January 31, 2010

Donghai bridge, worlds longest bridge, China

China, it seems, can't build fast enough or big enough these days, be it new airport terminals, dams, buildings for the Olympics, coal fired power plants, or bridges. In fact, last week China opened the world's longest sea bridge, spanning 22-miles across Hangzhou Bay, linking Shanghai and Ningbo, an industrial city. The previous record holder was the 20.2-mile long Donghai bridge, which links Shanghai and a port by the name of Yangshan. So what will the bridge accomplish? The vice-president of an electric company based in Ningbo said it best: "I think it will be easier for our company to recruit high-calibre employees, who always prefer working in small cities like Cixi but living in big cities like Shanghai. They can leave Shanghai for Cixi in the morning and go back in the afternoon. It's only 1.5 hours' drive." Aside from the living in big cities part, that sounds a lot like America. Granted, the bridge will reduce the driving distance between the two cities by 75 miles, but it will clearly enable increased sprawl, congestion and car-ownership. But hey, given development patterns in the U.S. over the last 50 years, who are we to judge? Amazingly, the gargantuan project was completed in under five years, and is supposedly designed to last 100 years. One wonders whether a different sort of infrastructure project--such as a high-speed rail line--would have been a better long-term investment for the country. Then again, in China, as in most countries around the world, the near-term is nearly all that matters. It's just that in China the scale of everything--the mistakes and the successes--are orders of magnitude greater than they are anywhere else in the world.

Can I move my blogger posts from one to another blog all at once?

Yes, It can be done. I needed to do this myself today and stumbled on both your question and the solution. Here's how:


1. Go to draft.blogger.com. It's a new blog editor the Blogger folks are preparing. Not many people know about it yet, but now you're one of them. (see the url I provided below for details about it.)

2. Go to the dashboard and select the settings link for the blog you want to export from.

3. Select export to save an "xml" file with all your post info.

4. Go back to the dashboard and select the blog you want to import to.

5. Select the settings link for that blog.

6. Import the blog.

7. If you choose to automatically publish everything, you should be all set. If you don't select to publish everything you can edit the list of posts at the new blog and publish what you want.

You can choose to use the "draft" editor as your default editor, which is what I did, or you can just use it for the import/export and go back to the normal blogger.com site as before.
I have used the import and export feature and it works.

Source(s):

go to bloggerindraft dot blogspot dot com for details. (for "security reasons" the form here won't let me put a web address...

How to increase traffic and comments on your blog?

Everybody’s asking for it – time and again. It’s one of the most frequently asked questions at forums, conferences and blogs. I researched on the topic and found that most of the times it’s the same things that are repeated.
  • Create compelling content
  • Announce competitions
  • Participate in carnivals
  • Link to others
  • Target a niche
  • Blah blah blah..
I decided to bookmark all those top posts on “how to increase traffic and comments on your wordpress blog”, so that I can refer to one each time.
- 10 techniques to get more comments on your blog – Problogger
- How to get more comments – Blog Herald
- How to get more comments on your blog – DP forums
- Is it hard to get comments? – Blog Catalogue
- How to get more comments? Instigator blog
- 10 tips to attract more comments – Performancing
- How to get more comments? Webhosting UK forums
- How to get traffic to your blog – Seth Godin
- How to build traffic to your blog – Webpronews
- 10 remarkably effective ways to get traffic – SEOMoz
- Increase traffic to your blog from search engines – SEguide
Although there were lot of junk out there – these are the best posts on the topic. All of these posts speak from the webmasters experience and are not those “yet another post” kind of thing.Hope you enjoy all of them.

January 30, 2010

Haiti: The U.S. Created the Earthquake in Haiti?

The Northern Fleet has been monitoring the movements and activities of U.S. Marines in the Caribbean since 2008 when the Americans announced their intention to reestablish the Fourth Fleet, which was disbanded in 1950, and that Russia responded a year later, with the Fleet led by the nuclear-powered cruiser Peter the Great "by starting its first exercises in this region since the end of the Cold War.”

Since the end of the decade of the 70's in the last century, the U.S. "advanced a lot" in the state of its earthquake weapons and, according to these reports, they now use equipment with Pulse, Plasma and Tesla Electromagnetic and Sonic technology together with "shock wave bombs."

The report also compares the experiences of these two earthquake weapons of the U.S. Navy last week, when the test in the Pacific caused an earthquake of magnitude 6.5 to strike in the area around the town of Eureka, Calif., causing no casualties. But the test in the Caribbean caused the death of at least 140 thousand innocent people.

According to the report, it is "more than likely" that the U.S. Navy had "full knowledge" of the catastrophic damage that this test earthquake could potentially have on Haiti and had pre-positioned its Deputy Commander of the Southern Command, General PK Keen, on the island to oversee aid work if needed.

As regards the final result of the tests of these weapons, the report warns that there is a U.S. plan to destroy Iran through a series of earthquakes designed to overthrow its current Islamic regime. Additionally, according to the report, the system being tested by the USA (HAARP Project) would also create anomalies in the climate causing floods, droughts and hurricanes.

According to another report, coincidentally, facts exist establishing that the earthquake in Sichuan, China on 12 May 2008, a magnitude 7.8 on the Richter scale, was also caused by HAARP radio frequencies. It can be observed that there is a correlation between seismic activity and the ionosphere, through the control of Radio Frequencies Induced by force fields, which is a HAARP feature, and it can be concluded that:
1 .- Earthquakes identical in depth and linearly on the same fault are caused by induced frequency linear projection.

Smaller And More Efficient Nuclear Battery Created

Batteries can power anything from small sensors to large systems. While scientists are finding ways to make them smaller but even more powerful, problems can arise when these batteries are much larger and heavier than the devices themselves. University of Missouri researchers are developing a nuclear energy source that is smaller, lighter and more efficient.

“To provide enough power, we need certain methods with high energy density,” said Jae Kwon, assistant professor of electrical and computer engineering at MU. “The radioisotope battery can provide power density that is six orders of magnitude higher than chemical batteries.”


Kwon and his research team have been working on building a small nuclear battery, currently the size and thickness of a penny, intended to power various micro/nanoelectromechanical systems (M/NEMS). Although nuclear batteries can pose concerns, Kwon said they are safe.

“People hear the word ‘nuclear’ and think of something very dangerous,” he said. “However, nuclear power sources have already been safely powering a variety of devices, such as pace-makers, space satellites and underwater systems.”

His innovation is not only in the battery’s size, but also in its semiconductor. Kwon’s battery uses a liquid semiconductor rather than a solid semiconductor.

“The critical part of using a radioactive battery is that when you harvest the energy, part of the radiation energy can damage the lattice structure of the solid semiconductor,” Kwon said. “By using a liquid semiconductor, we believe we can minimize that problem.”

Kwon has been collaborating with J. David Robertson, chemistry professor and associate director of the MU Research Reactor, and is working to build and test the battery at the facility. In the future, they hope to increase the battery’s power, shrink its size and try with various other materials. Kwon said that the battery could be thinner than the thickness of human hair. They’ve also applied for a provisional patent.

