U n ME makes WE...

tHe PuLsE oF mY bEaUtIfUl MiNd... ThE cOlOr Of My DaZzL'n ThOtS... I sAy ThIs CoZ "ItZ mY oWn BlOg" :)

iTz M y TiMe


Showing posts with label Geeeeekzzz. Show all posts

Lost in the Windows 7 hype, Microsoft also released the beta of Windows Server 2008 R2, which is the companion to the client OS.

The company is aligning Windows Server 2008 R2, which briefly was referred to as Windows Server 7, and the client OS Windows 7 although Microsoft officials have not said if they will ship together.

But users who adopt both will get new security, network and other features although some of those will require network upgrades like implementing IPv6.

The R2 beta's integration with Windows 7 is high on the server's feature list. The integration points include a laundry list of features including DirectAccess, which lets Windows 7 PCs directly connect to intranet-based resources without needing a VPN connection.

While DirectAccess could eliminate VPN infrastructure, users will have to support IPv6 and IPSec on their network in order to access intranet resources.

Bill Laing, Microsoft's vice president of Windows Server and systems, said late last year that a company's entire network does not have to be IPv6 for DirectAccess to work. The client nodes and some of the network nodes for tasks such as authentication have to support IPv6. But he did add that users will also need to support IPSec.

"DirectAccess is a compelling feature, but there is infrastructure work you need to do and it will take time to roll this out," Laing said.

Other Windows 7 integration points with R2 include Branch Caching, which caches frequently used content on a branch-office network; a read-only Distributed File System (DFS) to improve branch office security, power management via Group Policy, BitLocker drive encryption for USB drives referred to as BitLocker To Go, and an Offline Folders feature for mobile users.

Unique to the server side, the R2 release includes support for Live Migration, a much anticipated feature add-on to Hyper-V. Not only will the feature help Microsoft match similar tools already available from VMware and open-source hypervisor platforms, Live Migration is key for availability and scalability in the Virtual Desktop Infrastructure (VDI) support coming in R2 server.

Another key VDI component is Remote Desktop Services (RDS), formerly called Terminal Services, which allows users outside the intranet to connect to desktops and application running inside virtual machines on a server.

RDS includes the Remote Desktop Connection Broker, an upgrade to the Windows Server's Session Broker, an administrative set-up tool for both server-based virtualized desktops and traditional Terminal Services remote desktops.

Microsoft is building its VDI infrastructure on the back of the Connection Broker, Hyper-V and Virtual Machine Manager.

RDS fits in a loose grouping with Microsoft's other virtualized desktop software that is part of its popular Microsoft Desktop Optimization Pack (MDOP), which includes App-V and Enterprise Desktop Virtualization.

Also included are power management features called Core Parking, and deeper integration with PowerShell.

Microsoft is also working on application virtualization for the server, but it will not be part of R2 server. Also not in the release is technology Microsoft acquired when it bought Calista Technologies, which delivers 3D graphics, such as Vista Aero Glass, and multimedia support to virtualized desktops.

Google is working on a new service called Google Translation Center. Just a short while ago, we noticed that “center” had been added to Google’s robots.txt file, and now co-editor Tony Ruscoe discovered the link to the working frontpage... though logging in fails right now. According to the Google explanations on the frontpage and their product overview page, we can see this is meant to be a translation service which offers both volunteers and professional translators... and I suppose at least the professionals will want to get paid. In that regards, the service is in the field of sites like Click2Translate.com (a service by the company which Tony works for, incidentally, and which I’m often using for some of my sites).

Here’s what’s printed as a description on the service’s frontpage:

<<Request translations and find translators
Upload your document and request translations into over 40 languages. [*]

Translate and review translated documents
Create and review content in your language through Google’s free, easy-to-use, online translation tools.>>

And these are the sample screenshots Google shows off in their product introduction:


The project creation page. You can provide fields like project name (e.g. “FAQ page”), description, due date and owners. You can set the source and target language, upload a local file to be translated, and assign a translator and a reviewer. “If a translator accepts, you should receive your translated content back as soon as it’s ready,” Google says (note the “if” part, a potentially important difference to paid-only translation services).


This is what Google calls the translator inbox in their screenshot file name. It looks like the overview page for those approaching the Google Translation Center as a translator. Google says, “Passionate about bringing content into your language? Browse through Google Translation Center to find open translation requests into your language. Accept translation requests and use Google translation tools to provide quick, high-quality translations.” In this view, you can find out the number of assignments, and the completion status for each.


The part Google calls the translator workbench. In this view, the translator sees the source text and the translation in progress side-by-side. An option on top toggles auto-saving. A third column offers a couple of helper tools for the translation, like a revision history, a glossary, or a history of previous translations.

