<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4038179316179808481</atom:id><lastBuildDate>Tue, 18 Nov 2025 09:50:01 +0000</lastBuildDate><category>Tips</category><category>Do it yourself</category><category>Technology Trends</category><category>Best practices</category><category>Personal Technology</category><category>Gyaan</category><category>Against the odds</category><category>Product</category><category>FAQ</category><category>Tools</category><category>Weird</category><category>Gadget</category><category>Software</category><category>Consumer Electronics</category><category>Energy Research</category><category>Energy</category><category>Makes life easy</category><category>Technology Purchasing</category><category>Communications</category><category>Telephony</category><category>Internet</category><category>Security</category><category>Hardware</category><category>Networks</category><category>Windows</category><category>Going Green</category><category>Google</category><category>Health Research</category><category>Operating Systems</category><category>Virtualization</category><category>Blogging</category><category>VoIP</category><category>Analyst reports</category><category>Data centers</category><category>Open Source</category><category>Servers</category><category>Linux</category><category>Storage</category><category>Apple</category><category>Hacking</category><category>News</category><category>iPhone</category><category>Backup and recovery</category><category>CIO</category><category>Data archiving</category><category>Encryption</category><category>India</category><category>Medical science</category><category>Power management</category><category>Smart Phones</category><category>Twitter</category><category>BlackBerry</category><category>Business Intelligence</category><category>Evolution</category><category>IT Services</category><category>Nature</category><category>Web 2.0</category><category>White Paper</category><category>Architecture / Design</category><category>IPv6</category><category>Infrastructure</category><category>Regeneration</category><category>Solar Energy</category><category>3D Imaging</category><category>Cloud Computing</category><category>Contest</category><category>Green IT</category><category>Mainframes</category><category>Mergers - Acquisitions</category><category>Outsourcing</category><category>ROI</category><category>Skype</category><category>TCP/IP</category><category>Terrorism</category><category>Web hosting</category><category>Welcome</category><category>Wireless</category><category>Automobiles</category><category>Business Process Management</category><category>CCNA</category><category>CTO</category><category>Certification</category><category>Cryptography</category><category>Cyber attack</category><category>Data migration</category><category>Datawarehousing</category><category>Enterprise Modeling</category><category>GPS Systems</category><category>High definition</category><category>IP Address</category><category>ITIL</category><category>Knowledge Management</category><category>MAC</category><category>Monitoring</category><category>Opinion</category><category>Performance Management</category><category>Perfumes</category><category>Rational tools</category><category>SOA</category><category>SaaS</category><category>Service Oriented</category><category>Sex related</category><category>Social networking</category><category>Supercomputer</category><category>VPN</category><category>Videoconferencing</category><category>Vietnam</category><category>Windows Servers</category><category>Women</category><title>Gadgets, Tech Tips &amp;amp; News</title><description>This blog is an honest attempt to bring the latest news &amp;amp; updates in the technology space (mainly IT). It covers latest products, product reviews, and industry news among others.</description><link>http://technology-nuggets.blogspot.com/</link><managingEditor>noreply@blogger.com (The Guru)</managingEditor><generator>Blogger</generator><openSearch:totalResults>175</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-6924217816136647776</guid><pubDate>Wed, 08 Sep 2010 09:11:00 +0000</pubDate><atom:updated>2010-09-08T15:01:11.055+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Technology Trends</category><title>TCS / Infosys will buy SAP, Capgemini in 2020</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Surprised by the subject?&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;That’s exactly what the recent Forrester presentation on &lt;strong&gt;Future of Services&lt;/strong&gt; says. &lt;strong&gt;In The Coming Upheaval Of The IT Services Market&lt;/strong&gt;, John C. McCarthy - Vice President, Principal Analyst Forrester Research - observes how IT services landscape will be restructured in terms of user behavior, service offerings, Pricing/delivery models, go-to-market strategies, and the competitive landscape.&lt;br /&gt;&lt;br /&gt;Forrester talks on 4 powerful forces impact the services market:&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;strong&gt;The Restructuring Economy&lt;/strong&gt; - Sustained economic uncertainty shifts customer buying behavior and focus &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;strong&gt;Innovation Moving To The Edge&lt;/strong&gt; - Innovation shifts from core applications to the edge of the enterprise and analytics &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;strong&gt;Changing User Demographics and Decision Structures&lt;/strong&gt; - The rise of the business “influencer” new workforce demographics, and vendor management redefine buying &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;strong&gt;As-a-Service Becomes The Norm&lt;/strong&gt; - New pricing and delivery models change how services are sold and provisioned&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_Nbul4yDqbnGSiZbu0Qqe4ghlCmicLL8ICI4_KdOulig3v7xutYNFAMXGyXSS-cuag6Y6NqMMFuI3B40kzdBpPpF9JRA3DE0qxbhjukoFZ2C1kSR9WXULKhkxZq5gvT47HegIMKcq3Zo/s1600/Trends+-+IT+in+2020_1_1.JPG&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5514469043698240946&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 374px; CURSOR: hand; HEIGHT: 267px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_Nbul4yDqbnGSiZbu0Qqe4ghlCmicLL8ICI4_KdOulig3v7xutYNFAMXGyXSS-cuag6Y6NqMMFuI3B40kzdBpPpF9JRA3DE0qxbhjukoFZ2C1kSR9WXULKhkxZq5gvT47HegIMKcq3Zo/s400/Trends+-+IT+in+2020_1_1.JPG&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;It also depicts selected Service Providers Top line forecast in 2020 and how they need to structure their Organization. Possible consolidations and new partnerships would lead to globalized organizations comprising of multiple global service companies. Following slideshot explains how John observes the Top 10 IT Service Vendors in the year 2020.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;strong&gt;&lt;u&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;INTERESTED?&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt; How can you leave this golden chance to grab this complete official presentation from Forrester? It is now very simple! For &lt;strong&gt;&lt;u&gt;&lt;span style=&quot;font-size:130%;color:#ff6666;&quot;&gt;just $10&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;, you can instantly access (i.e. download PDF) the complete near 50 page document. If you want to get your own copy, simply &lt;a href=&quot;mailto:testing_guru@indiatimes.com?subject=Buy_Forrester_Trends_2020_Report&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;color:#3366ff;&quot;&gt;email me&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt; and I will guide you for the payment (through PayPal only) and on successful payment, I will send you the document.&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2010/09/tcs-infosys-will-buy-sap-capgemini-in.html</link><author>noreply@blogger.com (The Guru)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_Nbul4yDqbnGSiZbu0Qqe4ghlCmicLL8ICI4_KdOulig3v7xutYNFAMXGyXSS-cuag6Y6NqMMFuI3B40kzdBpPpF9JRA3DE0qxbhjukoFZ2C1kSR9WXULKhkxZq5gvT47HegIMKcq3Zo/s72-c/Trends+-+IT+in+2020_1_1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-5247717101832963513</guid><pubDate>Wed, 01 Sep 2010 05:50:00 +0000</pubDate><atom:updated>2010-09-08T14:59:11.417+05:30</atom:updated><title>Twitter rocks the privacy world, yet again</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;Twitter continues to face recurring problem of how to make (more and more) revenue. No surprise, as this would be the central issue for any company that was started on the premise of “scale up with a bunch of customers and then maybe we can figure out how to make some cash.” So of course Twitter management looks at different ways to create revenue. However, the current plan to record and analyze every link users click, whether on the company’s web site or using one of the popular third-party applications, is a big mistake in a number of ways.&lt;/span&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;Data on what people do and want is valuable, and so Twitter rightly figured that someone would pay to know what happened. Unfortunately, that’s bad for Twitter in a number of ways:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;div class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;Although other companies track what people click on, they have done so long enough that consumers accept it as normal. Because it just started, Twitter stands out.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;People will assume that Twitter will spy on them and keep a dossier. (And they’re probably right.)&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;Advertisers want the data, and Twitter doesn’t have the broad advertising base to keep people at arm’s length and will have trouble preserving privacy. At least, that’s what it will seem like, and perception is what eventually rules, not reality.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;Such a small percentage of people click on links, that data may have limited value and commercial worth.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:&#39;Verdana&#39;,&#39;sans-serif&#39;;&quot;&gt;The privacy issues are seriously big. The FTC slapped Twitter over data security, and one government after another seems bound on a privacy witch hunt. Just look at such companies as Google and Apple. [Source: &lt;a href=&quot;http://www.bnet.com/blog/technology-business/twitter-does-what-it-must-and-that-pisses-off-the-privacy-world/5256&quot;&gt;BNet article&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/09/twitter-rocks-privacy-world-yet-again.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-3692962518080884158</guid><pubDate>Mon, 07 Jun 2010 06:26:00 +0000</pubDate><atom:updated>2010-09-08T15:03:43.067+05:30</atom:updated><title>Scientists capture that moment when Blood Flow begins</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;By capturing movies of both the blood and vasculature of zebrafish embryos, each less than two millimeters long, researchers have been able for the first time to see the very moment that blood begins to flow [as reported by &lt;b&gt;&lt;i&gt;&lt;span style=&quot;FONT-WEIGHT: bold; FONT-STYLE: italic&quot;&gt;ScienceDaily&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;]. The observations, reported online on June 3 in Current Biology, show that the earliest blood flow, involving what appear to be hundreds of cells, begins all at once.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;Remarkably, that onset of life-giving circulation takes more than a beating heart. In fact, red blood cells remain stuck to the blood vessel wall initially, even after the heart starts to beat, says Atsuko Sehara-Fujisawa of &lt;?xml:namespace prefix = st1 /&gt;&lt;st1:place st=&quot;on&quot;&gt;&lt;st1:placename st=&quot;on&quot;&gt;Kyoto&lt;/st1:placename&gt; &lt;st1:placetype st=&quot;on&quot;&gt;University&lt;/st1:placetype&gt;&lt;/st1:place&gt;. When most of the red blood cells finish their invasion into the vasculature, they are released into the circulation almost simultaneously,&quot; she says. &quot;We could show that those blood cells release themselves into the flow, using &#39;molecular scissors&#39; to disrupt their adhesion to blood vessels and enter the circulation dependent on plasma flow. Without those scissors, blood cells stagnate on the blood vessel wall. Those molecular scissors come in the form of a protease enzyme known as ADAM8, the researchers report.