhone, has a large touch screen. But it also packs a trackball, a slide-out keyboard and easy access to Google's e-mail and mapping programs.

T-Mobile said it will begin selling the G1 for $179 with a two-year contract. The device hits U.S. stores October 22 and heads to Britain in November and other European countries early next year.

The phone will be sold in T-Mobile stores only in the U.S. cities where the company has rolled out its faster, third-generation wireless data network. By launch, that will be 21 cities, including New York, Los Angeles, Houston and Miami.

In other areas, people will be able to buy the phone from T-Mobile's Web site. The phone does work on T-Mobile's slower data network, but it's optimized for the faster networks. It can also connect at Wi-Fi hotspots.

The data plan for the phone will cost $25 per month on top of the calling service, at the low end of the range for data plans at U.S. wireless carriers. And at $179, the G1 is $20 less than the least expensive iPhone in the U.S.

Android, the free software powering the G1, is a crucial building block in Google's efforts to make its search engine and other services as accessible on cell phones as they already are on personal computers. The company believes it eventually might make more money selling ads that get shown on mobile devices than on PCs, a channel that will generate about $20 billion in revenue this year.
Don't Miss

    * Google turns 10, raises monopoly concerns
    * Apple updates iPhone software

Both Yahoo Inc. and Microsoft Corp. also are investing heavily in the mobile market in hopes of preventing Google from extending the dominance it enjoys in searches initiated on PCs.

In an interview, Google co-founder Sergey Brin said Google's aims are broader than mobile advertising.

"Generally, we think if there are great (operating systems) out there that let people have great devices and great applications, people use the Internet on their phones much more," Brin said at the launch event in New York. "And whenever people use the Internet more, they end up using our services, and ultimately, that's good for our business. There's no secret plan to have ads pop up or anything."

Like the iPhone, the G1 has a high-resolution screen, making it easier to browse Web sites that haven't been specifically adapted for a cell phone. Unlike the iPhone, Research in Motion Ltd.'s BlackBerrys and most other high-end smart phones sold in the U.S., the G1 has a very limited ability to connect to corporate e-mail servers. That means the device's initial market is likely to be consumers.

On the face of it, the G1 doesn't do much that other high-end phones don't already do. But Google is counting the device unleashing the creativity of software developers, who are free to write applications for it.

"There aren't a lot of `wow' features on it. I think what we can expect from it is that it's going to be a good Internet phone," said Lance Ulanoff, editor-in-chief of PC Magazine.

Developers will be able to submit applications to an online store run by Google, which will apply minimal vetting.

"The key is going to be what app developers are going to do for it," said Ross Rubin, an analyst with NPD Group. "They didn't have a lot to show today."

Apple launched a similar store for the iPhone this year, but keeps much tighter control over what applications are available. It has blocked programs that compete with its own.

The G1 won't connect to Apple's iTunes store, but one of the initial applications will be a music store from Inc., which will let users download songs directly to the phone. In an unusual move for a mobile-phone music store, the songs will have no copy protection.

Brin himself has written an application for the phone.

"It's just very exciting for me as a computer geek to be able to have a phone that I can play with and modify and innovate upon just like I have with computers in the past," he said.

Brin's program uses the phone's built-in motion sensor to measure how long it takes for the phone to land when tossed into the air. He acknowledged that the wisdom of including such a program with an expensive phone is dubious.

"We did not include that one by default," he said.
The Logitech Illuminated Keyboard is about as simple as it gets, so you get no built-in USB ports, scroll dials, or any of the other features in more expensive devices such as the Logitech G15.
Review: Illuminated keyboard is comfortable, sexy

Instead, for $80 it offers a sexy, quiet keyboard with a very minimalist design that looks just as good as it performs. If you're a night owl gamer or just want an attractive, comfortable input device, the Logitech Illuminated Keyboard is an outstanding choice.

The keyboard has a very subtle, professional appearance; aside from the extremely thin 9.3mm profile, the entire keyboard is black with a small clear plastic border that doesn't serve a purpose other than to highlight the flat surface of the keys.

A built-in wrist rest fixed beneath the keys is covered in a soft rubber material to prevent your hands from slipping while you type. After using the keyboard for a few days, the natural oil on our hands made small prints on the wrist rest, creating blotches that marred the otherwise clean design.

Underneath the keyboard, you'll find two small plastic feet that extend from the base, letting you slightly angle the keyboard forward. Finally, as the title says, the keyboard comes with embedded microlens reflectors under each individual key that produce a light-blue backlit effect. You can adjust the intensity of the light to three predetermined settings; you can also turn it off, if you so choose.
Don't Miss

    * Check latest prices
    * Compare most popular

The keyboard is plug-and-play, so you don't have to install drivers, but if you want to specify macros or customize any of the 12 shortcut keys, you need to install Logitech's SetPoint 4.6KB software.

The included CD lets you designate each key to perform a variety of functions including opening a Web page, showing a custom menu, opening a specified file, or launching a program. The SetPoint desktop software also includes a help center that contains tips on how to get the most comfortable experience out of the Logitech keyboard.

Similar to Logitech's higher-end diNovo Edge, the Illuminated Keyboard features Logitech's PerfectStroke key design. PerfectStroke allows for 3.2mm of space between each key and uniform tactile feedback across the entire flat key surface.

In practice, the key response is similar to that of an IBM Thinkpad laptop. If you're used to typing on a regular keyboard with concave keys, the Illuminated Keyboard will be an acquired taste. Your accuracy might suffer in the interim, but we found ourselves typing significantly faster after less than a week of using it.

