Hey Readers,
The Dell PowerEdge M1000e Modular Blade Enclosure is a breakthrough in enterprise server architecture. Built from the ground up using energy smart technologies the M1000e is designed to combat datacenter sprawl and IT complexity. The M1000e delivers one of the most energy efficient, flexible, and manageable blade server product on the market. Flexible and scalable, the M1000e is designed to support future generations of blade technologies so your investment is protected for the future. The M1000e is optimized for use with all Dell PowerEdge Blades.
Energy Efficiency That Can’t Be Beat
The M1000e is the most power efficient blade solution on the market, built on Dell’s energy smart technology. The M1000e can help customers to increase capacity, lower operating costs, and delivers better performance/watt than leading blade competitors. The M1000e enclosure takes advantage of thermal design efficiencies, such as ultra-efficient power supplies, dynamic power efficient fans with optimized airflow design to efficiently cool the chassis and enable better performance in a lower power envelope. Energy efficiency and performance/watt that HP and IBM can’t beat.
Dell blade servers deliver performance and efficiency without compromise. The PowerEdge M1000e with the M600performs up to 12% 1 better than the IBMBladeCenter H, delivers up to 25% 2 better performance/watt than both the HP BladeSystem c-Class 2 and consumes up to 19% 3 less power than HP BladeSystem c-Class, which can help customers to increase capacity and lower operating costs .
Dell Provides Complete On Demand Switch Scaling
More available I/O slots than previous Dell blades and modular switch options provide the flexibility to meet the increasing demand for improved I/O. The M1000e utilises low cost, modular switches that can easily and cost effectively scale to provide additional uplink and stacking functionality. Flexibility and scalability to maximise TCO.
Easy to Use, Powerful Management Tools
The M1000e helps reduce the cost and complexity of managing computing resources so you can focus on growing your business or managing your organisation.
* Centralised management controllers provide redundant, secure access paths for IT administrators to manage multiple enclosures and blades from a single console making the M1000e one of the easiest blade solutions to manage.
* Dynamic power management provides the capability to set high/low power thresholds to help ensure blades operate within your power envelope.
* Real time reporting for enclosure and blade power consumption, and the ability to prioritise blade slots for power provide optimal control over power resources.
* One of the only blade solutions with an integrated KVM switch, enabling easy set up and deployment, and seamless integration into an existing KVM infrastructure.
Chassis Enclosure
Form Factor: 10U modular enclosure holds up to sixteen half-height blade servers
440.5mm (17.34") H x 447.5mm (17.62")W x 753.6mm (29.67")D
Weight:
Empty Chassis only – 98lbs (44.5kg)
Chassis w/ all rear modules (IOMs, PSUs, CMCs, KVM) - 176lbs (79.8kg)
Max Fully loaded w/ blades and rear modules - 394lbs (178.7kg)
Power Supplies
3 (non-redundant) or 6 (redundant) 2360 watt hot plug power supplies
Based on Dell’s Energy Smart Technologies, the M1000e Power Supplies deliver greater levels of efficiency,
even at very low levels of utilisation
Redundant Power Supplies support 3+3 (AC redundancy), 3+1 (Power Supply Redundancy),
or 3 + 0 (non-redundant) modes
System supports new Dynamic Power Supply Engagement functionality, which (if enabled) puts lightly
loaded power supplies into standby mode, driving up the utilisation and thus the efficiency on the active supplies
Power Supplies Require 200+ volt AC input
Dell offers a wide range of Power Distribution options for the M1000e with 20A, 30A, 60A single phase,
or 30A three phase options
Uninterruptible Power Supplies
1000W-5600W
2700W-5600W High Efficiency Online
Extended Battery Module (EBM)
Network Management Card
Cooling Fans
M1000e Chassis comes standard with 9 hot pluggable, redundant fan modules
Based on Energy Smart Technologies, M1000e fans are a breakthrough in power and cooling efficiency.
The fans deliver low power consumption, but also use next generation “low flow” technology to ensure the
lowest possible amount of fresh air is consumed to cool the enclosure
Input Device
Front Control Panel with interactive Graphical LCD
Supports initial configuration wizard
Local server blade, enclosure, and module information and troubleshooting
Two USB Keyboard/Mouse connections and one Video connection (requires the optional Avocent iKVM switch
to enable these ports) for local front “crash cart” console connections that can be switched between blades
Enclosure I/O Modules
Up to six total I/O modules for three redundant fabrics, featuring Ethernet FlexIO Switches providing
on demand stacking and uplink scalability.
PowerConnectTM M6220 Ethernet Switch
Includes 4 x fixed copper 10/100/1000Mb Ethernet uplinks plus 2 of the following optional modules:
2 x 24Gb Stacking Ports
2 x 10Gb Optical (XFP-SR/LR) uplinks
2 x 10Gb copper CX4 uplinks
Standard Features include
Layer 3 routing (OSPF, RIP, VRRP)
IPv6 support
Layer 2/3 QoS
Access Control Lists
Dell Ethernet Pass-Through Module
Supports 16 x 10/100/1000Mb copper RJ45 connections
Only Ethernet Pass-through module on the market that supports full range of 10/100/1000Mb operation
Brocade® M4424 SAN I/O Module
Access Gateway Mode or FC Switch
Access Gateway Mode enables NPIV functionality on external ports which delivers enhanced fabric interoperability, simplified set up, and doesn’t consume an FC domain
12 or 24 port versions with 4 or 8 x FC 1/2/4Gb SFPs respectively
4Gb Fibre Channel Pass-Through Module
16 x FC 1/2/4Gb SFP ports
Management
System Management
Dell OpenManageTM System Management
Integration into 3rd party management solutions via Dell’s Preferred Partner Program
Remote Management
1 (standard) or optional 2nd (redundant) Chassis Management Controller(s) (CMC) which provide:
Single secure interface for inventory, configuration, monitoring, and alerting for the chassis and all components
Real Time Power/Thermal Monitoring and Management
Real Time System AC Power Consumption with reset-able peak and minimum values
System level power limiting and slot based power prioritisation
Manages Dynamic Power Engagement functionality
Manages fan speed control
Secure Web (SSL) and CLI (Telnet/SSH) interfaces
Supports multiple levels of user roles and permissions, including integration into Microsoft Active Directory Services
2 x 10/100/1000Mb Ethernet ports + 1 serial port
Provides single point of connection from management network to iDRAC on each of the blades and the management interfaces on the integrated I/O Modules
2nd Ethernet port supports daisy chaining of CMCs for improved cable management
Optional Integrated Avocent® keyboard, video and mouse (iKVM) switch
Enables USB and video port on front control panel
iKVM module has 2 x USB, video, and Analog Console Interface (ACI) ports
ARI port allows connectivity and seamless tiering via cat5 cables to Dell or Avocent KVM switches with Analog Rack Interface (ARI) ports.
Storage
External Storage Options:
Dell/EMC fibre channel and/or iSCSI external storage
Dell EqualLogic PS Series Storage, including PS6000E, PS6500E, PS6000X, PS6000XV, PS6000S, PS4000E, PS4000X, & PS4000XV arrays.
Thank you for reading !!!
Tuesday, May 25, 2010
Facebook - Failures in Privacy.............
Hey Readers,
Facebook has accepted their failure in Privacy.....
Social networking giant Facebook has admitted that it had made mistakes in its privacy policies and promised to roll out new tools that would make it easier for its 400 million users to control their personal data.
Mark Zuckerberg, the 26-year-old billionaire founder of the second most popular site on the internet, made the admission in a column that appeared in the Washington Post on Monday amid growing user anger sparked by a string of privacy glitches.
Zuckerberg's Words
"The biggest message we have heard recently is that people want easier control over their information," wrote Zuckerberg. "Simply put, many of you thought our controls were too complex. Our intention was to give you lots of granular controls; but that may not have been what many of you wanted."
Zuckerberg said that the company would introduce simpler privacy settings within weeks, as well as a way to block all third-party services.
Facebook has often come in for criticism of its privacy policy, whose default setting is to allow large amounts of personal data to be viewed and searched by the public. Criticism grew following the introduction of new features recently that extended Facebook buttons across numerous internet sites and could have exposed users' browsing habits to others.
Thank you for reading !!
Facebook has accepted their failure in Privacy.....
Social networking giant Facebook has admitted that it had made mistakes in its privacy policies and promised to roll out new tools that would make it easier for its 400 million users to control their personal data.
Mark Zuckerberg, the 26-year-old billionaire founder of the second most popular site on the internet, made the admission in a column that appeared in the Washington Post on Monday amid growing user anger sparked by a string of privacy glitches.
Zuckerberg's Words
"The biggest message we have heard recently is that people want easier control over their information," wrote Zuckerberg. "Simply put, many of you thought our controls were too complex. Our intention was to give you lots of granular controls; but that may not have been what many of you wanted."
Zuckerberg said that the company would introduce simpler privacy settings within weeks, as well as a way to block all third-party services.
Facebook has often come in for criticism of its privacy policy, whose default setting is to allow large amounts of personal data to be viewed and searched by the public. Criticism grew following the introduction of new features recently that extended Facebook buttons across numerous internet sites and could have exposed users' browsing habits to others.
Thank you for reading !!
Monday, May 24, 2010
DELL Inspiron 15R - Sync Your Busy Life....
Hey Readers,
DELL has brought forward a very high-tech laptop to the masses.
Simplify your every day
Tackle daily tasks in style with the newly updated Inspiron 15R (T540505IN8) latest features and technology.
* A newly designed 15.6" widescreen HD display brings life closer
* Expect more with Intel CoreTM i3 and i5 processors
* Brighten your world with a premium brushed finish and 4 vibrant colours
This laptop has an average customer rating of 4.3 out of 5 stars.
Some amazing tech features of this laptop are:
*Light weight desidn for on the go.
*Optimised for Wireless connectivity.
*Great for Video editing.
*Play DVD movies.
Below are some details......
Intel® Core™ i5-430M Processor (2.26Ghz, 4 Threads, Turbo Boost up to 2.53 GHz, 3M cache).
Genuine Windows® 7 Home Premium 64bit (English).
4GB (2 X 2 GB) 2 DIMM DDR3 1333Mhz.
320GB 5400RPM Hard Drive.
15.6 Widescreen HD WLED Glossy Display with TrueLife™ (1366x768).
ATI Mobility Radeon™ HD 5470 - 1GB (India).
12.7" SATA Tray Load DVD+/-RW.
Dell Wireless 1501.
McAfee(R) Security Center (Multi-Language) - 30-Day Trial.
1 Yr Ltd Hardware Warranty, InHome Service after Remote Diagnosis.
Processors
Intel® CoreTM i3 processors
Intel® CoreTM i5 processors
Operating System
Genuine Windows® 7 Home Basic 64-Bit
Genuine Windows® 7 Home Premium 64-Bit
Memory
Up to 6GB3 1333MHz DDR3 SDRAM4
Chipset
Mobile Intel® 5 Series Express Chipset (HM57)
Graphics
Standard Intel® HD Graphics
Optional ATi Mobility RadeonTM HD 5470 - 512MB
Optional ATi Mobility RadeonTM HD 5470 - 1GB
LCD Display
15.6” Widescreen HD glossy WLED display with TrueLife™ Panel
Audio and Speakers
SRS Premium SoundTM - 2 speakers @ 2W each
Hard Drives
Up to 640GB3 configured with a 5400 RPM SATA hard drive
Optical Drives
12.7 Tray Load DVD+/-RW with Dual Layer DVD+R write capability
Power
6 cell 48 WHr Li-Ion Battery
9 cell 90 WHr Li-Ion Battery (optional)
Camera
1.3MP Integrated Webcam with Microphone
Wireless
Wi-Fi Option:
Standard Dell Wireless 1501 802.11 g/n
Bluetooth
DellTM Wireless 365 Bluetooth® Internal (2.1+EDR) Mini-Card
Dont waste your time.....GO and BUY!!
Thank you for reading !!
DELL has brought forward a very high-tech laptop to the masses.
Simplify your every day
Tackle daily tasks in style with the newly updated Inspiron 15R (T540505IN8) latest features and technology.
* A newly designed 15.6" widescreen HD display brings life closer
* Expect more with Intel CoreTM i3 and i5 processors
* Brighten your world with a premium brushed finish and 4 vibrant colours
This laptop has an average customer rating of 4.3 out of 5 stars.
Some amazing tech features of this laptop are:
*Light weight desidn for on the go.
