Tuesday, 4 December, 2007
The Hydrogen Generating Car
This is the hydrogen-powered car that uses an on-board reversible Polymer Electrolyte Membrane (PEM) fuel cell to conduct the entire hydrogen-generating and electrolytic process. Considered to be the future of hydrogen power, PEM fuel cells require minimal warm-up time, produce virtually no heat, and have a high power-to-weight ratio, ensuring efficient use and less wear on system components. The car's reversible fuel cell uses distilled water and an electrical charge from the included solar panel to perform a 10-minute electrolytic process; hydrogen and oxygen atoms are extracted from the water and stored in separate tanks at the rear of the car.
The hydrogen is slowly released to the PEM fuel cell where it reacts with oxygen to generate e lectricity that propels the car's motor and illuminates the blue LED lights. When the car encounters an obstacle, it will automatically stop, turn towards an unobstructed path, and continue driving forward. Includes a battery back (requires two AA batteries) for use when the solar panel is impractical. 6" L x 3" H x 2" W. (3 lbs.)
Wednesday, 24 October, 2007
There's a whole lot of water on Earth! Something like 326,000,000,000,000,000,000 gallons (326 million trillion gallons) of the stuff (roughly 1,260,000,000,000,000,000,000 liters) can be found on our planet. This water is in a constant cycle -- it evaporates from the ocean, travels through the air, rains down on the land and then flows back to the ocean.
The oceans are huge. About 70 percent of the planet is covered in ocean, and the average depth of the ocean is several thousand feet (about 1,000 meters). Ninety-eight percent of the water on the planet is in the oceans, and therefore is unusable for drinking because of the salt. About 2 percent of the planet's water is fresh, but 1.6 percent of the planet's water is locked up in the polar ice caps and glaciers. Another 0.36 percent is found underground in aquifers and wells. Only about 0.036 percent of the planet's total water supply is found in lakes and rivers. That's still thousands of trillions of gallons, but it's a very small amount compared to all the water available.
The rest of the water on the planet is either floating in the air as clouds and water vapor, or is locked up in plants and animals (your body is 65 percent water, so if you weigh 100 pounds, 65 pounds of you is water!). There's also all the soda pop, milk and orange juice you see at the store and in your refrigerator… There's probably several billion gallons of water sitting on a shelf at any one time!
The Year 2000 problem is understood by most people these days because of the large amount of media attention it received.
Most programs written in the C programming language are relatively immune to the Y2K problem, but suffer instead from the Year 2038 problem. This problem arises because most C programs use a library of routines called the standard time library . This library establishes a standard 4-byte format for the storage of time values, and also provides a number of functions for converting, displaying and calculating time values.
The standard 4-byte format assumes that the beginning of time is January 1, 1970, at 12:00:00 a.m. This value is 0. Any time/date value is expressed as the number of seconds following that zero value. So the value 919642718 is 919,642,718 seconds past 12:00:00 a.m. on January 1, 1970, which is Sunday, February 21, 1999, at 16:18:38 Pacific time (U.S.). This is a convenient format because if you subtract any two values, what you get is a number of seconds that is the time difference between them. Then you can use other functions in the library to determine how many minutes/hours/days/months/years have passed between the two times.
If you have read How Bits and Bytes Work, you know that a signed 4-byte integer has a maximum value of 2,147,483,647, and this is where the Year 2038 problem comes from. The maximum value of time before it rolls over to a negative (and invalid) value is 2,147,483,647, which translates into January 19, 2038. On this date, any C programs that use the standard time library will start to have problems with date calculations.
This problem is somewhat easier to fix than the Y2K problem on mainframes, fortunately. Well-written programs can simply be recompiled with a new version of the library that uses, for example, 8-byte values for the storage format. This is possible because the library encapsulates the whole time activity with its own time types and functions (unlike most mainframe programs, which did not standardize their date formats or calculations). So the Year 2038 problem should not be nearly as hard to fix as the Y2K problem was.
Sunday, 14 October, 2007
I hope this topic will be more interesting than my previous post. Ofcourse, we are going to discuss on the frequently heard term called "IP". Often, you will check your System IP's everytime by pinging"IPCONFIG" in your command window, it some times mean that you dont have any other work to do. :)
Lets go in to the topic now...
Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP address looks like this:
To make it easier for us humans to remember, IP addresses are normally expressed in decimal format as a "dotted decimal number" like the one above. But computers communicate in binary form. Look at the same IP address in binary:
The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers. Since each of the eight positions can have two different states (1 or 0) the total number of possible combinations per octet is 28 or 256. So each octet can contain any value between 0 and 255. Combine the four octets and you get 232 or a possible 4,294,967,296 unique values!
Out of the almost 4.3 billion possible combinations, certain values are restricted from use as typical IP addresses. For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is used for broadcasts.
The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet. There are five IP classes plus certain special addresses:
* Default Network - The IP address of 0.0.0.0 is used for the default network.
* Class A - This class is for very large networks, such as a major international company might have. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A networks, the high order bit value (the very first binary number) in the first octet is always 0.
Host or Node
* Loopback - The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing.
* Class B - Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.
Host or Node
* Class C - Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first octet from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net identifier. The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.
Host or Node
* Class D - Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.
Host or Node
* Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the available IP addresses.
Host or Node
* Broadcast - Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255.
Hope you would had fun with this one and thereabout will meet you with more special topics.
Monday, 8 October, 2007
Take a look at the writing end of a brand-new wooden pencil before sharpening it :);
it appears that the wood casing is one solid piece. This might lead you to believe that pencil-makers bore a hole straight down the middle of the wood and then slide in a rod of lead. Although early pencils were constructed in this manner, it is not how most wooden pencils are mass-produced today.
Before discussing how the lead is put into the wood casing, let's clear up what the actual lead is. Pencil lead is not lead at all; it's a combination of finely ground graphite and clay, mixed with water and pressed together at high temperatures into thin rods. We call it lead is because the Englishmen who first discovered graphite believed they had found lead. According to the Cumberland Pencil Museum, in the mid-16th century, a violent storm knocked over several trees in Borrowdale, England, uncovering a large deposit of a black substance that was first thought to be lead. More than 200 years later, an English scientist discovered that the substance was not actually lead, but a type of carbon instead. The substance was named graphite, after the Greek word meaning "to write," since that's how people used the substance.
