Thursday, 1 October 2015

Ebay Loudest Diwali Ever Sale – Buy a 16 GB Sandisk Pendrive for Rs 79 only ( New Users )

Ebay has come up with a Rs 79 pendrive deal two months ago and they are now again back with the same offer. Hurry up and avail it if you missed it the last time. Get your unique coupon by submitting just your mobile number and pincode.





How to get Sandisk 16 GB Pendrive for Rs 79 only ?

1. Visit offer page here
2. Enter your mobile number here.
>> Make sure that your mobile number is not registered with ebay earlier.
3. Now click on “Submit”
4. That’s it !
5. You will receive your coupon code and activation instructions via SMS on 6th October 2015

Terms and Conditions –

  • Offer valid on First Come First Serve Basis only
  • If the user is not a First Time transactor on eBay, then he/she will not be eligible for this product
  • Manufacturer Warranty of 5 years is applicable on this product. Hence it will not be covered under eBay Guarantee.
  • The Coupon Code will be valid for four days [i.e. from 6th October – 10th October 2015] for redemption.  Users can apply this Coupon Code to purchase the product under the Promotion between the above mentioned periods.


Sunday, 30 August 2015

10 Best Websites on Internet

#1 Iconfinder.com

The best place to find icons of all sizes.

#2 Wolframalpha.com

Gets answers directly without searching on Google.

#3 Goo.gl

Shorten long URL and convert URLs into QR codes.

#4 Unfurlr.com

Find the original URL that’s hiding behind a short URL.

#5 Copypastecharacter.com

Copy special characters that aren’t on your keyboard.

#6 Screenr.com

Record movies of your desktop and send them straight to YouTube.

#7 Office.com

Download templates, clipart and images for your Office documents.

#8 Virustotal.com

Online Scan any Suspicious file or email attachment for virus.

#9 Ctrlq.org/screenshots

Capture screens of web pages on mobile and desktops.

#10 Pdfescape.com

Lets you can quickly edit PDFs in the browser itself. viewer.

Friday, 26 June 2015

KNOW PEOPLE BY LOOKING AT THEIR PALMS

When you meet somebody new, it can be fun to “check them out” using different techniques for character analysis. Palm reading is an age-old practice, and it can be a lot of fun as well. Here are some basic palmistry principles that are easy to learn, with a special emphasis on love, relationships, and attachment…
Which hand should you read?
One of the first questions people ask concerning palm reading is: Which hand do you look at? The answer is: Both, and It depends. Students of palmistry distinguish between the active and passive hand. A right-handed person’s active hand will be his or her right hand; and the left hand is considered the passive hand. Similarly, a left-handed person’s active hand is the left hand; and his or her passive hand is the right hand.
Which hand should you read?
Generally, the passive hand is read for inherited characteristics and potential. Look to the active hand for changes to these inherited traits. As a general rule, when the lines and markings on the active and passive hands are quite different, it shows a person who has actively worked toward self-development.
The size of the hand
Remember to consider the size of the hand relative to the size of the body. Generally, a large hand suggests a person who spends more time thinking than acting. A person with a relatively small hand is thought to be more active, spending less time thinking about what to do.


The shape of the hand
There are four general shapes of the hand, and these are related to the four elements – Air, Earth, Fire, and Water.
When considering the length of the palm
When the vertical and horizontal measurements of the palm are approximately equal, it is considered a square palm. A long palm is when its vertical measurement is longer than the horizontal measurement. Fingers are considered long when the length of the middle finger is equal to or greater than three-quarters of the length (height) of the palm. Fingers are considered short when the length of the middle finger is less than three-quarters of the length of the palm.
Air hands and its characteristics:
Air Hands are characterized by a square palm, long fingers, and thin, clear lines. These are the hands of intellectual and sociable people. They are often restless and in need of change and stimulation, mostly of the mental kind. As lovers, these people look for mental rapport above all else.
Earth hands and its characteristics

Earth Hands are characterized by a square palm, short fingers, strong or thick skin, and deep, clear, and straight lines. These are the hands of practical, down-to-earth people with strong vitality. They often have a strong connection to nature and the outdoors. As lovers, they are generally quite dependable and straightforward.

Fire hands and its characteristics

Fire Hands are characterized by long palms, short fingers, plentiful and prominent lines, and firm, warm skin. These are the hands of risk-takers and action-oriented people. As lovers, they are positive and confident, willing to take the lead.

Water hands and its characteristics:
Water Hands are characterized by long palms, long fingers, plenty of fine lines that are not always clear, and soft, damp skin. These hands indicate a creative, emotional person. As lovers, they are sensitive, vulnerable, a little naive, and focused on caring and being cared for.
The thumb

How flexible is the thumb? The flexibility of the thumb is thought to measure how adaptable a person is. The more flexible the thumb, the more easy-going the character is. A lack of flexibility suggests an obstinate person. Does the thumb have a “waist”? If the thumb narrows in the base phalange of the thumb, the person is thought to employ tact and diplomacy in his or her relations with others.
Some consider the relative length of the thumb as an indicator of faithfulness. Longer thumbs are thought to indicate stronger characters who are faithful to others and to themselves.