Although it is undoubtedly attractive and works well, the Logitech can use some improvement in the hardware design. First, the keyboard lacks the extra USB ports that we typically see on keyboards at this price. We complained about the Logitech G15's outdated USB 1.1 ports, so we have to ding Logitech again for not even including one port into this design.

Granted, the keyboard's slim profile doesn't allow for much room for hardware extensions, but we'd sacrifice a slightly thicker housing for the increased functionality. We're also disappointed to see that the keyboard uses USB 2.0 instead a wireless RFID transmitter for connectivity.

The clean aesthetic of the keyboard is almost spoiled by the unsightly gray wire protruding from the top, but if you're a closet gamer you'll appreciate the accuracy you get in a wired set up.

For your consideration, the Saitek Eclipse II Illuminated Keyboard is another illuminated keyboard that came out two years ago for $70. Its price is now down to $45; the Logitech is almost double the price, and we're quick to complain about its lack of features, but we think the higher price is justified by its elevated comfort and modern style.
Chat Box / No breakfast? What's your excuse?
Oct 09, 2008, 04:34 PM
It doesn't matter if you are a college student, a working person, a new mother or a housewife, lack of time in the morning is the most common excuse for dodging breakfast.

You gulp down a cup of tea or coffee in the morning and survive on that till your next meal.

'I want to lose weight' :boooo

Yet another common reason for skipping breakfast --  this helps you lose weight. In reality, breakfast skippers do NOT lose weight as they may eat more than usual at the next meal or nibble on high calorie snacks to curb hunger.
A study conducted at the George Washington University USA, found that breakfast eaters had metabolic rates 3 to 4 per cent above average while breakfast skippers demonstrated sluggish rates, 4 to 5 per cent below average!
This means that during the course of the year breakfast skippers actually conserve 4 � to 7 kilogrammes of body fat!

'I don't feel hungry' :yes

Reason number three -- a lack of appetite. This often happens because people tend to eat late dinners and sleep immediately thereafter. During sleep the digestion is sluggish resulting in the feeling of fullness in the morning.
This results in a vicious cycle -- no breakfast and too heavy a lunch, finally resulting in health problems. As a solution have dinner by latest 10 pm, preferably by 8.30 pm and wait one hour post dinner before you sleep.

:what Breakfast like a king, lunch like a prince, dine like a pauper

Heed this mantra because your breakfast is THE most important meal of the day. It literally breaks your overnight fast, which can last from 12 to 16 hours depending on what time you had dinner the previous night.
It helps you recharge your energy levels in the morning, which if not boosted will make you feel tired and hungry; you could end up snacking on high calorie snacks or overeat at lunch. Eating breakfast also stimulates the metabolism, which may slow down overnight.

Why breakfast is a MUST

Having trouble concentrating at work or studies? Feeling grouchy or lethargic? Here's why.

~ Memory is the worst affected by hunger as the brain requires a minute-to-minute supply of glucose for its normal functioning. Breakfast helps replenish the blood glucose levels, which in turn is the brain's fuel.
~ Research conducted across the world has shown that children who eat breakfast think faster and clearly, solve problems more easily and are less likely to be fidgety and irritable early in the day.
While those who go hungry to school are poor learners as skipping breakfast has a direct effect on a child's scholastic performance. They are not as adept at selecting the information they need to solve problems. Their ability to recall and use new information, verbal fluency and attentiveness are all affected by hunger.
~ People who skip breakfast have less energy and slower reactions. They are unable to concentrate and think fast and may suffer stomach aches, headaches and feel grouchy.
~ Skipping breakfast makes you so hungry by lunch time that you become a victim of the 'gobble syndrome,' which is bad for the stomach as the secretion of the digestive juices does not match with the rapid food intake. Also by eating fast, one tends to overeat.
~ Studies have also shown that the nutrients missed by skipping breakfast cannot be compensated for in other meals, as the body is unable to process the vital nutrients optimally if consumed all at once.
~ Researchers in the US have found that skipping breakfast routinely can indirectly increase the chances of developing diabetes and heart disease as the sugar deficient body craves for fatty foods which are hard to resist.
~ Research studies have also shown that the human body tends to accumulate more fat when a person eats fewer, larger meals than when the same number of calories was consumed in smaller, more frequent meals.
~ The deficiency of vitamins and minerals created by skipping breakfast cannot be made up for later in the day as the body is not able to utilise the vital nutrients if consumed all at once.

Breakfast tips for good health

~ Ensure that your breakfast contains adequate amounts of high fibre cereal products such as whole wheat or multigrain bread, muesli, chapattis, rice flakes (poha), bulgar or broken wheat (dalia), nachni or finger millet porridges, oats.
You could also opt for a south Indian breakfast with idlis, dosas, puttu as these provide adequate amounts of carbohydrates which supplies the bulk of energy from breakfast.
~ Avoid breakfasts containing large amounts of sugar as it give an initial energy boost, but leaves one feeling drowsy within a few hours.
~ Complement the cereal with a serving of protein rich food such as egg (poached or boiled and not fried) or pulse preparations (such as usal, missal, sambhar) or roasted nuts (ideally six almonds and two dates) or cheese (preferably low fat paneer instead of processed cheese). Breakfasts containing adequate amount of carbohydrate and protein ensures a steady supply of glucose and hence energy over a longer period of time.
~ Avoid fried foods and butter substitutes such as margarine as they contain fat and people tend to eat too much of them because they feel they are fat free.
To avoid falling in the fat trap eat small amounts of butter on warm toast or better still try spreading a teaspoon of olive oil on warmed toast as the strong flavour of olive oil makes you eat less.
Peanut butter is also another healthier option, because it is high on protein and contains heart-friendly monounsaturated fats.
~ Eat cut fruit instead of drinking fruit juices for breakfast as the fibre in the fruit slows the digestion of the natural sugars present in the fruit thereby preventing blood sugar from shooting up.
~ Try having vegetable juice instead of tea or coffee along with breakfast. Tea and to some extent coffee contains tannins that prevents the absorption of iron. If you cannot do without your morning cuppa try having it half an hour before breakfast.
~ Malted beverage powders such as Horlicks, Bournvita, Boost, Milo etc can be added to the milk of children who do not eat enough quantity of food.

