Wednesday, December 13, 2006

Inefficiency of Hydrogen based economy

A fuel cell is an electrochemical device that combines hydrogen and oxygen to produce electricity, with water and heat as its by-product.

In a recent study, fuel cell expert Ulf Bossel explains that a hydrogen economy is a wasteful economy. The large amount of energy required to isolate hydrogen from natural compounds (water, natural gas, biomass), package the light gas by compression or liquefaction, transfer the energy carrier to the user, plus the energy lost when it is converted to useful electricity with fuel cells, leaves around 25% for practical use — an unacceptable value to run an economy in a sustainable future. Only niche applications like submarines and spacecraft might use hydrogen.

Energy taken for producing and transporting hydrogen to its destination is 3 times the energy taken for producing and transporting electricity directly.
[the picture is descriptive of the technical details ]

Saturday, December 02, 2006

Vista releasing on Jan 30th 2007 !

Windows vista, the next edition of the windows product line, ie, the successor of XP comes out for end users on Jan 30th 2007.
The date is finalised by Microsoft and there are 4 editions available.
They are, Home Basic, Home Premium, Business and Ultimate.

The features list of differences in different editions is shown below.

The list clearly shows that Vista Ultimate will be the best edition we will be using.

Sunday, November 26, 2006

Configuring Airtel Mobile Office

I activated Mobile office yesterday and the download speeds in mobile is pretty fast with my N73 EDGE supported mobile.

Here are the settings for Mobile office for mobile,
SMS GPRS to 567 for one day unlimited usage of mobile office, or make a 375 rs recharge for one month unlimited usage.

After recieving settings from Airtel, save the settings. In the mobile, go to,

Menu ->Settings ->Connection ->Packet data -> Access point -> set as ""

Then, Menu ->Services -> Settings -> Access Point ->Set as Mobile Office

[NOP users should set the homepage as ""]

To use Mobile office in system,
> Connect the mobile to the system via Datacable or bluetoooth.
> Open Network connections and create a new connection
> Select Modem as Phone modem from the shown list
> Set the dialing number as *99***1#
> Leave the username and password fields blank.
> Finish the wizard and connect as if connecting via dialup.

N73 connects to Airtel at 486kbps, but the download speeds of Airtel is just like normal dialup.
But, the download speed in the mobile is reasonable.

Saturday, November 04, 2006

Internet root servers

The root servers are the pillars of the internet.
There are 13 root servers around the world and they are responsible for the working of the internet.
If all 13 go offline, Internet will be dead (perhaps not immediately).
These servers maintain all the data about all the websites on the internet.
As per a stat, the .COM list of websites in 2002 is a 2 GB file that was on one of the root servers.
All the DNS servers get their data from these root servers and cache them.

The root servers are named from A to M.
Here are some stats abt them,

Server Operator IP Addr
A VeriSign Naming and Directory Services
B Information Sciences Institute IPv4:
IPv6: 2001:478:65::53
C Cogent Communications
D University of Maryland
E NASA Ames Research Center
F Internet Systems Consortium, Inc. IPv4:
IPv6: 2001:500::1035
G U.S. DOD Network
Information Center
H U.S. Army Research Lab IPv4:
IPv6: 2001:500:1::803f:235
I Autonomica/NORDUnet
J VeriSign Naming and Directory Services
K Reseaux IP Europeens -
Network Coordination Centre
IPv6: 2001:7fd::1
L Internet Corporation for
Assigned Names and Numbers
M WIDE Project
IPv6: 2001:dc3::35
More info abt root servers can be found here,

Wednesday, October 25, 2006

Sophistication of Viruses and Trojans

Security experts have discovered viruses that install and use Anti-Virus in order to prevent competition from other viruses.

Its interesting to figure out what the newly discovered Trojan "SpamThru" actually does.
1. It infects computers on the internet.
2. Then it downloads Kaspersky AntiVirus and installs it in the infected computer and configures Kaspersky AntiVirus to ignore "SpamThru", thereby preventing other viruses from infecting its host, thereby eliminating competition.It even applies a crack to Kaspersky AntiVirus in order to prevent the software from licencing and expiry problems!

3. Moreover, SpamThru uses its own custom P2P protocol to transmit data among infected computers. Like BitTorrent network, SpamThru uses its own network to issue updates to the virus, so that the virus code is updated often and goes undetected by major Antivirus softwares.

4. Another interesting thing is that the virus uses AES (Advanced Encryption Standard,an encryption standard by the U.S. government) to encrypt its data that is sent over its network in order to avoid detection by other spammers!

Security expert, Stewart at SecureWorks states that,
"The complexity and scope of the project rivals some commercial software," he wrote. "Clearly the spammers have made quite an investment in infrastructure in order to maintain their level of income."

It seems the spammers and criminals benind these softwares are following a high level of software development engineering mechanisms.

We, the users of Internet must be well prepared to tackle such high level sophisticated viruses.

Simply follow these guidelines to have a clean system(and ensure a cleaner Internet),
- Install an Anti-virus and keep it upto-date( i use norton 2003)
- IE users must install Service Pack 2 for XP, or else use Firefox
- Keep an anti-spyware software such as Spybot or Spydoctor

Tuesday, October 17, 2006

PageFlakes : Interesting startup

All major internet players offer a personalized homepage option.
(Google , My Yahoo, MSN Live etc).
The homepage personalization market is already dominated by large players.
At such a time,a group of entrepreneurs, spread all across the globe (the true virtual organization?) came together to start
Its simple in concept and complex in its vast range of features.
In virtually no time they have created a page that lets you setup your own Web with 100s of applications, news feeds and even share it with friends.

Goto and SignUP and get started.

Firefox extension: Errorzilla

This extension changes the default "Page not found" Firefox error page into some useful page with features such as
. checking google cache for the page
. pinging the page via
. view snapshot via wayback machine (
. Trace the IP
. WHOIS lookup of the page.


Saturday, October 14, 2006

WHOIS Spamming?

The Whois lookup of from and several other registrars yeild the following result.

To single out one record, look it up with "xxx", where xxx is one of the
of the records displayed above. If the records are the same, look them up
with "=xxx" to receive a full display for each record.
It looks like spammers are also getting their hands on Whois lookup services too.
The Whois lookup result for can be seen here:
A cached version of the page is here

Can anyone explain how's database includes such data?
Digg the article here...

Sunday, October 08, 2006

Google CodeSearch

Unlike Google's main Web search engine, Google Code Search peeks into the actual lines of code whenever it finds source-code files on the Internet. This will make it easier for developers to search source code directly and dig up open-source tools they may not have known about.


China Attacks U.S. Satellites

China targeted and attacked an US spy satellite last week with high powered LASER from the ground.
The LASER didnt physically damage the satellite, but it could have blocked down the sensors temporarily.

