Showing posts with label IT Trends. Show all posts
Showing posts with label IT Trends. Show all posts

Tuesday, June 23, 2009

Wimax Notebooks from Samsung

Dear Readers,

Happy to share you with the first wimax enabled notebook devices from Samsung.
It is not yet for commercial sales. Samsung might sell it via telco operators.



I happen to have chance to hold and try this gadget. It is great. Waiting for the official launch.



Thank you readers,
JS

Monday, May 18, 2009

Facebook Bug!!!

Dear Readers,

I had listened,read many articles about the facebook being slow and bugs that leads application to shutdown etc.

Here is one of the incident that happen to me.
I logged myself into my facebook and i can see FB "Suggestions" and it listed me to add into my friend. Below is the screen shot of the same. you can see my login name in the top (highlighted in circle) and right top widget suggesting my name to be added as friend.














Interestingly, i could click the link "add as friend" and completed the steps with out any error. Funny, isn't it? Or it is the feature of Facebook.

Any other stories to share?

Thank you,
JS

Wednesday, January 14, 2009

IT Quality

Dear Readers,
Here is the Paul’s list of great IT qualities (which I have edited) addresses both considerations.

1.The CIO reports to the CEO or, at least, the chief operating officer, giving the CIO clout and ensuring IT’s independence.

2.An IT steering committee, composed of C-level executives from the business units, makes allocation decisions based on a defined set of priorities and criteria such as ROI. The committee is necessary to ensure that investment decisions are made in the interests of the entire company and not just an individual department.

3.The organization spends an appropriate percentage of corporate revenue on IT, indicating the company’s level of commitment to IT.

4.A well-managed, highly visible security team is in place, since this is one of the most vulnerable areas of IT.

5.Disaster recovery plans and processes, involving users and a documented recovery plan, are well-established and tested regularly.

6.An ongoing commitment to training keeps IT staffers up to date. Organizations that don’t train IT folks and use lots of consultants are not sufficiently focused on in-house staff.

7.Rigid adherence to an appropriate system development life cycle, that both IT and the user community understand, is a priority. Documenting the selection process offers insight into the professionalism of the IT organization.

8.Well defined technical and managerial career paths let all workers achieve higher pay and status. This is the only way to retain top technical people who don’t want to manage others.

9.A monthly major IT project status report is widely distributed throughout the company.

10.The CIO participates in long-range, organizational strategic planning. If not, it’s clear the business views IT as an implementer and not a strategic enabler.

Thank you, Readers
JS

Tuesday, November 11, 2008

10 Dumb things to be avoided by IT Network Engineer

1: Don’t have a comprehensive backup and disaster recovery plan

It’s not that backing up is hard to do. The problem is that it sometimes gets lost in the shuffle, because most network administrators are overloaded already, and backups are something that seem like a waste of time and effort–until you need them.
Of course you back up your organization’s important data. I’m not suggesting that most admins don’t have a backup strategy in place. But many of those backup strategies haven’t changed in decades. You set up a tape backup to copy certain important files at specified intervals and then forget about it. You don’t get around to assessing and updating that backup strategy — or even testing the tapes periodically to make sure your data really is getting backed up — until something forces you to do so (the tape system breaks or worse, you have a catastrophic data loss that forces you to actually use those backups).
It’s even worse when it comes to full-fledged disaster recovery plans. You may have a written business continuity plan languishing in a drawer somewhere, but is it really up to date? Does it take into account all of your current equipment and personnel? Are all critical personnel aware of the plan? (For instance, new people may have been hired into key positions since the time the plan was formulated.) Does the plan cover all important elements, including how to detect the problem as quickly as possible, how to notify affected persons, how to isolate affected systems, and what actions to take to repair the damage and restore productivity?

2: Ignore warning signs

That UPS has been showing signs of giving up the ghost for weeks. Or the mail server is suddenly having to be rebooted several times per day. Users are complaining that their Web connectivity mysteriously drops for a few minutes and then comes back. But things are still working, sort of, so you put off investigating the problem until the day you come into work and network is down.
As with our physical health, it pays to heed early warning signs that something is wrong with the network and catch it before it becomes more serious.

3: Never document changes

When you make changes to the server’s configuration settings, it pays to take the time to document them. You’ll be glad you did if a physical disaster destroys the machine or the operating system fails and you have to start over from scratch. Circumstances don’t even have to be that drastic; what if you just make new changes that don’t work the way you expected, and you don’t quite remember the old settings?
Sure, it takes a little time, but like backing up, it’s worth the effort.