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;These findings raise an obvious question: &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Why would the onset of primitive blood circulation require such an active protease instead of just going with the flow, with blood cells entering the circulation one by one?&lt;/span&gt;&lt;/b&gt; First, the researchers say, proteolysis would allow for control over which blood cells enter the circulation and which get held back. It might also help to stop blood cells from entering the circulation too early, preventing leaks that might occur if blood vessels aren&#39;t fully formed, or avoiding stagnation before an adequate flow of plasma is established with the heartbeat, the researchers add. It may be that blood cells need plasma to flow before they can reach maturity.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/06/scientists-capture-that-moment-when.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-7833720114222948273</guid><pubDate>Wed, 21 Apr 2010 11:00:00 +0000</pubDate><atom:updated>2010-09-08T15:04:24.408+05:30</atom:updated><title>India has more Cell Phones than Toilets</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;Far more people in &lt;?xml:namespace prefix = st1 /&gt;&lt;st1:place st=&quot;on&quot;&gt;&lt;st1:country-region st=&quot;on&quot;&gt;India&lt;/st1:country-region&gt;&lt;/st1:place&gt; have access to a cell phone than to a toilet and improved sanitation, according to UN experts who published a 9-point prescription for achieving the world&#39;s Millennium Development Goal (MDG) for sanitation by 2015 on April 14.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;They also urge the world community to set a new target beyond the MDG (which calls for a 50 percent improvement in access to adequate sanitation by 2015) to the achievement of 100 percent coverage by 2025.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;Recent UN research in &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;India&lt;/st1:place&gt;&lt;/st1:country-region&gt;, the world&#39;s second most populous country, shows roughly 366 million people (31 percent of the population) had access to improved sanitation in 2008. Other data, meanwhile, shows 545 million cell phones are now connected to service in &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;India&lt;/st1:place&gt;&lt;/st1:country-region&gt;&#39;s emerging economy. The number of cell phones per 100 people has exploded from 0.35 in year 2000-01 to about 45 today.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;Worldwide some 1.1 billion people defecate in the open. And data show progress in creating access to toilets and sanitation lags far behind world MDG targets, even as mobile phone connections continue to a predicted 1 billion in &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;India&lt;/st1:place&gt;&lt;/st1:country-region&gt; by 2015. Says Zafar Adeel, Director of United Nations University&#39;s Canada-based think-tank for water, the Institute for Water, Environment and Health: &quot;It is a tragic irony to think that in &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;India&lt;/st1:place&gt;&lt;/st1:country-region&gt;, a country now wealthy enough that roughly half of the people own phones, about half cannot afford the basic necessity and dignity of a toilet.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;The new UNU report cites a rough cost of $300 to build a toilet, including labour, materials and advice. Worldwide, an estimated $358 billion is needed between now and 2015 to reach the MDG for sanitation -- some of this funding is already mobilized at national and international levels.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: right&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;[&lt;i&gt;&lt;span style=&quot;FONT-STYLE: italic&quot;&gt;Ref: &lt;a href=&quot;http://www.sciencedaily.com/releases/2010/04/100414122632.htm&quot;&gt;ScienceDaily&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/04/india-has-more-cell-phones-than-toilets.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-8331473433173273872</guid><pubDate>Wed, 21 Apr 2010 04:05:00 +0000</pubDate><atom:updated>2010-09-08T15:04:56.307+05:30</atom:updated><title>Generate Electricity by tapping into Algae cells</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;In an electrifying first, Stanford scientists have plugged in to algae cells and harnessed a tiny electric current. They found it at the very source of energy production -- photosynthesis, a plant&#39;s method of converting sunlight to chemical energy. It may be a first step toward generating &quot;high efficiency&quot; bioelectricity that doesn&#39;t give off carbon dioxide as a byproduct, the researchers say.&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;The Stanford research team developed a unique, ultra-sharp nanoelectrode made of gold, specially designed for probing inside cells. They gently pushed it through the algal cell membranes, which sealed around it, and the cell stayed alive. From the photosynthesizing cells, the electrode collected electrons that had been energized by light and the researchers generated a tiny electric current. &quot;We&#39;re still in the scientific stages of the research,&quot; said Ryu. &quot;We were dealing with single cells to prove we can harvest the electrons.&quot;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;Plants use photosynthesis to convert light energy to chemical energy, which is stored in the bonds of sugars they use for food. The process takes place in chloroplasts, the cellular powerhouses that make sugars and give leaves and algae their green color. In the chloroplasts, water is split into oxygen, protons and electrons. Sunlight penetrates the chloroplast and zaps the electrons to a high energy level, and a protein promptly grabs them. The electrons are passed down a series of proteins, which successively capture more and more of the electrons&#39; energy to synthesize sugars until all the electron&#39;s energy is spent.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;In this experiment, the researchers intercepted the electrons just after they had been excited by light and were at their highest energy levels. They placed the gold electrodes in the chloroplasts of algae cells, and siphoned off the electrons to generate the tiny electrical current.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;The result, the researchers say, is electricity production that doesn&#39;t release carbon into the atmosphere. The only byproducts of photosynthesis are protons and oxygen.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: right&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;[Ref: &lt;a href=&quot;http://www.sciencedaily.com/releases/2010/04/100413121336.htm&quot;&gt;ScienceDaily&lt;/a&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/04/generate-electricity-by-tapping-into.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-232073248371563784</guid><pubDate>Tue, 20 Apr 2010 10:04:00 +0000</pubDate><atom:updated>2010-09-08T15:05:34.829+05:30</atom:updated><title>Iceland Volcano Storms could threaten UK Power Grid</title><description>&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-LEFT: 0.5in&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;color:#339966;&quot;&gt;&lt;span style=&quot;font-family:Verdana;color:#339966;&quot;&gt;Changes in the space environment caused by the Sun can lead to periods of bad &quot;space weather.&quot; As well as driving intense displays of the northern lights (or aurora borealis), this can generate unexpected currents in electricity distribution grids that could lead to blackouts and damage to valuable infrastructure with potentially high cost to the global economy.&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;A team of British scientists at &lt;?xml:namespace prefix = st1 /&gt;&lt;st1:placename st=&quot;on&quot;&gt;Lancaster&lt;/st1:placename&gt; &lt;st1:placetype st=&quot;on&quot;&gt;University&lt;/st1:placetype&gt; and the British Geological Survey (BGS) in &lt;st1:city st=&quot;on&quot;&gt;Edinburgh&lt;/st1:city&gt; have developed a new model that shows the widespread impact inclement space weather could have on the &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;UK&lt;/st1:place&gt;&lt;/st1:country-region&gt;. On April 14th, team member Katie Turnbull presented the results at the RAS National Astronomy Meeting (NAM 2010) in &lt;st1:city st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Glasgow&lt;/st1:place&gt;&lt;/st1:city&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;Bad space weather can cause fluctuations in the Earth&#39;s magnetic field (geomagnetic storms) that lead to Geomagnetically Induced Currents (GICs) in power grids. These currents have previously been blamed for blackouts in &lt;st1:country-region st=&quot;on&quot;&gt;Canada&lt;/st1:country-region&gt; and &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Sweden&lt;/st1:place&gt;&lt;/st1:country-region&gt; and are suspected of damaging power transformers in countries at lower latitudes. Large GICs have even been recorded in &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Scotland&lt;/st1:place&gt;&lt;/st1:country-region&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;To prevent future blackouts, understanding how GICs occur is vital. The model developed by the British team, the most sophisticated yet developed, takes magnetic field measurements from all over the &lt;st1:country-region st=&quot;on&quot;&gt;UK&lt;/st1:country-region&gt; and combines them with the BGS&#39;s 3D model of how the ground beneath the &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;UK&lt;/st1:place&gt;&lt;/st1:country-region&gt; conducts electricity, in order to estimate the currents induced at over 250 locations in the high voltage national grid.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;The new work provides further evidence that the size of the unwanted current depends not only on the severity of the geomagnetic storm but also on the configuration of the power grid and the direction and fluctuation speed of the electric fields produced. For many years, it was thought that only countries located at high latitudes (near to the Earth&#39;s magnetic poles) were at risk, but this is now known not to be the case. While the basic physics that links solar activity to our electricity grids is broadly understood, the interaction between natural and man-made systems makes it hard to quantity the risks.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;Results to be presented at the conference will compare simulated GICs in the &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;UK&lt;/st1:place&gt;&lt;/st1:country-region&gt; grid model with those actually measured during a geomagnetic storm in February 2003. The simulated and measured currents are similar, but the model suggests that high currents are likely to be induced at several locations in the grid where GICs were not being monitored by the power industry at the time.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: right&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;[&lt;i&gt;&lt;span style=&quot;FONT-STYLE: italic&quot;&gt;Ref: &lt;a href=&quot;http://www.sciencedaily.com/releases/2010/04/100414125142.htm&quot;&gt;ScienceDaily&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/04/iceland-volcano-storms-could-threaten.