Early pencils were crude versions of today's standard model. The first pencil was just a chunk of graphite used by carpenters and artisans to make markings without denting their materials. This evolved into a graphite chunk wrapped in sheepskin, followed by a string-wrapped graphite pencil, the first pencil with a rod-shaped graphite core. To use one of these pencils, the writer would have to unravel the string as the graphite wore down. The next major leap in design was hollowing out a stick of cedar and sticking a piece of graphite down the hole, an idea often credited to the Italians. The English embraced this idea but simplified the manufacturing process considerably. Instead of hollowing out a piece of wood, they simply cut a groove in the wood, inserted a piece of graphite and broke it off level with the top of the groove. They then glued a small slat of wood on top, encasing the graphite.
Today, most wooden pencils are mass produced from large blocks of cedar cut into slats. A machine cuts eight grooves, half as deep as the graphite-clay rod is thick, into the slats, and then places rods in each groove. Once the rods are in place, a second grooved slat is glued on top of the first. When the glue dries, the slats are fed through a cutting machine that cuts the wood into various shapes and divides the slats into eight separate pencils. The seams where the two slats are joined are sanded down and several coats of paint are applied to the pencil, giving it the appearance of a solid structure.
According to Musgrave Pencil Co. Inc, more than 14 billion pencils are produced in the world every year, enough to circle the earth 62 times. This pile of pencils includes a wide variety of styles and widths. If you've ever have taken a fill-in-the-bubble test, you're probably aware that pencils vary in darkness. The number printed on the side of the pencil indicates hardness and darkness of the graphite core: the higher the number, the harder the graphite core. Because a hard core leaves behind less of the graphite-clay mixture on the paper, it will have a fainter mark than a softer core.
Monday, 1 October, 2007
In this topic we shall see some how many sheets can be made from a single tree. I guess, its an interesting and useful topic for all.
Let me go to the topic quickly,
It is probably hard to get an exact number, but here is how I would start answer to this question: First, we have to define what a "tree" is. Is it a giant redwood tree or a little weeping willow? Most paper is made from pine trees, so I went out in the woods and looked at some pines. :)
Most are about 1 foot in diameter and 60 feet tall. Ignoring taper, that's about 81,430 cubic inches of wood:
pi * radius2 * length = volume
3.14 * 62 * (60 * 12) = 81,430
I have a 2x4-foot piece of lumber in the backyard. It weighs about 10 pounds and contains 504 cubic inches of wood. That means a pine tree weighs roughly 1,610 pounds (81430/504 * 10).
I know that in manufacturing paper, the wood is turned into pulp. The yield is about 50 percent -- about half of the tree is knots, lignin and other stuff that is no good for paper. So that means a pine tree yields about 805 pounds of paper. I have a ream of paper for a photocopier here and it weighs about 5 pounds and contains 500 sheets (you often see paper described as "20-pound stock" or "24-pound stock" -- that is the weight of 500 sheets of 17" x 22" paper). So, using these measurements, a tree would produce (805/5 * 500) 80,500 sheets of paper.
These are all fairly rough estimations.
Lets now concentrate on a science topic,How much does planet Earth weigh?
It would be more proper to ask, "What is the mass of planet Earth?"1 The quick answer to that is: approximately 6,000,000,000,000,000,000,000,000 (6E+24) kilograms.
The interesting sub-question is, "How did anyone figure that out?" It's not like the planet steps onto the scale each morning before it takes a shower. The measurement of the planet's weight is derived from the gravitational attraction that the Earth has for objects near it.
It turns out that any two masses have a gravitational attraction for one another. If you put two bowling balls near each other, they will attract one another gravitationally. The attraction is extremely slight, but if your instruments are sensitive enough you can measure the gravitational attraction that two bowling balls have on one another. From that measurement, you could determine the mass of the two objects. The same is true for two golf balls, but the attraction is even slighter because the amount of gravitational force depends on mass of the objects.
Newton showed that, for spherical objects, you can make the simplifying assumption that all of the object's mass is concentrated at the center of the sphere. The following equation expresses the gravitational attraction that two spherical objects have on one another:
F = G * M1 * M2 / R2
* R is the distance separating the two objects.
* G is a constant that is 6.67259x10-11m3/s2 kg.
* M1 and M2 are the two masses that are attracting each other.
* F is the force of attraction between them.
Assume that Earth is one of the masses (M1) and a 1-kg sphere is the other (M2). The force between them is 9.8 kg*m/s2 -- we can calculate this force by dropping the 1-kg sphere and measuring the acceleration that the Earth's gravitational field applies to it (9.8 m/s2).
The radius of the Earth is 6,400,000 meters (6,999,125 yards). If you plug all of these values in and solve for M1, you find that the mass of the Earth is 6,000,000,000,000,000,000,000,000 kilograms (6E+24 kilograms / 1.3E+25 pounds).
It is "more proper" to ask about mass rather than weight because weight is a force that requires a gravitational field to determine. You can take a bowling ball and weigh it on the Earth and on the moon. The weight on the moon will be one-sixth that on the Earth, but the amount of mass is the same in both places. To weigh the Earth, we would need to know in which object's gravitational field we want to calculate the weight. The mass of the Earth, on the other hand, is a constant.
Friday, 14 September, 2007
Most devout Indians fast regularly or on special occasions like festivals. On such days they do not eat at all, eat once or make do with fruits or a special diet of simple food.
Fasting in Sanskrit is called upavaasa. Upa means "near" + vaasa means "to stay". Upavaasa therefore means staying near (the Lord), meaning the attainment of close mental proximity with the Lord. Then what has upavaasa to do with food?
A lot of our time and energy is spent in procuring food items, preparing, cooking, eating and digesting food. Certain food types make our minds dull and agitated. Hence on certain days man decides to save time and conserve his energy by eating either simple, light food or totally abstaining from eating so that his mind becomes alert and pure. The mind, otherwise pre-occupied by the thought of food, now entertains noble thoughts and stays with the Lord.
Since it is a self-imposed form of discipline it is usually adhered to with joy
Also every system needs a break and an overhaul to work at its best. Rest and a change of diet during fasting is very good for the digestive system and the entire body. The more you indulge the senses, the more they make their demands. Fasting helps us to cultivate control over our senses, sublimate our desires and guide our minds to be poised and at peace. Fasting should not make us weak, irritable or create an urge to indulge later. This happens when there is no noble goal behind fasting.
The Bhagavad-Gita urges us to eat appropriately - neither too less nor too much - yuktaaahaara and to eat simple, pure and healthy food (a saatvik diet) even when not fasting.
Saturday, 28 July, 2007
Whats the purpose of keeping festoon in our houses?
Decorating the main door of the houses, temples or any other place, where some ritual is performed, with a festoon (Toranam or a string of mango leaves) is part of the Indian culture. Normally, this kind of decoration is done during festivals or celebrations. Though there is a scientific reason behind this festoon decoration, this has become a part of the tradition and majority does not even bother to know the actual reason behind doing so.