More than an all-in-one stop for paid translations as some of the competing services in this field, the Google Translation Center looks like it aims to be a marketplace coordinator and tool provider. Just how Google could make money with this is another question. Google often goes for ads; in this system, one might think getting commissions for paid jobs would be an option, but there’s a part in the terms and conditions of the service which makes me wonder if there will be such a thing – Google says (my emphasis):

<Google is not involved in such dealings>>

I’m also curious if volunteers will get paid, too, as one might think it’s not like everyone is waiting to do free translations... unless they identify with a site or some content re-use is allowed (like an open source project, perhaps, or a Creative Commons licensed article). If Google decides to provide a rating system, though, then volunteering for projects may have the side-effect of increasing one’s status within the service.

Another interesting aspect is how Google will handle the service’s feature to match current translations with previous ones. Tony says, “This sounds like what the industry calls a ’Translation Memory’. Usually, the client would pay for a translation memory and own it since they paid for the translations.” Tony adds that if Google may plan to add something like a “global Translation Memory,” then this could raise the questions whether or not customers end up paying for pro translators to find their translation memory be re-used by other companies. Another issue of discussion will likely be the translation quality, by and large; just imagine someone volunteering to sneak in insults or spam. From Google’s FAQ on this:

<<Does Google provide guarantees on the quality of the services provided by Google Translation Center?

No. Translations created in Google Translation Center are purely between the translation requester and the translators.>>

And as the terms of service argue, “Google will not” be “involved in resolving any disputes between you and any third party participant(s) related or arising out of your use of Google Translation Center”. But let’s wait and see. Judging from my past translation jobs as a webmaster – give the service a data file containing all your content strings, plug it back in later on and suddenly have a multi-language website – this is definitely an interesting and highly useful field. Right now, according to the FAQ, “Google Translation Center is in limited release through Google’s Trusted Tester Program” which gives “friends and family members of Google employees a chance to test-drive our early beta, prior to release. Later, anyone can sign up to request and provide translations through Google Translation Center.”

Do u know how to search in Google?? Well tats not a relevant question...

Do u know how to give your search keywords while u search in Google... Am sure that most of us dunno wat our search keywords mean to the Search Engine, I mean how the Goolge SE takes when we search something... Here are a few samples...

(colors i've used Keywords - Search Results )

Google Search Keyword Format --> Google Search Engine takes it this way

1) urcognizance blog ----- The words urcognizance and blog

2) sailing OR boating
----- Either the word sailing or the word boating

3) "love me tender"
----- The exact phrase love me tender

4) printer -cartridge
----- The word printer but NOT the word cartridge

5) Toy Story +2
----- Movie title including the number 2

6) ~auto looks up
----- The word auto and synonyms

7) define:serendipity
----- Definitions of the word serendipity

8) how now * cow
----- The words how now cow separated by one or more words

9) + addition;
----- 978+456

10) - subtraction;
----- 978-456

11) * multiplication;
----- 978*456

12) / division;
----- 978/456

13) % of percentage;
----- 50% of 100

14) ^ raise to a power;
----- 4^18 (4 to the eighteenth power)

15) old in new (conversion)
----- 45 celsius in Fahrenheit

16) site:(search only one website)
----- site:websearch.about.com “invisible web”

17) link:(find linked pages)
----- link:www.lifehacker.com

18) #...#(search within a number range)
----- nokia phone $200...$300

19) daterange:(search within specific date range)
----- bosnia daterange:200508-200510

20) safesearch: (exclude adult content)
----- safesearch:breast cancer

21) info: (find info about a page)
----- info:www.websearch.about.com

22) related: (related pages)
----- related:www.websearch.about.com

23) cache: (view cached page)
----- cache:google.com

24) filetype:(restrict search to specific filetype) zoology filetype:ppt

25) allintitle: (search for keywords in page title)
----- allintitle:"nike" running

26) inurl:(restrict search to page URLs)
----- inurl:chewbacca

27) site:.edu (specific domain search)
----- site:.edu, site:.gov, site:.org, etc.

28) site:country code (restrict search to country)
----- site:.br “rio de Janeiro”

29) intext:(search for keyword in body text)
----- intext:parlor

30) allintext: (return pages with all words specified in body text)
----- allintext:north pole

31) book(search book text)
----- book The Lord of the Rings

32) phonebook:(find a phone number)
----- phonebook:Google CA

33) bphonebook: (find business phone numbers)
----- bphonebook:Intel OR

34) rphonebook:(find residential phone numbers)
----- rphonebook:Joe Smith Seattle WA

35) movie:(search for showtimes)
----- movie:wallace and gromit 97110

36) stocks:(get a stock quote)
----- stocks:ncesa

37) weather:(get local weather)
----- weather:97132

I think now u how to search in Google...

