Wednesday, December 30, 2009

Storage and use of explosives


1. Store explosives only in licensed magazine.
2. Always maintain magazine in good condition.
3. Always keep gangway of 60 cm between stack of explosives boxes and wall.
4. Get all lightening conductors on magazine tested for continuity and resistance once in a year. The resistance of lightening conductors should less than 10 ?.
5. Mark license no. And validity prominently on licensed premises.
6. Mark 12 mm thick red line 2.5 m above floor level inside the magazine and do not stack explosives boxes above it.
7. Provide fencing at a distance of 15 m from magazine and keep the fenced area free of vegetation.
8. Always keep stock of explosives within licensed capacity.
9. Always issue old explosives first.
10. Provide security guards round the clock.
11. Keep security guard’s shelter at a distance of 30 m from magazine.
12. Always sell explosives to person/firm having valid licence.
13. Always report loss, theft or short receipt of explosives to controller of explosives and police.
14. Always take precautions to prevent mechanical impact of any hard object with explosives.
15. Always employ certified blaster for blasting operations.
16. Mark ‘danger – explosive’ and ‘turn off radio transmitter’ at the site.
17. Sufficient warning like display of red flag, whistle sound shall be given to public before blasting. Also display blasting time.
18. Suspend blasting operations during thunderstorms.
19. Blasting schedules should be arranged in such a manner that all holes charged with explosives are immidiately blasted on the same day. In case, for any reason, such charged holes cannot be blasted on the same day, these sleeping holes charged with explosives should be properly guarded from a suitable safe distance, till the same are blasted.
20. Always return unused explosives after day’s work to the magazine before sunset.
21. Respect explosives.


1. Don’t sell explosives to blaster on the strength of the shot firer’s permit.
2. Don’t sell explosives to unauthorized person.
3. Don’t undertake construction of building for manufacture or storage of explosives unless you obtain construction approval from licensing authority and NOC from district magistrate.
4. Don’t abandon any explosive material after use at site.
5. Don’t store explosives outside magazine.
6. Don’t use sparking tools.
7. Don’t throw, drop boxes of explosives.
8. Never use bale hook during loading/unloading of explosives boxes.
9. Don’t cut explosives cartridges or change description of explosives.
10. Don’t deface markings on cartridge or box of explosives.
11. Don’t store high explosives and detonators together.
12. Don’t use misfired explosives.
13. Don’t use deteriorated or exuded explosives.
14. Don’t attach detonator to detonating cord until every thing is ready for blast.
15. Don’t use mobile phones/pagers near place of storage and use of explosives.
16. Don’t use iron impliments during preparation of charges.
17. Don’t deliver explosives unless photograph and signature of authorized person are verified.

(B) Transport of explosives


1. Always maintain transport vehicle in good mechanical & road worthy condition.
2. Always carry two fire extinguishers in explosives van.
3. In case of breakdown of explosives van, inform controller of explosives and local police.
4. Always carry following documents during transport of explosives:
a) Indent in form RE-11
b) Pass in form RE-12
c) Copy of explosives van’s licence.
d) Bill/invoice.
5. Two armed guard should always accompany explosives van during transport of explosives. In sensitive area notified by MHA, the police armed guard shall be provided.
6. Employ only trained driver and cleaner, whose antecedents are verified by police.
7. Always maintain 300 m distance between two vans carrying explosives.
8. Always load/unload explosives only when explosives van’s

a) Engine of the vehicle is stopped.
b) Wheels chocked.
c) Hand brakes applied.

9. Always avoid routes passing through centre of dense habitation and municipal limits.
10. Always give notice of accident to controller of explosives, District Magistrate and police.


1. Don’t stop explosives van un-necessarily or for longer duration during transportation on road.
2. Don’t transport flammable substance with explosives.
3. Don’t transport detonators with other type of explosives.
4. Don’t carry passengers while transporting explosives in van.
5. Don’t employ any person:

Who is below 18 yrs of age.
Who is in state of intoxication.
Who is mentally or physically challenged.

6. Do not transport explosives in the night (from Sunset to Sunrise) in the sensitive areas notified by Ministry of Home Affairs (MHA).

Dos & Don'ts - Fireworks Display

Dos & Don'ts - Fireworks Display

* Buy fireworks of authorized/reputed manufacturers only.
* Light only one firework at a time, by one person. Others should watch from a safe distance.
* Keep the fireworks to be used at a safer place.
* Organize a community display of fireworks rather than individuals handling crackers.
* Always use a long candle/'phooljhari' for igniting fire crackers and keep elbow joint straight to increase the distance between the body and the crackers.
* Keep two buckets of water handy. In the event of fire, extinguish flame by pouring water from the buckets. Every major fire is small when it starts.
* In case of burns, pour large quantity of water on the burnt area.
* In case of major burns, after extinguishing the fire, remove all smoldering clothes. Wrap the victim in a clean bedsheet.
* The patient should be taken to a burns specialist or a major hospital. Don't panicky.
* In case of eye burns, wash the eye with tap water for 10 minutes and take the victim to a hospital.


* Don't ignite fireworks while holding them.
* Don't bend over the fireworks being ignited.
* Don't ignite fireworks in any container.
* Don't approach immediately to the misfired fireworks.
* Don't tamper with misfired fireworks.
* Don't attempt to make fireworks at home.
* Don't allow small children to handle fireworks.
* Don't throw or point fireworks at other people.
* Don't carry fireworks in the pocket.
* Don't store firecrackers near burning candles and diyas.
* Don't light firecrackers in narrow by lanes; preferably use open areas and parks.
* Don't wear synthetic clothing; preferably wear thick cotton clothing.
* Don't wear loosely hanging clothes; secure all clothes properly.
* Don't apply any cream or ointment or oil on burnt area.
* Don't drive recklessly while taking a burn victim to the hospital; a delay of up to one hour is immaterial.
* Don't light flying fireworks if there is a heavy wind

Tuesday, December 22, 2009

Maintenance Tips for Your PC

Operating & Environment Conditions

* Do not place a PC directly near a heating or cooling source, such as heating vents or air conditioners. Both excessive heat and cold can damage a PC. This includes putting the PC in the path of direct sunlight.
* Manufacturers often recommend that PCs be in a humidity-controlled environment, but again the PC should not be positioned so that an air conditioner is blowing cool air directly onto the unit (as temperature drops, the likelihood of static electricity increases).
* Keep the PC's air vents and fans unobstructed and free of dust.
* Do not smoke around a PC. Cigarette smoke can damage exposed metal contacts.
* Do not place a PC near water sources that can splash onto the components or drip down into them. This includes open windows through which rain can come and also under plants than can drip water down into them.
* Do not connect power sources directly into wall outlets but rather connect them first to some form of surge protector. Surge protectors prevent electrical surges from destroying hard drives and erasing data.
* Buildup of dust can seriously hamper a PC's capability to cool down, and even if you never open your computer's case dust can still get in through the drive openings. Dust also compromises the lifespan of your PC's hardware. An efficient way to clean dust from the inside of a computer is with compressed air, blowing dust away from the motherboard and other components. You should never blow air directly into a floppy drive as this can cause dust to lodge in the drive and cause it to malfunction. Users who are not familiar with working inside a computer case should take the unit to a professional for cleaning because it is possible to do more harm than good to a computer if you do not know how to safely work inside of a case.
* Always turn off and unplug the system before you clean any of the components inside the case. It is also important to ground yourself to prevent static electricity discharge before touching any components inside.
* Be extremely careful when moving a PC from one location to another. Even small jolts can dislodge chips and expansion boards, so be sure to power off the system before moving it — even if it's only going from one side of your desk to another.
* Save all documentation that comes with your PC and its components. You may need to refer to the documentation if something goes wrong.
* Always shut your system down properly (in Windows use the Start --> Shutdown method) whenever possible. It is also important to respond to warnings and error messages to prevent possible data loss or corruption.

