Saturday, 30 July 2011

Android leads mobile OS market in US: Report

ARTICLE BY GOWTHAM

According to a report by research firm Nielsen, Android is the leading mobile operating software in the US with 39% market share. The second position is occupied by iOS that powers iPhone. It has a market share of 28% whileBlackBerry OS is at third position with 20% share.

Nielsen says data collected for June shows that among the smartphone makers using Android,HTC has the leading position with 14% market share, followed by Motorola at 11% and Samsungat 8%. Windows Phone 7 has a market share of 9%.

In terms of handset makers, Apple, which is the only company making iPhone, leads with 28% market share. RIM, the maker of BlackBerry phones, and HTC are in second position with each one holding 20% market share.

Nokia, which is still the market leader in worldwide smartphone market, holds just 2% market share in the US. Hewlett Packard, which is trying to gain foothold in the market with WebOS, too holds 2% share.

Due to competition among smartphone manufacturers, prices of Android handsets have come down sharply, leading to a phenomenal growth in their sales. A few weeks ago, Google had claimed that it was activating 5.5 lakh Android phones every day.

Google aims to speed up the internet

ARTICLE BY GOWTHAM

NEW DELHI: Google has unveiled Page Speed, a service that will allow it to load web pages faster for end users. According to Ram Ramani, the lead engineer on the Google's Bangalore team that worked on the project, websites using Page Speed will see a speed improvement of 25% to 60%.

"To use the service, you (webmasters) need to sign up and point the site's DNS entry to Google," Ramani wrote in a post on Google's official blog. "Page Speed fetches content from your servers, rewrites your pages by applying web performance best practices, and serves them to end users via Google's servers across the globe. Your users will continue to access your site just as they did before, only with faster load times."

Though Google is offering the service free of charge to a select number of webmasters initially, it will charge a fee once it launches the service. According to Ramani, the Web giant is working to speed up site load times for the last two years and the latest project is another step towards enabling faster browsing. Google claims that the optimization will happen in the real time.

With the importance of the web growing, many companies are aiming to deliver better Web browsing experience. In recent years, all browser makers have put in a lot of efforts to speed up page rendering. Opera Mini, a browser for portable devices, uses its own servers to compress data before serving it on smartphones and tablets. Opera claims this optimization helps it offer a superior and faster Web browsing to experience to mobile users.

Companies like Amazon and Akamai, meanwhile, offer services like content delivery network (CDN) that can speed up data distribution. Many websites rely on these services. According to reports, Page Speed will make of both website optimization as well as a CDN.

Apple is richer than US govt

ARTICLE BY GOWTHAM


NEW YORK: As of today, Apple boss Steve Jobs is richer than Uncle Sam.

While the world's most powerful government has just $73.76 billion in its reserves, the world's top technology company has a neat cash pile of $75.87 billion.

The US Treasury Department warned that it has now only this much operating budget as Republicans and Democrats fight over raising the nation's debt ceiling. With only that much reserve at its disposal, the Obama White House has warned the Republicans that the US government won't be able to meet its obligations as of Aug 2.

Facing a government default, Obama can definitely turn to Steve Jobs to give him a very brief breathing space. The failure by the Republicans and Democrats to come to a compromise to raise the current $14.3 trillion debt ceiling by Aug 2 could lead to a hike in interest rates. The already battered dollar may also plunge further.

With its market capitalisation of $363.25 billion, Apple is the second largest company on the planet after American oil giant Exxon Mobil. The Cupertino-based Apple started rising suddenly in 2007 when it entered the smartphone market with the launch of its first version of the iPhone.

Within three years, Apple went on to overhaul BlackBerry company Research In Motion (RIM) which invented the smartphone and dominated the market. But its fortunes skyrocketed last year with the launch of the iPad tablet which has sold in millions. In fact, the iPhone and the iPad have made Apple the czar of mobile computing technology as rivals play up catch-up.

