
Showing posts with label News. Show all posts
Showing posts with label News. Show all posts
Tuesday
JantaKhoj !! India's First People Search Engine
JantaKhoj !!
Is a people search engine for India which manually collects data from different publicly ± available sources. This data is then compiled and put togetheron the web to make it easily search-able.

History of TOP Company Names
History of Company Names like Google, Yahoo, Microsoft,Yahoo, Linux, Sony, Motorola
etc.
====================================
Hewlett-Packard
Bill Hewlett and Dave Packard tossed a coin to decide whetherthe company they founded would be called Hewlett-Packard or Packard-Hewlett.
====================================
Yahoo!
The word was invented by Jonathan Swift and used in his book Gulliver's Travels. It represents a person who is repulsive in appearance and action and is barely human. Yahoo! founders Jerry Yang and David Filo selected the name because they considered themselves yahoos.
Wednesday
The 100 Best Websites List
1
We believe Google is simply the best tool on the Web for finding just about anything (except possibly "official" websites). It is screamingly fast, sleek, streamlined, and as comprehensive as a search tool can be.
2
Yahoo is your Online Free Treasure Room! An outstanding search engine (especially for "official" websites), it also provides a cornucopia of free services: free email, maps, Yellow Pages, games, shopping, news, finance, sports, live chat -- the list just goes on and on and on! By far (in our opinion), Yahoo is the best site on the Web!
Labels:
Cool Websites,
Entertainment,
FREE SITES,
FUN,
News
Google New Products
AdSense, AdWords , Apps, Blogger, Books, Checkout , Chrome , Custom Search Engine , Docs , Earth and Maps , Enterprise , Finance , Gmail , Mobile , News , Orkut , Picasa , Reader , Search , SketchUp , Talk , Translate , Videos , Voice , Webmaster , YouTube
Google Launches Google Music in India
Google in partnership with in.com, saavn and saregama has launched Google Music in India. Google Music, which currently only has Hindi music in its index, allows users to listen to Bollywood music over the internet for free. None of the music is hosted on Google’s servers, rather it is streamed directly through the partner websites. Google only indexes the content.
Sunday
Mobile NO. Portability ( Start in Karnataka Circle from 8th Nov )
Finally Mobile Number Portability (MNP) going to start in India.
Mobile Number Portability will first will start in from Karnataka circle from Nov 8th. The mobile number portability project is one of the most ambitious and long-awaited in the telecom sector in India. TRAI had earlier fixed the porting fee at Rs.19 only but not sure about fee after this implementation.
Labels:
General Talk,
Latest News,
News,
Technology News
Friday
Vodafone 3G and Vodafone 3G USB Launched
Vodafone Essar today said it plans to launch third-generation (3G) services in the country early next year, even as its rivals will start rolling out the service from next month.
Labels:
General Talk,
Latest News,
New Launches,
News,
Vodafone
Wednesday
Google now Days offers security checklist for Gmail users
Google now offers a security checklist for Gmail users. Google is advising Gmail users on how to secure their accounts by having them go through a checklist of tasks that involve following basic security principles and verifying Gmail specific options. Its a five-part process with multiple steps in each designed to reclaim the feeling that nobody can get into your inbox. It starts out obvious (security updates, plug-ins, passwords) then gets into trickier tactics. Google has shown an increased concern over the security of Gmail users after a spying attack has targeted its network earlier this year. The list is split into five parts, each containing several tasks. As the users go through them and check the completed items, they are kept informed about their progress.
Part 1: Your computer:
The first part concerns general computer security and instructs people to scan for malware, update their operating system and install updates for third party popular applications, like Adobe Reader, Flash Player and Java.
Part 2: Your browser:
The second part refers to the security of the browser used to access the Gmail account. Google advises users to keep their browsers up to date and to be very careful about add-ons that require their Google Account credentials. Part 3: Your Google Account: The 3rd part, users are asked to change their password twice a year, review the websites that have access to their account from the "My Account > Change authorized websites" menu and also update password recovery options like alternate email, mobile phone or secret question. Part 4: Your Gmail settings: In part four deals with actual Gmail settings. These include enabling the "always use HTTPS" option, as well as checking the "Filters" and the "Forwarding and POP/IMAP" settings to make sure that emails are not being forwarded to other accounts. The company also suggests verifying the "Send Mail As", "Get mail from other accounts", and "Grant access to your account" options, as well as checking the "Last Account Activity" list for suspicious IP addresses. Part 5: Final Reminders: This is last part of the checklist is called "Final Reminders" and contains general advices like not giving out login information to other websites, always logging out after reading email or clearing browser cookies, cache, stored passwords and autocomplete data periodically. The Gmail security checklist can be accessed by clicking on the Help link from the email account and then the checklist one in the left menu or visit directly Gmail Security Checklist.