Indians use a festoon made of fresh and green mango leaves. However, leaves of other species like Neem are also used for this purpose. Most of us know that the green leaves absorb carbon dioxide and release oxygen. This helps in keeping the surrounding atmosphere clean and hygienic. Keeping, the aesthetics in view, mango leaves are preferred, since their shape adds to the ambience.
However, all other advantages of having a festoon revolve around this basic reason. According to a theory, the air filled with carbon dioxide, which is lighter than the pure air, gets purified immediately while passing through the festoon. In addition, insects get attracted to the green leaves. This stops the insects from entering the room.
This practice of decorating the main door with the festoon is supported by a strong scientific reasoning and is certainly not a blind belief. Any body, who has minimum knowledge of science, understands the value of green leaves and same is the case with any body who has minimum aesthetic sense.
However, it is said, in the Indian villages, dry mango leaves are used for treating certain ailments. The ash of dry mango leaves is used in the first aid for cuts and fresh wounds. This ash is applied directly on the wound or after mixing it with coconut oil. Dry mango leaves’ ash has the capacity to check the bleeding. The dry leaves in the festoon come handy for providing first aid in such cases.
It is also a scientifically established fact that the green colour keeps a person mentally fresh and even the modern day medicine advises the modern day man, who comes under severe stress during his normal working hours, to spend some time amidst greenery to freshen his mind and soul. A festoon provides this facility at your doorsteps.
Even this is an age-old practice in every house according to the Hindu culture and tradition. Applying Turmeric on the threshold is as important as having bath in every Indian house. Again, every one knows the reason. But the modern Indian has a habit of ridiculing all such practices and branding them as blind beliefs or meaningless practices.
It is beyond doubt that turmeric has anti-septic characters. It is an anti-bacterial too. While the green festoon hanging on the top of the main door frame stops insects and other visible but small flying objects from entering the room, turmeric applied on the door sill stops bacteria or other microscopic organisms from making their way into the house. Turmeric checks every invisible organism.
In addition, the yellow color makes the main door colorful and is an aesthetic combination for the green festoon on the top of the doorframe.
Thursday, 26 July, 2007
The supplier will support the Advanced Supercomputing Division at Ames Research Center in Silicon Valley and provide computer research to the agency's Center for Computational Sciences at Goddard Space Flight Center in Maryland.
The price tag is an estimated maximum value for the deal, based on full uptake of a basic two-year contract and eight one-year options.
'CSC is pleased to expand our relationship with NASA and help advance the agency's mission in pioneering the future of space exploration, scientific discovery and aeronautics research,' said CSC North American Public Sector Civil Division president Tom Anderson.
Under the terms of the multi-year deal, Infosys will handle financial services and process purchasing orders for Philips, and 1,400 staff will transfer over to the supplier. The Bangalore-based IT business will also gain three shared service centres based in India, Poland and Thailand.
'Global corporations require transformation partners like Infosys to enhance their competitiveness in the flat world,' said S. Gopalakrishnan, chief executive at Infosys.
'We are excited to partner with Philips to take their finance and accounting and procurement functions to the next level of transformation.'
Saturday, 21 July, 2007
Thursday, 19 July, 2007
Very useful tool please install on your systems.
For those of you who use the Alt+Tab key combination to switch between open windows on your desktop, I am sure you have encountered times when you cannot distinguish one window from the other due to having more than one instance of the same program open. Microsoft became aware of this draw-back after releasing the XP operating system and subsequently released a "Power Toy" to resolve this issue. The Power Toy resolves this issue by replacing the program icons with actual screenshots of your open windows. This way you can locate exactly which window you wish to switch to, which is immensely useful when navigating between several SAP windows at one time.
As you can see in the first example above, it is impossible to differentiate between the IE instances and the SAP instances by looking at the icons. In the subsequent example, the screenshot clearly differentiates the windows.
Here are the instructions to install:
-Copy URL to browser: http://download.microsoft.com/download/whistler/Install/2/WXP/EN-US/TaskswitchPowertoySetup.exe
-Choose "Run" from pop-up dialog box
-Choose "Run" a second time, this will kick-off the installation of the Power Toy
-Once you get the "Installation Complete" dialog, the toy is successfully installed. No need to reboot your PC.
Wednesday, 18 July, 2007
TCS results have been announced today and it has done it again showing a good results worldwide! It has made a good profit this quarter, quite high compared to Infy eventhough the rupee value is high!
The BSE/NSE market got a slight tremor when Infy results were out, but this isnt the case happened for the global leader TCS as its profit boosted up the market :)
Its share value was around Rs. 1,120 couple of days back and rose to Rs. 1,155 till now because of its outstanding results!
Report from computer.uk site is given below,
Indian IT services supplier Tata Consultancy Services (TCS) has increased first quarter sales 25 per cent to 52 billion rupees (£635m) in what it calls a ‘volatile quarter’. The firm added 54 new clients during the quarter, including a large UK retail bank and airline, as profits rose 37 per cent to 11.8 billion rupees (£144m). The results were achieved despite increasing wages and an appreciating rupee, says chief executive S. Ramadorai.
‘We have maintained profitability by great execution, demand creation and strong financial management,’ he said. ‘Our focus on delivery excellence continues to provide the experience of certainty to our customers.’ TCS says it expects continued customer demand in the banking, financial services, telecom and retail sectors. The company achieved a number of significant contract wins in those sectors, including a range of telecom services in Asia and an application and support services deal for US financial services company.
TCS also says it has maintained the lowest staff attrition in its industry, with first quarter turnover of 11 per cent in IT services and 16 per cent in business process outsourcing.
‘Our ability to nurture talent, upgrade skill levels and match employee aspirations helps our retention rates and deliver certainty to our customers and employees,’ said TCS global head of human resources S. Padmanabham.
Saturday, 14 July, 2007
Here are the 25 sites which we cant live without, report according to the times.com,
1. Amazon.com [Known Site]
2.BBC.co.uk [Known Site]
3.Citysearch.com [Helps steer you to the right restaurants, bars, nightclubs, hotels and spas in dozens of cities, with editors' picks and user reviews, and a Yellow Pages directory that includes shops and other services.]
4.Craigslist.org [Free classified ads in every category, organized by locale]
5.Del.icio.us [An immensely popular place to share your favorite Web links and see what other people are bookmarking]
6.Digg.com [The leader in social news, where users determine what's important and interesting by submitting it, "digging" it and posting a comment]
7.Ebay.com [Known Site]
8.ESPN.com [Known Site]
9.Facebook.com [This social network is not as popular as MySpace, but it also hasn't been corrupted by marketers and fake friends.]