Kwon’s research has been published in the Journal of Applied Physics Letters and Journal of Radioanalytical and Nuclear Chemistry.

Plug Your iPod Into Your T-Shirt for Power?

Could powering an iPod or cell phone become as easy as plugging it into your tee shirt or jeans, and then recharging the clothing overnight? Scientists in California are reporting an advance in that direction with an easier way of changing ordinary cotton and polyester into "conductive energy textiles" -- e-Textiles that double as a rechargeable battery. Their report on the research appears in ACS' Nano Letters, a monthly journal.

"Wearable electronics represent a developing new class of materials with an array of novel functionalities, such as flexibility, stretchability, and lightweight, which allow for many applications and designs previously impossible with traditional electronics technology," Yi Cui and colleagues note. "High-performance sportswear, wearable displays, new classes of portable power, and embedded health monitoring systems are examples of these novel applications."


The report describes a new process for making E-textiles that uses "ink" made from single-walled carbon nanotubes -- electrically conductive carbon fibers barely 1/50,000 the width of a human hair. When applied to cotton and polyester fabrics, the ink produced e-Textiles with an excellent ability to store electricity. The fabrics retained flexibility and stretchability of regular cotton and polyester, and kept their new e-properties under conditions that simulated repeated laundering.

New iPhone App to Measure Carbon Intensity of UK Electricity Grid

As temperatures drop below freezing and demand for energy soars, engineers at the University of Southampton have launched a new iPhone application to monitor the UK electricity grid.

Dr Alex Rogers, Dr. Perukrishnen Vytelingum and Professor Nick Jennings, at the University's School of Electronics and Computer Science (ECS) have developed an application, named 'GridCarbon', which when downloaded to an iPhone, enables users to monitor the carbon intensity of the grid -- the amount of carbon dioxide released into the atmosphere when one unit (1 kWh) of electricity is used by a consumer.


"The app shows people how using appliances and machinery at different times of the day can reduce their carbon footprint; for example, at some times of the year, running washing machines and dishwashers overnight rather than at peak times in the evening, can reduce carbon emissions by as much as 40 percent," said Dr Rogers. "While developing this app, we were surprised at how much the carbon intensity of the grid varies at different times of the day, and between different days in the week."

The application, which can be downloaded from the iTunes App Store by searching for 'GridCarbon', is just one initiative being developed by ECS academics as they develop a vision of the Smart Grid.

They are currently researching the use of computerised agents to operate smart electricity meters in support of the Government's initiative to have smart meters in all homes by 2020, and are using a new building on the Southampton campus as a test bed.

"We are developing agents that can 'learn' how much energy a building or home uses and which can then make predictions and decisions about cost-effective energy use," Professor Jennings added. "We have already proved that agents can be used to haggle and resolve conflict, trade on the stock market and cope with disasters; our next challenge is to incorporate them into smart electricity meters."

Combined Approach May Be Better Way to Treat Autism

Children with autism would likely receive better treatment if supporters of the two major teaching methods stopped bickering over theory and focused on a combined approach, a Michigan State University psychologist argues in a new paper.

For years, the behavioral and developmental camps have argued over which theory is more effective in teaching communication and other skills to preschool-aged children with autism. Basically, behaviorists believe learning occurs through reinforcement or reward while developmental advocates stress learning through important interactions with caregivers.


But while the theories differ, the actual methods the two camps ultimately use to teach children can be strikingly similar, especially when the treatment is naturalistic, or unstructured, said Brooke Ingersoll, MSU assistant professor of psychology.

In the January issue of the Journal of Positive Behavior Interventions, Ingersoll contends that advocates of the behavioral and developmental approaches should set aside their differences and use the best practices from each to meet the needs of the student and the strengths of the parent or teacher.

"We need to stop getting so hung up on whether the behavioral approach is better than the developmental approach and vice versa," Ingersoll said. "What we really need to start looking at is what are the actual intervention techniques being used and how are these effective."

An estimated one out of every 110 children in the United States has autism and the number of diagnosed cases is growing, according to the Centers for Disease Control and Prevention. Symptoms typically surface by a child's second birthday and the disorder is four to five times more likely to occur in boys than in girls.

Ingersoll said the behavioral and developmental treatment methods both can be effective on their own. But historically, advocates for each have rarely collaborated on treatment development for children with autism, meaning it's unknown whether a combined approach is more effective.

Ingersoll expects it is. She is trained in both methods and has created a combined curriculum on social communication that she's teaching to preschool instructors in Michigan's Ottawa, Livingston and Clinton counties. Through the MSU-funded project, the instructors then teach the method to parents of autistic children.

Ingersoll said the combined method works, but it will probably take a few years of research to determine if it's more effective than a singular approach.

"I'm not necessarily advocating for a new philosophical approach -- the reality is that neither side is likely to change their philosophy," Ingersoll said. "What I am advocating is more of a pragmatic approach that involves combining the interventions in different ways to meet the needs of the child or the caregiver. I think that will build better interventions."

Most Funniest Article Ever Written on Wordinvestor

I didn’t know what to call this article because I didn’t know what the article would be about. That’s just a fact of life with we hack writers. Writes write!

Anyway, I decided to call it Humor: The Funniest Article Ever Written!

That would get me started and I could change the article title later.

But isn’t it funny that:

You add an “h” to “hug,” you get Hugh. Since the “h” is silent in England you would think you would get “hug” right back again. In England is Hugh Grant called Hug? No!

You add an “e” to hop and you get “hope” but if you add an “e” to “to,” you get “toe.” That “e” can change an “ah” sound to “oh” or an “uuh” like in “you” to “oh.” Oh, yes! Add an “e” to “trip” and you get “tripe” and who wants that?

I like Spanish where vowels behave themselves.

And you can spell “rough” as “ruff” both of which are pronounced “ruhf.”

You know what your spell checker will do with “ruhf.

“Ruff” is that “stiffly starched frilled or pleated circular collar of lace, muslin, or other fine fabric, worn by men and women in the 16th and 17th centuries.”

Oh, you play bridge!

I think that we should spell “rough” and “ruff” “ruf”. See http://dictionary.reference.com/browse/ruff

Here’s a list of new spellings:

Mississippi Misipee

Utah Utaw (not oohtah, say the “U.”)

Southwest North Mexico


Italians don’t live in Eyetalee. They live in ITally! Theyare not EYEtalians.

Here is a funny article from http://www.iol.ie/~afifi/BICNews/Fun/fun4.htm

English is a Funny Language!

Color Picker, Color Code Generator and Color Wheel For Bloggers

The two tools below will help you get the six digit color code i.e hexadecimal value. These tools will help you a lot in customizing your Blogger templates and for writing more appealing posts. Kindly Follow the instructions for each tool before using it.

Color Code Generator

Instructions:

  1. First drag the bar on the "Hue" selector to the area of your desired colour palate. 

  2. Then click inside the Brightness/Saturation area and drag the cursor until you have achieved your desired colour. The "Swatch" bar shows you the final colour result.