However it must be kept in mind that these should be used as a supplement and not as a substitute to a balanced diet.

:now Quick-fix breakfast recipes

Here are a few easy breakfast recipes for those who are hard pressed for time:

1 Blend half a glass of low fat curd or yoghurt, one medium sized banana and two teaspoons of honey for one minute.
Pour into a glass and sprinkle with a pinch of wheat germ (available at heath shops) and sip for a power packed breakfast.
2 Fill half a mug with muesli and add skim milk or soya milk. Add some chopped apple and consume.
3 Keep a bowl of sprouted pulses in the refrigerator. Lightly steam a handful (or cook with very little water) and season with lemon juice and seasonings as desired like chilly powder, chaat masala, pepper, salt, cumin powder, sesame seeds etc for a natural and power packed breakfast :ok.
New Delhi: One in four mammal species in the world is on the brink of extinction, an International Union for Conservation of Nature (IUCN) report, which was released on Monday, revealed.
Red List of Threatened Species report is a comprehensive compilation of the findings of IUCN's five-year-long research, during which it studied 5,500 species across 130 countries.
"The study shows that almost a quarter of them have either gone extinct or are facing extinction. So it's a very worrying situation and we need to do something about it urgently," Manager, IUCN Unit Cambridge, Hilton Taylor, says.
It's not only the mammals who are doing a vanishing act.
Three hundred sixty six new species of amphibians have also been listed as threatened for the first time.
While the Cuban crocodile is critically endangered, Holdridge's toad has not been seen in the last 20 years.
But scientists say that the species can recover if adequate efforts are put in. Turning around the sharp fall in the number of wild horse, which survived its near-extinction stage, is just one example.

"By 2010, we should reverse and slow down the rate of extinction, the rate of the loss of species. So that is quite an ambitious target to achieve and we're very far from reaching that," Taylor added.

The report claims that habitat loss is the biggest cause of this alarming trend.

In India, the status of the leopard is worrisome. The big cat has been red-listed for the first time. And the gharials are on the brink of extinction. Conservationists say it's now or never and steps need to be taken now before it's too late.

Red-listed animals

    * African giants - Vulnerable to Near Threatened
    * Fishing cat - Endangered
    * China's Pere David's Deer - Extinct from the Wild
    * Cuban Crocodile - Critically Endangered
    * Holdridges Toad - Extinct
    * Leopard - Near Threatened
* Gharial - Critically Endangered
ATHENS, Ga., Oct. 8 (UPI)

Even occasional cigarette smoking can impair the functioning of your arteries, University of Georgia researchers said.

Study co-author Kevin McCully said that researchers used ultrasound to measure how the arteries of young, healthy adults respond to changes in blood flow.

Previous studies have shown reductions in the arterial health of people who smoke regularly, McCully said, but what's surprising about this study is that the study subjects were occasional smokers -- less than a pack a week -- who had not smoked for at least two days before their ultrasound.

The study, published in the online edition of the journal Ultrasound in Medicine and Biology, found that the arteries of occasional smokers were 36 percent less responsive to changes in blood flow than non-smokers.

McCully said that the healthier an artery is, the more responsive it is to changes in blood flow. A reduction in responsiveness -- known as impaired flow-mediated dilation -- is an early sign of arterial damage that often foreshadows cardiovascular disease.
New Delhi: It was a stormy day in the Japanese stock market, the world's second largest.

The Nikkei closed, down nearly 10 per cent. This is the third biggest one-day drop on record.

The spiralling credit crisis prompted a sell-off on the Nikkei indices. It erased more than $250 billion in equity value.

Nikkei stands slid below 10,000 on Tuesday for the first time since December 2003.

The chaos spilled over onto the streets in Hong Kong, where investors battled police outside the Hong Kong headquarters of Bank of China. Protesters swarmed other banks in Hong Kong as well.

Analysts speculate that the world economy is entering a depression, not just a recession.

The International Monetary Fund has presented its semi-annual report on the global economy. The IMF states that it's forecast for the global growth stands at 3.9 per cent and at the same for 2009 is revised to three per cent.

Simply put, growth of under three per cent is considered a global recession.

The chaos spilled over onto the streets in Hong Kong, where investors battled police outside the Hong Kong headquarters of Bank of China.

Protesters swarmed other banks in Hong Kong as well.

Meanwhile, European countries are still scrambling to control the damage. After the UK announced an 87 billion dollar package to bail out British banks, the Italian cabinet passed a crisis package to help its banks.