10.FactCheck.org [The Annenberg Political Fact Check, a project of the Annenberg Public Policy Center of the University of Pennsylvania, is an independent, nonpartisan effort to cut through the routine spin and dissembling of politicians and other public figures]
11.Flickr.com [More than half a billion images are now posted on Flickr, a superbly designed sharing platform and social network for photo enthusiasts ]
12.Google.com [Search Engine]
13.HowStuffWorks.com [Known Site]
14.The Internet Movie Database [The Internet Movie Database is not just the Net's more extensive directory of films and TV shows of the past, present and future ]
15.YouTube [Known site]
16.Kayak.com [When planning your next trip, make this your first stop]
17.National Geographic.com [There's a ton of great content here — about animals, world adventures, the environment, the sciences, space]
18.Netflix.com [Digital movie downloads are getting easier, but most consumers still prefer their movies on DVD, and those slim red sleeves (with return postage prepaid) are still the best way to get 'em]
19.Technorati.com [This blog search engine now searches for social media too —photos, video and music posted on online sharing sites ]
20.TMZ.com [The best for celebrity and entertainment news]
21.USA.gov [The official Web portal for the U.S. government, with links to every branch, agency and organization involved in federal business, plus reports, guides, reference material and other resources to help you navigate the system]
22.Television WithoutPity.com [Bitingly funny recaps of dozens of popular TV shows, plus forums for further discussion. ]
23.WebMD.com [A big portal packed with information about health and related issues.]
24.Wikipedia.org [Known site]
25.Yahoo.com [Known site]
Please be careful while using your IPODS during the time of lightning.... Yes, reports say that people using the IPODS during the time of lightning face plenty of damage to their health, it causes damage to their ear drums.
Please have a look at the report...
A Canadian jogger suffered wishbone-shaped chest and neck burns, ruptured eardrums and a broken jaw when lightning traveled through his music player's wires. Last summer, a Colorado teen ended up with similar injuries when lightning struck nearby as he was listening to his iPod while mowing the lawn.
Emergency physicians report treating other patients with burns from freak accidents while using personal electronic devices such as beepers, Walkman players and laptop computers outdoors during storms. Michael Utley, a former stockbroker from West Yarmouth, Massachusetts, who survived being struck by lightning while golfing, has tracked 13 cases since 2004 of people hit while talking on cell phones. They are described on his Web site, www.struckbylightning.org.
Contrary to some urban legends and media reports, electronic devices don't attract lightning the way a tall tree or a lightning rod does. "It's going to hit where it's going to hit, but once it contacts metal, the metal conducts the electricity," said Dr. Mary Ann Cooper of the American College of Emergency Physicians and an ER doctor at University of Illinois Medical Center at Chicago. When lightning jumps from a nearby object to a person, it often flashes over the skin. But metal in electronic devices -- or metal jewelry or coins in a pocket -- can cause contact burns and exacerbate the damage.
A spokeswoman for Apple Inc., the maker of iPods, declined to comment. Packaging for iPods and some other music players do include warnings against using them in the rain. Lightning strikes can occur even if a storm is many miles away, so lightning safety experts have been pushing the slogan "When thunder roars, go indoors," said Cooper.
Hope this bit of information would be useful for all!
Wednesday, 11 July, 2007
Our IT services supplier Infosys has seen a sharp rise in first quarter sales, up 40 per cent to $928m (£457m), due to strong performances in the UK and North America.
The Bangalore-based company has added 35 new clients during the quarter, including two European banks, a UK retailer and Canadian telecoms provider. The firm has increased sales forecasts for the year ahead, and expects to grow by up to 30 per cent, to as much as $4bn (£1.8bn).
Infosys says increasing demand for business software and strong growth in areas such as consulting, engineering services and implementation were behind the good results.
‘As clients recognise the strategic imperative of global sourcing in an increasingly flat business world, the demand for large players like Infosys continues to be strong,’ said Infosys chief executive S. Gopalakrishnan. Profits also rose at the company, up from $199m (£98m) for the first three months of last year to $291m (143m) this year.
‘The sharp appreciation of the rupee against all major currencies impacted our operating margins during the quarter,’ said Infosys chief financial officer V. Balakrishnan. ‘However, our robust and flexible operating and financial model enabled us to maintain our net margins while absorbing the impact of appreciating currency, higher wages and visa costs.’
Hmmm!! It may sound good but what about the status of our Indian Investors who have bought its shares in the market??
Infy was going high in the margin of 2020 Rupees yesterday but when the results were announced later today, it was breached down to 1920.50 mark !! why there is so much decline in the share value all of sudden??
well, I could say it becos of weakening in the Dollar Value... Yes, the dollar value has been weakened in the international market whereas Indian Rupees and China's Yuan has been quiet high these days.. Kudos of our Rupee value but this has become a disadvantage for the Indian Investors in the IT companies... The perfect example which i would say is the status of the Infy today's share value.... :)
If we see an advantage in our currency in the overall market, we could also see an tremor in the IT companies share values as well... :)
Saturday, 7 July, 2007
Lets keep away from technical issues for some time... :-)
BTW, do we know the benefits of Tulsi Plant?? Hereby, i am giving you the 15 benefits of it, may be useful for all to know the medical power of it...
Few lines bout the Tulsi Plant:
The tulsi or holy basil is an important symbol in the Hindu religious tradition and is worshipped in the morning and evening by Hindus at large. The holy basil is also a herbal remedy for a lot of common ailments. Here're top fifteen medicinal uses of tulsi.
So, what are the benefits of it,
1. Healing Power: The tulsi plant has many medicinal properties. The leaves are a nerve tonic and also sharpen memory. They promote the removal of the catarrhal matter and phlegm from the bronchial tube. The leaves strengthen the stomach and induce copious perspiration. The seed of the plant are mucilaginous.
2. Fever & Common Cold: The leaves of basil are specific for many fevers. During the rainy season, when malaria and dengue fever are widely prevalent, tender leaves, boiled with tea, act as preventive against theses diseases. In case of acute fevers, a decoction of the leaves boiled with powdered cardamom in half a liter of water and mixed with sugar and milk brings down the temperature. The juice of tulsi leaves can be used to bring down fever. Extract of tulsi leaves in fresh water should be given every 2 to 3 hours. In between one can keep giving sips of cold water. In children, it is every effective in bringing down the temperature.
3. Coughs: Tulsi is an important constituent of many Ayurvedic cough syrups and expectorants. It helps to mobilize mucus in bronchitis and asthma. Chewing tulsi leaves relieves cold and flu.