Sunday
E-Ball: A Complete Computer in a Ball
Today’s technology is at its peak point beyond what we could ever imagine. New inventions and innovations are emerging on daily basis. No one would have seen such amazing thing before. Our imaginations have dressed into reality and today it has become possible to have a whole computer in our pocket all the time. This ball computer has taken the computer technology to new horizons.

You may have seen many other inventions of this kind but what is unique in it is that when it is closed no one is able to guess that this ball contains a whole computer inside it. When you will open you will find a complete set which includes display screen, virtual keyboard and a mouse.
This is known as E-Ball which is designed by Apostol Tnokovski. He was aiming to create the smallest PC in the world when this idea comes in his mind.

It is shaped like a sphere because in its designer’s opinion this is the best shape in nature and it captures everyone’s attention.
Labels:
Latest News,
New Technology,
News,
Technology News
About ANKIT FADIATM
ANKIT FADIATM, 24 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 14 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. His books have sold a record 10 million copies across the globe, have been translated into Japanese, Korean, Portuguese and Polish and are also being used as reference textbooks in some of the most prestigious academic institutions around the world.
Fadia is also a widely recognized computer security guru and Cyber terrorism expert. He has also led several investigations pertaining to national security and cyber terrorism. In November 2001, Fadia was consulted by a classified intelligence agency for breaking an encrypted message sent by one of Osama Bin Laden's men. Since then Fadia has been involved in numerous classified projects pertaining to cyber terrorism and crime. In August 2008, Fadia was consulted by the Navi Mumbai Police Department to trace the terror email sent just a few minutes before the Gujarat serial blasts. Fadia was also consulted by the Mumbai Police for decoding VOIP messages in relation to the Mumbai terror attacks.
Widely traveled, Fadia has provided customized cyber security training and consulting solutions to clients all across Asia, Australia and North America including Google, Citibank, Shell, Volvo, Thai Airways, UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro, Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd and many other organizations in the government, police and corporate sectors. He has also conducted more than a 1000 different training sessions across 25 countries on various topics related to cyber security to an audience comprising of CEOs, CIOs, top level management, entrepreneurs, technical specialists, defense personnel and students.
With the vision to create a more secure Internet, Fadia started a unique computer security training and certification course known as the ANKIT FADIATM Certified Ethical Hacker program. Today it has become Asia's largest cyber security training and certification program with almost 20,000 people trained in the last three years across 100+ cities in India and 40+ cities in China. To educate the average Internet user about the dangers of the Internet, Fadia also regularly writes Basic Security Tips which are displayed on OOH Media's 4500 screens in offices, shopping outlets and entertainment areas in over 22 cities in India. Fadia is also a consultant to many universities in India, Singapore, China and USA on the design and structure of their computer security courses. For example, Fadia has partnered with IMT Ghaziabad to start India's first government recognized postgraduate diploma course on Cyber Security.
Widely celebrated in international media publications, Fadia is also regularly invited by BBC Radio World News, London to share the latest updates on virus outbreaks, loopholes and cyber crime trends. For his outstanding contributions in the field of computer security globally, Fadia has been honored with numerous awards namely: MTV Youth Icon 2008, Indo-American Society Young Achiever Award 2005, IT Leader Award 2005, Person of The Year 2002, Limca Book of Records, Hall of Fame Award, Outstanding Young Achiever's Award, Silicon India Person of the Week, Embassy State Award, Best Speaker Award (4 occasions) and many more.
Born in India, Fadia is currently pursuing his Bachelors in Computer Science with specialization in Information Security at Stanford University, USA. Recently Fadia started his own computer security consulting and training company in Kuala Lumpur, Malaysia.