Chat Box / infosys narayanamurthy's home
Oct 08, 2008, 09:04 PM

how is it :whatever
hi acumen,

:acumen pls every body is ur rights & freedom. :agree

my vote is 4 sports

•  Airtel digital TV to be available in 62 cities in first phase
•  MPEG4 standard with DVB S2 technology offers high audio, video quality and ensures system in HD ready
•  For the first time a universal remote for both Set Top Box and TV to offer enhanced customer convenience
•  Wide range of channels and interactive applications
•  20% larger dish antenna offers better performance during rains

New Delhi, October 7, 2008: Bharti Airtel Limited today announced the launch of Airtel digital TV , its Direct To Home (DTH) Satellite TV service. Airtel digital TV, which is a perfect blend of latest technology, unique features, and great content, promises to redefine the digital home entertainment experience. The service will be available to customers through 21,000 retail points including Airtel Relationship Centres in 62 cities across the country starting October 9, 2008 .

On the occasion, Mr. Manoj Kohli, CEO and Jt. MD, Bharti Airtel, said, "Today we are starting a new chapter in our journey, one that adds a new dimension to our existing product portfolio and is a major step towards t ransforming Airtel from just a telecom brand to a lifestyle enabler. The launch of Airtel digital TV is the culmination of our three screens strategy, which is to be present across mobile phone, computer and TV screens."

Mr. Atul Bindal, President - Telemedia Services, Bharti Airtel, added, "We believe that the Indian DTH segment offers immense growth potential going forward. Given our deep understanding of Indian customer, we believe that Airtel has created an excellent product offering. With added benefits of Airtel's strong brand equity and wide distribution network, we are well placed to emerge as a leading player in this segment."

Airtel digital TV uses the latest MPEG4 standard with DVB S2 technology, which translates i nto exceptional picture clarity and consistent high quality audio for the customer. This latest technology also enables delivery of more complex interactive content and is High Definition ready. Also, Airtel digital TV uses 20% larger dish antenna that offers better performance during rain.

Besides the latest technology, Airtel digital TV brings many firsts to the DTH segment in India :

    * Universal remote for both Set Top Box and TV that offers enhanced viewer convenience;
    * Highest Set Top Box memory enabling more interactive applications;
    * Exclusive content such as World space Radio;
    * Interactive applications such as iMatinee (Book cinema tickets), iTravel (Browse and book travel packages), iShop (Shop on TV for your favorite brands), iCity (Get your city's information) and Widgets (Update yourself on latest stock news). 8 screen iNews, 2 / 4 screen iSports .
    * Amazing games with high quality graphics, refreshed every 6 weeks
    * Audio gain control for uniform audio levels across all channels
    * Simple and intuitive search
    * On screen account meter
    * Last viewed channel in case of power disruption/switch off
    * Low battery indicator on the screen

These great viewing experience and unique features are backed by 24x7 customer care available in 8 different languages and a team of 800 professionally trained service engineers.
By Ellen Wulfhorst

NEW YORK (Reuters) - Republican vice presidential nominee Sarah Palin is distantly related to the late Princess Diana and late U.S. President Franklin Roosevelt, genealogy experts said on Wednesday.

The governor of Alaska and the princess are tenth cousins, while Palin and Roosevelt are ninth cousins once removed, said, online genealogists based in Provo, Utah.

The genealogical connections are not the first to gain attention in the U.S. presidential campaign. Last year, Lynne Cheney said she found while tracing her family roots that her husband Vice President Dick Cheney was a distant cousin of Democratic presidential nominee Barack Obama.

Other researchers discovered Obama is distant cousins with actor Brad Pitt.

"When you've got candidates who have deep roots in America, there's a good chance that they're going to have some famous cousins," said's chief family historian Megan Smolenyak.

"We've all got literally millions of cousins. The trick is finding that one little connection that results in something like Sarah Palin being related to FDR or Diana," she said.

Palin and the late princess descended from John Strong and his wife Abigail Ford, said.

Strong was born around 1605 in England and emigrated to the United States, where he died in Massachusetts in 1699, said.
By Will Dunham

WASHINGTON (Reuters) - Talking about death may be upsetting but a doctor's frank discussion with a terminally ill person does no harm and provides numerous benefits for patients and those close to them, U.S. researchers said on Tuesday.

Patients who had talks about what type of care they want -- and do not want -- as they near death experienced a better quality of life in their waning days than those who did not, and they were no more apt to experience depression, worry or sadness, the study found.

The patients received fewer aggressive medical interventions, such as being placed on a ventilator to breathe, being resuscitated or being sent to an intensive care unit, the researchers reported in the Journal of the American Medical Association.

And the patients sought hospice care earlier.

In addition, their informal caregiver, usually a spouse or adult child, was less likely to experience major depression in the months after the patient's death if aggressive medical interventions were avoided.

"The major findings are that end-of-life discussions have cascading benefits for patients and their loved ones," Dr. Alexi Wright of the Dana-Farber Cancer Institute in Boston, one of the researchers, said in a telephone interview.

Wright's team said previous studies indicated that doctors and patients are ambivalent about talking about death and frequently avoid the discussions.

A doctor or a patient can initiate a discussion, which gives people the chance to define their goals and expectations for medical care as they approach death, Wright said.
WASHINGTON (Reuters) - Adults should aim to get in 2 1/2 hours of exercise a week and children should run and play for at least an hour a day, according to new exercise guidelines issued by the U.S. government on Tuesday.

The guidelines, meant to be akin to the "Food Pyramid" nutritional advice, are based on studies that show clear health benefits from regular, moderate exercise.

"More than 59 percent of adults don't get enough physical activity and a quarter of adults aren't active at all in their leisure time," Health and Human Services Secretary Michael Leavitt said in a telephone interview.

"I think these are the first comprehensive federal guidelines on physical activity."