Creating a battery from a lemon is a common project in many science text books. Successfully creating one of these devices is not easy.


Batteries consist of two different metals suspended in an acidic solution. Copper and Zinc work well as the metals and the citric acid content of a lemon will provide the acidic solution.Batteries like this will not be able to run a motor or energize most light bulbs. It is possible to produce a dim glow from an LED.The picture at the top of this page shows a basic lemon battery, a lemon, copper penny and zinc coated nail.

The lemon : A large, fresh, "juicy" lemon works best.
The nail : Galvanized nails are coated in zinc. I used a 2" galvanized common nail.
The penny : Any copper coin will work. (Canadian pennies from 1960 - 2001 all worked)


Creating the battery: Insert a penny into a cut on one side of the lemon. Push a galvanized nail into the other side of the lemon.

The nail and penny must not touch.


This is a single cell of a battery. The zinc nail and the copper penny are called electrodes. The lemon juice is called electrolyte.

All batteries have a "+" and "-" terminal. Electric current is a flow of atomic particles called electrons. Certain materials , called conductors, allow electrons to flow through them. Most metals (copper, iron) are good conductors of electricity. Electrons will flow from the "-" electrode of a battery, through a conductor, towards the "+" electrode of a battery. Volts (voltage) is a measure of the force moving the electrons. (High voltage is dangerous!)


I have connected a volt meter to our single cell lemon battery. The meter tells us this lemon battery is creating a voltage of 0.906 volts.Unfortunately this battery will not produce enough current (flowing electrons) to light a bulb.


To solve this problem we can combine battery cells to create higher voltages. Building more lemon batteries and connecting them with a metal wire from "+" to "-" adds the voltage from each cell.


The two lemon batteries above, combine to produce a voltage of 1.788 volts. This combination still does not create enough current to light a small bulb. Note the red wire connecting the batteries is joined from "+" (penny) to "-" (galvanized nail).


Four lemon batteries create a voltage of 3.50 volts. We should be able to light up a small device like an LED (Light Emitting Diode).

Note the connecting wires go from "+" to "-" on each battery.


LED
To turn on an LED you must determine the "+" and "-" connections. If you look closely at the red plastic base of an LED you will notice a "flat" spot (indicated by arrow above). The wire that comes out beside the flat spot must connect to the "-" side of a battery, the other wire to the "+" side.

Important information about LEDs: LEDs are designed to work at very low voltages (~ 2V) and low currents. They will be damaged if connected to batteries rated at over 2 volts. LEDs require resistors to control current when used with batteries rated at over 2 volts. Lemon batteries produce low current. It is OK to connect an LED to a lemon battery.


In the above image, electrons flow from the "-" (nail) end of our lemon battery through the LED (making it glow) then back to the "+" (penny) end of the battery. This is an electronic circuit. The LED glows dimly with this configuration.

Improving your battery.


The quality of the copper and zinc can be a problem for a battery like this. Pennies in particular are rarely pure copper.

Try substituting a length of 14 gauge copper wire (common house wire) for the penny. Experiment with different lengths and configurations of electrodes. Other sources of zinc and copper may be found in the plumbing supply department of a hardware store.

The first battery was created in 1799 by Alessandro Volta . Today batteries provide the power for an amazing variety of devices, everything from flashlights to robots, computers, satellites and cars. Inventors and researchers continue to improve the battery, designing batteries that last longer and that are more friendly to our environment.

Understanding how batteries actually work requires a knowledge of chemistry. The most important factor in battery design is the electrical relationship between the two metals used in the battery. Some metals give electrons away while other metals accept extra electrons. Chemists have investigated metals and created an "electric potential" table comparing different metals.

Regards,
DJ


Microsoft literally killed windows XP yesterday.You may ask,what's that killing mean exactly to a software. Guys don worry... there are answers to all ur questions !!!

Wen XP was launched in October 2001,it was named so for the new eXPerience that a user may get from the software... but now the case is totally different, there's really another meaning by which XP can be called... itz eXPiry :(

Microsoft stopped selling the XP version to retailers and PC manufactures from yesterday (30th june 2008)...

So is this the end of XP totally ???
Nope... Micosoft has decided to release some low cost platforms that may use the HOME edition of XP for another 6 more months.


Why did those guys do this to XP ???
"We gave you a bigger, better version called Vista, more than 18 months ago.So start to love it - or lump it" this is what those ppl in Microsoft reply...

So wat do users reply for this???
"Thanks,but no thanks! We don't care for Vista... its blotted and sluggish... it irritates with hundred promptings and it often doesn work with most of our peripheral printers, scanners and CD/DVD driver and it takes too long to start or stop (unless we do costly hardware upgrade ), thaz drivin us crazy ", and this is wat exactly users say wen they wanna compare XP and Vista ...

