Wednesday, April 26, 2006

Programmer poetry

This is what i got as a forward mail..



Nice one to read… But Personally, I don’t agree with the poetry. I don’t feel like staring at the monitor, rather I enjoy it !!!
But it may be due to the fact; I haven’t spent that much time with the software industry till now. May be with the passage of time, I also start feeling like boring. :)

Monday, April 24, 2006

Microsoft Internet Explorer 6 to Windows Internet Explorer 7

Windows Internet Explorer 7 beta has got some cool features other than most common visible multitab browsing support. Here are some of them:

1. Phishing Filter:-

Here are some FAQs about phishing from Internet Explorer Help.
What is phishing?
Online phishing (pronounced like the word fishing) is a way to trick computer users into revealing personal or financial information through an e-mail message or website. A common online phishing scam starts with an e-mail message that looks like an official notice from a trusted source, such as a bank, credit card company, or reputable online merchant. In the e-mail message, recipients are directed to a fraudulent website where they are asked to provide personal information, such as an account number or password. This information is then usually used for identity theft.
What is Phishing Filter and how can it help protect me?
Phishing Filter is a feature in Internet Explorer that helps detect phishing websites. Phishing Filter uses three methods to help protect you from phishing scams. First, it compares the addresses of websites you visit against a list of sites reported to Microsoft as legitimate. This list is stored on your computer. Second, it helps analyze the sites you visit to see if they have the characteristics common to a phishing website. Third, with your consent, Phishing Filter sends some website addresses to Microsoft to be further checked against a frequently updated list of reported phishing websites.
If the site you are visiting is on the list of reported phishing websites, Internet Explorer will display a warning webpage and a notification on the Address bar. From the warning webpage, you can continue or close the page. If the website contains characteristics common to a phishing site but isn't on the list, Internet Explorer will only notify you in the Address bar that it might possibly be a phishing website. You can click the notification for more information.
Is Phishing Filter always on?
No. When you first install Internet Explorer, Phishing Filter only compares the addresses of the websites you visit against the list of legitimate websites that is saved on your computer. It also helps analyze these sites to see if they have the characteristics common to a phishing website. No information is sent to Microsoft unless you choose to send it. The first time you visit a website that is not on the legitimate website list, you will be prompted to indicate whether you want to check websites automatically. If you choose this option, Phishing Filter will send certain website addresses to Microsoft to be checked against a frequently updated list of reported phishing sites and alert you about suspicious or reported phishing websites. If you choose not to check websites automatically, Phishing Filter will display an icon ( ) on the Internet Explorer status bar. To check the website, click the icon, and then click Check this Website. You can also check websites from Internet Explorer.

2. Zones:

Internet Explorer has different security zones for home internet users. Now, with Internet Explorer 7, it will automatically detect if user belongs to any intranet, then only intranet zone would be active. For home users, it would be inactive automatically to reduce the chance of using intranet zone settings by some malicious site.

3. Improved User Interface:

Internet Explorer 7 has improved User Interface a lot. It has better managed UI to use comparatively less space leaving more space for site navigation. Eg. Microsoft recognized very less use of File Menu, probably that’s the reason the File Menu remains hidden unless you press ALT key from your KeyBoard.

There can be a lot other features, which I could not explore. Would be great, if some one can add more in the list.

Guys who don’t want to take risk of using beta version (as I have noticed some of the sites crashing with Internet Explorer 7, at the same time working fine with Internet Explorer 6 or Firefox) and want to get some of these cool feature in their existing Internet Explorer 6, two of the most important features tabbed browsing and Phishing filters are available through MSN toolbar (Ad-In to Internet Explorer 6)

And yes… have you noticed? Microsoft has renamed Microsoft Internet Explorer to Windows Internet Explorer.

Monday, April 17, 2006

Google Calendar

Quick Digest

Thursday, April 13, 2006

PJ is flying to Japan

Just a good news to share.. My friend PJ, he is flying to Japan for some conference. I dont know much about VOIP world, but he told me its not just any conference, but its one of the best conferences related to VOIP.
Great !!!

Apple Macs ready to boot with windows XP

Great News for Mac && Windows lovers.
Now apple mac would be able to boot with windows XP. Apple is in beta testing of their Boot Camp Software to make it possible. User would be provided options to choose OS to boot with like we have when we install multiple version of windows OS or linux with window. Only a few things before your mac boots with windows.