*Optimised for Wireless connectivity.
*Great for Video editing.
*Play DVD movies.
Below are some details......
Intel® Core™ i5-430M Processor (2.26Ghz, 4 Threads, Turbo Boost up to 2.53 GHz, 3M cache).
Genuine Windows® 7 Home Premium 64bit (English).
4GB (2 X 2 GB) 2 DIMM DDR3 1333Mhz.
320GB 5400RPM Hard Drive.
15.6 Widescreen HD WLED Glossy Display with TrueLife™ (1366x768).
ATI Mobility Radeon™ HD 5470 - 1GB (India).
12.7" SATA Tray Load DVD+/-RW.
Dell Wireless 1501.
McAfee(R) Security Center (Multi-Language) - 30-Day Trial.
1 Yr Ltd Hardware Warranty, InHome Service after Remote Diagnosis.
Processors
Intel® CoreTM i3 processors
Intel® CoreTM i5 processors
Operating System
Genuine Windows® 7 Home Basic 64-Bit
Genuine Windows® 7 Home Premium 64-Bit
Memory
Up to 6GB3 1333MHz DDR3 SDRAM4
Chipset
Mobile Intel® 5 Series Express Chipset (HM57)
Graphics
Standard Intel® HD Graphics
Optional ATi Mobility RadeonTM HD 5470 - 512MB
Optional ATi Mobility RadeonTM HD 5470 - 1GB
LCD Display
15.6” Widescreen HD glossy WLED display with TrueLife™ Panel
Audio and Speakers
SRS Premium SoundTM - 2 speakers @ 2W each
Hard Drives
Up to 640GB3 configured with a 5400 RPM SATA hard drive
Optical Drives
12.7 Tray Load DVD+/-RW with Dual Layer DVD+R write capability
Power
6 cell 48 WHr Li-Ion Battery
9 cell 90 WHr Li-Ion Battery (optional)
Camera
1.3MP Integrated Webcam with Microphone
Wireless
Wi-Fi Option:
Standard Dell Wireless 1501 802.11 g/n
Bluetooth
DellTM Wireless 365 Bluetooth® Internal (2.1+EDR) Mini-Card
Dont waste your time.....GO and BUY!!
Thank you for reading !!
Apple iPhone 3G S - Like No Other.....
Hey Readers,
This year Apple has launched a very low budget phone called iPhone 3G S that has good looks as well as other eye- catching features.
It is priced at $99.00/-.
College students should choose this handy iPhone.
THE GOOD
The Apple iPhone 3G offers critical new features including support for high-speed 3G networks, third-party applications, and expanded e-mail. Its call quality is improved and it continues to deliver an excellent music and video experience.
THE BAD
The iPhone 3G continues to lack some basic features that are available on even the simplest cell phone. Battery life was uneven, and the 3G connection tended to be shaky. Also, the e-mail syncing is not without its faults.
THE BOTTOM LINE
The iPhone 3G delivers on its promises by adding critical features and sharper call quality. The iTunes App Store is pretty amazing, and the 3G support is more than welcome. Critical features still are missing, and the battery depletes quickly under heavy use, but the iPhone 3G is a big improvement over the original model.
LOOK AT IT ONCE AGAIN !!
You will not regret your wise decision......
Thank you for reading!!
This year Apple has launched a very low budget phone called iPhone 3G S that has good looks as well as other eye- catching features.
It is priced at $99.00/-.
College students should choose this handy iPhone.
THE GOOD
The Apple iPhone 3G offers critical new features including support for high-speed 3G networks, third-party applications, and expanded e-mail. Its call quality is improved and it continues to deliver an excellent music and video experience.
THE BAD
The iPhone 3G continues to lack some basic features that are available on even the simplest cell phone. Battery life was uneven, and the 3G connection tended to be shaky. Also, the e-mail syncing is not without its faults.
THE BOTTOM LINE
The iPhone 3G delivers on its promises by adding critical features and sharper call quality. The iTunes App Store is pretty amazing, and the 3G support is more than welcome. Critical features still are missing, and the battery depletes quickly under heavy use, but the iPhone 3G is a big improvement over the original model.
LOOK AT IT ONCE AGAIN !!
You will not regret your wise decision......
Thank you for reading!!
Thursday, May 20, 2010
Nokia N85 - Be The FreeBee Of Today !!!
Hey Readers,
Nokia has launches a marvrelous mobile handset that will steal your heart at the first sight.
This mobile is priced at a affordable amount of Rs 10,000/- .
Here below are the specifications of the Nokia N85.........
# GENERAL 2G Network GSM 850 / 900 / 1800 / 1900
# 3G Network HSDPA 900 / 1900 / 2100
# HSDPA 850 / 1900 / 2100 American version
# Announced 2008, August
# Status Available. Released 2008, October
# SIZE Dimensions 103 x 50 x 16 mm, 76 cc
# Weight 128 g
# DISPLAY Type OLED, 16M colors
# Size 240 x 320 pixels, 2.6 inches
# Accelerometer sensor for autorotate
# Touchsensitive Navi wheel
# SOUND Alert types Vibration; Downloadable polyphonic, monophonic, MP3 ringtones
# Speakerphone : Yes, with stereo speakers
# 3.5 mm audio jack
# MEMORY Phonebook Practically unlimited entries and fields, Photocall
# Call records Detailed, max 30 days
# Internal 85 MB
# Card slot microSD (TransFlash), up to 8GB, hotswap, 8GB card included, buy memory
# DATA GPRS Class 32, 107 / 64.2 kbps
# HSCSD : Yes, 43.2 kbps
# EDGE Class 32, 296 kbps; DTM Class 11, 177 kbps
# 3G HSDPA, 3.6 Mbps
# WLAN WiFi 802.11 b/g, UPnP technology
# Bluetooth : Yes, v2.0 with A2DP
# Infrared port : No
# USB : Yes, v2.0 microUSB
# CAMERA Primary 5 MP, 2592x1944 pixels, Carl Zeiss optics, autofocus, LED flash
# Video : Yes, VGA@30fps
# Secondary CIF videocall camera
# FEATURES OS Symbian OS 9.3, S60 rel. 3.2
# CPU ARM 11 369 MHz CPU
# Messaging SMS, MMS, Email, Instant Messaging
# Browser WAP 2.0/xHTML, HTML, RSS reader
# Radio Stereo FM radio with RDS; FM transmitter; Visual radio
# Games Downloadable
# Colors Copper
# GPS : Yes, with AGPS support; : Nokia Maps 2.0
# Java : Yes, MIDP 2.1
# Dual slide design
# MP3/AAC/AAC+/eAAC+/WMA player
# TVout
# Organizer
# Document viewer (Word, Excel, PowerPoint, PDF)
# T9
# Push to talk
# Voice dial/memo
# BATTERY Standard battery, LiIon 1200 mAh (BL5K )
# Standby Up to 363 h (2G) / 360 h (3G)
# Talk time Up to 6 h 50 min (2G) / 4 h 30 min (3G)
Make the right choice right away !!!
Thank you for reading !!
Nokia has launches a marvrelous mobile handset that will steal your heart at the first sight.
This mobile is priced at a affordable amount of Rs 10,000/- .
Here below are the specifications of the Nokia N85.........
# GENERAL 2G Network GSM 850 / 900 / 1800 / 1900
# 3G Network HSDPA 900 / 1900 / 2100
# HSDPA 850 / 1900 / 2100 American version
# Announced 2008, August
# Status Available. Released 2008, October
# SIZE Dimensions 103 x 50 x 16 mm, 76 cc
# Weight 128 g
# DISPLAY Type OLED, 16M colors
# Size 240 x 320 pixels, 2.6 inches
# Accelerometer sensor for autorotate
# Touchsensitive Navi wheel
# SOUND Alert types Vibration; Downloadable polyphonic, monophonic, MP3 ringtones
# Speakerphone : Yes, with stereo speakers
# 3.5 mm audio jack
# MEMORY Phonebook Practically unlimited entries and fields, Photocall
# Call records Detailed, max 30 days
# Internal 85 MB
# Card slot microSD (TransFlash), up to 8GB, hotswap, 8GB card included, buy memory
# DATA GPRS Class 32, 107 / 64.2 kbps
# HSCSD : Yes, 43.2 kbps
# EDGE Class 32, 296 kbps; DTM Class 11, 177 kbps
# 3G HSDPA, 3.6 Mbps
# WLAN WiFi 802.11 b/g, UPnP technology
# Bluetooth : Yes, v2.0 with A2DP
# Infrared port : No
# USB : Yes, v2.0 microUSB
# CAMERA Primary 5 MP, 2592x1944 pixels, Carl Zeiss optics, autofocus, LED flash
# Video : Yes, VGA@30fps
# Secondary CIF videocall camera
# FEATURES OS Symbian OS 9.3, S60 rel. 3.2
# CPU ARM 11 369 MHz CPU
# Messaging SMS, MMS, Email, Instant Messaging
# Browser WAP 2.0/xHTML, HTML, RSS reader
# Radio Stereo FM radio with RDS; FM transmitter; Visual radio
# Games Downloadable
# Colors Copper
# GPS : Yes, with AGPS support; : Nokia Maps 2.0
# Java : Yes, MIDP 2.1
# Dual slide design
# MP3/AAC/AAC+/eAAC+/WMA player
# TVout
# Organizer
# Document viewer (Word, Excel, PowerPoint, PDF)
# T9
# Push to talk
# Voice dial/memo
# BATTERY Standard battery, LiIon 1200 mAh (BL5K )
# Standby Up to 363 h (2G) / 360 h (3G)
# Talk time Up to 6 h 50 min (2G) / 4 h 30 min (3G)
Make the right choice right away !!!
Thank you for reading !!
Wednesday, May 19, 2010
Sony Ericsson XPERIA X10 Mini
Hey Readers,
Sony has launched a very stylish yet slim and sleak mobile called the Sony Ericsson XPERIA X10 Mini and also known as Sony Ericsson Robyn.
It is priced at a very affordable price of Rs 35,800/-.
Here are the Specifications about the PHONE:>>>>>>>
General 2G Network GSM 850 / 900 / 1800 / 1900
3G Network HSDPA 900 / 2100
HSDPA 850 / 1900 / 2100
Announced 2010, February
Status Coming soon..........
Size Dimensions 83 x 50 x 16 mm
Weight 88 g
Display Type TFT capacitive touchscreen, 16M colors
Size 240 x 320 pixels, 2.55 inches
- Scratch-resistant surface
- Accelerometer sensor for UI auto-rotate
- Timescape UI
Sound Alert types Vibration, MP3 ringtones
Speakerphone Yes
- 3.5 mm audio jack
Memory Phonebook Practically unlimited entries and fields, Photocall
Call records Practically unlimited
Internal 128MB
Card slot microSD, up to 16GB, 2GB included
Data GPRS Class 10 (4+1/3+2 slots), 32 - 48 kbps
EDGE Class 10, 236.8 kbps
3G HSDPA; HSUPA
WLAN Wi-Fi 802.11b/g
Bluetooth Yes, v2.1 with A2DP
Infrared port No
USB Yes, v2.0 microUSB
Camera Primary 5 MP, 2560х1920 pixels, autofocus, LED flash
Features Geo-tagging
Video Yes, VGA@30fps, video light
Secondary No
Features OS Android OS 1.6
CPU Qualcomm MSM7227 600MHz
Messaging SMS (threaded view), MMS, Email, Push email, IM
Browser HTML
Radio Stereo FM radio with RDS
Games Yes
Colors Pearl White, Black, Pink, Lime, Red, Silver
GPS Yes, with A-GPS support
Java Yes, via third-party application
- MP4/H.263/H.264/WMV player
- MP3/eAAC+/WMA/WAV player
- Google Search, Maps, Gmail,
YouTube, Calendar, Google Talk
- Google Voice Search (market dependent)
- Digital compass
- TrackID music recognition
- Document viewer
- Voice memo
- T9
Battery Standard battery, Li-Po
Stand-by Up to 285 h (2G) / Up to 360 h (3G)
Talk time Up to 4 h (2G) / Up to 3 h 30 min (3G)
I hope you are satisfied with the information in this post and you go ahead...................buying this fully equiped mobile.................at a very good price.
Thank you for reading !!!
Sony has launched a very stylish yet slim and sleak mobile called the Sony Ericsson XPERIA X10 Mini and also known as Sony Ericsson Robyn.
It is priced at a very affordable price of Rs 35,800/-.