The stock of the company, which doesn't pay dividends, has now touched $400. After Apple, another non-financial company sitting on a huge cash reserve is Microsoft whose own pile is about $40 billion.

Tuesday, 26 July 2011

Dell's service business: Threat to Indian offshoring cos

ARTICLE BY GOWTHAMIn many ways, Dell - the world's
second biggest computer maker
-- is undergoing a shift very
similar to IBM's transformation
from hardware and products to
the lucrative services and
outsourcing business during the
nineties.
At $8 billion, Dell's services
business is a 'start up' that not
only threatens to snatch share
away from established
multinationals likeIBM and HP,
but also poses tough questions
for India's growingoffshoring
firms, scrambling to flesh out the
next model for outsourcing.
In an exclusive interview with
ET's Pankaj Mishra & Shruti
Sabharwal, Brian T Gladden, Dell's
chief financial officer, discusses
the pros and cons of being a
listed company, how
protectionism can harm
America's competitiveness and
says that the US government
plans to tax overseas profits
could discourage investments in
the country.
Would it be easier to change
your bets, transform to newer
businesses if Dell was not a
listed company? Is too much
quarterly scrutiny by
demanding investors slowing
things down for technology
companies?
It is very important that as a
leader you have to balance short-
term orientation and focus with
long-term investments and
strategy. You can't be solely
focused on making earnings per
share every quarter as the
number one priority and I think
there are times when you need
to make sure you are making
longer-term bets and
investments.
And our company has entered a
phase of development where I
think that it is very important
that we make pretty broad
investments and they don't
necessarily help in the short term
and we have to explain that to
our investors and be very clear
that we are changing the
company. There are investments
that may not benefit the firm this
quarter or the next.
And as a leader that has been a
change. As regards quarterly
scrutiny, I think there are positive
elements of that rhythm in
governance and ultimately
providing some level of
performance that can be
benchmarked against peers. We
can measure our performance
quarter by quarter to see how
we are doing versus anHewlett-
Packard or IBM or other
companies.
But that can also be a double
edged sword?
Oh absolutely. You can get overly
focused on that so that's why we
have to keep taking a step back
and say are we making any
investments that are going to
change the company for the
future.
That's a big part of what I do,
making sure that we are trying
to deliver that balance. How to
deliver on results today and
execute on commitments but
also make long term-changes.
And that's an important balance.
With increasing cash piles,
there is also a pressure to
spend it, or reward investors in
some ways. Does more cash
encourage risk taking, or it
makes companies more
conservative?
Michael Dell keeps a healthy
tension around creative new
ideas getting into the system.
And I think part of my role is to
balance that and make sure that
they make sense and that they
return reasonable economic
profit and that there is some risk
management around these
things.
Michael has recently been
spending time talking about how
we need to take more risk with
our teams internally. One of our
priorities is to elevate new ideas
and to try some different things.
We have got good financial
success, we have some great
cash flows, and we have got $15
billion of cash in the company
end of first quarter. So, we can
take some risk, we can take
some swings and try some
different things. But it has to be
within the context of delivering a
return on our overall investment.
How do you balance this risk
taking which is crucial in the
technology industry, with your
goals of not giving up to a rival?
Well, I think you have to start by
realising that not all risk is bad
risk. The goal is not to avoid risk,
but to manage it.
So, it comes back to balancing --
there is that amount of capital
that we are willing to put aside
and say lets take some risk with
it and then there is that core set
of investments that is less risky
and less different, more adjacent
to what we do and we have
some confidence in that.
