Saturday, April 28, 2007

Earn money from Google

With internet growing in size and user growing exponentially it has now reached a stage, where each one of us can earn from it with minimum effort. All we need is a blog (website) with internet connnected computer. With free creation of a blog from www.blogger.com, now any one can earn from internet.
Internet is the biggest cash machine of all. We all can earn money by just blogging, onces experience or sharing once opinion on a topic. With google ready to share their profit with all of us we should convert our free time to blogging time. Once a blog is regularly updated it wont take much time to get you enough money to make a living out of it. And only effort that we will be putting will be blogging some lines daily. So how does it all works just 3 simple steps

2. Sign up for GOOGLE adsense

3. Regularly update blog


So why does google pays you ??

The Google advertisements are displayed on you are site. And to display this on your content pages google pays on basis of:

1. Cost-per-click (CPC)

2. Cost-per-1000-impressions (CPM)

3. For search results pages showing exclusively CPC ads directed from your page.
This means that advertisers pay either when users click on ads, or when the advertiser's ad is shown on your site. You'll receive a portion of the amount paid for either activity on your website.To find out how much you'll earn, sign up and start showing ads on your web pages. There's no cost, no obligation, and getting started is quick and easy. Sign up for GOOGLE adsense
Once you're a part of Google AdSense, you can view your earnings at any time by logging in to your account and clicking the Reports tab. You'll be able to see the total number of page and ad unit impressions, ad clicks, clickthrough rate, effective CPM, and your total earnings so you can get an idea of how well the program is performing for you and how much you can expect to earn over time in the program.The money will be send as cheque to the address provide by you at the end of each month.

Wednesday, April 25, 2007

Alternative keyboard in Windows

An alternative keyboard in Windows. In case your keyboard or some keys stop working Microsoft provides you with an alternative way to type in using the mouse
To work this tool go to
Start menu.
Select Run Type in OSK
Press OK

One more Problem
How are we supposed to type OSK in run when we don’t have a keyboard ?

Alternatively, you can get the program from programs>accessories>accessibility
Onscreen keyboard

Wednesday, April 18, 2007

MAKE INTERNET TV

Participatory Culture Foundation, a nonprofit devoted to making it easy for the general public to make, share, and see media using the Internet, has just launched a new site called Make , a one-stop guide to making your own Internet TV. This guide has step-by-step instructions for creating video feeds that can be easily subscribed to and have the potential to be watched by millions. Very soon, this site will feature short videos from experienced internet video publishers.
This is already done by Corporation Sdn Bhd is Malaysia's third pay television operator.After having obtained all the necessary approvals from the censorship board on its broadcast contents. The company is offering over 40 channels from content providers worldwide.
One of MiTV's distinguishing traits from Astro, another pay television operator in Malaysia, is that it utilises an over Ultra High Frequency based transmission system. Subscribers require only to install a standard UHF television antenna instead of a satellite dish to receive broadcasts. As a result, some of Astro's major caveats, such as disruption of service under bad weather conditions, do not apply to MiTV users.
On 31 October 2006, the company announced a corporate and technology restructing exercise. The exercise included suspension of all marketing and new subscription activities. In addition, approximately 66% of the companies workforce was retrenched. 66 % of the company workforce that has been retrenched will only be given a 1 month salary payment upon their termination.

Monday, April 16, 2007

Internet SHUTDOWN Count down begins now.....

Researchers say the time has come to rethink the Internet's underlying architecture are exploring tearing the Internet apart and rebuilding it to better address security and mobility
THE BEGINNING OF END

After four decades of building the Internet, some university researchers with the U.S. government's blessing want to shutdown all and start over.

The idea is surely unthinkable, but many believe a "clean slate" approach is the only way to truly address security, mobility and other challenges that have cropped up since Leonard Kleinrock helped supervise the first exchange of meaningless test data between two machines on Sept. 2, 1969.