Many studies have shown that regular moderate exercise lowers the risk of heart disease, many cancers, osteoporosis, diabetes, Alzheimer's disease, depression and other diseases.

"In children and adolescents, physical activity induces cardiovascular and respiratory fitness and also contributes to bone health," Leavitt said.

The latest figures released in July from the U.S. Centers for Disease Control and Prevention show 25.6 percent of U.S. adults are medically obese. Both poor diet and a lack of exercise are blamed.

In 2002, the U.S. Institute of Medicine said Americans need to exercise at least one full hour a day to maintain weight and health.

The new HHS guidelines go a bit easier and recommend an average of half an hour a day, five days a week
NEW YORK (Reuters) - Almost half of U.S. workers do not respect their boss and only half believe they are competent, according to an online survey released on Friday.

The study by Randstad USA, a unit of the world's number two staffing company Randstad NV, found that the growing financial crisis has seen companies focusing more on their bottom line at the expense of relations with employees.

"Employees' professional development and morale should always be a priority for employers and especially in an economic slowdown when employees may feel additional burdens," said Randstad director Eric Buntin.

The Internet survey of 2,337 people also found only 43 percent think their boss is open to new ideas and only 47 percent were willing to work overtime to impress their boss and create more job security for themselves.

Less than 30 percent believed their bosses were fulfilling their roles as motivators, role models or mentors.

"When it comes to impressing the boss to create more job security during hard times of economic uncertainty, the survey indicates women are willing to work harder," Buntin said. "A healthy employee-employer relationship greatly contributes to an overall positive workplace attitude."

The survey was carried out by Harris Interactive. Data was weighted to be representative of the total U.S. population based on region, age within gender, education, household, income, and race.

(Reporting by Michelle Nichols, editing by Alan Elsner)
October 08, 2008 10:59 IST

The decades-old dream of Kashmiris will come true this Saturday when Prime Minister Manmohan Singh [Images] flags off the first train connecting Srinagar [Images] to central Kashmir during his two-day-long visit to Jammu and Kashmir [Images].

Official sources said the prime minister will flag off the first train from Nowgam (the station for Srinagar) to Budgam on Saturday.

The prime minister will board DMU (diesel multiple unit) train from Nowgam station as a symbolic gesture, the sources said.

Though it is a short distance between the two stations, it will be for the first time that Kashmiris will see a train running in the Valley.

The inauguration of this train service on Saturday was a part of the plan to connect Baramulla (north kashmir) to Qazigund (south Kashmir). However, connecting Kashmir Valley with the rest of the country still remains a distant dream.

The commercial use of the train will take some time to start, the sources said.

The Srinagar railway station is a stunning three-storeyed building, which has beautifully carved wooden panelling and chandeliers and is surrounded by landscaped gardens.

During the function, the prime minister will be addressing people and was also likely to make some announcements regarding the Indo-Pak ties.

His visit coincides with the visit of a business delegation from Pakistan-occupied Kashmir, who will be in the state from Thursday for a week to tie up with businessmen from Kashmir as well as in Jammu.

The prime minister, who will be arriving at Udhampur on Friday, will first inaugurate the 450 MW Baglihar hydroelectric project in Doda region.

This will be the second power project to be inaugurated by the Prime Minister in Jammu and Kashmir. In April this year, he inaugurated the Dul Hasti power project constructed by the National Hydro Power Corporation (NHPC).

The Baglihar project is built on the Chenab river flowing from Jammu and Kashmir into Pakistan and has been marred by controversies ever since its inception.

Pakistan had opposed the project on the ground that it will divert water away from its territory. In 2005, it had unilaterally approached the World Bank - the third party to the 1960 Indus Water Treaty between India and Pakistan.

Raymond Lafitte, a Swiss national and professor at the Swiss Federal Institute of Technology in Lausanne, was appointed by the World Bank and he gave a go-ahead to India for the project after a few minor modifications.

The Baglihar Hydro Electric Project is very crucial to ensure the sustainable development of the economy of the people of the state.

This project was conceived in 1992, approved in 1996 and construction began in 1999. It will have installed capacity of 900 MW when complete. The project is estimated to cost one billion US dollars.
ADDIS ABABA (Reuters) - India plans to increase its investment in Ethiopia through sectors including power generation, rail construction and IT, an Indian government official said on Wednesday.

Junior Trade Minister Jairam Ramesh said there was enthusiasm among Indian businesses towards the vast Horn of Africa nation, in which India has already invested close to $4 billion.

"India is hoping to invest in power generation, railway line construction, IT development and tea plantations, leather goods and textile production," Ramesh said during talks with Ethiopian trade officials during a visit to the country.

He did not give specific details of projects.

Banking on its relative proximity to Africa, close historical ties and large diaspora community, India is increasingly looking at Africa as an investment destination and source of resources for its booming economy.

Ramesh said the nearly $4 billion Indian investment in Ethiopia so far included in the flower industry, agriculture, mining and sugar estates. This has boosted Ethiopia's economic growth and provided employment for thousands, he said.

Scores of Indians are engaged in flower production, which has now become a new source of hard currency for Ethiopia.

India is also a major investor in the Tendaho Sugar Enterprise, being built using a $640 million loan provided by an Indian state-owned bank.

MUMBAI, Oct 8 (Reuters) - Tata Consultancy Services (TCS.BO: Quote, Profile, Research), which is buying Citigroup's (C.N: Quote, Profile, Research) India back office unit, expects revenue to start flowing in from the acquisition in the fiscal fourth quarter ending in March 2009, Chief Operating Officer N. Chandrasekaran said on Wednesday.