So wat actually users want ???
As PC's become smaller, lighter, less power-hungry, what ppl want is a smaller, quicker PC software that lets em' to get on the web - which is just a dump place for their tools and files and Vista is not wat they exactly need...

Wat do others murmur about this???
"XP will die at the hands of misguided killer : Microsoft" said the Web magazine ITWorld.com a few days ago - and many in the industry agree...

Over 140 million copies of Vista have been sold claims Microsoft... but analysis Forrester found in April that only half the enterprise world has planned an upgrade to Vista... Whateva happening around the Intel Corp ( a key partner of Microsoft Corp ) has decided to stick with XP..

So wat can the rest of us do???
Microsoft has already announced that the next iteration after Vista will be Windows 7 - possibly in 2009.If we are to use XP on our boxes no one can really stop us and the resellers and assembler community will find some way to support us, with or without Microsoft's help.

So we can do all our computing, the XP way, till we see wat Windows7 offers, leap frogging over Vista in the process....

scribbles by,
johny :)



iPhone hasn't yet into the market but hey there, some probs been reported bot it...

I'm concerned bot 4 main things i heard bot it n here it is 4 u...

The Cam -> It has got only a 2 Megapixel cam, which is an annoy'n thing coz at these days we cud find many mobiles come'n wid more than
2 Megapixel cam... :(

The Battery -> This really a heck coz iPhone 3G is being launched wid non replacable battery as Apple notebooks do... :(

MMS -> This phone doesn't have this gr8 feature guyz...

The Memory -> It comes wid a 8 GB... Well not much of flexiblity...

And there are lot more like No Cut n Paste
, No Voice Dialing...

Aite letz see wat happens in the future, if Apple cud overcome all these, trust me guyz iPhone 3G is gonna be damn gr8 mobile...

Know more bot this topic here in detail -> Click here

DJ


Mozilla on 17th june released an improved version of its Firefox web browser that has gained popularity as a free alternative to Microsoft's Internet Explorer.Mozilla's Firefox promises internet surfing that is fast, secure and easy to customize because it is designed to adapt the people's online activities.

The company claimed that the new Firefox version is available in 50 languages and is at least twice as fast as its predecessor and boasts 15000 improvements including malware protection. The interest in the California based organization's new generation browser was so intense before it was released that traffic to that Mozilla website caused it to crash.Firefox is available free for computers using Windows, Linux and Machintosh OSX operating system.

Get your Firefor3 now : Firefox3 official release
Other download sites : Download.com , Spread firefox.com




Performance test between Safari 3.1,Firefox3,InternetExplorer7

To get a perspective on how the browsers perform in the real world, I ran all our tests on a more typical office machine, a PC running Windows XP on a 2.67 Pentium M chip with 512MB of RAM. I then put each browser through its paces, asking them to load and reload five websites: our own timesjobs.com, orkut.com, msn.com, yahoo.com and an international news site bbc.co.uk. I repeated all my speed tests three times, clearing the cache when necessary, to produce an average result.

Against the clock, Safari was the clear speed demon, especially when it came to reloading pages it already visited and cached. Firefox was second, with IE pulling up the rear.





The stopwatch doesn’t tell the full story, however. While Firefox took a while to finish loading the page completely, all the elements that matter to the reader – the text and pictures – were loaded first. The remaining data loads in the background.

What this means in practise is that Safari and Firefox feel almost equally zippy, while IE 7 feels even slower than its load times suggest. In a head-to-head race to load each page so it looked complete to the naked eye, Firefox 3 and Safari 3.1 could not be separated on three of our five test sites. Safari consistently had the edge on the other two, while IE 7 was a visible third every time.


VERDICT


Benchmarking browsers by their load time is a useful but slightly misleading exercise, as test reflect. While IE 7 only slightly lags Firefox 3 on the stopwatch, in real-world terms it comes in a very distant third. IE 8 has just entered beta and Microsoft will need to do more than add new features to arrest the steady migration of users to not only Firefox but also Safari.


Apple’s software is the browser of choice for Mac users and it’s proving to be the speed king on Windows PCs. The streamlined interface is easier to use than IE 7’s reinventing-the-wheel layout and if Apple’s iPod halo effect shines a light on Safari 3.1, many PC users will be pleasantly surprised by what they find.


In real world situations, however, Firefox 3 hardly lags Safari in the speed stakes, and offers more than just extra pep. Version 3.0 is a big improvement to a browser that’s already the connoisseurs choice, and the new Location Bar alone will change your online life.


Start typing in the revamped address bar and Firefox starts sifting through your History, Bookmarks and any blog-like Tags you’ve attached to them to guess what page you’re looking for and bring those you visit most often to the top.