For instance, we have built a
storage business with
acquisitions that is very
successful. It is a $2 billion
business right now. We feel it
can go to $4-5 billion in the next
three years.
That is the space where we have
proven we can win and that is a
place where we are willing to
make some investments and
make a more aggressive play
because we have had success.
There may be some other areas
where we have less capability
and one area I would like to
highlight and that we keep
working on is building on our
software capability. So less
success there means more risk
and we have to be more careful.
But we should not be afraid of
that, we have to go deal with
that. In a more metered and
balanced way we will go after
that.
Corporate governance is
another area of scrutiny by
investors and experts when it
comes to technology firms. Dell
had to restate its accounts few
years ago because of some
irregularities. What lessons
have you learnt?
I would say simply that if you are
going to grow very fast, you
need to make sure you are
making investments along the
way to provide stable
infrastructure. In many cases if
the company is growing so fast
that you can't build processes to
support it, that's when you get
into trouble.
I think sometimes growth needs
to be deliberately managed and
investments need to be made
along the way, I think those are
fundamental lessons that the
company needed to learn.
There are other things we need
to work on and improve and we
have done all that. We have made
some pretty significant
investments in IT, in talentand
we feel good about where we
are.
How much should we be
reading into the macro
economic worries, what does it
mean for the outsourcing
business?
I think there is a big economic
cloud right now. If you see the
US economy, it's a bit
challenging.
There are plenty of signs that
there are some challenging
dynamics in the US and until they
get clarity on the deficit issues,
put the debt ceiling behind them,
customers in some cases are
being a bit negative around
making investments. But I would
also say there is still good
demand growth.
Even in the federal government,
productivity becomes a primary
initiative. As long as technology
can bring productivity they are
big priorities for governments.
So, we feel good about that, we
are well positioned with
governments to do that.
How much will stubbornly high
unemployment play a role in
regulations around taxes and
immigration?
There is no question that the
recovery around the real estate
market in the US and other parts
of the world and unemployment
are long-term challenges and the
government in the US needs to
make some pretty fundamental
changes to encourage US
competitiveness and
employment.
Some of these things are
happening. But today they are
caught up in this debt ceiling
debate and not addressing these
issues. The corporate tax rate in
the US is way too high and the
government needs to talk about
that and not something silly like
the debt ceiling.
These are not going to change
overnight and you are not going
to see some dramatic decrease in
unemployment. The data I saw
most recently shows to get back
to 5% unemployment is going to
take another 13 years.
Every time there is political
rhetoric the government starts
talking about deferred tax,
overseas profits. What is your
take on that because it gets
linked back to unemployment
etc?
Well I would go back to US
competitiveness. It's a global
business; we have got a large
population of employees in the
US and more people outside the
US. There needs to be stability in
the political regulatory
environment for us to make
more investments in the US.
Japan is taking down their
corporate tax rate this year and
the US will have the highest
corporate tax rate in the world.
That is a disincentive to invest in
the US. I have been active, our
industry has been active in trying
to communicate to the policy
makers that they need to address
the corporate tax policy. Until
they focus energy around that.
There are US competitiveness
issues around tax and there are
labour issues. There are issues
with healthcare costs, issues
with the right incentives around
innovations and research and
development. Unless US
policymakers focus around these
and make them simple and easy
like it is inIndia or Singapore.
There is a challenge there.

