<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-29522983851214971</atom:id><lastBuildDate>Tue, 31 Mar 2026 07:09:49 +0000</lastBuildDate><category>Definitions</category><category>Happy New Year 2009</category><category>New Search Engine -scour</category><category>VIRUS ALERT</category><category>Virus</category><category>100 keyboard shortcuts</category><category>1GB 20 years ago and 1GB Now</category><category>2009 FORTUNE 500</category><category>32-bit version or 64-bit version</category><category>500 jobs</category><category>Apache</category><category>Apple Safari 4 Beta Released</category><category>April 1st Virus</category><category>BLACKLE</category><category>Bad</category><category>Best Antivirus software</category><category>BioData</category><category>CISCO X&#39;MAS and  New Year Greeting</category><category>CV</category><category>CYBER SECURITY WEEK - 2009</category><category>Calculator Fun</category><category>Canceling your Gmail address</category><category>Chrome</category><category>Computer History</category><category>DOTNET PAGE LIFECYCLE</category><category>Difference among CV</category><category>Download Windows 7 Public Beta</category><category>EMAIL TRACKING</category><category>Enterprise Resource Planning</category><category>Expert: Social networkers risk &#39;losing control&#39; of privacy</category><category>Facebook</category><category>Facebook backs down</category><category>Fears of impostors increase on Facebook</category><category>Fraud revelations hit Indian computer company</category><category>Free Java Editors</category><category>Free Java IDE</category><category>Good</category><category>Google Chrome</category><category>Google Latitude keeps tabs on friends&#39; locations</category><category>Google eases trademark restrictions on some U.S. ads</category><category>Google in healthy competition</category><category>Google shows Web-based offline Gmail on iPhone</category><category>Google tests mobile-phone tracking system</category><category>Great Experiment</category><category>Hackers launch phishing attack on Facebook users</category><category>Hakia</category><category>Happy 11th BirtDay -Google</category><category>Happy BirthDay Google</category><category>Hard Drive weight increasing?</category><category>History of Microsoft Windows</category><category>How did one man almost dupe the Sri Lanka IT community?</category><category>How to Restore your Active DeskTop</category><category>How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system</category><category>How to lookup a user name and machine name using an IP address</category><category>IBM in talks to buy Sun Microsystems</category><category>IE</category><category>Install</category><category>Intel Core i7</category><category>Internet Explorer 8</category><category>Israel warns citizens to beware Facebook spy requests</category><category>Lenovo Ideapad Advertisement</category><category>Lenovo to cut 2</category><category>Linux Commands</category><category>London Stock Exchange acquires Millennium IT for US$30m</category><category>Make your PC talk</category><category>Management Lesson</category><category>Merry Christmas</category><category>Microsoft</category><category>Microsoft Bus</category><category>Microsoft Headquarters</category><category>Microsoft Search engine</category><category>Microsoft and Yahoo: Search partners</category><category>Microsoft bounty for worm creator</category><category>Microsoft releases Internet Explorer 8</category><category>Microsoft stuns with profit miss</category><category>Microsoft&#39;s Project Natal for XBOX 360...You are the controller</category><category>More turning to Web to watch TV</category><category>Mozilla Firefox 3.0</category><category>Murthy pulls out as IT advisor to president</category><category>MySQL</category><category>NECK EXERCISE</category><category>NOKIA MARRY ME</category><category>New Processor from Intel</category><category>New Virus</category><category>Nine-year old whiz-kid writes iPhone application</category><category>Nokia introduces first touch device in Lanka</category><category>Old Computer Advertisements</category><category>Oracle Head Office</category><category>Oracle to buy Sun</category><category>PHP</category><category>Password Stealing Email</category><category>Phone quality check</category><category>Pocket Facebook</category><category>Protect your Eyes</category><category>Resume</category><category>Resume and BioData</category><category>Rolltop</category><category>Serious security flaw found in IE</category><category>Skype</category><category>Sri Lanka IT firm to be bought by London Stock Exchange</category><category>Sub aLUTH AURDDAK WEWA</category><category>TOP 10 PRIVATE IT and SOFTWARE PRODUCTION COMPANIES IN THE WORLD-2007COMPANIES IN THE WORLD:2007</category><category>TabelTop Technology</category><category>Task Manager</category><category>Teamwork</category><category>The mobile phone gun</category><category>Top 20 Replies by Programmers</category><category>Top 5 Computer Hackers of All Time</category><category>Toshiba sues Imation</category><category>Try this</category><category>UNIX</category><category>Uses Of Google</category><category>Various stages of Page-Load lifecycle(.Net)</category><category>What Version of Java Are You Using?</category><category>What Will the World Do with More Search Engines?</category><category>Wonderful definitions of designations at office</category><category>Year 2009</category><category>ZPC9000</category><category>ads</category><category>create survey</category><category>google trick</category><category>job cuts</category><category>movies</category><category>new web browser</category><category>others over DVD patents</category><category>proxy avoidance sites</category><category>restructure</category><category>reverses on user information policy</category><category>xAurora Web Browser</category><category>“Sinhala text to speech” – for visually impaired</category><title>PC World</title><description></description><link>http://pcworldsl.blogspot.com/</link><managingEditor>noreply@blogger.com (dbn_01)</managingEditor><generator>Blogger</generator><openSearch:totalResults>106</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-7953829806505750766</guid><pubDate>Tue, 23 Feb 2010 14:20:00 +0000</pubDate><atom:updated>2010-02-23T06:23:00.491-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Canceling your Gmail address</category><title>Canceling your Gmail address</title><description>&lt;p align=&quot;justify&quot;&gt;If you decide that you don&#39;t need your Gmail address anymore, and you&#39;re sure you won&#39;t want your username in the future, you can simply remove Gmail from your Google Account. Here&#39;s how:&lt;br /&gt;1. Click &lt;a href=&quot;https://mail.google.com/mail/#settings/accounts&quot; target=&quot;_blank&quot;&gt;Settings&lt;/a&gt; at the top of any Gmail page, and open the Accounts and Import tab.&lt;br /&gt;2. Click Google Account settings.&lt;br /&gt;3. Click Edit next to My products on the right side.&lt;br /&gt;4. Click Remove Gmail permanently. &lt;/p&gt;&lt;p align=&quot;justify&quot;&gt;&lt;br /&gt;Once you delete your Gmail address, you can&#39;t reactivate it, and you won&#39;t be able to retrieve any messages.&lt;/p&gt;&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;taken from:- &lt;/span&gt;&lt;a href=&quot;http://mail.google.com/support/bin/answer.py?hl=en&amp;amp;answer=8152&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;http://mail.google.com/support/bin/answer.py?hl=en&amp;amp;answer=8152&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description><link>http://pcworldsl.blogspot.com/2010/02/canceling-your-gmail-address.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-2354617129359311953</guid><pubDate>Sat, 13 Feb 2010 03:34:00 +0000</pubDate><atom:updated>2010-02-12T19:46:59.183-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Rolltop</category><title>Rolltop</title><description>&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dwC_peUtqL1ZZN92mzuBTd1iL941xUDOcWvP0AsU56JjNsmBbbJVit838A-eLcKB8sp4CeCdpqt3vVkHGeW&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;</description><link>http://pcworldsl.blogspot.com/2010/02/rolltop.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-559602224330702863</guid><pubDate>Thu, 11 Feb 2010 17:19:00 +0000</pubDate><atom:updated>2010-02-11T09:26:24.382-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">What Version of Java Are You Using?