TCS, India's top software services exporter, earlier said it would buy Citigroup Global Services, the back office arm in India, for about $505 million in cash.

(Reporting by Prashant Mehra; Editing by Ranjit Gangadharan)

BANGALORE, Oct 8 (Reuters) - India's top information
technology outsourcers should report quarterly profit rose by
up to a third, helped by a weaker rupee, but the export-driven
industry's outlook will be dented by the global financial

Markets will focus on companies' comments on the pricing
environment and hiring plans -- key demand indicators -- amid
concerns the spreading crisis could cripple outsourcing
Large banks and financial firms from the United States to
Europe and Asia are big clients of Indian IT companies such as
Tata Consultancy (TCS.BO: Quote, Profile, Research), Infosys Technologies (INFY.BO: Quote, Profile, Research),
Wipro (WIPR.BO: Quote, Profile, Research) and Satyam Computer (SATY.BO: Quote, Profile, Research).

"When firms struggle to survive, outsourcing is less likely
to be an immediate theme," Edelweiss Securities said in a
report, retaining its "market underperformer" rating for the

Some outsourcers may cut their dollar revenue forecasts due
to a downturn in the U.S. market, which contributes more than
half their revenue, analysts said. Indian IT firms have also
been expanding in Europe and elsewhere to cut their U.S.

But the risk of global recession is a worry for the sector
which was used to a scorching pace of growth.

"The business climate is very challenging for the software
companies," said Jayesh Shroff, a fund manager with SBI Mutual
Fund. "The turmoil that we are seeing in the market place is
definitely going to curb technology spending."

NET PROFIT (millions of rupees)
COMPANY            MEAN      % CHANGE        RANGE      DATE

                         Year   Qtr
TCS               13,742    10.2  10.5   12,818-14,431   
Infosys           13,990    27.2   7.5   13,571-14,390  Oct
Wipro              8,540     5.2   4.9    8,078-9,139   Oct
Satyam             5,357    30.9  -2.2    5,051-5,548   Oct
MphasiS (MBFL.BO: Quote, Profile, Research)    892    34.5  12.9      849-928     Oct
NET SALES (million rupees)
TCS               68,579    21.6   7.0    67,214-69,720
Infosys           52,878    28.8   8.9    51,938-53,330
Wipro             62,437    32.1   4.7    61,438-62,960
Satyam            28,142    38.5   7.4    27,519-28,591
MphasiS            7,998    32.9   7.8     7,890-8,078

NOTE: Estimates for TCS and Wipro are in U.S. GAAP.
Forecasts for Infosys, Satyam and MphasiS are in Indian GAAP.

Poll contributors - Enam Securities, Citigroup Global
Markets, Sharekhan, UBS, KR Choksey Shares, Kotak Securities,
Emkay Global Financial Services, Motilal Oswal Securities,
Religare Hichens Harrison, Angel Broking, Khandwala Securities,
and Prabhudas Lilladher.
($1=48.6 rupees)
(Editing by Ranjit Gangadharan and Anshuman Daga)

Bhubaneswar: The key accused in the gang-rape of a nun has been arrested in Orissa's volatile Kandhamal district, where communal clashes since Aug 23 have left at least 35 dead and thousands homeless, police said on Wednesday.

Santosh Pradhan was arrested from Baliguda town on Tuesday and produced before a local court, a police officer told IANS.

Police had earlier arrested four men - Juria Pradhan, Kartik Pradhan, Biren Kumar Sahu and Tapas Kumar Patnaik - for their alleged roles in the crime, he said.

The nun had filed the complaint on Aug 26 - three days after a Vishwa Hindu Parishad (VHP) leader was killed, triggering a spate of violence targeting Christians and churches in which at least 35 people lost their lives.

Though the report was filed many weeks ago, police collected the medical examination report only last week after the media reported the issue and Sister Nirmala, superior general of Mother Teresa's Missionaries of Charity, wrote to the state authorities seeking justice for the nun.

The medical examination report confirmed that she was raped. The state government suspended the inspector in charge of the Baliguda police station, where the nun had filed her complaint.

According to the nun's written complaint, a mob of about 40 to 50 armed men attacked a house at K. Nuagaon village where she along with a priest, Father Thomas Chellantharayil, had taken shelter after their centre was attacked.

The mob dragged her and the priest and took them to the deserted office of an NGO where she was allegedly stripped and raped by one from the mob. The priest was doused with petrol and beaten up.

They also paraded her naked on the streets, she alleged, saying that the incident occurred in the presence of a dozen policemen.

The state government has sent a police team to New Delhi, where the nun has taken shelter, officials said. The state government has assured all help and protection to the nun and said she needs to come to Orissa and identify the culprits.
Tue, Oct 7 07:06 PM

Los Angeles, Oct 7 (IANS) An Indian American, distraught at being unemployed for long, has shot dead his wife, three sons and mother-in-law before killing himself in an upscale neighbourhood near here.

The body of Karthik Rajaram, 45, who earlier worked as financial advisor with PriceWaterCooperhouse, was found dead in his house Monday with a handgun. Next to him lay his two youngest sons, Arjuna, 7, and Ganesha, 12.

The police also found in different rooms of the house Karthik's wife, Subasri, 39, his mother-in-law Indra Ramasesham, 69, and his eldest son Krishna, 19, a Fulbright Scholar and honours student at University of california at Los Angeles (UCLA) - all shot to death.