Operating System & Data Maintenance

* Always ensure you have downloaded and installed the latest patches and service updates for your operating system, especially on a Windows-based PC. These updates will fix bugs and security exploits.
* Keep the root directory organized. Only keep your system's startup and software initialization files in the root directory. Application files and their data belong in a separate directory from the root directory.
* Do not store data files in the same directory that you store the software. This will eliminate the possibility of accidentally erasing or overwriting a software file.
* Keep a set of backup rescue disks for the operating system.
* Keep meticulous records of default settings, any changes you make in a system's CMOS setup that differ from the default settings, and any maintenance you perform on the system. You can often use this record to backtrack when you are troubleshooting a problem and will become valuable if you decide to upgrade any of the system's components. It is also possible for the CMOS to lose settings and you will want a record of the setup to reconstruct it.
* Keep backup copies of any important data on a removable medium. Hard drives can fail and having important data on more than one medium can save a lot of stress and headaches.
* If possible use a secondary hard drive in your system for saving files. Your main drive, which is accessed more frequently is prone to mechanical drive failure sooner than your less frequently accessed secondary hard drive would be.
* Over time when you add and remove software, devices and drives, you'll be left with extraneous system registry entries, which can lead to slower performance. You can use system utilities (purchased or good shareware) that will help you keep your Windows system registry cleaned.

Hardware & Hard Drive Maintenance

* Keep records of any expansion cards you install and the procedures you follow to install them.
* Windows has a disk clean up function which will remove temporary files created by programs. This can free up additional hard drive space.
* Defrag your hard drives. A PC runs better with regular disk Defrag. Defragging your hard drive organizes your hard drive so that access to files and programs is more efficient.

* If you are using a trackball mouse be sure to frequently clean the rollers inside to keep the mouse moving smoothly.
* Clean your CRT monitor with standard glass cleaner and a lint free cloth. Be sure to spray the cloth with cleaner and then wipe — do not spray cleaner directly on the monitor.
* Most LCD displays can be cleaned with isopropyl. However, you should check your manual for the manufacturer's cleaning recommendations.
* Extend the lifespan of your computer monitor by shutting it off when not in use.
* Be sure to update drivers and software for your expansion cards, such as video or sound cards. By using updated drivers your hardware usually will run better.

Software Maintenance

* Keep a backup copy of original software, either on CD or DVD. This type of software copying is perfectly legal.
* Be wary of installing file sharing and other peer-to-peer software as they represent a security risk to your PC. While the software itself may very well be virus-free and not represent a security risk, sharing your files and downloading other users' files can be.
* Purge your software. Getting rid of unused software frees up additional system resources and hard disk space. To uninstall software on a Windows PC, use the "Add/Remove Programs" function from the Control Panel.
* For better system performance avoid using shareware (or freeware) wallpaper, screensavers, and similar audio and visual apps. These will usually require extra system resources to run.

Antivirus Protection

* Install an antivirus program that automatically scans for viruses when the system boots.
* Once you have an antivirus program you will need to update the virus definitions daily to ensure your system is protected against the latest threats.
* Do not download any files from the Internet unless you are certain the source is not transmitting a virus to you.
* Do not use any storage media that has been used in another computer unless you are certain the other computer is free of viruses and will not pass the virus on to your system.
* Never open e-mail attachments from people you don't know; and don't open any file attachment that ends in '.exe., All downloaded files should be scanned by your anti-virus application before you run or install it.

Sunday, December 20, 2009


list of Web service protocols.

BEEP - Blocks Extensible Exchange Protocol
E-Business XML
Qworum - Defines the concept of Qworum services, which are building blocks for web applications. Qworum services return XML results like conventional RPC services. In addition they can interact with the end-user through web pages during the call, and they can call other Qworum services.
REST (Representational State Transfer)
SOAP - outgrowth of XML-RPC, originally an acronym for Simple Object Access Protocol
Universal Description, Discovery, and Integration (UDDI)
Web Services Description Language (WSDL)
WSFL - Web Services Flow Language (superseded by BPEL)
WSCL - Web Services Conversation Language
XINS Standard Calling Convention - HTTP parameters in (GET/POST/HEAD), POX out
XLANG - XLANG-Specification (superseded by BPEL)
XML-RPC - XML Remote Procedure Call

List of markup languages for web services.

Web template
Web Services Description Language (WSDL) from the W3C
XML Interface for Network Services (XINS) provides a POX-style Web service specification format
Web Services Conversation Language (WSCL)
Web Services Flow Language (WSFL) (superseded by BPEL)
Representational State Transfer (REST) versus remote procedure call (RPC)
XML-RPC - XML Remote Procedure Call

A list of web service frameworks:

Name Platform Messaging Model (Destination) Specifications Protocols
Apache Axis Java/C++ Client/Server WS-ReliableMessaging, WS-Coordination, WS-Security, WS-AtomicTransaction, WS-Addressing SOAP, WSDL
Apache Axis2 Java/C Client/Server/ Asyn Support WS-ReliableMessaging,WS-Security, WS-AtomicTransaction, WS-Addressing ,MTOM ,WS-Policy, WS-MetadataExchange SOAP,MTOM, WSDL 2.0, WSDL
Apache CXF Java Client/Server/ Asyn Support WS-Addressing, WS-Policy, WS-ReliableMessaging, WS-Security, WS-SecureConversation, WS-SecurityPolicy, WS-Trust, MTOM SOAP1.1, SOAP1.2,MTOM, WSDL 2.0, WSDL
Java Web Services Development Pack / GlassFish Java Client/Server WS-Addressing, WS-Security, ??? SOAP, WSDL, ???
.NET Framework C#, VB .NET Client/Server WS-Addressing, WS-Security, SOAP, WSDL, ???
Web Services Interoperability Technology Java Client/Server WS-Addressing, WS-ReliableMessaging, WS-Coordination, WS-AtomicTransaction, WS-Security, WS-Security Policy, WS-Trust, WS-SecureConversation, WS-Policy, WS-MetadataExchange SOAP, WSDL, MTOM
Web Services Invocation Framework Java Client ??? SOAP, WSDL
Windows Communication Foundation .Net Client/Server ? WS-Addressing, WS-ReliableMessaging, WS-Security SOAP, WSDL
WSO2 WSF/PHP PHP Client/Server SOAP MTOM, WS-Addressing, WS-Security, WS-SecurityPolicy, WS-Secure Conversation, WS-ReliableMessaging SOAP, WSDL
XFire became Apache CXF Java Client/Server WS-Addressing, WS-Security SOAP, WSDL
XML Interface for Network Services Java Server ? ?? SOAP, XML-RPC, WSDL, JSON-RPC, JSON