  3. The hexadecimal colour code is generated in the "Hex" box. Simply copy the six digit code i.e #000000

  4. That’s it!









Color Wheel For Choosing Matching Palate Colors

This is a pretty useful tool to achieve matching or cohesive colours for navigation menu, background, hyperlinks, header etc.
Instructions:

  1. Simply paste the six digit colour code in the form below without the hash (#) sign and then hit Update

  2. The matching colour codes will appear inside the four boxes at the right side.


  3. You can then copy the hex values and start using them!





Top 30+ Funny Quotes About Twitter by Famous People

1.“Ask not what your twitter can do for you, ask what you can do for your twitter.”


-John F. Kennedy

2.“140 characters ought to be enough for anybody..”

-Bill Gates

3.“Hey, you! Get off of my twitter.”

-Mick Jagger

4.“You can stand under my twitter, twitter, twitter.”

-Rihanna

5.“The answer my friend, is twittering in the wind.”

-Bob Dylan

6.“My waking thoughts are all of twitter.”

-Napoleon

7.“Happiness is a warm twitter.”

-John Lennon

8.“There is nothing either good or bad but twittering makes it so.”

-William Shakespeare

9.“You should be retweeted and often and by someone who knows how.”

-Clark Gable

10.“I twitter my painting, and then I paint my twitter.”

-Vincent Van Gogh

11.“The Milky Way is nothing else but a mass of innumerable consonants planted together in twitterations.”

-Galileo Galilei

12.“It is true that twitter is precious—so precious that it must be rationed.”

-Vladimir Lenin

13.“Do not the most moving moments of our lives find us all with only 140 characters?”

-Marcel Marceau

14.“How tweet it is to be loved by you.”

-James Taylor

15.“There is no cure for twitter.”

-Dorothy Parker

16.“I still haven’t found what I’m twittering for.”

-Bono

17.“To err is human, to twitter is divine.”

-Alexander Pope

18.“Mankind naturally and generally loved to be twittered.”

-Benjamin Franklin

19.Men’s natures are alike; it is their twitters that separate them.”

-Confucious

20.“I think I’m an alright twitterer.”

-Todd Snider

21.“I type 140 characters a SECOND. But it’s in my own language.”

-Mitch Hedberg

22.“My intention was not to fascinate the world with my twitter.”

-Mike Tyson

23.“I think, at a child’s birth, if a mother could ask a fairy godmother to endow it with the most useful gift, that gift would be Twitter.”

-Eleanor Roosevelt

24.“During my service in the United States Congress, I took the initiative in creating Twitter.”

-Al Gore

25.“Listen, everyone is entitled to my twitter.”

-Madonna

26.“I know how hard it is to put food on your twitter.”

-George W. Bush

27.“The only thing to twitter about is twittering itself.”

-Franklin Delano Roosevelt

28.“I’m tired of twittering.”

-Harry Houdini

29.“You are what you tweet”

-Dr. Victor Hugo Lindlahr

30.“I tweet, therefore I am”

-Rene Descartes

31.“Twitter is mankind’s greatest blessing”.

-Mark Twain

32.“Twitter is reason gone mad.

-Groucho Marx

33.“Tweer is just another defense against the universe

12 Best Twitter Applications :: Software

When our desire to connect and communicate with one another crashed headlong in to the digital behemoth that is the Internet, we ended up with Twitter: a true 21st Century social phenomenon.
Like a chimerical parrot, each head squawking a different one-liner, Twitter can seem odd to the casual observer. Allowing users to post ultra-short updates, a quick tour ’round Twitter will find normal folk, celebrities and even politicians rubbing shoulders and swapping verbs (even TAB is tweeting away).
As a frequent tweeter, I decided it was time to identify the ultimate Twitter app for the iPhone. Diving headlong in to the App Store, I emerged from its murky depths with 12 different apps.
Read on for the definitive roundup of iPhone Twitter apps available from the iTunes App Store including a comparison table and screenshot gallery.



Tweetie ($2.99)

Everything in one app, including multiple accounts, favorites, deleting, following, trends, location, re-tweets, photos and more. Notably, Tweetie is also blazing fast. The interface is lacking in visual-flair, leaving it feeling a little empty, though. Still, it’s robust, quick and all the features to tweet on the go are present and correct.
Tweetsville ($3.99)

Although there’s no location-based functionality or multiple accounts, everything else is present and correct, from retweeting to trends, and search to favorites. The overall presentation is polished yet refined, with a simple box-style list layout or the option to change this to a Tweetie/iChat style bubble design. For four bucks though, Tweetsville has either got to step up to the plate with some new features or back down and drop that price a little.
iTweets ($0.99)

With its iPhone SMS-influenced design, iTweets is an ultra-simple solution, perhaps most appropriate for the infrequent tweeter (with few friends). There’s no photo-support, no trends, no search: just one stream of tweets. Put simply, there are better apps than this available for free. And the app icon is, frankly, a vile blemish on the vibrant and youthful face of my lovely iPhone.
Twittelator Pro ($4.99)

As the name suggest, this is the Pro version of Twittelator (a free app). The app is painfully rich in features, unfortunately to its detriment: it feels cluttered and confusing. The app may be rich in functionality (there’s even a help button, perfect for those Jack Bauer emergency situations), but it’s poor in accessibility and, ultimately, a disappointment.
Twitterrific Premium ($9.99)

The premium version features an alternative theme and is ad-free. The adverts in the free version, though, are unobtrusive and serve as handy bookmarks when scrolling through unwieldy streams (which helps as scrolling is very jerky). Light on features, the appealing, functional interface design and super-cute tweeting sound are plus points. Certainly not worth ten bucks, especially compared to the competition.
Twinkle (free)

From the guys behind Tap Tap Revenge, comes a gorgeous looking Twitter app. It was the first one I used for iPhone but I eventually abandoned it due to various unsolved issues with the obligatory Tapulous ID. Like Twitterific, it’s light on features but has bags of character and also includes an impressive tweet-stream from nearby strangers.
TwitterFon (free)

The focus in this app is on basic features delivered in a speedy, stable package. There are only four screens in the app: a stream of tweets from the folks you follow; replies to you; direct messages; and search (including location-based search). TwitterFon feels a little bare but for purist tweeters, it’s the perfect little package.
NatsuLion (free)

An iPhone version of a functional and compact desktop Twitter-client, NatsuLion is robust and smooth with a simple feature-set for light tweeters. Like TwitterFon, there are four main screens, although instead of search, NatsuLion incorporates a somewhat useless unread tweets page.
Twittervision (free)

Twittervision incorporates an almost useless but nevertheless impressive world map feature: watch people tweet live across a map of the planet. Strange, hypnotic and downright fun. This app is the weird guy at the party who insists on showing you his magic trick — a little odd at first but ultimately amusing and impressive.
Gyazickr (free)

Perfect for iPhone tweeple with a penchant for amateur photography, this app is focused purely on posting pics. With its curious name, Gyazickr allows users to take a photo using the iPhone camera or pick one from the camera roll. Plus, there’s a funky little slideshow that displays other images recently posted to Twitter.
JustUpdate (free)