It’s enough to earn Firefox 3 our recommendation as the browser to beat

RATINGS


Internet Explorer 7.0 - 3/5

Safari 3.1 - 4/5

Firefox 3.0 RC1 - 5/5


Get your Firefor3 now : Firefox3 official release
Other download sites : Download.com , Spread firefox.com



Hi friends,One week ago my system started acting funny ,the hidden files where always hidden even if we change the file settings in it & the hard disk partition's didn't open up correctly and i was not even able to explore them by right clicking on it.The only way it can be accessed was using direct explore from my computer or some other tools.I checked my all ongoing process on that time and found a process called as amvo.exe

I tried to get it out but wasn't able to by just removing it from msconfig startup,then i searched the net and found out the way to remove it & here it is

Go to command prompt by running cmd in run
Go to c:\Windows\System32 folder

Delete the amvo.exe file in it by using

del /f/ah amvo.exe

check if there are anyother dll by the same name like amvo0.dll or amvo1.dll
u will not be able to remove those files now,don't worry about that.Now remove the amvo.exe from startup and restart your system.

After Restarting your system goto command prompt and delelte those dll files in the system32 folder by using the same command

del /f/ah amvo0.dll
del /f/ah amvo1.dll

these files ll be present only sometimes

then goto back to c:\ in command prompt and remove the autorun.inf file by using the same command

del /f/ah autorun.inf

do this for all the partitionson your system.
Don't open anyone now,restart the system then access them .

If u wanna check whether they are gone,use dir in command prompt for hidden files to view it

dir /ah

Usage of printer in home is very less compared to their use in many companies and organizations.Since printers are not much used in home the ink in the cartridges gets solidified and hence it cannot be used when it is needed.I have experienced this kind of problem as i don't use my printer often.It sometimes becomes so irritating when we cant use the printer when we need it. So I left it just like that without replacing the cartridge ,since its expensive and thought it would be a waste of time and money at the end as it gets thickened before I use at least half of the cartridge.

So i just surfed over the internet to find a solution that may fix this problem.That is how i came to know about the pacific ink company. Pacific ink is a basically a company that sells various printer
cartridges that are being manufactured by many popular manufactures such as the Epson , Canon , Dell , HP , Lexmark , etc. I was really impressed seeing the promising words that is being given by the company to the customers.

These are the promising words of the company :

"If for any reason our printer cartridges do not perform to your complete satisfaction contact us by phone and we will im
mediately work with you to remedy the situation."

They give us guarantee that the cartridges being sold by them will not fail at any cost and if any failure occurs they will be there to solve it for us. Another best feature of this pacific ink is that you can search for the ink you need from the printer model or the ink cartridge number easily. So we can find the product we needed easily and efficiently. They also have toner cartridge for laser printers too. They also offer printer inks for branded stuffs too like the canon ink cartridges, epson ink cartridges and dell printer cartridges, which are available here. And the other problem, which we are facing is about the shipping cost which has to be paid by us. But we have a solution for this also. Shipping cost is absolutely FREE once you sign up as a member of the Pacific Ink Cartridge Club!

Get them now and starting printing colors to your life.


A singapore based mobile and wireless group entered the indisan market on june 12th unveiling two new smartphones ATOM V and ZINC II - aimed at high end users.it is been priced at Rs 27,888.

ATOM V

Atom V is a touch scrren device that comes with an Intel processor running Microsoft Window Mobile 6 Professional at zippy 520Mhz.It comes with many features including the GPS(global positioning system), 2 mega pixel camera with auto focus an FM radio with RDS(radio data system) that provide the data on the station the current track on air from a station and even traffic alerts.



ZINC II

Similarly Zinc II features a sliding keyboard and is the fisrt Window Mobile 6.1 device available in India.other than the internal GPS capability and other features that is included in the Atom V.the Zinc II has the semi sliding keyboard ideal for messaging writing mails and delivering presentations.It comes with the price tag of 34,888 Rupees.





know more about atom v --> ATOM V and ZINC II official site

What is SPAM ?

It is the business model where the individuals send email to millions of people.You might
wonder why i call it business model.The individual sending such mails will usually some advertising or scam mails.

Even if 0.1 percent or less people reply or buy the products advertised the sender recovers his expenditure and it becomes profitable.For example " You've won $500 million,reply to ..." ," buy cool watches cheap " , "buy software for cheap ...."

How does it work ?

It is a multistage process involving in e-mail id harvesting/buying,getting access to SPAM botnet and sending e-mail.E-mail id harvesting/buying is a process of crawling the internet(reading as many web sites as possible) and getting e-mail address from all over.This process is mostly automated.