4. Sore Throat: Water boiled with basil leaves can be taken as drink in case of sore throat. This water can also be used as a gargle.
5. Respiratory Disorder: The herb is useful in the treatment of respiratory system disorder. A decoction of the leaves, with honey and ginger is an effective remedy for bronchitis, asthma, influenza, cough and cold. A decoction of the leaves, cloves and common salt also gives immediate relief in case of influenza. They should be boiled in half a liter of water till only half the water is left and add then taken.
6. Kidney Stone: Basil has strengthening effect on the kidney. In case of renal stone the juice of basil leaves and honey, if taken regularly for 6 months it will expel them via the urinary tract.
7. Heart Disorder: Basil has a beneficial effect in cardiac disease and the weakness resulting from them. It reduces the level of blood cholesterol.
8. Children's Ailments: Common pediatric problems like cough cold, fever, diarrhea and vomiting respond favorably to the juice of basil leaves. If pustules of chicken pox delay their appearance, basil leaves taken with saffron will hasten them.
9. Stress: Basil leaves are regarded as an 'adaptogen' or anti-stress agent. Recent studies have shown that the leaves afford significant protection against stress. Even healthy persons can chew 12 leaves of basil, twice a day, to prevent stress. It purifies blood and helps prevent several common elements.
10. Mouth Infections: The leaves are quit effective for the ulcer and infections in the mouth. A few leaves chewed will cure these conditions.
11. Insect Bites: The herb is a prophylactic or preventive and curative for insect stings or bites. A teaspoonful of the juice of the leaves is taken and is repeated after a few hours. Fresh juice must also be applied to the affected parts. A paste of fresh roots is also effective in case of bites of insects and leeches.
12. Skin Disorders: Applied locally, basil juice is beneficial in the treatment of ringworm and other skin diseases. It has also been tried successfully by some naturopaths in the treatment of leucoderma.
13. Teeth Disorder: The herb is useful in teeth disorders. Its leaves, dried in the sun and powdered, can be used for brushing teeth. It can also be mixed with mustered oil to make a paste and used as toothpaste. This is very good for maintaining dental health, counteracting bad breath and for massaging the gums. It is also useful in pyorrhea and other teeth disorders.
14. Headaches: Basil makes a good medicine for headache. A decoction of the leaves can be given for this disorder. Pounded leaves mixed with sandalwood paste can also be applied on the forehead for getting relief from heat, headache, and for providing coolness in general.
15. Eye Disorders: Basil juice is an effective remedy for sore eyes and night-blindness, which is generally caused by deficiency of vitamin A. Two drops of black basil juice are put into the eyes daily at bedtime.
DISCLAIMER: These are only general guidelines as a first aid. It is always better to see a doctor depending upon the intensity of the case. The views expressed above are entirely those of the author.
Hope you all wud have come to know the POWER OF TULSI plant, isnt it?
meet you all with another excellent topic... :)
Heres one more update reg the RFID usage in Heaththrow airport!!
BAA plans to increase security at the new Heathrow Terminal 5 by using radio frequency identification (RFID) technology to check the identity of taxis and taxi drivers entering the terminal to pick up passengers. The UK airports operator said that security at the terminal was paramount, and ensuring that only licensed taxis were allowed to pick up fares would make an important contribution.
The importance of secure access control has been highlighted by last week's attack on Glasgow airport."RFID access and identification systems can help ensure only authorised personnel enter controlled areas. They can also help in emergencies, where the system can identify the location of personnel and track staff working in sensitive areas," said Jeff Woods, global lead analyst on RFID at analyst firm Gartner.
Under the scheme, only licensed taxis carrying authorised drivers will be allowed to pick up passengers from the buffer zone inside the terminal. Cab drivers will have to register to work at the airport via the Heathrow Airport Licensed Taxis organisation. The system also aims to reduce passenger waiting times by ensuring the right number of taxis are made available to passengers who request rides.
The software application, provided by Steria, counts the number of taxis and displays waiting times for the next fare on electronic boards for drivers, which enables them to calculate when they need to advance from being parked to the pick-up point, depending on the influx of customers. This ensures that the right number of taxis are allocated to the appropriate terminal at the right time.
BAA said one of the big hurdles was to secure buy-in from taxi drivers. But after consulting with the Heathrow Taxi Trade Partnership, it has shown that the system would lead to greater transparency and more registered taxis being used. The system could also be extended to other modes of commercial transport, including minibuses and coaches, although BAA has no plans to extend this to private vehicles dropping passengers off at the terminal.
Its amazing to know that usage of RFID has been increasing day by day for security reasons all over the world...!
anyways, lets meet again with further update... ;)
Courtesy of computerweekly!!
Thursday, 5 July, 2007
You would have read my early RFID topic on the same theme, here am just giving you the update on my thread :)
Heathrow will be using the RFID to track the baggage lost and the trial for the same will be done before September. I guess, this is the first time where RFID's are used in the AIRPORT that too for tracking the baggage loss... isnt it? See, how the techies have been improved worldwide.. Its nice to hear that RFID is getting familiarised everywhere :)
Heathrow will become the largest European airport to track passenger baggage using radio frequency identification (RFID) when trials begin in September. Airport operator BAA will install the infrastructure on selected check-in desks to tag bags with RFID chips, which will then be scanned on entry into the baggage system. BAA will compare the read rates of RFID chips with existing barcode readers. ‘This will allow us to compare the success rate of RFID technology against our existing system,’ said a BAA spokeswoman. ‘We will then examine that insight to understand the benefits it offers.’
The International Air Transport Association (Iata) last month announced a plan to detail the cost of RFID infrastructure and how airports should proceed. ‘Such trials are incredibly valuable in building momentum for the introduction of RFID, and we are anxious to see the results,’ said Iata spokesman Lorne Riley. ‘It is particularly welcome because of the volume of passengers and baggage that Heathrow processes.’ RFID could save airports and airlines £400m a year in reduced baggage losses and replacement of existing messaging systems.
A trial of RFID technology at Heathrow could encourage other airports to roll out the infrastructure, says Peter Harrop, chairman at RFID analyst ID TechEx. ‘The funding must come from airports because they are more financially stable than airlines, and if the biggest airport involved can prove the financial case, others will follow,’ he said. ‘Heathrow will benefit from fewer lost bags and better efficiency through automation. But the real benefit comes when every bag is tagged at every airport and airline.’
See you all with another interesting topic...
Tuesday, 3 July, 2007
Its really nice to hear that our Indian IT market has been rocking the worldwide overall IT industry. The Software and services revenue to reach £25bn for 2007-8.
