Monday, December 15, 2008

Considering a job in HK

Here is quick calculation for running a normal life in HK (if you happen to have jobs in HK)

1. Food (normal food like Mc D will cost you 30 to 40 HKD, and a Chinese noodle on the road side would cost you 30 HKD, A good pasta in a spaghetti house will cost you 120 HKD with a Chinese tea. So I take average of 60 per meal so it is 180 per day. Thus, 5400 per month.

2. Transportation: of course it depends where you work and where you stay, MTR (Not MRT…he he) will be cheap mode or transportation. Considering worst case, taking 150 HKD / Day. So it is 4500 / Month

3. Housing. HK is really costlier and you might be packed in a small sized apartment with no free down. Keep 9000 / Month for staying.

4. Laundry and others: 2000 per month. Considering the cold whether for few months and hope that you wear some sweeter, you might save come cost.

5. Entertainment: 3000 per month, considering that you drink every Friday and Saturday (only to 3 bottles of beer) in a good, cozy bar.

6. Others – (!!@@%%%) – depend on you. Say 1500 per month.

Total comes to 25K. You can have to at least in a senior position (I am referring to IT – say senior system administrator) to cover this expenses. According to the salary survey by jobs db, a senior network administrator makes around 30K HK$.

Are you planning to re-locate HK? Check your deal before you decide.

Thank you , Readers,
JS

Recent HK Visit

Hi Readers,

Small article about my recent trip to Macau and Hong Kong.

As a regular visitor HK, few things came to my notice during my visit.

The spending on the decoration for the forth coming session is less compared with last year. I notice there is very little decoration done on the ocean terminal side towards the harbor front.

Last year, i was there exactly during 3 weeks before the Christmas like this year. However i found last year they had better set up then this year.

Less crowd this year, when compared with last year.

On the contrary i can see people waiting in the queue to get into the branded shopping center along side of the harbor city.

I don’t know what to say, looks like co-operates are feeling the economic crisis and spending less whereas the consumer and end users are not feeling that yet.

Is that correct?

Thank you, Readers,
JS

Tuesday, November 11, 2008

10 Dumb things to be avoided by IT Network Engineer

1: Don’t have a comprehensive backup and disaster recovery plan

It’s not that backing up is hard to do. The problem is that it sometimes gets lost in the shuffle, because most network administrators are overloaded already, and backups are something that seem like a waste of time and effort–until you need them.
Of course you back up your organization’s important data. I’m not suggesting that most admins don’t have a backup strategy in place. But many of those backup strategies haven’t changed in decades. You set up a tape backup to copy certain important files at specified intervals and then forget about it. You don’t get around to assessing and updating that backup strategy — or even testing the tapes periodically to make sure your data really is getting backed up — until something forces you to do so (the tape system breaks or worse, you have a catastrophic data loss that forces you to actually use those backups).
It’s even worse when it comes to full-fledged disaster recovery plans. You may have a written business continuity plan languishing in a drawer somewhere, but is it really up to date? Does it take into account all of your current equipment and personnel? Are all critical personnel aware of the plan? (For instance, new people may have been hired into key positions since the time the plan was formulated.) Does the plan cover all important elements, including how to detect the problem as quickly as possible, how to notify affected persons, how to isolate affected systems, and what actions to take to repair the damage and restore productivity?

2: Ignore warning signs

That UPS has been showing signs of giving up the ghost for weeks. Or the mail server is suddenly having to be rebooted several times per day. Users are complaining that their Web connectivity mysteriously drops for a few minutes and then comes back. But things are still working, sort of, so you put off investigating the problem until the day you come into work and network is down.
As with our physical health, it pays to heed early warning signs that something is wrong with the network and catch it before it becomes more serious.

3: Never document changes

When you make changes to the server’s configuration settings, it pays to take the time to document them. You’ll be glad you did if a physical disaster destroys the machine or the operating system fails and you have to start over from scratch. Circumstances don’t even have to be that drastic; what if you just make new changes that don’t work the way you expected, and you don’t quite remember the old settings?
Sure, it takes a little time, but like backing up, it’s worth the effort.

#4: Don’t waste space on logging

One way to save hard disk space is to forego enabling logging or set your log files to overwrite at a small file size threshold. The problem with that is that disk space is relatively cheap, but hours of pulling your hair out when you’re trying to troubleshoot a problem without logs to help you discover what happened can be costly, in terms of both money and frustration.
Some applications don’t have their logs turned on automatically. But if you want to save yourself a lot of grief when something goes wrong, adopt the philosophy of “everything that can be logged should be logged.”

5: Take your time about installing critical updates

The “It’ll never happen to me” syndrome has been the downfall of many networks. Yes, updates and patches sometimes break important applications, cause connectivity problems, or even crash the operating system. You should thoroughly test upgrades before you roll them out to prevent such occurrences. But you should do so as quickly as possible and get those updates installed once you’ve determined that they’re safe.
Many major virus or worm infestations have done untold damage to systems even though the patches for them had already been released.

6: Save time and money by putting off upgrades

Upgrading your operating systems and mission-critical applications can be time consuming and expensive. But putting off upgrades for too long can cost you even more, especially in terms of security. There are a couple of reasons for that:
New software usually has more security mechanisms built in. There is a much greater focus on writing secure code today than in years past.
Vendors generally retire support for older software after awhile. That means they stop releasing security patches for it, so if you’re running the old stuff, you may not be protected against new vulnerabilities.
If upgrading all the systems in your organization isn’t feasible, do the upgrade in stages, concentrating on the most exposed systems first.

7: Manage passwords sloppily

Although multifactor authentication (smart cards, biometrics) is becoming more popular, most organizations still depend on user names and passwords to log onto the network. Bad password policies and sloppy password management create a weak link that can allow attackers to invade your systems with little technical skill needed.
Require lengthy, complex passwords (or better, passphrases), require users to change them frequently, and don’t allow reuse of the same passwords over and over. Enforce password policies through Windows group policy or third-party products. Ensure that users are educated about the necessity to keep passwords confidential and are forewarned about the techniques that social engineers may use to discover their passwords.
If at all possible, implement a second authentication method (something you have or something you are) in addition to the password or PIN (something you know).

8: Try to please all the people all of the time

Network administration isn’t the job for someone who needs to be liked by everyone. You’ll often be setting down and enforcing rules that users don’t like. Resist the temptation to make exceptions (”Okay, we’ll configure the firewall to allow you to use instant messaging since you asked so nicely.”)
It’s your job to see that users have the access they need to do their jobs — and no more.