Internet Timeline

ARPA (Advanced Research Projects Agency) goes online in December, connecting four major U.S. universities. Designed for research, education, and government organizations, it provides a communications network linking the country in the event that a military attack destroys conventional communications systems.
Electronic mail is introduced by Ray Tomlinson, a Cambridge, Mass., computer scientist. He uses the @ to distinguish between the sender's name and network name in the email address.
Transmission Control Protocol/Internet Protocol (TCP/IP) is designed and in 1983 it becomes the standard for communicating between computers over the Internet. One of these protocols, FTP (File Transfer Protocol), allows users to log onto a remote computer, list the files on that computer, and download files from that computer.
Presidential candidate Jimmy Carter and running mate Walter Mondale use email to plan campaign events.
Queen Elizabeth sends her first email. She's the first state leader to do so.
The word “Internet” is used for the first time.
Domain Name System (DNS) is established, with network addresses identified by extensions such as .com, .org, and .edu.
Writer William Gibson coins the term “cyberspace.”
Quantum Computer Services, which later changes its name to America Online, debuts. It offers email, electronic bulletin boards, news, and other information.
A virus called the Internet Worm temporarily shuts down about 10% of the world's Internet servers.
The World ( debuts as the first provider of dial-up Internet access for consumers.
Tim Berners-Lee of CERN (European Laboratory for Particle Physics) develops a new technique for distributing information on the Internet. He calls it the World Wide Web. The Web is based on hypertext, which permits the user to connect from one document to another at different sites on the Internet via hyperlinks (specially programmed words, phrases, buttons, or graphics). Unlike other Internet protocols, such as FTP and email, the Web is accessible through a graphical user interface.
The first effort to index the Internet is created by Peter Deutsch at McGill University in Montreal, who devises Archie, an archive of FTP sites.
Gopher, which provides point-and-click navigation, is created at the University of Minnesota and named after the school mascot. Gopher becomes the most popular interface for several years.
Another indexing system, WAIS (Wide Area Information Server), is developed by Brewster Kahle of Thinking Machines Corp.
Mosaic is developed by Marc Andreeson at the National Center for Supercomputing Applications (NCSA). It becomes the dominant navigating system for the World Wide Web, which at this time accounts for merely 1% of all Internet traffic.
The White House launches its website,
Initial commerce sites are established and mass marketing campaigns are launched via email, introducing the term “spamming” to the Internet vocabulary.
Marc Andreessen and Jim Clark start Netscape Communications. They introduce the Navigator browser.
CompuServe, America Online, and Prodigy start providing dial-up Internet access.
Sun Microsystems releases the Internet programming language called Java.
The Vatican launches its own website,
Approximately 45 million people are using the Internet, with roughly 30 million of those in North America (United States and Canada), 9 million in Europe, and 6 million in Asia/Pacific (Australia, Japan, etc.). 43.2 million (44%) U.S. households own a personal computer, and 14 million of them are online.
On July 8, 1997, Internet traffic records are broken as the NASA website broadcasts images taken by Pathfinder on Mars. The broadcast generates 46 million hits in one day.
The term “weblog” is coined. It’s later shortened to “blog.”
Google opens its first office, in California.
College student Shawn Fanning invents Napster, a computer application that allows users to swap music over the Internet.
The number of Internet users worldwide reaches 150 million by the beginning of 1999. More than 50% are from the United States.
“E-commerce” becomes the new buzzword as Internet shopping rapidly spreads. is launched.
To the chagrin of the Internet population, deviant computer programmers begin designing and circulating viruses with greater frequency. “Love Bug” and “Stages” are two examples of self-replicating viruses that send themselves to people listed in a computer user's email address book. The heavy volume of email messages being sent and received forces many infected companies to temporarily shut down their clogged networks.
The Internet bubble bursts, as the fountain of investment capital dries up and the Nasdaq stock index plunges, causing the initial public offering (IPO) window to slam shut and many dotcoms to close their doors.
America Online buys Time Warner for $16 billion. It’s the biggest merger of all time.
Napster is dealt a potentially fatal blow when the 9th U.S. Circuit Court of Appeals in San Francisco rules that the company is violating copyright laws and orders it to stop distributing copyrighted music. The file-swapping company says it is developing a subscription-based service.
About 9.8 billion electronic messages are sent daily.
Wikipedia is created.
As of January, 58.5% of the U.S. population (164.14 million people) uses the Internet. Worldwide there are 544.2 million users.
The death knell tolls for Napster after a bankruptcy judge ruled in September that German media giant Bertelsmann cannot buy the assets of troubled Napster Inc. The ruling prompts Konrad Hilbers, Napster CEO, to resign and lay off his staff.
It's estimated that Internet users illegally download about 2.6 billion music files each month.
Spam, unsolicited email, becomes a server-clogging menace. It accounts for about half of all emails. In December, President Bush signs the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act), which is intended to help individuals and businesses control the amount of unsolicited email they receive.
Apple Computer introduces Apple iTunes Music Store, which allows people to download songs for 99 cents each.
Spam, unsolicited email, becomes a server-clogging menace. It accounts for about half of all emails.
Apple Computer introduces Apple iTunes Music Store, which allows people to download songs for 99 cents each.
Internet Worm, called MyDoom or Novarg, spreads through Internet servers. About 1 in 12 email messages are infected.
Online spending reaches a record high—$117 billion in 2004, a 26% increase over 2003.
2005 is launched.
There are more than 92 million websites online.
Legal online music downloads triple to 6.7 million downloads per week.
Colorado Rockies' computer system crashes when it receives 8.5 million hits within the first 90 minutes of World Series ticket sales.
The online game, World of Warcraft, hits a milestone when it surpasses 9 million subscribers worldwide in July.
In a move to challenge Google's dominance of search and advertising on the Internet, software giant Microsoft offers to buy Yahoo for $44.6 billion.
In a San Fransisco federal district court, Judge Jeffrey S. White orders the disabling of, a Web site that discloses confidential information. The case was brought by Julius Baer Bank and Trust, located in the Cayman Islands, after a disgruntled ex-employee allegedly provided Wikileaks with stolen documents that implicate the bank in asset hiding, money laundering, and tax evasion. Many web communities, who see the ruling as unconstitutional, publicized alternate addresses for the site and distributed bank documents through their own networks. In response, Judge White issues another order to stop the distribution of bank documents.
Microsoft is fined $1.3 billion by the European Commission for further abusing its dominant market position, and failing to comply to their 2004 judgment, which ordered Microsoft to give competitors information necessary to operate with Windows. Since 2004, Microsoft has been fined a total of $2.5 billion by the Commission for not adhering to their ruling.

Some Health Tips
Prevention is better than cure.
Good diet, calm mind and adequate exercise are the secrets of health.
A good diet will include fresh fruits and raw vegetables wherever possible.
Self-medication is dangerous. Consult your doctor.
Avoid consulting quacks.
If you have a family history of diabetes, high blood pressure or heart attack consult your doctor and get checked for any early detection.
Regular exercise or games for about 30 minutes a day and at least 6 days in a week will keep you healthy and will improve your memory capacity.
Walking and cycling are much healthier than scooter/motorcycle riding.
More the exercise at your young age (between 15 and 25 years), more the blood supply to the heart, brain, kidney, lungs etc. and a healthier life after the age of 40

.NET Framework

The .NET Framework is designed to fulfill the following objectives:

* To provide a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely.
* To provide a code-execution environment that minimizes software deployment and versioning conflicts.
* To provide a code-execution environment that promotes safe execution of code, including code created by an unknown or semi-trusted third party.
* To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments.
* To make the developer experience consistent across widely varying types of applications, such as Windows-based applications and Web-based applications.
* To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code.

Friday, December 04, 2009

Project Estimations

1. Project estimates must be based on the application’s architecture. Making estimates based on an application’s architecture should give you a clear idea of the length of the entire development project phase. Moreover, an architecture-based estimation provides you a macro-level view of the resources needed to complete the project.
2. Project estimations should also come from the ground up. All estimates must add up, and estimating the collective efforts of the production teams that work on the application’s modules helps identify the number of in-house and outsourced consultants that you need to hire for the entire project, as well as have a clear idea of the collective man-hours required to code modules or finish all features of the application. Ground-up estimates are provided by project team members and do not necessarily match top-level estimates exactly. In this case, it is best to add a percentage of architecture-based estimates to give room to possible reworks, risks, and other events that may or may not be within the control of the project staff.
3. Do not forget modular estimates. Once you have a clear idea of the architecture, it becomes easier to identify the modules that make up the entirety of the application. Knowing the nature of these modules should help you identify which can be done in-house or onshore, or by an offshore development team. Moreover, given the location and team composition of each development team that works on a module, it becomes easier to identify the technical and financial resources needed to work on the codes.
4. Development language matters. Whether the development language is Java, .Net, C++ or any other popular language used by software engineers, team that will be hired for the project must be knowledgeable in it. Some development efforts require higher skills in these languages, while some only need basic functional knowledge, and the levels of specialization in any of these languages have corresponding rates. Most of the time, the chosen development language depends on the chosen platform, and certain platforms run on specialized hardware.
5. You cannot promise upper management dramatic costs from offshoring. While there are greater savings from having development work done by offshore teams composed of workers whose rates are significantly lower from onshore staff, you must consider communication, knowledge transfer, technical set-up, and software installation costs in your financial estimates. Estimating costs is often more about managing expectations, but as the project matures, it should be clearer whether the money spent on it was money that was spent well.
6. Project estimation software and tools help identify “what-if” scenarios. Over the years, project managers have devised ways to automate project schedule, framework, cost, and staffing estimates. Some estimation applications also have sample historical data or models based on real-world examples. If your business has a lot in common with the samples in the estimation tool, it can help you identify what-if scenarios and in turn include risks, buffers, and iteration estimates.
7. Price break-down helps in prioritization. Breaking down the total cost of the project helps management decide which parts of a system should be prioritized, delayed, or even cancel. Estimating costs for a new project may not be easy, but project sponsors and managers must be able to know and agree on the breakdown of costs of development, technical requirements, and overhead.