Here are the Specifications about the PHONE:>>>>>>>
General 2G Network GSM 850 / 900 / 1800 / 1900
3G Network HSDPA 900 / 2100
HSDPA 850 / 1900 / 2100
Announced 2010, February
Status Coming soon..........
Size Dimensions 83 x 50 x 16 mm
Weight 88 g
Display Type TFT capacitive touchscreen, 16M colors
Size 240 x 320 pixels, 2.55 inches
- Scratch-resistant surface
- Accelerometer sensor for UI auto-rotate
- Timescape UI
Sound Alert types Vibration, MP3 ringtones
Speakerphone Yes
- 3.5 mm audio jack
Memory Phonebook Practically unlimited entries and fields, Photocall
Call records Practically unlimited
Internal 128MB
Card slot microSD, up to 16GB, 2GB included
Data GPRS Class 10 (4+1/3+2 slots), 32 - 48 kbps
EDGE Class 10, 236.8 kbps
3G HSDPA; HSUPA
WLAN Wi-Fi 802.11b/g
Bluetooth Yes, v2.1 with A2DP
Infrared port No
USB Yes, v2.0 microUSB
Camera Primary 5 MP, 2560х1920 pixels, autofocus, LED flash
Features Geo-tagging
Video Yes, VGA@30fps, video light
Secondary No
Features OS Android OS 1.6
CPU Qualcomm MSM7227 600MHz
Messaging SMS (threaded view), MMS, Email, Push email, IM
Browser HTML
Radio Stereo FM radio with RDS
Games Yes
Colors Pearl White, Black, Pink, Lime, Red, Silver
GPS Yes, with A-GPS support
Java Yes, via third-party application
- MP4/H.263/H.264/WMV player
- MP3/eAAC+/WMA/WAV player
- Google Search, Maps, Gmail,
YouTube, Calendar, Google Talk
- Google Voice Search (market dependent)
- Digital compass
- TrackID music recognition
- Document viewer
- Voice memo
- T9
Battery Standard battery, Li-Po
Stand-by Up to 285 h (2G) / Up to 360 h (3G)
Talk time Up to 4 h (2G) / Up to 3 h 30 min (3G)
I hope you are satisfied with the information in this post and you go ahead...................buying this fully equiped mobile.................at a very good price.
Thank you for reading !!!
CHELSEA - The Team That Wins Glouriously !!!!
Hey Readers,
Overview
Chelsea have regained the Premier League crown after finishing second to Manchester United in the last three seasons. Former manager Jose Mourinho, bankrolled by owner Roman Abramovich's millions, brought the first title to Stamford Bridge for 50 years when the Blues lifted the trophy in 2005. Chelsea became only the second team to win back-to-back Premier League titles when they clinched it a year later. Mourinho left the club by mutual consent in September 2007.
Although Chelsea reached the FA Cup final in 1994, they hardly set the world alight in their early Premier League days. Ruud Gullit became manager in 1996 and steered the Blues to an FA Cup triumph in 1997, while his successor Gianluca Vialli guided the team to victory in the League Cup and European Cup Winners' Cup in 1998.
Shortly after, he led the team to the UEFA Super Cup after a 1-0 win over Real Madrid. The FA Cup followed in 2000. Vialli was replaced by Claudio Ranieri in 2000 and he led Chelsea to another FA Cup final appearance in 2002.
Russian billionaire Roman Abramovich bought the Blues for £140m. After a trophyless season, he appointed Mourinho as new Chelsea manager and there was instant success. In 2005, Chelsea won the Barclays Premiership and League Cup, along with a Champions League semi-final appearance.
And Mourinho retained the Barclays Premiership crown the year after, equalling the club's own Premier League record of 29 wins set the previous season. They were league runners-up in 2006/07 and also claimed the FA Cup and League Cup double.
They were also runners-up in the 2007/08 campaign, but by this time Mourinho had left the club. He was replaced by Avram Grant who led the Blues to the final of the Champions League and Carling Cup.
Grant left Stamford Bridge at the end of the season and was replaced by Luiz Felipe Scolari who was tasked with bringing the title back to the club. However he was sacked in February 2009 and replaced by Guus Hiddink who agreed to take charge until the end of the campaign while continuing to coach the Russian national side. He was hugely popular with fans and players and he led them to success in the FA Cup final, beating Everton 2-1.
His decision to stick with Russia saw Chelsea bring in former AC Milan coach Carlo Ancelotti who enjoyed a stunning first season in English football, guiding Chelsea to the Barclays Premier League title in some style. They hit 103 goals to set a new Premier League goalscoring record with Didier Drogba notching 29 to claim the Barclays Golden Boot.
Club Heritage
Chelsea were formed in 1905 and were elected into the Second Division of the Football League. They just missed out on silverware 10 years later with an FA Cup final defeat. The Blues had to wait for their first major trophy in 1955, when under manager Ted Drake, they won the league title. Chelsea claimed the League Cup for the first time in 1965 and were defeated in the FA Cup final two years later.
Featuring the likes of Ron 'Chopper' Harris, Ian Hutchison and Peter Osgood, Chelsea overcame Leeds to win the FA Cup in 1970. In the following season, they clinched the European Cup Winners' Cup with a replay victory over Real Madrid.
Financial problems meant the Stamford Bridge club dropped into the Second Division, and at one point they were close to falling to the Third Division.
They eventually won their place back in the top flight in 1984, but their stay only lasted four seasons. They clawed their way back to the First Division again as Second Division champions in 1989 and have remained in the top flight ever since.
Premier League History
1992/93 - Inaugural members of the Premier League
1993/94 - Lose FA Cup final
1996/97 - Ruud Gullit appointed player-manger
1996/97 - Win FA Cup
1997/98 - Gianluca Vialli becomes manager
1997/98 - Win League Cup, Cup Winners' Cup and UEFA Super Cup
1999/00 - FA Cup winners
2000/01 - Claudio Ranieri becomes manager
2001/02 - Lose FA Cup final
2003/04 - Chairman Ken Bates sells Chelsea to Roman Abramovich
2000/05 - Jose Mourinho takes over as manager
2004/05 - Chelsea win Barclays Premiership and League Cup
2005/06 - Chelsea win Barclays Premiership
2006/07 - Win FA Cup and League Cup
2007/08 - Jose Mourinho leaves the club to be replaced by Avram Grant. Runners up in the Carling Cup, Barclays Premier League and Champions League. Part company with Grant. Luiz Felipe Scolari appointed manager in June.
2008/09 - Scolari is sacked in February 2009 and replaced by Russian national coach Guus Hiddink who combines both roles until the end of the season. Chelsea beat Everton 2-1 to win the FA Cup final. Carlo Ancelotti named new manager in June 2009.
2009/10 - Ancelotti leads the Blues to the Barclays Premier League title, scoring 103 goals in the process.
Overview
Chelsea have regained the Premier League crown after finishing second to Manchester United in the last three seasons. Former manager Jose Mourinho, bankrolled by owner Roman Abramovich's millions, brought the first title to Stamford Bridge for 50 years when the Blues lifted the trophy in 2005. Chelsea became only the second team to win back-to-back Premier League titles when they clinched it a year later. Mourinho left the club by mutual consent in September 2007.
Although Chelsea reached the FA Cup final in 1994, they hardly set the world alight in their early Premier League days. Ruud Gullit became manager in 1996 and steered the Blues to an FA Cup triumph in 1997, while his successor Gianluca Vialli guided the team to victory in the League Cup and European Cup Winners' Cup in 1998.
Shortly after, he led the team to the UEFA Super Cup after a 1-0 win over Real Madrid. The FA Cup followed in 2000. Vialli was replaced by Claudio Ranieri in 2000 and he led Chelsea to another FA Cup final appearance in 2002.
Russian billionaire Roman Abramovich bought the Blues for £140m. After a trophyless season, he appointed Mourinho as new Chelsea manager and there was instant success. In 2005, Chelsea won the Barclays Premiership and League Cup, along with a Champions League semi-final appearance.
And Mourinho retained the Barclays Premiership crown the year after, equalling the club's own Premier League record of 29 wins set the previous season. They were league runners-up in 2006/07 and also claimed the FA Cup and League Cup double.
They were also runners-up in the 2007/08 campaign, but by this time Mourinho had left the club. He was replaced by Avram Grant who led the Blues to the final of the Champions League and Carling Cup.
Grant left Stamford Bridge at the end of the season and was replaced by Luiz Felipe Scolari who was tasked with bringing the title back to the club. However he was sacked in February 2009 and replaced by Guus Hiddink who agreed to take charge until the end of the campaign while continuing to coach the Russian national side. He was hugely popular with fans and players and he led them to success in the FA Cup final, beating Everton 2-1.
His decision to stick with Russia saw Chelsea bring in former AC Milan coach Carlo Ancelotti who enjoyed a stunning first season in English football, guiding Chelsea to the Barclays Premier League title in some style. They hit 103 goals to set a new Premier League goalscoring record with Didier Drogba notching 29 to claim the Barclays Golden Boot.
Club Heritage
Chelsea were formed in 1905 and were elected into the Second Division of the Football League. They just missed out on silverware 10 years later with an FA Cup final defeat. The Blues had to wait for their first major trophy in 1955, when under manager Ted Drake, they won the league title. Chelsea claimed the League Cup for the first time in 1965 and were defeated in the FA Cup final two years later.
Featuring the likes of Ron 'Chopper' Harris, Ian Hutchison and Peter Osgood, Chelsea overcame Leeds to win the FA Cup in 1970. In the following season, they clinched the European Cup Winners' Cup with a replay victory over Real Madrid.
Financial problems meant the Stamford Bridge club dropped into the Second Division, and at one point they were close to falling to the Third Division.
They eventually won their place back in the top flight in 1984, but their stay only lasted four seasons. They clawed their way back to the First Division again as Second Division champions in 1989 and have remained in the top flight ever since.
Premier League History
1992/93 - Inaugural members of the Premier League
1993/94 - Lose FA Cup final
1996/97 - Ruud Gullit appointed player-manger
1996/97 - Win FA Cup
1997/98 - Gianluca Vialli becomes manager
1997/98 - Win League Cup, Cup Winners' Cup and UEFA Super Cup
1999/00 - FA Cup winners
2000/01 - Claudio Ranieri becomes manager
2001/02 - Lose FA Cup final
2003/04 - Chairman Ken Bates sells Chelsea to Roman Abramovich
2000/05 - Jose Mourinho takes over as manager
2004/05 - Chelsea win Barclays Premiership and League Cup
2005/06 - Chelsea win Barclays Premiership
2006/07 - Win FA Cup and League Cup
2007/08 - Jose Mourinho leaves the club to be replaced by Avram Grant. Runners up in the Carling Cup, Barclays Premier League and Champions League. Part company with Grant. Luiz Felipe Scolari appointed manager in June.
2008/09 - Scolari is sacked in February 2009 and replaced by Russian national coach Guus Hiddink who combines both roles until the end of the season. Chelsea beat Everton 2-1 to win the FA Cup final. Carlo Ancelotti named new manager in June 2009.
2009/10 - Ancelotti leads the Blues to the Barclays Premier League title, scoring 103 goals in the process.
Thursday, May 13, 2010
Password Cracking - Ready, Set & Crack
Hey Readers,
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.
Passwords to access computer systems are usually stored in a database so that the system can perform password verification when a user attempts to log in or access a restricted resource. To preserve confidentiality of system passwords, the password verification data is typically not stored in cleartext form, but instead a one-way function is applied to the password, possibly in combination with other data, and the resulting value is stored. When a user later attempts to authenticate by entering the password, the same function is applied to the entered value and the result is compared with the stored value. If they match, there is an extremely high probability that the entered password was correct. For simplicity in this discussion, we will refer to the one way function employed (which may be either an encryption function or cryptographic hash) as a hash and its output as a hashed password.
Even though functions that create hashed passwords may be cryptographically secure, possession of the hashed password provides a quick way to test guesses for the password by applying the one-way function to each guess, and comparing the result to the verification data. The most commonly used hash functions can be computed rapidly and the attacker can test guesses repeatedly with different guesses until one succeeds, meaning that the plaintext password has been recovered.
The term password cracking generally refers to recovery of one or more plaintext passwords from hashed passwords, but there are also many other ways of obtaining passwords illicitly. Without the hashed version of a password, the attacker can still attempt access to the computer system in question with guessed passwords. But well-designed systems limit the number of failed access attempts and can alert administrators to trace the source of the attack if that quota is exceeded. If he has the hashed password, the attacker can work undetected, and if the attacker has obtained several hashed passwords, the chance of cracking at least one is quite high.