The works well in many situations but it was designed for completely different assumptions, a Rutgers University professor overseeing three clean-slate projects. "It's sort of a miracle that it continues to work well today."

No longer constrained by slow connections and and high costs for storage, researchers say the time has come to rethink the Internet's underlying architecture, a move that could mean replacing networking equipment and rewriting software on computers to better channel future traffic over the existing pipes.

Even Vinton Cerf, one of the Internet's founding fathers as co-developer of the key communications techniques, said the exercise was "generally healthy" because the current technology "does not satisfy all needs." more....

EXPERIMENTS

The National Science Foundation wants to build an experimental research network known as the Global Environment for Network Innovations, or GENI, and is funding several projects at universities and elsewhere through Future Internet Network Design, or FIND.Rutgers, Stanford, Princeton, Carnegie Mellon and the Massachusetts Institute of Technology are among the universities pursuing individual projects. Other government agencies, including the Defense Department, have also been exploring the concept.The European Union has also backed research on such initiatives, through a program known as Future Internet Research and Experimentation, or . Government officials and researchers met last month in Zurich to discuss early findings and goals.

A new network could run parallel with the current Internet and eventually replace it, or perhaps aspects of the research could go into a major overhaul of the existing architecture.These clean-slate efforts are still in their early stages, though, and aren't expected to bear fruit for another 10 or 15 years — assuming Congress comes through with funding.

And it could take billions of dollars to replace all the software and hardware deep in the legacy systems.Clean-slate advocates say the cozy world of researchers in the 1970s and 1980s doesn't necessarily mesh with the realities and needs of the commercial Internet.more.....

THE NEED FOR NEW BEGINNING

The Internet's early architects built the system on the principle of trust. Researchers largely knew one another, so they kept the shared network open and flexible — qualities that proved key to its rapid growth.But spammers and hackers arrived as the network expanded and could roam freely because the Internet doesn't have built-in mechanisms for knowing with certainty who sent what.The network's designers also assumed that computers are in fixed locations and always connected. That's no longer the case with the proliferation of laptops, personal digital assistants and other mobile devices, all hopping from one wireless access point to another, losing their signals here and there.

Engineers tacked on improvements to support mobility and improved security, but researchers say all that adds complexity, reduces performance and, in the case of security, amounts at most to bandages in a high-stakes game of cat and mouse.The Internet will continue to face new challenges as applications require guaranteed transmissions — not the "best effort" approach that works better for e-mail and other tasks with less time sensitivity.more.....

MISSION CRITICAL WORKS

Think of a doctor using teleconferencing to perform a surgery remotely, or a customer of an Internet-based phone service needing to make an emergency call. In such cases, even small delays in relaying data can be deadly.Even if the original designers had the benefit of hindsight, they might not have been able to incorporate these features from the get-go. Computers, for instance, were much slower then, possibly too weak for the computations needed for robust authentication.

Of course, a key question is how to make any transition — and researchers are largely punting for now.

"Let's try to define where we think we should end up, what we think the Internet should look like in 15 years' time, and only then would we decide the path," McKeown said. "We acknowledge it's going to be really hard but I think it will be a mistake to be deterred by that."

Kleinrock, the Internet pioneer at UCLA, questioned the need for a transition at all, but said such efforts are useful for their out-of-the-box thinking.

CLOCK TICKS

"A thing called GENI will almost surely not become the Internet, but pieces of it might fold into the Internet as it advances," he said.

Think evolution, not revolution.Princeton already runs a smaller experimental network called PlanetLab, while Carnegie Mellon has a clean-slate project called 100 x 100.Construction on GENI could start by 2010 and take about five years to complete. Once operational, it should have a decade-long lifespan.FIND, meanwhile, funded about two dozen projects last year and is evaluating a second round of grants for research that could ultimately be tested on GENI.These go beyond projects like Internet2 and National LambdaRail, both of which focus on next-generation needs for speed.