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-2248647046608105550</guid><pubDate>Tue, 09 Mar 2010 09:33:00 +0000</pubDate><atom:updated>2010-09-08T15:06:01.335+05:30</atom:updated><title>Multiply savings while buying digital products</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;With so many products being invented and re-invented every hour, the world has become a digital zoo. Seriously, I am not kidding. Every hours, there are hundreds of new product designs and developments happening around the world, some of them are absolutely crap and yet some are quite useful. With a plethora of items to choose from, how does one decide to buy something that is useful to her? With so much technological advancements happening around us, it sometimes become quite difficult to keep track of all of these, and especially if you are willing to buy any of these products, then it may turn into a nightmare.&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;?xml:namespace prefix = v /&gt;&lt;v:shapetype id=&quot;_x0000_t75&quot; stroked=&quot;f&quot; filled=&quot;f&quot; path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; coordsize=&quot;21600,21600&quot; spt=&quot;75&quot; preferrelative=&quot;t&quot;&gt;&lt;v:stroke joinstyle=&quot;miter&quot;&gt;&lt;/v:stroke&gt;&lt;v:formulas&gt;&lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;sum @0 1 0&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;sum 0 0 @1&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;prod @2 1 2&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;sum @0 0 1&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;prod @6 1 2&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;sum @8 21600 0&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;&gt;&lt;/v:f&gt;&lt;v:f eqn=&quot;sum @10 21600 0&quot;&gt;&lt;/v:f&gt;&lt;/v:formulas&gt;&lt;v:path gradientshapeok=&quot;t&quot; extrusionok=&quot;f&quot; connecttype=&quot;rect&quot;&gt;&lt;/v:path&gt;&lt;o:lock aspectratio=&quot;t&quot; ext=&quot;edit&quot;&gt;&lt;/o:lock&gt;&lt;/v:shapetype&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;v:shape id=&quot;_x0000_s1026&quot; style=&quot;MARGIN-TOP: 0px; Z-INDEX: 1; MARGIN-LEFT: 0px; WIDTH: 93.75pt; POSITION: absolute; HEIGHT: 63pt; mso-position-horizontal: left; mso-position-horizontal-relative: text; mso-position-vertical: top; mso-position-vertical-relative: line&quot; type=&quot;#_x0000_t75&quot; allowoverlap=&quot;f&quot;&gt;&lt;v:imagedata title=&quot;savebuckets logo&quot; src=&quot;cid:image001.gif@01CABF99.A6BAEC50&quot;&gt;&lt;/v:imagedata&gt;&lt;?xml:namespace prefix = w /&gt;&lt;w:wrap type=&quot;square&quot;&gt;&lt;/w:wrap&gt;&lt;/v:shape&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;Don&#39;t fret. I am not saying that we should run around to find out the best deal on a particular digital monster of your choice. In fact, there exists a single source which can help you compare prices of various electronic gadgets and digital products and also brings to you the best available deals. Ladies and gentlemen, I am pleased to introduce &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;SaveBuckets&lt;/span&gt;&lt;/b&gt;, a revolutionary concept in &lt;a href=&quot;http://bit.ly/price-comparison&quot;&gt;price comparison&lt;/a&gt; and best deals. You can now compare prices for &lt;a href=&quot;http://bit.ly/laptop-computer&quot;&gt;laptops&lt;/a&gt;, mobile phones, digital camcorders, &lt;a href=&quot;http://bit.ly/tvs-television&quot;&gt;tvs&lt;/a&gt;, computers, netbooks, etc. in a few clicks. Besides digital products, it also offers clothing, home improvement items, many varieties of &lt;a href=&quot;http://bit.ly/pushchair&quot;&gt;pushchair&lt;/a&gt;, books, personal care products, etc. I especially liked the electronic games section where in I noticed that the prices offered by SaveBuckets are much lower than predominant market prices. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;This site is neatly organized around categories and then product listings. Though the categories look cluttered and incomprehensive, I still feel that the collection is impressive. With daily list of &quot;Featured Products&quot; it becomes an experience in itself to surf this site and save big bucks. It also adds many new products every week, so it&#39;s like a treat to visit this site at least once every week to get the best of the lot. This site is also rich in user guides like Buying Guide, FAQ, etc. I am in love with the gaming section and wish I could buy many of these games when I get my increment this year!&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/03/multiply-savings-while-buying-digital.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-3851463461141155312</guid><pubDate>Fri, 05 Mar 2010 10:34:00 +0000</pubDate><atom:updated>2010-03-05T22:00:26.736+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Architecture / Design</category><category domain="http://www.blogger.com/atom/ns#">Gyaan</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Web 2.0</category><title>Tips while you hire a web-designer</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Weird question, isn&#39;t it? But it is a serious attempt to understand whether we really need a website designer in the first place. No the question is not whether you need a website. One, of course, needs it - be it for personal, business, or social purpose. The answer to my question really depends upon following points:&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;Section1&quot; align=&quot;justify&quot;&gt;&lt;ol style=&quot;MARGIN-TOP: 0in&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;What is the purpose of your website?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;How much time do you think you can invest yourself in the development of this site?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;How much familiar you are to blogging platforms, programming (HTML/CSS/PHP)?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Do you have the resources and the passion to develop the site yourself?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Can you afford to hire a website designer, in case your answer to above question is &quot;No&quot;?&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Assuming that you answered “Yes&quot; to question # 5, you should remember that website designing is not so simple at it seems. Think of it as a package containing gifts you want to send to someone you are wooing since some time. If you do not package this well, there are chances that the gifts may get damaged or even destroyed in transit. The packaging should look interesting to the other party so as to generate enough interest in you. If you succeed in first attempt, there are high chances that she will be in touch with you later as well. So you now understand that it is quite important to make the first impact an impressive one.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;You should always remember following &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;a href=&quot;http://e-articles.info/e/a/title/How-to-choose-a-Website-Designer/&quot;&gt;pointers while choosing a web designer&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;: Know what you want from your website; Know your target audience; Plan a budget; Set a deadline; Decide between a Freelancer and a Design Agency; and finally, get the specs absolutely clear as otherwise your site will become nothing less than a mess. You should also consider using advanced &lt;/span&gt;&lt;a href=&quot;http://e-articles.info/e/a/title/JavaScript-Lives-in-a-Web-Page/&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Javascript to make your site more attractive and interactive&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/03/tips-while-you-hire-web-designer.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-6415504172451337957</guid><pubDate>Thu, 04 Mar 2010 15:00:00 +0000</pubDate><atom:updated>2010-03-05T22:03:31.485+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Energy</category><category domain="http://www.blogger.com/atom/ns#">Energy Research</category><category domain="http://www.blogger.com/atom/ns#">Solar Energy</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Solar Energy is the Future</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;We consume fossil fuels at a greater rate than we have ever had over the past 50 years. That demand is fueled by the increase of cars on the street, the number of planes that take to the air and the number of homes that need electricity. Sadly, we would have depleted these resources by the end of this century which is why we have to come up with other ways to get power and solar energy may be the future. Solar energy is simply extracting the sun’s energy for power. Just to tell you how powerful the sun is, it can burn scrub lands and give you sunburn if you are out in the sun without any protection just for 30 minutes! In fact, the Greeks and the Chinese used this to set fire until the 1880’s by Charles Fritts made the first solar cell.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Instead of using a heater to warm up the home, sunlight can be used to control the temperature. You will just need large windows and shades to control the amount of sunlight that will go inside and keep the heat absorbed during the day to remain (read preserve) during night.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Solar energy can also provide warm water as it warms up cold water that passes down through the closed flat panels called &lt;em&gt;collectors&lt;/em&gt;.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;But solar energy does not only give warmth to the home. It can also be used to help power it which reduces our dependence on non-renewable resources like oil or coal. This occurs when solar cells are installed on the roof so it will be able to capture as much solar rays as possible and then converts this into electricity. You will need 10 or 12 to capture at least a kilowatt of power and more if you are powering more than just your home. &lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;The only limitation which challenges the use of solar energy is that it can only generate power during the day. The answer to this is to put an auxiliary system in place that will store the energy and kick when the sun is not available. This comes in the form of batteries which will provide power in the evening or on a cloudy day.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Advances in technology have taken solar energy to the next level. NASA uses it to power satellites in orbit, solar panels installed onboard aircraft allow it to fly across oceans while cars can travel speeds up to 40 miles per hour. It is used to power a lighthouse so seafarers will be able to find their way at sea while aircraft can land in an airport in the middle of the frozen desert.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Solar energy is safe for the environment since it does not emit any harmful gases or chemicals into the air. It is a renewable resource that has not yet been fully tapped by a lot of countries which makes it very viable for the future.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;But is it the only answer to reduce our dependence on oil? No because solar energy is just one of the options. We can also harness the power of the wind, the wave in the oceans, geothermal heat, hydroelectricity and a lot more instead of relying on coal or even nuclear energy that may harm the environment.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;It is something we have to push for the next generation.&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2010/03/solar-energy-is-future.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-5591852886821950521</guid><pubDate>Thu, 04 Mar 2010 11:33:00 +0000</pubDate><atom:updated>2010-03-05T22:04:45.577+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>If you&#39;re a developer, you&#39;ll need this...</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Software developers, popularly knows as Programmers, are those cretures which &quot;get stuck&quot; most often. Sometimes they are stuck in code, sometimes in functional specs, in technical requirements, in test cases, or sometimes even in code review! Most often, a developer will be stuck doing what she does best - programming. A developer, irrespective of the technology she is working on, will often need lot of &quot;Help&quot; on the technology / coding. Sometimes she is using a latest technology / framework and not much is known about it, yet some other time she is working on something niche which exists but is not known to many, and in some cases, she is using outdated stuff to which all outdated support is available.