China, it seems, can't build fast enough or big enough these days, be it new airport terminals, dams, buildings for the Olympics, coal fired power plants, or bridges. In fact, last week China opened the world's longest sea bridge, spanning 22-miles across Hangzhou Bay, linking Shanghai and Ningbo, an industrial city. The previous record holder was the 20.2-mile long Donghai bridge,...
January 31, 2010
Yes, It can be done. I needed to do this myself today and stumbled on both your question and the solution. Here's how:1. Go to draft.blogger.com. It's a new blog editor the Blogger folks are preparing. Not many people know about it yet, but now you're one of them. (see the url I provided below for details about it.)2. Go to the dashboard and select the settings link for the blog...

Everybody’s asking for it – time and again. It’s one of the most frequently asked questions at forums, conferences and blogs. I researched on the topic and found that most of the times it’s the same things that are repeated.Create compelling contentAnnounce competitionsParticipate in carnivalsLink to othersTarget a nicheBlah blah blah..I decided to bookmark all those top posts...
January 30, 2010
The Northern Fleet has been monitoring the movements and activities of U.S. Marines in the Caribbean since 2008 when the Americans announced their intention to reestablish the Fourth Fleet, which was disbanded in 1950, and that Russia responded a year later, with the Fleet led by the nuclear-powered cruiser Peter the Great "by starting its first exercises in this region since...
Batteries can power anything from small sensors to large systems. While scientists are finding ways to make them smaller but even more powerful, problems can arise when these batteries are much larger and heavier than the devices themselves. University of Missouri researchers are developing a nuclear energy source that is smaller, lighter and more efficient.“To provide enough...
Could powering an iPod or cell phone become as easy as plugging it into your tee shirt or jeans, and then recharging the clothing overnight? Scientists in California are reporting an advance in that direction with an easier way of changing ordinary cotton and polyester into "conductive energy textiles" -- e-Textiles that double as a rechargeable battery. Their report on the research...
As temperatures drop below freezing and demand for energy soars, engineers at the University of Southampton have launched a new iPhone application to monitor the UK electricity grid.Dr Alex Rogers, Dr. Perukrishnen Vytelingum and Professor Nick Jennings, at the University's School of Electronics and Computer Science (ECS) have developed an application, named 'GridCarbon', which...
Children with autism would likely receive better treatment if supporters of the two major teaching methods stopped bickering over theory and focused on a combined approach, a Michigan State University psychologist argues in a new paper.For years, the behavioral and developmental camps have argued over which theory is more effective in teaching communication and other skills to...