</category><title>What Version of Java Are You Using?</title><description>Below website help you to find the version and vendor from the JRE&lt;br /&gt;&lt;a onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot; href=&quot;http://www.javatester.org/index.htm&quot; target=&quot;_blank&quot;&gt;http://www.javatester.org/index.htm&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2010/02/what-version-of-java-are-you-using.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-5426836846943803793</guid><pubDate>Fri, 09 Oct 2009 15:51:00 +0000</pubDate><atom:updated>2009-10-09T08:52:42.006-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">New Virus</category><title>New Virus</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivfhc2GcYF98wDAjReo0lGd2l7GZ6Xr_BrYHQTOrUxNl4rBoNPKaxy9rvQVsx3IpKPXET7L16au2lHoGntHh5GhOowlUk2Ysyc-GBKZekd5P8CcuwQ0LT22W97l26hPa1f5Il1h8Tuxqo/s1600-h/Virus.JPG&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5390628487548671410&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 216px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivfhc2GcYF98wDAjReo0lGd2l7GZ6Xr_BrYHQTOrUxNl4rBoNPKaxy9rvQVsx3IpKPXET7L16au2lHoGntHh5GhOowlUk2Ysyc-GBKZekd5P8CcuwQ0LT22W97l26hPa1f5Il1h8Tuxqo/s400/Virus.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt; &lt;/div&gt;</description><link>http://pcworldsl.blogspot.com/2009/10/new-virus.html</link><author>noreply@blogger.com (dbn_01)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivfhc2GcYF98wDAjReo0lGd2l7GZ6Xr_BrYHQTOrUxNl4rBoNPKaxy9rvQVsx3IpKPXET7L16au2lHoGntHh5GhOowlUk2Ysyc-GBKZekd5P8CcuwQ0LT22W97l26hPa1f5Il1h8Tuxqo/s72-c/Virus.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-4845411514163787559</guid><pubDate>Fri, 09 Oct 2009 14:05:00 +0000</pubDate><atom:updated>2009-10-09T08:26:09.205-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">TabelTop Technology</category><title>TabelTop Technology</title><description>&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dzQbDq7kJJqJk9Ug47ShzSlQc9Ud_zjeh31VHuXZ6aZc2zbEYB0PQSfr6wbhtyIVEQFes9pBUuEjvQSVNHr&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;</description><link>http://pcworldsl.blogspot.com/2009/10/tabeltop-technology.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-105867805712946186</guid><pubDate>Sun, 27 Sep 2009 15:36:00 +0000</pubDate><atom:updated>2009-09-27T08:59:40.798-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Happy 11th BirtDay -Google</category><title>Happy 11th BirtDay -Google</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVsHA_dDBkK_bqBscQHmQd3P_TAkzuHppv8L5hnMEF119KgT5iqVDctjORF4Ck3NbOY32uuTHkMSpgL8ZNL5QIFtr99nxGsoURpZmeGmSaTNpJik4wH4DSgXZ_ps1KUPq1MEcSxp5FKe8/s1600-h/Google+11th+BDay.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5386176779277200210&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 372px; CURSOR: hand; HEIGHT: 127px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVsHA_dDBkK_bqBscQHmQd3P_TAkzuHppv8L5hnMEF119KgT5iqVDctjORF4Ck3NbOY32uuTHkMSpgL8ZNL5QIFtr99nxGsoURpZmeGmSaTNpJik4wH4DSgXZ_ps1KUPq1MEcSxp5FKe8/s400/Google+11th+BDay.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;</description><link>http://pcworldsl.blogspot.com/2009/09/happy-11th-birtday-google.html</link><author>noreply@blogger.com (dbn_01)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVsHA_dDBkK_bqBscQHmQd3P_TAkzuHppv8L5hnMEF119KgT5iqVDctjORF4Ck3NbOY32uuTHkMSpgL8ZNL5QIFtr99nxGsoURpZmeGmSaTNpJik4wH4DSgXZ_ps1KUPq1MEcSxp5FKe8/s72-c/Google+11th+BDay.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-8657940068266211500</guid><pubDate>Sat, 19 Sep 2009 06:58:00 +0000</pubDate><atom:updated>2009-09-19T00:06:51.040-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Top 5 Computer Hackers of All Time</category><title>Top 5 Computer Hackers of All Time</title><description>&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Jonathon James&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;Born in South Florida in 1983, Jonathon James was only 15 years old when he began hacking into various systems in 1998-1999. What really got the attention of authorities was when James hacked into the computers of the Defense Threat Reduction Agency (DTRA), a special division of the Department of Defense.&lt;br /&gt;James later admitted he installed a packet sniffer on a server via an unauthorized backdoor. The sniffer allowed him to intercept passwords (10 considered critical) and over 3,000 messages passing to and from DTRA employees.&lt;br /&gt;James also hacked into NASA computers, where he downloaded software worth $1.7 million. NASA was forced to shut down their computers for 3 weeks once the threat was detected, costing NASA an additional $41,000.&lt;br /&gt;On January 26, 2000, James house was raided by agents from the Department of Defense, NASA, and local authorities. James eventually pleaded guilty to 2 counts of juvenile delinquency in exchange for a lesser sentence of 6 months of prison and probation until the age of 18.&lt;br /&gt;Today, currently 24, James is looking to start his own computer security company.&lt;br /&gt;Computer Used: Gateway Pentium 266Online Alias: c0mradeInteresting Fact: First juvenile incarcerated for cyber crime in the United States&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Adrian Lamo&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;Lamo was born in Boston Massachusetts in 1981. Adrian Lamo is famous for his attempts to identify security flaws on the networks of Fortune 500 companies and notifying them if he found them. Although very noble, the practice is still highly illegal in most places without permission.&lt;br /&gt;He generally took advantage of improperly configured proxies to gain access to networks. His list of targets included:The New York TimesMicrosoftYahoo!CingularCitiGroupBank Of AmericaMcDonaldsLamo is most famous for his 2002 success of breaking into the New York Times computer network and adding his name to databases of expert sources. The Times did not find his actions amusing, and after a 15 month investigation, a warrant was filed for Lamos arrest. Lamo spent a few days in hiding, eventually surrendering to US Marshals.&lt;br /&gt;Lamo pleaded guilty to 1 count of computer crimes against Microsoft, Lexis-Nexis and The New York Times in January 2004. He was sentenced to 6 months detention at his parent&#39;s home and 2 years probation, and ordered to pay $65,000 in restitution.&lt;br /&gt;Today Lamo is a senior staff writer at the American River Current.&lt;br /&gt;Interesting Fact: Lamos was removed from a NBC Nightly News segment when NBC asked him to perform his skills on camera and ended up gaining access to NBC&#39;s internal network.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Kevin Mitnick&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;Mitnick is a very interesting addition to the top 5 list because most of his notorious acts came about via social engineering rather than abusing security flaws. He was able to obtain user names and passwords, modem phone numbers, and other various pieces of information solely through social engineering.&lt;br /&gt;His first arrest was a result of a Memorial Day weekend in 1981 incident. Mitnick and two friends talked their way past a security guard at Pacific Bell&#39;s phone center and found databases of passwords to access computers and door locks. They even planted pseudo names in various places to setup future social engineering. The case was later solved when an ex-girlfriend of one of the men went to the police.&lt;br /&gt;It has been proven Kevin Mitnick managed to do all the following using social engineering (many more things were never proven):Use the LA Bus system to get free rides at the age of 12Evade the FBIGain admin privileges to an IBM minicomputerGain access to the systems of Motorola, NEC, Nokia, Sun &amp;amp; FujitsuIn 2000, Mitnick was released from prison after serving 5 years (4 ½ years in pretrial, 8 months of solitary confinement). He was initially not allowed to access the internet until 2003, but fought the decision in court and won.&lt;br /&gt;Mitnick now runs Mitnick Security Consulting, where his fame has gained the occasional attention of hackers to occasionally break his company&#39;s website.&lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Kevin Poulsen&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;First Computer To Hack With: TRS-80 color computer&lt;br /&gt;In 1982, at the age of 17, Poulsen managed to hack into the US Department of Defense&#39;s Arpanet, the ancestor of the internet. He wasn&#39;t prosecuted, and later ended up working for Sun Microsystems as a programmer.&lt;br /&gt;Poulsens best known hack was when he took over the telephone lines of Los Angeles radio station KIIS-FM, guaranteeing that he would be caller 102 and winning a Porsche. He also used the same scheme to win $20,000 and 2 Hawaiian vacations.&lt;br /&gt;In 1988, Poulsen came into real heat in when the FBI suspected Poulsen of hacking sensitive federal investigation databases. He immediately disappeared off the radar. When NBC featured Poulsen on Unsolved Mysteries, the shows 1-800 phone lines &#39;mysteriously&#39; crashed.&lt;br /&gt;Poulsen was eventually caught in a supermarket in 1991, after shoppers recognized this famous hacker and tackled him in the store. Poulsen pleaded guilty in 1994 to 7 counts of mail, wire and computer fraud and was sentenced to 51 months in prison and ordered to pay $56,000 in restitution. At the time, 51 months was the longest ever sentence given to hacker.&lt;br /&gt;More recently, Poulsen used his skills to find 744 sex offenders with MySpace profiles leading to 1 arrest. Poulsen has not had trouble finding work due to his highly desired abilities.&lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Robert Morris&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;Morris, son of a former NSA chief scientist, is notoriously known for creating the first computer worm spread via the internet.&lt;br /&gt;Morris created the worm in 1988 as a graduate student at Cornell University. According to Morris, he created the worm with the intent of gauging the size of the internet. He programmed the worm to detect if the infection was already present on the computer and compute a tally. Morris believed administrators would defeat his worm by instructing the computer to send a false signal back to worm. Morris decided the best method to solve that issue was to instruct the worm to infect the computer 14% of the time regardless. This resulted in exponential spreading of the worm, destroying thousands of machines.&lt;br /&gt;Morris was indicted in 1989 under the Computer Fraud and Abuse Act, the first Peron to be indicted under this act. In 1990 Morris was sentenced to 3 years probation, 400 hours of community service and a $10,050 fine.&lt;br /&gt;Today, Morris is an associate professor at MIT in the Engineering and Computer Science Department, focusing mainly on computer network architecture.&lt;/div&gt;</description><link>http://pcworldsl.blogspot.com/2009/09/top-5-computer-hackers-of-all-time.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-7887647294583164137</guid><pubDate>Sat, 19 Sep 2009 06:32:00 +0000</pubDate><atom:updated>2009-09-18T23:33:12.584-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Top 20 Replies by Programmers</category><title>Top 20 Replies by Programmers</title><description>Top 20 Replies by Programmers to Testers when their programs don&#39;t work&lt;br /&gt;20. &quot;That&#39;s weird...&quot;&lt;br /&gt;19. &quot;It&#39;s never done that before..&quot;&lt;br /&gt;18. &quot;It worked yesterday.&quot;&lt;br /&gt;17. &quot;How is that possible?&quot;&lt;br /&gt;16. &quot;It must be a hardware problem.&quot;&lt;br /&gt;15. &quot;What did you type in wrong to get it to crash?&quot;&lt;br /&gt;14. &quot;There is something funky in your data.&quot;&lt;br /&gt;13. &quot;I haven&#39;t touched that module in weeks!&quot;&lt;br /&gt;12. &quot;You must have the wrong version.&quot;&lt;br /&gt;11. &quot;It&#39;s just some unlucky coincidence.&quot;&lt;br /&gt;10. &quot;I can&#39;t test everything!&quot;&lt;br /&gt;9.   &quot;THIS can&#39;t be the source of THAT.&quot;&lt;br /&gt;8.   &quot;It works, but it hasn&#39;t been tested.&quot;&lt;br /&gt;7.   &quot;Somebody must have changed my code.&quot;&lt;br /&gt;6.   &quot;Did you check for a virus on your system?&quot;&lt;br /&gt;5.   &quot;Even though it doesn&#39;t work, how does it feel?&quot;&lt;br /&gt;4.   &quot;You can&#39;t use that version on your system.&quot;&lt;br /&gt;3.   &quot;Why do you want to do it that way?&quot;&lt;br /&gt;2.   &quot;Where were you when the program blew up?&quot;&lt;br /&gt;And the Number One Reply by Programmers when their programs don&#39;t work:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;GuessGuess.............&lt;br /&gt;Come on, even u say it ......&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Guess.............&lt;br /&gt;&lt;br /&gt;&quot;It works on my machine&quot;</description><link>http://pcworldsl.blogspot.com/2009/09/top-20-replies-by-programmers.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-2460832127567002919</guid><pubDate>Sat, 19 Sep 2009 06:21:00 +0000</pubDate><atom:updated>2009-09-18T23:22:47.358-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">London Stock Exchange acquires Millennium IT for US$30m</category><title>London Stock Exchange acquires Millennium IT for US$30m</title><description>The London Stock Exchange Group plc today announced in a statement on its website that it has agreed to acquire Millennium IT, a Sri Lankan-based technology services company serving the capital markets industry, for US$ 30 million.Millennium IT’s high performance technology will provide the Group with a highly scalable and very low latency in-house developed trading system with multi-asset class functionality and quicker product speed to market.  In addition, the transaction will give MillenniumIT the backing of the Group to enable it to develop further its global exchange technology business. MillenniumIT will retain its culture of innovation and creativity, build on its commercial operations and continue serving its existing clients, with its CEO, Tony Weeresinghe, reporting directly to Xavier Rolet.   Xavier Rolet, Chief Executive of London Stock Exchange Group, said:“Improving our technology and increasing our competitive position in the fast-moving trading environment is vital.  This transaction enables the Group to implement a new, more agile, innovative and efficient IT capability for our future business development as well as running a new cash trading platform which will provide substantially lower latency, significantly higher capacity and improved scalability.  “It will also offer cost saving opportunities in the future and give the Group a footprint in Asia.  Moreover, MillenniumIT is a proven business, already serving multiple clients in multiple geographies, including some of the best known in their fields.  The potential from this transaction is considerable for both parties.”Tony Weeresinghe, CEO of MillenniumIT, said:“This transaction with London Stock Exchange Group is a tribute to the innovative culture of our company, the quality of our technology solutions and our deep pool of talented staff.  The Group’s backing gives us the resources to continue supporting our existing customers, expanding the company into other markets and investing for the future.”David Lester, Director of Information and Technology, London Stock Exchange Group, said:“MillenniumIT are a leader in developing low cost high performance trading platforms and financial markets software.  Going forward, as well as serving existing and new clients, they will be the Group’s in-house software development team, gradually replacing our current suppliers and bringing intellectual property and know-how fully within the company.  We look forward to introducing their proven trading platform before the end of 2010, which will provide our clients with sub-millisecond trading latencies and give the Group a very fast, multi-product, cost-efficient, scalable trading platform.  The transition will be carefully managed, with further enhancements to TradElect planned in the interim.”The Group will begin migrating clients to MillenniumIT’s trading system from the end of 2010, replacing TradElect, Infolect, and other interfaces.  The new platform will allow the Group to enrich its functionality, in particular for Italian clients, with the possibility of accommodating both trading after hours and stop loss orders.IT development and operational costs for the Group will be reduced, resulting in estimated annual cost savings of at least £10 million from FY2011-12.Depreciation of investment in the current TradElect trading platform will be accelerated as a result of the transaction, and further planned upgrades that take place in the interim will be taken as operating expenses in the period they occur.  