The issue looms large, given that US military operations have rapidly grown more reliant on satellite data for everything from targeting bombs to relaying communications to spying on enemy nations.

Critical US space assets include a constellation of 30 Global Positioning Satellites that help target bombs and find enemy locations.

The US Defence Department remains tight-lipped about details, including which satellite was involved or when it occurred.

Friday, September 15, 2006

Sunday, September 10, 2006

Nuclear Monument in New Mexico desert

The US govt has planned to build a super structure costing upto 1 billion dollars over the "Nuclear waste storage" facility in New Mexico desert.
The monument was intended to be a warning sign for future generations not to dig or drill up at that site for 10,000 years since the nuclear material in that facility takes upto 10,000 years to decay.
The construction of the monument commences in 2030 AD when the facility is filled up to its maximum capacity. The facility is called "WIPP" (Waste Isolation Pilot Plant) and is located half a mile below the surface. After construction, the monument will be guarded for the next 100 years.

This is how the facility look from the surface as of now.
The current buildings will be destryed and something that serves as a warning sign will be built up there within 25years.
And, there will be pictorial warning signs installed all over the place to make sure that future civilizations with new languages can also understand the warning signs.

Here are some suggested designs of how the structure would look like after centuries.

Detailed info here
More photos here

And, one point is that, Pyramids were built to keep people out, but, they were broken into.
We will have to hope that such curiousity doesnt make future generations to investigate this monument site!

Wednesday, September 06, 2006

Science Mysteries

Some mysteries that are opposing existing scientific theories,
Digg it here!
Dark Energy:

"Are Galaxy Clusters Corrupting Big Bang Echoes?"

"Astropysics Challenged By Dark Energy Finding"

"A Cosmic Crisis?"
-- Science Magazine Online

"Dark Matter: Hidden Mass Confounds Science"

"New Doubts On Dark Energy"

Expanding Universe:

"New Model Of Expanding Universe"
-- Nature Magazine Online

NASA's discovery about Gravity:

"Newtonian Physics - All The Wrong Moves"
(Above article based on original New Scientist article )

" The Problem With Gravity "

String Theory:

"New Theory Proposes Strong Gravity"
-- Berkeley Lab Science Beat

"A Journey to the 10th Dimension"
-- Popular Science

Mysteries of Quantum Mechanics:

"Exorcising Einstein's Spooks"-- Nature Magazine Online

Particle Physics Failures:

"New Particle Baffles Physicists"
-- PhysicsWeb

Failed Search for Fundamental Answers:

"No Sign Of The Higgs Boson"
-- New Scientist

False Claim of Particle Discovery-- Nature Magazine Online

Sunday, September 03, 2006

Origin of Lorem ipsum...

"Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi."

This is a common passage of text that is used everywhere in place of real paragraphs. For example, if you design a website for someone else, you may insert a few lines of Lorem ipsum to show what it would look like, even though you don't have the real text that will eventually go there.But where does it come from?
The phrase has been used for several centuries by typographers to show the most distinctive features of their fonts. It is used because the letters involved and the letter spacing in those combinations reveal, at their best, the weight, design, and other important features of the typeface.
It appears to be Latin, but is actually pretty much nonsense.
Lorem ipsum is taken from text that reads, "Neque porro quisquam est qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit ..." which translates as, "There is no one who loves pain itself, who seeks after it and wants to have it, simply because it is pain...." That is a passage from de Finibus Bonorum et Malorum (The Extremes of Good and Evil) written in 45 BC by Marcus Tullius Cicero.
During the 1500s, a printer adapted Cicero's text to develop a page of type samples. Since then, the Latin-like text has been the printing industry's standard for fake, or dummy, text. Before electronic publishing, graphic designers had to mock up layouts by drawing in squiggled lines to indicate text. The advent of self-adhesive sheets preprinted with Lorem ipsum gave a more realistic way to indicate where text would go on a page.
It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using 'lorem ipsum' is that it has a more-or-less normal distribution of letters, as opposed to using 'This here is content', making it look like readable text. There also have been many examples where someone has forgotten to change the dummy text for the final copy.

Monday, August 28, 2006

Definition of a Planet

As per International Astronomical Union , a planet is defined as,
A round thing orbiting a star.
More precisely, according to the draft definition:
“A planet is a celestial body that (a) has sufficient mass for its self-gravity to overcome rigid body forces so that it assumes a hydrostatic equilibrium (nearly round) shape, and (b) is in orbit around a star, and is neither a star nor a satellite of a planet.”

Pluton: A planet orbiting beyond Neptune, taking more than 200 Earth years to circle the Sun. So far, it would include Pluto; Pluto's former moon, Charon; and "Xena" (2003 UB313).
Satellite: Anything orbiting a planet, as long as the mutual centre of gravity does not fall outside the planet. Includes several bodies much larger than many planets, such as Jupiter's moon Ganymede (diameter: 5262 kilometres).
Small solar system body: Anything orbiting the Sun that's not a planet or a satellite. Most asteroids and comets would be SSSBs. Currently called minor planets.
Unofficial categories of planet:
Dwarf planet
: A planet smaller than Mercury (diameter: 4879 kilometres), which is the smallest uncontested planet. Would include the former asteroid Ceres; Pluto; Charon; and Xena.
Giant planet: Jupiter, Saturn, Uranus, Neptune.
Classical planet: The four giant planets plus the familiar four rocky, terrestrial planets: Mercury, Venus, Earth, Mars.

Saturday, August 26, 2006

Small Windmill for homes

A small, affordable wind turbine available for the first time this September promises to help homeowners fight the rising cost of energy.
The Skystream 3.7, a wind generator from Southwest Windpower in Flagstaff, Ariz., stands 35 to 100 feet tall — depending on the location — and costs about half that of conventional turbines currently available.

Southwest Windpower is planning to mass produce the Skystream and sell it for between $10,000 to $12,000 installed, about half the cost of similar size turbines, which are typically assembled by hand on a much smaller scale.
According to the developers, the system could save the average homeowner $500 to $800 per year on electricity.

Depending on the available wind, the turbine could provide 40 to 90 percent of an average home's energy needs.
Further details:

Thursday, August 24, 2006

Onyx mobile concept

This is a concept mobile phone named "Onyx" designed by Synaptics.

Looks awesome!


Wednesday, August 16, 2006

A mirror site to and digged articles

This site mirrors and all recently dugg articles on
Since many sites featured on homepage goes down due to bandwidth exceeding or by server crash (popularly called as "The Digg Effect"), provides a free mirroring service to digg.

(problem was that was not loading for the time sake, thanks to the stupid connecton from my ISP , BSNL!, i used to access
(these days visiting is like eating food, thrice a day or more!)