Widely traveled, Fadia has provided customized cyber security training and consulting solutions to clients all across Asia, Australia and North America including Google, Citibank, Shell, Volvo, Thai Airways, UOB Bank, PT Cisco Systems, Bank of Thailand, Bangkok Public Bank, Amari Hotels, BlueScope Steel, Jumeirah International, Wipro, Singapore Health Promotion Board, Infosys, Satyam, Schering Ltd and many other organizations in the government, police and corporate sectors. He has also conducted more than a 1000 different training sessions across 25 countries on various topics related to cyber security to an audience comprising of CEOs, CIOs, top level management, entrepreneurs, technical specialists, defense personnel and students.
With the vision to create a more secure Internet, Fadia started a unique computer security training and certification course known as the ANKIT FADIATM Certified Ethical Hacker program. Today it has become Asia's largest cyber security training and certification program with almost 20,000 people trained in the last three years across 100+ cities in India and 40+ cities in China. To educate the average Internet user about the dangers of the Internet, Fadia also regularly writes Basic Security Tips which are displayed on OOH Media's 4500 screens in offices, shopping outlets and entertainment areas in over 22 cities in India. Fadia is also a consultant to many universities in India, Singapore, China and USA on the design and structure of their computer security courses. For example, Fadia has partnered with IMT Ghaziabad to start India's first government recognized postgraduate diploma course on Cyber Security.
Widely celebrated in international media publications, Fadia is also regularly invited by BBC Radio World News, London to share the latest updates on virus outbreaks, loopholes and cyber crime trends. For his outstanding contributions in the field of computer security globally, Fadia has been honored with numerous awards namely: MTV Youth Icon 2008, Indo-American Society Young Achiever Award 2005, IT Leader Award 2005, Person of The Year 2002, Limca Book of Records, Hall of Fame Award, Outstanding Young Achiever's Award, Silicon India Person of the Week, Embassy State Award, Best Speaker Award (4 occasions) and many more.
Born in India, Fadia is currently pursuing his Bachelors in Computer Science with specialization in Information Security at Stanford University, USA. Recently Fadia started his own computer security consulting and training company in Kuala Lumpur, Malaysia.
Hacking and Hackers
Hacking and Hackers are terms that generally tend to build a negative impression in people's minds. Each time one hears either of these terms, the first thing that immediately comes to mind is the image of a computer criminal sitting in one corner of a dark room and committing a crime. In reality, that is not true at all! Most people straightway start associating the term Hackers with computer criminals or people who cause harm to systems, release viruses and so on. And I do not blame them for holding such a negative opinion. Unfortunately, one tends to blindly accept what is being fed to them by popular media. And nowadays the media has been wrongly and outrageously referring to computer criminals as Hackers. They fail to recognize the fact that computer criminals and hackers are two totally distinct terms and are not associated with each other whatsoever. People have wrong notions and for reasons not justified at all, they have a negative opinion and utter dislike for Hackers and persons associated with Hacking.
Recently, I started India's first computer security training and certification program to train the next generation of computer security experts. On more occasions than not, when people hear about the program I receive a nod of disgust and disapproval-probably because most people don't know what the course is all about and think that I am probably training people to be criminals! People fail to notice that the description of Hackers provided by popular media is nowhere close to the actual description of hackers. In reality, computer security has two types of people-hackers and crackers.
Hackers are actually good, pleasant and extremely intelligent people, who by using their knowledge in a constructive manner help organizations to secure documents and company secrets, help the government to protect national documents of strategic importance and even sometimes help justice to meet its ends by ferreting out electronic evidence. Rather, these are the people who help to keep computer criminals on the run. On the other hand, crackers are the real bad guys or the criminals who indulge in cyber crime, deface websites, release viruses, steal credit card numbers and create havoc on the Internet.
Traditionally and historically, humans have been utilizing harmful objects to protect themselves when the need arises. The invention of the nuclear technology or weapons as simple as knives immediately comes to mind. Training people hacking is something like in the medicine field-each time a new virus is discovered, weaker forms of the same virus are injected into the human body in order to provide immunity to the body against it. All of us already know that vaccines have helped us save millions of lives. But what strikes me most about vaccines is how they actually work. Vaccination is like fighting evil with evil for positive gains.
The biggest problem that NASA and its team of engineers face in their space missions is that of disposing human wastes and providing and storing pure drinking water for the crew aboard. A young biologist suggested, 'Human wastes be converted into pure drinking water by passing it through advanced chemical processes.' At first, his colleagues had been dismissive of this rather strange idea. However, later after some detailed and animated discussions, they concluded that using the negative non-useful elements to get something good and useful was their best bet. Similarly in the field of computer security, it is very important for take help from the crackers (computer criminals), educate the Internet users and secure the Internet.