Any redesign may incorporate mechanisms, known as virtualization, for multiple networks to operate over the same pipes, making further transitions much easier. Also possible are new structures for data packets and a replacement of Cerf's TCP/IP communications protocols.more........

———
Associated Press Business Writer Aoife White in Brussels, Belgium, contributed to this report.
———

Sunday, April 15, 2007

HOW TO CREATE A WEBSITE FOR FREE?

There are many free domains for hosting a website of your own. Blogger is the most famous of all and it takes hardly 5 minutes to build a new website. Even for a beginner it’s really an easy job. This is how it is done

1. SIGNUP

  1. Go to http://www.blogger.com/
  2. Click on “CREATE YOUR BLOG NOW"
We will be directed to this window
  1. Fill up with a valid email id Example: yourname@gmail.com
  2. Create a password for your new account and retype the password
  3. Display name: This will be the name shown in the website each time you post some thing it will shown as written by “Display name”
  4. Word Verification is to avoid spamming. This picture shown will be different for different sign up. So fill space with the characters in the picture
  5. Check the Terms of Service after reading it.
So now you are signed in ……….. Great JOB mate

2. Now its time select the title for your website

a. Enter the blog title this will be shown as the heading of the Blog
Example: HOMEPAGE
b.Now enter the address you need for your Example: yourrname4u
Then click Check Availability.
If the address you enter is not taken then it will display Blogname is available
Else try for different address
c. This click “CONTINUE”
Yoo-hoo! Now your website is ready for posting with one small step…..


3. Choose a template of your choice for the website
and click continue

This template can be changed in a later stage or you can change it with your own ideas after setting up this website.
If every is done in the right manner then you have

So now you have the website.
Take a new browser type the address www.yourrname4u.blogspot.com
If “yourrname4u” was address of your choice

Now to start posting into the website click START POSTING

You will be directed to a window show below


    1. In the place of title enter the heading of the content your about to post
    2. Below that in the content of the post. As you should have noticed there are all kinds of options for editing tools like bold,italics.
    3. After that Preview of the post will be shown by clicking Preview
    4. By clicking PUBLISH options the post will be publishing on your site.

An Example


A post once posted can be edited by taking Edit Post


Thursday, April 12, 2007

Chinese MP4/MTV Player

From Wiki

Chinese MP4/ is used to describe a group of Digital audio players or Portable Media Players, most commonly manufactured in China। These players are capable of displaying images, videos, and text files. Although commonly called , they have little to do with the MP4/M4A/M4V audio and video files. The earlier players were usually unable to play format videos and were limited to proprietary file formats such as MTV, DMV, MPV and AMV. This is beginning to change however, as more of these players manufactured in recent years have begun supporting MPEG4 format video files.
Common features
Most players include a viewer for image files, such as JPG and BMP.They also play MP3 and other audio files. Conversion software is usually included on a disc. Videos are usually played in the or MTV format, converted from other common formats using the conversion software. Most players also normally include an ASCII text viewer, so that e-books can be read. Some units include a phone book application, a voice recorder, and an , making it possible to record FM broadcasts. Finally, some units include video games in the firmware.
Memory
Currently, players are advertised as being produced in capacities of up to 8GB (flash based) and 100GB (micro-hard drive based). If the player is advertised as being 4GB, it is probable that they may have hacked[citation needed] because the memory chips that are normally manufactured by Samsung are not currently supplied in 4GB sizes and will be 1 to maximum. But that does not mean that two two GB chips aren't used in one MP4 player will not give you the same 4GB This type of hacking of the flash chip fools operating systems, such as Windows XP, into displaying the memory as 4GB, however it is impossible to store and retrieve this capacity as the real memory is 2GB or less. Sellers also commonly advertise capacities in gigabits (as opposed to gigabytes.) Deceptive descriptions like this are common on sites such as eBay. However, more recently real 4GB MP4 players are coming out, but it is uncommon and caution should be taken when buying from any seller.
Some of the more recent Chinese MP4 players support third-party expansion flash memory cards, for example, SD/MiniSD/, to extend the capacity of the MP4 players.
The battery can last for several hours, although this amount greatly varies depending on the model of the player and what the player is being used for. For example, the device could be used to play video files which would drain the battery more quickly than playing audio files. New players now have batteries that can last up to 12 hours while older players have a maximum use of 6 hours. In addition to improved battery life, some of the mp4 players now use a cell phone battery which makes it easy to replace the battery should it fail.
Design
These players come in many forms, some are very small with 1.2 inch screens and very light weight. Others are larger and more robust with 1.5 to 2 inch screens with built-in speakers and two earphone sockets instead of one. Most players also feature a 65k OLED display which produce brighter colored image than normal , although the image quality generally suffers because of this. These players are generally supplied with Stereo Ear phones, a proprietary USB cable and a disc with the appropriate drivers. Depending on the model, the package for the players may also include a charger. Some may also be supplied with a special carrying case. It should also be noted that the outer plastic cover of some players is of low quality and the clear plastic that protects the screen cracks easily. There are many complaints about these issues from users all over the world.
Operations
In general, it is simple to operate the players; a small amount of buttons can perform multiple actions, like play, stop, enter and etc. Some players have additional buttons , while others provide the simpler 'star' configuration adjacent to the screen, with a single selection button or in the center of the star.
For Cost Contact me i not a salesman but i have bought one and did a little research for the features and cost...