Other ways to obtain passwords include social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security (see password for details). While those methods are not considered "password cracking" they are very popular among criminals (notably phishing) and remain very effective. They are often considered as the main vulnerability in password authentification systems.
Common methods for verifying users over a computer network often expose the hashed password. For example, use of a hash-based challenge-response authentication method for password verification may provide a hashed password to a network eavesdropper, who can then crack the password. A number of stronger cryptographic protocols exist that do not expose hashed passwords during verification over a network, either by protecting them in transmission using a high-grade key, or by using a zero-knowledge password proof.
Weak encryption
If a system uses a poorly designed password hashing scheme to protect stored passwords, an attacker can exploit any weaknesses to recover even 'well-chosen' passwords. One example is the LM hash that Microsoft Windows XP and previous versions use by default to store user passwords of less than 15 characters in length. LM hash converts the password into all uppercase letters then breaks the password into two 7-character fields which are hashed separately—which allows each half to be attacked individually.
Password encryption schemes that use stronger hash functions like MD5, SHA-512, SHA-1, and RIPEMD-160 can still be vulnerable to brute-force and precomputation attacks. Such attacks do not depend on reversing the hash function. Instead, they work by hashing a large number of words or random permutations and comparing the result of each guess to a user's stored password hash. Modern schemes such as MD5-crypt[1] and bcrypt use purposefully slow algorithms so that the number of guesses that an attacker can make in a given period of time is relatively low. Salting, described below, greatly increases the difficulty of such precomputation attacks, perhaps sufficiently to resist all attacks; every instance of its use must be evaluated independently, however.
Because progress in analyzing existing cryptographic hash algorithms is always possible, a hash which is effectively invulnerable today may become vulnerable tomorrow. Both MD5 and SHA-1, long thought secure, have been shown vulnerable to less than brute force efficiency attacks. For encryption algorithms (rather different than cryptographic hashes) the same has been true. DES has been broken (in the sense of more efficient than brute force attacks being discovered), and computers have become fast enough that its short key (56 bits) is clearly and publicly insecure against even brute force attacks. Passwords protected by these measures against attack will become vulnerable, and passwords still in use thereby exposed. Historical records are not always and forever irrelevant to today's security problems.
[edit] Guessing, dictionary and brute force attacks
The distinction between guessing, dictionary and brute force attacks is not strict. They are similar in that an attacker goes through a list of candidate passwords one by one; the list may be explicitly enumerated or implicitly defined, can incorporate knowledge about the victim, and can be linguistically derived. Each of the three approaches, particularly 'dictionary attack', is frequently used as an umbrella term to denote all the three attacks and the spectrum of attacks encompassed by them.
[edit] Guessing
Passwords can sometimes be guessed by humans with knowledge of the user's personal information. Examples of guessable passwords include:
* blank (none)
* the words "password", "passcode", "admin" and their derivatives
* a row of letters from the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* the user's name or login name
* the name of a significant other, a friend, relative or pet
* their birthplace or date of birth, or a friend's, or a relative's
* their automobile license plate number, or a friend's, or a relative's
* their office number, residence number or most commonly, their mobile number.
* a name of a celebrity they like
* a simple modification of one of the preceding, such as suffixing a digit, particularly 1, or reversing the order of the letters.
* a swear word
Personal data about individuals are now available from various sources, many on-line, and can often be obtained by someone using social engineering techniques, such as posing as an opinion surveyor or a security control checker. Attackers who know the user may have information as well. For example, if a user chooses the password "YaleLaw78" because he graduated from Yale Law School in 1978, a disgruntled business partner might be able to guess the password.
Guessing is particularly effective with systems that employ self-service password reset. For example, in September 2008, the Yahoo e-mail account of Governor of Alaska and Vice President of the United States nominee Sarah Palin was accessed without authorization by someone who was able to research answers to two of her security questions, her zip code and date of birth and was able to guess the third, where she met her husband.
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.
Passwords to access computer systems are usually stored in a database so that the system can perform password verification when a user attempts to log in or access a restricted resource. To preserve confidentiality of system passwords, the password verification data is typically not stored in cleartext form, but instead a one-way function is applied to the password, possibly in combination with other data, and the resulting value is stored. When a user later attempts to authenticate by entering the password, the same function is applied to the entered value and the result is compared with the stored value. If they match, there is an extremely high probability that the entered password was correct. For simplicity in this discussion, we will refer to the one way function employed (which may be either an encryption function or cryptographic hash) as a hash and its output as a hashed password.
Even though functions that create hashed passwords may be cryptographically secure, possession of the hashed password provides a quick way to test guesses for the password by applying the one-way function to each guess, and comparing the result to the verification data. The most commonly used hash functions can be computed rapidly and the attacker can test guesses repeatedly with different guesses until one succeeds, meaning that the plaintext password has been recovered.
The term password cracking generally refers to recovery of one or more plaintext passwords from hashed passwords, but there are also many other ways of obtaining passwords illicitly. Without the hashed version of a password, the attacker can still attempt access to the computer system in question with guessed passwords. But well-designed systems limit the number of failed access attempts and can alert administrators to trace the source of the attack if that quota is exceeded. If he has the hashed password, the attacker can work undetected, and if the attacker has obtained several hashed passwords, the chance of cracking at least one is quite high.
Other ways to obtain passwords include social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security (see password for details). While those methods are not considered "password cracking" they are very popular among criminals (notably phishing) and remain very effective. They are often considered as the main vulnerability in password authentification systems.
Common methods for verifying users over a computer network often expose the hashed password. For example, use of a hash-based challenge-response authentication method for password verification may provide a hashed password to a network eavesdropper, who can then crack the password. A number of stronger cryptographic protocols exist that do not expose hashed passwords during verification over a network, either by protecting them in transmission using a high-grade key, or by using a zero-knowledge password proof.
Weak encryption
If a system uses a poorly designed password hashing scheme to protect stored passwords, an attacker can exploit any weaknesses to recover even 'well-chosen' passwords. One example is the LM hash that Microsoft Windows XP and previous versions use by default to store user passwords of less than 15 characters in length. LM hash converts the password into all uppercase letters then breaks the password into two 7-character fields which are hashed separately—which allows each half to be attacked individually.
Password encryption schemes that use stronger hash functions like MD5, SHA-512, SHA-1, and RIPEMD-160 can still be vulnerable to brute-force and precomputation attacks. Such attacks do not depend on reversing the hash function. Instead, they work by hashing a large number of words or random permutations and comparing the result of each guess to a user's stored password hash. Modern schemes such as MD5-crypt[1] and bcrypt use purposefully slow algorithms so that the number of guesses that an attacker can make in a given period of time is relatively low. Salting, described below, greatly increases the difficulty of such precomputation attacks, perhaps sufficiently to resist all attacks; every instance of its use must be evaluated independently, however.
Because progress in analyzing existing cryptographic hash algorithms is always possible, a hash which is effectively invulnerable today may become vulnerable tomorrow. Both MD5 and SHA-1, long thought secure, have been shown vulnerable to less than brute force efficiency attacks. For encryption algorithms (rather different than cryptographic hashes) the same has been true. DES has been broken (in the sense of more efficient than brute force attacks being discovered), and computers have become fast enough that its short key (56 bits) is clearly and publicly insecure against even brute force attacks. Passwords protected by these measures against attack will become vulnerable, and passwords still in use thereby exposed. Historical records are not always and forever irrelevant to today's security problems.
[edit] Guessing, dictionary and brute force attacks
The distinction between guessing, dictionary and brute force attacks is not strict. They are similar in that an attacker goes through a list of candidate passwords one by one; the list may be explicitly enumerated or implicitly defined, can incorporate knowledge about the victim, and can be linguistically derived. Each of the three approaches, particularly 'dictionary attack', is frequently used as an umbrella term to denote all the three attacks and the spectrum of attacks encompassed by them.
[edit] Guessing
Passwords can sometimes be guessed by humans with knowledge of the user's personal information. Examples of guessable passwords include:
* blank (none)
* the words "password", "passcode", "admin" and their derivatives
* a row of letters from the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* the user's name or login name
* the name of a significant other, a friend, relative or pet
* their birthplace or date of birth, or a friend's, or a relative's
* their automobile license plate number, or a friend's, or a relative's
* their office number, residence number or most commonly, their mobile number.
* a name of a celebrity they like
* a simple modification of one of the preceding, such as suffixing a digit, particularly 1, or reversing the order of the letters.
* a swear word
Personal data about individuals are now available from various sources, many on-line, and can often be obtained by someone using social engineering techniques, such as posing as an opinion surveyor or a security control checker. Attackers who know the user may have information as well. For example, if a user chooses the password "YaleLaw78" because he graduated from Yale Law School in 1978, a disgruntled business partner might be able to guess the password.
Guessing is particularly effective with systems that employ self-service password reset. For example, in September 2008, the Yahoo e-mail account of Governor of Alaska and Vice President of the United States nominee Sarah Palin was accessed without authorization by someone who was able to research answers to two of her security questions, her zip code and date of birth and was able to guess the third, where she met her husband.
Wednesday, May 12, 2010
Google's Gmail - Under Phishing Attack
Hey Readers,
In this post I have brought to your notice the problems with Gmail.
Take Care !!!
India's 71 million internet and close to 10 million broadband users are increasingly becoming the victims of vicious phishing attacks that can result in identity theft, danger to life and even crippling financial fraud.
On Wednesday, users of Google's email services received a legal notice from the gmail team asking them to update their account details for security reasons.
"Gmail Team is working on total security on all accounts in order to make Gmail better as ever and as a result of this security upgrade we require all Gmail members to verify their account with Google. To prevent your account from disability you will have to update your account by clicking the reply button and filling the space below," the mail read.
The legal notice from Gmail wanted users to refurbish their account name, password, occupation, birth date and country of residence. It also carried a threat that users who did not update their details within 7 days of receiving the warning would lose their account permanently.
However, when contacted, a Google spokesperson said, "Some spammers send fraudulent mass-messages designed to collect personal information, called 'spoofing' or 'password phishing' . We always advise our users to be wary of any message that asks for your personal information, or messages that refer you to a webpage asking for personal information. Google or Gmail does not send unsolicited mass messages asking for passwords or personal information; even if the message asking for it claims to be from us, please don't believe it."
This information is publicly available in the Gmail support center at http://mail.google.com/support/bin/answer.py?hl=en&answer=8253
According to Rakshit Tandon, consultant safe surfing with the Internet & Mobile Association of India (IAMAI ), "Phishing activity has been on the rise across India since December. The biggest targets for cyber criminals are banking sites followed by free email sites like Gmail and Yahoo and social networking sites like Facebook and Orkut," he said.
The IAMAI runs cyber safety programmes and has already worked with 3,50,000 students in 185 schools across 43 cities and 13 states.
"A schoolteacher in Mumbai lost close to Rs 10 lakh after phishers got into her netbanking account. Internet penetration is going up which is inviting more criminal attacks as awareness levels are very low," adds Tandon.
His advise is to be investigative and use logic (BIUL) when using the Net in order to improve your personal Internet security levels.
Thank you for reading and making yourself aware !!!
In this post I have brought to your notice the problems with Gmail.
Take Care !!!
India's 71 million internet and close to 10 million broadband users are increasingly becoming the victims of vicious phishing attacks that can result in identity theft, danger to life and even crippling financial fraud.
On Wednesday, users of Google's email services received a legal notice from the gmail team asking them to update their account details for security reasons.
"Gmail Team is working on total security on all accounts in order to make Gmail better as ever and as a result of this security upgrade we require all Gmail members to verify their account with Google. To prevent your account from disability you will have to update your account by clicking the reply button and filling the space below," the mail read.
The legal notice from Gmail wanted users to refurbish their account name, password, occupation, birth date and country of residence. It also carried a threat that users who did not update their details within 7 days of receiving the warning would lose their account permanently.
However, when contacted, a Google spokesperson said, "Some spammers send fraudulent mass-messages designed to collect personal information, called 'spoofing' or 'password phishing' . We always advise our users to be wary of any message that asks for your personal information, or messages that refer you to a webpage asking for personal information. Google or Gmail does not send unsolicited mass messages asking for passwords or personal information; even if the message asking for it claims to be from us, please don't believe it."