When I first presented the idea of starting a training course on computer security to a few Indian government officials and expressed my support towards training hackers, the reaction that I received was one of profound disbelief and resentment. Their response argued that teaching people how to hack would only increase the incidence of computer crimes and bluntly stated that instead, more laws against hacking (well, actually cracking) should be introduced. However, in my opinion, all the laws in the world can not and will not discourage computer criminals. Crackers are getting real smart these days and it is becoming increasingly easier for them to break into a system (using freely downloadable automatic tools), create havoc and escape without leaving any traces behind. Laws are absolutely useless when system administrators themselves are becoming ignorant of computer security and are dismissing all hackers as people belonging to the dark side of society. It has become absolutely necessary to teach people how crackers work, how cracking is executed and how to protect computer systems from crackers. If this is not done soon, then the crackers will remain ahead in the security race. And we really don't want this to happen, do we?
If everybody who uses the Internet understood its risks, if everybody who uses the Internet understood how the computer criminals work, if everybody who uses the Internet understood the tools and techniques already known to the bad guys, then the Internet would be a much safer place to be in. Wouldn't Internet users be able to better protect their data and systems if they were more aware of how computer criminals work? If we are able to learn and understand how someone can break into our system, then wouldn't we fix the loopholes even before the cracker strikes? All I want to say is that instead of being resentful and afraid of fire, it would be much better if we learn to live with fire. Let us fight fire with fire itself! We manufacture knives every single day. A knife in the hands of a murderer can take lives, but the same knife in the hands of a surgeon can save lives! So just because there is a risk of a knife being misused by murderers, that does not mean that we should stop manufacturing knives.
Happy Hacking!
Ethically Yours,
Ankit Fadia
PS: Even I am a guilty of using the forces of popular media, the title of my course is testimonial to that fact-Ankit Fadia Certified ETHICAL Hacker course. If you can't beat them, simply join them!
(Ankit Fadia is author of internationally bestselling books on computer security. He offers computer security certification courses and even provides consulting solutions to Fortune 500 companies and government agencies.)
Wednesday
Google Launches Chrome to Phone Extension
Google has released Chrome to Phone for Android. Its a great tool for instantly transfer your browser data or sites which you’re reading on the desktop to your Android phone. This currently support only Android 2.2. This extension adds a button to Chrome that lets you seamlessly pushes links, maps, and currently selected text and phone numbers to your Android device.Chrome to Phone can also push driving directions and even phone numbers. If you have driving directions up on Google Maps and then push it to your phone, the driving directions will immediately appear. Highlight a phone number and click the mobile icon and that phone number will be sent directly to your phone ready to dial.
You can download it here for your desktop chrome browser. You also need to install the Chrome to Phone Android application on your phone. The application can be downloaded from Market (search for 'Chrome to Phone'). Requires a mobile phone running Android 2.2 ("Froyo") or later.
The Android app is currently only available in English in the following countries: US, Canada, Australia, Great Britain, Ireland, New Zealand, and South Africa. We will be extending to additional countries in the next few weeks.
The feature is relatively simple to use; just click the new mobile icon on your Chrome browser for any website that you want to bring up on your phone, and it will automatically push it to your phone.
You can download it here for your desktop chrome browser. You also need to install the Chrome to Phone Android application on your phone. The application can be downloaded from Market (search for 'Chrome to Phone'). Requires a mobile phone running Android 2.2 ("Froyo") or later.
The Android app is currently only available in English in the following countries: US, Canada, Australia, Great Britain, Ireland, New Zealand, and South Africa. We will be extending to additional countries in the next few weeks.
The feature is relatively simple to use; just click the new mobile icon on your Chrome browser for any website that you want to bring up on your phone, and it will automatically push it to your phone.
The Fastest Growing Mobile Marketing
Mobile Marketing is a very fast growing field and mobile commerce market is currently worth approximately $2.5 billion and that number is expected to double each year for the next several years. This clearly showing that it'll soon make leads on Internet Marketing. This report was estimated byeTail 2010 social media and mobile commerce summit.