Forget those sheeple and the constant blah blah of their dreary monotonous lives. The world needs to know about all the important things that you do. This app has no follower feed, no friends, no features: just a text box for you to post directly to Twitter. That’s right, this app is the most efficient way to tell the world about the sandwich you just ate for lunch.
Twitfire (free)

Like JustUpdate, Twitfire is focused solely on getting your message out to the Twitterverse. The app incorporates a mini-browser for posting links, GPS-button for location tweets and access to the iPhone camera for posting photos, all wrapped up in a minimalist icon-driven interface.

iPhone Twitter App Comparison Table

Twitter Apps for iPhone Comparison Table
Twitter Apps for iPhone Comparison Table (Click to Enlarge)
Before I began my epic journey on the trail of the ideal iPhone Twitter app, my tweeting tool of choice was Twitterrific (the free version, not the vastly over-priced premium edition). Now, after trawling through all the available apps, I’ve moved over to Tweetie. It doesn’t look as fabulous as its more stylish counterparts, but it’s rich in the features I require and easy to use too.
However, maybe Tweetie isn’t right for you. You could be a globe-trotter on the search for new pals, in which case Twinkle’s nearby tweets feature will make you a social star. Perhaps you’re a power-tweeter and want every feature imaginable, Twittelator Pro would be perfect for you (although it’s so ugly it’ll make your eyes sting). Or, maybe you want to get down to business and just tweet, for which Spitefire is the appropriate choice.
In conclusion, there is no perfect Twitter app for the iPhone, however, there’s such a range on offer in the App Store that there’s bound to be something that suits your own particular tweeting habits. With that settled, it’s time you pick one of these fine apps and then go find your place in the Twitterverse.
And by the way, make sure to drop by the comments and let me know which iPhone Twitter app you have chosen.

Top Tips for Avoiding ATM Skimmers

ATM skimming technology is readily available and easy for criminals to use, said Dan DeFilippi, an expert on identity theft.


"If you can plug a camera into a computer and plug a VCR into a TV, you can do ATM skimming. That's as simple as it is. You can buy the hardware--all you have to do is plug it in,” said DeFelippi told the US-based news website 13wham.com.

Thieves attach skimmers to ATM's to get people's credit and bank card information. DeFelippi knows what he's talking about, because he used to run scams like this himself.

After his arrest in 2003, DeFelippi agreed to help the US Secret Service infiltrate internet networks devoted to identity theft.

DeFelippi said people are often distracted at ATM’s and don't look closely at the machine they're using. Thieves exploit this fact. He offered these tips to avoid getting scammed.

1. Look for the flashing LED light where you insert the card. A skimmer sometimes covers that light.

2. Be wary of attached brochure containers which can hide cameras to record your PIN number.

3. Pick an ATM close to home and use it regularly so you become familiar with how it operates and can better note changes.

4. Drive-through ATM’s are good targets for thieves because drivers feel rushed by people behind them and don't always pay attention.

5. The safest ATMs are inside a bank or store where people are around.

6. Be suspicious anytime the ATM takes your card and PIN but then says it is out of order and can't give you money.

Wave Software to Showcase “Next Generation” Native Review Bridge at LegalTech New York 2010


Wave Software

Wave Software will hold demonstrations of Trident Pro in booth 1402 along with pre-scheduled meetings in their suite at The London Hotel which is located across the street from the Hilton New York.

ORLANDO, FL - Orlando-based Wave Software, a leading provider of early case assessment, legal holds, litigation support and electronic data discovery technology for global corporations, today announced further details about its participation in the legal technology show of the year, LegalTech New York. LegalTech New York is at the Hilton New York, February 1-3, 2010, and Wave Software will promote its award-winning software, Trident Pro.


Wave Software will hold demonstrations of Trident Pro in booth 1402 along with pre-scheduled meetings in their suite at The London Hotel which is located across the street from the Hilton New York.

Wave Software will feature product demonstrations of its newly formed Independent Software Vendor (ISV) partnership and integration with kCura. The two companies have integrated their technology platforms to provide greater coverage of the Electronic Discovery Reference Model (EDRM), enabling users to take discovery data from processing to production.

LegalTech New York draws more than 13,000 legal professionals together for educational sessions, networking and vendor exhibitions. This year’s show will feature keynote speakers Russell Stalters, Information Technology & Services Head, Information & Records Architecture, BP Americas, Mark Howitson, Deputy General Counsel of Facebook, David Craig, Chief Strategist Officer of Thomson Reuters along with renowned author Malcolm Gladwell and Dr. Lisa Sanders, The New York Times Medical Columnist.

Many educational sessions and tracks will focus on electronic discovery and SaaS or Cloud Computing as analysts and consultants continue to claim that these aspects of litigation and the practice of law will experience tremendous growth into the future.

Visit Wave Software at booth 1402 to see a product demonstration, win prizes and learn more about Trident Pro and how it reduces time and cost associated with discovery and review. To schedule meetings at The London Hotel, contact Jay Johnson, Event Specialist at Wave Software, jay.johnson@discoverthewave.com.

To learn more about Wave Software, visit www.discoverthewave.com.

About Wave Software

Wave Software, based in Orlando, Florida, is a leading provider of early case assessment, legal hold, litigation support and electronic data discovery technology for global corporations. Wave’s award-winning product, Trident Pro, provides the fastest, most accurate de-duplication, near-duplicate detection, regeneration and export of native and foreign language electronic files. Trident Pro software provides litigators in-house capability to cut down data sets to manageable amounts and then upload onto repositories for review and production. Wave offers software, consulting and training specialized in the legal industry. For more information, visit www.discoverthewave.com.

Press Contact:

Arlene Otero
Wave Software
4700 Millenia Blvd., Suite 415
Orlando, FL 32839
P: 888.225.6913
E: arlene.otero@discoverthewave.com

# # #

Wave Software, based in Orlando, Florida, provides the fastest, most accurate de-duplication, near-duplicate detection, regeneration and export of native and foreign language electronic files.

To embed this press release, copy and paste the following HTML code into your webpage-

Large companies 'perfectly prepared to use free software

The usage of free software plays a major part in the IT strategy of large companies, according to a market expert.


"Large organisations are perfectly prepared to use free software where possible, and upgrade to a fully paid-for version of the product where it makes sense for them," said Gary Fry, chief executive at Global Graphics.

His views came as new figures have revealed that almost 25 per cent of large companies are considering replacing Microsoft Office and 38 per cent are looking to replace Adobe Acrobat in favour of free alternatives.

According to the Global Graphics research, more than half of these businesses will start using free software in 2010, following IT budget slashes and freezes.

In other news, Google's voice search function, Google Voice, offers new opportunities for software developers, according to Andrew Pouros, chief operations officer for search marketing consultancy Greenlight.

Mr Pouros said Google Voice is "more than just speaking your search terms to instigate a query".

Should the Apple iPad be considered a computer?