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;So, generally, &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;a href=&quot;http://www.articleinput.com/e/a/title/How-and-where-does-a-software-developer-get-help&quot;&gt;when a developer will need assistance during coding, what does she do?&lt;/a&gt;&lt;/span&gt;&lt;/b&gt; What are her options? Search for the probable solution on the Internet, check with friends, or read help - online/offline.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;Section1&quot; align=&quot;justify&quot;&gt;&lt;ol style=&quot;MARGIN-TOP: 0in&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;The most favoured and usually quickest option is the &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Emperor Google&lt;/span&gt;&lt;/b&gt;: Yes, Google turns out to be most trustworthy companion of a developer. Would you believe that Google has an archive of newsgroup messages since before the advent of Linux! Because of Google&#39;s awesome technology, it can crawl through millions on blogs, forums, and online help sites to bring out the most relevant content. No wonder, it still is most favoured source to turn for help.&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Second most favoured option is &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Emailing lists and Newsgroups&lt;/span&gt;&lt;/b&gt;: Usually developers exchange email addresses whenever and wherever they meet, so that they stay connected with like-minded folks. Whenever someone faces an issue, she can simply shoot an email to this wide group and expect an answer pretty quickly.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Another not-so-favoured option is &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Vendor sponsored resources&lt;/span&gt;&lt;/b&gt;: This is quite rare and not all developers have access to this. It usually is shipped with new product releases to a specific set of priority customers, and those developers will then have exclusive access to the help documents.&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Did you know that you can also get instant &lt;/span&gt;&lt;a href=&quot;http://www.articleinput.com/e/a/title/Insurance-for-your-newly-designed-home/&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Insurance for your newly designed home&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;?&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/03/if-youre-developer-youll-need-this.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-9165607774575432104</guid><pubDate>Thu, 04 Mar 2010 10:52:00 +0000</pubDate><atom:updated>2010-03-05T22:05:41.101+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogging</category><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">Gyaan</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Revolutionize website design with CSS &amp; XHTML</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Is CSS important for a website / blog?&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;I know this is an insane question. The answer is not only YES, but a resounding &quot;Absolutely Yes&quot;. There was time, long long ago, when I used to create website using HTML and a bit of basic Javascript. Then I enlightened myself with advanced Javascript and my sites became more interactive. Later I learnt about CSS and then my entire world went for a tailspin... My sites now look fantastic, sleek and modern. I added spice to it by using PHP programming and my sites are now absolutely incredible. Thanks to CSS, XHTML, and PHP.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;I do not want to emphasize my proficiency here. Actually I wanted to highlight how important and unseparable part CSS has become in today&#39;s website development. Even though scripting and CSS become quite a challenge for web designer, it certainly brings great rewards when the site finally goes live. &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;a href=&quot;http://www.web-articles.info/e/a/title/Combining-the-Worlds-of-HTML-XHTML-and-CSS/&quot;&gt;With the 3 pillars of website designing&lt;/a&gt;&lt;/span&gt;&lt;/b&gt; (namely, HTML, XHTML and CSS), everything looks pretty much in proper place: all pictures are in position, all headings are alike and all of the content flows in a predefined pattern of formatting. All of this, perhaps, was impossible without the 3 pillars. They do have their own pitfalls: to use CSS, once needs to be quite patient and have attention to details; XHTML calls for strict discipline in coding. &lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;o:p&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;/span&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;But the rewards at the end of the exercise are handsome. Your site will not only look sexy, it will be as per latest standards, extensible, scalable, and easily manageable.With CSS, you can simply play with the colors. Remember, using plain HTML has lot of constraints on the way components (text, images, placeholders, quotes, etc.) are displayed. With CSS, you can revolutionize the user experience by throwing multitudes of colors - forecolor, backcolor, shading, gradient, etc. &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;a href=&quot;http://www.webworldarticles.com/e/a/title/Most-used-colors-and-color-tools-in-web-design/&quot;&gt;Although most widely used colors on web&lt;/a&gt;&lt;/span&gt;&lt;/b&gt; undoubtedly are Red, Yellow, Black, and White, you can make millions of combinations by using Hex colors and Color schemes.&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2010/03/revolutionize-website-design-with-css.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-494586186118153089</guid><pubDate>Thu, 31 Dec 2009 04:13:00 +0000</pubDate><atom:updated>2010-01-30T09:23:05.557+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">Opinion</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Technology Trends</category><title>Microsoft&#39;s View on Security in the Cloud</title><description>&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;By building on the same security principles used to manage risks to Microsoft software development and operating environments, Microsoft has created an online &lt;b&gt;&lt;i&gt;&lt;span style=&quot;FONT-WEIGHT: bold; FONT-STYLE: italic&quot;&gt;Information Security Program&lt;/span&gt;&lt;/i&gt;&lt;/b&gt; — that results in continuous improvements to security for the Microsoft cloud computing environment. The coordinated and strategic application of people, processes, and technology allows Microsoft to adapt to the rapid changes happening within the cloud infrastructure and in the marketplace for online services while still maintaining a trustworthy computing experience for customers.&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Having a defense-in-depth approach is a fundamental element in how Microsoft provides a trustworthy cloud infrastructure. Applying controls at multiple security measures of varying strength — depending on the sensitivity of the protected asset — results in improved capacity to prevent breaches or to lessen the impact of a security incident. The advent of cloud computing does not change this principle — that the strength of the controls derives from the sensitivity of the asset — or how essential it is to managing security risks. The fact that in a cloud computing environment most assets can be virtualized results in shifts in the analysis of risk and how to apply security controls to the traditional defense-in-depth layers (&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;physical, network, data, identity access, access authorization and authentication, and host&lt;/span&gt;&lt;/b&gt;).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Online services&lt;/span&gt;&lt;/b&gt;, including the infrastructure and platform services take advantage of virtualization. As a result, customers using services hosted on the Microsoft cloud may have assets that can no longer be easily associated with a physical presence. Data may be stored virtually and distributed across many locations. This basic fact means identifying security controls and determining how to use them to implement a layered approach to protecting assets must evolve. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Physical and network security measures&lt;/span&gt;&lt;/b&gt; must, of course, still be taken. However, the focal point of risk management shifts closer to the object level, closer to the elements in use in the cloud environment: for example, the static or dynamic data storage containers, the virtual machine objects, the run-time environments in which computations occur.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Host Security and Auditing and Reporting&lt;/span&gt;&lt;/b&gt;: Daily scanning of the infrastructure assets; penetration testing performed by internal &amp;amp; external parties &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Application Security&lt;/span&gt;&lt;/b&gt;: The rigorous security practices employed by development teams at Microsoft were formalized into a process called the &lt;b&gt;&lt;i&gt;&lt;span style=&quot;FONT-WEIGHT: bold; FONT-STYLE: italic&quot;&gt;Security Development Lifecycle&lt;/span&gt;&lt;/i&gt;&lt;/b&gt; (SDL). Many cloud and online service development projects have shorter release schedules or the frequent addition of new features and capabilities. Agile development is widely adopted methodology for software development, and widely suited to these projects. Microsoft has evolved its SDL process to be effective in these accelerated development models and offers development teams the flexibility to adapt their secure code development practices to meet a project&#39;s specific goals and timeframe.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Identity and Access Management&lt;/span&gt;&lt;/b&gt;: Microsoft uses a need-to-know and least-privilege model to manage access to assets. Highly sensitive assets require multifactor authentication, including such measures as password, hardware tokens, smart cards, or biometrics.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Data Security&lt;/span&gt;&lt;/b&gt;: Microsoft applies security controls to assets based on asset classification. Controls include data encryption at rest and in transit.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Network Security&lt;/span&gt;&lt;/b&gt;: Microsoft applies many layers of security as appropriate to data center devices and network connections.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-BOTTOM: 6pt&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Physical Security&lt;/span&gt;&lt;/b&gt;: Microsoft ensures the establishment of outer and inner perimeters with increasing controls through each layer. The security system applies the combined use of technology solutions including cameras, biometrics, card readers, and alarms with traditional security measures such as locks and keys.&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2009/12/microsofts-view-on-security-in-cloud.