Wednesday, April 11, 2007

Internet Pictures Corporation iPIX Image Well ActiveX controls contain buffer overflows

This info is from www.kb.cert.org (US- CERT)

The Internet Pictures Corporation "iPIX Image Well ActiveX" controls contain buffer overflows, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Internet Pictures Corporation has produced equipment and software to create 360 degree field-of-view images. The Internet Pictures Corporation iPIX Image Well ActiveX control, provided by iPIX-ImageWell-ipix.dll, contains several buffer overflow problems.

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.

Currently unaware of a practical solution to this problem. Internet Pictures Corporation has apparently filed for bankruptcy and does not appear to still be in business.

The vulnerable ActiveX controls can be disabled in Internet Explorer by setting the kill bit for the following CLSIDs:
    {ef8d9f2a-f641-4ef0-b2ec-3ba2be7c2960}
    {f7a05bac-9778-410a-9cde-bfbd4d5d2b7f}
Alternatively, the following text can be saved as a .REG file and imported to set the kill bit for these controls:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{ef8d9f2a-f641-4ef0-b2ec-3ba2be7c2960}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{f7a05bac-9778-410a-9cde-bfbd4d5d2b7f}]
"Compatibility Flags"=dword:00000400
Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities.

Beware ...............


Blogger code of conduct

This has come about after the Kathy Sierra episode. Full draft below:

We celebrate the blogosphere because it embraces frank and open conversation. But frankness does not have to mean lack of civility. We present this Blogger Code of Conduct in hopes that it helps create a culture that encourages both personal expression and constructive conversation.

1. We take responsibility for our own words and for the comments we allow on our blog.We are committed to the “Civility Enforced” standard: we will not post unacceptable content, and we’ll delete comments that contain it.

We define unacceptable content as anything included or linked to that:

- is being used to abuse, harass, stalk, or threaten others

- is libelous, knowingly false, ad-hominem, or misrepresents another person,

- infringes upon a copyright or trademark

- violates an obligation of confidentiality

- violates the privacy of others

We define and determine what is “unacceptable content” on a case-by-case basis, and our definitions are not limited to this list. If we delete a comment or link, we will say so and explain why. [We reserve the right to change these standards at any time with no notice.]

2. We won’t say anything online that we wouldn’t say in person.

3. We connect privately before we respond publicly.

When we encounter conflicts and misrepresentation in the blogosphere, we make every effort to talk privately and directly to the person(s) involved–or find an intermediary who can do so–before we publish any posts or comments about the issue.