In total, these are expected to represent non-recurring incremental costs of £25 million in FY2010 and £6 million in FY2011. Under the terms of the Offer, the Group has offered to acquire 100 per cent of MillenniumIT’s shares for cash consideration with a share alternative.  It is estimated that 73 per cent of the total deal consideration will be paid in cash, with the rest in new LSEG shares to be issued, estimated at around 600,000 shares.The Group has already received irrevocable undertakings representing over 90 per cent of the shares in MillenniumIT.</description><link>http://pcworldsl.blogspot.com/2009/09/london-stock-exchange-acquires.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-6263790277413874946</guid><pubDate>Sat, 19 Sep 2009 06:14:00 +0000</pubDate><atom:updated>2009-09-18T23:19:00.752-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Sri Lanka IT firm to be bought by London Stock Exchange</category><title>Sri Lanka IT firm to be bought by London Stock Exchange: report</title><description>Sept 15, 2009 (LBO) - Sri Lanka&#39;s Millennium IT will be acquired by London Stock Exchange and its faster trading software would replace the British bourse&#39;s existing platform, a media report said.&lt;br /&gt;&lt;br /&gt;The report said LSE could pay around 50 million sterling pounds (about 9.4 billion rupees) to buy the technology firm.&lt;br /&gt;Britain&#39;s Financial Times newspaper said MillenniumIT&#39;s system was claimed to the fastest in the world, handling a trade in 130 microseconds, compared with 250 microseconds for the Nasdaq&#39;s OMX system.&lt;br /&gt;&lt;br /&gt;The MillenniumIT system can handle up to one million messages per second, compared with 20,000 on the London Stock Exchange&#39;s TradElect system and Chi-X Europe&#39;s system which processes 225,000 messages per second, the report said.&lt;br /&gt;&lt;br /&gt;Mr Rolet told the Financial Times this month that lack of capacity was holding the LSE back.&lt;br /&gt;&lt;br /&gt;&quot;We have to [upgrade] because the technology specifications are no longer competitive and that’s impacting our ability to support volume growth,&quot; Xavier Rolet, chief executive of the London Stock Exchange as saying.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;MilleniumIT, founded by Sri Lankan Tony Weerasinghe developed the Colombo Stock Exchange trading software, making it the most advanced trading platform in the region at the time.&lt;br /&gt;&lt;br /&gt;The firm was financed by venture capital funds. There were expectations at one time of an exit through a public listing.</description><link>http://pcworldsl.blogspot.com/2009/09/sri-lanka-it-firm-to-be-bought-by.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-2071083186750902898</guid><pubDate>Wed, 05 Aug 2009 09:53:00 +0000</pubDate><atom:updated>2009-08-05T02:54:20.548-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CYBER SECURITY WEEK - 2009</category><title>CYBER SECURITY WEEK - 2009</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheN-jB49N4lOYJoVLETnsliHWzdI7f0LhiRba20OoRNVWX3jsL93EMElb-6_zwn7lEZ0JUm35BznQ8uRdst_MziOSQPUDRzu67C1k0EzSO6xFVdZ6tdYKuevvY24QqfOEw0nXw4RkbGZk/s1600-h/image001.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5366415694724222754&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 278px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheN-jB49N4lOYJoVLETnsliHWzdI7f0LhiRba20OoRNVWX3jsL93EMElb-6_zwn7lEZ0JUm35BznQ8uRdst_MziOSQPUDRzu67C1k0EzSO6xFVdZ6tdYKuevvY24QqfOEw0nXw4RkbGZk/s400/image001.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2009/08/cyber-security-week-2009.html</link><author>noreply@blogger.com (dbn_01)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheN-jB49N4lOYJoVLETnsliHWzdI7f0LhiRba20OoRNVWX3jsL93EMElb-6_zwn7lEZ0JUm35BznQ8uRdst_MziOSQPUDRzu67C1k0EzSO6xFVdZ6tdYKuevvY24QqfOEw0nXw4RkbGZk/s72-c/image001.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-5910745421935938607</guid><pubDate>Wed, 29 Jul 2009 16:12:00 +0000</pubDate><atom:updated>2009-07-29T09:13:26.176-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft and Yahoo: Search partners</category><title>Microsoft and Yahoo: Search partners</title><description>For More Details:-&lt;a href=&quot;http://money.cnn.com/2009/07/29/technology/microsoft_yahoo/index.htm?postversion=2009072908&quot;&gt;http://money.cnn.com/2009/07/29/technology/microsoft_yahoo/index.htm?postversion=2009072908&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2009/07/microsoft-and-yahoo-search-partners.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-8631656272815995340</guid><pubDate>Tue, 28 Jul 2009 18:26:00 +0000</pubDate><atom:updated>2009-07-28T11:29:31.414-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">The mobile phone gun</category><title>The mobile phone gun</title><description>Most of us see airport security as a pain.. Some of us even feel violated. When you see the below pictures, you&#39;ll understand why they want our cell phones through the x-ray machine. If you get asked to test your cell phone at the airport, this is the reason. Cell phone guns have arrived.&lt;br /&gt;&lt;br /&gt;AND they are real..&lt;br /&gt;&lt;br /&gt;Beneath the digital phone face is a .22 caliber handgun capable of firing four rounds in rapid succession using the standard telephone keypad. European law enforcement officials are stunned by the discovery of these deadly decoys. They say phone guns are changing the rules of engagement in Europe. Only when you have one in your hand do you realize that they are heavier than a regular cell phone.&lt;br /&gt;&lt;br /&gt;Be patient if security asks to look at your cell phone or turn it on to show that it works. They have a good reason! Wake up to our NEW WORLD!! We shouldn&#39;t complain about airport security &#39;invading your privacy. &lt;img id=&quot;BLOGGER_PHOTO_ID_5363579678864048338&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 366px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVcdukGs3SfpU7pENG_F6BbMLkO7hdnJ64BPCS0IaK0x2cKFQ-o-6VENplfPkX75tVh0i9pnoedAWpNt5plVFtILY7KEOgF975vcxnmMh9xlhP9691kbCpg4DWiaSVEM6vGXjyXie_dNs/s400/157940e.gif&quot; border=&quot;0&quot; /&gt;</description><link>http://pcworldsl.blogspot.com/2009/07/mobile-phone-gun.html</link><author>noreply@blogger.com (dbn_01)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVcdukGs3SfpU7pENG_F6BbMLkO7hdnJ64BPCS0IaK0x2cKFQ-o-6VENplfPkX75tVh0i9pnoedAWpNt5plVFtILY7KEOgF975vcxnmMh9xlhP9691kbCpg4DWiaSVEM6vGXjyXie_dNs/s72-c/157940e.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-821455079726061900</guid><pubDate>Tue, 21 Jul 2009 18:25:00 +0000</pubDate><atom:updated>2009-07-21T11:25:42.727-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hard Drive weight increasing?</category><title>Hard Drive weight increasing?</title><description>&lt;a href=&quot;http://social.answers.microsoft.com/Forums/en-US/vistahardware/thread/720108ee-0a9c-4090-b62d-bbd5cb1a7605&quot;&gt;http://social.answers.microsoft.com/Forums/en-US/vistahardware/thread/720108ee-0a9c-4090-b62d-bbd5cb1a7605&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2009/07/hard-drive-weight-increasing.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-6143947821473961498</guid><pubDate>Tue, 21 Jul 2009 17:47:00 +0000</pubDate><atom:updated>2009-07-21T11:00:00.520-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft&#39;s Project Natal for XBOX 360...You are the controller</category><title>Microsoft&#39;s Project Natal for XBOX 360...You are the controller</title><description>&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dzWvokP1DJYMG7eynDUbxoH8DudB603ZXnuxiSkyfPQXUKfk9F63Krd2EfA9QohzFF9VkJ00PpXn0eLHo33&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;</description><enclosure type='video/mp4' url='http://www.blogger.com/video-play.mp4?contentId=65eb4d9946de9c59&amp;type=video%2Fmp4' length='0'/><link>http://pcworldsl.blogspot.com/2009/07/microsofts-project-natal-for-xbox.