A spammer either harvests the email ids or buys from other spammers.SPAM botnet are the systems from other spammers.SPAM botnet are the system from which emails will be sent.Usually these are not owned by the spammer but is some system on the internet which was compromised for spamming/phishing puposes.

Then the spammer will send the e-mail through a setup that can send e-mails automatically to the addresses provided.

How to defend yourself from it?

Never reply to SPAM mails.Never click on any links on SPAM mails.Never download any attachments from an unknown sender.Free mail service providers use many technologies like tarpitting,statistical SPAM filtering,SPF,DomainKeys ,etc, on your behalf to keep your inbox SPAM free.In spite of their effort SPAM mails each your inbox.


APPLE unveils cheaper iPhone

Steven P.Jobs, chief executive of Apple, introduced the new,cheaper iPhone model that connect to the internet faster.It is expanded its distribution overseas and displayed a range of new applications and services in order to establish Apple as a major player in the cell phone industry.

Apple, the Cupertino,California,maker of consumer electronics and computer equipments,had set a goal of selling 10 million iPhones in 2008, which would establish it as one of the major smart phone makers in lass than two years since it began shipping the original iPhone.Apple has sold 6 million iPhones globally since its introduction

So when does it come to the market ?

Mr.Jobs said the new iPhone 3G to be available in the U.S through the AT&T beginning july 11 will sell for $199 for the 8 gigabyte model and $299 for a 16 gigabyte model.





Technical upgrades

The phone will run on so called 3G wireless networks that allow much faster internet connections than the original iPhone.The phone sleeker than the original will also have built in Global positioning System (GPS) capability to allow location-based services .It will have be having longer battery life in some cases, five hours of talking on 3G network and 24 hours for playing music on the phone.

The new iPhone also has a tracking feature enabled making it possible to watch on a Google map as an iPhone user drives in a road way making it useful to easily track an iPhone user in any emergency.

Apple planned to sell new iPhone in 70 countries around the world soon where the current iPhone is being sold only in 6 countries across the world.

By the new feature set, eco system partners and the launch countries and pricing of the iPhone, it is expected around 10 million iPhones could be marked by september to october.





know more about iPhones --> Apple's iPhone

Nowadays Everybody have their hands full of Credit Cards coz it is safer to use and makes ones lifestyle better... But I think, almost 90% of credit card users doesn't know how it works... Here is a stuff that explains how it works..


What Credit Card Numbers Mean??

Although phone companies, gas companies and department stores have their own numbering systems, ANSI Standard X4.13-1983 is the system used by most national credit-card systems.



Illustration by Rosaleah Rautert
The front of your credit card has a lot of numbers -- here's an example of what they might mean.

Here are what some of the numbers stand for:

* The first digit in your credit-card number signifies the system:
o 3 - travel/entertainment cards (such as American Express and Diners Club)
o 4 - Visa
o 5 - MasterCard
o 6 - Discover Card

* The structure of the card number varies by system. For example, American Express card numbers start with 37; Carte Blanche and Diners Club with 38.

* American Express - Digits three and four are type and currency, digits five through 11 are the account number, digits 12 through 14 are the card number within the account and digit 15 is a check digit.
* Visa - Digits two through six are the bank number, digits seven through 12 or seven through 15 are the account number and digit 13 or 16 is a check digit.
* MasterCard - Digits two and three, two through four, two through five or two through six are the bank number (depending on whether digit two is a 1, 2, 3 or other). The digits after the bank number up through digit 15 are the account number, and digit 16 is a check digit.

The stripe on the back of a credit card is a magnetic stripe, often called a magstripe. The magstripe is made up of tiny iron-based magnetic particles in a plastic-like film. Each particle is really a tiny bar magnet about 20-millionths of an inch long.


Illustration by Rosaleah Rautert
Your card has a magstripe on the back and a place for your all-important signature.

The magstripe can be "written" because the tiny bar magnets can be magnetized in either a north or south pole direction. The magstripe on the back of the card is very similar to a piece of cassette tape (see How Cassette Tapes Work for details).

A magstripe reader (you may have seen one hooked to someone's PC at a bazaar or fair) can understand the information on the three-track stripe. If the ATM isn't accepting your card, your problem is probably either:

* A dirty or scratched magstripe
* An erased magstripe (The most common causes for erased magstripes are exposure to magnets, like the small ones used to hold notes and pictures on the refrigerator, and exposure to a store's electronic article surveillance (EAS) tag demagnetizer.)

There are three tracks on the magstripe. Each track is about one-tenth of an inch wide. The ISO/IEC standard 7811, which is used by banks, specifies:

* Track one is 210 bits per inch (bpi), and holds 79 6-bit plus parity bit read-only characters.
* Track two is 75 bpi, and holds 40 4-bit plus parity bit characters.
* Track three is 210 bpi, and holds 107 4-bit plus parity bit characters.