This information is publicly available in the Gmail support center at http://mail.google.com/support/bin/answer.py?hl=en&answer=8253
According to Rakshit Tandon, consultant safe surfing with the Internet & Mobile Association of India (IAMAI ), "Phishing activity has been on the rise across India since December. The biggest targets for cyber criminals are banking sites followed by free email sites like Gmail and Yahoo and social networking sites like Facebook and Orkut," he said.
The IAMAI runs cyber safety programmes and has already worked with 3,50,000 students in 185 schools across 43 cities and 13 states.
"A schoolteacher in Mumbai lost close to Rs 10 lakh after phishers got into her netbanking account. Internet penetration is going up which is inviting more criminal attacks as awareness levels are very low," adds Tandon.
His advise is to be investigative and use logic (BIUL) when using the Net in order to improve your personal Internet security levels.
Thank you for reading and making yourself aware !!!
Tuesday, May 11, 2010
Dell Latitude E4310 - The Smarter Way to Live....
Hey Readers,
Dell announced the Latitude E4310, and although it retains the outward appearance of its predecessor, the E4300, Dell's latest receives a much needed component upgrade with Intel's latest Core processors.
And if you think the E4310 is too expensive, Dell also launched a lower-cost Latitude E5410 and E5510, for small businesses and startups. Cheaper still, for classrooms and government establishments, is an updated version of Dell's business notebook.
It's business laptop with a 13.3-inch widescreen is what I would consider large enough to get some real work done while hitting a sweet spot in portable computing.
The E4310 is arguably one of the most well-equipped business lightweight laptops. It competes directly with the HP EliteBook 2540p and Sony's VAIO VPC-Z116GXS, proving that packages this small can still pack a huge performance punch. As with its predecessor, the E4310 is one of the few business laptops available in Red and Blue, which, according to Dell, is used by federal establishments to designate laptops that are high security and can't leave the building (Red) versus ones that can (Blue). It's also available in Black. Like the Lenovo ThinkPad X201 and HP 2540p, the E4310 uses both a pointing stick and touchpad. And beneath the full size keyboard are white LEDs that illuminate in low-lit areas, similar to the back-lit keyboard found in the Sony VPC-Z116GXS.
More important, however, is what's inside. The E4310 gets a much needed component upgrade, courtesy of either a 2.4-GHz Intel Core i5-520M or 2.53GHz Intel Core i5-540M processor. The DDR3 memory will be available in 2-Gbyte, 4GB, and 8GB configurations, but unlike the Sony VPC-Z116GXS, the E4310 will be available with integrated graphics only. There's a plethora of storage options, with a 5,400-RPM and 7,200-RPM hard drive and SSD versions. In addition to dual-layer DVD drives, Dell will also be offering a Blu-ray option with the E4310.
The Latitude E5410 and E5510 have 14-inch and 15.6-inch widescreens, respectively. They start at lower prices (less than $800), but being part the E-family means that accessories and docking solutions are shared across the platforms. For instance, the E4310's power adapter and extended battery can be used with the E5410 and E5510. They offer many of the same features and options as the more expensive Latitudes, including Blu-ray drives, dual pointing devices, the gamut of storage options, and a 3-year battery warranty. They won't have back-lit keyboards, though.
Both the E5410 and the E5510 can scale up to an Intel Core i7 620M CPU, along with options for a Core i5-520M or Core i5-540M processor. Like the E4310, the E5410 and E5510's DDR3 memory can ramp all the way up to 8 GB, but you'll have to deal with integrated graphics only.
Lastly, the Latitude 2110 is mostly a component update to the 2100 series of business netbooks. Instead of the Intel Atom N270 processor, the 2110 will offer a 1.67GHz Atom N450, which has tremendous battery benefits over its predecessor. All the classroom gimmicks that drew eyeballs on its predecessor are there in this new version, including an anti-microbial keyboard, assorted colors, and a touch screen option. It also has a facing forward activity light that turns on if the child is surfing the Web instead of working on a Word document. A 1,366-by768 resolution is available for schools that work with standardized forms.
Dell announced the Latitude E4310, and although it retains the outward appearance of its predecessor, the E4300, Dell's latest receives a much needed component upgrade with Intel's latest Core processors.
And if you think the E4310 is too expensive, Dell also launched a lower-cost Latitude E5410 and E5510, for small businesses and startups. Cheaper still, for classrooms and government establishments, is an updated version of Dell's business notebook.
It's business laptop with a 13.3-inch widescreen is what I would consider large enough to get some real work done while hitting a sweet spot in portable computing.
The E4310 is arguably one of the most well-equipped business lightweight laptops. It competes directly with the HP EliteBook 2540p and Sony's VAIO VPC-Z116GXS, proving that packages this small can still pack a huge performance punch. As with its predecessor, the E4310 is one of the few business laptops available in Red and Blue, which, according to Dell, is used by federal establishments to designate laptops that are high security and can't leave the building (Red) versus ones that can (Blue). It's also available in Black. Like the Lenovo ThinkPad X201 and HP 2540p, the E4310 uses both a pointing stick and touchpad. And beneath the full size keyboard are white LEDs that illuminate in low-lit areas, similar to the back-lit keyboard found in the Sony VPC-Z116GXS.
More important, however, is what's inside. The E4310 gets a much needed component upgrade, courtesy of either a 2.4-GHz Intel Core i5-520M or 2.53GHz Intel Core i5-540M processor. The DDR3 memory will be available in 2-Gbyte, 4GB, and 8GB configurations, but unlike the Sony VPC-Z116GXS, the E4310 will be available with integrated graphics only. There's a plethora of storage options, with a 5,400-RPM and 7,200-RPM hard drive and SSD versions. In addition to dual-layer DVD drives, Dell will also be offering a Blu-ray option with the E4310.
The Latitude E5410 and E5510 have 14-inch and 15.6-inch widescreens, respectively. They start at lower prices (less than $800), but being part the E-family means that accessories and docking solutions are shared across the platforms. For instance, the E4310's power adapter and extended battery can be used with the E5410 and E5510. They offer many of the same features and options as the more expensive Latitudes, including Blu-ray drives, dual pointing devices, the gamut of storage options, and a 3-year battery warranty. They won't have back-lit keyboards, though.
Both the E5410 and the E5510 can scale up to an Intel Core i7 620M CPU, along with options for a Core i5-520M or Core i5-540M processor. Like the E4310, the E5410 and E5510's DDR3 memory can ramp all the way up to 8 GB, but you'll have to deal with integrated graphics only.
Lastly, the Latitude 2110 is mostly a component update to the 2100 series of business netbooks. Instead of the Intel Atom N270 processor, the 2110 will offer a 1.67GHz Atom N450, which has tremendous battery benefits over its predecessor. All the classroom gimmicks that drew eyeballs on its predecessor are there in this new version, including an anti-microbial keyboard, assorted colors, and a touch screen option. It also has a facing forward activity light that turns on if the child is surfing the Web instead of working on a Word document. A 1,366-by768 resolution is available for schools that work with standardized forms.
Clap Switch - The Lighter Brighter Way to Life !!!
Hey Readers,
The secret to make a clap switch is revealed in my blog.
Try makin it as you will gain knowledge how to connect circuits and other .....information..
Here is how to go about making the CLAP SWITCH >>>>
The operation is simple. Clap and the lamp turns on. Clap again and it turns off.
The electret microphone picks up the sound of your claps, coughs, and the sound of that book knocked off the table. It produces a small electrical signal which is amplified by the succeeding transistor stage. Two transistors cross connected as a bistable multivibrator change state at each signal. One of these transistors drives a heavier transistor which controls a lamp.
I built my prototype on a cardboard cover from an old notebook. Punched holes using dividers and placed the components down flat. It might look neater if you draw the circuit diagram on to the board before you begin. A photo is included below. The components are from my junk box and I found that it works even if you omit that 4.7 Megohm resistor. Your results may vary.
The transistor types are not critical and any n-p-n silicon transistors should work.
How it works
Input Transducer
The sound of your claps is picked up using an electret microphone. Some people call it by the name "condenser microphone" which usually refers to exhorbitantly priced things intended for the recording studio. If you could buy yours and still have your shirt on your back relax - it's an electret mike all right. Inside it is an electret film - which is the electrical analogue of a magnet - stretched so that it will vibrate in sympathy with any sound falling on it. These vibrations cause the electrical charge on a perforated plate nearby to change, and a field effect transistor converts these into corresponding changes in current.
This microphone has a stage of amplification built in. The power for this built in amplifier is supplied by connecting a resistor to a positive source of voltage, and the changes in current get reflected as changes in voltage across this resistor according to the familiar relation V = I*R. A larger resistor will give you a larger voltage, but then, the current into the device gets reduced which brings down the gain. The value of 5600 ohms (usually abbreviated to 5.6K, and written down in schematics as 5K6) seems to work all right.
Amplifier
A transistor stage, biased near cut-off (that is, almost no current with no signal) amplifies the signal from the microphone. The output of the microphone is coupled to the base of the transistor using an electrolytic capacitor (note: using a better capacitor here will not work). The top of the electret microphone is at a few volts, the base conducts at around half a volt, so the leakage current of the capacitor (all electrolytic capacitors leak at least a little bit) will eventually cause the steady state condition in which the leakage of the capacitor goes into the base terminal of the transistor. So the collector will have Hfe times this leakage, which can usually be ignored.
The first time the microphone output goes positive, however, (because somebody clapped) this change gets coupled to the base entirely due to the action of the capacitor. This causes the current through the transistor to increase, and this increase in current causes the voltage at the collector, which was sitting near the supply voltage, to fall to nearly zero. If you clapped loudly enough, of course.
This is not a high fidelity audio amplifier. Its function is to produce no output for small sounds and large output for (slightly) bigger sounds, so the customary biasing network can be omitted. The 4.7 Megohm resistor in the previous version was as good as an open circuit, and its omission does not affect the operation of the clap switch in any way. Provided, of course, that you use that 10 microfarad electrolytic capacitor.
Memory
Two cross connected transistors in a bistable multivibrator arrangement make up a circuit that remembers. You can set it to one of two possible states, and it will stay in that state until the end of time. When one transistor conducts, its collector is near ground, and a resistor from this collector feeds the base of the other. Since this resistor sees ground at the collector end the base at the other end receives no current, so that transistor is off. Since this transistor is off, its collector is near supply potential and a resistor connects from this to the base of the other transistor. Since this resistor sees voltage, it supplies the base with current, ensuring that the transistor remains on. Thus this state is stable. By symmetry, the other state is, too.
Changing state
On a clap, the state of the bistable changes. The output of the amplifier is converted to a sharp pulse by passing it through a (relatively) low valued capacitor, of 0.1 microfarads (100 nanofarads). This is connected through "steering" diodes to the base of the transistor which is conducting. This transistor stops conducting, and the other transistor was not conducting anyway. So at a clap, both transistors become off.
Then, those two capacitors across the base resistors come into action. The capacitor connecting to the base of the transistor which was ON has voltage across it. The capacitor connecting to the base of the transistor which was OFF has no voltage across it.
As the sound of the clap dies away, both bases rise towards the supply voltage. But, due to the difference in the charges of the two capacitors, the base of the transistor which was previously not conducting reaches the magic value of half a volt first, and it gets on, and stays on. Until the next clap.
Two red Light Emitting Diodes have been placed in the two collector circuits so that this circuit can be made to work by itself. If you cover up one LED, and display the other prominently, you have it there - a clap operated light.
Output Stage
In order to have a decent amount of light from this circuit, I propose to use six white LEDs in three groups of two each. Each series connected string of two LEDs is arranged to draw around fifteen milliamperes or so by using a series resistor of 330 ohms. Two LEDs in series will drop about five or six volts, and the remaining battery voltage drop across this resistor determines the current through the LEDs. You can get more brightness from the LEDs by reducing the value to 220 ohms or even 150 ohms, provided you keep within the ratings of the LEDs. Do so at your own risk.
Thus the output stage has to handle around fifty or sixty milliamperes. This will give you fairly long time of claplighting with a PP3 battery. The 100mA filament lamp seems to be somewhat hard to find, and people were using torch bulbs, which run at much higher current, and killing their batteries in a few minutes.
A transistor gets its base driven from the collector of one of the transistors in the bistable. With this connection, due to the base current through it, one red LED in the bistable switches between half bright and full, and the other switches between fully off and on. This is normal.