- You will need to purchase Windows XP.
- Only new Macs with Intel Processor support this dual boot.

Wednesday, April 12, 2006

Internet Explorer Developer Toolbar released

The Internet Explorer Developer Toolbar provides several features for exploring and understanding Web pages. This is just great to explore contents of any page including DOM, CSS, HTML elements and quite a lot of other things related to any page.
Download is available here

Here is the complete feature list :

 Explore and modify the document object model (DOM) of a Web page.
 Locate and select specific elements on a Web page through a variety of techniques.
 Selectively disable Internet Explorer settings.
 View HTML object class names, ID's, and details such as link paths, tab index values, and access keys.
 Outline tables, table cells, images, or selected tags.
 Validate HTML, CSS, WAI, and RSS Web feed links.
 Display image dimensions, file sizes, path information, and alternate (ALT) text.
 Immediately resize the browser window to a new resolution.
 Selectively clear the browser cache and saved cookies. Choose from all objects or those associated with a given domain.
 Choose direct links to W3C specification references, the Internet Explorer team weblog (blog), and other resources.
 Display a fully featured design ruler to help accurately align and measure objects on your pages.

How Bill Gates works !!!

Here is How Bill works

Article tell about what all tools/applications he use to improve his productivity. Just like, he has three screens in his office synchronized together, to make one big display screen to manage things easily.

Follow the link for complete details. I would just say..Nice read !!!

Monday, April 03, 2006

Fwd:The Steve Jobs Question

This is what, i got as a forwarded mail from one of my friend.
Nice read...

-----------------------------------
From: Shankar, Gauri
Sent: Monday, April 03, 2006 9:24 PM
Subject: The Steve Jobs Question - by Robin Sharma

I've been hearing a lot about Apple CEO Steve Jobs lately - his winning ways with the iPod, his transformation of Apple, his achievements with film studio Pixar. He's a pretty interesting guy, from what I can gather. Brilliant. Driven. Passionate. He's also a philosopher.

Jobs spent some formative time in India. He studied with sages. He visited meditation retreats. He pondered life's big questions. Speaking of questions, I've heard there's one in particular that he asks himself every time he faces a big decision or choice point in his life: “what would I do if this was the last night of my life?” I love it.

No one on their deathbed ever regretted the risks that they took. The place of least security is in the security zone. To live a big life, it's essential that you take calculated risks - often. Without daring, there can be no winning. Steve Jobs met his wife that way. He was giving a speech at a university and spotted her in the audience. He met her after the event and wanted to take her to dinner - but he had a business meeting. As he walked to his car, he asked himself: “if this was the last night of my life, what would I do?” He ran back to the auditorium and found her. They've been together ever since.

This is a great time to reflect. You are leaving one year and welcoming in another. Go deep. Reflect on what To Dos you have not done because fear got in the way. Think about how quickly life is passing and what needs to get done so you feel you played your best game as a human being. And then walk out into the world - and shine. We'll all be better off once you do.
“iCon”, the new biography on Apple CEO Steve Jobs (Apple sold 18 million iPods in 2005). It's a superb read. Gives you an inside glimpse of the thinking, behavior and life of a modern day business genius. Love him or not, the guy's a true visionary.

With Regards,
Gauri Shankar

Puzzle - 2

Here comes another puzzle.

Card trick without the trick!!

This is a card trick without the trick. There is no sleight of hand, no tricks up my sleeve, no magic whatsoever. It’s all done with logic, yet it will amaze most people. Joel and I are working together as a team to do the trick. Babak will be the culprit.
I ask babak to pick 5 cards out of a deck. He can pick any five cards, he can shuffle the deck 7 times, and it really doesn't matter. He honestly picks out 5 cards that I cannot see. He hands the five cards to me (Joel can't see any of this). I look at the cards and I pick 1 card out and give it back to Babak. I then arrange the other four cards in a special way, and give those 4 cards all face down, and in a neat pile, to Joel. Joel looks at the 4 cards I gave him, and says out loud which card babak is holding
(Suit and number). I did not convey any information to Joel other than the way i ordered the 4 cards, (all face down, aligned in line with one another) so how did I encode babak's card using that method?

Solutions are welcomed. (plz don’t use google !!! )