9: Don’t try to please any of the people any of the time

Just as it’s important to stand your ground when the security or integrity of the network is at stake, it’s also important to listen to both management and your users, find out what they do need to do their jobs, and make it as easy for them as you can–within the parameters of your mission (a secure and reliable network).
Don’t lose sight of the reason the network exists in the first place: so that users can share files and devices, send and receive mail, access the Internet, etc. If you make those tasks unnecessarily difficult for them, they’ll just look for ways to circumvent your security measures, possibly introducing even worse threats.

10: Make yourself indispensable by not training anyone else to do your job
This is a common mistake throughout the business world, not just in IT. You think if you’re the only one who knows how the mail server is configured or where all the switches are, your job will be secure. This is another reason some administrators fail to document the network configuration and changes.
The sad fact is: no one is indispensable. If you got hit by a truck tomorrow, the company would go on. Your secrecy might make things a lot more difficult for your successor, but eventually he or she will figure it out.
In the meantime, by failing to train others to do your tasks, you may lock yourself into a position that makes it harder to get a promotion… or even take a vacation.

Thank you Readers,
JS

Wednesday, November 5, 2008

Terror alert in Indonesia

Dear Readers,

According to multiple sources, the Indonesian government intends to announce the exact date of the execution of the three Bali bombers. This announcement is likely to take place before the end of this month, and could come as early as tomorrow. The government, meantime, has repeatedly vowed to conduct the executions before the end of this year.

In announcing the executions ahead of time, the government arguably makes it more likely that radicals will plan reprisals to coincide with that date. Indeed, it cannot yet be discounted that the cell arrested on Tuesday intended to coincide its fuel storage attack with the fate of the Bali Three. At the very least, clients should expect the following:

When the date of the executions is announced, hard-line Islamic groups will likely spearhead rallies in Jakarta and other urban centers around the country. These will likely be concentrated in front of government buildings, including the presidential palace, the MPR/DPR complex, the National Police headquarters, and some provincial assembly buildings. There may be rallies in front of the embassies and consulates of the U.S., U.K., and Australia.

On the day of the executions, hard-line Islamic groups will likely conduct rallies at those same locations. There is always a chance that these protests could turn violent, just like the protests in Nusa Tenggara Timur devolved into chaos after the Pose Three were shot.

Between the time the executions are announced and the executions take place, bomb hoaxes will be phoned (or sent via SMS) to high-end malls, luxury hotels, and major Western companies.

It cannot be discounted that extremists might stage violent reprisals, including bombings. Given the ease of obtaining explosives in Indonesia (clients need only recall the frequent reports of explosives being confiscated from persons making fish-bombs and firecrackers), and the proven ability of Indonesian terrorists to assemble at least rudimentary bombs (those in Palembang, for example, has assembled simple bombs in Tupperware containers), attacks with explosives are clearly not outside the realm of possibility. Potential targets run the gamut of office buildings with major Western clients, to luxury hotels, prominent malls, police buildings, and (less likely) Western embassies.

In light of such threats, clients should:
  • Minimize time spent in front of U.S., U.K. and Australian embassies and consulates when the date of executions is announced, and when the executions actually take place. This is not so much because of the threat of bombings, but because of the possibility of fiery protests by Islamic hard-liners.
  • Avoid unnecessary travel to Bali between the time the executions are announced and the executions take place. While in Bali, remain wary for at least a month after the executions take place. In particular, avoid Kuta during weekend nights.
  • Avoid travel to Lamongan, East Java. This could be the scene of emotional rallies given that two of the Bali bombers hail from this district.

Thank you, Readers

JS

Tuesday, October 21, 2008

Ladies Finger Curry (Sambar) - Vegetarian Food

Dear Reader,

I have been asked to write some more articles on the vegetarian food. I am not a full time chef, but I can manage cooking pretty decently that you can eat and enjoy too. (and sure you will like it too).

I start with making a simple recipe, hardly takes 20 minutes to prepare using Ladies Finger (வெண்டி காய் – in tamil (pronounced as venti kaay. bhinti or Okra in Hindi) . I wrote about the benefits of Ladies Finger in my earlier blog.

The food we are going to prepare is ladies finger sambar (or curry). Hopefully, I will try to write about different sambar too in future.

Ingredients:
1 pack - Frozen ladies finger (if you can get the fresh one would be great)
1 cut onion (use the onion used in salad (the big ones not the small)lengthwise
2 chopped tomato
1 cup - Tamarind water taken from a lemon
Some mustard seeds
Urud dal and curry leaves
3\4 tsp sambar powder or
2 tsp chilli powder
2 sp corrainder powder
Salt to taste
2 tbsp oil

First, remove the head (the stem connects with the plant) from the Ladies Finger. Cut them into small pieces(say 2 cm to 3cm each on circular fashion). Heat the pan, Just add the Ladies Finger. This is very important – kind of secret, this removes the stickiness in the Ladies Finger. Just keep on roasting until you see there is no more water substance or stickiness in the vegetable.

2. Heat the pan. Add oil, mustard seeds, urad dal, curry leaves and onion.
2. Fry till they turn light brown.
3. Add the tomato and fry for 2 minutes.
4. Add tamarind water and Sambar powder and salt. Boil for 5 minutes.
4. Add cut ladies finger and cook till done.

That’s it.

Please try and let me comments.

Thursday, October 9, 2008

Dark Chocolate benefits

Eating dark chocolate regularly may help lower levels of inflammation, which is strongly associated with heart and blood vessel disease, Italian researchers report.

"In an apparently healthy population, even a small reduction of a low-grade inflammation such as that associated in this study with regular consumption of dark chocolate might have clinically relevant benefits in the primary prevention of cardiovascular disease," Dr. Romina di Giuseppe of Catholic University in Campobasso write in the current issue of The Journal of Nutrition.
The presence of inflammation was determined by measuring levels C-reactive protein (CRP), a biomarker for coronary artery disease, the researchers explain in their report. Di Giuseppe and her team hypothesized that people who eat more dark chocolate, which is rich in several types of antioxidants, might have lower CRP levels.

To investigate, they looked at 4,849 healthy men and women participating in the Moli-sani Project, an ongoing study of adults 35 and older living in southern Italy. They included 1,317 people who had eaten any chocolate at all in the past year, and 824 who consumed dark chocolate regularly. Most people who ate dark chocolate consumed 5.7 grams per day.
CRP levels averaged 1.32 mg/L in people who did not eat dark chocolate, compared to 1.10 mg/L in dark chocolate consumers. Individuals who ate dark chocolate had healthier diets overall than those who didn't; they were also younger and of higher social status, but less likely to exercise. But once the researchers adjusted for these and other relevant factors, the relationship between eating dark chocolate and lower CRP remained.