4. When we believe someone is unfairly attacking another, we take action.

When someone who is publishing comments or blog postings that are offensive, we’ll tell them so (privately, if possible–see above) and ask them to publicly make amends.If those published comments could be construed as a threat, and the perpetrator doesn’t withdraw them and apologize, we will cooperate with law enforcement to protect the target of the threat.

5. We do not allow anonymous comments.

We require commenters to supply a valid email address before they can post, though we allow commenters to identify themselves with an alias, rather than their real name.

6. We ignore the trolls.

We prefer not to respond to nasty comments about us or our blog, as long as they don’t veer into abuse or libel. We believe that feeding the trolls only encourages them–”Never wrestle with a pig. You both get dirty, but the pig likes it.” Ignoring public attacks is often the best way to contain them.

Please do comment on the codes do u feel it this way.....................................

Sunday, April 8, 2007

I.T. Outsourcing: Expect the Unexpected

may be commonplace, but it continues to confound executives' expectations. Take the common myth that companies outsource to save money. Not only is this not true in half the cases, but our survey shows that most companies aren't saving money by outsourcing.

And that's not the only surprise: Insourcing and outsourcing, though polar opposites, are both on the rise. Companies spend more on offshore vendors than domestic ones, despite problems with quality and delivering return on investment. Dissatisfaction with outsourcing vendors is widespread, yet most of the 401 IT executives who took our survey blame their own companies most of all for the disappointing performance of their vendors. Though outsourcing is directly responsible for layoffs, it's not as disruptive as it was last year.

Should our findings cause concern? After all, no more than 29 percent say they are dissatisfied with any of the 11 outsourcing activities we tracked. Still, our research suggests that outsourcing is providing less value than it should due to mediocre management by outsourcing customers and poor performance by vendors. That explains why satisfaction with outsourcing is lukewarm and not enthusiastic. But there's a silver lining: If outsourcing isn't saving money, it also could mean CIOs are efficiently running their IT organizations.

Gartner predicts: Nearly Half of IT Jobs will be Lost to Automation by 2015

By 2015, 40% of today's IT job roles will be lost to automation, predicts Gartner. Although the number of people employed in the US manufacturing sector has declined steadily during the past 50 years, productivity per worker continues to rise and has doubled in the past 20 years.

'The same trend will be true of IT-related jobs as we move further into the information age. Multiple, simultaneous trends are converging in IT departments' say the analysts.

* At lower levels of the IT stack, real-time infrastructure is transforming the deployment, configuration and virtualization of network, server and storage resources.
* At the application level, the move to more-granular-based data and logic architectures and libraries of reusable components will reduce time for new application development by 90%.
* At the business process level, process owners armed with business process management orchestration tools will change process and information flows using graphically based tools with little or no involvement of the traditional IT department.
* The evolution of real-time infrastructure to encompass all of IT architecture will enable IT to become an enabler of change for the business.

The move to real-time and process-focused IT infrastructure will automate and obsolete many of today's IT roles. As a result, and despite the current hype, more IT jobs will be lost to automation than to outsourcing during the next 10 years.

Between 2005 and 2010, the productivity of the remaining IT workers will rise by at least a factor of 10. This will not be a US-only phenomenon. Countries that provide IT outsourcing will also adopt these automation technologies, displacing large numbers of their own workers.

A significant shift will occur to embrace process-focused mind-sets toward managing the business. There will be an explosion of interest in business process management suites and their integration with underlying software infrastructure.

A new business discipline will emerge. "Business systems engineering" will holistically link business strategy change to infrastructure change in a framework of strategic change management. And new IT jobs will emerge, but will not offset those lost to automation. New areas of IT skills will be needed around data and logic architectures, business process management and modeling, information flow, and relationship management.

Gartner concludes that, because of its more-fluid labour laws and culture, the United States will be better positioned competitively to use business change as a strategic weapon as compared to Western Europe, China and Japan at least as far into the future as 2015.


free counters