Friday, November 20, 2009

Hunger Facts

1. Hunger remains the No.1 cause of death in the world. Aids, Cancer etc. follow.
2. There are 820 million chronically hungry people in the world.
3.1/3rd of the worldÂ’s hungry live in India.
4. 836 million Indians survive on less than Rs. 20 (less than half-a-dollar) a day.
5.Over 20 crore Indians will sleep hungry tonight.
6. 10 million people die every year of chronic hunger and hunger-related diseases. Only eight percent are the victims of hunger caused by high-profile earthquakes, floods, droughts and wars.
7. India has 212 million undernourished people – only marginally below the 215 million estimated for 1990–92.
8. 99% of the 1000 Adivasi households from 40 villages in the two states, who comprised the total sample, experienced chronic hunger (unable to get two square meals, or at least one square meal and one poor/partial meal, on even one day in the week prior to the survey). Almost as many (24.1 per cent) had lived in conditions of semi-starvation during the previous month.
9. Over 7000 Indians die of hunger every day.
10. Over 25 lakh Indians die of hunger every year.
11. Despite substantial improvement in health since independence and a growth rate of 8 percent in recent years, under-nutrition remains a silent emergency in India, with almost 50 percent of Indian children underweight and more than 70 percent of the women and children with serious nutritional deficiencies as anemia.
12. The 1998 – 99 Indian survey shows 57 percent of the children aged 0 – 3 years to be either severely or moderately stunted and/or underweight.
13. During 2006 – 2007, malnutrition contributed to seven million Indian children dying, nearly two million before the age of one.
14. 30% of newborn are of low birth weight, 56% of married women are anaemic and 79% of children age 6-35 months are anaemic.
15. The number of hungry people in India is always more than the number of people below official poverty line (while around 37% of rural households were below the poverty line in 1993-94, 80% of households suffered under nutrition).
Sources :
UN World Food Programme
UN World Health Organization: Global Database on Child Growth and Malnutrition, 2006
UN Food and Agriculture Organization: SOFI 2006 Report
National Commission for Enterprises in the Unorganized Sector (India)
National Family Health Survey 2005 – 06 (NFHS-3) (India)
Centre for Environment and Food Security (India)
Rural 21 (India)
Hunger Quotes

"For now I ask no more than the justice of eating."
- Pablo Neruda, Chilean Poet, Noble Prize Winner
"I understood then that for my people life was not allowed and the grave has forbidden them."
- Pablo Neruda, Chilean Poet, Noble Prize Winner
"The world is full of suffering, it is also full of overcoming it."
- Helen Keller, American Author and Activist
"Never doubt that a small group of thoughtful committed citizens can change the world; indeed, it's the only thing that ever has."
- Margaret Mead
"What the people of the world want most and have always wanted is bread and peace."
- Patricia Young, UN General Assembly
"When India achieved independence, more than 50 years ago, the people of the country were much afflicted by endemic hunger. They still are."
- Amartya Sen, Nobel Prize Winner
"Estimates of general undernourishment - what is sometimes called protein-energy malnutrition - are nearly twice as high in India as in Sub-Saharan Africa."
- Amartya Sen, Nobel Prize Winner
"The most startling aspect of the nutrition situation in India is that it is not much of an issue in public debates and electoral politics."
- Jean Dreze, economist
"The chronic hunger and malnutrition that afflicts 300 million children worldwide does not create the dramatic media coverage of a tsunami, but it causes far greater suffering."
- James T. Morris, WFP Executive Director
"The government can't get away with large-scale famine, but it can get away with chronic hunger. It has become an accepted part of life in India."
- Jean Dreze, economist and academic
“The number of people who fell prey to Hitler’s insanity was 6 million and the 'silent holocaust of hunger' is killing over 13 million people every year."
- Sanhati

Thursday, November 05, 2009


Burgeoning urban population, changing social values and evolving technology - various factors pose a constant challenge to Chennai city police, in their fight against crime.

Certain simple precautions taken up by the public can go a long way in making policing more effective and reducing crime opportunities.

Some of these precautions, which can be adopted by the public, are listed below. This is not an exhaustive list but an indicative one.
Doors And Windows
Always keep your main door closed. Provide it with a peephole.
Fix a metal grill or collapsible gate outside the main door, which will provide you the visibility without exposing you to threats.
Ensure that the window grills are not screwed into the frames, but embedded in the cement work.
Whenever you move into a new house, change the main door and back door locks.
Where air-conditioners are fixed provide an additional grill outside.
There is generally a spate of 'window snatching' during the hot summer months. The public is advised to sleep at a certain distance from the open windows.
Do not keep valuables, purses, mobile phones, and wristwatches openly visible from outside. If possible fix mosquito nets on the nets, which won't cut off ventilation.
Fix Electronic burglar alarms with telephone for warning. Now it is available for Rs.800 - Rs. 1000. onwards.

Switch on outside lights during nighttime.
When you go out, switch on at least one inside light, to give the impression that the house is not empty.
There are timer mechanisms available in the market, which control lights. If you are planning to be away from home for some days, install one of these gadgets. [TOP]

Going Out ?
The city police provide a free service to the public. When you are going out of station, you can inform to the local station the duration of your absence. The beat constables will keep watch regularly.
You can also use the SMS facility to inform. Send SMS " LOCKED HOUSE, NUMBER X, X Street . X locality. Period FROM date X, Month X TO Date X, Month X " to 98407 00100 [Available presently for Chennai city residents only].

Ensure your watchman is an able bodied person. Do approach the local police to verify his antecedents.
Surprise the watchman at wee hours to ensure he doesn't sleep.
Organise night patrols in your community. The local police will assist you if approached through the residents' association.
Keep touch with the beat police constables while they are coming to your area and keep them informed of even minor incidences. This will prevent major crimes in future.
Install eBeat chip in at least one house in the street. Residence can approach the local station to get installed a eBeat chip in compound wall, for the nominal payment. To know more about eBeat [Available presently for Chennai city residents]
Don't allow strangers who claim to be mechanics / messengers / sales people to enter, without thoroughly checking their credentials. Train your watchman also to do so.
Inform the local police of suspicious characters.
If at all you have to allow them inside when you are alone, call the watchman or a neighbour to stay around till the work is completed
Inform without delay of any gambling activities, pirated/ porno CD distribution, drug or illicit peddling in your locality. Any hesitation will result in increase of criminal elements in your locality
Remember. The more you deny temptation, lesser will be the chances of being robbed.

Jewels / Cash / Documents

Keep jewels, important documents and other valuables in bank lockers. Bring them home only when absolutely necessary.
Don't keep valuables or money in the side box of your parked two-wheeler.
Don't leave valuables or money in your Car while parking.
Ladies are advised to conceal their neck jewels while traveling in public transportations and during public festivals.
If you are coming out of the bank after heavy withdrawals or out of a jeweler after purchase, be alert of somebody trying to divert your attention; by pointing out to dirt or waste on your person, spitting betel nut on you or throwing some money on the street.
Keep your valuables or money safely tucked away inaccessibly on your person while traveling in public transportations. If you carrying them in a bag, keep the bag close to your person in front of you.
Do not respond to people offering to assist or sexual advances in public transportations. These are some of the common diversionary tactics employed.
The safest will be to avoid traveling in crowded transportations while carrying heavy cash or valuables.

Servant Verification
The city police provide a free service to the public. Whenever you are engaging the services of Domestic Servants like Maid, Caretaker, Cook, Driver, Office Boy or Watchman you can approach the local station for verifying their antecedents [Available presently for Chennai city residents].

Vehicle Safety
Use fork lock in your two wheelers while parking.
While going shopping or anywhere please park your vehicles in the vehicles parking lot.
During the night hours don't park your vehicles out side your compound wall.
In case your vehicle is stolen, please inform the local police station as early as possible. The delay in informing will result in more crimes being committed and increase the difficulty in tracing the vehicle.
If you notice an unattended and unknown vehicle parked for a day or more, inform the local police, beat constables or CONTROL ROOM
When buying a used vehicle, compare the Registration number, Engine number and Chassis number with the RC book. Checkup with database of lost and found vehicle in this website.

Shops /Banks
Bankers, Jewelers and shop owners are advised to fix Burglar alarm, CCTV and engage young and healthy watchmen after checking their antecedents.
Get trained in detecting fake credit cards and counterfeit.
Banks are advised to install hot lines with the local police stations.
The frontage should be well lit after business hours. Do not allow tramps, paper pickers and beggars to sleep in the shop front.
New type of Shutters (Single Piece) cannot be easily breached.

Credit Card Users
In case of losing the credit card, lodge a complaint with the bank immediately. It will enable the bank to announce it as 'hot card' as early as possible, making it possible to nab the culprit. This will also protect you from liabilities, which may be incurred using the stolen card.
Do not write the PIN number on the card itself.

Using An ATM
Make sure your privacy is not intruded while using the ATM
Collect the cash and count it as unobtrusively as possible.
Keep the cash in its place before coming out of the ATM booth
Make sure you log out in the right sequence
Don't forget to collect the card from the slot.
Do not ask for assistance from any unauthorised person.
Do not encourage strangers who offer unsolicited advice.
Avoid using ATMs in uncrowded places especially late night
When signing the bill counterfoil, after making a purchase using the credit card, make sure there are no duplicates or additional bills.