The range of CRP levels seen in the dark chocolate consuming group corresponds to a "mild" risk of cardiovascular disease, while CRP levels in the non-consumers would be associated with "moderate" risk, di Giuseppe and her colleagues note.

The benefits were seen when people ate up to one 20-gram serving of dark chocolate every 3 days, but eating more chocolate wasn't more beneficial; in fact, effects on CRP levels "tended to disappear" at higher consumption levels, the researchers found.

SOURCE: The Journal of Nutrition, September 23, 2008.

Wednesday, October 8, 2008

3D Personal Camera from Fuji

Three-dimensional or 3D technology is nothing new, but if we get lucky, we might see consumer-oriented 3D cameras and digital frames in shops as early as next year. According to Fujifilm Corp. has developed a Fujifilm Finepix Real 3D System that includes a digital camera, digital photo frame, and photo-printing services.

The 3D camera, for example, features two lenses and two sensors that take different pictures from different angles at the same time, then combines them to create a single high quality image. Images taken with the 3D camera are then displayed on the camera's 2.8 LCD where they can be seen in 3D by the naked eye thanks to Fujifilm's proprietary technology called "Light Direction Control System," which controls the direction of light. Details of how this is done are not detailed, but the company swears the images are captured exactly as your eye sees them, so you won't be needing those 3D glasses at all.

Once you take 3D pictures, it would be shame to keep them stored in your computer for no one to see. That's why Fujifilm is also working on a 8.4-inch FinePix Real 3D Photo Frame. The LCD on the frame also features Fujifilm's "Light Direction Control System, so images are displayed in 3D for all to see.

And if that's not enough, then you can then head to the 3D-printer and make a few copies of your fun pictures so you can share your 3D memories with all your friends and family.

Other camera manufacturers are working on their own version of the 3D camera, so we'll have to wait and see just how well 3D devices are received

Idul Fitri Vacation

Dear Reader,

If you are not part of this world, you would love to be here during the long holidays in Indonesia.

I did not come across any other nations gives this much (a week) holidays to celebrate Idul Fitri.

All the offices in Jakarta is closed for 9 days. Unfortunately, i had to stand by at office to support our entertainment businesses which have no holidays. However, i managed to get short vacation.

First i visited, Lido Lakes - 60 KM away from Jakarta. You take the Jograwi Toll and travel till the end of the toll road. From the exit of the toll road, travel towards Sukabumi (just travel straight). Around 14 Km of normal road and regular traffic jam you will find this place on the left hand side.
Well, being public holiday the lake is fully packed by humans and the sound from the music system is too loud that you can not enjoy it.
The rooms are nice for its standard and food is ok too. However, not for long stay. We left next day. Back Home and Have nice rest.

Next day, i went to office to see only myself alone in the office. But, i plan for the second vacation place. I finalized on "Putri Island - on Thousand Islands". This is one of the major tour attractions in Jakarta. Series of islands, near the Jakarta city on the Java Sea. (They say there are thousand islands altogethers)
The boat (speed boat) ride took 90 minutes to reach the island. The beach is clean, and it was real fun for my family (for my kids).

We choose the room near swimming pool and fortunately we had small sandy beach near by.

I snorkel. I am beginner for this. But I enjoy it.

Evening, we go for sun set boat ride. It was beautiful.

Overall, it is worth the money we spent (around USD 150 per adult) . It was great and enjoyable moment.

Thank you, Readers
JS

Tuesday, September 30, 2008

Open Innovation

Dear Readers,

New entrants in specific technology segments are shaking up various product and service markets, prompting technology firms to step up their R&D efforts and to involve entities outside their companies in the R&D process.

Economist intelligence unit says that over the past five years, 64% of telecom and technology companies have had a new rival enter their market with innovative products and services. A case in point is Apple’s entry into the handset sector via the iPhone.

According to data, these disruptive innovators will prompt shorter product lifecycles, with technology firms now planning to churn out more products but tiwh shorter life spans. Half of the technology firms surveyed say product lifecycles will continue to shortened, with 20 % saying product life will go down by at least 30 % .

Technology companies, in their quest for more new ideas, are now increasingly adopting the principles of “Open Innovation”, which seeks to involve suppliers, corporate partners, the academe and customers in the R&D Process.

Customers , in particular, will increasingly play a key role in R&D, with 78% of those polled agreeing that their customers have a much greater impact on their innovation process now than in the past.

But this “open innovation" approach will not be that easy for companies to adopt, as embracing a more open approach brings major organizational challenges.

Bottom line is, this means good for the consumer.

Thank you, Readers
JS
source for statistics:www.telcomasia.net

Friday, September 26, 2008

My 100th Blog..

Dear Readers,

This is my 100th blog. I would like to sincerly thank you all my readers, those who left comments, those who share their article to publish on this blog.

well, this is milestone for me. When i started i did not think that i can hold up for 2 months, but it has been since July 2008 and almost 3 month is over and i writing my 100th blog today on 26th Sep 2008.

Initially, i started with no where to go, just wrote articles from various friends and few of them from emails. Ofcourse, all the articles are liked by me and enjoy sharing it with others.
I wrote lot of blogs on Hindu-ism (since it is my religion) and lot on the technology (since it is my profession).

Some are good and some are bad (to be honest). But i am determined to write as many i can and i think there are people out there get some benefits from this.
While writing blog i learned about a lot and got some networks too.

Once again, Thank you readers.
- JS

Payment Gateway applications for Google, Nokia phones

Visa Inc plans to offer services to phones powered by Google Inc's Android including alerts when your credit card has been used.

The credit card network also said in October, No. 1 mobile phone maker Nokia would start selling the 6212 phone, which users could wave at an electronic reader to make payments and use for remote payments and money transfers.

Visa said it was still developing its application to allow in-store "contactless" payments by cell phone for Android. But it said these services --- already common in countries such as Japan -- may not take off for years here as U.S. stores would need to install new card readers and cell phones with the corresponding technology would need to be in wider use.

In the meantime, Visa said on Thursday that it would offer transaction alerts and discount offers from merchants to Android users. The application will also work with Google maps and location technology to help users find nearby cash machines and stores where special offers are available.
Visa said that for the first few months, the application will be available just to Android phone users who also have Visa cards issued by JPMorgan Chase banks. It plans to open the application to other banks in 2009

Earlier this week, Google unveiled the first Android-powered phone, which HTC Corp is making and Deutsche Telekom's T-Mobile unit is selling. But the initial Android device does not include hardware to support contactless credit card payments.