Because the LEDs do not draw as much current as a filament lamp, the output transistor, too, can be of the common small signal variety. All four could be any small signal n-p-n transistor and the circuit should work. So would it with four p-n-p transistors, provided you switch the polarity of every (polarised) component.
Bill of Materials
A list, so that you can go shopping:
You will see the necessity of that last catch-all item when we start actually building this circuit.
The Resistors
From top to bottom, these are:
33 K - orange, orange, orange.
5.6K - green, blue, red.
1K - brown, black, red.
330 - orange, orange, brown.
The best way of identifying these is to use a meter and measure them. That is what I do, because most of my components are pulled off old circuit boards and they might just be pretending to be healthy. Age and ill treatment will have faded the colours so that only the meter can distinguish between, for example, a 2.2K resistor (red-red-red) and a 33K one (orange-orange-orange).
The Diodes
The 1N4148 diodes are extremely small, glass, and most likely have just the polarity marking. The current flow is towards the band. That is, when the banded end is made negative, current flows. And, in sharp contrast, when that end is made positive current does not flow. So this component has to be inserted the right way around in the circuit.
The
Transistors
Four transistors, the same type number, but of different manufacture. The middle lead is the base, and the others two are as marked in the photo for one of the transistors. Flat side down, leads towards you, it goes Emitter-Base-Collector.
The Capacitors: 100n
A bunch of capacitors, all 0.1 microfarad. The markings range from bands as in resistors to various combinations of numbers: brown, black, yellow (or 1-0-4) would be the marking on such a capacitor, though a rummage through my collection for a banded one was not successful. Any of these in the picture can be used. The round ones are disc ceramic. The rectangular one is rolled plastic film. The smallest two are multilayer ceramic.
The Capacitors: 10µF
Electrolytic capacitors always have three markings on them: The capacitance value, the voltage rating, and an indication of the negative lead.
10µF capacitors: a collection
Here they are, all shapes and sizes, all of them of capacity ten microfarads, but of different voltage ratings.
The Capacitors: 1000µF
Here, you can see the arrow pointing to the negative lead. All aluminium electrolytic capacitors indicate the negative lead in this way. These have to be connected up the right way around in a circuit, or else grief would ensue.
The Microphone
If you look closely, one terminal is connected to the body. This is the ground terminal, connected to negative. The other terminal is connected to, duh, the positive. And is also the output terminal. Some electret microphones have three terminals, but I have not used them and do not know how to.
The LEDs
Light Emitting Diodes light when current passes through them. They pass current only in one direction, and generally this is when their longer lead (when new) is made positive. They come in all shapes, colours and sizes. A representative sample grabbed from my box of (mostly) junk is below:
What goes where, in the circuit
Now, I have arranged all the above components alongside the schematic representations, mainly so that you can have a broad idea of what has to go where and how. Of the six white LEDs, only two has been placed, mainly to avoid clutter. And my idea of a switch is to twist wires together to turn on, and pull apart to turn off.
The secret to make a clap switch is revealed in my blog.
Try makin it as you will gain knowledge how to connect circuits and other .....information..
Here is how to go about making the CLAP SWITCH >>>>
The operation is simple. Clap and the lamp turns on. Clap again and it turns off.
The electret microphone picks up the sound of your claps, coughs, and the sound of that book knocked off the table. It produces a small electrical signal which is amplified by the succeeding transistor stage. Two transistors cross connected as a bistable multivibrator change state at each signal. One of these transistors drives a heavier transistor which controls a lamp.
I built my prototype on a cardboard cover from an old notebook. Punched holes using dividers and placed the components down flat. It might look neater if you draw the circuit diagram on to the board before you begin. A photo is included below. The components are from my junk box and I found that it works even if you omit that 4.7 Megohm resistor. Your results may vary.
The transistor types are not critical and any n-p-n silicon transistors should work.
How it works
Input Transducer
The sound of your claps is picked up using an electret microphone. Some people call it by the name "condenser microphone" which usually refers to exhorbitantly priced things intended for the recording studio. If you could buy yours and still have your shirt on your back relax - it's an electret mike all right. Inside it is an electret film - which is the electrical analogue of a magnet - stretched so that it will vibrate in sympathy with any sound falling on it. These vibrations cause the electrical charge on a perforated plate nearby to change, and a field effect transistor converts these into corresponding changes in current.
This microphone has a stage of amplification built in. The power for this built in amplifier is supplied by connecting a resistor to a positive source of voltage, and the changes in current get reflected as changes in voltage across this resistor according to the familiar relation V = I*R. A larger resistor will give you a larger voltage, but then, the current into the device gets reduced which brings down the gain. The value of 5600 ohms (usually abbreviated to 5.6K, and written down in schematics as 5K6) seems to work all right.
Amplifier
A transistor stage, biased near cut-off (that is, almost no current with no signal) amplifies the signal from the microphone. The output of the microphone is coupled to the base of the transistor using an electrolytic capacitor (note: using a better capacitor here will not work). The top of the electret microphone is at a few volts, the base conducts at around half a volt, so the leakage current of the capacitor (all electrolytic capacitors leak at least a little bit) will eventually cause the steady state condition in which the leakage of the capacitor goes into the base terminal of the transistor. So the collector will have Hfe times this leakage, which can usually be ignored.
The first time the microphone output goes positive, however, (because somebody clapped) this change gets coupled to the base entirely due to the action of the capacitor. This causes the current through the transistor to increase, and this increase in current causes the voltage at the collector, which was sitting near the supply voltage, to fall to nearly zero. If you clapped loudly enough, of course.
This is not a high fidelity audio amplifier. Its function is to produce no output for small sounds and large output for (slightly) bigger sounds, so the customary biasing network can be omitted. The 4.7 Megohm resistor in the previous version was as good as an open circuit, and its omission does not affect the operation of the clap switch in any way. Provided, of course, that you use that 10 microfarad electrolytic capacitor.
Memory
Two cross connected transistors in a bistable multivibrator arrangement make up a circuit that remembers. You can set it to one of two possible states, and it will stay in that state until the end of time. When one transistor conducts, its collector is near ground, and a resistor from this collector feeds the base of the other. Since this resistor sees ground at the collector end the base at the other end receives no current, so that transistor is off. Since this transistor is off, its collector is near supply potential and a resistor connects from this to the base of the other transistor. Since this resistor sees voltage, it supplies the base with current, ensuring that the transistor remains on. Thus this state is stable. By symmetry, the other state is, too.
Changing state
On a clap, the state of the bistable changes. The output of the amplifier is converted to a sharp pulse by passing it through a (relatively) low valued capacitor, of 0.1 microfarads (100 nanofarads). This is connected through "steering" diodes to the base of the transistor which is conducting. This transistor stops conducting, and the other transistor was not conducting anyway. So at a clap, both transistors become off.
Then, those two capacitors across the base resistors come into action. The capacitor connecting to the base of the transistor which was ON has voltage across it. The capacitor connecting to the base of the transistor which was OFF has no voltage across it.
As the sound of the clap dies away, both bases rise towards the supply voltage. But, due to the difference in the charges of the two capacitors, the base of the transistor which was previously not conducting reaches the magic value of half a volt first, and it gets on, and stays on. Until the next clap.
Two red Light Emitting Diodes have been placed in the two collector circuits so that this circuit can be made to work by itself. If you cover up one LED, and display the other prominently, you have it there - a clap operated light.
Output Stage
In order to have a decent amount of light from this circuit, I propose to use six white LEDs in three groups of two each. Each series connected string of two LEDs is arranged to draw around fifteen milliamperes or so by using a series resistor of 330 ohms. Two LEDs in series will drop about five or six volts, and the remaining battery voltage drop across this resistor determines the current through the LEDs. You can get more brightness from the LEDs by reducing the value to 220 ohms or even 150 ohms, provided you keep within the ratings of the LEDs. Do so at your own risk.
Thus the output stage has to handle around fifty or sixty milliamperes. This will give you fairly long time of claplighting with a PP3 battery. The 100mA filament lamp seems to be somewhat hard to find, and people were using torch bulbs, which run at much higher current, and killing their batteries in a few minutes.
A transistor gets its base driven from the collector of one of the transistors in the bistable. With this connection, due to the base current through it, one red LED in the bistable switches between half bright and full, and the other switches between fully off and on. This is normal.
Because the LEDs do not draw as much current as a filament lamp, the output transistor, too, can be of the common small signal variety. All four could be any small signal n-p-n transistor and the circuit should work. So would it with four p-n-p transistors, provided you switch the polarity of every (polarised) component.
Bill of Materials
A list, so that you can go shopping:
You will see the necessity of that last catch-all item when we start actually building this circuit.
The Resistors
From top to bottom, these are:
33 K - orange, orange, orange.
5.6K - green, blue, red.
1K - brown, black, red.
330 - orange, orange, brown.
The best way of identifying these is to use a meter and measure them. That is what I do, because most of my components are pulled off old circuit boards and they might just be pretending to be healthy. Age and ill treatment will have faded the colours so that only the meter can distinguish between, for example, a 2.2K resistor (red-red-red) and a 33K one (orange-orange-orange).
The Diodes
The 1N4148 diodes are extremely small, glass, and most likely have just the polarity marking. The current flow is towards the band. That is, when the banded end is made negative, current flows. And, in sharp contrast, when that end is made positive current does not flow. So this component has to be inserted the right way around in the circuit.
The
Transistors
Four transistors, the same type number, but of different manufacture. The middle lead is the base, and the others two are as marked in the photo for one of the transistors. Flat side down, leads towards you, it goes Emitter-Base-Collector.
The Capacitors: 100n
A bunch of capacitors, all 0.1 microfarad. The markings range from bands as in resistors to various combinations of numbers: brown, black, yellow (or 1-0-4) would be the marking on such a capacitor, though a rummage through my collection for a banded one was not successful. Any of these in the picture can be used. The round ones are disc ceramic. The rectangular one is rolled plastic film. The smallest two are multilayer ceramic.
The Capacitors: 10µF
Electrolytic capacitors always have three markings on them: The capacitance value, the voltage rating, and an indication of the negative lead.
10µF capacitors: a collection
Here they are, all shapes and sizes, all of them of capacity ten microfarads, but of different voltage ratings.
The Capacitors: 1000µF
Here, you can see the arrow pointing to the negative lead. All aluminium electrolytic capacitors indicate the negative lead in this way. These have to be connected up the right way around in a circuit, or else grief would ensue.
The Microphone
If you look closely, one terminal is connected to the body. This is the ground terminal, connected to negative. The other terminal is connected to, duh, the positive. And is also the output terminal. Some electret microphones have three terminals, but I have not used them and do not know how to.
The LEDs
Light Emitting Diodes light when current passes through them. They pass current only in one direction, and generally this is when their longer lead (when new) is made positive. They come in all shapes, colours and sizes. A representative sample grabbed from my box of (mostly) junk is below:
What goes where, in the circuit
Now, I have arranged all the above components alongside the schematic representations, mainly so that you can have a broad idea of what has to go where and how. Of the six white LEDs, only two has been placed, mainly to avoid clutter. And my idea of a switch is to twist wires together to turn on, and pull apart to turn off.
Monday, May 10, 2010
Child Labour In India - A Growing Concern
Hey Readers,
Child labor is done by any working child who is under the age specified by law. The word, “work” means full time commercial work to sustain self or add to the family income. Child labor is a hazard to a Child’s mental, physical, social, educational, emotional and spiritual development. Broadly any child who is employed in activities to feed self and family is being subjected to “child labour’.
In Northern India the exploitation of little children for labor is an accepted practice and perceived by the local population as a necessity to alleviate poverty. Carpet weaving industries pay very low wages to child laborers and make them work for long hours in unhygienic conditions. Children working in such units are mainly migrant workers from Northern India, who are shunted here by their families to earn some money and send it to them. Their families dependence on their income, forces them to endure the onerous work conditions in the carpet factories.
The situation of child laborers in India is desperate. Children work for eight hours at a stretch with only a small break for meals. The meals are also frugal and the children are ill nourished. Most of the migrant children who cannot go home, sleep at their work place, which is very bad for their health and development. Seventy five percent of Indian population still resides in rural areas and are very poor. Children in rural families who are ailing with poverty perceive their children as an income generating resource to supplement the family income. Parents sacrifice their children’s education to the growing needs of their younger siblings in such families and view them as wage earners for the entire clan.