#4: Don’t waste space on logging

One way to save hard disk space is to forego enabling logging or set your log files to overwrite at a small file size threshold. The problem with that is that disk space is relatively cheap, but hours of pulling your hair out when you’re trying to troubleshoot a problem without logs to help you discover what happened can be costly, in terms of both money and frustration.
Some applications don’t have their logs turned on automatically. But if you want to save yourself a lot of grief when something goes wrong, adopt the philosophy of “everything that can be logged should be logged.”

5: Take your time about installing critical updates

The “It’ll never happen to me” syndrome has been the downfall of many networks. Yes, updates and patches sometimes break important applications, cause connectivity problems, or even crash the operating system. You should thoroughly test upgrades before you roll them out to prevent such occurrences. But you should do so as quickly as possible and get those updates installed once you’ve determined that they’re safe.
Many major virus or worm infestations have done untold damage to systems even though the patches for them had already been released.

6: Save time and money by putting off upgrades

Upgrading your operating systems and mission-critical applications can be time consuming and expensive. But putting off upgrades for too long can cost you even more, especially in terms of security. There are a couple of reasons for that:
New software usually has more security mechanisms built in. There is a much greater focus on writing secure code today than in years past.
Vendors generally retire support for older software after awhile. That means they stop releasing security patches for it, so if you’re running the old stuff, you may not be protected against new vulnerabilities.
If upgrading all the systems in your organization isn’t feasible, do the upgrade in stages, concentrating on the most exposed systems first.

7: Manage passwords sloppily

Although multifactor authentication (smart cards, biometrics) is becoming more popular, most organizations still depend on user names and passwords to log onto the network. Bad password policies and sloppy password management create a weak link that can allow attackers to invade your systems with little technical skill needed.
Require lengthy, complex passwords (or better, passphrases), require users to change them frequently, and don’t allow reuse of the same passwords over and over. Enforce password policies through Windows group policy or third-party products. Ensure that users are educated about the necessity to keep passwords confidential and are forewarned about the techniques that social engineers may use to discover their passwords.
If at all possible, implement a second authentication method (something you have or something you are) in addition to the password or PIN (something you know).

8: Try to please all the people all of the time

Network administration isn’t the job for someone who needs to be liked by everyone. You’ll often be setting down and enforcing rules that users don’t like. Resist the temptation to make exceptions (”Okay, we’ll configure the firewall to allow you to use instant messaging since you asked so nicely.”)
It’s your job to see that users have the access they need to do their jobs — and no more.

9: Don’t try to please any of the people any of the time

Just as it’s important to stand your ground when the security or integrity of the network is at stake, it’s also important to listen to both management and your users, find out what they do need to do their jobs, and make it as easy for them as you can–within the parameters of your mission (a secure and reliable network).
Don’t lose sight of the reason the network exists in the first place: so that users can share files and devices, send and receive mail, access the Internet, etc. If you make those tasks unnecessarily difficult for them, they’ll just look for ways to circumvent your security measures, possibly introducing even worse threats.

10: Make yourself indispensable by not training anyone else to do your job
This is a common mistake throughout the business world, not just in IT. You think if you’re the only one who knows how the mail server is configured or where all the switches are, your job will be secure. This is another reason some administrators fail to document the network configuration and changes.
The sad fact is: no one is indispensable. If you got hit by a truck tomorrow, the company would go on. Your secrecy might make things a lot more difficult for your successor, but eventually he or she will figure it out.
In the meantime, by failing to train others to do your tasks, you may lock yourself into a position that makes it harder to get a promotion… or even take a vacation.

Thank you Readers,
JS

Wednesday, October 8, 2008

3D Personal Camera from Fuji

Three-dimensional or 3D technology is nothing new, but if we get lucky, we might see consumer-oriented 3D cameras and digital frames in shops as early as next year. According to Fujifilm Corp. has developed a Fujifilm Finepix Real 3D System that includes a digital camera, digital photo frame, and photo-printing services.

The 3D camera, for example, features two lenses and two sensors that take different pictures from different angles at the same time, then combines them to create a single high quality image. Images taken with the 3D camera are then displayed on the camera's 2.8 LCD where they can be seen in 3D by the naked eye thanks to Fujifilm's proprietary technology called "Light Direction Control System," which controls the direction of light. Details of how this is done are not detailed, but the company swears the images are captured exactly as your eye sees them, so you won't be needing those 3D glasses at all.