Thursday, 21 July 2011

Taliban: Phones, email, website hacked

ARTICLE BY GOWTHAM

KABUL: The war in Afghanistan enteredcyberspace when the tech-savvy Taliban said their phones, email and website had been hacked to spread a false report that the movement's spiritual leader, Mullah Omar, was dead.

Although the Islamist group banned television during its time in power between 1996 and 2001, its communication strategy in the decade-long war now includes a website, mobile phone text messages, emails and posts on Twitter andFacebook.

The Taliban -- ousted by US-backed Afghan forces for harbouring al Qaeda militants blamed for the September 11 attacks on the United States -- regularly promote their attacks, opinions or exploits online in a publicity war with the West.

Pakistani author and Taliban expert Ahmed Rashid said that, prior to 2001, the Taliban's "media reach to the Afghan people and the world had been virtually zero and totally ineffective".

"They learnt quickly that the war against the Americans had to be fought on many fronts," he said.

The online proficiency of the Taliban could be attributed to an influx of younger recruits during the past decade, said Thomas Ruttig, co-director of the Afghanistan Analysts Network, but he said the overall strategy was not new.

"Islamists, even the early modernist and non-violent ones like Sayed Jamaluddin Afghani or the Egyptian Muhammad Abdu, have always suggested to use Western advanced technology to overcome the West's domination," he said.

"That's not much different from today's Taliban." The Taliban are paranoid that modern technology will betray hiding places. They have threatened to attack mobile phone operators' towers and offices if networks aren't shut down at night, when they fear foreign troops could track them down.

Hacking inquiry 
The cyber attack on Wednesday again sparked Taliban threats of revenge against the telephone network providers. They blamed "American intelligence" and accused a "cunning enemy" of committing "technical larceny".

A spokeswoman for NATO-led troops in Afghanistan said they had no information about the incident.

The Taliban regularly change the addresses of their websites, and website addresses are often corrupt or link to other websites such as dating or online shopping sites.

A "security encyclopaedia" for Islamist militants posted online several years ago -- and translated by the U.S.-based SITE institute -- urged strict precautions when using mobile phones, warning that Mullah Omar had come close to being assassinated after his phone signal gave away his whereabouts.

The Taliban is also concerned about Afghans using mobile phones to pass on information to foreign and government troops.

In the Panjwai district of southern Kandahar province recently, villagers in rural areas where the Taliban are still influential said insurgents had started smashing mobile telephones found on people outside their homes. Villagers said phones found at homes by insurgents were not destroyed.

Now it has to be on alert against cyber attacks. Mullah Omar was the second false high-profile death this week blamed on hacking. On Monday, the website of Britain's The Sun newspaper was hacked and a fake report posted that media mogul Rupert Murdoch had been found dead in his garden.

And just as the British parliament is investigating claims of phone hacking by Murdoch's News of the World newspaper, the Taliban said their Information and Cultural Commission has started an inquiry into how its communications were hacked.

The NATO-led International Security Assistance Force declined to comment on the Taliban allegation.

Samsung launches new Galaxy Tab

ARTICLE BY GOWTHAM


SEOUL: Samsung Electronics Co launched a thinner and lighter version of its Galaxy tablet in its lucrative home market, trying to halt the runaway success of Apple Inc's iPad.

The Galaxy Tab 10.1 is an upgraded version of the 7-inch Tab introduced in October.

Blockbuster iPad sales announced by Apple Tuesday underscore the challenge for the South Korean company.

Apple sold 14 million iPads in the first half of the year, compared with analysts' sales estimates of about 7.5 million units for the Galaxy Tab over 2011.

"As our smartphone business grew very fast within a very short period of time, I believe it's just a matter of time for our tablet business to improve," J.K. Shin, head of Samsung's mobile division, told reporters.

Samsung is Apple's nearest rival in the booming mobile device industry as it leverages its cost competitiveness and access to chips and core tablet components.

It has sharply narrowed the gap with Apple in the smartphone market, but remains a distant second in the tablet market, which research firm Gartner forecasts will surge to 108 million devices next year from an estimated 70 million in 2011.

"Apple's quarterly results showed again it's indeed the strongest rival to beat. Samsung will have a tough second half due to growing competition from Apple as it is set to introduce a new iPhone," said James Song, an analyst at Daewoo Securities.

Blockbuster sales of the iPhone and iPad again helped Apple crush Wall Street's expectations for its third-quarter results. Apple said Tuesday that concern over iPad 2 supply constraints had eased and demand was still outstripping supply in some markets.

The sale of the Tab in Korea is Samsung's fifth launch after its U.S. debut a month ago and its sales kickoff in Indonesia, where the company says it commands a 65 percent market share. It has also launched the device in Italy and Sweden.

Pricing for the new product, slightly thinner and lighter than the iPad 2, starts from $500 in the U.S. market, the same price as the iPad 2.

Samsung faces the challenge of moving beyond being a hardware company, clever at copying ideas, to becoming more creative and better adept at software at a time when consumer gadgets are getting smarter.