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-130068100620344480</guid><pubDate>Fri, 25 Dec 2009 10:05:00 +0000</pubDate><atom:updated>2009-12-28T15:48:49.350+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Backup and recovery</category><category domain="http://www.blogger.com/atom/ns#">Best practices</category><category domain="http://www.blogger.com/atom/ns#">Do it yourself</category><category domain="http://www.blogger.com/atom/ns#">Gyaan</category><category domain="http://www.blogger.com/atom/ns#">Makes life easy</category><category domain="http://www.blogger.com/atom/ns#">Product</category><category domain="http://www.blogger.com/atom/ns#">Software</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Tool to fix any computer problem: Spotmau PowerSuite 2010</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Are you still struggling with the age-old computer? Does your computer give problems while booting up? Do you often find yourself entangled among a lot of pesky computer problems which simply are making your life hell? Can’t find (or afford) a professional to quickly fix your computer? Sounds familiar situation?? If you find your poor soul fighting these pesky issues, then you’ve come to the right place… If you’re reading this, you are 50% closer to the optimal solution that will take care of all of your computer-related problems, including that of optimization. Yes, I am glad to introduce to you the latest &lt;a href=&quot;http://www.shareasale.com/r.cfm?b=163100&amp;amp;u=229691&amp;amp;m=7842&amp;amp;urllink=&amp;amp;afftrack=&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Spotmau PowerSuite 2010&lt;/strong&gt;&lt;/a&gt; using which users can easily check, optimize, speed up and fix any computer problems on Windows 2000/XP/2003/Vista/7.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;This stupendous software is developed by Spotmau, the global leader in utilities software and computer services. Some of the key features of Spotmau Powersuite 2010 are: &lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;justify&quot;&gt;&lt;table cellpadding=&quot;5&quot; border=&quot;0&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://www.shareasale.com/r.cfm?b=204051&amp;amp;u=229691&amp;amp;m=7842&amp;amp;urllink=&amp;amp;afftrack=&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;img alt=&quot;20%off Holiday Special - Give You A Fast and Error-free PC&quot; src=&quot;http://www.shareasale.com/image/7842/250250G.gif&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;&lt;ol&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;360°PC Health Check, 1-click to perform a comprehensive health scan for your computer &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;TuneUp kit, includes Windows Speedup, Windows Cleaner and Customization &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Emergency Kit, includes Windows Recovery, Windows Backup, Data Transfer &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Data Backup Kit, includes Folder Backup, Folder Recovery, Clone Genius &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Data Recovery Kit, includes Undelete, Unformat, Raw Rescue &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Privacy Kit, includes Program Lockup, File Shredder, File Encryption, Personal Safe, Disk Wiper &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Password Kit, includes Admin/User Password, Password Finder, MS Key Finder &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Partition Genius, the most easy and comprehensive hard disk partition utility&lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;About Spotmau&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;&lt;img style=&quot;FLOAT: right&quot; alt=&quot;Spotmau&quot; src=&quot;http://www.spotmau.com/images/logo.gif&quot; border=&quot;0&quot; /&gt;Spotmau Corporation was established in April, 2006. It has quickly become the market leader both in software utilities developer and a computer service company. It has been awarded a Certificate of CMMI CL3. A long term and stable cooperation relationship with many leading companies has been established, such as Google, Microsoft, Intel, Digital River, etc. Spotmau.com is a one-stop shop for all your computer needs. It provides both &quot;Fix It Yourself&quot; and &quot;We Fix It For You&quot; services. Their team of Microsoft-Certified Engineers will instantly fix computer problems for you through our Remote Control Platform.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;u&gt;Featured Clients&lt;br /&gt;&lt;/u&gt;&lt;/strong&gt;The list includes influential clients like American Red Cross, Boeing, United States Air Force, ExxonMobil, US Army Corps of Engineers, JC Penny, Air Canada, and Brothersoft.&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/12/tool-to-fix-any-computer-problem.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-5456406415923154516</guid><pubDate>Mon, 14 Dec 2009 09:09:00 +0000</pubDate><atom:updated>2009-12-28T10:56:21.076+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Against the odds</category><category domain="http://www.blogger.com/atom/ns#">Do it yourself</category><category domain="http://www.blogger.com/atom/ns#">Gyaan</category><category domain="http://www.blogger.com/atom/ns#">Product</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Weird</category><title>Win your favourite gadget by paying a small amount!</title><description>&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;With the revolution in the entertainment industry by the introduction of iPod, Apple has, for sure, changed the entire game. With the introduction of yet another revolutionary product, iPhone, Apple shocked every other rival and steered ahead to become clear market leader. It has even came up with a few other products like iPod Touch, iTV, the customer is sure to get pleasant shocks… You will remember how iPod created a wave, a fever… there were even thefts reported – people just resorted to rob those who owned an iPod… Such was the glory, pleasure, and charisma of owning an iPod. Today it is not so costly, almost everyone can buy one iPod now… But my opinion is that, if you can &lt;b&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;a href=&quot;http://www.bidhere.com/&quot;&gt;Win&lt;/a&gt;&lt;/span&gt;&lt;/b&gt; an iPod, why should you Buy it? &lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Confusing? It should not be. I have just stumbled upon a revolutionary service, &lt;b&gt;&lt;u&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;BidHere&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;, whereby one can bid for the favourite gadget and cross his fingers – you might actually win that gadget! You end up paying only the bid amount (and delivery charges as and where applicable). So it turns out that you actually pay only a fraction of the total price of that gadget. I have started bidding for Apple iPhone, Apple MacBook Pro, Panasonic 5.1 Channel Home Theatre System, &lt;/span&gt;&lt;a href=&quot;http://www.bidhere.com/&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Sony PS3&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;, Samsung LED TV, and &lt;/span&gt;&lt;a href=&quot;http://www.bidhere.com/&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Nintendo Wii&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;. I hope I win at least one of these favourite and most-wanted gadgets. Most important of all – BidHere is secured, certified, and verified for safe online transactions! I have found that it follows fair bidding practices through their unique technique called Fair Auction Guarantee, which ensures that every user gets a fair chance to win a gadget, irrespective of his/her other details like nationality, race, status, etc. Bidding on this site is very simple; check out the timer against each of the gadget, bid your amount, and wait. If you are outbid, raise your bid (by $0.02) and continue until you win! That’s it… I really wish I get at least one of the gadgets in my wishlist! &lt;strong&gt;Amen…&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2009/12/win-your-favourite-gadget-by-paying.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-6881172880869905440</guid><pubDate>Thu, 05 Nov 2009 03:30:00 +0000</pubDate><atom:updated>2009-11-05T09:00:00.140+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Communications</category><category domain="http://www.blogger.com/atom/ns#">IPv6</category><category domain="http://www.blogger.com/atom/ns#">Technology Trends</category><category domain="http://www.blogger.com/atom/ns#">Telephony</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">VoIP</category><title>Microsoft&#39;s unified messaging software, voicemail: Pros &amp; cons (2/2)</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;--- Continued from Part 1 ---&lt;/strong&gt;&lt;/span&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIfir0AjijlUYagKpaIp9X7pVKU_tw84gLZoqTiSyjqN7qQjKg-kcJlic05Squ-ubqelOlx38iPbvmZLkcWMf4jc1jbTDhV0w6iTn7iUrlT8ZGErQooJgl-1GElypsIJ0MjKu7Hg-RDmQ/s1600-h/unified+messaging+deployment.JPG&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5398629122855237410&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 214px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIfir0AjijlUYagKpaIp9X7pVKU_tw84gLZoqTiSyjqN7qQjKg-kcJlic05Squ-ubqelOlx38iPbvmZLkcWMf4jc1jbTDhV0w6iTn7iUrlT8ZGErQooJgl-1GElypsIJ0MjKu7Hg-RDmQ/s320/unified+messaging+deployment.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Another important consideration regarding a unified messaging implementation is that, depending on the size of your organization, you may want to use a dedicated server to act as a unified messaging server, rather than trying to piggyback the unified messaging role on one of your other Exchange servers. Because of voice prompts, unified messaging is processor-intensive, so offloading the unified messaging role to a dedicated server is a good idea. The adjoining figure shows what a typical unified messaging deployment looks like. In the figure, an IP-PBX and a legacy PBX are running in parallel so that you can see how the SIP gateway fits into the picture. &lt;strong&gt;&lt;em&gt;Click on the figure to see enlarged picture&lt;/em&gt;&lt;/strong&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Keep in mind that voice messages are not actually stored on the unified messaging server but, rather, in each user&#39;s Exchange mailbox. You will therefore want to make sure that users&#39; mailbox servers have plenty of free disk space to accommodate voice messages.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;u&gt;Other considerations&lt;br /&gt;&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;There are two extremely important issues one must consider while implementing unified messaging. The first one involves &lt;strong&gt;&lt;u&gt;&lt;span style=&quot;color:#ff6666;&quot;&gt;licensing&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;. Unified messaging works by placing voicemail messages into users&#39; Exchange Server mailboxes. This means that you will have to purchase an &lt;strong&gt;&lt;u&gt;Exchange Server Client Access License&lt;/u&gt;&lt;/strong&gt; (CAL) for any user who will be using unified messaging. The other issue is that unified messaging stores a user&#39;s voice, email, and fax messages within a single database. So &lt;strong&gt;&lt;u&gt;&lt;span style=&quot;color:#ff6666;&quot;&gt;robust hosting solution&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt; become extremely important. If the server which is hosting the database fails, users with mailboxes on that server will lose access to all three types of messages until the server is brought back online. You can, however, utilize clustering solutions to minimize the chances of such a failure.&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/11/microsofts-unified-messaging-software_05.html</link><author>noreply@blogger.com (The Guru)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIfir0AjijlUYagKpaIp9X7pVKU_tw84gLZoqTiSyjqN7qQjKg-kcJlic05Squ-ubqelOlx38iPbvmZLkcWMf4jc1jbTDhV0w6iTn7iUrlT8ZGErQooJgl-1GElypsIJ0MjKu7Hg-RDmQ/s72-c/unified+messaging+deployment.