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-4098231257049107452</guid><pubDate>Mon, 29 Jun 2009 01:54:00 +0000</pubDate><atom:updated>2009-06-28T18:58:42.433-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">32-bit version or 64-bit version</category><category domain="http://www.blogger.com/atom/ns#">How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system</category><title>How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system</title><description>This article describes how to determine whether a computer is running a 32-bit version or 64-bit of the Windows operating system. Generally, a computer&#39;s bit count indicates how much data it can process, the speed with which it can process the data, and the memory capacity. In order to optimize the computer&#39;s performance, the bit count of the operating system that is installed on the computer should match the bit count of the computer itself.&lt;br /&gt;&lt;br /&gt;Determine the operating system bit count&lt;br /&gt;loadTOCNode(2, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;Locate the operating system that is running on your computer in this section, and then follow the steps to determine the bit count of your operating system.&lt;br /&gt;Windows Vista&lt;br /&gt;loadTOCNode(3, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;If you have Windows Vista, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.&lt;br /&gt;Method 1: View System window in Control Panel&lt;br /&gt;loadTOCNode(4, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;Click Start&lt;br /&gt;Collapse this imageExpand this image&lt;br /&gt;, type system in the Start Search box, and then click system in the Programs list.&lt;br /&gt;The operating system is displayed as follows:&lt;br /&gt;For a 64-bit version operating system: 64-bit Operating System appears for the System type under System.&lt;br /&gt;For a 32-bit version operating system: 32-bit Operating System appears for the System type under System.&lt;br /&gt;Method 2: View System Information window&lt;br /&gt;loadTOCNode(4, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;Click Start&lt;br /&gt;Collapse this imageExpand this image&lt;br /&gt;, type system in the Start Search box, and then click System Information in the Programs list.&lt;br /&gt;When System Summary is selected in the navigation pane, the operating system is displayed as follows:&lt;br /&gt;For a 64-bit version operating system: x64-based PC appears for the System type under Item.&lt;br /&gt;For a 32-bit version operating system: x86-based PC appears for the System type under Item.If you cannot determine the operating system bit count with these methods, go to the &quot;Next Steps&quot; section.&lt;br /&gt;Windows XP&lt;br /&gt;loadTOCNode(3, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;If you have Windows XP, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.&lt;br /&gt;Method 1: View System Properties in Control Panel&lt;br /&gt;loadTOCNode(4, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;Click Start, and then click Run.&lt;br /&gt;Type sysdm.cpl, and then click OK.&lt;br /&gt;Click the General tab. The operating system is displayed as follows:&lt;br /&gt;For a 64-bit version operating system: Windows XP Professional x64 Edition Version &lt;&gt; appears under System.&lt;br /&gt;For a 32-bit version operating system: Windows XP Professional Version &lt;year&gt; appears under System. Note &lt;year&gt; is a placeholder for a year.&lt;br /&gt;Method 2: View System Information window&lt;br /&gt;loadTOCNode(4, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;Click Start, and then click Run.&lt;br /&gt;Type winmsd.exe, and then click OK.&lt;br /&gt;When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.&lt;br /&gt;If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.&lt;br /&gt;If the value that corresponds to Processor starts with ia64 or AMD64, the computer is running a 64-bit version of Windows.If you cannot determine the operating system bit count with these methods, go to the &quot;Next Steps&quot; section.&lt;br /&gt;Windows Server 2003&lt;br /&gt;loadTOCNode(3, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;If you have Windows Server 2003, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.&lt;br /&gt;Method 1: View System Properties in Control Panel&lt;br /&gt;loadTOCNode(4, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;Click Start, and then click Run.&lt;br /&gt;Type sysdm.cpl, and then click OK.&lt;br /&gt;Click the General tab. The operating system is displayed as follows:&lt;br /&gt;For a 64-bit version operating system: Windows Server 2003 Enterprise x64 Edition appears under System.&lt;br /&gt;For a 32-bit version operating system: Windows Server 2003 Enterprise Edition appears under System.&lt;br /&gt;Method 2: View System Information window&lt;br /&gt;loadTOCNode(4, &#39;moreinformation&#39;);&lt;br /&gt;&lt;br /&gt;Click Start, and then click Run&lt;br /&gt;Type winmsd.exe, and then click OK.&lt;br /&gt;When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.&lt;br /&gt;If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.&lt;br /&gt;If the value that corresponds to Processor starts with EM64T or ia64, the computer is running a 64-bit version of Windows.If you cannot determine the operating system bit count by using these methods, go to the &quot;Next Steps&quot; section.Notes&lt;br /&gt;To find the computer’s bit count, see the documentation that was included with the computer, or contact the hardware manufacturer.&lt;br /&gt;Intel Itanium-based computers can run only 64-bit versions of Windows. Intel Itanium-based computers cannot run 32-bit versions of Windows. Currently, 64-bit versions of Windows run only on Itanium-based computers and on AMD64-based computers.</description><link>http://pcworldsl.blogspot.com/2009/06/how-to-determine-whether-computer-is.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-2183300772863143504</guid><pubDate>Sat, 30 May 2009 14:48:00 +0000</pubDate><atom:updated>2009-05-30T07:56:12.013-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BioData</category><category domain="http://www.blogger.com/atom/ns#">CV</category><category domain="http://www.blogger.com/atom/ns#">Difference among CV</category><category domain="http://www.blogger.com/atom/ns#">Resume</category><category domain="http://www.blogger.com/atom/ns#">Resume and BioData</category><title>Difference among CV, Resume and BioData</title><description>&lt;div align=&quot;center&quot;&gt; &lt;img id=&quot;BLOGGER_PHOTO_ID_5341629098782920786&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 265px; CURSOR: hand; HEIGHT: 193px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2eDvPJrTHGp7-_9uaXVyoY84nUhogfifopZZfB6e-4QrDNqQbmnalauJNeXoJNPJCduQx7CzA4OwuB6DioKX9920na-iraBcWwjQkkSPjpVrasWXXGDOHPhnAaZKQ81E_ZIGUiACFn78/s400/1.jpg&quot; border=&quot;0&quot; /&gt;People use the words RESUME, C.V., and BIO-DATA interchangeably for thedocument highlighting skills, education, and experience that a candidatesubmits when applying for a job. On the surface level, all the threemean the same. However, there are intricate differences.&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;RESUME&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRZScXlDV41mLaJ6wUcL1EgDtdLEmeasHuJ6oftZxdZDiSzlP9eW4z9A8N3Vaeb-ahjD_j8KE6vX38jv6S5YjKccUaOmKlAm1R9kJWTez-yKFZegw-hNnGXVp1te3H2gUvM2iuO-cyyPw/s1600-h/2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5341629093826036706&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 285px; CURSOR: hand; HEIGHT: 220px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRZScXlDV41mLaJ6wUcL1EgDtdLEmeasHuJ6oftZxdZDiSzlP9eW4z9A8N3Vaeb-ahjD_j8KE6vX38jv6S5YjKccUaOmKlAm1R9kJWTez-yKFZegw-hNnGXVp1te3H2gUvM2iuO-cyyPw/s400/2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Resume Is a French word meaning &quot;summary&quot;, and true to the wordmeaning, signifies a summary of one&#39;s employment, education, and otherskills, used in applying for a new position. A resume seldom exceeds oneside of an A4 sheet, and at the most two sides. They do not list out allthe education and qualifications, but only highlight specific skillscustomized to target the job profile in question.A resume is usually broken into bullets and written in the third personto appear objective and formal. A good resume starts with a briefSummary of Qualifications, followed by Areas of Strength or IndustryExpertise in keywords, followed by Professional Experience in reversechronological order. Focus is on the most recent experiences, and priorexperiences summarized. The content aims at providing the reader abalance of responsibilities and accomplishments for each position. AfterWork experience come Professional Affiliations, Computer Skills, andEducation&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;C.V CURRICULUM VITAE&lt;/strong&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH1eAmg9bRN1lMxeA9DjX7Qs49MGIWiecUr75H7f5co4i0MdVLKwuiU9kKaTAGKh0tW3AjpUlwUOp_4YACF6OPAY6OW8xlAixLjwEVC9L0UPFXgSiYmbKfU_7WgdOm-HIO_HwLt6A3tOE/s1600-h/3.