Your credit card typically uses only tracks one and two. Track three is a read/write track (which includes an encrypted PIN, country code, currency units and amount authorized), but its usage is not standardized among banks.

The information on track one is contained in two formats: A, which is reserved for proprietary use of the card issuer, and B, which includes the following:

* Start sentinel - one character
* Format code="B" - one character (alpha only)
* Primary account number - up to 19 characters
* Separator - one character
* Country code - three characters
* Name - two to 26 characters
* Separator - one character
* Expiration date or separator - four characters or one character
* Discretionary data - enough characters to fill out maximum record length (79 characters total)
* End sentinel - one character
* Longitudinal redundancy check (LRC) - one character

LRC is a form of computed check character.

The format for track two, developed by the banking industry, is as follows:

* Start sentinel - one character
* Primary account number - up to 19 characters
* Separator - one character
* Country code - three characters
* Expiration date or separator - four characters or one character
* Discretionary data - enough characters to fill out maximum record length (40 characters total)
* LRC - one character

For mo re information on track format, see ISO Magnetic Stripe Card Standards.

There are three basic methods for determining whether your credit card will pay for what you're charging:

* Merchants with few transactions each month do voice authentication using a touch-tone phone.
* Electronic data capture (EDC) magstripe-card swipe terminals are becoming more common -- so is swiping your own card at the checkout.
* Virtual terminals on the Internet

This is how it works: After you or the cashier swipes your credit card through a reader, the EDC software at the point-of-sale (POS) terminal dials a stored telephone number (using a modem) to call an acquirer. An acquirer is an organization that collects credit-authentication requests from merchants and provides the merchants with a payment guarantee.

When the acquirer company gets the credit-card authentication request, it checks the transaction for validity and the record on the magstripe for:

* Merchant ID
* Valid card number
* Expiration date
* Credit-card limit
* Card usage

Single dial-up transactions are processed at 1,200 to 2,400 bits per second (bps), while direct Internet attachment uses much higher speeds via this protocol. In this system, the cardholder enters a personal identification number (PIN) using a keypad.

The PIN is not on the card -- it is encrypted (hidden in code) in a database. (For example, before you get cash from an ATM, the ATM encrypts the PIN and sends it to the database to see if there is a match.) The PIN can be either in the bank's computers in an encrypted form (as a cipher) or encrypted on the card itself. The transformation used in this type of cryptography is called one-way. This means that it's easy to compute a cipher given the bank's key and the customer's PIN, but not computationally feasible to obtain the plain-text PIN from the cipher, even if the key is known. This feature was designed to protect the cardholder from being impersonated by someone who has access to the bank's computer files.

Likewise, the communications between the ATM and the bank's central computer are encrypted to prevent would-be thieves from tapping into the phone lines, recording the signals sent to the ATM to authorize the dispensing of cash and then feeding the same signals to the ATM to trick it into unauthorized dispensing of cash.

If this isn't enough protection to ease your mind, there are now cards that utilize even more security measures than your conventional credit card: Smart Cards.

Know more about CC here

VoIP is a protocol (Voice-over-Internet protocol) which is designed to optimize the transmission of audio through the Internet. Most people refer to VoIP as the act of sending audio through a network, rather than the protocol itself. The protocol evolved from a 1973 protocol known as the Network Voice Protocol, which was one of the first attempts at sending speech over the Internet.

Despite the NVP's early origination date, it was not until 1996 that VoIP became widely available to consumers. Even then, the protocol and network structures had a long way to go, and the system was relatively inefficient. As technology has evolved and advanced, VoIP has become a realistic cost-effective solution to consider.

Currently, the chief alternative to VoIP is the PSTN, or public switched telephone network, which utilizes the traditional structure of circuit switching. The PSTN is a world network, much like the Internet, and includes household and mobile phones. When VoIP first came out, it was incompatible with PSTN, meaning users could only connect to other people with VoIP. Many early complications such as this have since been overcome, making VoIP much more viable than it was a decade ago.

What can VoIP do that the PSTN cannot One feature is the ability to add multiple phone lines without incurring additional costs, as it is possible to transmit several phone calls over the same connection. Other features that normally cost extra for a PSTN phone are free on VoIP; this includes attributes such as call forwarding, call waiting, caller ID. When encryption is employed, the security of the network is strong and hard to break in to.

The most popular security protocol used with VoIP is the Secure Real-Time Transport Protocol (SRTP). Many other services can be integrated with a system, including file exchanges, video conversation, and conference calls. Advanced services which would usually be difficult to implement are much easier to do in a VoIP system, and this ease also reduces the cost of installation as well.