Sunday, August 13, 2006

Italy Wins World Cup Of Programming

It's been a good year for Italians: first they won the World Cup, and now they've taken home the trophy in the Microsoft Imagine Cup.
A total of 181 students from 72 teams representing 42 countries participated in the games that ended on Friday. Italian team Even .ctor took first place in the software design category.

The Microsoft Imagine Cup is a competition for students to compete in creating real-life technology applications. It was designed to provide an outlet for students to fuse their technological and artistic interests outside the classroom. Other winners included Piotr Marek Mikulski from Poland in the algorithm category, Andreas Tomek from Australia in the IT category, Team Forest from Canada in the short film category, Team Virtual Dreams from Brazil in the interface design category, and Team Atomnium from France in the programming battle.
"The competition encourages students from around the world to apply their imagination and creativity to design software technology that has real world applicability," said Joe Wilson, director of academic initiatives for Microsoft in an email to sent to PC Magazine. "As a result, it enables students to bridge between their idea and its impact on both a local and global scale."
Winners were awarded $25,000 in cash and celebrated in an award ceremony held at the competition site in Delhi, India on Friday.
Over 65,000 students entered the competition in the first round. This is the fourth year for the event. The theme was "Imagine a world where technology enables us to live healthier lives."
In 2005, one of the winning teams went on to become the founders of Musigy Inc., an online community music portal. Bill Gages, chairman of Microsoft, released a statement on Friday expressing hope that this year's winners will see similar success.
"These projects demonstrate the power of software to address real-world problems, and I'm so impressed by the high levels of technical innovation that these students achieved in their work," Gates said. "This year's Imagine Cup participants all share a commitment to improving people's lives that is very inspiring. They represent the next generation of business and technology leaders, and their creativity and passion are reasons for us all to be optimistic about the future."
"Students studying computer sciences today are the technology leaders of tomorrow," Wilson added. "Our commitment is focused on fostering innovation, enabling student success in computer sciences and encouraging entrepreneurialism and creativity -- all essential elements of Imagine Cup."
The 2007 Imagine Cup will be held in Seoul, South Korea.

Saturday, August 12, 2006

Microsoft monopoly in Security business

Digg it!
Microsoft, the maker of Windows was supposed to be responsible for security in its product (Windows). Instead, what MS is doing is that they are putting up services such as Live Onecare, and selling these services for around 50$.
If Microsoft can fix Windows with OneCare, why not they do it directly within windows or via LiveUpdate?
It is bad that Microsoft charges its customers for a service that should have been part of the standard operating system itself.
And Windows Live OneCare is currently available in the U.S. only.

Then, the point here is that Microsoft is trying to suppress other players in the Security business.(Remember, thats what happened with IE and Windows in the Browser wars and,but IE was free,and OneCare isn't)
What Microsoft has done is that they locked up the kernel code of Windows Vista.
Security firms such as Symantec(Norton) argues that security features in the Windows Vista kernel obstruct innovations by antivirus and other security applications

"If security vendors don’t have access to the platform kernel, it cuts down on our ability to innovate and create compatible solutions," Oliver Friedrichs, director of emerging technologies in Symantec Security Response wrote on the company's website.

He alleged that Microsoft is forcing end users to only use solutions offered or allowed by the software vendor, thereby stifling competition and innovation in the security industry.

Windows Live OneCare might not run, or it might slow the performance of your computer, if you install it when other antivirus or firewall programs are also installed on your computer. During Setup, Windows Live OneCare checks for the some common antivirus and firewall programs that are known to conflict with Windows Live OneCare and provides means for you to uninstall them.

Antivirus and firewall programs known to conflict with Windows Live OneCare:
-Symantec Norton Internet Security 2005
-Symantec Norton Antivirus 2005
-Symantec Norton SystemWorks 2005
-McAfee Internet Security Suite 2005
-McAfee VirusScan 8.0/2004
-Trend Micro PC-cillin Internet Security 2005


Flickr search : Flickr Storm

Wednesday, July 26, 2006

Netscape buying top Digg users

Imagine Gmail paying hundreds of dollars to Yahoo users , so that they switch over from Yahoo to Google!
And, hey, thats an example, dont take it seriously.
A similar case is happening in the social bookmarking arena.
Digg is the emperor of social bookmarking and Netscape is the latest entrant into this arena.
Now, what Netscape is doing is that they are offering top users of Digg (diggers) to come to and netscape pays them 1000$ per head. What an offer!
But, wait, not everyone is moving to netscape.
There are several loyal users of who had refused to move to netscape.
Here's what the head of Digg (Jay Adelson ) has to say,

“I’ve thought about what to do with the real power Diggers, the ones who spend their whole day on Digg and really work hard, is there a way that I could show my appreciation. The way I would show my appreciation would be to never give them more power, more features than another user has. It might be something like a T-shirt, it might be a rating that they can show other users, but it has to be a level playing field.”

"Hmmmm, $1,000 of cold, hard cash from Netscape per month… or a Digg T-shirt? Doesn’t sound like a level playing field to me. But Digg power users were split over the monetary offer"

Thursday, July 20, 2006

Types of software

There are many interesting types of softwares.

Software that has lots of features and requires considerable disk space and RAM. As the cost of RAM and disk storage has decreased, there has been a growing trend among software developers to disregard the size of applications(also see fritterware)

Shareware for which either the author suggests that some payment be made to a nominated charity or a levy directed to charity is included on top of the distribution charge

Software that has some important functionality deliberately removed, so as to entice potential users to pay for a working version

Pejorative term for the hundreds of megabytes of low-quality freeware circulated by user's groups and BBSs in the micro-hobbyist world.

Software, often written by enthusiasts and distributed at no charge by users' groups, or via the World-Wide Web, electronic mail, bulletin boards, Usenet, or other electronic media.
At one time, "freeware" was a trademark of Andrew Fluegelman. It wasn't enforced after his death

An excess of capability that serves no productive end. The term describes anything that eats huge amounts of time for quite marginal gains in function but seduces people into using it anyway. See also window shopping. One example is the use of Incredimail to heavily decorate emails.

A piece of freeware decorated with a message telling one how long and hard the author worked on it and intimating that one is a no-good freeloader if one does not immediately send the poor suffering martyr gobs of money

"Malware" is short for 'malicious software' and is usually used as a catch-all term to refer to any software which causes damage to a single computer, server, or computer network.

Commercial software. Opposite to shareware or freeware.

Software that, like freeware, can be usually obtained (downloaded) and redistributed for free, but most often is under copyright and does legally require a payment in the EULA, at least beyond the evaluation period or for commercial applications.Shareware is sometimes also nagware and/or crippleware.

Software which is never used and so ends up on the shelf. Shelfware may be purchased on a whim by an individual, or in accordance with corporate policy, but not actually required for any particular use. Alternatively, it may be software that has been developed (unlike vaporware), but is never released as a product -- a common occurrence at DEC.

Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else

The variety of shareware that displays a large screen at the beginning or end reminding you to register, typically requiring some sort of keystroke to continue so that you can't use the software in batch mode.

Vaporware is software which is announced by a developer well in advance of release, but which then fails to emerge.

Some definitions adopted from Foldoc archives.
Digg it!

Tuesday, July 18, 2006

Indian Govt blocks blogspot, typepad and geocities

Govt of India has banned and blocked blogs that are hosted at's service (
Two more services and are also blocked by the Indian Govt.

India's Department of Telecommunications (DoT) passed an order to ISPs to block several websites.

An Indian political blog is reporting that the ban was initiated by the Indian intelligence service to stop terrorism. According totheir source, the terrorists are using blogs to communicate. It is useless (because the terrorists can simply use proxies),and it's similar to shutting off the country's telephone service because terrorists talk to each other through phones.

So, whats the solution now?
For serious users of, i suggest moving your website to some other server instead of hosting at
Here's the procedure (its what i did minutes back)

1.Log in into " "
2.Go to your blog's settings
3.Select "Publishing"
4.Click on a small link called "Switch To: FTP "
5.Enter FTP details of your website there and click on "Save Settings"
6.Republish your Entire Blog
7.Your blog will be hosted on the server of your choice now.

Thats for users with access to a FTP server, for others, create a FTP account in any of the freely available webhosting solutions such as
50webs provides free FTP access and subdomain based hosting, so you can have instead of

If any users want detailed information about hosting with 50webs or with configuring blogger, submit comment on my site or email me at , so that i can put up an elaborate tutorial on my blog.

Lets hope that Indian Govt doesn't block and !
Tutorials over, now for the technical part.

The Indian Govt is not correct in its part to block these websites.
If India is worried about terrorists, let it track suspicious blogs or block selective blogs.
Its insane to block out such premiere websites such as blogger and geocities.
Technically, terrorists can have thousands of ways to communicate online, if so, will the Indian Govt block the entire Internet?
So much for all the speeches about India shining in IT sector.
Setbacks such as these can have the potential to erase the IT future of India and spoil the reputation of Indians online.

All said, is the Govt Listening?

Make sure you register your protest to this move, make ur comment below

Friday, July 07, 2006

Censoring Digg?

Digg is a social bookmarking site and what makes it special than news websites is that digg does not censor user's content.But, thats got its own drawbacks and there can be exceptions.

Few minutes back(Friday morning 2 AM,July 2006), a link to a semi-nude video was posted on Digg and the post made it to the front page thanks to celebrities that were involved in the video.Within a few minutes the story recieved lots of diggs, but disappeared from front page and the "Videos>Comedy Videos" category, thanks to censorship on part of Digg staff.

Now, here's the irony.90% of the comments about the video were in favor of the video.I am happy that a few people opposed that post.

I place one humble request to fellow diggers, please do not vote for such objectionable content and bury the story. Such content spoils the reputation of the entire digg community.

Dont allow digg to become an adult content bookmarking site.

(note: i am not posting the link to that adult digg article so that the reputation of my blog won't be spoiled)

Comparison of ASP,PHP,JSP and PERL

Go here for the article,

How to choose a Web Host?

There are millions of companies on the net who advertise themselves to be the perfect web company, but only few of them are REALLY proficient web hosting companies. In the world of advertising tactics and gimmicks, few good companies get overshadowed by the rest. There is no sure shot way to determine the perfect web hosting company, but it is possible to find a good company if we follow the consequent steps.

Quality V/S Price: Most of the companies offer web space at very low price i.e.99 cents, 1$ per month, these companies reckon to provide very high quality. What quality can you expect with 99 cents web hosting company? My point is, you can't get both quality and price, and you may have to compromise on one aspect at least. Therefore don't get tempted to buy from such low costing hosting company; you may lose on both quality and price. Have an economical budget, if you can afford high priced hosting company, good for you.

Review, Research, Compare:
The first rule, don’t blindly believe on advertising tricks, most of them are over hyped, a website is the mirror of any web hosting company.
* Try to scan their websites, their web content, and their site layout. Flashy signs and no specific layout only spells trickery, also review their language in detail, if they have made tall far fletched claims that seems too good to be true stay away from them.
*Compare between the hosting company websites, their features, analyze their costs read their content and then decide which is the best hosting company. Comparison will help you to examine the features of hosting companies and enable you to select the one with the combination of best features and price.
*Try to get the opinions of the hosting company you choose from various acquaintance, business associates, friends etc. Give more importance to word of mouth, if they come from reliable and experienced source. Read various web hosting related forums of your niche market as well. You should also read various web hosting related forums. Also read the testimonials of clients on the website.

Drop A Ticket:
The web hosting company looks good and reasonably priced but what about their service, their response time? Find all these queries.
* If they are truly dedicated customer support, they will clarify your difficulty within shortest response time. If they answer in 2-3 days, they do not care for your valuable time.
* Furthermore by dropping a ticket about a problem which is persistent in your company, which should little intricate and complex and check their response, examine their knowledge when you're interacting on chat/phone.If they respond fast with satisfactory solution, you have found a reliable web hosting company.

Bandwidth problems: Some hosting companies support unlimited bandwidth, but for large amount don’t just go for unlimited, fix a bandwidth as per your need as to avoid conflict if any.

Do they help you grow: Your website may be small now, but it may grow tomorrow Clarify these details how they are going to help you when you expand in future.

More here,

Wednesday, July 05, 2006

Remove Blogger's Navbar

Blogger's Navbar is a useful tool to search within your blog.But, for bloggers who have customised their blog's template, it maybe useful to remove that Navbar from their blog.

The Navbar looks somewhat like this,

To remove that bar, simply include this code in the section of the blog's Template.

<!--start removal code-->
<style type="text/css">
#b-navbar {height:0px;visibility:hidden;display:none}
<!--end removal code-->

Then, i request all bloggers to update the "Links" section of their blog to point to some useful sites other than pointing to "Edit ME".
Go here to find how to edit it:

Digg it

Commenting on Blogs

Leaving a comment on someone's weblog is like walking into their living room and joining in on a conversation. As in real life, online there are some people who are a pleasure to converse with, and some who are not.
Good blog commenters add to the discussion and are known as knowledgeable, informative, friendly and engaged. Build your own online social capital and become a great blog commenter by keeping these simple guidelines in mind before you post.

Stay on topic.
Bloggers enable comments on specific blog posts to hear more about the content of the post. Don't change the subject. There's nothing more annoying than seeing a comment on a post about Hurricane Katrina that reads, "By the way, do you know anything about turtles?"