Employment with others and self employment both come under the aegis of ‘child labor’. It has been seen that children who are street sellers, street entertainers, rag pickers, child prostitutes or pornography models, beggers etc - are mostly without natural guardians and exploited by underground gangsters and racketeers. These children are mostly children of illegal migrants. They are the victim of abandonment, riots, wars or just sheer poverty and homelessness. In poor countries some children are helping hands for their parents or are employed in factories, commercial organizations or households with the consent of the parents. The most appalling form of child labor is prostitution and modeling for child pornography. Some children are even sold to fiefs by their parents for money.
The Indian government has tried to take some steps to alleviate the problem of child labor in recent years by invoking a law that makes the employment of children below 14 illegal, except in family owned enterprises. However this law is rarely adhered to due to practical difficulties. Factories usually find loopholes and circumvent the law by declaring that the child laborer is a distant family member. Also in villages there is no law implementing mechanism, and any punitive actions for commercial enterprises violating these laws is almost non existent.
Child labor is a conspicuous problem in India. Its prevalence is evident in the child work participation rate, which is more than that of other developing countries. Poverty is the reason for child labor in India. The meager income of child laborers is also absorbed by their families. The paucity of organized banking in the rural areas creates a void in taking facilities, forcing poor families to push their children in harsh labor, the harshest being bonded labor.
Stop Child Labor
The future of a community is in the well being of its children. The above fact is beautifully expressed by Wordsworth in his famous lines “child is father of the man”. So it becomes imperative for the health of a nation to protect its children from premature labor which is hazardous to their mental, physical, educational and spiritual development needs. It is urgently required to save children from the murderous clutches of social injustice and educational deprivation, and ensure that they are given opportunities for healthy, normal and happy growth.
The venerable Indian poet Rabindranth Tagore has said time and again, that every country is absolutely bound by its duty to provide free primary education to its children. It is important to remember that industrialization can afford to wait but youth cannot be captured for long. It is imperative that the basic tenet made in article 24 of the Indian constitution - prohibiting the employment of any child below fourteen years of age, in a factory, mine or any other hazardous employment be stopped – be adhered to. There should be no ambiguity in ensuring the right of every child to free basic education and the promise of the constitution should be fully implemented in the here and now.
Projects related with human resource development, dedicated to the child welfare issues must be given top priority by the central and state governments to stop the menace of child labor. Child labor laws need to be strictly implemented at the central and state levels. Corruption and negligence in child labor offices and employee circles should be dealt with very strictly by the judiciary and the police force.
Child labor is done by any working child who is under the age specified by law. The word, “work” means full time commercial work to sustain self or add to the family income. Child labor is a hazard to a Child’s mental, physical, social, educational, emotional and spiritual development. Broadly any child who is employed in activities to feed self and family is being subjected to “child labour’.
In Northern India the exploitation of little children for labor is an accepted practice and perceived by the local population as a necessity to alleviate poverty. Carpet weaving industries pay very low wages to child laborers and make them work for long hours in unhygienic conditions. Children working in such units are mainly migrant workers from Northern India, who are shunted here by their families to earn some money and send it to them. Their families dependence on their income, forces them to endure the onerous work conditions in the carpet factories.
The situation of child laborers in India is desperate. Children work for eight hours at a stretch with only a small break for meals. The meals are also frugal and the children are ill nourished. Most of the migrant children who cannot go home, sleep at their work place, which is very bad for their health and development. Seventy five percent of Indian population still resides in rural areas and are very poor. Children in rural families who are ailing with poverty perceive their children as an income generating resource to supplement the family income. Parents sacrifice their children’s education to the growing needs of their younger siblings in such families and view them as wage earners for the entire clan.
Employment with others and self employment both come under the aegis of ‘child labor’. It has been seen that children who are street sellers, street entertainers, rag pickers, child prostitutes or pornography models, beggers etc - are mostly without natural guardians and exploited by underground gangsters and racketeers. These children are mostly children of illegal migrants. They are the victim of abandonment, riots, wars or just sheer poverty and homelessness. In poor countries some children are helping hands for their parents or are employed in factories, commercial organizations or households with the consent of the parents. The most appalling form of child labor is prostitution and modeling for child pornography. Some children are even sold to fiefs by their parents for money.
The Indian government has tried to take some steps to alleviate the problem of child labor in recent years by invoking a law that makes the employment of children below 14 illegal, except in family owned enterprises. However this law is rarely adhered to due to practical difficulties. Factories usually find loopholes and circumvent the law by declaring that the child laborer is a distant family member. Also in villages there is no law implementing mechanism, and any punitive actions for commercial enterprises violating these laws is almost non existent.
Child labor is a conspicuous problem in India. Its prevalence is evident in the child work participation rate, which is more than that of other developing countries. Poverty is the reason for child labor in India. The meager income of child laborers is also absorbed by their families. The paucity of organized banking in the rural areas creates a void in taking facilities, forcing poor families to push their children in harsh labor, the harshest being bonded labor.
Stop Child Labor
The future of a community is in the well being of its children. The above fact is beautifully expressed by Wordsworth in his famous lines “child is father of the man”. So it becomes imperative for the health of a nation to protect its children from premature labor which is hazardous to their mental, physical, educational and spiritual development needs. It is urgently required to save children from the murderous clutches of social injustice and educational deprivation, and ensure that they are given opportunities for healthy, normal and happy growth.
The venerable Indian poet Rabindranth Tagore has said time and again, that every country is absolutely bound by its duty to provide free primary education to its children. It is important to remember that industrialization can afford to wait but youth cannot be captured for long. It is imperative that the basic tenet made in article 24 of the Indian constitution - prohibiting the employment of any child below fourteen years of age, in a factory, mine or any other hazardous employment be stopped – be adhered to. There should be no ambiguity in ensuring the right of every child to free basic education and the promise of the constitution should be fully implemented in the here and now.
Projects related with human resource development, dedicated to the child welfare issues must be given top priority by the central and state governments to stop the menace of child labor. Child labor laws need to be strictly implemented at the central and state levels. Corruption and negligence in child labor offices and employee circles should be dealt with very strictly by the judiciary and the police force.
Volkswagen Beetle - Feel your heart Racing !!!
Hey Readers,
A classic
Volkswagens are famed for their traditional quality and the New Beetle is naturally no exception – all materials used are carefully tested and have outstanding workmanship. The body is galvanised giving reliable protection against rust. The high-strength panels on the New Beetle are given additional stability at specific points which achieves a very high level of torsional rigidity. The precision fit of body parts results in picture-perfect dimensions.
Legendary curves
Every part of the New Beetle is curvy. Take for example the beautifully moulded backlights that make a statement and turn on the desire everywhere you go.
Elegantly crafted
The sleek headlights on the New Beetle are crafted to perfection. And help put a face to that legendary smile, each time you see the New Beetle.
Touches of perfection
To compliment the beautiful design of the New Beetle is a third brake light that seamlessly fits in at the back.
Attention to detail
The attractive design of the door handles are inspired by the rounded contours of the New Beetle.
Intricate precision
The clock and outside temperature display above the rear-view mirror match the interior design perfectly.
Self assured
Yes, we know it’s a small car. But when it comes to safety, the New Beetle gives you a feeling of security the moment you are seated inside. With ESP, ABS and other safety features in tow, the New Beetle comprises of a comprehensive active safety package, making it one of the safest vehicles in its class. We have also equipped the New Beetle with a passive safety package that gives you the greatest possible protection. The carefully matched restraint system, consisting of four airbags and a 3-point inertia reel seat belt system at front and rear, is also part of the standard equipment. Go ahead and enjoy the drive.
Steady steeringYou have a good grip on everything with the height and rake adjustment for the steering wheel – and a good view of the instrument cluster with blue illumination.
Stability on the roadThe Electronic Stabilisation Programme (ESP) keeps the New Beetle safely on course.
Always in control
Reassurance: The Anti-lock Braking System (ABS) ensures that the New Beetle remains steerable and controllable even when the braking is hard.
Reliably secure
An additional safety feature is the reflectors, which ensure that you can be clearly seen in the dark when the doors are opened.
Safe and secure
The front passenger’s airbag can easily be deactivated with the key of the vehicle.
Comfort and convenience
In a New Beetle, you enjoy the comfort and convenience afforded by an exclusive standard specification. Right from the 116PS (85 KW) engine version, it includes electrically adjustable and heated door mirrors, power steering, colour-keyed door mirror housings, door handles and bumpers and, of course, the legendary flower vase.
Luxurious seating
The drivers seat has a height adjustment apparatus for your sitting comfort and an optimal view
Extras all around
The storage compartment in the headlining provides space for small items needed during the journey.
Safe and secure
The fuel flap and luggage compartment can be unlocked from inside the vehicle at the touch of a button.
Easy accessibility
A specially designed cup holder sits at a comfortable distance in the New Beetle. So that while you’re on the move, your coffee break doesn’t need a stop.
Customized entertainment
Tune into the MP3 compatible ‘gamma' radio CD Player with Aux-in, which allows you to plug-in external equipment. With your favourite tracks at your fingertips, your drive in the New Beetle, will always make you sing with pleasure.
Happy Buying !!!
Thank you for reading !!!
A classic
Volkswagens are famed for their traditional quality and the New Beetle is naturally no exception – all materials used are carefully tested and have outstanding workmanship. The body is galvanised giving reliable protection against rust. The high-strength panels on the New Beetle are given additional stability at specific points which achieves a very high level of torsional rigidity. The precision fit of body parts results in picture-perfect dimensions.
Legendary curves
Every part of the New Beetle is curvy. Take for example the beautifully moulded backlights that make a statement and turn on the desire everywhere you go.
Elegantly crafted
The sleek headlights on the New Beetle are crafted to perfection. And help put a face to that legendary smile, each time you see the New Beetle.
Touches of perfection
To compliment the beautiful design of the New Beetle is a third brake light that seamlessly fits in at the back.
Attention to detail
The attractive design of the door handles are inspired by the rounded contours of the New Beetle.
Intricate precision
The clock and outside temperature display above the rear-view mirror match the interior design perfectly.
Self assured
Yes, we know it’s a small car. But when it comes to safety, the New Beetle gives you a feeling of security the moment you are seated inside. With ESP, ABS and other safety features in tow, the New Beetle comprises of a comprehensive active safety package, making it one of the safest vehicles in its class. We have also equipped the New Beetle with a passive safety package that gives you the greatest possible protection. The carefully matched restraint system, consisting of four airbags and a 3-point inertia reel seat belt system at front and rear, is also part of the standard equipment. Go ahead and enjoy the drive.
Steady steeringYou have a good grip on everything with the height and rake adjustment for the steering wheel – and a good view of the instrument cluster with blue illumination.
Stability on the roadThe Electronic Stabilisation Programme (ESP) keeps the New Beetle safely on course.
Always in control
Reassurance: The Anti-lock Braking System (ABS) ensures that the New Beetle remains steerable and controllable even when the braking is hard.
Reliably secure
An additional safety feature is the reflectors, which ensure that you can be clearly seen in the dark when the doors are opened.
Safe and secure
The front passenger’s airbag can easily be deactivated with the key of the vehicle.
Comfort and convenience
In a New Beetle, you enjoy the comfort and convenience afforded by an exclusive standard specification. Right from the 116PS (85 KW) engine version, it includes electrically adjustable and heated door mirrors, power steering, colour-keyed door mirror housings, door handles and bumpers and, of course, the legendary flower vase.
Luxurious seating
The drivers seat has a height adjustment apparatus for your sitting comfort and an optimal view
Extras all around
The storage compartment in the headlining provides space for small items needed during the journey.
Safe and secure
The fuel flap and luggage compartment can be unlocked from inside the vehicle at the touch of a button.
Easy accessibility
A specially designed cup holder sits at a comfortable distance in the New Beetle. So that while you’re on the move, your coffee break doesn’t need a stop.
Customized entertainment
Tune into the MP3 compatible ‘gamma' radio CD Player with Aux-in, which allows you to plug-in external equipment. With your favourite tracks at your fingertips, your drive in the New Beetle, will always make you sing with pleasure.
Happy Buying !!!
Thank you for reading !!!
Sony Ericsson Vivaz- A New Phase
Hey Readers,
Sony Ericsson has launced a very handy and smart phone that will shift you into a higher phase in your life.