Second-quarter profit at Samsung, the world's largest maker of memory chips and televisions, fell by a quarter as weak earnings at its flat screen unit dragged, overshadowing robust sales from its mobile division.

Samsung reiterated Wednesday it aimed to boost tablet sales by more than five fold this year. It didn't provide specific numbers but analysts expect the company to have sold about 1.5 million units last year.

Cognizant faces H-1B visa abuse charges by US

ARTICLE BY GOWTHAM

BANGALORE: Multinational software firm Cognizant, which competes with India's Infosys,TCS and Wipro for a share of the US market, is facing allegations of H-1B visa abuse by an American staff the company fired recently.

Around 18 employees of Molina Healthcare, aCognizant customer, have filed a lawsuit in Los Angeles court alleging that they were replaced by lowly paid workers from Cognizant.

When contacted by ET a Cognizant spokesman said the lawsuit had no merit.

"Cognizant takes legal and regulatory compliance very seriously. It is Cognizant's view that this lawsuit is without merit, and we will vigorously contest it and pursue all legal remedies that may be available to us. Cognizant is a leading US-based provider of business, technology, and consulting services. The healthcare industry is one of the largest industry segments that Cognizant serves," he said.

The US-based magazine Computerworld reported earlier this month that the IT managers along with Cognizant at Molina Healthcare "increasingly catered to the Indian workers while leaving US workers, mostly security analysts and programmers who earned at least $75,000 a year, feeling excluded prior getting laid off last year," the report said.

Among other charges, the lawsuit also accuses the Cognizant customer of discrimination based on nationality.

As US struggles with stubbornly high unemployment rate of over 9%, immigration has become a hot topic among local citizens and opinion makers.

In February this year, Jack Palmer, a project manager with Infosys accused the company of misusing short term and easier to obtain B-1 visas by bringing low cost Indian workers to the US. A federal grand jury in Texas has already sought information from Infosys and an investigation is underway.
While Infosys has denied the allegations, experts tracking the sector say Indian firms need to focus harder on creating local jobs and become more sensitive to job losses as they become more global.

While political rhetoric is nothing new when it comes to outsourcing and job losses, the recent regulations like the one that doubled visa fee for funding Mexico border security and increasing rejection rates for Indian workers seeking short term posting in the US, hint at a brewing trade storm between the countries.

Last year, the Congress added another $2,000 to the H-1B Visa fee. In June this year, Zoe Lofgren of California proposed a bill that would increase wages paid to H-1B workers to ensure American candidates don't lose out.

Experts such as Philadelphia-based immigration lawyer Morley J Nair said in an earlier interview that at a time when US unemployment rates are high, anything even remotely connected with job discrimination will evoke a backlash.

"These cases should be of concern to all types of employers who put restrictive conditions in their ads that can lead to discrimination of any kind, not only to Indian companies operating in the US. Moreover, in this era of high unemployment, any employment ads that even remotely seem to contain restrictive or tailored requirements will invite more attention than needed," he said.

As more US companies, apart from foreign firms like Infosys, face challenges of immigration, even the political rhetoric against immigration is beginning to turn soft. On Monday for instance, Senator Schumer, famous for calling Infosys a 'chop shop', said immigration actually creates jobs - a significant departure from his earlier stand accusing outsourcing companies of stealing American jobs. In an interview with Politico, Schumer said an overhaul of the current immigration system is needed. 

Tuesday, 19 July 2011

How to Create Your Own Customized Run Commands

ARTICLE BY GOWTHAM


The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

 
Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
Create Shortcut
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
I hope you like this post! Pass your comments.

10 tips to internet security

ARTICLE BY GOWTHAM

With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.
 
1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep your PC away from spywares. Click Here for a list of recommended anti-spyware softwares.
 
2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on suspectable links and banners.
 
3. Perform a virus scan on the files/email attachments that you download before executing them.
 
4. Regularly Update your operating system and browser software. For a better security it is recommended that you surf the Internet through the latest version of your browser program.
 