Tim Attinger, Visa's global head of product development, said that while mobile payment services have been slow to take off, the company sees mobile phones as key to adding new customers. Only 1.6 billion Visa cards are in use today, compared with more than 3 billion people with cell phones.
source : Yahoo News

Thanks
JS

Thursday, September 18, 2008

Acer Aspire One & HP Mini Note - Review

Dear Readers,

I was asked to buy a small notebook for our one of your employer who is on travel all the time and the main purpose of the notebook to check the email and do some word processing.

I come across this Acer Aspire one and HP mini note, the first uses Intel Atom processor where as the later uses Via C7 processor.

Well, there are many reviews and comments about the processor, so i do not want to repeat them again. The rest all the specifications are the same such as hard disk size, usb port etc.

Acer is cheaper by hundred USD in asia market. But when it comes to the look of the products, HP wins the battle.


It has very nice looking metal finishing and very nice keyboard. I found the HP keyboard is bigger than its counter part. Acer's black colored keyboard does not blend well with the casing color of blue.
Side view of Acer and HP

HP in the front.

HP on top of Acer.

Close up shot of acer.

Acer, blue color casing..

Acer Key board hmmm not blends well with color of the casing...

Acer..


HP..

Does the 100 USD for the look is worth or not? Only the user can say that. Isn't it

Well, the user opt for the HP for its sleek and good look. So, HP wins.

Monday, September 15, 2008

Safe Guard your wifi / Wireless Access Point.

Dear Readers,

I was busy with my new projects (IT Infrastructure) and had little time to write on blogs. Hopefully, i can contribute now like before.

Here are some of the TIPS to safe guard your wireless access point at home or business. (which i practice and implement in all my projects)

1.Disabling the SSID broadcast.
To some extent this makes it difficult for the hacker to detect the presence of a WiFi access point.

2.Enable MAC address filter.
Each network interface has a unique MAC address, by filtering it, one can to an extent control which machines can use the access point. Of course, it makes difficult for the IT Support guys to add the mac address to the "white list" everytime into the WAP. But it is a easy task to do.

3.Turn on WPA/WEP encryption.
Make the password / Network key stronger (say minimum 8 letters, do not use company name or easy to guess names).

4.Change default admin passwords for access points.
All the wireless access points comes with(atleast for the same brand) default password such as 1234 or admin or admin1234 etc. Your first step in wireless installation should be changing the default admin password. Please store / save it somewhere, you might need it to re-configure or change settings.

5.Ensure access points are placed securely. In the centre of a room/office etc to minimise its signal strength outside the office.

6. Turn OFF the wireless devices when not used.
Do not leave your WAP devices ON when there is no activities.

Thank you, Readers.
JS

Monday, September 1, 2008

World without Engineers - Funny

World without Computer Engineers


World without Civil Engineers


World without Electronics Engineers


World without Mechanical Engineers


World without Communications Engineers


Enjoy
JS

Prevent Computer from virus

Dear Readers,

It can happens to everyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, but that does little to help you out of your current predicament. Once you know that your machine is infected with a Trojan Horse or virus, what can you do?
If you know what specific malicious program has infected your computer, you can visit one of several anti-virus web sites and download a removal tool. Chances are, however, that you will not be able to identify the specific program. Unfortunately your other choices are limited, but the following steps may help save your computer and your files.

1. Call IT support
If you have an IT support department at your disposal, notify them immediately and follow their instructions.

2. Disconnect your computer from the Internet
Depending on what type of Trojan horse or virus you have, intruders may have access to your personal information and may even be using your computer to attack other computers. You can stop this activity by turning off your Internet connection. The best way to accomplish this is to physically disconnect your cable or phone line, but you can also simply “disable” your network connection.

3. Back up your important files
At this point it is a good idea to take the time to back up your files. If possible, compile all of your photos, documents, Internet favorites, etc., and burn them onto a CD or save them to some other external storage device. It is vital to note that these files cannot be trusted since they are still potentially infected.

4. Install an anti-virus program and scan your machine
Since your computer is infected with an unknown malicious program, it is safest to install an anti-virus program from an uncontaminated source such as a CD-ROM. You will have to visit your local computer or electronics store to a purchase the software. There are many to choose from, but all of them should provide the tools you need.
After you install the software, complete a scan of your machine. The initial scan will hopefully identify the malicious program(s). Ideally, the anti-virus program will even offer to remove the malicious files from your computer; follow the advice or instructions you are given.
If the anti-virus software successfully locates and removes the malicious files, be sure to follow the precautionary steps in Step 7 to prevent another infection. In the unfortunate event that the anti-virus software cannot locate or remove the malicious program, you will have to follow the next steps.

5. Reinstall your operating system
If the previous step failed to clean your computer, the only available option is to reinstall the operating system. Although this corrective action will also result in the loss of all your programs and files, it is the only way to ensure your computer is free from backdoors and intruder modifications. Before conducting the reinstall, make a note of all your programs and settings so that you can return your computer to its original condition.
It is vital that you also reinstall your anti-virus software and apply any patches that may be available. Consult “Before You Connect a New Computer to the Internet” for further assistance.

6. Restore your files
If you made a back up CD in Step 3, you can now restore your files. Before placing the files back in directories on your computer, you should scan them with your anti-virus software to ensure they are not infected.

7. Protect your computer

Prevention is always important.
To prevent future infections, you should take the following precautions:
• Do not open unsolicited attachments in email messages.
• Do not follow unsolicited links.
• Maintain updated anti-virus software.
• Use an Internet firewall.
• Keep your system patched.
To ensure that you are doing everything possible to protect your computer and your important information, you may also want to read some of the articles in the resources section below.

If you have any issues related to any of the above, mail me

Thank you, Readers
JS

Tuesday, August 26, 2008

Laugh for the day!!!

Readers,

Enjoy...