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-6308210799094980227</guid><pubDate>Mon, 02 Nov 2009 05:06:00 +0000</pubDate><atom:updated>2009-11-02T10:37:29.890+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Communications</category><category domain="http://www.blogger.com/atom/ns#">IPv6</category><category domain="http://www.blogger.com/atom/ns#">Technology Trends</category><category domain="http://www.blogger.com/atom/ns#">Telephony</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">VoIP</category><title>Microsoft&#39;s unified messaging software, voicemail: Pros &amp; cons (1/2)</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Exchange Server 2007, with its unified messaging role, is Microsoft&#39;s latest attempt at jumping on the VoIP bandwagon. Unified messaging allows Exchange Server to essentially act as your company&#39;s central voicemail system. Voice messages can be placed into users&#39; inboxes alongside email messages and faxes. Exchange Server&#39;s unified messaging role has many more capabilities than just voicemail, but since voicemail is the primary feature, so let&#39;s take a realistic look at Exchange 2007 and discuss whether or not unified messaging is ready for prime time.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;u&gt;Anywhere access&lt;br /&gt;&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;Before we start talking about system requirements and limitations, lets discuss some of the advantages of using unified messaging. If you are going to go through the hassle and expense of phasing out your existing voicemail system and replacing it with unified messaging, there have to be some benefits that make the project worthwhile.&lt;br /&gt;&lt;br /&gt;The biggest advantage of using unified messaging (from a voicemail perspective) is that it makes it a whole lot easier for users to get their messages. With a traditional voicemail system, users basically had two methods of getting their messages. They could either dial into the voicemail system, enter a PIN and check for new messages, or they could wait until they got back to their desk and see whether the little red light on the phone was flashing. Neither of these methods is very efficient, though. Checking for the flashing red light isn&#39;t practical for those who spend a lot of time away from the desk, and dialing into the voicemail system to check messages is time-consuming and disruptive.&lt;br /&gt;&lt;br /&gt;The Exchange unified messaging role treats voice messages like email messages. The advantage of this is that email is pervasive. The primary mechanism for checking email is Microsoft Outlook, but users may also check email through Web-based clients such as Microsoft Outlook Web Access, and messages are often sent to users&#39; cell phones or PDAs using Direct Push or ActiveSync. The point is that users can receive email messages in any number of ways with very little effort. Unified messaging makes it possible for users to receive voice messages right alongside email messages. Of course, unified messaging still supports the traditional methods of checking voicemail.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;u&gt;Implementation&lt;br /&gt;&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;Without a doubt, the biggest disadvantage of using unified messaging as your company&#39;s voicemail system is the implementation. The implementation process can be both complex and expensive. The biggest obstacle to a unified messaging implementation is often a company&#39;s PBX system. Exchange Server doesn&#39;t actually care what kind of PBX you have, but Exchange does need to be able to communicate with the PBX. As such, Exchange assumes that you are using an IP-based PBX that supports VoIP.&lt;br /&gt;&lt;br /&gt;The problem is that while IP-PBX systems are becoming more common, most companies still use legacy circuit-switched PBX systems. These PBX systems use circuit-switched protocols such as Time Division Multiplexing (TDM) for transporting phone traffic. You can make Exchange work with a legacy PBX system, but to do so, you will have to implement a session initiated protocol (SIP) gateway. A SIP gateway&#39;s job is to facilitate communications between a legacy PBX and Exchange Server.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Trebuchet MS;&quot;&gt;&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;right&quot;&gt;&lt;span style=&quot;font-family:Trebuchet MS;&quot;&gt;&lt;strong&gt;--- To be concluded in next part ---&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/11/microsofts-unified-messaging-software.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-3395311456415572497</guid><pubDate>Sat, 31 Oct 2009 04:39:00 +0000</pubDate><atom:updated>2009-10-31T10:27:32.327+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Energy</category><category domain="http://www.blogger.com/atom/ns#">Energy Research</category><category domain="http://www.blogger.com/atom/ns#">Solar Energy</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Yes, Solar Energy is the next big thing</title><description>&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Despite its stupendous advantages, solar power has yet to fully make it in the mainstream. WHY? This is a debatable question and I will try to bring forth a few clear benefits of solar power as against the conventional energy and then will try to compare benefits offered by solar power over its counterparts.&lt;/span&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;In the long run, solar power saves money&lt;/u&gt;&lt;/strong&gt;. I agree that initial costs of installation and operations may be more expensive than that for other energy forms; but after settling the expenses, you have an energy resource that is almost free. There are no charges for using sunlight - in fact it is more readily available in some tropical countries! The ROI can also be shorter depending on how much energy you use. You won’t spend too much on maintenance either. The most important raw material, the photovoltaic cells, usually last for 15 to 20 years. There are no mechanical or moving parts to oil and maintain nor are there parts that need to be replaced yearly. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;Solar power is environmental friendly&lt;/u&gt;&lt;/strong&gt;. It is renewable, unlike fossil fuels which, according to some studies, will be exhausted in a few decades from now. The process of converting energy to usable electricity does not involve the release of toxic chemicals which can harm the environment. Hazardous emissions from other energy generation plants including Carbon Dioxide, Nitrogen Oxide, Sulphur Dioxide, Lead, and Mercury will become a history when everyone goes solar. Relying on the sun for power also helps reduce global warming.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;There are no hazardous working conditions &amp;amp; no health risks to workers&lt;/u&gt;&lt;/strong&gt;. Unlike the toxic wastes and pollutants involved in and generated by conventional energy plants, solar power generation involves very minimum generation of hazardous chemicals. There would be limited health risks in solar plants as compared to conventional energy plants.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;Solar power is a boon for remote &amp;amp; poorer places&lt;/u&gt;&lt;/strong&gt;. The use of solar panels is also good for remote areas where providing basic electricity services is troublesome if not totally impossible at all. Solar energy can be transported to far flung villages and once installed they can be left alone for years with little or without maintenance. For a poor country, producing electricity through solar energy can mean independence from oil-producing countries which controls the supply and prices of oil. With such independence, new policies on energy can be created which will maximize the benefit for its citizens. Countries will also not be wary on natural disasters which hampers delivery of oil. (&lt;span style=&quot;color:#ff6666;&quot;&gt;&lt;strong&gt;Can you forget the recent Indian Oil Inferno that was erupted in Jaipur, India, a few days before - which was triggered by human negligence?&lt;/strong&gt;&lt;/span&gt; All such disasters will be a histroy when we switch to friendly solar power.) With this new found independence, countries can invest its national budget on other programs aside from purchasing oil from foreign sources.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;I agree that there are several disadvantages of using solar power and one of which is the &lt;strong&gt;huge initial costs&lt;/strong&gt;. But thinking about it in the long run, you’ll see that the benefits of solar energy outweigh the disadvantages. Plus, with the current development in the field of science and technology, solar power is becoming more and more convenient and it would not be surprising to find solar energy as a primary source of power in the next few years.&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2009/10/yes-solar-energy-is-next-big-thing.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-2035810841598282862</guid><pubDate>Thu, 29 Oct 2009 04:29:00 +0000</pubDate><atom:updated>2009-10-31T10:07:38.242+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Against the odds</category><category domain="http://www.blogger.com/atom/ns#">Energy</category><category domain="http://www.blogger.com/atom/ns#">Energy Research</category><category domain="http://www.blogger.com/atom/ns#">Solar Energy</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Interesting Facts about Solar Energy</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;There are lots of interesting facts about solar energy. Educating yourself about this will prove to be beneficial in the long run. You can share the information to your loved ones. You can teach them of ways on how they can help to &lt;strong&gt;conserve the energy&lt;/strong&gt;. You can also do your share to help this method to advance if you are a genius in the field. But if you are an ordinary citizen who only wants to enjoy, then feast on. But remember that you also have responsibilities to the environment that you must accomplish in order to do your part in the whole scheme of things.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;u&gt;The Facts that Matter&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;ol&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Solar radiation makes it possible for the energy coming from the sun to be used as power source and energy that can in turn be used for many purposes. The technology on this aspect is characterized in two ways. They can either be passive or active. This will depend on the methods that are used to get, convert and allocate sunlight.&lt;br /&gt;&lt;br /&gt;What are active solar techniques? These utilize pumps, photovoltaic panels and fans to renovate sunlight into useful resources. These aim to increase the energy supply that is why these can also be referred as supply side technologies. The passive solar techniques, on the other hand, use only selected resources with constructive thermal properties, utilize the kind of spaces that can circulate air naturally and apply the position of buildings and structures towards the sun. These will lessen the need for other sources and can also be referred as the demand side technology.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Solar energy has influenced many factors that surround people. This can be referred in planning and designing buildings. This process can be rooted back at the early days of the architectural history. The Greeks and the Chinese first used such factor in building and constructing their architectural pieces and on their planning methods.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Solar energy is also being utilized by the agricultural sector because they rely heavily on its benefits in order to gain more harvest. They developed ways in order to plant the kind of crops that will grow according to the amount of sun that they will be getting for the season. This can also be used to dry the crops, pump water, brooding of chicks and to dry animal&lt;br /&gt;manures that can later be used as fertilizers.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;On seasons like the Little Ice Age, fruit walls were used by French and Chinese farmers to be able to collect and store solar energy to help them keep the plants warm and to speedy up the process of ripening of fruits. These walls serve as the thermal masses. The fruit walls that were first developed were perpendicular to the ground and faced the south direction. Over time, innovations were done and slopping walls were used to gain more advantage from the sun.