Despite the many breakthroughs that have been made through the years, VoIP still faces many challenges. Audio is essentially large streams of data, and whenever data of that size is transferred through a network, problems can occur. Receiving nodes must restructure every bit of information that comes in, so if the data is obtained too quickly, the decapsulation process can be negatively affected.

Jitter, another data transfer conundrum, can also occur frequently if proper precautionary measures are not taken. All of the data transfer troubles, if not tended to, can result in a low quality of service. When packets are not received or they are scrambled, this translates into drop-outs of voice for the end users.

Reliability is another important thing to consider, especially for home use of VoIP. With regular telephones, if the power goes out, you can still use your phone. However, because VoIP works directly through the Internet, and a modem that uses household electricity, if the power goes out, your phone goes out.

Although VoIP can be made secure through encryptions, most of the software on the market today does not support that function. While SRTP is available for business applications, it rarely is accessible to the average consumer. For users who do not have any encryption mechanism, they can still rely on security by obscurity, which is usually fine enough for non-business uses.

Know more about this topic here!
More here
Current trends

Imagine doing a 250-km journey in a car that will cover the distance in just one-litre of petrol (just over $1)!

That's exactly what students of a Technical Institute in Punjab - the Rayat Institute of Engineering and Information Technology near Ropar - claim to have developed.

"It is a rare solo car which can generate a mileage of up to 250 km per litre. Our team of students have not only achieved this feat, but are going to showcase it at a world super-mileage competition in the United States next month," Gurvinder Singh Bahra, vice chairman of the Rayat and Bahra group of institutes, told media persons here as he unveiled the 'wonder car' with the team.

Though the students' team claims that the car will cost Rs.500,000, its research and development cost over Rs.2.13 million to the institute.

The car, having a 92cc engine, has been developed by a seven-member team of students from the sixth semester of the institute's mechanical engineering course. The team is led by Gaurav Aggarwal as captain and other members are Mayank Tyagi, Bhavuk Makkar, Arun Salaria, Rahul Kumar, Ramandeep Singh and Navneet Kumar. The team had Jujhar Singh and Rajesh Chaudhary as faculty advisors.

It took them one year to develop the car, said Bahra.

The team is now headed for the world super mileage competition to be held in Michigan, US, next month. The competition is organised by the Society of Automotive Engineers in the US.

"We have modified the engine as per rules supplied by the competition organisers. The frame of the 65-kg car has been developed by using special grade aluminium. It has hydraulic disc brakes and a modified carburettor and fuel supply system. The car has a lightweight outer body shell with an aerodynamic structure.

"All safety and ergonomics features have been taken into account. The car even has a self-designed battery re-charging system," said Aggarwal.

The Rayat team will be the second Asian team to participate in the 28-year-old contest that will have competitors from 35 countries.

Friends we have to be very proud of this as Indians. Letz encourage them in all aspects and let them find more luxurious car with same mileage...

Know more

Regards,
DJ

Yum is a very powerfull package manager. yum will resolve dependencies for you and makes installing applications a breeze. yum also searches, removes, and lists packages for you.

 Usage: yum [options] <>

Options:
-h, --help show this help message and exit
-t, --tolerant be tolerant of errors
-C run entirely from cache, don't update cache
-c [config file] config file location
-R [minutes] maximum command wait time
-d [debug level] debugging output level
-e [error level] error output level
-y answer yes for all questions
--version show Yum version and exit
--installroot=[path] set install root
--enablerepo=[repo] enable one or more repositories (wildcards allowed)
--disablerepo=[repo] disable one or more repositories (wildcards allowed)
-x [package], --exclude=[package]
exclude package(s) by name or glob
--obsoletes enable obsoletes processing during updates
--noplugins disable Yum plugins
--nogpgcheck disable gpg signature checking
--disableplugin=[plugin] disable plugins by name

From a first look this can look rather intimidating, but this is rather easy.

Examples given below:
  • To seach for a application

Yum will search all your enabled repos and tell you where you can obtain the package from

yum search application_name     
  • Yum can list all available packages from your enabled repos and tell you where you can obtain the package from:
yum list available
  • To find out more info about some package
yum info application_name
  • Installing applications

Inastalling is as easy as

yum install application_name
  • Listing rpms

yum can list installed rpms for you from the repos you have enabled

yum list extras
  • Removing rpms

Yum can remove a application and the dependenciesit installed with tat application. it will not remove depenencies if another application installed needs them.

yum remove application_name
  • Updating the system

Yum can update the system for you with out user interact if you want it to.

yum update
  • Not sure if you have upates?
yum check-update
  • Local install

downloaded a rpm and cannot install it with rpm because of dependencies?

yum localinstall /path/to/the/rpm
Happy yumming...