Kids Are Quick
______________________________________

TEACHER: Maria, go to the map and find North America .
MARIA: Here it is.
TEACHER: Correct. Now class, who discovered America ?
CLASS: Maria.
______________________________________

TEACHER: John, why are you doing your math multiplication on the floor?
JOHN: You told me to do it without using tables.
______________________________________

TEACHER: Glenn, how do you spell 'crocodile?'
GLENN: K-R-O-K-O-D- I-A-L'
TEACHER: No, that's wrong
GLENN: Maybe it is wrong, but you asked me how I spell it.
______________________________________

TEACHER: Donald, what is the chemical formula for water?
DONALD: H I J K L M N O.
TEACHER: What are you talking about?
DONALD: Yesterday you said it's H to O.
______________________________________

TEACHER: Winnie, name one important thing we have today that we didn't have ten years ago.
WINNIE: Me!
______________________________________

TEACHER: Glen, why do you always get so dirty?
GLEN: Well, I'm a lot closer to the ground than you are.
______________________________________

TEACHER: Millie, give me a sentence starting with 'I.'
MILLIE: I is..
TEACHER: No, Millie..... Always say, 'I am.'
MILLIE: All right... 'I am the ninth letter of the alphabet.'
______________________________________

TEACHER: George Washington not only chopped down his father's cherry tree, but also admitted it. Now, Louie, do you know why his father didn't punish him?
LOUIS: Because George still had the axe in his hand.
______________________________________

TEACHER: Now, Simon, tell me frankly, do you say prayers before eating?
SIMON: No sir, I don't have to, my Mom is a good cook.
______________________________________

TEACHER: Clyde , your composition on 'My Dog' is exactly the same as your brother's. Did you copy his?
CLYDE : No, sir. It's the same dog.
______________________________________

TEACHER: Harold, what do you call a person who keeps on talking when people are no longer interested?
HAROLD: A teacher

______________________________________

Monday, August 25, 2008

Jakarta Race 2008 - Photos

Dear Readers,

I participate in Jakarta Race organised by Four seasons hotel, HSBC once i know all the proceeds from the race goes to "Yayasan Kankar Indonesia" (Indonesian Cancer Foundataion / Institution)
I took the 5km fun run race with my 6 year old son. Fun Run Race was a Fun, please jog, walk, sit...just cross the sudirman and go the finish line. Yes, it was fun to see them.

The race started at 7 from an empty land between the land mark building and four seasons hotel. The race course is Jalan (Road) sudirman heading towards south direction and take "U" turn on the Plaza Semanggi junction and back the same place.

We follow the 10 KM (after a 10 min pause) racers. It was not a surprise to see 70 percent of the participants are non asians (mostly westeners) for the long race.

Here are some of the photos from the race, thanks to my friend Victor.


People at the starting point, waiting for the flag.

Pool of people from Fun Race..

Just started...

Yes..The Hard Part is the Fun Part

First time, i see the sudirman without (of course with lot of people too)..

I Run because i can..

Me with my son...he is did complete the race with me with out taking a break or rest. Great!

here we go again..

Thursday, August 21, 2008

Widgets for TV Channel

Dear Readers,

Continuation to my article on the widgets, i found this report on the "Widget TV" from yahoo.

Hoping to plant their flags on the screens of Internet-connected television sets, Intel Corp. and Yahoo Inc. unveiled a new project Wednesday to populate those screens with tiny programs called widgets.

Depending on your point of view, the goal is to create a multitasker's dream or an information-overload nightmare: It would let people to do things like check their stock prices or peruse their photos all while watching TV.

The notion that the Internet will be the delivery mechanism for TV has been gaining momentum, and the Intel-Yahoo partnership, called "The Widget Channel," reflects the potential.

In a screen shot provided by the companies, a baseball game airs on the main part of the screen while various programs, like a personalized Flickr photo gallery and a menu of on-demand movie rentals, run in a strip along the bottom of the screen.

Intel and Yahoo are working with more than a dozen other companies to build and eventually deliver such widgets, including Blockbuster Inc., Comcast Corp., the Disney-ABC Television Group and MTV.

Readers, what you think? Is the widgets are way for future developments? Every one sees to be so interested on this.. Let us wait and watch.

JS

Wednesday, August 20, 2008

Apple Updates on 3G

Dear Readers,

Looks like Apple read my blog (just kidding...) i wrote a article on iPhone 3G and here is the solution from Apple.

Apple Inc. has released an iPhone software update it says improves communication between the smart phone and wireless networks. The iPhone 3G, which went on sale July 11, connects to cellular providers' speedier third-generation networks and was meant to deliver snappier Web surfing and online video viewing than the year-old original model.

But some customers who shelled out $199 for Apple's newest gizmo flocked to message boards in recent weeks, posting complaints about dropped calls and spotty wireless broadband connectivity.

Cupertino, Calif.-based Apple did not acknowledge a problem until Tuesday, and then provided few specifics about what, exactly, Monday evening's software update was designed to fix.
The iPhone 2.0.2 software update "improved communication with 3G networks," said Apple spokeswoman Jennifer Bowcock.

Bowcock would not say which of the many possible parts — from the iPhone's antenna and amplifier and the radio frequency transceiver, to the baseband that processes the digital signal and sends it to the speaker or screen — were targeted with the software update.
She also declined to describe the sort of improvements users might expect after installing the update.

No definitive information has been released about the source of the problem, which seemed to affect some iPhone users and not others. Last week, Sweden's foremost engineering weekly published a report indicating a problem between the iPhone's antenna and an amplifier meant to improve performance in areas with a weak signal.
Apple declined to comment on the report
report by By JESSICA MINTZ, AP Technology.

Friday, August 15, 2008

Some Special Temples / Places

1.Tiger's Nest Monastery, perched on the edge of a 3,000-feet-high cliff in Paro Valley in Bhutan


2.Wat Rong Khun (a Buddhist temple) in Chiang Mai, Thailand

3.Prambanan is a Hindu temple in Central Java, Indonesia.
The temple was built in 850 CE, and is composed of 8 main shrines and 250 surrounding smaller ones.

4.No one knows exactly when the Shwedagon Paya (or Pagoda) in Myanmar was built.
Legend has it that it is 2,500 years old though archaeologists estimate that it was built between the 6th and 10th century.

5.Temple of Heaven is a Taoist temple in Beijing, China.
The temple was constructed in 14th century by Emperor Yongle of the Ming Dynasty.

6.Chion-in Temple was built in 1234 CE to honor the founder of Jodo (Pure Land) Buddhism.

7.In the 19th century, Dutch occupiers of Indonesia found a massive ancient ruin deep in the jungles of Java. What they discovered was the complex of Borobudur, a gigantic structure built with nearly 2 million cubic feet (55,000 m³) of stones.
The temple has nearly 2,700 relief panels and 504 Buddha statues.

8.The Harmandir Sahib (meaning The Abode of God) or simply the Golden Temple in Punjab
is the most sacred shrine of Sikhism.

9.The Sri Ranganathaswamy Temple in Tiruchirapalli (or Trichy), is the largest functioning Hindu temple in the world. Ankor Wat is the largest of all temple, but it is currently non-functioning as a temple - see below.

10.Last but definitely not least is the largest temple in history
and the inspiration to countless novels and action movies of Hollywood: Ankor Wat.