Authorities also found two suicide notes, one for the police and one for the family and friends, and a will left behind by Rajaram. In the notes, he spoke of his financial difficulties and took responsibility for killing his family members, the police said.

Ed Winter, assistant chief from the Los Angeles County Coroner's Office, identified the suspect as Rajaram.

The minor massacre was discovered Monday morning after a neighbour called the police to report that as part of a car-pool, Rajaram's wife had failed to pick her up to take her to her job at a pharmacy, Los Angeles Deputy Chief of Police Michel Moore said.

The killings are thought to have occurred some time after Saturday evening, when Rajaram was last reported seen, Moore said.

The tragedy in a seemingly well-to-do family living in a gated community in San Fernando Valley, 32 km (20 miles) northwest of Los Angeles, has inevitably been linked to the recent financial turmoil in the country.

'This is a perfect American family behind me that has absolutely been destroyed,' Moore told reporters. 'It is critical to step up and recognize we are in some pretty troubled times.'

The victim family appears to have been well-off at one time. According to the Los Angeles Times, they sold their earlier home in 2006 for $750,000, making a sizable profit. The family did not own the current home, which was rented.

Investigators also determined that Rajaram, an MBA in finance, was at least the part-owner of a financial holding company, SKGL LLC, which was incorporated in Nevada, ostensibly to hold his family assets.

Yet, Rajaram had become despondent over his financial situation, Moore said. In one of his letters, he talked of two options: taking his own life or taking his own life and that of his family. 'He talked himself into the second strategy,' Moore said.

According to the police, there was no evidence that Rajaram had sought help from mental health professionals. However, the context of the letters and the fact that Rajaram had purchased the handgun as recently as Sep 16 indicated that his actions were 'premeditated', they said.

There is more evidence that the crime was premeditated.

One of the neighbours reported that Rajaram had spoken to her twice in the last two weeks asking whether she would be home this past weekend. He urged her to keep her side windows shut because he had heard of burglaries in the area. He seemed nervous - shaking, pacing and taking notes on a notepad as he spoke to her, she told the LA Times.

She surmised after the bloodbath that he was trying to have her close her windows so that she wouldn't hear the gunshots.

Other neighbours said the Rajarams were a quiet, decent family who pretty much kept to themselves and did not socialise much. Krishna appeared to be visiting home and the parents seemed to have given up their master bedroom for him, the police said.
Kathmandu: A small private plane crashed in the remote mountains of northeast Nepal on Wednesday, killing at least 18 people, airline and airport officials said. Twelve Germans and two other foreign nationals were among the dead.

"There were 19 people on board," said Vinay Shakya, an official of Yeti Airlines, a domestic airline. A crew member has survived.

The aircraft, a Twin Otter carrying 16 passengers and three crew, crashed shortly before it was due to land at Lukla, known as the gateway to Mount Everest, about 125 km northeast of the capital Kathmandu.

The remote airport at Lukla was built in the 1960s by mountaineer Sir Edmund Hillary to facilitate expeditions to the world's tallest peak.

Airport official Mahesh Basnet told Reuters the plane might have hit a mountain top as it was coming in to land. About a dozen private airlines operate in Nepal.

Many fly to remote areas that have no roads, mostly carrying foreign tourists to the Himalayan foothills, including Mount Everest.
Chat Box / Why Do We Smoke Cigarettes?
Oct 04, 2008, 12:45 PM
[blink] Smoking Memories :read[/blink]
Certain moments in our lives are closely linked with cigarettes. These situations often leave on people's memories an important imprint never to be forgotten. Here is such an occasion, described by an office clerk of twenty-one. "...I can remember the moments when I returned home - no matter how late - after having been out with a girl on a Saturday night. Before going to bed, I'd sit on the fire escape for a while and enjoy a smoke. I'd turn around so that I could see all the smoke going up. At the same time, the windows would be bright with lights on the other side of the courtyard. I would watch what the people were doing. I would sit :yes, and watch, and think about what my girl :D and I had talked about and what a nice time we had had together ;). Then I'd throw the cigarette away and go to bed. I feel these were really the most contented moments in my life.... :agree"

read more from :
the Psychology of Everyday Living
Ernest Dichter
New Delhi: Soumya Viswanathan, the 26-year-old journalist who was shot dead in the early hours Tuesday morning while driving home from work, shouldn't have been adventurous – that's Delhi Chief Minister Shiela Dixit's reaction to a case that's sent shockwaves across the country.

"Driving at 3 am alone in a city which people believe is not very safe for women after should not be adventurous, but I am really very sorry for her family. Investigations are going on," she said.

Adding insult to injury, almost two days after Soumya's death, nothing seems to have changed to make the streets any safer for women.

Most arterial roads are dimly lit, if at all and police presence is rare, static and not very reassuring.

The Chief Minister's statement has invited the ire of many young, working professionals who work night shifts and commute at odd hours.

"It's not the right thing to say. She was not adventurous, was just coming home from work," says one professional. Agrees another, "It's state's responsibility to take care of citizens."

Ex-IPS officer Kiran Bedi suggests some solutions. "Roads which don't have street lights and are being regularly used by drivers have to be brought under watch," she says.
New Delhi: Navneet Prasad, a 26-year-old doctor was found dead in his hostel room at the Lady Hardinge Hospital on Wednesday.

The deceased medical student of post graduate studies hailed from Aurangabad in Bihar.

Prasad was last seen at 0100 hrs on Wednesday.

His colleagues found him when he didn't turn up for duty and didn't answer their calls. The worried and suspicious students then summoned the police.