According to Scott, president of Weblink Marketing, "When two of the most successful companies in the world are both vying for the same mobile advertising network, you better take notice".
He also referring to Google’s acquisition of Admob, a mobile advertising network. Apple had initially expressed an interest in Admob, but Google beat them to it. Apple followed with its own purchase of Quattro wireless,also a mobile advertising company. According to Scott, "We at Weblink Marketing are paying close attention to a multitude of companies that seem to be positioning themselves to cash in on the mobile marketing wave and will be following their lead"
Though mobile advertising industry is currently tiny compared to internet advertising, the intense interest of these two companies suggest that we will see a tremendous growth in the Mobile advertising market.
Mary Meeker, an internet analyst at Morgan Stanley, predicts that within the next five years "more users will connect to the internet over mobile devices than desktop PCs". Considering Mary Meeker was covering this subject when Morgan Stanley was the underwriter for Netscape’s initial IPO offering in 1995 and was also present when the brokerage firm helped launch the Google IPO, she should be an expert at spotting trends.
All of the current indicators point to an explosion in the Mobile Marketing world. It has also predicted that the smartphone will soon take over the laptop and pc. All these terms are in favor of Mobile Marketing.
According to Scott, president of Weblink Marketing, "When two of the most successful companies in the world are both vying for the same mobile advertising network, you better take notice".
He also referring to Google’s acquisition of Admob, a mobile advertising network. Apple had initially expressed an interest in Admob, but Google beat them to it. Apple followed with its own purchase of Quattro wireless,also a mobile advertising company. According to Scott, "We at Weblink Marketing are paying close attention to a multitude of companies that seem to be positioning themselves to cash in on the mobile marketing wave and will be following their lead"
Though mobile advertising industry is currently tiny compared to internet advertising, the intense interest of these two companies suggest that we will see a tremendous growth in the Mobile advertising market.
Mary Meeker, an internet analyst at Morgan Stanley, predicts that within the next five years "more users will connect to the internet over mobile devices than desktop PCs". Considering Mary Meeker was covering this subject when Morgan Stanley was the underwriter for Netscape’s initial IPO offering in 1995 and was also present when the brokerage firm helped launch the Google IPO, she should be an expert at spotting trends.
All of the current indicators point to an explosion in the Mobile Marketing world. It has also predicted that the smartphone will soon take over the laptop and pc. All these terms are in favor of Mobile Marketing.
Saturday
Firefox 4 Beta 3 with Multi-Touch and Faster JavaScript
The latest update of Firefox 4 Beta is now available for download and testing in more than 30 languages, adding 10 new languages. Firefox 4 beta 3 doesn’t come with much in terms of visual changes, but has some big new features.Firefox 4 Beta 3 support for multi-touch in Windows 7 and faster JavaScript rendering. Mozilla says that the 500,000 or so Firefox 4 Beta users send about 3,500 feedback reports each day using the add-on.
Mike Beltzner, Mozilla’s Director of Firefox, writes on mozilla blog , “The latest update of Firefox 4 Beta is now available for download and testing in more than 30 languages, adding 10 new languages. This update includes multi-touch support for Windows 7 and new JavaScript values to experience faster and smoother graphics. We also have vital feedback from our testers that we will incorporate into future updates”.
Multi-touch support is only available under Windows 7 so far, but it enables users to interact with websites in a more natural way, providing they’re using a touch-enabled device. Touch interfaces are becoming increasingly popular, so far mostly on mobile devices, but recently on larger devices such as tablets, as well.
With a number of Windows 7-based tablets coming, users should appreciate a browser that natively supports multi-touch. The problem with this is that most websites aren’t optimized for multi-touch so even if you have a touch display and Firefox 4, most of the content on the web won't be able to leverage the capabilities.
Hopefully, now that Firefox supports the feature and is providing the necessary tools for web developers to use the capabilities of the device, more websites will implement touch-friendly interfaces.
Changes to the C++ representation of JavaScript enable Firefox to execute heavy, numeric code more efficiently. This sort of code is used to produce smooth, streamlined graphics in modern Web applications. Basically, the change should speed up websites which leverage HTML5 features like Canvas for graphics, but also other computation-heavy JavaScript sites.
The new JavaScript value representation is the result of work done on the JaegerMonkey experimental engine. The project is used to try different approaches in speeding up JavaScript and is separate from the engine used in Firefox 4. The developers borrowed some ideas from WebKit and the LuaJIT and expanded on them, especially for the 64-bit version.