Thursday, August 14, 2008

iPhone 3G

Dear Readers,

I have been hearing about the the 3G signal problem a lot from my friends. The article from yahoo proves that iPhone have serious issues with their hardware on the 3G signalling.

The report said the most likely cause of the 3G problems is defective adjustments between the antenna and an amplifier that captures very weak signals from the antenna. This could lead to poor 3G connectivity and slower data speeds.

The iPhone 3G, which on sale July 11 in the United States and 21 other countries, was meant to offer faster Web browsing than the year-old original model.

Since the launch of the next-generation iPhone, Apple's message boards have been flooded with complaints of dropped calls and poor 3G connectivity indicated by few or no "bars" on the phone's display.

Some users said they performed side-by-side tests and found that the iPhone had connectivity problems in locations where 3G phones from other manufacturers did not. The reports were made by users who said they lived the United States, Canada, Japan, Britain and other countries.

Apple spokeswoman Natalie Kerris declined to comment on whether the problem lies in the iPhone's hardware or software, or with the various carriers' 3G networks.

Thank you Readers,
JS

Wednesday, August 13, 2008

New Notebook from Lenovo

Lenovo has launched its 17-inch ThinkPad W700, which it described as "the PC industry's highest-performance mobile workstation." The laptop has a built-in graphics tablet and will support the upcoming Intel mobile quad-core processor.

The W700 offers what Lenovo called the industry's first built-in digitizer and color calibrator in a mobile workstation, as well as NVIDIA Quadro FX mobile graphics, dual hard drives in a RAID configuration, up to 8GB of memory, a variety of wireless connectivity choices, and an optional Blu-ray DVD player. There are also five USB ports, a 7-in-1 multicard reader, and a fingerprint reader.

Up to 2GB of its memory can be configured to support Intel Turbo Memory, and the dual hard drives can be configured so that one is a solid-state drive. Some W700 models will offer Intel vPro technology for IT management. Connectivity options include WLAN 802.11n, WWAN 2, or WiMax, as well as Bluetooth and ultra-wideband.
The W700 is targeted at professionals in the areas of digital content, computer-assisted design and manufacturing, photography, and scientific fields such as oil and gas exploration.

Peter Hortensius, senior vice president of the notebook business unit, said "no other PC manufacturer delivers the sheer quality, power and performance, and cutting-edge innovation packed into this mobile workstation." With the ThinkPad W700, he added, Lenovo "has engineered a new breed of mobile workstations."
According to industry reports, mobile workstations have become nearly a quarter of the worldwide workstation market in the last five years, and are expected to grow another five percent next year.

The color calibrator on the W700 automatically adjusts, up to four times monthly, the color of the optional WUXGA display. The calibrator is built in as part of a palm rest, as is the digitizer, which helps digital-content users configure and image by mapping to the full screen or to a user-defined area. A digitizer pen allows using the Wacom digitizer pad like a graphics tablet.

Lenovo said the 1920x1200, 17-inch screen offers more than twice the brightness of most displays, and its 72 percent color gamut has 50 percent more color intensity for 2-D and 3-D work. The laptop supports DVI, Display Port, and VGA, and is expected to be available in September with prices starting at $2,978.

Richard Shim, an analyst with industry research firm IDC, called the new product "an innovation statement" because it is one of the first laptops with the mobile quad-core processor. Its targeting of the high-end content creator, he noted, means it could find a place in a niche market.

Friday, August 8, 2008

Computer security professionals vulnerable to scams

Computer security professionals tend to be a highly paranoid bunch, seeing potential threats everywhere. It turns out that some aren't cautious enough, though.

Two researchers demonstrated Thursday at the Black Hat hacking conference how they had gotten computer security experts to let their guard down online the same way they advise the average Internet user not to, especially on social networking Web sites.

A relatively simple ruse persuaded dozens of prominent security analysts to connect on their social networking Web pages with people who weren't friends at all. They were fake profiles, purportedly of other well-known security pros. The scam was designed to expose the trust that even some of the most skeptical Internet users display on some of the most insecure sites on the Web.

Some social networking sites can be dangerous because they allow people to post programming code — used for good or evil — on other people's pages. Even networking sites that don't allow that step carry their own security risks, because it's relatively easy for someone to masquerade as a "friend" who isn't actually friendly — and recommend malicious Web sites to click on.

The ruse concocted by Shawn Moyer, chief information security officer for Agura Digital Security, and Nathan Hamiel, senior consultant for Idea Information Security, worked like this:

They found prominent security figures who didn't have profiles on particular social networking Web sites.

They built up fake profiles by using information from press releases and news articles. Then they built up the profiles' authenticity by sending them around to people who indiscriminately add friends on those sites.

Finally, once the profiles looked legitimate, they identified groups of security professionals on those sites and sent their friend requests to them.

Moyer and Hamiel said they did it three times, each time impersonating a different person. Each time they lured in more than 50 new friends within 24 hours. Some of those people were chief security officers for major corporations and defense industry workers, they said. They declined to identify any of those people.

"We really were surprised at the level of trust we found — we didn't think we'd be as successful as we were," Moyer said. "Any one of these people would have happily clicked on a malware site or viewed our profile with a (data-stealing) Trojan application."

Moyer and Hamiel said they even landed an interview with a journalist who responded to one of their friend requests. But they got busted: the reporter sent an e-mail to the target's real profile page on another social-networking site and discovered the fraud.

Moyer and Hamiel emphasized that the talk wasn't intended to single out any particular social networking site. Many of them have the same security problems, and users need be cautious about verifying the people they add as friends.

Readers, i receive this email article from my friend. Yes, it is true no one could escape from the on line vulnerable scams. So, please take necessary steps to not to became victim of the same.
Analyse any request from any social networking before you accept it.

Monday, August 4, 2008

Hindu Gods - Part 2

Dear Readers,

In the previous part you learn about main GODs in Hindu religion. Here is the next 3 main deities of Hindu religion.

Saraswati is the wife of Brahma, and is the Goddess of education and knowledge. She has four hands representing four aspects of learning: mind, intellect, alertness and ego. To symbolize her connection to knowledge, she holds the sacred scriptures in one of her four hands. She plays the music of love and life on an instrument called a veena. She is dressed in white to signify her purity. She is often shown atop a white goose.



Lakshmi is the wife of Vishnu and is Goddess of prosperity, purity, chastity and generosity. She has four hands, representative of four spiritual virtues. She sits on a fully blossomed lotus, a seat of divine truth. Her palm is always extended to bless people. She is adored by Ganesha.