5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)
 
6. Always type the URL of the website in your browser’s address bar to enter the login pages. For ex. To login to your Gmail account type http://mail.google.com 
 
7. Before you enter your password on any login page, ensure that you see https instead of http. ex. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).
 
8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). For more information on phishing refer What is Phishing?. Also refer How to Protect an Email Account from being Hacked.
 
9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.
 
10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also avoid such computers to login to your email/bank accounts. You cannot be sure if any spyware, keystroke-logger, password-sniffer and other malicious programs have not been installed on such a PC.
 
By following the above 10 tips your online security can be guaranteed upto 90%. I hope this will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.

Saturday, 16 July 2011

Internet use affects memory: Study


  The widespread use of search engines and online databases has affected the way people remember information, researchers are reporting.

The scientists, led by Betsy Sparrow, an assistant professor of psychology at Columbia, wondered whether people were more likely to remember information that could be easily retrieved from a computer, just as students are more likely to recall facts they believe will be on a test.

Dr Sparrow and her collaborators, Daniel M. Wegner of Harvard and Jenny Liu of the University of Wisconsin, Madison, staged four different memory experiments. In one, participants typed 40 bits of trivia — for example, "an ostrich's eye is bigger than its brain" — into a computer. Half of the subjects believed the information would be saved in the computer; the other half believed the items they typed would be erased.

The subjects were significantly more likely to remember information if they thought they would not be able to find it later. "Participants did not make the effort to remember when they thought they could later look up the trivia statement they had read," the authors write.

A second experiment was aimed at determining whether computer accessibility affects precisely what we remember. "If asked the question whether there are any countries with only one color in their flag, for example," the researchers wrote, "do we think about flags — or immediately think to go online to find out?"

In this case, participants were asked to remember both the trivia statement itself and which of five computer folders it was saved in. The researchers were surprised to find that people seemed better able to recall the folder.

"That kind of blew my mind," Dr. Sparrow said in an interview.

The experiment explores an aspect of what is known as transactive memory — the notion that we rely on our family, friends and co-workers as well as reference material to store information for us.

"I love watching baseball," Dr. Sparrow said. "But I know my husband knows baseball facts, so when I want to know something I ask him, and I don't bother to remember it."

The Internet's effects on memory are still largely unexplored, Dr. Sparrow said, adding that her experiments had led her to conclude that the Internet has become our primary external storage system.

"Human memory," she said, "is adapting to new communications technology." 
article byTOI 

Top up coming phones in the market ev

ARTICLE BY GOWTHAM



-Nokia N9
-HTC evo 3d
-Lg optimus 3d
-Apple i5
-sony xperia
-Motorola Milestones XT 883

Friday, 15 July 2011

How to recover hacked e mail

ARTICLE BY GOWTHAM



It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
 

Wednesday, 13 July 2011

Infosys Q1 net rises 15.7% at Rs 1722 crore

ARTICLE BY GOWTHAM

The country's second largest software firm Infosys on Tuesday reported a 15.72 per cent jump in consolidated net profit to Rs 1,722 crore for the first quarter ended June 30, 2011. 

The company had posted a net profit of Rs 1,488 crore for the same quarter of the previous fiscal (2010-11), Infosys said in a filing to the Bombay Stock Exchange. 

"We have re-organised the company to be more industry domain-focused, which will accelerate innovation and make us more responsive to clients' needs. We believe that Infosys is well positioned to be a transformational partner for large clients even as they navigate through uncertain times," Infosys CEO and Managing Director S Gopalakrishnan said. 

The company's revenues rose to Rs 7,485 crore in the first quarter from Rs 6,198 crore in the year-ago period, up 20.76 per cent. 

Infosys expects revenues to be in the range of Rs 7,699 crore and Rs 7,810 crore (y-o-y growth of 10.8 per cent to 12.4 per cent) for the quarter ending September 30, 2011. 