Our Indian IT software and services market grew by more than 30 per cent during the past year, exceeding forecasts of 27 per cent growth. And new figures from Indian IT trade association Nasscom predict further sales increases of 24 to 27 per cent to reach revenues of nearly $50bn (£25bn) in 2008.
Nasscom’s annual survey showed sales of £19.3bn for the financial year 2006/7, up from £15.15bn in 2005/06 TCS maintained its position as the leading offshore supplier followed by Infosys and Wipro. Software and services exports grew by 33 per cent, reaching revenues of £15.7bn for 2006/07, up from £11.8bn in 2005/06. Business process outsourcing grew by 33.5 per cent £4.2bn.
Nasscom president Kiran Karnik says that India continues to be the preferred destination for global IT sourcing, but there are short- to medium-term challenges that need to be addressed swiftly. ‘Rupee appreciation, suitability of available talent, infrastructure development and sustenance of a positive policy and regulatory environment require timely, consistent and continued effort from all stakeholders including industry, government, academia and Nasscom,’ said Karnik.
**courtesy of computer.uk**
Thursday, 21 June, 2007
It would be great if we calculate how far away lightning struck by how long it takes for the thunder to arrive...isnt it?
Sound travels through air at "the speed of sound." Officially, the speed of sound is 331.3 meters per second (1,087 feet per second) in dry air at 0 degrees Celsius (32 degrees Fahrenheit). At a temperature like 28 degrees C (82 degrees F), the speed is 346 meters per second.
As you can see, the speed of sound changes depending on the temperature and the humidity; but if you want a round number, then something like 350 meters per second and 1,200 feet per second are reasonable numbers to use. So sound travels 1 kilometer in roughly 3 seconds and 1 mile in roughly 5 seconds.
When you see the flash of a lightning bolt, you can start counting seconds and then divide to see how far away the lightning struck. If it takes 10 seconds for the thunder to roll in, the lightning struck about 2 miles or 3 kilometers away. :)
See you all with another excellent topic!!!
This is most interesting as well as important article...
Over 1,000 people get struck by lightning every year in the World,and over 100 of them die as a result of the strike. Lightning is a very dangerous force that, yes, can even reach you indoors if you're in contact with the telephone or plumbing.
If lightning strikes the phone line outside your house, the strike will travel to every phone on the line -- and potentially to you if you are holding the phone. So, if you are indoors during a lightning storm, stay off the phone. If you must call someone, use a cordless or cell phone -- that way, you're not in contact with any wires that run outdoors.
Stay away from plumbing pipes like your bath tub or shower, as well. Lightning has the ability to strike a house or near a house and impart an electrical charge to the metal pipes used for plumbing. If you're touching those pipes or anything connected to those pipes, that electrical charge has a path to you. This threat is not as great as it used to be, because PVC (polyvinyl chloride) is often used for indoor plumbing these days. If you are not sure what your pipes are made of, wait it out.
And while you're at it, switch off your appliances and electronics before the storm hits. Such devices as your computer, television and air conditioner all provide potential pathways between the lightning and you.
So be very careful during the lighting even if you stay indoors!
The funny little a with its tail circling back around it is probably one of the most commonly used symbols today. So it is truly amazing to learn that there is no official, universal name for it. The most accepted term, even in many other languages, is to call it the at sign. But there are dozens of different words used to describe it. A lot of languages use words that associate the shape of the symbol with some type of animal.
Here are a few examples of the many exotic terms associated with the @ symbol:
apestaart - Dutch for "monkey's tail"
snabel - Danish for "elephant's trunk"
kissanhnta - Finnish for "cat's tail"
klammeraffe - German for "hanging monkey"
kukac - Hungarian for "worm"
dalphaengi - Korean for "snail"
grisehale - Norwegian for "pig's tail"
sobachka - Russian for "little dog"
Before it became the standard symbol for e-mail, the @ symbol was typically used to indicate the cost or weight of something. For example, if you bought five oranges for $1.25 each, you might write it as 5 oranges @ $1.25 ea. It is still used in this manner on a variety of forms and invoices around the world.
The actual origin of the symbol is uncertain. It was used by monks making copies of books before the invention of the printing press. Since every word had to be painstakingly transcribed by hand for each copy of a book, the monks that performed the copying duties looked for ways to reduce the number of individual strokes per word for common words. So, the word at became a single stroke of the pen as @ instead of three strokes. While it doesn't seem like much today, it made a huge difference to the men who spent their lives copying manuscripts!
Another origin tale states that the @ symbol was used as an abbreviation for the word amphora, which was the unit of measurement used to determine the amount held by the large terra cotta jars that were used to ship grain, spices and wine. Giorgio Stabile, an Italian scholar, discovered this use of the @ symbol in a letter written in 1536 by a Florentine trader named Francesco Lapi. It seems likely that some industrious trader saw the @ symbol in a book transcribed by monks using the symbol and appropriated it for use as the amphora abbreviation. This would also explain why it became common to use the symbol in relation to quantities of something.
Wednesday, 20 June, 2007
I hope everyone would be aware of the term TRANSFORMER... anyways, will give you a brief idea about the term...
I could tell you the plenty of operations which the transformer does, among them its mainly used to convert a AC Current to minimal DC voltage. Most transformer cubes that you find around the house produce a low-voltage DC current (3 to 12 volts, and less than an amp of current). DC current is necessary because rechargeable batteries store DC current, because most electronics require low-voltage DC current and because small DC motors run directly from batteries and are the least expensive motors available.
Hope this information is enough!! We shall discuss our topic in detail now,
As said, transformers have been used by various devices,lets say for ex: printer, scanners,speakers, answering machine, cordless phone, electric screwdriver, electric drill uses Transformer as a source for them...
Do you know, by just connecting a transformer to the AC switch would consume power...
It would consume more power if its connected to other devices during charging of materials. If you have ever felt one and it was warm, that is wasted energy turned to heat. The power consumption is not large -- on the order of 1 to 5 watts per transformer. But it does add up. Let's say that you have 10 of them, and they consume 5 watts each. That means that 50 watts are being wasted constantly. If a kilowatt-hour costs a dime in your area, that means you are spending a dime every 20 hours.
Hope you have STABILIZERS connected either with TV or Fridge, isnt it?