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;To convert the solar light into heat, people have developed greenhouses. These enable the production and cultivation of specialty crops all year round. Such innovation made it possible for crops to be produced in untimely seasons and in places where you think that those plants won’t grow. And these are only some of the interesting facts about solar energy. These give you a good peek at how wonderful nature is and how people have developed ways to use it to advance in many aspects of their lives.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;</description><link>http://technology-nuggets.blogspot.com/2009/10/interesting-facts-about-solar-energy.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-9104820494733366715</guid><pubDate>Fri, 16 Oct 2009 05:59:00 +0000</pubDate><atom:updated>2009-10-16T12:06:48.886+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Best practices</category><category domain="http://www.blogger.com/atom/ns#">Do it yourself</category><category domain="http://www.blogger.com/atom/ns#">Energy</category><category domain="http://www.blogger.com/atom/ns#">Energy Research</category><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">Going Green</category><category domain="http://www.blogger.com/atom/ns#">Gyaan</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Weird</category><title>Dumb questions about being Eco-friendly &amp; Green (10)</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;Q19: Will washing my clothes at 30 degree C really get them clean?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;A: If the reaction of consumers is anything to go by, washing powders formulated for use at lower temperatures do work. In a 2006 study by the UK&#39;s Energy Saving Trust, 89% of families who had been asked to test Ariel at 30 degree C said they would continue using it that way. Likewise, while only 2% of UK households were washing at 30 degree C in 2002, five years later that figure was 17%. Meanwhile in Germany, where people have traditionally used lower washing settings than in the UK, they are turning down to 20 degree C, and in North America growing numbers are doing their laundry in cold water. Unfortunately, there are some nasties that low temperatures may not remove. Researchers from the University of Seoul, South Korea, found that washing with biological detergent at 30 degree C only killed 6% of dust mites, compared with 100% at 60 degree C, and leaves traces of other allergens, including pollen grains and dog skin cells. The global detergent manufacturer Unilever, which has been keen to promote the eco-message, still advises customers to run one wash per week at 40 degree C to ensure bacteria don&#39;t have a chance to grow in the machine and cause unpleasant smells.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Q20: What is the single most effective thing I can do for the environment?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;A: Over a 75-year lifespan, the average European will be responsible for about 900 tonnes of CO2 emissions. For Americans and Australians, the figure is more, like 1500 tonnes. Add to that all of humanity&#39;s other environmentally damaging activities, and draconian as it may sound, the answer must surely be to avoid reproducing!&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/10/dumb-questions-about-being-eco-friendly.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-498757461812934074</guid><pubDate>Fri, 02 Oct 2009 05:57:00 +0000</pubDate><atom:updated>2009-10-16T12:06:28.828+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Best practices</category><category domain="http://www.blogger.com/atom/ns#">Do it yourself</category><category domain="http://www.blogger.com/atom/ns#">Energy</category><category domain="http://www.blogger.com/atom/ns#">Energy Research</category><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">Going Green</category><category domain="http://www.blogger.com/atom/ns#">Gyaan</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Weird</category><title>Dumb questions about being Eco-friendly &amp; Green (9)</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;Q17: Is it better to buy an eco-friendly car, with all the energy that is needed to produce it, or just run my old one into the ground?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;A: According to the ETA, when the average new car leaves the showrrom, its manufacture, design and marketing have accounted for up to 6 tonnes of CO2 emissions! Nevertheless, swapping a thirsty and polluting old car for a lighter and more fuel-efficient model does make a good environmental sense. But the gains made from exchanging five year old family car, for example, with a similar sized brand new model are likely to be negligible!&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Q18: What&#39;s the best way to charge my laptop - little and often or let the battery run down completely?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;A: In energy terms, you use the same amount of electricity either way. However, charging a battety little and often reduces its capacity to hold charge, and eventually it will lose its capacity to charge altogether! If you kill your battery like this, you&#39;ll need a new one - and batteries take a lot of energy and materials to produce. So charge your battery fully and then let it run down completely (or till 85% of its capacity if not 100%) and then recharge. This will ensure the longest possible life out of your battery!&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/10/dumb-questions-about-being-eco-friendly_16.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-7989425201464201745</guid><pubDate>Sat, 15 Aug 2009 05:56:00 +0000</pubDate><atom:updated>2009-08-18T15:32:20.769+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Best practices</category><category domain="http://www.blogger.com/atom/ns#">Do it yourself</category><category domain="http://www.blogger.com/atom/ns#">Energy</category><category domain="http://www.blogger.com/atom/ns#">Energy Research</category><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">Going Green</category><category domain="http://www.blogger.com/atom/ns#">Gyaan</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Weird</category><title>Dumb questions about being Eco-friendly &amp; Green (8)</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;Q15: If I&#39;m stuck in a stop-start traffic jam, do I use more petrol turning my car on and off repeatedly, or leaving it running?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;A: Unless you are certain you won&#39;t have to pull away at short notice, the inconvenience and tiny amounts of fuel involved make stopping and restarting the engine hardly worthwhile. The UK Automobile Association recommends switching off engines if you&#39;re likely to be stopped more than 3 minutes. Technology is already providing a better solution, though. Recognising that many hours of urban driving are spent at a standstill, several car manufacturers have started to introduce so-called &quot;stop-start&quot; technology. In fact, Volkswagen recently mothballed plans for a hybrid car, preferring to invest in stop-start technology on its standard models to achieve fuel efficiency savings of between 10 and 15% in urban traffic.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Q16: Does it really take more energy to recycle an aluminium can than to make a new one?&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;A: NO, absolutely not. According to Alcoa, the world&#39;s third largest aluminium producer, manufacturing a can from recycled aluminium uses only 5% of the energy required to make one from scratch - an energ saving that could power a 100 watt bulb for 4 hours!! &lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/02/dumb-questions-about-being-eco-friendly_15.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-216498232353206913</guid><pubDate>Fri, 17 Jul 2009 04:19:00 +0000</pubDate><atom:updated>2009-07-17T10:58:41.371+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Against the odds</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Open Source</category><category domain="http://www.blogger.com/atom/ns#">Operating Systems</category><category domain="http://www.blogger.com/atom/ns#">Technology Trends</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Google Chrome OS: What you must know…</title><description>&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Google has finally, though little late, announced its long-expected operating system, the Chrome OS. Here are my 2 cents about this much hyped OS…&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Everyone now knows that Chrome OS is like a secret well kept amongst a billion of netizens! Google’s idea is to essentially create a thin client OS for consumers. This is not going to have a big impact on IT departments and businesses, many of which are experimenting with Windows-based thin client solutions such as VDI. However, IT experts should understand Chrome OS because you never know when people start using it and you may feel left out!&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;What&#39;s so special about Chrome OS?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Runs with a Linux kernel as its base&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Boots directly into the Chrome Web browser&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Aimed primarily at netbooks&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Runs on both x86 and ARM processors&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Not designed for local storage; all data will be stored in the cloud&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;No Chrome OS API’s released; instead, techies can build Web apps running on a standard browser&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Most important features, according to Google, are: Speed, Simplicity, and Security&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Why Chrome OS Matters? &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Does it? REALLY?? Well, here are 3 most important reasons why it does…&lt;/span&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;Windows OS is a monopoly… It sure needs tougher competition to pull up its socks!&lt;/strong&gt;&lt;br /&gt;Microsoft Windows “ruled” personal computers for almost 2 decades, with little competition from Apple’s Macintosh (~10% share). Now that people are bored with stereotypical Windows and menace from the likes of virus, spyware, and security troubles are its biggest weaknesses, Google is wise enough to target those soft targets with a promising Chrome OS.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;Because Chrome OS will be cheap&lt;/strong&gt;&lt;br /&gt;Well, that’s what my personal opinion is, and please don’t quote me on this! Google has confirmed that the Chrome OS will be open source and will not have any licensing fees. That will enable Chrome OS-based netbooks to be cheaper than its Windows-based and ARM-based counterparts.&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;Because it’s from Google&lt;/strong&gt;&lt;br /&gt;I have got an impression that whatever Google does has to be grand, never-seen-before, and NOT HARSH on consumer’s wallets. So will be the Chrome OS!&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;What may put Chrome OS off? &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;It’s running on Linux &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;It’s bit late in the race &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;No proven track record of Google in the OS space &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;It’s limited to netbooks &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Having said all this, I must confess that I am trilled to use Chrome OS. Now that I own a Lenovo Netbook, I can’t wait to install Chrome OS…&lt;/span&gt;&lt;/p&gt;</description><link>http://technology-nuggets.blogspot.com/2009/07/google-chrome-os-what-you-must-know.