Senior Citizens
Inform the local police station if Senior citizens are home alone for a considerable period of time.
They are advised to exercise precaution in interacting with or taking assistance from strangers.
Remember to call CONTROL ROOM


General precaution is advised to avoid lonely places or attracting unwanted attention.
Remember an exclusive WOMEN /CHILD HELPLINE is available in all the districts.
See the exclusive section CRIME AGAINST WOMAN"

Teach your child to tell your name, house address and contact numbers, which will be very useful if they get lost.
But advise them not to pass on this information to casual enquirers or over phone.
Don't leave children alone in crowded places. For toddlers who are yet to communicate clearly, tie an identity tag/card.
Train the children not to accept eatables from strangers, not to accompany strangers who call them on some pretext.
Remember an exclusive WOMEN/CHILD HELPLINE is available in all the districts

Ensure the luggage is latched and locked.
Secure your luggage with a chain lock. Do not leave them unattended.
Do not accept eatables from co-travelers.
Do not reveal too many personal details to strangers.

Early morning walkers are advised to avoid wearing valuable jewels, which will attract the snatchers.
Please avoid walking in the dark, especially in lonely stretches.
It's advisable for women to avoid lonely stretches even during daytime.

Job Rackets
Be wary of advertisements or individuals offering overseas jobs. Check their antecedents.
Check the website of the companies in which jobs are promised.
If needed do not hesitate to approach the consulate of the country.
Before complaining contact the following organisations to crosscheck the facts of employers.
Ministry of Labour. Protector of Emigrants. TNHB Shopping Centre, Ashok nagar, Chennai-83
Tamilnadu Overseas Employment Corporation, 41, McNichols Road , Chetput,Chennai-31
The Central Crime Branch at the Office of the Commissioner of Police, Pantheon Road , Egmore can be approached to prefer complaints on overseas job rackets.
For emergency complaints contact the CONTROL ROOM

How To Avoid Identity Theft

Identity Theft is a recent phenomenon. Globally, over 500,000 people are victims of this crime each year. The best protection always is prevention. Here are some tips to safeguard your good name:
BEWARE Any document that has personal financial information on it can give an identity thief a foothold into your life.
Put the charge slip copies in a safe spot until your credit card bills arrive.
After you've reconciled your bill, shred every statement, in­cluding credit card re­ceipts, old bank statements, medical statements, every­day bills and pre-approved credit card offers.
Write clearly on all credit applications. Consistently and completely fill in all credit and loan applications using your full name, first, middle and last. Every bill that comes to your house should be addressed exactly the same.
Monitor your credit accounts carefully, so you'll know if a bill's missing or unauthorised purchases have been made.
Close out unused credit cards. Cutting them up is not enough.
Limit the number of credit cards you carry. The fewer cards you have, the easier it is to track them.
If you're moving, contact all your creditors and update them of your address changes immediately. You don't want credit in­formation and new credit cards being delivered to the wrong address.
If your credit card expires and you don't receive a new one, call your creditor immediately.
Don't provide your credit card number to anyone who con­tacts you through telephone solicitation.
Make sure any online credit card charges are handled through a secure site or in an encrypted mode. You'll know you're on a secure site if the web page on which you conduct your trans­action begins with 'https' instead of the usual 'http'.
Only shop on websites that offer a privacy policy. Know how your personal information will be handled. Print out privacy policies, warranties, price guarantees and other important information.
Be watchful of shoulder-surfers. At ATMs and phone booths, thieves will stand close enough to see PIN num­bers punched in by users.

Parents Guide to INTERNET safety

Parents should recognise the benefits that the internet offers but should also be aware of the potential dangers online.The naive and trustng nature of children can make them an easy target for a variety of dangers on the internet like bullying and harassment,pornography,information theft and financial fraud.However, if parents take the time to educate themselves about technology and establish some simple safety rules, the internet can become a very positive and educative place for their children.

Some warning signs to watch for...
Changes in your child's behaviour such as being very secretive or sudden changes in their interests, problems with sleeping and so on.
The amount of time that your child spends on the Internet, especially if this is late at night.
Your child becoming secretive or defensive about his online activity and quickly changes the screen when you enter the room
Unusual charges on your phone/internet bills.

Things to do to ensure CYBER SAFETY OF YOUR KIDS:

Educating your child about the internet is the most effective way of protecting them against the dangers that lurk online.
Spent time with them to explore the internet and to introduce them to appropriate websites of their interest.
Set the rules for internet use , limit the number of hours and times at which they can be online
Install both commercial and free software that create a safety system for your computer.
Place the computer in a neutral space in the house e.g. the living room.

Encourage your child, to inform you immediately if they are threatened, scared or made uncomfortable by someone or something online.
Advice your child to be cautious about believing what they read on the Internet, because it is not always true or reliable.
Alert your child to be careful when they visit chat rooms and keep out of chat rooms for adults under all circumstances.
Instruct your child to make sure that the firewall software is alway running when they use the Internet connection. Under no circumstances must this be switched off.

Instruct your children not to give their own or their friends names, addresses, phone numbers, school names, or other personal information.
Instruct your children not to send any picture of themselves, their parents or their friends to anyone without your permission.
Instruct your children not to fill out forms or questionnaires online in your absense or without your permission.
Instruct your children not to enter areas of website that have charge for services without your permission.

Things to do if your Child is a victim:

E-Mail Offences:
Take the child in to confidence, get the information of the email ID from which such emails are received, get the prints of the concerned emails along with the full header.
Save the emails, do not delete it from the inbox. Initially ,there is a tendency to delete immediately when such type of emails are received. Don't do this. Save all the emails beginning from the first one .
The ISPs normally preserve log details for a very short duration, which may vary from fifteen days to two months, do not delay in approaching the police.It may result in evidence getting lost.
Submits email prints with 'full header'along with the complaint to the police. Do not reply to unknown email Ids.

Creation of 'Vulgur /obscene profiles:
various service providers allow creation of personal profile, but unscrupulus elements can misuse this, when the girl has a difference of opinion or a misunderstanding with a male friend.The male friend or his friends create a vulgar/obscene profile of the girl and post it on such websites along with the phone number.
The girl may then receive obscene and harassing phone calls from all over the world. In such a case, enquire with the people who are calling to identity the ID of the profile, that it can be removed by requesting the website administrator.
Take a print of such a profile and submit to the police.

Obscene/Vulgar SMS /MMS Clipping:
THe service providers do not keep record for more than two days, therefore if objectionable MMS clippings are received; contact the police/cyber crime Investigation Cell, immediately.
Whoever transmits obscene or Vulgar SMS/MMS messages commits an offence, For e.g. If 'A' transmits to 'B' and 'B' to 'C' etc. then "A" & "B' had committed an offence. So do NOT transmit any message that is vulgar.

Saturday, October 31, 2009

tamil poems

என்னிடம் இருந்த
ஒரு இதயத்தையும்
பறித்துக் கொண்டது காதல்!
ஒரு இதயத்தையே
பரிசளித்தது நட்பு!
யோசித்தது காதல்!
கைகொடுத்தது நட்பு!
துயரங்களை நோக்கி
இழுத்துச்சென்றது காதல்!
உயரங்ளை நோக்கி
அழைத்துச் சென்றது நட்பு!
தளர்த்த முயற்சித்தது காதல்!
உணர்த்த முயற்சித்தது நட்பு!
என் இலட்சியங்களை
கனவாக்கியது காதல்!
என் கனவுகளை
இலட்சியமாக்கியது நட்பு!
காயம் தரும்
காதல் வேண்டாம்!
நன்மை தரும்
நட்பைக்கொடு இறைவா!!

How to Solve Family Problems

1. Realize what the problem is and think of possible solutions to it.
2. Talk to your family in a calm manner about what is occurring and how it could be fixed of eased.
3. Even if no one listens to you don't do anything you may regret later. This includes self-harming and threatening to commit suicide
4. Even though it is hard, talk to ANYONE that will listen to you vent.Try talking to someone you trust in school, like a teacher or a counselor
5. Remember no matter what happens, if the problems can't be solved it is never your fault.
6. Don't beat yourself up over something that's your fault. You are a good person, no matter what anybody says or thinks.
7. don't mind anything that will disturb you thinking of solutions to your problem.
8. Use calm tone whenever you decided to talk with your family member. Ask them to talk one on one, sit together, look at their eyes and start to talk.
9. Do not hesitate to ask a professional counselor to help.
* It may be hard but talking to people will help you get some of your emotions out so that you're not bottling them up inside.
* You really are a great person, even if you don't think so, find a quiet and safe place that you can go to and think or read or do whatever relaxes you, like a place nobody but you knows you're at.
* There are other people out there with the same problems (me, as an example) and the ones who have overcome it want to help you.
* Never give up.