Free Direct Download Links for Firefox 4 Beta 3 :
Firefox 4 Beta 3 (for Windows, 9.1 MB)
Firefox 4 Beta 3 (for Linux, 11.8 MB)Firefox 4 Beta 3 (for Mac, 21.1 MB)
Mike Beltzner, Mozilla’s Director of Firefox, writes on mozilla blog , “The latest update of Firefox 4 Beta is now available for download and testing in more than 30 languages, adding 10 new languages. This update includes multi-touch support for Windows 7 and new JavaScript values to experience faster and smoother graphics. We also have vital feedback from our testers that we will incorporate into future updates”.
Multi-touch support is only available under Windows 7 so far, but it enables users to interact with websites in a more natural way, providing they’re using a touch-enabled device. Touch interfaces are becoming increasingly popular, so far mostly on mobile devices, but recently on larger devices such as tablets, as well.
With a number of Windows 7-based tablets coming, users should appreciate a browser that natively supports multi-touch. The problem with this is that most websites aren’t optimized for multi-touch so even if you have a touch display and Firefox 4, most of the content on the web won't be able to leverage the capabilities.
Hopefully, now that Firefox supports the feature and is providing the necessary tools for web developers to use the capabilities of the device, more websites will implement touch-friendly interfaces.
Changes to the C++ representation of JavaScript enable Firefox to execute heavy, numeric code more efficiently. This sort of code is used to produce smooth, streamlined graphics in modern Web applications. Basically, the change should speed up websites which leverage HTML5 features like Canvas for graphics, but also other computation-heavy JavaScript sites.
The new JavaScript value representation is the result of work done on the JaegerMonkey experimental engine. The project is used to try different approaches in speeding up JavaScript and is separate from the engine used in Firefox 4. The developers borrowed some ideas from WebKit and the LuaJIT and expanded on them, especially for the 64-bit version.
Free Direct Download Links for Firefox 4 Beta 3 :
Firefox 4 Beta 3 (for Windows, 9.1 MB)
Firefox 4 Beta 3 (for Linux, 11.8 MB)Firefox 4 Beta 3 (for Mac, 21.1 MB)
Friday
Freecharge.in Free Prepaid Mobile Recharge In India!
Freecharge.in is a new online mobile recharge website, which enable users to recharge any prepaid mobile phone in India. The recharge is virtually free almost. Freecharge enables the user to recharge his/her mobile phone and make it free. But question is: How can it be free?
Well, for every recharge done on Freecharge, we provide discount coupons of top Indian food joints and retailers, equilavent to the recharge amount. These coupons are delivered at your door step. Coupons can be used to save big on purchases in your day to day life. You save money on your eat outs, movies, gaming, music, grocery and more.
Freecharge.in Promise Following to Users:
* Smooth and instant recharge
* Hassel free user interface
* Coupon delivery with no delay
* Hassel free voucher redemption with no complex terms and conditions or hidden costs
* Best discounts available in the market
* 100% customer satisfaction
Their offering is unique as the amount paid by the user for recharge is returned in form of shopping coupons of some of the top retailers in India, thereby making the recharge virtually free. If a user recharges his prepaid connection for Rs.50 by paying for it online on freecharge.in, he will also receive discount coupons worth Rs.50 that he can avail at any of the listed retailers.The site, Freecharge.in, is launched with attractively valued coupons of McDonald’s and Barista.
According to Mr. Kunal Shah, MD, Accelyst Solutions Pvt. Ltd. “The potential of ecommerce in India cannot be doubted, though the lack of successful ecommerce companies in India mostly owes to the fact that companies do not invest enough resources in gaining insight about consumer behavior. At Freecharge we have taken this challenge head on and are constantly working towards improving user experience. ”
Well, for every recharge done on Freecharge, we provide discount coupons of top Indian food joints and retailers, equilavent to the recharge amount. These coupons are delivered at your door step. Coupons can be used to save big on purchases in your day to day life. You save money on your eat outs, movies, gaming, music, grocery and more.