Once you take 3D pictures, it would be shame to keep them stored in your computer for no one to see. That's why Fujifilm is also working on a 8.4-inch FinePix Real 3D Photo Frame. The LCD on the frame also features Fujifilm's "Light Direction Control System, so images are displayed in 3D for all to see.

And if that's not enough, then you can then head to the 3D-printer and make a few copies of your fun pictures so you can share your 3D memories with all your friends and family.

Other camera manufacturers are working on their own version of the 3D camera, so we'll have to wait and see just how well 3D devices are received

Tuesday, September 30, 2008

Open Innovation

Dear Readers,

New entrants in specific technology segments are shaking up various product and service markets, prompting technology firms to step up their R&D efforts and to involve entities outside their companies in the R&D process.

Economist intelligence unit says that over the past five years, 64% of telecom and technology companies have had a new rival enter their market with innovative products and services. A case in point is Apple’s entry into the handset sector via the iPhone.

According to data, these disruptive innovators will prompt shorter product lifecycles, with technology firms now planning to churn out more products but tiwh shorter life spans. Half of the technology firms surveyed say product lifecycles will continue to shortened, with 20 % saying product life will go down by at least 30 % .

Technology companies, in their quest for more new ideas, are now increasingly adopting the principles of “Open Innovation”, which seeks to involve suppliers, corporate partners, the academe and customers in the R&D Process.

Customers , in particular, will increasingly play a key role in R&D, with 78% of those polled agreeing that their customers have a much greater impact on their innovation process now than in the past.

But this “open innovation" approach will not be that easy for companies to adopt, as embracing a more open approach brings major organizational challenges.

Bottom line is, this means good for the consumer.

Thank you, Readers
JS
source for statistics:www.telcomasia.net

Friday, September 26, 2008

Payment Gateway applications for Google, Nokia phones

Visa Inc plans to offer services to phones powered by Google Inc's Android including alerts when your credit card has been used.

The credit card network also said in October, No. 1 mobile phone maker Nokia would start selling the 6212 phone, which users could wave at an electronic reader to make payments and use for remote payments and money transfers.

Visa said it was still developing its application to allow in-store "contactless" payments by cell phone for Android. But it said these services --- already common in countries such as Japan -- may not take off for years here as U.S. stores would need to install new card readers and cell phones with the corresponding technology would need to be in wider use.

In the meantime, Visa said on Thursday that it would offer transaction alerts and discount offers from merchants to Android users. The application will also work with Google maps and location technology to help users find nearby cash machines and stores where special offers are available.
Visa said that for the first few months, the application will be available just to Android phone users who also have Visa cards issued by JPMorgan Chase banks. It plans to open the application to other banks in 2009

Earlier this week, Google unveiled the first Android-powered phone, which HTC Corp is making and Deutsche Telekom's T-Mobile unit is selling. But the initial Android device does not include hardware to support contactless credit card payments.

Tim Attinger, Visa's global head of product development, said that while mobile payment services have been slow to take off, the company sees mobile phones as key to adding new customers. Only 1.6 billion Visa cards are in use today, compared with more than 3 billion people with cell phones.
source : Yahoo News

Thanks
JS

Thursday, September 18, 2008

Acer Aspire One & HP Mini Note - Review

Dear Readers,

I was asked to buy a small notebook for our one of your employer who is on travel all the time and the main purpose of the notebook to check the email and do some word processing.

I come across this Acer Aspire one and HP mini note, the first uses Intel Atom processor where as the later uses Via C7 processor.

Well, there are many reviews and comments about the processor, so i do not want to repeat them again. The rest all the specifications are the same such as hard disk size, usb port etc.

Acer is cheaper by hundred USD in asia market. But when it comes to the look of the products, HP wins the battle.


It has very nice looking metal finishing and very nice keyboard. I found the HP keyboard is bigger than its counter part. Acer's black colored keyboard does not blend well with the casing color of blue.
Side view of Acer and HP

HP in the front.

HP on top of Acer.

Close up shot of acer.

Acer, blue color casing..

Acer Key board hmmm not blends well with color of the casing...

Acer..


HP..

Does the 100 USD for the look is worth or not? Only the user can say that. Isn't it

Well, the user opt for the HP for its sleek and good look. So, HP wins.