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5341629096318452658&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 242px; CURSOR: hand; HEIGHT: 195px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH1eAmg9bRN1lMxeA9DjX7Qs49MGIWiecUr75H7f5co4i0MdVLKwuiU9kKaTAGKh0tW3AjpUlwUOp_4YACF6OPAY6OW8xlAixLjwEVC9L0UPFXgSiYmbKfU_7WgdOm-HIO_HwLt6A3tOE/s400/3.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;C.V   Is a Latin word meaning &quot;course of life&quot;. CurriculumVitae (C.V.) is therefore a regular or particular course of studypertaining to education and life. A C.V. is more detailed than a resume,usually 2 to 3 pages, but can run even longer as per the requirement. AC.V. generally lists out every skills, jobs, degrees, and professionalaffiliations the applicant has acquired, usually in chronological order.A C.V. displays general talent rather than specific skills for anyspecific positions.&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;div&gt;&lt;strong&gt;BIO-DATA&lt;/strong&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsypuU7YJbQBiynLIo95cfW8WdNVHG4EYdXauYtCeI09BxEToxjQs2DH9M_ozuWPvDQGbPwpMnaHHDKtOUHUVUL5AlCusanTCeI47Ua6al921yrcNUbbXrysgqCIWqorJR40pkVQsCG6Y/s1600-h/4.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5341629090148551650&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 182px; CURSOR: hand; HEIGHT: 211px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsypuU7YJbQBiynLIo95cfW8WdNVHG4EYdXauYtCeI09BxEToxjQs2DH9M_ozuWPvDQGbPwpMnaHHDKtOUHUVUL5AlCusanTCeI47Ua6al921yrcNUbbXrysgqCIWqorJR40pkVQsCG6Y/s400/4.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; Bio Data the short form for Biographical Data, is the old-fashionedterminology for Resume or C.V. The emphasis in a bio data is on personalparticulars like date of birth, religion, sex, race, nationality,residence, martial status, and the like. Next comes a chronologicallisting of education and experience. The things normally found in aresume, that is specific skills for the job in question comes last, andare seldom included. Bio-data also includes applications made inspecified formats as required by the company.&lt;br /&gt;A resume is ideally suited when applying for middle and senior levelpositions, where experience and specific skills rather than education isimportant. A C.V., on the other hand is the preferred option for freshgraduates, people looking for a career change, and those applying foracademic positions. The term bio-data is mostly used in India whileapplying to government jobs, or when applying for research grants andother situations where one has to submit descriptive essays.&lt;br /&gt;Resumes present a summary of highlights and allow the prospectiveemployer to scan through the document visually or electronically, to seeif your skills match their available positions. A good resume can dothat very effectively, while a C.V. cannot. A bio-data could stillperform this role, especially if the format happens to be the onerecommended by the employer.&lt;br /&gt;Personal information such as age, sex, religion and others, and hobbiesare never mentioned in a resume. Many people include such particulars inthe C.V. However, this is neither required nor considered in the USmarket. A Bio-data, on the other hand always include such personalparticulars.   &lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://pcworldsl.blogspot.com/2009/05/difference-among-cv-resume-and-biodata.html</link><author>noreply@blogger.com (dbn_01)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2eDvPJrTHGp7-_9uaXVyoY84nUhogfifopZZfB6e-4QrDNqQbmnalauJNeXoJNPJCduQx7CzA4OwuB6DioKX9920na-iraBcWwjQkkSPjpVrasWXXGDOHPhnAaZKQ81E_ZIGUiACFn78/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-8977190367969116965</guid><pubDate>Sun, 24 May 2009 14:49:00 +0000</pubDate><atom:updated>2009-05-24T07:54:27.091-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">EMAIL TRACKING</category><title>EMAIL TRACKING - Useful Infromation</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqzBTdSih-wMytGht9JFktpmQfxb-200idEefReVOe8LYLbRG5-ntimvvNX_fVg4Wy4BdHVHPBYPGpZYQ7D-58RcBKH2vRHWvs43eFi_3laOSemHa-cbsGtzH-FGQ8YgXk4VHpJYJ4oe4/s1600-h/image001.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5339403279133404178&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 325px; CURSOR: hand; HEIGHT: 370px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqzBTdSih-wMytGht9JFktpmQfxb-200idEefReVOe8LYLbRG5-ntimvvNX_fVg4Wy4BdHVHPBYPGpZYQ7D-58RcBKH2vRHWvs43eFi_3laOSemHa-cbsGtzH-FGQ8YgXk4VHpJYJ4oe4/s400/image001.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;1) Any time you see an E-Mail that says forward this on to &#39;10&#39; (or however many) of your friends, sign this petition, or you&#39;ll get bad luck, good luck, you&#39;ll see something funny on your screen after you send it, or whatever, it almost always has an E-Mail tracker program attached that tracks the cookies and E-Mails of those folks you forward to. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;The host sender is getting a copy each time it gets forwarded and then is able to get lists of &#39;active&#39; E-Mail addresses to use in SPAM E-Mails, or sell to other spammers. Even when you get emails that demand you send the email on if you&#39;re not ashamed of God/Jesus .....that&#39;s E-mail tracking and they&#39;re playing on our conscience. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;These people don&#39;t care how they get your email addresses - just as long as they get them. Also, emails that talk about a missing child or a child with an incurable disease - &quot;how would you feel if that was your child&quot;....E- mail Tracking!!! Ignore them and don&#39;t participate! &lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;2) Almost all E-Mails that ask you to add your name and forward on to others are similar to that mass letter years ago that asked people to send business cards to the little kid in Florida who wanted to break the Guinness Book of Records for the most cards. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;All it was, and all any of this type of E-Mail is, is a way to get names and &#39;cookie&#39; tracking information for telemarketers and spammers - - to validate active E-Mail accounts for their own profitable purposes. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;You can do your friends and family members a GREAT favor by sending this information to them; you will be providing a service to your friends, and will be rewarded by not getting thousands of spam E-Mails in the future! If you have been sending out (FORWARDING) the above kinds of E-Mail, now you know why you get so much SPAM! Do yourself a favor and STOP adding your name(s) to those types of listings regardless how inviting they might sound!...or make you feel guilty if you don&#39;t!...it&#39; s all about getting email addresses - nothing more! You may think you are supporting a GREAT cause, but you are NOT! Instead, you will be getting tons of junk mail later and very possibly a virus attached! Plus, you are helping the spammers get rich! Let&#39;s not make it easy for them! Also: E-Mail petitions are NOT acceptable to White House, Congress or any other organization - i.e. social security, etc. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;To be acceptable, petitions must have a signed signature and full address of the person signing the petition, so this is a waste of time and you&#39;re just helping the Email trackers.&lt;/div&gt;&lt;/div&gt;</description><link>http://pcworldsl.blogspot.com/2009/05/email-tracking-useful-infromation.html</link><author>noreply@blogger.com (dbn_01)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqzBTdSih-wMytGht9JFktpmQfxb-200idEefReVOe8LYLbRG5-ntimvvNX_fVg4Wy4BdHVHPBYPGpZYQ7D-58RcBKH2vRHWvs43eFi_3laOSemHa-cbsGtzH-FGQ8YgXk4VHpJYJ4oe4/s72-c/image001.