Contribute new information to the discussion.
Twelve people saying the same exact thing in one comment thread is useless and irritating. Before you comment, read the entire thread and make sure your comment offers something new to the conversation. If you don't have the time or patience to read an entire thread, then don't comment at all. The longer a comment thread the more likely someone has already said what you're thinking, and the less likely it is to be read by future visitors anyway.

Don't comment for the sake of commenting.
Commenters who only say "First!" or "Nice site" on an open thread have no business hitting that "Post" button at all. Further, only spammers comment for the sake of adding their name and URL to a web page. Useless comments will gain you the reputation for being a useless commenter.

Know when to comment and when to e-mail.
A weblog comment is a public one-to-many communication within the context of a blog post. An e-mail is a private interaction. A weblog comment that reads, "Oh yeah, that link is cool. By the way, how's your sister?" doesn't contribute to the public conversation and belongs in an e-mail message to the author instead.

Make the tone of your message clear.
No one can hear the tone of your voice or see your facial expression online. Sarcasm, in-jokes and exaggerations can easily be taken the wrong way in a public forum. Remember that a simple colon and a parentheses can change the meaning of a sentence entirely. Use emoticons or additional information to communicate the spirit of your message.

Own your comment.
Anonymous commenting, while sometimes necessary, can be seen as cowardly. Build your identity and own your words by placing your name and weblog address on your comments wherever possible.

Don't post when you're angry, upset, drunk or emotional.
There's no taking back a published blog comment - once you post, it's there for everyone to see and for Google to cache. Remember, you're not going to show your best face in the heat of an emotional moment. If you find yourself angrily typing a message into someone's blog comment box - STOP. Get up. Take a breath. Walk around. Give it a day. Revisit the thread when your head is clear. This goes doubly for public blog comments as it does for private e-mail messages.

Adapted from Lifehacker's guide to weblog comments
Thanks to
Full article:

Interesting: photos inside photo

Click on the photo in the page in the link.
The photos zoom in continously upon clicking and there's no stopping.
Kind of interesting, must see to understand what i mean.
And, wait while the ShockwaveFlash content loads...

Revenge for stolen mobile

There is this person who left his mobile accidentally in a taxi.Another passenger took it and refuses to give it back.Take a look at what the mobile's owner is doing!

Five reasons no one will replace Google

Google has five advantages that will keep all but the most determined innovators from beating it to artificial intelligence.

Google knows semantics.
Its entire business drives it toward pulling meaning from context. Better semantics make better ad placement and more precise search results. That's the reasoning behind contextual ads, topical search results, and the closely guarded and ever-changing search algorithm.

Google has the smartest people in the world.
Or damn close to it. Google's increasingly discriminating hiring process weeds out all but the top engineers -- executives are fond of saying that Google only hires people smarter than half its employees. As one tech exec said, "Yahoo's morning bus may have wifi, but it doesn't have any PhD's on it."

Google has Marissa Mayer.
All "Marissa is a robot" jokes aside, Senior VP Marissa Mayer, one of the most powerful Google executives after founders Larry Page and Sergey Brin, is a titan of artificial intelligence. For her Bachelor's and Master's at Stanford, she specialized in A.I., and she holds several patents in the field. Her knowledge will not be lost in her role as Google's product gatekeeper -- it's Marissa who decides what products are ready for release.

Google is filthy rich.
And don't think clickfraud will bring them down -- today, Google launches GBuy, a payment system that trumps pay-per-click advertising with pay-per-sale, meanwhile bringing in the dollars of would-be buyers who don't trust vendors, but do trust Google. All this income gives Google a lot more room to play than its most ambitious competitors.
Google says it's working on AI. The co-founders already said that they're building a sharper artificial intelligence. Their new ambient sound translator can already identify a TV show from five seconds of computer-captured sound. Google plans to use the system for even more contextualized ads and content. Why this isn't the biggest tech news of the year is a mystery.

Google is not distracted.
The company's major competitors are Microsoft and Yahoo. The former is plagued by unwieldy plans for an operating system, software suite, and struggling media network. The latter is approaching media company status with an expanding network of original and outsourced content. While both Microsoft and Yahoo are making valuable progress in other fields, neither is innovating in search anywhere near the rate of Google. That's why over the past year, Google is the only engine with a growing market share in the U.S., and why Google could soon become China's top engine as well. And Google will stay on top -- by beating everyone else to the world's first global A.I. system.


Monday, July 03, 2006

Microsoft ending support for Windows 98 and ME

The Microsoft Corp. says it will end support for some of its older Windows versions, leaving 70 million users without security updates.
The Washington Post says the affected versions are Windows 98, Windows 98 Special Edition (SE) and Windows Millennium Edition (ME).
The policy takes effect July 11. Microsoft first planned the action for January 2004, but delayed to give users time to upgrade.
Users of the older versions will no longer get software fixes, leaving them vulnerable to hackers, the Post said.
Al Gillen, an analyst with IDC, a Framingham, Mass., market-research firm, told the Post an estimated 48 million computers were still running licensed versions of Windows 98 at the end of 2005, with 25 million still using Windows ME.
Gillen said he expects Windows 98 and ME to account for just 6 percent of all Windows installations by the end of this year.

Sunday, July 02, 2006

Yahoo Messenger 8

Yahoo has released its Yahoo messenger 8 beta.
Today, i got a prompt from YM 7 saying that some updates are available,

Upon selecting, YM 8 and downloading the installer from Yahoo, the installation proceeds as follows.
YM8 follows a 6-step installation process as shown in the six screenshots below.

Its similar to YM 7 except that it has some interface enhancements and Menu categorization.
Yahoo messenger's new interface,

Sign -in: Signed-in:

Then, there are these so-called Plugins.Plugins for Yahoo Answers, 360 and Music, all integrated into YM.

Featured Plug-ins for YM8,

Overall, unless you are a fan of Y! Answers or Y! 360, YM 8 is not worth the upgrade, since there are no new features on the IM side.
Want to try, YM 8, then get it here

Digg it here

Saturday, July 01, 2006

Bypass compulsary registration in news websites is a website that provides free logins to news websites that require compulsary(of course, free but lengthy) registration.
Ex:, etc

STEP 1: Make a note of the website address your are trying to access. For example: even
STEP 2: Visit
STEP 3: Enter the address from step 1 into the box and press the "Get Logins" button
STEP 4: You should now be presented with at least one username and password. Make a note of them.
STEP 5: Go back to the site you were originally trying to access in step 1 and proceed to login with the username and password you noted in the previous step.
With any luck you should be able to access your article now!