Monday, September 15, 2008

Safe Guard your wifi / Wireless Access Point.

Dear Readers,

I was busy with my new projects (IT Infrastructure) and had little time to write on blogs. Hopefully, i can contribute now like before.

Here are some of the TIPS to safe guard your wireless access point at home or business. (which i practice and implement in all my projects)

1.Disabling the SSID broadcast.
To some extent this makes it difficult for the hacker to detect the presence of a WiFi access point.

2.Enable MAC address filter.
Each network interface has a unique MAC address, by filtering it, one can to an extent control which machines can use the access point. Of course, it makes difficult for the IT Support guys to add the mac address to the "white list" everytime into the WAP. But it is a easy task to do.

3.Turn on WPA/WEP encryption.
Make the password / Network key stronger (say minimum 8 letters, do not use company name or easy to guess names).

4.Change default admin passwords for access points.
All the wireless access points comes with(atleast for the same brand) default password such as 1234 or admin or admin1234 etc. Your first step in wireless installation should be changing the default admin password. Please store / save it somewhere, you might need it to re-configure or change settings.

5.Ensure access points are placed securely. In the centre of a room/office etc to minimise its signal strength outside the office.

6. Turn OFF the wireless devices when not used.
Do not leave your WAP devices ON when there is no activities.

Thank you, Readers.
JS

Monday, September 1, 2008

Prevent Computer from virus

Dear Readers,

It can happens to everyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, but that does little to help you out of your current predicament. Once you know that your machine is infected with a Trojan Horse or virus, what can you do?
If you know what specific malicious program has infected your computer, you can visit one of several anti-virus web sites and download a removal tool. Chances are, however, that you will not be able to identify the specific program. Unfortunately your other choices are limited, but the following steps may help save your computer and your files.

1. Call IT support
If you have an IT support department at your disposal, notify them immediately and follow their instructions.

2. Disconnect your computer from the Internet
Depending on what type of Trojan horse or virus you have, intruders may have access to your personal information and may even be using your computer to attack other computers. You can stop this activity by turning off your Internet connection. The best way to accomplish this is to physically disconnect your cable or phone line, but you can also simply “disable” your network connection.

3. Back up your important files
At this point it is a good idea to take the time to back up your files. If possible, compile all of your photos, documents, Internet favorites, etc., and burn them onto a CD or save them to some other external storage device. It is vital to note that these files cannot be trusted since they are still potentially infected.

4. Install an anti-virus program and scan your machine
Since your computer is infected with an unknown malicious program, it is safest to install an anti-virus program from an uncontaminated source such as a CD-ROM. You will have to visit your local computer or electronics store to a purchase the software. There are many to choose from, but all of them should provide the tools you need.
After you install the software, complete a scan of your machine. The initial scan will hopefully identify the malicious program(s). Ideally, the anti-virus program will even offer to remove the malicious files from your computer; follow the advice or instructions you are given.
If the anti-virus software successfully locates and removes the malicious files, be sure to follow the precautionary steps in Step 7 to prevent another infection. In the unfortunate event that the anti-virus software cannot locate or remove the malicious program, you will have to follow the next steps.

5. Reinstall your operating system
If the previous step failed to clean your computer, the only available option is to reinstall the operating system. Although this corrective action will also result in the loss of all your programs and files, it is the only way to ensure your computer is free from backdoors and intruder modifications. Before conducting the reinstall, make a note of all your programs and settings so that you can return your computer to its original condition.
It is vital that you also reinstall your anti-virus software and apply any patches that may be available. Consult “Before You Connect a New Computer to the Internet” for further assistance.

6. Restore your files
If you made a back up CD in Step 3, you can now restore your files. Before placing the files back in directories on your computer, you should scan them with your anti-virus software to ensure they are not infected.

7. Protect your computer

Prevention is always important.
To prevent future infections, you should take the following precautions:
• Do not open unsolicited attachments in email messages.
• Do not follow unsolicited links.
• Maintain updated anti-virus software.
• Use an Internet firewall.
• Keep your system patched.
To ensure that you are doing everything possible to protect your computer and your important information, you may also want to read some of the articles in the resources section below.

If you have any issues related to any of the above, mail me

Thank you, Readers
JS

Thursday, August 21, 2008

Widgets for TV Channel

Dear Readers,

Continuation to my article on the widgets, i found this report on the "Widget TV" from yahoo.