Freecharge.in Promise Following to Users:
* Smooth and instant recharge
* Hassel free user interface
* Coupon delivery with no delay
* Hassel free voucher redemption with no complex terms and conditions or hidden costs
* Best discounts available in the market
* 100% customer satisfaction
Their offering is unique as the amount paid by the user for recharge is returned in form of shopping coupons of some of the top retailers in India, thereby making the recharge virtually free. If a user recharges his prepaid connection for Rs.50 by paying for it online on freecharge.in, he will also receive discount coupons worth Rs.50 that he can avail at any of the listed retailers.The site, Freecharge.in, is launched with attractively valued coupons of McDonald’s and Barista.
According to Mr. Kunal Shah, MD, Accelyst Solutions Pvt. Ltd. “The potential of ecommerce in India cannot be doubted, though the lack of successful ecommerce companies in India mostly owes to the fact that companies do not invest enough resources in gaining insight about consumer behavior. At Freecharge we have taken this challenge head on and are constantly working towards improving user experience. ”
BSNL convert all 2G sim to 3G sim without any charging.no need to buying extra 3G sim
After 12th july in all india.bsnl convert all 2g sim to 3g sim without any charging.no need to buying extra 3g sim .u can use 2g+3g in one sim.
for prepaid user
activation 00
local on net- 0.40 per min
local off net-0.70 per min
local video call-2.00 per min
std video call-2.00 per min
for postpaid user
activation 00
local off net-0.30/min
local off net-0.60/min
local video call-2.00/min
std video call-3.00/min
1) no need to change sim
2)video calling
3)broadband
4)mobile tv
5)hi-speed video downloding
6)full track music downloading
7)video confrensing
8)online games
guess what,
i have bought a bsnl sim on 3rd april and i was unknowing that i got,
512MB of DATA USAGE,
100 local video calls,
1000 std sms
Aim-before september , bsnl want to add their 10 crore 2g customer to 3g customer(2g to 3g) in all india
Reason-3g lauching of private telecom companies
call rate-
for prepaid user
activation 00
local on net- 0.40 per min
local off net-0.70 per min
local video call-2.00 per min
std video call-2.00 per min
for postpaid user
activation 00
local off net-0.30/min
local off net-0.60/min
local video call-2.00/min
std video call-3.00/min
facility-
1) no need to change sim
2)video calling
3)broadband
4)mobile tv
5)hi-speed video downloding
6)full track music downloading
7)video confrensing
8)online games
guess what,
i have bought a bsnl sim on 3rd april and i was unknowing that i got,
512MB of DATA USAGE,
100 local video calls,
1000 std sms
Indian-Origin Man CrAcks World's Toughest Sum!
London: An Indian-origin computer scientist based in the US claims to have solved one of the world's most complex mathematical riddles
Vinay Deolalikar, who works with the US multinational information technology corporation Hewlett-Packard in California, believes he has solved the problem of "P versus NP", Daily Telegraph reported Wednesday. The Massachusetts-based Clay Mathematical Institute has categorised "P vs NP" as one of the seven millennium problems. It is considered the "most difficult" one to be solved
Deolalikar 's paper that was posted online Friday claims that P, which refers to problems whose solutions are easy to find and verify, is not the same as NP, which refers to problems whose solutions are almost impossible to find but easy to verify, the report said.
Vinay Deolalikar, who works with the US multinational information technology corporation Hewlett-Packard in California, believes he has solved the problem of "P versus NP", Daily Telegraph reported Wednesday. The Massachusetts-based Clay Mathematical Institute has categorised "P vs NP" as one of the seven millennium problems. It is considered the "most difficult" one to be solved

Tuesday
10 Worst Computer Virus Of All Time
Brain, 1986 It all started here: Brain was the first "real" virus ever discovered, back in 1986. Brain didn't really hurt your PC, but it launched the malware industry with a bang and gave bad ideas to over 100,000 virus creators for the next 2 decades.
Michelangelo, 1991 The worst MS-DOS virus ever, Michelangelo attacked the boot sector of your hard drive and any floppy drive inserted into the computer, which caused the virus to spread rapidly. After spreading quietly for months, the virus "activated" on March 6, and promptly started destroying data on tens of thousands of computers.
Melissa, 1999 Technically a worm, Melissa (named after a stripper) collapsed entire email systems by causing computers to send mountains of messages to each other. The author of the virus was eventually caught and sentenced to 20 months in prison.