Parvati is wife of Shiva, the universal goddess. She is known as one of the benevolent forms (while Durga and Kali are the wrathful forms). She is appears as Shiva's consort, considered in this form to be a mountain goddess. According to legend, Shiva had become despondent over the death of his wife, so he turned to the life of a hermit. He sat concentrating his energies until he turned into a pillar of fire. The gods became worried over this, and begged the mother goddess Shakti for help. In response, the goddess took the form of Parvati, princess of the mountains, and sought to win Shiva's heart with the help of Kama, god of love. But when Kama shot his love-dart at Shiva, Shiva opened his third eye, let loose a fiery missile and reduced him to ashes. Parvati then took on the life of a hermit as well, and mortified her body through austerities that won Shiva's admiration, and he accepted her as his consort. Inspired by Parvati's beauty, Shiva made music and began to dance. Parvati also cajoled Shiva to reveal the secrets of the cosmos locked in his mind. It is believed many seers were enlightened when they overheard their conversation between the two lovers. Parvati is highly revered for her ability to transform the austere ascetic Shiva into an amorous householder.

Thank you, Readers
JS

Thursday, July 31, 2008

Mobile Gifts..

People across the world commonly exchange gifts, but tech-savvy South Koreans are now turning to mobile phones to do that thanks to the new converged m- commercial service launched by SK telecom.

The service, dubbed Gifticon, combines barcode technology with the mobile payment, and converges the online worked with the offline world.

With the Gifticon services users can send gift vouchers for over 130 items from 40 exchanges and brands, such as Starbucks, 70 Eleven, Haggen_Dazs and Mc'D, through instant messenger, WAP or web. Once an item is selected, the Gifticon Server, which is connected to partner companies, will send and authorize an SMS in real time.

Those who received the messages can download coupons with embedded barcode and exchanged them for real products.

Tuesday, July 29, 2008

Hindu Gods – Who & What is GOD?

Dear Readers,

In my understanding, GOD as Generation, Operation, Destruction thus forms the GOD. In Hinduism has, by many estimates, almost 330,000,000 deities. Of these, three,

Brahma the Creator (Generation)
Vishnu the Protector (Operation)
Shiva the Destroyer (Destruction)

So the Brahma, Vishnu, Shiva form the GOD, and they are more important.There are also many other lesser gods.

Brahma the Creator – Generation

Brahma is the prime deity. He is omniscient and represents perfection. In Sanskrit Brh means to expand, manifest, or grow. He creates individual souls and other gods.

Brahma appears seated on a lotus with four heads and four hands. Three of the hands contain a different tool. One hand holds the Vedas, sacred scriptures. The second holds a water pot, the third a rosary. The fourth hand is raised to give a blessing. His vehicle is a swan that represents the difference between good and bad judgment.

Vishnu the Protector - Operation

Vishnu is known as the remover. He separated heaven and earth, creating the universe. He also takes the forms of animals, such as the boar, tortoise, or the fish. A lotus sprang from his navel, giving birth to Brahma.

Vishnu appears on a powerful serpent that represents the sleeping universe. He has a dark color that symbolizes the passive and formless ether. He also has four hands. The first holds a conch shell, the second a discus. The third contains a lotus and the fourth a mace. The mace represents the capacity of the god to punish is discipline is ignored. His vehicle is a swift-flying bird known as the Garuda.


Shiva the Destroyer – Destruction

Shiva is the god of devotion. He represents victory over demonic activity and calmness and power of human nature. He is said to have taken the forms of different humans, animals, and vegetables on earth. His vehicle is a bull which is a symbol of happiness and strength.

Shiva appears meditating. His hair is matted and represents the flowing of the Ganges river. There is a serpent coiled around his neck and ashes cover his body.

A bronze sculpture of Shiva, one of the three main gods of the Hindu religion. He is dancing with one hand holding a flame, one hand beating a drum, and one foot resting of the demon of ignorance within a circle of fire.

Thank you, Readers

JS

Monday, July 28, 2008

Installing XP on notebooks / laptops with SATA HDD

Dear Readers,

Very recently i had to install windows XP professional for one of the ASUS note book
(F9s Series). The Asus note book comes with Windows Vista Home Premium edition bundled. Sow how, user wants to use windows XP.

Well, on the first try , i put the booting cd and started, but somehow i can not see the HDD (eventually failed to install the XP) and can not see any drives at all. Realised that it is using SATA .

I googled to find that the ways to install by using nlite program, create another bootable CD..blah..blah..

But i somehow felt that there should be easy way to do. I went back to BIOS again and i noticed the Serial ATA was set to "Enchanced Mode", i change the settingst to "Compatible Mode". Thats all, i could install the XP Pro easily.

Hope this helps for others too.

JS

Hindu Rituals

Dear Readers,
here are the links for all the article in this blog on the Hindu Rituals (session 1)

1. Hindu Rituals - Introduction

2.Hindu Rituals - Why do offer food to the Lord before eating it?

3.Hindu Rituals - Why do we consider the lotus as special? (Part 21 of 23)

4.Hindu Rituals - To touch another with the feet is considered an act of misdemeanor. Why is this so?

5.Hindu Rituals - Why do we not touch papers, books and people with the feet?

6.Hindu Rituals - Why do we fast? (Part 18 of 23)

7.Hindu Rituals - Why do we do pradakshina (circumambulate)?

8.Hindu Rituals - Why is pradakshina done only in a clockwise manner?

9.Hindu Rituals - Why do we regard trees and plants as sacred?

10.Hindu Rituals - . Why do we ring the bell in a temple?

11.Hindu Rituals - Why do we worship the kalasha?

12.Hindu Rituals -Why do we worship tulasi?

13.Hindu Rituals - Why do we blow the conch?

14.Hindu Rituals - Why do we say shaanti thrice?

15.Hindu Rituals - Why do we offer a coconut?

16.Hindu Rituals - Why do we chant Om?

17.Hindu Rituals - Why do we do aarati?

18.Hindu Rituals - Why do we wear marks (tilak, pottu and the like) on the forehead?

19.Hindu Rituals - Why do we prostrate before parents and elders?

20.Hindu Rituals - Why do we do Namaste?

21.Hindu Rituals - Why do we have a prayer room?

22.Hindu Rituals - Why do we light a lamp?

23.Hindu Rituals - Why do we apply the holy ash?


Thank you, Readers
JS

Saturday, July 26, 2008

Hindu Rituals - Why do we apply the holy ash? (Part 23 of 23)

The ash of any burnt object is not regarded as holy ash. Bhasma (the holy ash) is the ash from the homa (sacrificial fire) where special wood along with ghee and other herbs is offered as worship of the Lord. Or the deity is worshipped by pouring ash as abhisheka and is then distributed as bhasma.