Hoping to plant their flags on the screens of Internet-connected television sets, Intel Corp. and Yahoo Inc. unveiled a new project Wednesday to populate those screens with tiny programs called widgets.

Depending on your point of view, the goal is to create a multitasker's dream or an information-overload nightmare: It would let people to do things like check their stock prices or peruse their photos all while watching TV.

The notion that the Internet will be the delivery mechanism for TV has been gaining momentum, and the Intel-Yahoo partnership, called "The Widget Channel," reflects the potential.

In a screen shot provided by the companies, a baseball game airs on the main part of the screen while various programs, like a personalized Flickr photo gallery and a menu of on-demand movie rentals, run in a strip along the bottom of the screen.

Intel and Yahoo are working with more than a dozen other companies to build and eventually deliver such widgets, including Blockbuster Inc., Comcast Corp., the Disney-ABC Television Group and MTV.

Readers, what you think? Is the widgets are way for future developments? Every one sees to be so interested on this.. Let us wait and watch.

JS

Wednesday, August 20, 2008

Apple Updates on 3G

Dear Readers,

Looks like Apple read my blog (just kidding...) i wrote a article on iPhone 3G and here is the solution from Apple.

Apple Inc. has released an iPhone software update it says improves communication between the smart phone and wireless networks. The iPhone 3G, which went on sale July 11, connects to cellular providers' speedier third-generation networks and was meant to deliver snappier Web surfing and online video viewing than the year-old original model.

But some customers who shelled out $199 for Apple's newest gizmo flocked to message boards in recent weeks, posting complaints about dropped calls and spotty wireless broadband connectivity.

Cupertino, Calif.-based Apple did not acknowledge a problem until Tuesday, and then provided few specifics about what, exactly, Monday evening's software update was designed to fix.
The iPhone 2.0.2 software update "improved communication with 3G networks," said Apple spokeswoman Jennifer Bowcock.

Bowcock would not say which of the many possible parts — from the iPhone's antenna and amplifier and the radio frequency transceiver, to the baseband that processes the digital signal and sends it to the speaker or screen — were targeted with the software update.
She also declined to describe the sort of improvements users might expect after installing the update.

No definitive information has been released about the source of the problem, which seemed to affect some iPhone users and not others. Last week, Sweden's foremost engineering weekly published a report indicating a problem between the iPhone's antenna and an amplifier meant to improve performance in areas with a weak signal.
Apple declined to comment on the report
report by By JESSICA MINTZ, AP Technology.

Thursday, August 14, 2008

iPhone 3G

Dear Readers,

I have been hearing about the the 3G signal problem a lot from my friends. The article from yahoo proves that iPhone have serious issues with their hardware on the 3G signalling.

The report said the most likely cause of the 3G problems is defective adjustments between the antenna and an amplifier that captures very weak signals from the antenna. This could lead to poor 3G connectivity and slower data speeds.

The iPhone 3G, which on sale July 11 in the United States and 21 other countries, was meant to offer faster Web browsing than the year-old original model.

Since the launch of the next-generation iPhone, Apple's message boards have been flooded with complaints of dropped calls and poor 3G connectivity indicated by few or no "bars" on the phone's display.

Some users said they performed side-by-side tests and found that the iPhone had connectivity problems in locations where 3G phones from other manufacturers did not. The reports were made by users who said they lived the United States, Canada, Japan, Britain and other countries.

Apple spokeswoman Natalie Kerris declined to comment on whether the problem lies in the iPhone's hardware or software, or with the various carriers' 3G networks.

Thank you Readers,
JS

Wednesday, August 13, 2008

New Notebook from Lenovo

Lenovo has launched its 17-inch ThinkPad W700, which it described as "the PC industry's highest-performance mobile workstation." The laptop has a built-in graphics tablet and will support the upcoming Intel mobile quad-core processor.

The W700 offers what Lenovo called the industry's first built-in digitizer and color calibrator in a mobile workstation, as well as NVIDIA Quadro FX mobile graphics, dual hard drives in a RAID configuration, up to 8GB of memory, a variety of wireless connectivity choices, and an optional Blu-ray DVD player. There are also five USB ports, a 7-in-1 multicard reader, and a fingerprint reader.

Up to 2GB of its memory can be configured to support Intel Turbo Memory, and the dual hard drives can be configured so that one is a solid-state drive. Some W700 models will offer Intel vPro technology for IT management. Connectivity options include WLAN 802.11n, WWAN 2, or WiMax, as well as Bluetooth and ultra-wideband.
The W700 is targeted at professionals in the areas of digital content, computer-assisted design and manufacturing, photography, and scientific fields such as oil and gas exploration.