Wait... You may think why do i ask the above stupid question, isnt it ? :)
Hmmm! my question would make sense... read below,
Nowdays, people have forgotten the habit of Switching OFF the TV properly from the MAIN SWITCH. Have you seen these cases? The TV LED will be in RED eventhough the screen is blank, in this case, the TRANSFORMER utilizes the power for charging the circuits, since its connected with AC power directly... the end result, your METER BOX will be running like a black HORSE! :)
I would suggest you, do SWITCH off the appliances which you use TRANSFORMERS as a source,Stabilizer is a real time example for it... so... lets not forget the STABILIZER case... ;)
If you dont agree with my points, pl tell this buzzword along with me,
" I am ready to give my half of the salary to the ELECTIRICITY dept" ... :) ha ha!
Hope you are clear with the confusion we had been from a long time...
Will meet you with another nice topic!
Saturday, 16 June, 2007
Chain of questions for you this time, will you answer?
Would you help the people who are starving?
Would you help the people who stay in the unhygenic environment?
Would you help the people who are financially backwards?
If you agree with the above chain, you wouldnt feel hard to read the below one,
Would you help the TEAM or Organisation who does the humanitarian help for the poors?
Well, who does this outstanding service??
Bharat Sevashram Sangha (BSS), it is a spiritual brotherhood of monks and selfless workers devoted to the service of humanity, a philanthropic and charitable organization with non-sectarian , non-communal and non-political character and outlook.
The main objective of the current project is to support the humanitarian activities of Bharat Sevashram Sangha (BSS), Barajuri. The various activities of BSS are suffering acute financial crisis and that is hampering their positive efforts towards the well-being of the Backward classes of the surrounding area.
Please check the below link and please do the needful...
Lets give our helping hand to our poor INDIANS...
Our Country should get rid from poverty...
Jai Hind and God Bless!
Unisys, a worldwide technology services and solutions company, has procured a healthy contract from the US Department of Defence (DoD) is worth around £14.7m. Unisys began working with the DoD on RFID technology 13 years ago, to maintain and enhance an in-transit visibility system for supplies using RFID.
Unisys, an industry leader in the integration, deployment and support of automatic identification technology, and the U.S. Army have worked tirelessly to establish, develop, operate and maintain one of the largest, most successful RFID networks in the world.
Wait a minute, what is an RFID and whats the use of it??
This must be your question, if you havent heard of this technical name....isnt it?
Here comes the much awaited answer.., ;)
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can be attached to or incorporated into a product, animal, or person for the purpose of identification using radio waves. Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio frequency (RF) signal and perhaps other specialized functions. The second is an antenna for receiving and transmitting the signal. An emerging technology called chipless RFID allows for discrete identification of tags without an integrated circuit, thereby allowing tags to be printed directly onto assets at lower cost than traditional tags. They are widely used in the hospitals,defense or even used to track a particular object...
Ok... In what way RFID enables the Military operations??
Unisys tracks approximately 125,000 shipments of supplies each week, including ammunition, food/rations and water, medical supplies, vehicles, vehicle parts and aircraft. Attached to these shipments are RFID tags that store information vital to the soldier.
Unisys tracks shipments across all modes of transportation - truck, rail, ship and air - to their final destinations in combatant commands worldwide.
Fixed and handheld readers send and receive radio signals to and from the tags. Because data written to each tag are replicated among five servers, users worldwide have access to the same information on each item. Consequently, decision-makers at all levels of command and throughout the logistics supply chain can plan, prioritize and redirect shipments accordingly and collaboratively.
Lets not to dig this topic more deeply as it may eat our golden years... :)
See you all with another interesting topic soon...
Thursday, 14 June, 2007
RFID[Radio Frequency Identification] tags will be soon installed at the heathrow airport terminal 5, in order to monitor the Taxi exists to handle a predicted one million taxi movements when the 2012 Olympics begin.
The system will reduce taxi waiting times at what will be the world’s busiest airport and allow it control and track taxi access to the terminals. Fixed and handheld devices will monitor taxis, which will be equipped with RFID tags, to identify vehicles and their drivers. Data will then be transmitted back to system headquarters over a wireless network. Staff will also be able to communicate using the devices to ensure flexibility in the event of unplanned events like road works or accidents.
Hope u enjoyed it...
Will meet u all with another amazing topic... :)
SOA has been the buzz word in the IT industry nowdays. No wonder that it has been rocking the airways industry also... :)
The Scandinavian airline, last month has revealed,how it was implementing Tibco's ESB to link the legacy applications together.The project aims to give the airline a competitive advantage by helping it bring applications to market more rapidly.
Do u find this article more interesting, then go ahead with this amazing stuff,
Will keep posting some more interesting stuffs..
Sunday, 10 June, 2007
US Scientists have once again made an amazing job recently. Yes, they have developed a way to made it easier to power the other device wirelessly,by solidly testing an electric bulb.
The experiment set up goes in this way...
They have taken two 60 cm copper coils with an source(transmitter),which is attached to a power supply and the destination(receiver), placed 7 ft away to a light bulb.
The discovered technology could charge a 60W light bulb from a distance of 2m (7ft), which it could also be used to charge a LAPTOP in future, just to patch up the low battery problem which we many of us face nowdays... :)
It would be better if we could get better power from the source wirelessly, would be a way to solve plenty of issues in the daily life... Isnt it ?!!
Monday, 4 June, 2007
Forests officials in Ahmedabad have started following a new method to trap the Leopards,which destroys the village areas.
Officials have started keeping mooing ringtones in voice of cows,cattles in the way to catch this dangerous animal. What a intellectual brain, isnt it? :)
Check out this article,
See u again with another exciting topic,
Friday, 1 June, 2007
Rupee's value has been consistently improved in the global market against the Dollar value. This would be one of the true reasons for procuring this spot, i reckon.
Pl have a look at the article,
If this stage continues, i will promise you, the dollar value may not amplify further in mere future, which may decline to some near value around 35 in a short time.
lets keep our fingers crossed for this special day :)
Microsoft has finally introduced the Surface Computer in the market,chariman Bill Gates unveiled.
The 30-inch display screen is mounted under a plastic tabletop and will initially cost $5,000 to $10,000. It will, at first, only be available in select hotels, casinos, and T-Mobile stores in November.
This will going to be one of the most favorite products in the forthcoming years, but unfortunately the cost is little higher,which the middle class peopl have to sell their house! lol :)
Monday, 28 May, 2007
Qn: I've noticed that I am not allowed to use my cell phone in airplanes or in hospitals. Why are these prohibitions in place?
Most of us experience electromagnetic interference on a fairly regular basis.
· If I put my cell phone down on my desk near the computer, I can hear loud static in my computer's speakers every time the phone and the tower handshake. In the same way, my car's tape player produces loud static whenever I make a call on my cell phone.
· When I dial a number on my home's wireless phone, I can hear the number being dialed through the baby monitor.
· It is not uncommon for a truck to go by and have its CB radio overwhelm the FM station I am listening to.