In addition, the company forecast its revenues would be in the range of Rs 31,777 crore and Rs 32,311 crore (y-o-y growth of 15.5 per cent to 17.5 per cent) for the fiscal ended March 31, 2012. 

"We continue to focus on high quality growth, balancing both revenue growth and margins," Infosys Member of the Board and Chief Financial Officer V Balakrishnan said. 

As of June 30, 2011, Infosys' cash and cash-equivalents, including investments in available-for-sale financial assets and certificates of deposit, stood at Rs 16,969 crore, as against Rs 16,005 crore as of June 30, 2010. 

Infosys, which has Goldman Sachs , BT Group and BP Plc among its clients, added 26 new clients during the quarter. 

At the end of June 30, the company had 1,33,560 employees, including 2,740 new staff inducted during the first quarter.

90,000 email IDs of US military contractor hacked

ARTICLE BY GOWTHAM

 
WASHINGTON: Hackers claim to have stolen over 90,000 email addresses and passwords in a cyber attack on a major US military contractor, a media report said. 

An arm of the online collective Anonymous has said that it broke into the computer systems ofBooz Allen Hamilton and then posted the details on Internet, 'The Daily Telegraph' online reported. 

They apparently were able to get encrypted versions of the email passwords only, 53,000 of which carried the military ".mil" domains, the report said. 

The hackers also wiped out 4GB of Booz Allen source code in an attack they called "Military Meltdown Monday". The group said, "We infiltrated a server on their network that basically had no security measures in place." 

Booz Allen provides technological services including cyber-security consulting to the American military and other US government agencies. Its staff includes Michael McConnell, former director of the National Security Agency. 

A US Defence Department spokesman said, "We are aware of the incident and coordinating with our federal partners." 

A spokesman for Booz Allen said its security policy meant "we generally do not comment on specific threats or actions taken against our systems". 

The hacking group responded with the comment, "You have a security policy? We never noticed." 

Anonymous became well-known last year for attacking companies including Amazon , Bank of America, Mastercard and Visa, that had cut off services to WikiLeaks and its founder, Julian Assange.

Tuesday, 12 July 2011

JNTU 4-1 BOOKS FOR CSE/IT TO ALL REGIONS

ARTICLE BY GOWTHAM

Direct links for text books here   download at free of cost...



1) NETWORK PROGRAMMING

UNIX Network Programming, Vol. I, Sockets API, 2nd Edition. - W.Richard Stevens
To open the above file u need to have Djvu software, u can download it from the below link

2) WEB TECHNOLOGIES
Web Programming, building internet applications, Chris Bates (For Units-1,2,3)
The complete Reference Java 2 Fifth Edition by Patrick Naughton and Herbert Schildt (For Unit-4)
Java Server Pages –Hans Bergsten (For Units-5,6,7,8)

3) DATA WAREHOUSING AND DATA MINING
Data Mining – Concepts and Techniques - JIAWEI HAN & MICHELINE KAMBER Harcourt India.

4) ADVANCED COMPUTER ARCHITECTURE
Computer Architecture A quantitative approach 3rd edition John L. Hennessy & David A. Patterson Morgan Kufmann

5) EMBEDDED SYSTEMS
Embedding system building blocks By Labrosse
The 8051 Microcontroller, Third Edition, Kenneth J.Ayala
8051 Microcontroller and Embedded Systems, The (2nd Edition)Muhammad Ali Mazidi

6) MOBILE COMPUTING
7) MULTIMEDIA AND APPLICATION DEVELOPMENT
Essentials ActionScript 2.0, Colin Moock

8) SOFTWARE PROJECT MANAGEMENT
Software Project Management, Bob Hughes and Mike Cotterell

9) NETWORK MANAGEMENT SYSTEMS
Principles of Network System Administration By Mark Burges

10) INFORMATION SECURITY
Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh

11) HUMAN COMPUTER INTERACTION
12) IMAGE PROCESSING
Digital Image processing By R.C. Gonzalez & R.E. Woods, Addison Wesley/ Pearson education

Popular Posts