Digg it Here

Tuesday, June 27, 2006

The Ultimate "TO DO" list

This "To Do" list is a list with a pretty long perspective.
I would like to emphasize the things humans have to do in their lifetime.
(in order of execution)

1.Stop technologies that try to make humans as God (Cloning, Genetic modification...)
2.Resolve ethical problems with AI before things get out of hand
3.Stop Global warming
4.Set human outposts throughout the solar system
5.Find human-inhabitable planets outside our solar system
6.Set up colonies in such inhabitable planets
7.Find a way to protect planets from Black holes.

All this has to be done before the earth is covered by the sun at the end of its life.
It should be noted that half the life of our Sun is already over.

Actually, the list should be pretty long, but, i leave the rest to be updated by fellow humans.
I hope i am doing my part to make achieve this "To do" list.
Make sure you do your part...

All the best fellow humans!

Google obeys Adobe's DRM

Gmail has been since used for breaking inbuilt rights management in PDF documents for a while.
To break the protection, (Copy protection) in a PDF file, its simple to send that file by Email to a Gmail account. From there, with the "View as HTML" option, the file can be easily viewed as a hypertext and can easily be copied and its content can be extracted.
But, recently, Google had decided to follow the rules of Adobe and blocked that interesting feature from Gmail.
Now, if a protected file is "viewed as HTML", Gmail gives the message,
"The attachment cannot be viewed as HTML since the author placed restrictions on its content.Download the attachment to view in its original format.

Sounds interesting...

Adblock degrades Internet

Many of us use Adblock software to filter out the text ads and other types of advertisments that are presented in websites along with the content we are looking for.
But, do we understand that we are risking the probability that we may never see that site again!
Think again friends.

Many websites use advertisements and advertisements are the only source of their income.Such sites present free and useful content to everyone at the cost of the advertisements. But, by using software such as "Adblock", we cut off the primary income source of such websites.
We wont have much trouble in allocating a few more bytes of bandwidth in order to fetch adverts.
By using "Adblock", we are discriminating ad-sponsored websites from providing free service.
I can write more on this, but i hope you understood what i have to say.

Make a difference, turn off "Adblock".
I will be happy if atleast one of you turn off "adblock", please let me know...

Friday, June 23, 2006

End of Adsense?

Google is testing a new type of ad - CPA ,ie, Cost Per Action, means that advertisers pay only when a preset action takes place such as sales of a product or service.

Currently, Google's popular advertising service Adsense is a Cost Per Click (CPC) and Cost Per Impression(CPM) based service. CPC means that advertsiers pay for every click and not for purchase.So, a visitor may just click and may not make a purchase.

The point is that Adsense is used by several miscreants to perform click fraud (using click-bots or malware induced clicks).So, Google is being sued to pay for the loss it made to advertisers in the Adsense stream.So, Google has developed and now testing a new advertisng network based on CPA methodology.

This means that advertisers will be benefitted and publishers will not be.It is stated that Adsense and the new CPA system will co-exist, but the real truth is that most advertisers will move to the CPA network.
So, finally, Adsense will become a Zombie network with less advertisers.

So the future of Adsense is a mystery.
Millions of publishers using Adsense will have to look for a better alternative if Adsense gives way to CPA.

Edit Pictures online

Here's a phot editor when you dont have access to Photoshop or any other photo editing software.
Just go to this site and select a photo and upload to their site and start editing it.
There are features such as Crop, Rotate, Resize, Undo and Redo.
After editing, save the photo in any format you wish such as JPG, GIF, PNG, PDF etc..
For advanced usage, i advice importing their bookmarklet from here.

Monday, June 19, 2006

Internet's first website

Internet's earliest registered website is

It was regsitered in 1985 , soon after the DNS system was invented and implemented.
The website was the longest hosted website in history of internet and currently its a single page website with plain HTML coding.

It was a website hosted long before anyone knew about internet!

Watch your clipboard

Dont copy confidential information into clipboard and go to untrusted websites.
It is possible for websites to access the contents of your clipboard and even save the clipboard contents to their database!.

Click here to view a demo of the clipboard data grabbing.

To turn off this "feature" in Internet Explorer:
1. Go to Tools -> Internet Options -> Security
2. Click on the Custom Level Security Setting and uncheck the option "Allow Paste Operations via Script.”

(This problem does not occur in Firefox)

Sunday, June 18, 2006

Stock market values

Stock market value of companies as per their size

Source: Yahoo Finance

Saturday, June 17, 2006

Robot hand controlled by thought alone

A robotic hand controlled by the power of thought alone has been demonstrated by researchers in Japan.

The robotic hand mimics the movements of a person's real hand, based on real-time functional magnetic resonance imaging (fMRI) of their brain activity. It marks another landmark in the advance towards prosthetics and computers that can be operating by thought alone.

The system was developed by Yukiyasu Kamitani and colleagues from the ATR Computational Neuroscience Laboratories in Kyoto, and researchers from the Honda Research Institute in Saitama.
Subjects lay inside an MRI scanner and were asked to make "rock, paper, scissor" shapes with their right hand. As they did this, the MRI scanner recorded brain activity during the formation of each shape and fed this data to a connected computer. After a short training period, the computer was able to recognise the brain activity associated with each shape and command the robotic appendage do the same.

Full article Here in New Scientist Tech.

Friday, June 16, 2006

Bill Gates to Leave Microsoft in 2 Years

Microsoft chairman and Chief Software Architect Bill Gates announced in a press conference Thursday afternoon that he would be shifting priorities, leaving his full-time position at Microsoft in two years to focus his efforts on the Bill & Melinda Gates Foundation.

Microsoft CTO Ray Ozzie will take over Gates' role as Chief Software Architect starting immediately. "Over the next two years, Ray and I will work side by side to ensure a smooth transition," Gates said. "Over time, he'll take on the central role for architectual leadership at Microsoft.'

Gates reitered that he is not retiring from the software business, calling the change a re-ordering of priorities. "With greath wealth comes great responsibility," he said. "A responsibility to give back to society."

Gates will retain his position as company chairman, and plans to spend some of his time at Microsoft.

"Obviously this decision was very hard for me to make....Even as I prepare to shift my focus in July 2008, I know Microsoft is well positioned for success in the years ahead." Gates said that he will "miss working for Steve every day as I have over the past 26 years."
"Bill may reduce his time here but his imprint on the company will never diminish," said Microsoft CEO Steve Ballmer. "We will continue his tradition of thinking big and executing even bigger."