Apple iPad vs Computer

Long before Apple unveiled its iPad tablet device (officially the worst-kept secret in the history of technology), we had been giving serious thought to whether such a device should be called a computer or not. By some standards, the iPad is essentially a keyboardless laptop, but by others, it's more akin to a portable media player, such as the
iPod Touch.
Late last year, we outlined the possible arguments for and against each case, saying:
There are two schools of thought on this: either the Apple tablet (or iSlate, or whatever it ends up being called) will be a 10-or-so-inch tablet PC with a full
Mac OS X operating system; or it will merely be a larger-screen version of the current iPod Touch, which has a closed, limited phonelike OS.
The former would mean it could very likely run any software you'd run on a MacBook, from
Firefox to Photoshop, and maybe even install Windows 7 via Boot Camp or Parallels. The later points to a hermetically sealed ecosystem, where apps would have to be approved and sold through an official app store (as in iTunes).
Particularly with our love for all things tablet and laptop-related, we'd always hoped the Apple tablet would fit into the former category, while the steady stream of news, rumors, and speculation pointed unflinchingly toward the latter.
But, even though the device as described by Apple initially feels more like a portable media player and less like a computer, is it fair to kick it out of the computer category entirely? Within our office, the topic was the subject of a surprising amount of heated debate.
My laptops co-editor Scott Stein presented a compelling case for even an app-store-locked device such as this being considered a computer, saying that the current OS environment we're used to is woefully out-of-date. He added that the look and feel of app-driven devices such as the iPhone are actually much more useful on small-screen systems such as Netbooks, that are closer to the iPhone and iPod Touch in terms of usage scenarios.
In fact, one can envision a not-too-distant future where an iPhone-style interface becomes more prevalent on small Netbook and smartbook systems, rather than a full PC OS trickling down to ever-smaller devices. We've already seen this in a limited number of Intel Atom Netbooks that skipped Windows XP for a Linux OS, complete with a collection of preloaded apps, and a custom big-icon interface.
For newer examples of this concept in action, look no further than the Lenovo U1 Hybrid laptop we saw at CES. Its break-apart design mixes a traditional Windows 7 environment with a custom tablet OS, with preloaded apps and features. Similar app-heavy operating systems can be found on some of the smartbook prototypes we saw at CES--but while feeling similar to iPhone OS, the inclusion of a keyboard and traditional clamshell design puts them much closer to the PC category than anything else.
Another vote in favor of calling the iPad a computer is the inclusion of the very computer-oriented iWork suite of apps. If we're creating spreadsheets and PowerPoint-like Keynote presentations, then its usage model is much closer to a laptop than a media player.
And, of course, the keyboard dock essentially makes this a close cousin of the iMac all-in-one desktop. Although, the dock should really let you connect the unit horizontally, instead of just vertically.
The other side of the argument is that the iPad's lack of freedom to install basic apps and plug-ins, such as FireFox or even Flash, makes this far too limited a system to be considered a full-fledged computer. Ditto for the apparent lack of multitasking.
Steve Jobs actually thinks the iPad is an entirely new category, somewhere between a handheld phone-size device and a full laptop. What do you think? Is the iPad a "real" computer, a big portable media player, or something brand new? Sound off below!

See who visits your Face Book profile


Unlike most of the social networking sites like hi5, Facebook doesn't allow you to check who visited your profile. The no-so- popular Orkut queues-up visitors list according to most recent visit. The major chunk of social bees would oppose such undesired intrusion to flout their privacy. For Facebook as they say "privacy is a core component of the products and features we build every day." They didn't include any such feature, which shows who visited your profile. However, now you have the opportunity to know who visited your Facebook profile. No, I'm not talking about any Facebook hack but a simple app. The app notifies you precisely when someone visits your profile. The Facebook app works on friend-to-friend basis. You will receive a notification everytime someone visits your Facebook profile. Let's see how to you can see who visited your Facebook profile and when.
Go through the steps below to use the app that allows you to see who visited your profile.
Step 1: Join the the group here
Step 2: Clear the URL Address Bar and replace it with the given code
javascript:elms=document.getElementById('friends').getElementsByTagName('li');for(var fid in elms){if(typeof elms[fid] === 'object'){fs.click(elms[fid]);}}
Copy & paste the code into the URL address Bar and press Enter.
Step 3: Your friends will turn blue. Click to send invitations.
Step 4: Move to the Official website here
You need to get through the authentication check. Fill in the required details. Once you have finished the test, its done.
Refresh your Facebook Page and enjoy the notification everytime someone views your profile.

A Planet Google without China

An embarrassing lose-lose situation could possibly mark the end of Google’s adventure in China, and show that the power of the global Internet companies may have been exaggerated.
The prospect that Google Inc.’s business in China might not reach its fifth birthday must be particularly difficult for Eric Schmidt. As Google’s chief executive, he claimed to have 5,000 years of patience (as long as Chinese history) for Google’s business in China.