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-4766743562730889870</guid><pubDate>Mon, 13 Jul 2009 14:13:00 +0000</pubDate><atom:updated>2009-07-16T15:50:58.312+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber attack</category><category domain="http://www.blogger.com/atom/ns#">Networks</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Cyber Attack Code kills infected PCs</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;The botnet-driven cyber attack on government, financial, and media sites in the U.S and South Korea includes a newly discovered danger: The malicious code responsible for driving the distributed denial of service attack, known as &lt;strong&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;W32.Dozer&lt;/span&gt;&lt;/strong&gt;, is designed to delete data on infected computers and to prevent the computers from being rebooted, a shocking revelation made today by &lt;/span&gt;&lt;a href=&quot;http://www.networkcomputing.in/Information-Security-013Jul009-Cyber-Attack-Code-Starts-Killing-Infected-PCs.aspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Network Computing&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;The malicious code includes instructions to start deleting files when the infected computer&#39;s internal clock reached &lt;strong&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;July 10, 2009&lt;/span&gt;&lt;/strong&gt;. &quot;&lt;strong&gt;Your machine is completely hosed at this stage&lt;/strong&gt;,&quot; said Vincent Weafer, VP at Symantec Security Response.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;According to Weafer, the malicious code will attempt to locate files with any of more than 30 different extensions, such as .doc, .pdf, and .xls, copy the data to an encrypted file that&#39;s inaccessible to the user, and then overwrite the data in the original files. It targets files associated with office, business, and development applications. The malicious code is also programmed to modify infected computers&#39; Master Boot Records. The change renders computers inoperable following any attempt to reboot.&lt;br /&gt;&lt;br /&gt;The impact of this self-destruct sequence should be minimal, however. Weafer said that he expects only a few thousand machines will be damaged. &quot;I don&#39;t expect this to be a major issue, except perhaps in South Korea,&quot; he said.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;The South Korean Intelligence Service estimated that about 20,000 compromised computers —mostly in South Korea—had been ordered to conduct a Distributed Denial of Service (DDoS) attack on U.S. and South Korean sites. Given the timing, which coincided with a North Korean missile test, suspicions have been raised about the involvement of hackers in North Korea or possibly China.&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/07/cyber-attack-code-kills-infected-pcs.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-2071598204193619498</guid><pubDate>Wed, 08 Jul 2009 05:48:00 +0000</pubDate><atom:updated>2009-07-09T15:16:31.166+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Analyst reports</category><category domain="http://www.blogger.com/atom/ns#">Best practices</category><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">Technology Trends</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>6 Worst Cloud Security Mistakes</title><description>&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;With Cloud Computing becoming a hot cake now-a-days with every other organization jumping at the idea and trying to cash on the bandwagon, mistakes do tend to happen. If you are constantly under pressure to &quot;push&quot; IT operations into the &quot;cloud&quot; of your service provider, then I can understand the cost and budget pressures you must be going through. Compliance can be equally tricky! However, please note that we tend to make mistakes just in such scenarios: we are in a hurry to achieve something and hence to miss some of the important signs that may lead to mistakes, if not blunders. The most important and most common mistake is: blowing off cloud computing all together because you think you can secure your own stuff better than a service provider. &lt;strong&gt;Network Computing&lt;/strong&gt; researched on such common mistakes and have come up with proposed ways to avoid them. Let&#39;s see what these mistakes typically are:&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;Mistake #1: Assuming the cloud is less secure than your data center&lt;/u&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;It&#39;s only natural for security pros to be &lt;strong&gt;&lt;em&gt;control freaks&lt;/em&gt;&lt;/strong&gt;. Being charged with securing a company&#39;s data and intellectual property, they tend to have false impressions about cloud security. One common mistake is that as soon as they talk about the cloud, organizations assume it&#39;s less secure than their own IT security operation. We should keep in mind that &quot;More control does not necessarily lead to more security.&quot;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;u&gt;Mistake #2: Not verifying, testing, or auditing the security of your cloud-based service provider&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;Don&#39;t assume instant security when you opt for a services provider. Be sure to verify how they secure your data and their infrastructure. It&#39;s a mistake to simply trust them. You have to verify and audit them, or have some third-party audit them.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;Mistake #3: Failing to vet your cloud provider&#39;s viability as a business&lt;br /&gt;&lt;/u&gt;&lt;/strong&gt;It&#39;s a big mistake to implicitly trust a cloud provider without confirming the viability of its business.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;Mistake #4: Assuming you&#39;re no longer responsible for securing data once it&#39;s in the cloud&lt;br /&gt;&lt;/u&gt;&lt;/strong&gt;Don&#39;t think outsourcing your applications or systems means you wash your hands of data breach accountability. That&#39;s a misconception some SMBs have, security experts say. Transferring protection of your data to the cloud provider doesn&#39;t mean you also hand off accountability when there&#39;s a breach.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;&lt;u&gt;Mistake #5: Putting insecure apps in the cloud and expecting that to make them more secure&lt;br /&gt;&lt;/u&gt;&lt;/strong&gt;Dumping an old IT system with flawed and unpatched applications into the cloud doesn&#39;t automatically make it safe and secure. The key is properly preparing your applications and data for the transition.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;&lt;u&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Mistake #6: Having no clue that your business units are already using some cloud-based services&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;You can &lt;/span&gt;&lt;a href=&quot;http://www.networkcomputing.in/InfoSec-025Jun009-The-6-Worst-Cloud-Security-Mistakes.aspx&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;strong&gt;click here&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt; to read the detailed article @ Network Computing website.&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/07/6-worst-cloud-security-mistakes.html</link><author>noreply@blogger.com (The Guru)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4038179316179808481.post-256342224632995218</guid><pubDate>Thu, 02 Jul 2009 04:41:00 +0000</pubDate><atom:updated>2009-07-02T13:17:46.420+05:30</atom:updated><title>Command the web: Jasmine web directory</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;With the hyperbolic growth of Internet, everyone wants to make most of it. With growing popularity of Internet, there were hundreds of sites dedicated to a particular subject. Then there were thousands and now millions of them catering to various subjects. If you are looking for some sites on a particular subject, then it is highly unlikely that you&#39;ll rely only on the search engines. You would be clueless and would take lot of time to get to right sites, as there is a jungle out there. In order to save time and cluster all relevant sites, experts evolved a concept called &quot;web directory&quot;. Wikipedia defines it as: &quot;A web directory or link directory is a directory on the World Wide Web. It specializes in linking to other web sites and categorizing those links. A web directory is not a search engine and does not display lists of web pages based on keywords; instead, it lists web sites by category and subcategory...&quot;&lt;br /&gt;&lt;br /&gt;As expected, there is now &quot;uncontrolled crop&quot; of these web directories. Some are good, some of best, and yet some are completely unreliable. Some of these look like they just want to cash on the hype and then they will disappear. However, when it comes to reliable and dependable listings, you should make a point to visit &lt;strong&gt;JasmineDirectory&lt;/strong&gt; - a completely &lt;/span&gt;&lt;a href=&quot;http://www.jasminedirectory.com/&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;free web directory&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt; and yet having maintained high standards of site classifcation. This site is maintained by experienced and professional web editors, in order to ensure that only the best gets in. Similar to other best-in-class directories like Yahoo Directory, Business.com Directory, this one also stresses on focussed and thorough and precise research that goes behind including any site.&lt;br /&gt;&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353765695430152930&quot; style=&quot;FLOAT: left&quot; alt=&quot;&quot; hspace=&quot;5&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaum02FVsLiW5QXTiA0WLHoW1I1r-gKr5mLSOtwp_62nFv3WZ7-fwLpUtDfWIVRH6XnRnB-XvKUQUm_Z0huvLghmLfplwdG3qZHejERQK36Sd-vZowDXLSqIMPKb-bmsIfikLyJZJwxU4/s320/JasmineDirectory.JPG&quot; border=&quot;0&quot; /&gt;When one registers their site under a specific category, their research team quickly gets into action extracting vital stats about the submitted site. They scan the content with a magnifier to ensure that no pornographic / unaccepted content gets into the system, besides paying keen attention to the overall quality of the site. Once they are satisfied, only then the thumbnails are generated and the site is listed. One will argue that similar features are offered by other leading directories like &lt;/span&gt;&lt;a href=&quot;http://dir.yahoo.com/&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Yahoo.com&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;http://www.business.com/&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Business.com&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;, and &lt;/span&gt;&lt;a href=&quot;http://www.dmoz.org/&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;DMOZ&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;. But what is best about JasmineDirectory is that it is free, and &lt;/span&gt;&lt;a href=&quot;http://www.maxdirectory.eu/&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;SEO friendly web directory&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;. The categories are exhaustive and cater to every nook and corner of the world. The only thing I can say about this is GO FOR IT. I have personally signed up a week ago and am seeing decent jump in my site&#39;s rankings and traffic as well. I would recommend one to subscribe to all leading web directories listed above to make the most of the opportunity.&lt;/span&gt;&lt;/div&gt;</description><link>http://technology-nuggets.blogspot.com/2009/07/command-web-jasmine-web-directory.html</link><author>noreply@blogger.com (The Guru)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaum02FVsLiW5QXTiA0WLHoW1I1r-gKr5mLSOtwp_62nFv3WZ7-fwLpUtDfWIVRH6XnRnB-XvKUQUm_Z0huvLghmLfplwdG3qZHejERQK36Sd-vZowDXLSqIMPKb-bmsIfikLyJZJwxU4/s72-c/JasmineDirectory.JPG" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>