ILOVEYOU, 2000 This was notable for being one of the first viruses to trick users into opening a file, which in this case claimed to be a love letter sent to the recipient. In reality, the file was a VBS script that sent mountains of junk mail and deleted thousands of files. The results were terribly devastating- one estimate holds that 10 percent of all computers were affected, to a cost of $5.5 billion. It remains perhaps the worst worm of all time.
Code Red, 2001 An early "blended threat" attack, Code Red targeted Web servers instead of user machines, defacing websites and later launching denial-of-service attacks on a host of IP addresses, including those of the White House.
Nimda, 2001 Built on Code Red's attack system of finding multiple avenues into machines (email, websites, network connections, and others), Nimda infected both Web servers and user machines. It found paths into computers so effectively that, 22 minutes after it was released, it became the Internet's most widespread virus at the time.
Klez, 2001 An email virus, Klez pioneered spoofing the "From" field in email messages it sent, making it impossible to tell if Bill Gates did or did not really send you that information about getting free money.
Slammer, 2003 Another fast spreader, this worm infected about 75,000 systems in just 10 minutes, slowing the Internet to a crawl (much like Code Red) and shutting down thousands of websites.
MyDoom, 2004 Notable as the fastest-spreading email virus of all time, MyDoom infected computers so they would, in turn, send even more junk mail. In a strange twist, MyDoom was also used to attack the website of SCO Group, a very unpopular company that was suing other companies over its code being used in Linux distributions.
Storm, 2007 The worst recent virus, Storm spread via email spam with a fake attachment and ultimately infected up to 10 million computers, causing them to join its zombie botnet.
Friday
Teen creates free Internet application for iPhone

London: A 15-year-old boy managed to dupe Apple by creating an iPhone application that connects to the Internet for free but it is no longer available.
To access the web through the iPhone costs around 13 pounds a month.
Nick Lee designed a application which at first glance appears to allow users to change the colour of their screen. It was charged at less than a dollar to upload from the Apple iTunes online music store.
However, the application contains a hidden code that allows people to use their iPhone as a modem and access the Internet without paying, the Telegraph reported.
The application was removed as soon as news of its true nature appeared online. Those who downloaded it, however, can keep enjoying its benefits.
"I'm going to use this little gem of an application to my heart's content. I'm typing on it now, and I'm going to see just how much data I can use all afternoon. I was able to get download speeds of roughly 2.5 Mbps," an online user who downloaded the application before it was removed said.
To access the web through the iPhone costs around 13 pounds a month.
Nick Lee designed a application which at first glance appears to allow users to change the colour of their screen. It was charged at less than a dollar to upload from the Apple iTunes online music store.
However, the application contains a hidden code that allows people to use their iPhone as a modem and access the Internet without paying, the Telegraph reported.
The application was removed as soon as news of its true nature appeared online. Those who downloaded it, however, can keep enjoying its benefits.
"I'm going to use this little gem of an application to my heart's content. I'm typing on it now, and I'm going to see just how much data I can use all afternoon. I was able to get download speeds of roughly 2.5 Mbps," an online user who downloaded the application before it was removed said.
Yahoo hosted 24-hour 'hacking' event in India's tech hub
Bangalore: Global search engine Yahoo hosted a non-stop 24-hour "hacking" event on Saturday noon in this tech hub where about 300 whiz-kids used its web tools and services to develop new applications, a company official said Friday.
"About 300 developers across India participated in the 24-hour hacking event, which involved using our web tools, services and application programming interfaces (APIs) to innovate new solutions for our global netizens," Yahoo India Research and Development Head Shouvick Mukherjee said.
Being held for the third consecutive year, the "Open Hack Day" aimed at nurturing the open innovation ecosystem in India and drive domain expertise in the internet space.
"Open Hack Days enable talented developers to create better, more relevant and more social experiences on our network. The spirit is to leverage our open APIs and developer tools to create newer applications," Mukherjee said.
"About 300 developers across India participated in the 24-hour hacking event, which involved using our web tools, services and application programming interfaces (APIs) to innovate new solutions for our global netizens," Yahoo India Research and Development Head Shouvick Mukherjee said.
Being held for the third consecutive year, the "Open Hack Day" aimed at nurturing the open innovation ecosystem in India and drive domain expertise in the internet space.
"Open Hack Days enable talented developers to create better, more relevant and more social experiences on our network. The spirit is to leverage our open APIs and developer tools to create newer applications," Mukherjee said.