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-9161169810099473448</guid><pubDate>Sun, 24 May 2009 14:40:00 +0000</pubDate><atom:updated>2009-05-24T07:43:56.832-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">create survey</category><title>NEW: eSurveysPro.com offers now the possibility to create online polls!</title><description>Step 1: Create Surveys&lt;br /&gt;Using just your browser you can easily create the most complex surveys.&lt;br /&gt;eSurveysPro.com will help you design your surveys with our easy to use survey editor. We offer you &lt;a class=&quot;link_green12&quot; style=&quot;COLOR: rgb(65,135,198); TEXT-DECORATION: none&quot; href=&quot;http://www.blogger.com/SampleQuestions.aspx&quot;&gt;14 question types&lt;/a&gt; and the possibility to control the flow of your surveys.&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;Step 2: Collect Responses&lt;br /&gt;Collect responses by sending email invitations or by placing a link to your survey on any website.&lt;br /&gt;We offer a powerful mailing system that will help you send and track email invitations to your surveys. Alternativelly, you can just place a link anywhere on the web to your survey.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;Step 3: Analyze Results&lt;br /&gt;View your results as they are collected in real-time using our reports.&lt;br /&gt;Use our reports to summarize and analyze your responses. Dig down to a specific answer. Export your data if you want to process it offline using tools like Excel or SPSS.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.esurveyspro.com/&quot;&gt;http://www.esurveyspro.com/&lt;/a&gt;&lt;/div&gt;</description><link>http://pcworldsl.blogspot.com/2009/05/new-esurveysprocom-offers-now.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-4056326225636437835</guid><pubDate>Sun, 24 May 2009 14:33:00 +0000</pubDate><atom:updated>2009-05-24T07:35:50.411-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Try this</category><title>Try this</title><description>It&#39;s time to phone a friend for a little math fun ...get your calculator....this works!&lt;br /&gt;(Note: Ignore your area code and use only your seven digit phone number. Ex: if your phone # is 077******* then forget about the first 3 digits (077) &amp;amp; start the game with the rest. Enjoy!!!)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1) What are the first 3 digits of your phone number? (do NOT include the area code)       &lt;br /&gt;2) Multiply by 80       &lt;br /&gt;3) Add 1       &lt;br /&gt;4) Multiply by 250       &lt;br /&gt;5) Add in the last four digits of phone number      &lt;br /&gt;6) Add in the last four digits of phone number again       &lt;br /&gt;7) Subtract 250       &lt;br /&gt;8) Divide by 2. &lt;br /&gt;&lt;br /&gt;Is the result your phone number?</description><link>http://pcworldsl.blogspot.com/2009/05/try-this.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-4876834986558154327</guid><pubDate>Wed, 20 May 2009 15:53:00 +0000</pubDate><atom:updated>2009-05-20T08:54:02.267-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Google in healthy competition</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><title>Microsoft, Google in healthy competition</title><description>&lt;strong&gt;STORY HIGHLIGHTS&lt;/strong&gt;&lt;br /&gt;Microsoft and Google carry high-tech race into the health care industry&lt;br /&gt;The tech rivals launched similar personal health record services in 2007&lt;br /&gt;Both face issues -- privacy, bureaucracy, and technological intransigence&lt;br /&gt;Experts say it will be natural for Facebook generation to go online for records&lt;br /&gt;&lt;br /&gt;For More Details Please visit:-&lt;a href=&quot;http://edition.cnn.com/2009/TECH/biztech/05/19/cnet.google.microsoft.health/index.html&quot;&gt;http://edition.cnn.com/2009/TECH/biztech/05/19/cnet.google.microsoft.health/index.html&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2009/05/microsoft-google-in-healthy-competition.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-5927596003638317397</guid><pubDate>Wed, 20 May 2009 15:50:00 +0000</pubDate><atom:updated>2009-05-20T08:52:41.944-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft Search engine</category><category domain="http://www.blogger.com/atom/ns#">New Search Engine -scour</category><category domain="http://www.blogger.com/atom/ns#">What Will the World Do with More Search Engines?</category><title>What Will the World Do with More Search Engines?</title><description>&lt;div align=&quot;justify&quot;&gt;Microsoft says it will introduce its new search engine within the next few days. The world&#39;s largest software company has called the project &quot;Kumo.&quot; It may change that name before the public sees it. Yahoo! (YHOO) and Google (GOOG) seem like odd names for search engines, but those choices never seemed to affect their success. Another company recently launched a search product called Wolfram Alpha. At least in the case of this software, the inventor, Stephen Wolfram, put his name on it.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;Aside from the major search engines, which include Google, Yahoo! and Microsoft, there are a number of minor companies in the competing for users&#39; attention. Some claim they are not search engines, probably because they do not want to seem so small compared to Google. A very few web surfers use Ask.com, Answer.com, and About.com. Search company, GoshMe, claims that there are half a million search engine products. That figure seems high, but it is impossible to disprove.&lt;br /&gt;Microsoft argues that if its search engine brings back more relevant results than Google or Yahoo! that people will eventually migrate to the &quot;best&quot; product. That may not be true. Google has become a habit for more than two-thirds of the people who use search engines in the United States. It is generally considered the best product, but in the final analysis that decision is subjective. Google is certainly the search program that gets the most positive votes if use means anything.&lt;br /&gt;&quot;Kumo&quot; may be just as good as Google, although the largest search engine keeps improving and adding to its functions. It is far too early to tell whether Microsoft can pick up a single new user even if its product is 99% as good as Google in the eyes of most people who look for things online. A cult has developed around Google, the company and the product, just as it has around Apple (AAPL) and its Mac and iPhone products. Loyalty is not always the by-product of function, although function often creates loyalty.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;Microsoft is running out of time in the search business. It only has 8% of the US market, and even that has been shrinking. The company would like to form a partnership with Yahoo! so that together they can challenge Google. If Microsoft gets a good response to &quot;Kumo&quot;, it may walk away from any relationship with Yahoo! and the No.2 search engine company&#39;s shareholders will have lost a chance to make money the way that they did when their board rejected Microsoft&#39;s offer to buy Yahoo! more than a year ago.&lt;br /&gt;The trouble with the search business is that its future may have almost nothing to do with whether search results get more accurate. Google&#39;s information is already more than adequate for the huge majority of people who are trying to find information online. At some point, and that point has probably been reached, people cannot tell the difference between flying in an airplane that is at 32,000 feet and one that is flying 1,000 feet higher. The change in perspective means nothing to them. All they know is that they are as high as they have to be to get where they are going.&lt;br /&gt;Search is facing the same problem as the chip business. Intel (INTC) and AMD (AMD) make semiconductors that are so powerful that very few PC buyers can use all of their computational power. A lot of what the chips can do is wasted. Upgrading to a more powerful processor does not mean much to people who cannot tell the difference. That leaves a few corporations and people who play complex video games as the only discriminating buyers of PCs with ultra-powerful processors. Just three or four years ago, the difference between one generation of semiconductor and another meant something to the casual PC user. The chips are too good now. Almost no one cares that a new Intel product can make one billion computations a second. Almost no one even knows what that means.