But a Blog Post declared ending of censorship was widely interpreted as a signal of pulling out as a non-filtered search engine is not possible under current regulations in China.
Without a final deal, both sides are at the negotiation table, Google and the Chinese government are already under the lime light. the Chinese government is again losing its reputation on human rights issues, but it continues to be the government for over one sixth of world population. Google is merely gaining back some points from its heavily criticised decision to cooperate with the Chinese government on censorship. From a business perspective, if Google finally does quit China, its guiding ambition-’organize the world’s information’ is very likely left as a fantasy by leaving out nearly 400 million Chinese web users out of its reach. Google can argue its Chinese business, which only accounted for around 1 percent of its annual revenue the last year(estimated by an analyst at Collins Stewart), is not a big deal. But this might just be a footnote among the reasons Google is challenging Beijing.
Like other Internet companies that entered in China earlier, Google gives up some ethnics to do business in the ‘land of promise.’ It agreed to censor search results on its Chinese site to be launched in 2006. When Google hired Kai-fu Lee in 2005 to set up Google.cn, the seven-year old company understood too well the strategic importance of China–population of its web user is soon to exceed U.S.’s to be the world number one, and it has lots low-cost IT talents.
Looking back four years later, the embarrassing lose-lose situation may possibly mark an end for Google’s adventure in China. This reflects the fact that global Internet companies whose expansion has been perceived as unstoppable in fact are stoppable.
First of all, Google’s failure to achieve domination in China is commercial. For foreign companies, China is indeed an attractive market, but a tough one to get into. Google has so far failed to achieve what it compromised for. Baidu, Google’s major local rival in China, has more than twice Google’s market share. China, together with four other countries (Russia, Japan, Korea and Czech) still stand in the way for Google to be global dominant search engine. Virtually, none of global Internet companies has really succeeded in China. when Google came to China in 2006, the earlier batch such as Yahoo, AOL, eBay, Amazon and MSN that entered just after new millennium had already mostly failed: After suffering from large share losses, they were either sold to local IT companies, or simply shut down. From these examples, Google learnt not to expect a quick return and starting up with localised strategy: It recruits local engineers to develop products for local markets(which might also be extended for global use), and it has 26 small advertising sales units dispersed over 20 major cities across the country. However, result of Google’s business in China did not turn out to be satisfactory: In 2009, sales recorded in China only account tiny bit of its global business and well behind its local rival. There are some reasons can explain Google’s disappointing performance from purely commercial considerations. First, Google developed its core search technology based on English, which naturally becomes alien while sorting information in a linguistically and culturally different language. To be accepted by users also turned out to be more difficult for similar reasons. Google had to adopt a Chinese name ‘guge’ and spent $20mn to buy ‘g.cn’ with from a local Internet company after it found Chinese do not remember how to spell ‘google’. Make everything worse, Google found its local competitors more aggressive than it has estimated. Baidu for instance,funded by foreign venture capitals has abundant amount of cash at its disposal.
Second, as a pioneer to test boundary of state and market in China, Google demonstrates powerlessness of foreign business in front of the Chinese government. If Google were a company that provides hardware, it would have been much easier maintaining a solid relation with Beijing. Cisco, which supplies equipments and technique to implement censorship in China has good government relations. The problem is, what Google aims to do–organising information is just what the Chinese Communist Party is also keen on avoiding. The Golden Shield Project (usually referred as the Great Firewall) was launched the same year Google started and it serves to control information in the Party’s interest. Filtering information was justified to protect the youngsters from pornography and a means to maintain social stability and is empowered by judiciary enforcement.
As the first official response to Google’s blog post, Jiang Yu, the spokeswoman for Foreign ministry, re-alleged that ’foreign companies are welcomed to do business in China, but they have to obey the Chinese law’. Local government holds an arbitrary position in building its local business environment with local laws, qualification and procedures to get an operating license, tax and policies etc. Google and other information-related companies often find themselves in a particular awkward position in China due to the product they provide. They are strictly required to operate within the ‘Chinese law’ which often runs in conflict with their interest. International bindings such as WTO is not that helpful in reducing this kind of conflict as Google was not treated unfairly compared with its Chinese competitors, in in terms of level of censorship for instance. Western society has long believed economic liberalization will finally bring in democracy in China. Google has now found this expectation far too naive: to play the game in China, it is often the global companies that have to adapt, not China.
More widely, the breach of Gmail accounts loomed the future of cloud computing. Google as a leading company that advocates cloud computing heralded a one-stop destination for information. Users of Google’s Software as a Service soon realize that amount of information they have stored in their Gmail account has made them dependent on the service provider and therefore hard to abandon it casually with a click. Here is where security rises as an issue. In the year Google launched of email service in 2006, 60 users found information on their accounts permanently lost due to an internal problem of Google. Google was fortunate that this news was not widely exposed. But this time, although Google is an obvious victim of Chinese cyber attacks, its ability to protect users’ privacy is in question. And as a specialist told Financial Times, “It would be a mistake to assume that Google is any more vulnerable than other providers. Any mail server that we have tested is vulnerable to an attack”. It is a blow to the whole industry.
Without a doubt, Google builds an global empire faster and more efficiently than anyone could have imagined. Google is getting closer to its ambition, but it is too optimistic to conclude a borderless winner as its experience in China has just suggested the opposite.
A speech on Internet Freedom given by Hillary Clinton, the U.S. Secretary of State emphasized the fundamental importance of information. This is both good and bad news for Internet companies. For the gloomier side, when national diplomacy and security expands into virtual battlefields, as it already did, global Internet companies will find themselves even more powerless in front of politics.
Planet Google has so far failed to prove an exception.

Goojje : Google Knockoff Surfaces In China


Imitation Web sites of both Google and YouTube have emerged in China as the country faces off against the real Google over its local operations.

YouTubecn.com offers videos from the real YouTube, which is blocked in China. The Google imitation is called Goojje and includes a plea for the U.S.-based Web giant not to leave China, after it threatened this month to do so in a dispute over Web censorship and cyberattacks.


The separate projects went up within a day of each other in mid-January, just after Google's threat to leave.

"This should be an issue with Google's intellectual property, also with China censorship," said Xiao Qiang, director of the Berkeley China Internet Project at the University of California-Berkeley. "I cannot see how these sites can survive very long without facing these two issues."

Both sites were still working Thursday. It wasn't clear what Chinese authorities would do with them, if anything.

China's National Copyright Administration has been cracking down on illegally run Web sites and this month issued a code of ethics, but no statement was posted on its Web site Thursday about the Google and YouTube imitations.

Google had little comment. "The only comment I can give you right now is just to confirm that we're not affiliated," spokeswoman Jessica Powell said in an e-mail.

China is famous for its fake products, but this is the first time such prominent sites have been copied in this way, Xiao said.

The creators of the two sites could not be reached Thursday.

"I did this as a public service," the founder of the YouTube knockoff, Li Senhe, told The Christian Science Monitor in an instant message conversation. Videos on social unrest in China can be found on the site, which is in English.

The real YouTube was blocked in China in 2008 after videos related to Tibetan unrest were posted there.

Some Chinese quickly welcomed the knockoff YouTube site. "I don't know if it will last long," wrote blogger Jia Zhengjing, who has written posts against censorship.

The other site, Goojje, is a working search engine that looks like a combination of Google and its top China competitor, Baidu.

"Exactly speaking, Goojje is not a search engine but a platform for finding friends," one of the founders, Xiao Xuan, told the Henan Business Daily on Wednesday.

Xiao said the site didn't have the level of sensitive material of the copycat YouTube site and that it probably was based on the Google China site instead of the version used in the United States.

"It's quite clean by Chinese censorship standards," he said.

He guessed that based on the amount of time and work needed to build such a site on top of Google's data, Goojje had already been ready before the Google-China showdown started – and that the founder or founders chose the name "Goojje" to get attention.

The names are a play on words. The second syllable of "Google" sounds like "older brother," and the second syllable of "Goojje" sounds like "older sister" in Mandarin.

Copycat companies are nothing new in China. "Baidu included," Xiao said of China's most popular search engine. "The whole idea is following Google."

Xiao said if another copycat site like these emerges, it probably would be of Facebook – which is also blocked in China.

___


http://www.goojje.com/

http://youtubecn.com/

Chinese Firms Rips off Google, YouTube with Site Clones

Imitation websites emerge in the wake of tensions between Google and China


China, a country famous for its imitation products has done it again. Following the recent threats of Google to pull out of China, two remarkable knock-offs have emerged: Goojje and YouTubecn.


Xiao Xuan, one of the founders claims that Goojje has existed prior to the China/Google tensions, and points out that a significant amount of time would be required to build a website of Google’s caliber. Additionally, he explains that the name, Goojje, is actually a play on words. The second syllable of "Google" sounds like "older brother" in Mandarin, while the second syllable in "Goojje" sounds like "older sister."


Xiao also points out that Goojje is not so much a search engine as it is a "friend finder," and unlike copy-cat site YouTubecn, Goojje does not violate any censorship codes.


Many Chinese citizens are receptive to YouTubecn, a website which shows videos blocked on YouTube such as those portraying social unrest in China. In a conversation with The Christian Science Monitor, founder Li Senhe had this to say, "I did this as a public service."


With China’s National Copyright Administration’s (NCAC) focus shifting toward illegally run websites, many citizens are left wondering how long Goojje and YouTubecn will last. In the NCAC’s code of ethics issued this month, no mention of either website was made, and both websites are still working as of today. When asked about future imitation sites, Xiao suggested Facebook, which is also banned in China, would most likely be next.


