Friday, February 25, 2011

Jugaad!! : Rural India's Most Cost Effective Solution


Jugaad (Hindi: जुगाड़ Punjabi(gharuka)) are locally-made motor vehicles that are used mostly in small villages as a means of low cost transportation in rural India. Jugaad (also sometimes juggard) literally means an arrangement or a work around, which has to be used because of lack of resources. This is a Hindi term also widely used by people speaking other Indian languages, and people of Indian origin around the world. The same term is still used for a type of vehicle, found in rural India. This vehicle is made by carpenters, by fitting a diesel engine on a cart.

Thursday, February 24, 2011

The End of the IT Department?



When people talk about their IT departments, they always talk about the things they’re not allowed to do, the applications they can’t run, and the long time it takes to get anything done. Rigid and inflexible policies that fill the air with animosity. Not to mention the frustrations of speaking different languages. None of this is a good foundation for a sustainable relationship.
If businesses had as many gripes with an external vendor, that vendor would’ve been dropped long ago. But IT departments have endured as a necessary evil. I think those days are coming to an end.

Tuesday, February 22, 2011

Amazing Facts about India



  1. India is the world's largest, oldest, continuous civilization.
  2. India never invaded any country in her last 10000 years of history.
  3. India is the world's largest democracy.
  4. Varanasi, also known as Benares, was called "the ancient city" when Lord Buddha visited it in 500 B.C.E, and is the oldest, continuously inhabited city in the world today.
  5. India invented the Number System. Zero was invented by Aryabhatta.

Monday, February 21, 2011

Netaji Subash Chandra Bose – Mystery Revealed

A first person account of Netaji's life from 1965 to 1977


Netaji Subash Chandra Bose led the Indian National Army (INA) and struggled for the independence of India from colonial rule.
There is a large body of work documenting his life as a leader of the INA and his contribution towards the freedom of India from British colonial rule.  However, his disappearance towards the end of the World War II remains one of the enduring mysteries of the 20th century for people of India and the world.
This site is dedicated to revealing the mystery of the life and times of Netaji Subhash Chandra Bose.
Through this web site Dr. Suresh Padhye, Professor of Geography and retired Principal of Vidarbha Mahavidyalaya Amravati, Maharashtra, reveals the mystery of Netaji Subash Chandra Bose. Dr. Suresh Padhye spent time off-and-on over several years from 1965 to 1977 with Netaji at the Shaulmari Ashram in North Bengal.
To know more, visit Netaji- The Mystery Revealed

Thursday, February 17, 2011

Is IE9 a modern browser?




IE9 is definitely better than IE8 and a step in the right direction, but I don't believe it to be a truly modern browser, and let me tell you why.


Microsoft is bragging a lot about HTML5. They are also suggesting that their HTML5 support is exceptionally good compared to other vendors.

   How well does IE9 support HTML5

In this article, Microsoft explains that tests like caniuse and html5tests are not good because they just check for the existence of features, so it's better to use W3C tests.
No. IE9 doesn't support 99% of HTML5 and 100% of CSS3.

Tuesday, February 15, 2011

10 Best Programming Quotes


  1. If debugging is the process of removing software bugs, then programming must be the process of putting them in. -  Edsger Dijkstra
  2. The first 90% of the code accounts for the first 90% of the development time. The remaining 10% of the code accounts for the other 90% of the development time.  – Tom Cargill
  3. “There are two ways of constructing a software design. One way is to make it so simple that there are obviously no deficiencies. And the other way is to make it so complicated that there are no obvious deficiencies.”-  C.A.R. Hoare

Friday, February 11, 2011

Guide to the seven types of malicious hackers(Source: InfoWorld)