&lt;br /&gt;Creating a new search engine is a tremendous risk at this stage because it is remarkably expensive to build and market one that has any chance in the mass market. To make the proposition harder, not only do people prefer Google to other products, but most people will not be able to tell whether a search product coming to market now is better or not. Good is so excellent that it is not good any more.&lt;br /&gt;— Douglas A. McIntyre&lt;/div&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;source:-&lt;/span&gt;&lt;a href=&quot;http://www.time.com/time/business/article/0,8599,1899804,00.html&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;http://www.time.com/time/business/article/0,8599,1899804,00.html&lt;/span&gt;&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2009/05/what-will-world-do-with-more-search.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-9084782083820490841</guid><pubDate>Wed, 20 May 2009 15:49:00 +0000</pubDate><atom:updated>2009-05-20T08:50:05.964-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Israel warns citizens to beware Facebook spy requests</category><title>Israel warns citizens to beware Facebook spy requests</title><description>&lt;strong&gt;STORY HIGHLIGHTS&lt;/strong&gt;&lt;br /&gt;Terrorist groups using social networking to recruit spies, Israel says&lt;br /&gt;Subjects are offered money to pass along secrets, security agency says&lt;br /&gt;Groups looking for personal information to contact Israeli citizens&lt;br /&gt;&lt;br /&gt;For more details please visit:-&lt;a href=&quot;http://edition.cnn.com/2009/WORLD/meast/05/18/israel.facebook.spies/index.html&quot;&gt;http://edition.cnn.com/2009/WORLD/meast/05/18/israel.facebook.spies/index.html&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2009/05/israel-warns-citizens-to-beware.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-8663918580185937613</guid><pubDate>Sun, 17 May 2009 08:34:00 +0000</pubDate><atom:updated>2009-05-17T01:35:37.727-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">others over DVD patents</category><category domain="http://www.blogger.com/atom/ns#">Toshiba sues Imation</category><title>Toshiba sues Imation, others over DVD patents</title><description>NEW YORK (Reuters) - Japan&#39;s Toshiba Corp (&lt;a style=&quot;COLOR: rgb(0,90,132); TEXT-DECORATION: none&quot; href=&quot;http://www.blogger.com/finance/stocks/overview?symbol=6502.T&quot;&gt;6502.T&lt;/a&gt;) said it sued Imation Corp (&lt;a style=&quot;COLOR: rgb(0,90,132); TEXT-DECORATION: none&quot; href=&quot;http://www.blogger.com/finance/stocks/overview?symbol=IMN.N&quot;&gt;IMN.N&lt;/a&gt;) and several recordable DVD manufacturers and distributors, claiming they are infringing on its patents.&lt;br /&gt;The lawsuit, filed in the U.S. District Court for the Western District of Wisconsin, says Imation and the other companies do not have licensing agreements with Toshiba for patents that it says are essential for meeting DVD format specifications.&lt;br /&gt;Toshiba wants damages for past infringement and is asking the court to bar the sale, manufacture or import into the United States of recordable DVD media by the companies that it named in the lawsuit, it said in a statement.&lt;br /&gt;The DVD media are sold under the Imation and Memorex brand names in the United States, Toshiba said.&lt;br /&gt;The other defendants are Moser Baer India Ltd (&lt;a style=&quot;COLOR: rgb(0,90,132); TEXT-DECORATION: none&quot; href=&quot;http://www.blogger.com/finance/stocks/overview?symbol=MOSR.BO&quot;&gt;MOSR.BO&lt;/a&gt;), CMC Magnetics Corp (&lt;a style=&quot;COLOR: rgb(0,90,132); TEXT-DECORATION: none&quot; href=&quot;http://www.blogger.com/finance/stocks/overview?symbol=2323.TW&quot;&gt;2323.TW&lt;/a&gt;) and Ritek Corp (&lt;a style=&quot;COLOR: rgb(0,90,132); TEXT-DECORATION: none&quot; href=&quot;http://www.blogger.com/finance/stocks/overview?symbol=2349.TW&quot;&gt;2349.TW&lt;/a&gt;) of Taiwan, and Glyphics Media, Hotan Corp, Khypermedia Corp and Advanced Media Inc in the United States, Toshiba said.&lt;br /&gt;(Reporting by Robert MacMillan, Editing by Ian Geoghegan)&lt;br /&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;source:-&lt;/span&gt;&lt;a href=&quot;http://www.reuters.com/article/technologyNews/idUSTRE54E41A20090515&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;http://www.reuters.com/article/technologyNews/idUSTRE54E41A20090515&lt;/span&gt;&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2009/05/toshiba-sues-imation-others-over-dvd.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-29522983851214971.post-2598417123607587897</guid><pubDate>Sun, 17 May 2009 08:33:00 +0000</pubDate><atom:updated>2009-05-17T01:34:06.711-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Google eases trademark restrictions on some U.S. ads</category><title>Google eases trademark restrictions on some U.S. ads</title><description>SAN FRANCISCO (Reuters) - Google Inc is lifting restrictions on the use of trademarked terms in its U.S. online advertising system, a move that could increase friction between the Internet giant and brand owners.&lt;br /&gt;The new policy will allow businesses to place trademarked terms directly in the copy of text advertisements that run in the U.S. starting next month, the company announced in a blog post on Thursday.&lt;br /&gt;The move, which Google said will improve the quality of its advertisements, comes as advertisers have begun bidding less money for the individual search terms that their ads appear alongside and as Google&#39;s revenue growth slows in the dismal economic climate.&lt;br /&gt;Until now, Google has forbidden companies from placing trademarked terms in their advertising copy unless they owned the trademark or had explicit permission from the trademark owners.&lt;br /&gt;That policy was the equivalent of a supermarket promotion in a Sunday newspaper that only listed generic products like &quot;discount cola&quot; instead of the actual products for sale, Google said in its blog post on Thursday.&lt;br /&gt;The new policy will allow resellers and informational Web sites to use trademarked terms in their copy in certain situations without seeking permission from the trademark owners.&lt;br /&gt;The move represents the second recent loosening of Google&#39;s policies on trademark use. Earlier this month, Google said it would allow companies in 190 countries outside the US to bid on trademarked keywords that act as the triggers for their own advertisements.&lt;br /&gt;Google is also facing new legal challenges from trademark owners.&lt;br /&gt;On Monday, Firepond, a Texas software company, filed a trademark infringement suit against Google seeking class action status for all Texas trademark owners.&lt;br /&gt;Brand owners have historically had serious concerns about Google&#39;s policy with regards to trademarks, said Eric Goldman, Associate Professor of Law at Santa Clara University School of Law.&lt;br /&gt;Google&#39;s latest policy change is &quot;kind of like pouring gasoline on the fire,&quot; he said.&lt;br /&gt;The change may help consumers better understand sponsored search results, by allowing the advertiser to reference trademarks in their marketing pitches, Goldman said. But he predicted that the change could spark more legal challenges.&lt;br /&gt;Google Senior Trademark Counsel Terri Chen acknowledged some people might be unhappy with the change, but she said she believed the ads would be well-received overall.&lt;br /&gt;Chen said the policy was well-established legal principle in the US. Google is changing the policy now, she said, because it was more comfortable it had a process in place to monitor situations that don&#39;t comply with the new policy.&lt;br /&gt;(Reporting by Alexei Oreskovic; Editing by Anshuman Daga)&lt;br /&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;Source:-&lt;/span&gt;&lt;a href=&quot;http://www.reuters.com/article/technologyNews/idUSTRE54B6R020090515&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;http://www.reuters.com/article/technologyNews/idUSTRE54B6R020090515&lt;/span&gt;&lt;/a&gt;</description><link>http://pcworldsl.blogspot.com/2009/05/google-eases-trademark-restrictions-on.html</link><author>noreply@blogger.com (dbn_01)</author><thr:total>0</thr:total></item></channel></rss>