· Most of us have come across motors that cause radio or TV static.
None of these things, technically, should be happening. For example, a truck's CB radio is not transmitting on the FM radio bands, so my radio should never hear CB signals. However, all transmitters have some tendency to transmit at lower power on harmonic side bands, and this is how the FM radio picks up the CB. The same thing holds true for the wireless phone crossing over to the baby monitor. In the case of the cell phone affecting the computer's speakers, the wire to each speaker is acting like an antenna, and it picks up side bands in the audible range.
These are not dire problems -- they are just a nuisance. But notice how common they are. In an airplane, the same phenomena can cause big trouble.
An airplane contains a number of radios for a variety of tasks. There is a radio that the pilots use to talk to ground control and air traffic control (ATC). There is another radio that the plane uses to disclose its position to ATC computers. There are radar units used for guidance and weather detection, and so on. All of these radios are transmitting and receiving information at specific frequencies. If someone were to turn on a cell phone, the cell phone would transmit with a great deal of power (up to 3 watts). If it happens to create interference that overlaps with radio frequencies the plane is using, then messages between people or computers may be garbled. If one of the wires in the plane has damaged shielding, there is some possibility of the wire picking up the phone's signals just like my computer's speakers do. That could create faulty messages between pieces of equipment within the plane.
Many hospitals have installed wireless networks for equipment networking. The black antenna sticking out of the top of the monitor connects it back to the nursing station via a wireless network. If you use your cell phone and it creates interference, it can disrupt the transmissions between different pieces of equipment. That is true even if you simply have the cell phone turned on -- the cell phone and tower handshake with each other every couple of minutes, and your phone sends a burst of data during each handshake.
The prohibition on laptops and CD players during takeoff and landing is addressing the same issue, but the concerns here might fall into the category of "better safe than sorry." A poorly shielded laptop could transmit a fair amount of radio energy at its operating frequency, and this could, theoretically, create a problem.
Saturday, 26 May, 2007
Sunday, 20 May, 2007
However, a SOA is more than just a collection of services; it adds a number of principles. Interoperability is the most important of these and is core to the idea of a SOA. Interoperability is achieved through the use of standards. The Web services standards stand out above all others in satisfying this requirement. Remote invocation is provided through SOAP, service interfaces are described using WSDL, and services are discovered through the use of UDDI. In fact, wherever possible, all aspects of the services should conform to the relevant standards. Showned are the sketch of SOA's approach & its benefits.
Another core feature of a SOA is the reuse of existing assets. Deployment of a SOA within an organization is an exercise in creating services from the existing IT systems and infrastructure. For example, systems exposed using object-based middleware are instead exposed using services that accept documents. Legacy systems such as mainframes can be exposed over standard transports and protocols.
Services should be self-contained, enabling them to be invoked directly by clients where necessary. SOA extends this idea to the aspects of services that might not be considered business logic. These include features such as security, logging, and auditing. Each service within the architecture should provide these features directly. This approach is vital if the deployed services are to form a truly distributed system. For example, a single point through which messages must flow in order to be audited leads to a hub-and-spoke architecture instead of the desired distributed system.
Presentation for the SOA could be found here,
Meet you all with another roborant topic! :)
Saturday, 19 May, 2007
The huge sum paid by Microsoft - more than treble any of its previous acquisitions - shows its desperation to enter the online advertising market after it failed to acquire DoubleClick, Yahoo, or Real Media, all areas of interest.
Yesterday advertising group WPP said it will pay $637m (£322m) to purchase loss making web advertising broker 24/7 Real Media , and Google has also recently acquired DoubleClick for $3.1bn (£1.57bn).
Last week Microsoft was rumoured to be in takeover talks with Yahoo, but this latest deal will likely quell those rumours.
'The advertising industry is evolving and growing at an incredible pace, moving increasingly toward online and IP-served platforms, which dramatically increases the importance of software for this industry,' said Steve Ballmer, chief executive officer of Microsoft.
'Today’s announcement represents the next step in the evolution of our ad network from our initial investment in MSN, to the full capacity of the internet.'
The aQuantive acquisition enables Microsoft to strengthen relationships with advertisers, agencies and publishers by improving its advertising platforms and services beyond its current capabilities to serve MSN.
The acquisition also provides Microsoft increased depth in building and supporting next generation advertising solutions and environments such as cross media planning, video-on-demand and IPTV.
Friday, 18 May, 2007
Let me give you the definition of Enterprise Application Integration(EAI) today!
Enterprise Application Integration (EAI) is defined as the uses of software and computer systems architectural principles to integrate a set of enterprise computer applications.
In today’s competitive and dynamic business environment, applications such as Supply Chain Management, Customer Relationship Management, Business Intelligence and Integrated Collaboration environments have become imperative for organizations that need to maintain their competitive advantage. Enterprise Application Integration (EAI) is the process of linking these applications and others in order to realize financial and operational competitive advantages.
When different systems can’t share their data effectively, they create information bottlenecks that require human intervention in the form of decision making or data entry. With a properly deployed EAI architecture, organizations are able to focus most of their efforts on their value-creating core competencies instead of focusing on workflow management.
For generations, systems have been built that have served a single purpose for a single set of users without sufficient thought to integrating these systems into larger systems and multiple applications. EAI is the solution to the unanticipated outcome of generations of development undertaken without a central vision or strategy. The demand of the enterprise is to share data and processes without having to make sweeping changes to the applications or data structures. Only by creating a method of accomplishing this integration can EAI be both functional and cost-effective.
One of the challenges facing modern organizations is giving all their workers complete, transparent and real-time access to information. Many of the legacy applications still in use today were developed using arcane and proprietary technologies, thus creating information silos across departmental lines within organizations. These systems hampered seamless movement of information from one application to the other. EAI, as a discipline, aims to alleviate many of these problems, as well as create new paradigms for truly lean proactive organizations. EAI intends to transcend the simple goal of linking applications, and attempts to enable new and innovative ways of leveraging organizational knowledge to create further competitive advantages for the enterprise.
EAI is a response to decades of creating distributed monolithic, single purpose applications leveraging a hodgepodge of platforms and development approaches. EAI represents the solution to a problem that has existed since applications first moved from central processors. Put briefly, EAI is the “unrestricted sharing of data and business processes among any connected application or data sources in the enterprise.”
Undoubtedly, there are a number of instances of stovepipe systems in an enterprise, such as inventory control systems, sales automation systems, general ledger systems, and human resource systems. These systems typically were custom-built with specific needs in mind, utilizing the technology-of-the-day. Many used non-standard data storage and application development technology.