Peter Hortensius, senior vice president of the notebook business unit, said "no other PC manufacturer delivers the sheer quality, power and performance, and cutting-edge innovation packed into this mobile workstation." With the ThinkPad W700, he added, Lenovo "has engineered a new breed of mobile workstations."
According to industry reports, mobile workstations have become nearly a quarter of the worldwide workstation market in the last five years, and are expected to grow another five percent next year.

The color calibrator on the W700 automatically adjusts, up to four times monthly, the color of the optional WUXGA display. The calibrator is built in as part of a palm rest, as is the digitizer, which helps digital-content users configure and image by mapping to the full screen or to a user-defined area. A digitizer pen allows using the Wacom digitizer pad like a graphics tablet.

Lenovo said the 1920x1200, 17-inch screen offers more than twice the brightness of most displays, and its 72 percent color gamut has 50 percent more color intensity for 2-D and 3-D work. The laptop supports DVI, Display Port, and VGA, and is expected to be available in September with prices starting at $2,978.

Richard Shim, an analyst with industry research firm IDC, called the new product "an innovation statement" because it is one of the first laptops with the mobile quad-core processor. Its targeting of the high-end content creator, he noted, means it could find a place in a niche market.

Friday, August 8, 2008

Computer security professionals vulnerable to scams

Computer security professionals tend to be a highly paranoid bunch, seeing potential threats everywhere. It turns out that some aren't cautious enough, though.

Two researchers demonstrated Thursday at the Black Hat hacking conference how they had gotten computer security experts to let their guard down online the same way they advise the average Internet user not to, especially on social networking Web sites.

A relatively simple ruse persuaded dozens of prominent security analysts to connect on their social networking Web pages with people who weren't friends at all. They were fake profiles, purportedly of other well-known security pros. The scam was designed to expose the trust that even some of the most skeptical Internet users display on some of the most insecure sites on the Web.

Some social networking sites can be dangerous because they allow people to post programming code — used for good or evil — on other people's pages. Even networking sites that don't allow that step carry their own security risks, because it's relatively easy for someone to masquerade as a "friend" who isn't actually friendly — and recommend malicious Web sites to click on.

The ruse concocted by Shawn Moyer, chief information security officer for Agura Digital Security, and Nathan Hamiel, senior consultant for Idea Information Security, worked like this:

They found prominent security figures who didn't have profiles on particular social networking Web sites.

They built up fake profiles by using information from press releases and news articles. Then they built up the profiles' authenticity by sending them around to people who indiscriminately add friends on those sites.

Finally, once the profiles looked legitimate, they identified groups of security professionals on those sites and sent their friend requests to them.

Moyer and Hamiel said they did it three times, each time impersonating a different person. Each time they lured in more than 50 new friends within 24 hours. Some of those people were chief security officers for major corporations and defense industry workers, they said. They declined to identify any of those people.

"We really were surprised at the level of trust we found — we didn't think we'd be as successful as we were," Moyer said. "Any one of these people would have happily clicked on a malware site or viewed our profile with a (data-stealing) Trojan application."

Moyer and Hamiel said they even landed an interview with a journalist who responded to one of their friend requests. But they got busted: the reporter sent an e-mail to the target's real profile page on another social-networking site and discovered the fraud.

Moyer and Hamiel emphasized that the talk wasn't intended to single out any particular social networking site. Many of them have the same security problems, and users need be cautious about verifying the people they add as friends.

Readers, i receive this email article from my friend. Yes, it is true no one could escape from the on line vulnerable scams. So, please take necessary steps to not to became victim of the same.
Analyse any request from any social networking before you accept it.

Thursday, July 31, 2008

Mobile Gifts..

People across the world commonly exchange gifts, but tech-savvy South Koreans are now turning to mobile phones to do that thanks to the new converged m- commercial service launched by SK telecom.

The service, dubbed Gifticon, combines barcode technology with the mobile payment, and converges the online worked with the offline world.

With the Gifticon services users can send gift vouchers for over 130 items from 40 exchanges and brands, such as Starbucks, 70 Eleven, Haggen_Dazs and Mc'D, through instant messenger, WAP or web. Once an item is selected, the Gifticon Server, which is connected to partner companies, will send and authorize an SMS in real time.