Complete article can be found here

Saturday, June 10, 2006

The "@" Symbol

Some things are so common place that you scarcely notice them. But that doesn't make them any less fascinating. Take the humble "@" symbol, for instance.
The @ sign was used in trade to mean "at the price of" before resting on the first Underwood typewriter keyboard in 1885, then later with QWERTY on modern keyboards in the 1940s

One day in late 1971, computer engineer Ray Tomlinson grappled with how to properly address what would be history's very first e-mail. After 30 seconds of intense thought, he decided to separate the name of his intended recipient and their location by using the "@" symbol. He needed something that wouldn't appear in anyone's name, and settled on the ubiquitous symbol, with the added bonus of the character representing the word "at," as in,

Monday, June 05, 2006

Convert FLV to MPG

This is a nice freeware that converts FLV (Flash video) to MPEG video, so that the video can be burned as Video Cds or DVDs.
Dont know what FLV format is about? Click here

Free Riva FLV Encoder 2.0
Download link:

File size: 4.72 MB
For instructions about conversion, click here:

Sunday, June 04, 2006

Download streaming video

Currently, there are many video sharing websites with lots of video content.
For example, nearly 500 cartoons are available to view online from this link,

It would be better to download and view these videos rather watching online,since downloaded stuff can be shared with friends, but most video sites such as Google Videos, YouTube etc dont allow you to download the videos.

Here's a method to download such videos.
Downloaded file will be in FLV format (Flash Video, extension .flv)

Here's the procedure,

Step 1 : Copy the URL of the page which contains the video
Step 2: Goto
Step 3: Give the URL in the search box of and hit "Download"
Step 4: gives back an URL, Right click on it and select "Save Target As"
Step 5: Save the file as "filename.flv", dont forget the double quites and the .flv extension
Step 6: Open the downloaded file with FLV Player, if you dont have FLV Player, download it from here,

For a more easy illustration, refer the screenshots given below, from left to right,

Saturday, June 03, 2006

Pyramid of Internet Piracy

Internet Piracy Pyramid , as described by MPAA
Click to Enlarge.

Thursday, May 25, 2006

Microsoft's Expressions

Expressions is a new range of applications being developed by Microsoft.

There are three applications in this suite,

Web Designer
- Microsoft Expression Web Designer:
Web designer appliaction (replacement for MS Frontpage)

Interactive Designer
- Microsoft Expression Interactive Designer:
A tool for designing the interface of Application projects (works along with .NET)

Graphics Designer
- Microsoft Expression Graphic Designer:
Graphics designer application

End of Front Page

The age of FrontPage is over.
In 2003, Microsoft removed Front page from its office package in Office 2003 and distributed it separately.
Now, in 2006, in Ms office 2007 (Ofiice 11), MS Front page will not be released.
Microsoft acquired Frontpage in 1990's and now discarded it completely.
Frontpage's technology will be used to develop Microsoft's new web designing solution "Expression web designer".

Wednesday, May 24, 2006

Create Buttons in seconds

Buttonator is not about mid 90's online button creation; it has taken a simple idea and made it useable for real web users and designers in the year 2006.
Buttonator is becoming a tool that designers want to use!

Friday, May 19, 2006

Blue Security Gives Up, Spammer Wins

Blue Security is a Anti-Spam company which aimed to to stop SPAM by spamming spammers, ie, it sent back opt-out emails to all spammers who sent spam to Blue Security's clients.
But, Spammers targeted Blue security with a Denial-of-service (DOS) attack and brought down the entire site and its network.
So, Blue security decided to close its business and shut down its service for good.
Here's more about the incident from >>

The anti-spam venture embroiled in a denial-of-service attack that brought down millions of blogs two weeks ago has thrown in the towel. Wednesday morning, Israeli-based Blue Security posted a message on its site -- now offline -- that it is shutting down operations.
Blue Security, which debuted its spam-fighting service last summerand built up a user base of more than 500,000, decided to wave the white flag after its servers were knocked offline by an aggressive denial-of-service (DoS) attack it claimed was launched by a deep-pocket Russian spammer tagged as "PharmaMaster."
May 3, in an attempt to get out the word about the DoS, Blue Security repointed its domain to an unused blog on Six Apart's TypePad blogging service. Within minutes, PharmaMaster attacked the blog with another DoS, which brought down Six Apart and left millions without access to their blogs. Blue Security's domain name service provider, Tucows, was also hit with a DoS and knocked offline for several hours; Tucows going down took thousands of Web sites it hosts with it.
Wednesday, Blue Security said it had to give up because it couldn't sustain the fight against spammers. "Several leading spammers viewed [us] as a strategic threat to their spam business," Eran Reshef, Blue Security chief executive wrote in the message posted to the company's site.

Thursday, May 18, 2006

Windows Vista Hardware Requirements

Microsoft has published the requirements for Windows Vista OS.

Take these requirements into consideration before you buy a new PC or while perfroming a system upgrade!

A PC with minimum requirements cannot support the "AERO" interface, which forms all the glassy and eye catchy part of VISTA.

A PC with recommended requirements alone can run VISTA in its full glory.

Minimum Requirements (Vista-Capable PCs):
--800 MHz Intel-compatible processor
--512MB of RAM
--DirectX 9.0-Capable Graphics Processor
--20GB HD

Recommended Requirements (Premium-Ready PCs):
--1 GHz Intel-compatible processor
--DirectX 9.0-Capable Graphics Processor, with 128MB graphics memory. (64MB of graphics memory to support a single monitor less than 1,310,720 pixels [no more than 1440x900]; 128MB of graphics memory to support a single monitor at resolutions from 1,310,720 to 2,304,000 pixels [no more than 1920x1200]; 256MB of graphics memory to support a single monitor at resolutions higher than 2,304,000 pixels [more than 1920x1200]).
--40GB HD with at least 15GB "free space"

SW for Thumbnail view of taskbar items

Get live thumbnail view of taskbar items(running programs) like Vista.
The software is available for free from:

I am using it and it looks awesome.

Download the small Software (87kb) from here:

Here's a screenshot of VisualTaskTips in action.
Media player 11's thumbnail is shown when mouse is hovered over its task button.

Wednesday, May 17, 2006

International Space Station

The International Space Station (ISS) is the largest human-made object ever to orbit the Earth. After departing the ISS, the crew of Discovery captured this spectacular vista of the orbiting space city high above the Caspian Sea.

Monday, May 01, 2006

Search Flickr

A superb tool to search's Photo archives.
Neat Flash animations and search results.

Just enter keyword and press ENTER in this link,

Read daily Newspaper

Read 250 newspapers from 55 countries online in a way similar to reading hard copy of newspaper.
Newspaper will be in original format and layout as the print copy.
Nice website

Sunday, April 30, 2006

Google SketchUP

SketchUp is a simple but powerful tool for quickly and easily creating, viewing and modifying your 3D ideas.

Ransomware - the new malware

Like spyware and malware, now we have "Ransomware".

These are a new breed of software that blackmail users to paying money.
Pay the money or else, your files are gone forever.
They spread just like spyware and get installed in the system, then starts to blackmail the users to pay money to get rid off them.

Example is a new Trojan called Ransom.a which demands a $10.99 ransom payment to stop erasing files on the infected PC's hard drive, a security firm said Thursday.