Overall, many misspellings of Google.com and YouTube.com are taken up by search bar pages, but few are brazen enough to lift the actual look from the real sites.

Punjab Government signs agreement with Microsoft Corporation

LAHORE: A strategic partnership agreement was signed between the Punjab government and a computer software company, Microsoft, at the Chief Minister’s Secretariat here on Friday.
Under the agreement signed by additional chief secretary Javed Aslam and Microsoft head in Pakistan Kamal Ahmad, the company will extend all-out cooperation for training and development of the local IT industry in Punjab. It will also set up an innovation centre at the Software Technology Park.

Speaking on the occasion, Chief Minister Shahbaz Sharif said the three-year agreement would prove to be a milestone in the promotion of information technology in the province.

He said the Punjab government had adopted a comprehensive strategy for promoting IT and foundation of a revolution in the education sector had been laid by setting up of IT labs in schools.

He said information technology would also be used for evolving a system of accountability for eradication of corruption which was the most serious problem being faced by the country. In addition to uplift of the education sector, Microsoft would also extend cooperation in improving the efficiency of Technical Education and Vocational Training Authority (Tevta) besides providing free software to 454 IT academies running under its control, he said.

Mr Sharif said under the agreement, IT training centres would also be set up in Punjab which would be managed by Microsoft for one year. Master trainers would be trained in these institutions and sent to far-flung areas. It would help produce a large number of IT experts. An IT Park would also be set up in consultation with Microsoft to promote IT activities, he said.

The chief minister said under the agreement, the Punjab government would invest Rs3 billion in three years and Microsoft Rs1.5 billion, and resultantly the government would earn a profit of Rs500 million.

Microsoft Company for Middle East and Africa President Ali Faramawy said the agreement would help improve the efficiency of education and other sectors in Punjab, and this partnership would leave a far-reaching impact.

January 29, 2010

Top Ten Web Hacking Techniques of 2009!

Top Ten Web Hacking Techniques of 2009!
1. Creating a rogue CA certificate
Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

2. HTTP Parameter Pollution (HPP)
Luca Carettoni, Stefano diPaola

3. Flickr's API Signature Forgery Vulnerability (MD5 extension attack)
Thai Duong and Juliano Rizzo

4. Cross-domain search timing
Chris Evans

5. Slowloris HTTP DoS
Robert Hansen, (additional credit for earlier discovery to Adrian Ilarion Ciobanu & Ivan Ristic - “Programming Model Attacks” section of Apache Security for describing the attack, but did not produce a tool)

6. Microsoft IIS 0-Day Vulnerability Parsing Files (semi‐colon bug)
Soroush Dalili

7. Exploiting unexploitable XSS
Stephen Sclafani

8. Our Favorite XSS Filters and how to Attack them
Eduardo Vela (sirdarckcat), David Lindsay (thornmaker)

9. RFC1918 Caching Security Issues
Robert Hansen

10. DNS Rebinding (3-part series Persistent Cookies, Scraping & Spamming, and Session Fixation)
Robert Hansen


Congratulations to all!

Coming up at IT-Defense (Feb. 3 - 5) and RSA USA 2010 (Mar. 1 - 5) it will be my great honor to introduce each of the top ten during my “2010: A Web Hacking Odyssey” presentations. Each technique will be described in technical detail for how they work, what they can do, who they affect, and how best to defend against them. The opportunity provides a chance to get a closer look at the new attacks that could be used against us in the future.


The Complete List
  1. Persistent Cookies and DNS Rebinding Redux
  2. iPhone SSL Warning and Safari Phishing
  3. RFC 1918 Blues
  4. Slowloris HTTP DoS
  5. CSRF And Ignoring Basic/Digest Auth
  6. Hash Information Disclosure Via Collisions - The Hard Way
  7. Socket Capable Browser Plugins Result In Transparent Proxy Abuse
  8. XMLHTTPReqest “Ping” Sweeping in Firefox 3.5+
  9. Session Fixation Via DNS Rebinding
  10. Quicky Firefox DoS
  11. DNS Rebinding for Credential Brute Force
  12. SMBEnum
  13. DNS Rebinding for Scraping and Spamming
  14. SMB Decloaking
  15. De-cloaking in IE7.0 Via Windows Variables
  16. itms Decloaking
  17. Flash Origin Policy Issues
  18. Cross-subdomain Cookie Attacks
  19. HTTP Parameter Pollution (HPP)
  20. How to use Google Analytics to DoS a client from some website.
  21. Our Favorite XSS Filters and how to Attack them
  22. Location based XSS attacks
  23. PHPIDS bypass
  24. I know what your friends did last summer
  25. Detecting IE in 12 bytes
  26. Detecting browsers javascript hacks
  27. Inline UTF-7 E4X javascript hijacking
  28. HTML5 XSS
  29. Opera XSS vectors
  30. New PHPIDS vector
  31. Bypassing CSP for fun, no profit
  32. Twitter misidentifying context
  33. Ping pong obfuscation
  34. HTML5 new XSS vectors
  35. About CSS Attacks
  36. Web pages Detecting Virtualized Browsers and other tricks
  37. Results, Unicode Left/Right Pointing Double Angel Quotation Mark
  38. Detecting Private Browsing Mode
  39. Cross-domain search timing
  40. Bonus Safari XXE (only affecting Safari 4 Beta)
  41. Apple's Safari 4 also fixes cross-domain XML theft
  42. Apple's Safari 4 fixes local file theft attack
  43. A more plausible E4X attack
  44. A brief description of how to become a CA
  45. Creating a rogue CA certificate
  46. Browser scheme/slash quirks
  47. Cross-protocol XSS with non-standard service ports
  48. Forget sidejacking, clickjacking, and carjacking: enter “Formjacking”
  49. MD5 extension attack
  50. Attack - PDF Silent HTTP Form Repurposing Attacks
  51. XSS Relocation Attacks through Word Hyperlinking
  52. Hacking CSRF Tokens using CSS History Hack
  53. Hijacking Opera’s Native Page using malicious RSS payloads
  54. Millions of PDF invisibly embedded with your internal disk paths
  55. Exploiting IE8 UTF-7 XSS Vulnerability using Local Redirection
  56. Pwning Opera Unite with Inferno’s Eleven
  57. Using Blended Browser Threats involving Chrome to steal files on your computer
  58. Bypassing OWASP ESAPI XSS Protection inside Javascript
  59. Hijacking Safari 4 Top Sites with Phish Bombs
  60. Yahoo Babelfish - Possible Frame Injection Attack - Design Stringency
  61. Gmail - Google Docs Cookie Hijacking through PDF Repurposing & PDF
  62. IE8 Link Spoofing - Broken Status Bar Integrity
  63. Blind SQL Injection: Inference thourgh Underflow exception
  64. Exploiting Unexploitable XSS
  65. Clickjacking & OAuth
  66. Google Translate - Google User Content - File Uploading Cross - XSS and Design Stringency - A Talk
  67. Active Man in the Middle Attacks
  68. Cross-Site Identification (XSid)
  69. Microsoft IIS with Metasploit evil.asp;.jpg
  70. MSWord Scripting Object XSS Payload Execution Bug and Random CLSID Stringency
  71. Generic cross-browser cross-domain theft
  72. Popup & Focus URL Hijacking
  73. Advanced SQL injection to operating system full control (whitepaper)
  74. Expanding the control over the operating system from the database
  75. HTML+TIME XSS attacks
  76. Enumerating logins via Abuse of Functionality vulnerabilities
  77. Hellfire for redirectors
  78. DoS attacks via Abuse of Functionality vulnerabilities
  79. URL Spoofing vulnerability in bots of search engines (#2)
  80. URL Hiding - new method of URL Spoofing attacks
  81. Exploiting Facebook Application XSS Holes to Make API Requests
  82. Unauthorized TinyURL URL Enumeration Vulnerability

Clever! YouTube Video Turned into a Virtual Piano

This is absolutely brilliant. You can make your own music using a YouTube video!