Tips on Avoiding Traps Laid by Phishers


* Never, ever click on a link inside an email from your bank, credit card company, or other similar institution. Instead, go directly to their website. The only exception might be when this is impossible. For example, you sometimes receive a confirmation email where you have to click a link to verify your email address or change your password. In this case, you will usually have just logged onto the company’s website and requested to sign up, change your password, etc. It would not be a random email which you would receive out of the blue. And even in this case, remember the below precautions and tips.
* When you go to a website which has your personal information stored, such as your bank’s or your email’s website (like Hotmail or Yahoo), don’t type the name directly into the address bar. Instead, type the name into a search engine like Google or Yahoo, and then click the link to the site. Why? Phishers sometimes rely on spelling mistakes typed into the address bar. If the URL of your bank is, the phisher might make his own website under the URL When someone accidentally makes a spelling mistake in the address bar, he will be in the phisher’s website. The phisher makes sure that his site looks identical to the real one. You “log on,” type in your username and password, and the phisher has your data. But if you go via a search engine, the real website will most likely show up at the top of the page, not the fake one!
* Don’t publish your email address on the Internet. This includes in blogs, forums, websites, etc. If you have a website, use a contact form connected to your email address. If you are a member of a forum, you can usually set it up so that you will be emailed by the forum whenever someone answers your post. Phishers and spammers regularly go through the Internet to find email addresses (they even have software to collect these email addresses). They send their spam or phishing emails to the addresses they find. If your address is only made known to valid contacts, you are less likely to receive a phishing email.
* Don’t answer your spam. This confirms that your email address exists and is likely to lead to more spam – including possible phishing attempts.
* Be careful about forwarding emails to your friends and family. Make sure the email is from a trusted source and that you are sure it does not come from a phisher who will then target your friends and contacts.

Friday, October 23, 2009

How to optimize Web server performance in Windows 2000

Disable Unnecessary Services
Disable Windows 2000 services that are not required for a dedicated Web server. To do this, follow these steps:
Click Start, point to Programs, point to Administrative Tools, and then click Computer Management.
Under Computer Management (Local), expand Services and Applications, and then click Services. Started is displayed in the Status column of the services that are running. The following services are not required on a dedicated Web server:

Computer Browser
DHCP Client
DHCP Server
Fax Service
File Replication
Infrared Monitor
Internet Connection Sharing
NetMeeting Remote Desktop Sharing
Network DDE
Network DDE DSDM
Print Spooler
TCP/IP NetBIOS Helper Service
Uninterruptible Power Supply
Note the services that are dependent on the service that you want to stop. To do this, follow these steps:
Double-click the service that you want. For example, double-click Messenger.
Click the Dependencies tab.
In the service name depends on these services list (where service name is the name of the service that you selected), note the services on which this service depends.
In the These services depend on service name list, note the services that will be unable to start without this service.
Click OK.
Disable the service that you want. To do this, follow these steps:
Right-click the service that you want to disable, and then click Properties on the shortcut menu that appears.
In the Startup type list, click Disabled.
If you want to immediately stop the service, click Stop. If you a Stop Other Services dialog box appears, other services that depend on this service will also be stopped. Note the affected services, and then click Yes.
Click OK. Disabled is displayed in the Startup Type column of this service.
Repeat step 4 to disable other unnecessary services.
NOTE: Test the Web server computer for proper operation after you disable each service. This minimizes the effect of disabling a service that you may want or need.

NOTE: If the IIS server is a member of a Windows 2000 domain the TCP/IP helper service is required to properly apply group policy to the computer.

Maximize Data Throughput for Network Applications
Run the Internet Information Services (IIS) 5.0 process pageable code in working memory. To do this, follow these steps:
On the desktop, right-click My Network Places, and then click Properties on the shortcut menu that appears.
Right-click the Local Area Connection icon that you want, and then click Properties on the shortcut menu that appears.
In the Components checked are used by this connection list, click (but do not clear its check box) File and Printer Sharing for Microsoft Networks, and then click Properties.
Click Maximum data throughput for network applications, and then click OK twice.
Restart the server for these changes to take effect.

Optimize Performance for Background Services
The IIS 5.0 process (Inetinfo.exe) runs as a background service. To increase performance for background services, follow these steps:
Click Start, point to Settings, and then click Control Panel.
In Control Panel, double-click System.
Click the Advanced tab, and then click Performance Options.
Under Application response, click Background services, and then click OK twice.
Quit Control Panel.

Minimize IIS 5.0 Logging
Disable logging on Web sites, virtual directories, or files and folders unless you require it. To do this, follow these steps:
Click Start, point to Programs, point to Administrative Tools, and then click Internet Services Manager.
Expand *server name, where server name is the name of the Web server.
Navigate to the item that you want, and then right-click it. On the shortcut menu that appears, click Properties. For example, right-click Default Web Site, and then click Properties on the shortcut menu that appears.
Do one of the following:
If you selected a Web site, click the Home Directory tab.

If you selected a Virtual directory, click the Virtual Directory tab.

If you selected a physical directory, click the Directory tab.
Click to clear the Log visits check box, and then click OK.

To disable logging for an entire Web site, click the Web Site tab, click to clear the Enable Logging check box, and then click OK.
Quit the Internet Information Services snap-in.

Enable Bandwidth Throttling
Limit the amount of network bandwidth that is available to individual Web sites. To do this, follow these steps:
Start Internet Services Manager.
Expand *server name, where server name is the name of the Web server.
Right-click the Web site that you want (for example, Default Web Site) and then click Properties on the shortcut menu that appears.
Click the Performance tab, and then click to select the Enable bandwidth throttling check box.
In the Maximum network use box, type the value that you want, and then click OK.
Quit the Internet Information Services snap-in.

Restrict Processor Usage
Limit the amount of processor usage available to individual Web sites. To do this, follow these steps:
Start Internet Services Manager.
Expand *server name, where server name is the name of the Web server.
Right-click the Web site that you want (for example, Default Web Site), and then click Properties on the shortcut menu that appears.
Click the Performance tab, and then click to select the Enable process throttling check box.
In the Maximum CPU use box, type the value that you want.
Click to select the Enforce limits check box, and then click OK.

NOTE: If you do not enable the Enforce limits option, the Maximum CPU use limit is not enforced. When a Web site exceeds its allowed CPU usage limit, an event is written to the Event Log.
Quit the Internet Information Services snap-in.

Limit Web Site Connections
Limit the number of connections available to individual Web sites. To do this, follow these steps:
Start Internet Services Manager.
Expand *server name, where server name is the name of the Web server.
Right-click the Web site that you want (for example, Default Web Site) and then click Properties on the shortcut menu that appears.
Under Connections, click Limited To.
In the connections box, type the number of connections that you want to allow.

NOTE: Each connected client uses approximately four concurrent connections. For example, a connection limit of 200 would allow approximately 50 users to access the Web site.
Click OK, and then quit the Internet Information Services snap-in.

Use HTTP Keep-Alives
The use of HTTP Keep-Alives is enabled by default. To verify that HTTP Keep-Alives are enabled, follow these steps:
Start Internet Services Manager.
Expand *server name, where server name is the name of the Web server.
Right-click the Web site that you want (for example, Default Web Site) and then click Properties on the shortcut menu.
Under Connections, verify that the HTTP Keep-Alives Enabled check box is selected, and then click OK.
Quit the Internet Information Services snap-in.

How Web Servers Work

The browser broke the URL into three parts:
The protocol ("http")
The server name ("")
The file name ("web-server.htm")

The browser communicated with a name server to translate the server name "" into an IP Address, which it uses to connect to the server machine.

The browser then formed a connection to the server at that IP address on port 80. (We'll discuss ports later in this article.)

Following the HTTP protocol, the browser sent a GET request to the server, asking for the file "" (Note that cookies may be sent from browser to server with the GET request -- see How Internet Cookies Work for details.)

The server then sent the HTML text for the Web page to the browser. (Cookies may also be sent from server to browser in the header for the page.)