Those who received the messages can download coupons with embedded barcode and exchanged them for real products.

Monday, July 28, 2008

Installing XP on notebooks / laptops with SATA HDD

Dear Readers,

Very recently i had to install windows XP professional for one of the ASUS note book
(F9s Series). The Asus note book comes with Windows Vista Home Premium edition bundled. Sow how, user wants to use windows XP.

Well, on the first try , i put the booting cd and started, but somehow i can not see the HDD (eventually failed to install the XP) and can not see any drives at all. Realised that it is using SATA .

I googled to find that the ways to install by using nlite program, create another bootable CD..blah..blah..

But i somehow felt that there should be easy way to do. I went back to BIOS again and i noticed the Serial ATA was set to "Enchanced Mode", i change the settingst to "Compatible Mode". Thats all, i could install the XP Pro easily.

Hope this helps for others too.

JS

Friday, July 25, 2008

Mobile Commerce and Consumers

CellPhone are practically universal, with more than 3.3 billion subscribers worldwide, yet 71% of all consumers surveyed in 14 countries will not consider using a mobile device to bank or shop online.

Of the 14 countries pooled, willingness to do mobile banking or shopping has highest in Malaysia at 26%, followed by Singaporeans at 19%. On the flipside, mobile subscribers in France were the least willing, at 3 % to use their mobile devices for financial transactions, followed by the Netherlands at 7 %

The survey concluded that banks must find ways to work alongside telecom providers and retailers to leverage their innovation while educating consumers on the realties of mobile banking and payment security.

Friday, July 18, 2008

Does your Business needs Blog

It seems like everybody wants a blog these days, but is a blog really necessary for a company? Here are some things to ask yourself before blogging for your business.

1. Do you have time to blog? Blogging is a time-consuming process because people who read blogs expect a certain amount of fresh content on a regular basis -- at a minimum, weekly -- preferably several times a week.

2. Do you have anything interesting to say? Blogs about your company and your products may sound interesting to you, but people rarely tune into a "commercial" blog unless there is additional information of real value.

3. Do you have strong opinions? The most successful blogs are the ones with strong voices, personalities and opinions. If you want to be non-controversial at all times, maybe a blog isn't your optimal marketing tool.

4. Are you good at getting a conversation going and engaging an audience? Blogging isn't just publishing posts. A blog becomes a defacto online community and needs the same kind of attention that a message board or forum needs to keep it vibrant and on track. Yes, you can shut off the comments feature on your blog, however, you lose out on a potentially valuable aspect of blogging for business in the first place -- an engaged audience of customers and potential customers.

5. Do you have a company policy on blogging? If you are a company of one, you still need some guidelines that you will follow as you blog for your business. What will you do if someone posts a nasty comment about you or your company, for example? Knowing in advance how you will handle situations that might come up saves you a lot of confusion later.

6. Do you have a thick skin? Once you open up the conversation in a blog and allow others to comment, you may hear things you don't like from unhappy customers or people who disagree with your point of view. Can you take it without taking it personally?

7. Can you afford to pay someone to blog for you? Some people do hire professional bloggers or pro-bloggers to craft blog posts and keep the ideas and conversations flowing. Pro-bloggers are usually paid anywhere from $10 to $50 per post depending on their reputation, the frequency of posting, the amount of research required and the complexity of the topic.

There are many ways to develop compelling, valuable, conversation-starting blog posts, and I'll talk about those in the near future. Right now, review your answers to the questions above and unless you answered "Yes" to most or all of them, a blog just might not be for you.

Friday, July 11, 2008

Safe Guard your data in Internet

Dear Readers,

I am sure in this current internet era, we atleast sign up one service a month on the internet. That means another exposure of your personal data. How do you safe guard your personal identify on the internet, below are some tips.

1.Read privacy policies before you sign up. Although you have little control over what happens to data, you can at least know what gets collected and retained.

2.Avoid identifying information in user IDs, such as a first initial and full last name. Choosing a moniker that avoids any reference to your name, job or other personal attributes can make tracking more difficult.

3.Don't use the same user ID across multiple services. For example, if a user ID is attached to a message board posting that includes your full name, even if the ID itself does not contain your real name, it's now tied to your name when used elsewhere.

4.Use anonymizing software such as Tor. Such systems relay data packets through many servers to help mask the numeric Internet Protocol address identifying your computer.

Hope this Helps,
Thank you, Readers
JS