Bhasma is generally applied on the forehead. Some apply it on certain parts of the body like the upper arms, chest etc. Some ascetics rub it all over the body. Many consume a pinch of it each time they receive it.

The word bhasma means, "that by which our sins are destroyed and the Lord is remembered.” Bha implied bhartsanam ("to destroy") and sma implies smaranam ("to remember"). The application of bhasma therefore signifies destruction of the evil and remembrance of the divine. Bhasma is called vibhuti (which means "glory") as it gives glory to one who applies it and raksha (which means a source of protection) as it protects the wearer from ill health and evil, by purifying him or her.

Homa (offering of oblations into the fire with sacred chants) signifies the offering or surrender of the ego and egocentric desires into the flame of knowledge or a noble and selfless cause. The consequent ash signifies the purity of the mind, which results from such actions.

Also the fire of knowledge burns the oblation and wood signifying ignorance and inertia respectively. The ash we apply indicates that we should burn false identification with the body and become free of the limitations of birth and death. This is not to be misconstrued as a morose reminder of death but as a powerful pointer towards the fact that time and tide wait for none.

Bhasma is specially associated with Lord Shiva who applies it all over His body. Shiva devotes apply bhasma as a tripundra. When applied with a red spot at the center, the mark symbolizes Shiva-Shakti (the unity of energy and matter that creates the entire seen and unseen universe).

Tryambakam yajaamahe Sugandhim pushtivardhanam Urvaa rukamiva bhandhanaan Mrytyor muksheeyamaa amrutaat

"We worship the three-eyed Lord Shiva who nourishes and spread fragrance in our lives. May He free us from the shackles of sorrow, change and death effortlessly, like the fall of a rip brinjal from its stem."



Thank you, Readers
JS
ps. Article by Swami Chinmayananda

Friday, July 25, 2008

Hindu Rituals - Why do offer food to the Lord before eating it? (Part 22 of 23)

Indians make an offering of food to the Lord and later partake of it as prasaada - a holy gift from the Lord. In our daily ritualistic worship (pooja) too we offer naivedyam (food) to the Lord.

The Lord is omnipotent and omniscient. Man is a part, while the Lord is the totality. All that we do is by His strength and knowledge alone. Hence what we receive in life as a result of our actions is really His alone. We acknowledge this through the act of offering food to Him. This is exemplified by the Hindi words "tera tujko arpan" I offer what is Yours to You. Thereafter it is akin to His gift to us, graced by His divine touch.

Knowing this, our entire attitude to food and the act of eating changes. The food offered will naturally be pure and the best. We share what we get with others before consuming it. We do not demand, complain or criticise the quality of the food we get. We eat it with cheerful acceptance (prasaada buddhi).

Before we partake of our daily meals we first sprinkle water around the plate as an act of purification. Five morsels of food are placed on the side of the plate acknowledging the debt owed by us to the Divine forces (devta runa) for their benign grace and protection, our ancestors (pitru runa) for giving us their lineage and a family culture, the sages (rishi runa) as our religion and culture have been "realised", aintained and handed down to us by them, our fellow beings (manushya runa) who constitute society without the support of which we could not live as we do and other living beings (bhuta runa) for serving us selflessly.

Thereafter the Lord, the life force, who is also within us as the five life-giving physiological functions, is offered the food. This is done with the chant

praanaaya swaahaa, apaanaaya swaahaa, vyaanaaya swaahaa, udaanaaya swaahaa, samaanaaya swaahaa, brahmane swaahaa

After offering the food thus, it is eaten as prasaada - blessed food.



Thank you, Readers
JS
ps. Article by Swami Chinmayananda

Mobile Commerce and Consumers

CellPhone are practically universal, with more than 3.3 billion subscribers worldwide, yet 71% of all consumers surveyed in 14 countries will not consider using a mobile device to bank or shop online.

Of the 14 countries pooled, willingness to do mobile banking or shopping has highest in Malaysia at 26%, followed by Singaporeans at 19%. On the flipside, mobile subscribers in France were the least willing, at 3 % to use their mobile devices for financial transactions, followed by the Netherlands at 7 %

The survey concluded that banks must find ways to work alongside telecom providers and retailers to leverage their innovation while educating consumers on the realties of mobile banking and payment security.

Thursday, July 24, 2008

Hindu Rituals - Why do we consider the lotus as special? (Part 21 of 23)

The lotus is the symbol of truth, auspiciousness and beauty (satyam, shivam, sundaram). The Lord is also that nature and therefore, His various aspects are compared to a lotus (i.e. lotus-eyes, lotus feet, lotus hands, the lotus of the heart etc.).

The lotus blooms with the rising sun and close at night. Similarly, our minds open up and expand with the light of knowledge. The lotus grows even in slushy areas. It remains beautiful and untainted despite its surroundings, reminding us that we too can and should strive to remain pure and beautiful within, under all circumstances.

The lotus leaf never gets wet even though it is always in water. It symbolizes the man of wisdom (gyaani) who remains ever joyous, unaffected by the world of sorrow and change. This is revealed in a shloka from the Bhagwad-Geeta:

Brahmanyaadhaaya karmaani Sangam tyaktvaa karoti yaha Lipyate na sa paapena Padma patram ivaambhasaa

He who does actions, offering them to Brahman (the Supreme), abandoning attachment, is not tainted by sin, just as a lotus leaf remains unaffected by the water on it.

From this, we learn that what is natural to the man of wisdom becomes a discipline to be practiced by all saadhakas or spiritual seekers and devotees. Our bodies have certain energy centers described in the Yoga Shaastras as chakras.

Each one is associated with lotus that has a certain number of petals. For example, a lotus with a thousand petals represents the Sahasra chakra at the top of the head, which opens when the yogi attains Godhood or Realisation. Also, the lotus posture (padmaasana) is recommended when one sits for meditation. A lotus emerged from the navel of Lord Vishnu. Lord Brahma originated from it to create the world. Hence, the lotus symbolizes the link between the creator and the supreme Cause.

It also symbolizes Brahmaloka, the abode of Lord Brahma. The auspicious sign of the swastika is said to have evolved from the lotus.

Thank you, Readers
JS
ps. Article by Swami Chinmayananda

Monday, July 21, 2008

Hindu Rituals - To touch another with the feet is considered an act of misdemeanor. Why is this so? (Part 20 of 23)


Man is regarded as the most beautiful, living breathing temple of the Lord! Therefore touching another with the feet is akin to disrespecting the divinity within him or her. This calls for an immediate apology, which is offered with reverence and humility.

Thank you, Readers

JS

ps. Article by Swami Chinmayananda