Prasad was pursuing a Masters degree in orthopaedics and was found lying dead on his hostel room bed at 12.45 pm on Wednesday. He had been allotted room no 127.

Police say that there were no signs of struggle nor was any suicide note recovered from him. There were no obvious marks of use of any weapons on him too.

The matter is being probed from all possible angles, a police official said.

The postmortem report is awaited to ascertain the cause of death.

Prasad was last seen at 0100 hrs on Wednesday.
Polling Station / Ur Dream Bike
Oct 01, 2008, 01:32 PM

my vote is for -yamaha rx100.

u may share ur favourite with me.

Work stress and junk food are taking a toll on the health of many and that explains why people get heart attacks even at the age of 25.

However, one can keep the heart fitter by what doctors call 'lifestyle modification'. Here are some ways to do that.

There are few games many people in Chennai have started playing. An hour of badminton, they say, helps burn at least 300 calories. Walking or jogging is often seen as a ritual. Games are addictive. So the chances of keeping a good thing going are quite high.

For those who don't quite fancy high intensity workouts and are keen to de-stress and keep those hypertension blues at bay, yoga centres mushrooming all over the city, are an answer. For about Rs 1000 a month, it is a good investment on your health.

Gyms in our cities are also offering more out of the box options away from the customary treadmills and weights, like an indoor jogging track.

"You know what people generally feel about exercise. It is a chore. So we vary stuff and weave it into your lifestyle to make it fun," said Nina Reddy, managing director, O2 Health Studies.

There is a new fitness mantra, dance.

Dance schools are also throwing in a bit of gymnastics.

However, staying fit is not just about working out regularly. What one eats is just as important and that is why a fitness instructor plays detective every weekend. He makes surprise visits to his customer's homes to check what they are eating. And that is by raiding their fridges.

Healthy snacks need not be a contradiction. A little store in Chennai sells healthy alternatives to junk food.

But there's a catch. Most people, even though aware, can't afford many of the healthy food options.

"Dalda for instance is cheaper than olive oil. Fresh fruits are more expensive than packaged juices and colas. Even nuts which are rich in nutrients are costly," said a Chennai resident.
The Indian rupee fell by 26 paise to its five-year low of 47.22 against the US dollar in early trade on Wednesday owing to increased demand for the greenback from importers.
The level was last seen on June 2, 2003.
At the Interbank Forex Exchange market (Forex), the Indian currency, which breached the 47-mark for the first time in two years on Monday and closed at 46.96/97, plunged by another 26 paise to 47.22 against the US dollar.
The Forex market was closed yesterday on account of half yearly book closing of banks.

India's reputation as a safe and easygoing tourist destination has been dented by a string of alleged rapes and sexual assaults on foreigners in the past week, including at least four of them British women.

The Indian Government has called tourism officials from its 28 states to a meeting in Delhi next week to review security measures for the five million foreigners expected to visit this year.

Source :
 Japanese car major Honda Motor Co said it would launch two small cars in India within the next four years, the first of which will be by next June-July as it seeks to play a significant part in the small cars segment.

The company, which operates in India through a joint venture with the Siel Group -- Honda Siel Cars India, inaugurated its second plant here, which would mainly manufacture its small car for the Indian market.

"We will be launching two small cars in India within the next three to four years. The first one will be rolled out by June-July next year," Honda Siel Cars India Vice-President (Marketing) Jnaneswar Sen told PTI.

The company will launch its premium hatchback 'Jazz' by next year, which would be followed by a 1.2 litre petrol engine small car currently under development, he said.

The Jazz would initially be produced at the company's first plant at Greater Noida, and later would be shifted to the plant here as soon as it is completed, Sen said.

The company had announced an initial investment of Rs 1,000 crore for the plant here, which will have a capacity of 60,000 units, expandable up to 2.4 lakh units.
Companies that Fire the most in India

1) IBM— Right now this is the most firing company for IT professionals. In the last 6 months, this company has fired nearly 20% of their employees because of BG check and performance issues. This is the most insecure company from an IT professional's point of view. They don't have any strategic plans at HR policies regarding employee security. No appraisals (maximum 10%).

2) Accenture — This is second top most firing company. The firing rate is around 5%. This depends upon outsourced projects; they have a unique system where Accenture development centers around the world bid for a project coming into the company. Currently Philippinescentre is taking the cake and the Indian centers are in a firing mode.

3) WIPRO — Firing people with very frequent back ground checks and firing them with out even experience letters and relieving letters (will mention as terminated from services)but will promise the employees that they will retain them. After the project is over they will fire away. Will threaten of criminal cases against such employees if they oppose the move and has also filed against some.

4) Intel— Recently joined the league. Running in heavy losses, hence firing 3000 employees in the Banglore center in a phased out manner.

5) CTS — Has a steady firing policy (checking the Educational background and previous employment and also employee performance in work). In a Recent HCL walk-in, around 50% attendees were from this company. Sadly the I-pods have not helped them.

6) CSC — Excellent package but fires folks in Background check and those on bench regularly. Recently fired 400+ employees from its subsidiary Covansys.

7) Satyam— Currently stopped firing. The Attrition rate is very high. No firing from 2005 until now when 1000 employees were fired in Hyderabad.

8 ) Patni —- They fired so many employees that currently they are facing understaffing and deficiency with number of employees. Very high attrition rate.

9) Keane India —- This USA based company is always involved in firing employees. Although they proudly say that they dont have hire and fire policy. Recently they fired java and as 400 professionals after which most of the employees have started to pack their bags. Employees change this company within 1 year.

So take care before accepting offers from these companies.