The browser read the HTML tags and formatted the page onto your screen.

banner ads

women artist/models - nice stills/photos

Thursday, October 01, 2009

Textile related links

No Site Name URL
1 South India Textile Research Association
2 Textile ministry
3 Textile Committee
7 Textile Association
8 Northern India Textile Research Association
9 Textile Association
13 Textile Museum
14 Textile Museum
15 Textile Jobs
19 Textile designs
23 Textile Lab
25 National Textile Corporation Ltd
26 National Institute of Fashion Technology
27 Handloom Export Promotion Council

Tuesday, September 29, 2009

Teacher training & education - Arts & Crafts

Educational Associations websites

Professional Associations/Regulatory Bodies

No Association Name Site URL

1 International Society for Technology in Education (ISTE)
2 The Institution of Engineers(IE)
3 Institute of Electrical and Electronics Engineers (IEEE)
4 Practicing Engineers Architects & Town Planners Association
5 Computer Society of India (CSI)
6 Consortium of Self-Financing Professional, Arts & Science
College in Tamil Nadu
8 Anna University, Trichy
9 Anna University, Chennai
10 Anna University, Coimbatore
11 Anna University, Tirunelveli
12 Tamilnadu State Council for Engineering & Technology
13 National Science & Technology Entrepreneurship Development Board (NSTEDB)
14 Indian Society for Technical Education (ISTE)
15 Directorate Of Technical Education (DOTE)

:: Useful websites for students

1 TIDEL Park
2 Software Technology Parks of India (STPI)
3 Microsoft Student Partners
4 The Great Mind Challenge (TGMC)
5 Online exams and certifications
6 National Service Scheme (NSS)
7 Indian Red Cross (IRC - YRC)
8 Graduate Aptitude Test in Engineering (GATE)
9 CAT Exam


Wednesday, September 16, 2009



Ø Human Resource-for candidates who are into man power resourcing or recruitment or a good exposure in Human resource management.

Finance and Controlling-for candidates with core finance and accounting exposure.

Ø Production and planning – for candidates with good production experience.

Ø Material Management- for candidates with good procurement and purchasing exposure.

Ø Sales and Distribution-for candidates with sales and marketing exposu

Techno functional modules

Business Information Warehousing- for candidates having exposure to warehousing or SAP exposure is an added advantage.


Ø ABAP/4 – for candidates with any programming language exposure and touch of RDBMS is added advantage Freshers are most welcomed.

BASIS/WAS 6.40 – for candidates with exposure to networking and database administration concepts.


Intensive training on all the components of Netweaver like

Ø XI - Exchange Infrastructure

Ø EP - Enterprise Portal

Ø BI - Business Intelligence

Ø MI - Mobile Infrastructure

Ø WAS - Web Application Servers

MySAP Components

Intensive training on all the components of MySAP like:

Ø CRM - Customer Relationship Management

Ø SCM - Supply Chain Management

Ø SEM - Strategic Enterprise Management

Ø SRM - Supply Relationship Management

Ø HCM - Human Capital Management

PLM - Product Life Cycle Management

Ø MDM - Master Data Management

Ø QM - Quality management

Ø PS - Project systems

Ø BO- - Business objects

Monday, August 31, 2009

DISCLAIMER & Privacy Policy

The Content of this blog is simple home remedy tips and is purely for general information purpose only. These tips should not be treated as a substitute to professional/medical health care service. If you have any symptom or suspect of health problem you should seek medical advise and diagnosis from your doctor/health care provider. You should consult your physician/health care provider before starting any course of home remedy. Writer/s and owner/s of this blog is/are not liable for any accidents/reactions caused due to the use of tips mentioned in this blog.
The owner/s and writer/s of this blog are not doctors and we do not claim to treat, cure or prevent any disease or health problem.

Privacy Policy
If you require any more information or have any questions about our privacy policy, please feel free to contact us by email at the privacy of our visitors is of extreme importance to us. This privacy policy document outlines the types of personal information is received and collected and how it is used. Log FilesLike many other Web sites, makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable. Cookies and Web Beacons does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser. DoubleClick DART Cookie .:: Google, as a third party vendor, uses cookies to serve ads on :: Google's use of the DART cookie enables it to serve ads to users based on their visit and other sites on the Internet. .:: Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - Some of our advertising partners may use cookies and web beacons on our site. Our advertising partners include ....Google AdsenseThese third-party ad servers or ad networks use technology to the advertisements and links that appear on our blog send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see. we has no access to or control over these cookies that are used by third-party advertisers. You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. our privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites. If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers' respective websites.

From 01 July 2016 (Sunday), I don't give Facebook permission to use my pictures, my information or my publications, both of the past and the future, mine Or the ones where I appear. By this statement, I give my notice to Facebook it is strictly forbidden to disclose, copy, distribute, give, sell my information, photos or take any other action against me on the basis of this profile and / or its contents. The content of this profile is private and confidential information. The violation of privacy can be punished by law (UCC 1-308-1 1 308-103 and the Rome statute).
Note: Facebook is now a public entity. All members must post a note like this. If you prefer, you can copy and paste this version.
If you do not publish a statement at least once, you've given the tacit agreement allowing the use of your photos, as well as the information contained in the updates of state of profile.
Do not share. You have to copy and paste!

Saturday, August 29, 2009

Tips For Google Image Search

Google Image Search could be used in many ways.

1. If you want to know if a person is a man or a woman and the name doesn't help, do a search for the name.

2. If you don't know the meaning of a word, the pictures may help you.

3. A better search for Flickr. Google uses information from other sites that link to Flickr photos, so you may find Google search better.

4. Find what's interesting about a site, by looking at the pictures included. For example:

5. Find a new wallpaper for your desktop by restricting your search to large images. You can automate this using an application.

6. Find random personal pictures, using standard file names from digital cameras.

7. Type the name of a painter and you can take an art class.

8. Install a Greasemonkey script so you can view the original version of the image directly by clicking on the thumbnail.

9. Find the color of a word. "Word Color is a windows program that uses Google Image Search to determine the color of a word or string of words. It goes out there, retrieves the top 9 images and loops through all pixels, calculating the average hue, which is later converted to a color."

10. If you want to grab search results, GoogleGrab is a tool that downloads images from Google Image Search. It even supports batch search.

Monday, August 24, 2009

Ways to reduce accidents

Also please give your suggestions Ways to reduce accidents.

01. Reduce to travel often to relatives home
02. Use buses instead of cycle, bike or share-auto.
03. Avoid drive old vechiles using animals
04. Don't drink and drive
05. If possible, drive or travel during the daytime.
06. Watch out for signs.
07. Fine-tune your vehicle.
08. Obey traffic rules

Friday, August 21, 2009

ஆஸ்கர் விருதை கைப்பற்ற வேண்டும் என பல இந்திய திரைப்பட கலைஞர்கள் ஆசைப்பட்டாலும். இதற்குமுன் இரு இந்தியர்களுக்கு மட்டுமே கனவுபலித்திருக்கிறது.
பானு அத்தையா : (காந்தி திரைப்படம்) - 1982: இந்தியாவின் முன்னணி உடை வடிவமைப்பாளர் பானு அத்தையா மும்பையை சேர்ந்தவர். நூற்றுக்கும் மேற்பட்ட படங்களில் உடைவடிவமைப்பாளராக பணியாற்றியுள்ளார். 1982ல்பிரிட்டனின் இயக்குனர் ரிச்சர்ட் அட்டன்பரோவின் "காந்தி' படத்தில் பணியாற்றியதற்காகஇவருக்கு சிறந்த உடை வடிவமைப்பாளருக்கான ஆஸ்கர் விருது கிடைத்தது. இதன் மூலம் ஆஸ்கர் வென்ற முதல் இந்தியர் என்ற பெருமை இவருக்கு கிடைத்தது. ஜான் மோலோ என்ற பிரிட்டன் உடை வடிவமைப்பாளருடன் ஆஸ்கர் விருதை இவர் பகிர்ந்துகொண்டார். அத்தையா உடை வடிவமைப்பாளராக பணியாற்றிய"லகான்' படம் ஆஸ்கரின் இறுதிச்சுற்று வரை சென்றது. இந்த படத்துக்காக இவருக்கு தேசிய விருது கிடைத்தது. இது வரை இரண்டு முறை தேசிய விருதுகளை வென்றுள்ளார் பானு. ஆஸ்கர் விருதுக்குழுவின் உறுப்பினராகவும் இருக்கிறார்.
சத்யஜித்ரே - 1992: மேற்கு வங்கத்தை சேர்ந்த இயக்குனர் சத்யஜித்ரே. "பதேர் பாஞ்சாலி', "அபராஜிதோ' உள்ளிட்ட புகழ் பெற்ற படங்களை இயக்கியவர். இவரது "செஸ் பிளேயர்' படம் இந்தியா சார்பில் ஆஸ்கருக்கு அனுப்பப்பட்டது. எனினும் விருது பெறவில்லை."கான்' விருது உள்ளிட்ட பல புகழ் பெற்ற சர்வதேச விருதுகள், 32 தேசிய விருதுகள், தாதா சாஹேப் பால்கே விருது என இந்திய சினிமாவின் மிகப்பெரிய சாதனையாளராக சத்யஜித் ரே திகழ்ந்தார்.
1992ம் ஆண்டு இவருக்கு வாழ்நாள் சாதனையாளருக்கான கவுரவ ஆஸ்கர் விருது வழங்கப்பட்டது. அந்த ஆண்டே இவருக்கு "பாரத ரத்னா' விருதும் வழங்கப்பட்டது. 1992ல் சத்யஜித்ரே மறைந்தார். இயக்குனராக மட்டுமின்றி எழுத்தாளர், தயாரிப்பாளர், இசையமைப்பாளராகவும் இவர் சாதித்தார்.

complete animator

What does it take to be a complete animator?