According to U.K.-based Sophos, the Ransom.a Trojan freezes the computer, then puts up a message saying it will delete files every half hour until the user sends $10.99 via Western Union to a designated account.

When the user presses Ctrl-Alt-Del, it pops up another message.

"Yeah, We don't die, We multiply! Ctrl+Alt+Del isn't quite working today, is it? I'm not the sharpest tool in the shed but Crtl+Alt+Del is everyone's S.O.S."

n mid-March, a different Trojan, called "Cryzip" and "Zippo.a," demanded $300 in return for a password that would free users' files from maliciously-made ZIP archives. Multiple security companies, however, quickly figured out the password.

Saturday, April 15, 2006

Servers : Windows or Linux?

Linux or Microsoft… Which one is best for you?

The operating system that you use on your computer does not need to govern your choice of hosting platform.
Both technologies are suitable for beginners, professional web developers, and everyone in between, but it is essential to choose the technology that is more suited to your style of web building. Each technology has its own distinct advantages for users.

Windows Servers

Microsoft should be your choice of platform if you plan on utilizing Active Server Pages or other Microsoft applications to design your web pages. This platform delivers reduced development time and better functionality for databases.
One of the main advantages for choosing the Microsoft platform is the ability to use ASP, ASP .NET, and Access databases to use in building your web site. ASP and ASP .NET provide a rapid, scalable, and efficient development environment to build your web site. These tools, along with MS Access will allow you to make your web site dynamic and interactive.
This platform is also a suitable alternative if you are developing static HTML based web sites, or sites that incorporate Macromedia Flash or other client-side scripting technologies.
We recommend you choose Windows 2003 as your hosting platform if you are using specific applications that require Microsoft Windows to run such as Access, ASP, ASP .NET, or Microsoft SQL Server.
Note: Microsoft FrontPage and PHP can be used on both the Linux and Windows platforms.

Linux Servers

Linux is widely considered to be the best operating system for web hosting servers. Characteristically reliable, stable and efficient, Linux has been proven in the most demanding web and mail server environments.
If you plan to incorporate work that uses PHP, Perl or MySQL, Linux is the solution you should choose. Linux is also ideal for the kind of websites that display information as a brochure, in newsletter format or as data sheets. Linux works well for 'brochure-ware' sites that offer interaction via inquiry forms, online purchasing and other e-commerce functions.
Essential programs such as Microsoft FrontPage can also be successfully used with Linux technology. Linux is an excellent operating system that is well suited to meet your web hosting needs. Additionally, there are a huge amount of free applications available on the Internet for Linux and it uses less hardware resources than Windows 2003.

For me, Windows Servers are still the choice, myself being an ASP programmer!

Wednesday, April 12, 2006

Browser market share as on Mar 2006

(Click to Enlarge)

Saturday, April 08, 2006

Internet has 80 million websites

According to Netcraft's most recent web server survey, the amount of hostnames on the Internet has doubled within the past three years. At the end of March, Netcraft said it identified a total of 80,655,992 websites, which represents an increase of 3.1 million since the end of February. In March of 2003, Netcraft reported the existence of about 40 million web sites.

Apache, the most popular web server software on the Internet suffered a substantial slide in market share in March, the research firm said. Compared to the previous month, Apache lost six percentage points from 68.7% to 62.7% due to a large-scale migration from Apache to Microsoft software at domain registrar GoDaddy. Microsoft gained almost five percentage points and stands now at 25.2%. According to Netcraft, GoDaddy will shift a total of 4.4 million hostnames from Apache to Windows Server 2003.

Friday, April 07, 2006

.NET vs J2EE

.NET Architecture for Web services

J2EE Architecture for Web Services

.NET and against J2EE
  • .NET has Microsoft's A-team marketing it
  • .NET released their web services story before J2EE did, and thus has some mind-share
  • .NET has a better story for shared context today than J2EE
  • .NET has an awesome tool story with Visual Studio.NET
  • .NET has a simpler programming model, enabling rank-and-file developers to be
  • Productive without shooting themselves in the foot
  • .NET gives you language neutrality when developing new eBusiness applications, whereas
  • J2EE makes you treat other languages as separate applications
  • .NET benefits from being strongly interweaved with the underlying operating system

J2EE and against .NET
  • J2EE is being marketed by an entire industry
  • J2EE is a proven platform, with a few new web services APIs. .NET is a rewrite and introduces risk as with any first-generation technology
  • Only J2EE lets you deploy web services today
  • Existing J2EE code will translate into a J2EE web services system without major rewrites.
  • Not true for Windows DNA code ported to .NET.
    .NET web services are not interoperable with current industry standards. Their BizTalk framework has proprietary SOAP extensions and does not support ebXML.
  • J2EE is a more advanced programming model, appropriate for well-trained developers who want to build more advanced object models and take advantage of performance features
  • J2EE lets you take advantage of existing hardware you may have
  • J2EE gives you platform neutrality, including Windows. You also get good (but not free) portability. This isolates you from heterogeneous deployment environments.
    J2EE has a better legacy integration story through the Java Connector Architecture (JCA)
  • J2EE lets you use any operating system you prefer, such as Windows, UNIX, or mainframe. Developers can use the environment they are most productive in.
  • J2EE lets you use Java, which is better than C# due to market-share and maturity. According to Gartner, there are 2.5 million Java developers. IDC predicts this will grow to 4 million by 2003. 78% universities teach Java, and 50% of universities require Java.
    We would not want to use any language other than C# or Java for development of new mission-critical solutions, such as a hacked object-oriented version of C, VB, or COBOL.
  • We are finding most ISVs and consulting companies going with J2EE because they cannot control their customers' target platforms. We believe this application availability will result in J2EE beginning to dominate more and more as time goes on.

Common Features:

  • Regardless of which platform you pick, new developers will need to be trained (Java training for J2EE, OO training for .NET)
  • You can build web services today using both platforms
  • Both platforms offer a low system cost, such as jBoss/Linux/Cobalt for J2EE, or Windows/Win32 hardware for .NET.
  • Both platforms offer a single-vendor solution.
  • The scalability of both solutions are theoretically unlimited.

Sunday, April 02, 2006

Flash experiments

Go to this website to view some of the interesting experiments that are made with Flash Ver 8.

  My Blogs: Tech blog| Fun blog 
  My sites: Adsense| Youngcubs| Wallpaper

Blab-away for as little as 1¢/min. Make PC-to-Phone Calls using Yahoo! Messenger with Voice.

Saturday, March 25, 2006

Interview Preparations

Check out these links for simple and clear ideas.


  My Email : 
  My Blogs: Tech blog   |  Fun blog

Blab-away for as little as 1¢/min. Make PC-to-Phone Calls using Yahoo! Messenger with Voice.