Whether you're attacked today or tomorrow, it's important to understand the motivation and objective of your intruders -- doing so can help you devise an appropriate defense. Malicious hackers can, in fact, be broken out under some broad classifications.
Malicious hacker No. 1: Cyber criminals
Professional criminals comprise the biggest group of malicious hackers, using malware and exploits to steal money. It doesn't matter how they do it, whether they're manipulating your bank account, using your credit card numbers, faking antivirus programs, or stealing your identity or passwords. Their motivation is fast, big financial gain.
Malicious hacker No. 2: Spammers and adware spreaders
Purveyors of spam and adware make their money through illegal advertising, either getting paid by a legitimate company for pushing business their way or by selling their own products. Cheap Viagra, anyone? Members of this group believe they are just "aggressive marketers." It helps them sleep at night.
Malicious hacker No. 3: Advanced persistent threat (APT) agents
Intruders engaging in APT-style attacks represent well-organized, well-funded groups -- often located in a "safe harbor" country -- and they're out to steal a company's intellectual property. They aren't out for quick financial gain like cyber criminals; they're in it for the long haul. Their dream assignment is to essentially duplicate their victim's best ideas and products in their own homeland, or to sell the information they've purloined to the highest bidder.

Tuesday, February 8, 2011

The 6 Crappiest Interview Questions



The Myth of "WORA": Write Once Run Anywhere


For years, businesses have searched for the holy grail of the development world – the notion of being able to write a program, application, app, or whatever they’re now calling it, just once, while being able to deploy it on any number of systems. Hence the term “Write Once Run Anywhere”, a.k.a. WORA.
This notion really started to gain traction, or at least publicity, in the mid-90′s when Java took the business world by storm. Through the Java Virtual Machine (JVM), companies could be assured that their valuable software assets could be reused on Windows, Solaris, Unix, Linux, or Mac operating systems. The problem was that the implementation of the JVM varied across operating systems. In addition, the apps created with the technologies of the day, like Applets, Swing, etc. produced clunky user interfaces.
Now today, we have a whole new set of technologies with the same old set of promises. I don’t know how many times I’ve heard business folks say that want to learn about this HTML5 thing and how it can bring them to the promised land of WORA. After rolling my eyes (once I’ve turned away from them, of course), I proceed to explain how this is something that is more promise than reality. Besides, says I, who would want that anyway? Let me explain.

Thursday, February 3, 2011

Recycle it Right!! -Source: Electronics Take Back Coalition


Guide To Recycling Your Electronics

1.     Don’t throw old electronics in the trash!

Don’t put your old electronic products or batteries in the trash (even if it’s legal in your state). The toxics inside these products don’t belong in the landfill.

2. Donate for reuse if possible.
If your product can be reused, donate it to a reputable reuse organization, that won’t export it unless it’s fully functional. Some good organizations include the National Cristina Foundation or World Computer Exchange. Many e-Stewards (see #3 below) also refurbish.

3. Find a responsible recycler (an e-Steward) in your state.
If your product is too old or too broken to donate, you should recycle it.
But many recyclers simply export your old products, dumping them on developing nations.
Your best option is to use a recycler who is part of the “e-Steward” network; they don’t export to developing nations, and they follow other high standards. Many also will reuse and refurbish equipment.
Click here to find e-Steward recycler near you.

Wednesday, February 2, 2011

The Internet is Full!!


For those of you unfamiliar with the issue and how the internet works (in simple terms) each and every connected device on the internet needs an IP address. It's like a phone number, basically a unique number given to your computer, mobile phone, or whatever, whenever it is connected to the internet. It then "dials" another number whenever you check your email, go to a web page or any other activity.
Of course, to dial a number you need a number your self. And as we all know the number of connected devices on the internet is by no means slowing down. So we need more numbers to allocate to these devices. But here's the catch: There are no more numbers available. There are some, but not many. So that implies that the internet is full. All thought there are many unused numbers held by organizations that ones got them but are no longer using them, these unused numbers are not enough for any sustainable future growth.
The current numbering system we're using is called IPv4. This system contains about 4,000,000,000 unique available addresses in total. At the time of writing, about 2% is unallocated. At the speed things are going, that will be empty within a matter of days. Luckily this development hasn't come as a shock to the people who help maintain the internet, so there's a new version available called IPv6.

Tuesday, February 1, 2011

Web images to get expiration date: BBC News


Man in fancy dress
German researchers have created software called X-Pire that gives images an expiration date by tagging them with an encrypted key.
Once this date has passed the key stops the images being viewed and copied.
Creators plan to levy a small charge to use the tagging system and put a digital lock on digital pictures.