General 2G Network GSM 850 / 900 / 1800 / 1900
3G Network HSDPA 900 / 2100
HSDPA 850 / 1900 / 2100
Announced 2010, January
Status Available. Released 2010, March
Size Dimensions 107 x 51.7 x 12.5 mm
Weight 97 g
Display Type TFT resistive touchscreen, 16M colors
Size 360 x 640 pixels, 3.2 inches
- Accelerometer sensor for UI auto-rotate
- Turn-to-mute and snoozing alarms
- Handwriting recognition
Sound Alert types Vibration; MP3 ringtones
Speakerphone Yes
- 3.5 mm audio jack
Memory Phonebook Practically unlimited entries and fields, Photocall
Call records Practically unlimited
Internal 75 MB storage
Card slot microSD, up to 16GB, 8GB included
Data GPRS Class 10 (4+1/3+2 slots), 32 - 48 kbps
EDGE Class 10, 236.8 kbps
3G HSDPA, 10.2 Mbps; HSUPA, 2 Mbps
WLAN Wi-Fi 802.11 b/g, DLNA
Bluetooth Yes, v2.1 with A2DP
Infrared port No
USB Yes, microUSB v2.0
Camera Primary 8 MP, 3264x2448 pixels, autofocus, LED flash
Features Video calling, touch focus, geo-tagging, face and smile detection
Video Yes, 720p@24fps, continuous autofocus, video light
Secondary No
Features OS Symbian Series 60, 5th edition
CPU 720 MHz, PowerVR SGX graphics
Messaging SMS (threaded view), MMS, Email, IM, Push Email
Browser WAP 2.0 / xHTML (NetFront)
Radio Stereo FM radio
Games Yes + downloadable
Colors Silver Moon, Cosmic Black, Galaxy Blue, Venus Ruby
GPS Yes, with A-GPS support; Wisepilot navigation
Java Yes, MIDP 2.1
- Google maps
- Facebook and Twitter apps
- YouTube and Picasa integration
- WMV/RV/MP4/3GP video player
- MP3/WMA/WAV/RA/AAC/M4A music player
-TV out (VGA resolution)
- Organizer
- QuickOffice document reader
- Gesture control
- Voice memo
- T9
Battery Standard battery, Li-Po 1200 mAh
Stand-by Up to 430 h (2G) / Up to 440 h (3G)
Talk time Up to 13 h (2G) / Up to 5 h 20 min (3G)
This is a very durable phone compared to other Sony Ericsson phones.It has a sleek design and a silk and slim finish.Sony Vivaz will be available in Silver Moon, Cosmic Black, Galaxy Blue and Venus Ruby Colors.
Thank you for reading !!!
Sony Ericsson has launced a very handy and smart phone that will shift you into a higher phase in your life.
General 2G Network GSM 850 / 900 / 1800 / 1900
3G Network HSDPA 900 / 2100
HSDPA 850 / 1900 / 2100
Announced 2010, January
Status Available. Released 2010, March
Size Dimensions 107 x 51.7 x 12.5 mm
Weight 97 g
Display Type TFT resistive touchscreen, 16M colors
Size 360 x 640 pixels, 3.2 inches
- Accelerometer sensor for UI auto-rotate
- Turn-to-mute and snoozing alarms
- Handwriting recognition
Sound Alert types Vibration; MP3 ringtones
Speakerphone Yes
- 3.5 mm audio jack
Memory Phonebook Practically unlimited entries and fields, Photocall
Call records Practically unlimited
Internal 75 MB storage
Card slot microSD, up to 16GB, 8GB included
Data GPRS Class 10 (4+1/3+2 slots), 32 - 48 kbps
EDGE Class 10, 236.8 kbps
3G HSDPA, 10.2 Mbps; HSUPA, 2 Mbps
WLAN Wi-Fi 802.11 b/g, DLNA
Bluetooth Yes, v2.1 with A2DP
Infrared port No
USB Yes, microUSB v2.0
Camera Primary 8 MP, 3264x2448 pixels, autofocus, LED flash
Features Video calling, touch focus, geo-tagging, face and smile detection
Video Yes, 720p@24fps, continuous autofocus, video light
Secondary No
Features OS Symbian Series 60, 5th edition
CPU 720 MHz, PowerVR SGX graphics
Messaging SMS (threaded view), MMS, Email, IM, Push Email
Browser WAP 2.0 / xHTML (NetFront)
Radio Stereo FM radio
Games Yes + downloadable
Colors Silver Moon, Cosmic Black, Galaxy Blue, Venus Ruby
GPS Yes, with A-GPS support; Wisepilot navigation
Java Yes, MIDP 2.1
- Google maps
- Facebook and Twitter apps
- YouTube and Picasa integration
- WMV/RV/MP4/3GP video player
- MP3/WMA/WAV/RA/AAC/M4A music player
-TV out (VGA resolution)
- Organizer
- QuickOffice document reader
- Gesture control
- Voice memo
- T9
Battery Standard battery, Li-Po 1200 mAh
Stand-by Up to 430 h (2G) / Up to 440 h (3G)
Talk time Up to 13 h (2G) / Up to 5 h 20 min (3G)
This is a very durable phone compared to other Sony Ericsson phones.It has a sleek design and a silk and slim finish.Sony Vivaz will be available in Silver Moon, Cosmic Black, Galaxy Blue and Venus Ruby Colors.
Thank you for reading !!!
Yamaha FZ 16 - The Beast Of Speed
Hey Readers,
Yamaha has come out with a bike that has unmached power in its range and has a cool look on and off the road.
Here are a few things you would not notice >>
1.Air cooled engine (no liquid cooling like tat with r15).
2.5 speed gearbox (nothing unusual here ).
3.Excessively colorful console.. looks awful.
4.Forgot to mention the all bullshit handle bar !
5.Overall specs are common and not like R15
6.Fragile tank and all other plastic cosmetics… definately not male ;)
7.No fuel injection
Specifications
* Engine type Air-cooled, 4-stroke, SOHC, 2-valve
* Displacement 153.0cm3
* Bore & Stroke 58.0 × 57.9mm
* Compression ratio 9.5:1
* Maximum output 14PS / 7500 rpm
* Maximum torque 14 N.m / 6000 rpm
* Starting method Electric starter
* Lubrication type Wet sump
* Carburetor type BS26
* Clutch type Constant mesh wet multiplate
* Ignition type CDI
* Primary/secondary reduction ratio 3.409 / 2.857
* Transmission type Return type 5-speed
* Frame type Diamond
* Suspension (front/rear) Telescopic / Monocross
* Wheelbase 1,335mm
* Brake type(front/rear) Hydraulic single disc / drum
* Tire size (front/rear) 100/80-17 / 140/60-R17
* Overall Length × Width × Height 1,975mm × 770mm × 1,045mm
* Seat height 790mm
* Wheelbase 1,335mm
* Minimum ground clearance 160mm
* Dry weight/Curb weight 126 kg / 137 kg
* Fuel tank volume 12 liters
* Engine oil volume 1.2 liter
Thanks for reading !!!
Yamaha has come out with a bike that has unmached power in its range and has a cool look on and off the road.
Here are a few things you would not notice >>
1.Air cooled engine (no liquid cooling like tat with r15).
2.5 speed gearbox (nothing unusual here ).
3.Excessively colorful console.. looks awful.
4.Forgot to mention the all bullshit handle bar !
5.Overall specs are common and not like R15
6.Fragile tank and all other plastic cosmetics… definately not male ;)
7.No fuel injection
Specifications
* Engine type Air-cooled, 4-stroke, SOHC, 2-valve
* Displacement 153.0cm3
* Bore & Stroke 58.0 × 57.9mm
* Compression ratio 9.5:1
* Maximum output 14PS / 7500 rpm
* Maximum torque 14 N.m / 6000 rpm
* Starting method Electric starter
* Lubrication type Wet sump
* Carburetor type BS26
* Clutch type Constant mesh wet multiplate
* Ignition type CDI
* Primary/secondary reduction ratio 3.409 / 2.857
* Transmission type Return type 5-speed
* Frame type Diamond
* Suspension (front/rear) Telescopic / Monocross
* Wheelbase 1,335mm
* Brake type(front/rear) Hydraulic single disc / drum
* Tire size (front/rear) 100/80-17 / 140/60-R17
* Overall Length × Width × Height 1,975mm × 770mm × 1,045mm
* Seat height 790mm
* Wheelbase 1,335mm
* Minimum ground clearance 160mm
* Dry weight/Curb weight 126 kg / 137 kg
* Fuel tank volume 12 liters
* Engine oil volume 1.2 liter
Thanks for reading !!!
Jonas Brothers - The Way to Fame !!!
Hey Readers,
The Jonas Brothers band consist of three brothers Kevin Jonas, Nicholas 'Nick' Jonas and Joseph 'Joe' Jonas. They were originally from Wyckoff New Jersey, where Kevin was born. Whilst Joe was born in Arizona and Nick in Texas.
With the release of the Jonas Brothers first record their music quickly rose to the top of the charts.
Now recently,Disney has hired them to perform on silver screen as actors and they are progressing rapidly even in this aspect.They have touched hearts of millions all over the world and people love their sons as they are meaningful and deep.
The Jonas Brothers brefing in short and individually is given below >>
Kevin Jonas
Kevin Jonas is 19 years old, and is the oldest of the three “Jonas Brothers.” Age at 13 Kevin taught himself to play guitar, simply by studying a “Teach Yourself Guitar” book that he had found laying around his parents home in New Jersey. Kevin spent about three days learning all of the major guitar chords, while he was home from school, due to illness. Not many people know that even before the band was formed, Kevin had already appeared in several television commercials, for Disney, Lego, and Burger King.
Joseph Jonas
Joseph Jonas is 17 years old, which puts him in the spot of “middle” child. While Joe originally wanted to be a comedian, he says he always had a love for music as well. Joe’s appearance in Baz Luhrmann's Broadway production of "La Bohème" was his first performance as a singer. Joe said that watching his younger brother, Kevin, perform on Broadway was what motivated him to want to give musical theatre a try. Since discovering his talent for musical performances, Joe has never turned back.
Nick Jonas
Nick Jonas is 14 years old, and the youngest of the three Jonas Brothers. Even though Nick is the youngest, he is sometimes referred to as the motivation behind the band. At age 6 Nick was singing while getting his hair cut at a local barber shop, when a lady heard him, and gave him a card, suggesting that he should meet with a professional manager. From that time on Nick was performing in front of audiences big and small. Nick landed roles in Broadway shows like “Annie Get Your Gun,” “Beauty and the Beast,” and “Les Miserables.”
Thank you for reading !!!
The Jonas Brothers band consist of three brothers Kevin Jonas, Nicholas 'Nick' Jonas and Joseph 'Joe' Jonas. They were originally from Wyckoff New Jersey, where Kevin was born. Whilst Joe was born in Arizona and Nick in Texas.
With the release of the Jonas Brothers first record their music quickly rose to the top of the charts.
Now recently,Disney has hired them to perform on silver screen as actors and they are progressing rapidly even in this aspect.They have touched hearts of millions all over the world and people love their sons as they are meaningful and deep.
The Jonas Brothers brefing in short and individually is given below >>
Kevin Jonas
Kevin Jonas is 19 years old, and is the oldest of the three “Jonas Brothers.” Age at 13 Kevin taught himself to play guitar, simply by studying a “Teach Yourself Guitar” book that he had found laying around his parents home in New Jersey. Kevin spent about three days learning all of the major guitar chords, while he was home from school, due to illness. Not many people know that even before the band was formed, Kevin had already appeared in several television commercials, for Disney, Lego, and Burger King.
Joseph Jonas
Joseph Jonas is 17 years old, which puts him in the spot of “middle” child. While Joe originally wanted to be a comedian, he says he always had a love for music as well. Joe’s appearance in Baz Luhrmann's Broadway production of "La Bohème" was his first performance as a singer. Joe said that watching his younger brother, Kevin, perform on Broadway was what motivated him to want to give musical theatre a try. Since discovering his talent for musical performances, Joe has never turned back.
Nick Jonas
Nick Jonas is 14 years old, and the youngest of the three Jonas Brothers. Even though Nick is the youngest, he is sometimes referred to as the motivation behind the band. At age 6 Nick was singing while getting his hair cut at a local barber shop, when a lady heard him, and gave him a card, suggesting that he should meet with a professional manager. From that time on Nick was performing in front of audiences big and small. Nick landed roles in Broadway shows like “Annie Get Your Gun,” “Beauty and the Beast,” and “Les Miserables.”
Thank you for reading !!!
Subscribe to:
Posts (Atom)