I didn’t know what to call this article because I didn’t know what the article would be about. That’s just a fact of life with we hack writers. Writes write!Anyway, I decided to call it Humor: The Funniest Article Ever Written!That would get me started and I could change the article title later.But isn’t it funny that:You add an “h” to “hug,” you get Hugh. Since the “h” is silent...
The two tools below will help you get the six digit color code i.e hexadecimal value. These tools will help you a lot in customizing your Blogger templates and for writing more appealing posts. Kindly Follow the instructions for each tool before using it.Color Code GeneratorInstructions:First drag the bar on the "Hue" selector to the area of your desired colour palate. Then...
1.“Ask not what your twitter can do for you, ask what you can do for your twitter.”-John F. Kennedy2.“140 characters ought to be enough for anybody..”-Bill Gates3.“Hey, you! Get off of my twitter.”-Mick Jagger4.“You can stand under my twitter, twitter, twitter.”-Rihanna5.“The answer my friend, is twittering in the wind.”-Bob Dylan6.“My waking thoughts are all of twitter.”-Napoleon7.“Happiness...
When our desire to connect and communicate with one another crashed headlong in to the digital behemoth that is the Internet, we ended up with Twitter: a true 21st Century social phenomenon.Like a chimerical parrot, each head squawking a different one-liner, Twitter can seem odd to the casual observer. Allowing users to post ultra-short updates, a quick tour ’round Twitter will...
ATM skimming technology is readily available and easy for criminals to use, said Dan DeFilippi, an expert on identity theft."If you can plug a camera into a computer and plug a VCR into a TV, you can do ATM skimming. That's as simple as it is. You can buy the hardware--all you have to do is plug it in,” said DeFelippi told the US-based news website 13wham.com. Thieves attach skimmers...
Wave Software will hold demonstrations of Trident Pro in booth 1402 along with pre-scheduled meetings in their suite at The London Hotel which is located across the street from the Hilton New York.ORLANDO, FL - Orlando-based Wave Software, a leading provider of early case assessment, legal holds, litigation support and electronic data discovery technology for global corporations,...
The usage of free software plays a major part in the IT strategy of large companies, according to a market expert. "Large organisations are perfectly prepared to use free software where possible, and upgrade to a fully paid-for version of the product where it makes sense for them," said Gary Fry, chief executive at Global Graphics.His views came as new figures have revealed that...
Long before Apple unveiled its iPad tablet device (officially the worst-kept secret in the history of technology), we had been giving serious thought to whether such a device should be called a computer or not. By some standards, the iPad is essentially a keyboardless laptop, but by others, it's more akin to a portable media player, such as theiPod Touch. Late last year, we outlined...
Unlike most of the social networking sites like hi5, Facebook doesn't allow you to check who visited your profile. The no-so- popular Orkut queues-up visitors list according to most recent visit. The major chunk of social bees would oppose such undesired intrusion to flout their privacy. For Facebook as they say "privacy is a core component of the products and features we build...
An embarrassing lose-lose situation could possibly mark the end of Google’s adventure in China, and show that the power of the global Internet companies may have been exaggerated. The prospect that Google Inc.’s business in China might not reach its fifth birthday must be particularly difficult for Eric Schmidt. As Google’s chief executive, he claimed to have 5,000 years of patience...
Imitation Web sites of both Google and YouTube have emerged in China as the country faces off against the real Google over its local operations.YouTubecn.com offers videos from the real YouTube, which is blocked in China. The Google imitation is called Goojje and includes a plea for the U.S.-based Web giant not to leave China, after it threatened this month to do so in a dispute...
Imitation websites emerge in the wake of tensions between Google and ChinaChina, a country famous for its imitation products has done it again. Following the recent threats of Google to pull out of China, two remarkable knock-offs have emerged: Goojje and YouTubecn.Xiao Xuan, one of the founders claims that Goojje has existed prior to the China/Google tensions, and points out...
LAHORE: A strategic partnership agreement was signed between the Punjab government and a computer software company, Microsoft, at the Chief Minister’s Secretariat here on Friday. Under the agreement signed by additional chief secretary Javed Aslam and Microsoft head in Pakistan Kamal Ahmad, the company will extend all-out cooperation for training and development of the local IT...
January 29, 2010

Top Ten Web Hacking Techniques of 2009!1. Creating a rogue CA certificateAlexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger2. HTTP Parameter Pollution (HPP)Luca Carettoni, Stefano diPaola 3. Flickr's API Signature Forgery Vulnerability (MD5 extension attack)Thai Duong and Juliano Rizzo4. Cross-domain search timingChris...
This is absolutely brilliant. You can make your own music using a YouTube video!Hit the play button, wait until the video loads in your browser and then click any of the piano keys inside the YouTube video itself to play some music.It’s a very creative use of annotations feature inside YouTube. Update: You got to click inside the video as shown in the following animation. The...
Though we are headed towards an era of paperless offices where all the information would be in strict digital format, the pace is quite slow. That ink-sucking printer is still an indispensable part of your home office because you are frequently required to print invoices, emails, web pages and other documents on paper.Since ink is still the most expensive component in the print...

As the author of a blog that’s “All About Microsoft,” I watched yesterday’s Apple iPad unveiling with interest — as many Microsoft employees, partners and customers did, given that Apple is Microsoft’s only viable competitor in the PC operating space.Most interesting to me, after all the Twitter and live blogging dust settled, were the various calls for Microsoft’s response. I...
Subscribe to:
Posts (Atom)