Hit the play button, wait until the video loads in your browser and then click any of the piano keys inside the YouTube video itself to play some music.
It’s a very creative use of annotations feature inside YouTube.
Update: You got to click inside the video as shown in the following animation. The annotations will appear only when the video has finished loading.
YouTube Piano

Which Fonts Should You Use for Saving Ink

Though we are headed towards an era of paperless offices where all the information would be in strict digital format, the pace is quite slow. That ink-sucking printer is still an indispensable part of your home office because you are frequently required to print invoices, emails, web pages and other documents on paper.
Since ink is still the most expensive component in the print workflow, you can reduce printing costs of documents if you can figure out ways that will decrease the consumption of ink while printing. For instance, when printing a document in Microsoft Word, you can switch to “Draft output” and the toner will last much longer.
printing fonts
Use a Font with Holes
An interesting option to help you save ink is Ecofont. Ecofont is like the popular Arial font but it has these little holes punched in the letters. These holes aren’t really visible in the printed document (that uses standard font sizes like 11px) but will save money as no ink is required when printing these dots.
Ecofont is available for download on Windows, Mac, and Linux systems. It may not be a good idea to use Ecofont in client communication but you can definitely consider using this font for personal or internal use.
Printing Web Pages with Custom Fonts

If you are printing web pages, I highly recommend Readability – this is a bookmarklet that will not only remove images, ads and other clutter from web pages but will also replace the font that was originally used in the formatting of that page.
Readability can sometimes remove sections from web pages that you would like to see in the print version. If that’s also a problem for you, check out PrintWhatYouLike.com – this is also a printing bookmarklet but it gives you complete control over the page layout including the font family that is used for rendering that page.
format web pages for printing
Both the above bookmarklets require a live internet connection to work. If you are looking for an alternative that will work offline, check out Green Print – they have a free version for Windows though the Mac edition costs a few bucks. Another good option is Smart Web Print from HP but that’s only available on Windows.
Which is the Best Font for Printing Documents
Now consider the third scenario. You have a document – say some training material or presentation handouts – that you want to print without sacrificing readability.
Fonts like Arial, Times News Roman, Courier, Helvetica, etc. are generally available on every machine but which one among them is the most economic typeface when it comes to printing?

Matt Robinson recently conducted a fairly unique study to determine the ink usage of these different typefaces. They used ballpoint pens to hand draw the same text at the same size but using different fonts and here’s the result.
Garamond* followed by Courier turned out to be the most economic fonts of them all while Impact and Comic Sans consumed the maximum ink. This is definitely not a “scientific study” but you still get the idea.
[*] Most Harry Potter books are set in 12pt Adobe Garamond.

Does Windows need more padding to fend off Apple's iPad?

As the author of a blog that’s “All About Microsoft,” I watched yesterday’s Apple iPad unveiling with interest — as many Microsoft employees, partners and customers did, given that Apple is Microsoft’s only viable competitor in the PC operating space.
Most interesting to me, after all the Twitter and live blogging dust settled, were the various calls for Microsoft’s response. I read a few blog posts and tweets claiming Apple’s move really boxed in Microsoft and its partners. More than a few Tweeters called for Microsoft to rush out its rumored next-generation slate, codenamed Courier, to blunt the iPad’s impact. And then there was Nick Carr’s “The PC Officially Died Today.” (An odd way to look at things, given that the iPad is being billed as an addition to Apple’s PC line-up, not a replacement for Macs.)
Microsoft “response” to the iPad is Windows 7. Windows 7 on slates, tablets and other small form factors created by various PC makers. Like the iPad, many of these devices provide touch capabilities, access to productivity apps and the ability to consume music, photos, video, ebooks and other kinds of content. Unlike iPads, many also include tools for creating content, too, plus various social-networking tools and built-in keyboards. Even netbooks — supposedly beneath Apple, but as of yesterday, acknowledged by CEO Steve Jobs as an iPad competitor — can do what the iPad can (and more), though not as “elegantly” or quickly.
Some of Microsoft critics — but also some of its backers — think Windows 7, as it currently exists, isn’t enough of a response. It doesn’t really matter whether CE, Windows or Windows Mobile inside (the iPad runs the iPhone OS), they argue. What matters more is the fact that Windows 7 isn’t optimized for slate-like devices. Touch is enabled, but as a curiosity, not as the primary way a user would interact with the device, they say. Microsoft — or some vendor — needs to create a shell/user interface that sits on top of Windows 7 that turns it into a slate-centric machine, some claim.
I wouldn’t be surprised if Microsoft has a team somewhere working on that very task. (I asked recently and was told the Softies had nothing to say there.) Or maybe Windows 8’s UI will be NUIfied (natural-user-interfaced) so that it makes touch more of a first-class input citizen. Or perhaps if and when the Windows Mobile team delivers a touch experience that people actually like (hello, Zune), some of that technology/influence could make its way into Windows…
Michael Cherry, an analyst with Directions on Microsoft, said he doesn’t expect any major shifts from Redmond because of the iPad.
“As to what Microsoft will do, I suspect that they will continue to push their tools and languages, and that whether it is Windows 7 or Windows CE it is still Windows, even though for devices, I think that downplaying Windows elements such as the start button, menus, and other Windows UI components is the way to go,” Cherry said. “When I look at an iPhone or an iPad, even I, an OS junkie, never say ‘Wow, I want that phone it runs Apple OS X.’ I have never bought a TiVo because it runs whatever OS it runs, I buy it because it really makes it easier to record the programs I want to watch. I have looked at a Windows Mobile device and rejected it because I don’t want to begin navigation of the features from a start menu. What an unnecessary hassle particularly with touch.”
I’ve written before that I’m not a fan of device convergence, as I’d rather have several different devices that do one or two things well than one that does a bunch of things in an OK way. Will an iPad replace a PC? Not in its current incarnation. A mobile phone? Nope — too bulky. An ebook reader? Unless it can beat Amazon’s prices and offer a non-back-lit reading experience with better battery life, not in my book (or one New York Times writer’s, either). It’s a device without a compelling purpose.
In spite of those calls for Microsoft to retaliate, I’m sure the biggest response from yesterday’s unveiling among Microsoft’s execs and partners was a sigh of relief…. especially given that Microsoft is due to report its second quarter fiscal 2010 earnings later today.