A good animator should have knowledge of:

~ Drawing techniques

~ Animation techniques

~ Different styles of animation such as 2D and 3D animation

~ Design and layout

~ How people move and express their feelings

~ How animals move

~ How to create different moods and feelings in characters

~ Computers and animation software applications

~ The history of art and design

~ Film and television production

"Besides, he or she also needs to"

~ Be artistic, creative and innovative

~ Be a good communicator

~ Have inclination for good music

~ Be able to ideate and conceptualise

~ Be focused, self-disciplined and self-motivated

~ Be able to use knowledge of the human body and how animals move to
create animations

~ Be versatile and adaptable and able to accept criticism

~ Be able to work to a deadline

~ Be observant, with an eye for detail

~ Be able to work well in a team

~ Be able to understand the comic nature of cartoons

Tips for the best safari from the Africafreak

1. Wake Up Very Early
Rule number ONE! I know this might sound strange especially while on holiday, but out in the bush this is one recommendation that you should definitely stick to. Early mornings and late afternoons are just THE best times of the day to encounter wild animals! At noon, the sun is at its highest peak and animals tend to hide under the thickets.

2. Be Quiet
While animals have somewhat become habituated to car engines, they will run away if you are too loud!

3. Be Patient
Unlike zoos, national parks and African game reserves are wild areas where animals roam free and unattended! In other words, do not expect to see lions, rhinos and elephants every square kilometer! Do not panic ! Persistence is key, and it is usually when you least expect it that you bump into the most exciting and rewarding sightings!

4. Scan the Horizon
Open up your eyes! And if your eyes aren’t good enough, a good pair of binoculars are always handy! Stop often and scan the horizon, even though you can’t see a single thing at first sight. I have spotted lions that way more than once!

Also look for small details like unusual movements in trees, strange shadows in the open or awkward sounds. Look for everything and anything!

Sometimes your imagination might play you a few tricks (”It’s a LION”…oops nope, only a darn rock), but it will also reward you with interesting findings! Even the smallest creatures such as chameleons, dung beetles, snakes or even tree iguanas can be so much fun; and such a delight to watch!!!

5. Talk to Your Guide
If you have decided to go for guided safaris (instead of safaris in your own vehicle), then be sure to spend some time chatting with your guide beforehand. The idea is to ask questions about the area, and to be curious about what can be expected from the game drive.

In this way your guide will take you to areas where you are more likely to see the wild animals specified!

Let’s say you’re a huge cheetah fan for instance. If your safari expert is good enough (which I’m sure he will be), then he’ll concentrate his efforts in areas that are suitable for cheetahs, such as plains and open grasslands. I am not saying that you can ONLY find the cats in those types of habitat, but of course there is a higher probability of finding them there!

top 10 adsense earners in tamilnadu

Name: Srinivas Tamada Location: Chennai, India but now is in USA Blog: Blog Niche: Ajax, PHP, Web Design. ...


Abbreviations Acting choices actress-actors addons ads adsense drawbacks advantages advantages of chennai Advantages of Links directory advantages of plastic cheppal stand advices affiliates all ads amazon android articles asp ASP dot Net design issues astrolgy autobiography automobile avoid hacking avoid snake bite backgrounds banners BCS Best category for best collections best PPT Presentations best things biodata blog Blog Advertising blog stats blogger blogger drawbacks blogs Browser errors Browser Issues bus ticketing machines business business loss Business Plan Business rental business wise drawbacks Buying Expired Domains capgemini Car buying tips certified professional cheat frauds Cinema industry cities clients Closed IT/Software companies closed websites codings Commented topics of my blog comments companies Construction contacts Copyright creativity Credit Card Prefix Numbers css CSS drawbacks CSS elements combination CSS errors css ID rules css limitations css links css selectors Cute babies cv demonetization design category disclaim DNS error Documentation domain drawbacks Drawbacks in Madurai bus stand drawbacks of legins drawbacks of strike drawbacks_others duty education electronics emails embedded empty post emptyland Error Code and Message eshop Extra expenses Face detection apps use family FAQ FENG OFFICE finance loans firecrackers firewall nonblockable sites food For sales Free fresh content friends fun general - new - temp GHS girls google google Ads Google Adsense Revenue Sharing Sites government GPS merits graphicsbg Green earth Hacking Methods hand held machines handicapped reservation header wordings health Helpful Slogams HM home shifting how to avoid social media spam HTML html encoder HTML5 website layout IBM IDEA IE IE problems india infosys internet Internet/Social Media Marketing interview questions ISBN IT hardware products for rental IT Hardware-software ja jallikattu javascripts job job analysis joomla KSRTC kvic links links_background verification websites links_blogs Links_certifications links_different websites links_letterwise Links_mobile websites Links_My Designs links_my SMM links_other states Links_Product_brand websites links_Reciprocal Links links_SEO/SEM links_Tamilnadu links_tenders links_tools links_UI design links_use for all* list list of industrial estate list of IT parks list of toll free numbers M2M Madurai Madurai 2020 Mail box folder maintenance Malayalam Malayalam movie my reviews manjula miss Manufacturing Industries marketing marketing ideas me at divisional sports MNC site bugs mobile monthly extra Multiple options in codings my my achievements my achivements My advt - ads My all ads My best collections my best ideas my comments My cousin's post in FB My donations my friends with actor actress My Google dashboard My horoscope my linkedin profile My online interview My Portfolio my posts links My questions my SEO experience my social media profiles my stack overflow profiles My Stackoverflow site answers My works Names nested html Netscape Navigator new blogs New build house for sale New Concepts news online earnings online generators online scams open office drawbacks Open source Opera orkut drawbacks Others view our grandparents Our ID and Numbers outsource statistics own ideas own ideas_aboutme own views page pixel collapse when scrolling in firefox Page Speed Performance parallax scrolling websites Partners Personals photos Photos - art Photos_actress photos_screenshots PHP plans Plots for sale poems policy Pollution Facts powercut Powerpoint press release Problems and solutions - ATM Problems and solutions - Education Problems and solutions - Hardware Problems and solutions - Mobilephones Problems and solutions - NGO Problems and solutions - Software Problems and solutions - Website problems in browsing center/internet cafe Products programmers problems programs proxy software Quality guidelines Rajamani realesate reasons for power shortage Recent comments relatives relatives business resume RS 232 dotmatrix printers rti sales SBI search engine search type websites security Security Alert regarding Serious CMS Attack SEM portfolio SEO Difficulty SEO for blogs SEO portfolio SEO tools SEO-SMM-ORM Plan SEO/SEM sil ads Site Tags siteworth slogans SMS benefits Social Interest - public use social media marketing Social Media Optimization social media widgets softland-palmtec software errors Software Testing Softwares solairaja sports SQL SQL queries stars statistics stop software patents tablet Grip and interaction Tamil - Tamilar - Tamilnadu TATA TCS technicals Technology tenders Testing Tips text magics Thanks Things to do before you die in India Things to Watch in 2014 thirumalai Tips Tips - Buseness tips Tips - Health tips Tips - life tips tips for demo video preparation Tips for doing SEO/SMM Tips for Good-Employee Tips for HR Tips for old money top 10 adsense earners in tamilnadu tours Travels TV UI Certifications Q & A UI design useful best software latest versions Useful websites for HTML Developer videos visa vista icons w3c standards wallpapers ways to find a job Web design Web design and developments Web developments Web Services web UI design shapes webhosting Website Features website templates Widgets collections Yahoo சுயசரிதம்

:: Useful web links List