The lines on the palm
The palm generally consists of the Major Lines, Secondary Lines, and Minor Lines. A palm with numerous fine lines in addition to the Major Lines indicates a rather complex, sensitive personality that is especially vulnerable to outside influences and worries. In general, the fewer the lines, the more straightforward a person is. These people live their lives in a more direct and simple manner. Generally, there are three prominent lines on a palm. These are the Major Lines.


Heart Line

Heart line line indicates the affections, so it is of particular interest to those reading a palm for love indicators. The higher this line is, the more passionate, and oftentimes jealous the person is. A heart line that goes right across the hand suggests a person who is very controlled emotionally. A heart line that curves upward towards the Jupiter finger (the index finger) indicates a warm-hearted, reasonable, and affectionate nature in relationships. Crosses and breaks on the Heart line suggest periods of sadness and sorrow in love.

Head Line
Head line indicates the type of intelligence a person possesses. The space between the beginning of the Head Line and the beginning of the Life Line, if any, indicates the level of cautiousness a person possesses. When these lines are joined at the beginning, the person has a rather cautious, and sometimes fearful, nature. The further apart, the more confident, risk-taking individual.

Life Line
The curved line that generally swoops from near the base of the palm to the point between the thumb and first finger at point C is the Life Line. In terms of relationships, a Life line that is wide, leaving plenty of room for the Mount of Venus, is indicative of a person with an expansive and giving nature in love. The closer the Life line is to the thumb, the less generous a person is with his/her energy and time.

Line of Attachment


An interesting secondary line concerning relationships is called the Line of Attachment. Some call these lines Marriage Lines. These lines appear just above the heart line (in our diagram, just above point A). Light, fine horizontal lines found here are thought to indicate affairs that are not deep commitments. One long, clear line suggests a long-standing and happy marriage or commitment. When there is more than one long, deep line, the lower one is thought to describe the earlier relationship in the person’s life.
The mounts


There are a number of mounts in different positions of the palm, and these are associated with planets. The Mount of Venus is of particular interest to those looking for indicators of love in the palm. This mount is found beside the thumb and within the curved Life Line. Generally, fleshiness here indicates a love of pleasure. A fleshy and firm Mount of Venus indicates a strongly sexual nature, and a flabby mount here shows a low level of sexual vitality.

Prominent horizontal lines on the Mount of Venus are thought to indicate a person with powerful charm over lovers. Plenty of fine lines going in different directions on this mount (often looking like a grid) suggests a person who is quite complex in the area of love. A changeable, worrisome character may frustrate lovers.
In general, lots of fine lines here indicate a person who is easily influenced by outside forces. This person may be easy to dupe by partners. A triangle on this mount is thought to indicate a person who may have extramarital affairs, and a crescent shape (moon) here suggests one who has powerful seductive powers.

Saturday, 30 May 2015

Amazing Programming Tools For Kids

Top Ten Amazing Programming Tools For Kids 

        The world is changing and it's changing faster, towards a better future. If programming is taught from an initial age, then the young generation may even surpass older generations.Technology is getting developed and getting involved with education, even in kids' education. Kids' programming skills need further encouragement and here we've listed top ten tools to teach programming to kids, which are not necessarily to be taught through school curriculum but at home too.
1. Alice:

This is a tool to create animations, which are quite entertaining. It teaches 3D programming to kids in an interactive mode. It also offers hands-on tutorial for creating animated films and video games too.

2. Crunchzilla Code Monster:

It's designed for kids and has 59 lessons. The speech bubble allows moving from one lesson to the next and the lessons are quite easy as well as interactive. The tutorial introduces variables and parameters in JavaScript coding and it also explains errors. Kids may love the JavaScript tools and the simple graphics. It allows kids play with coding in colourful ways.

3. Scratch:

Scratch is a tool which is developed by MIT Media Lab and it's a visual programming language, meant for 6+ kids. It was released in 2007 and since then more than 800,000 users have joined the tutorial which is related to games and animations. Projects are also shared from this website and projects are uploaded to the site under the license of Creative Commons attribute. It's free and it can be accessed on all major platforms including Mac, Windows and Linux.

5. Etoys:

This tool is aimed at parents to teach programming to kids. They can make graphics, write own stories, develop simple games and so on. It's also free of charge which also gives access to music, animated objects, graphics and sound effects.

6. Logo:

Logo is actually one of the oldest programming languages used for education purposes. Created in 1967, this language is used for educational use and basics of computer science. It implemented Turtle Graphics and it has several resources like Turtle Logo and FMS Logo. Kids enjoy the moving turtle and also the location commands to draw shapes and lines.

7. Hackety Hack:

This is an application which is open source and it teaches programming basics in Ruby language. It's an interactive tutorial which runs on Windows, Mac and Linux operating systems. It also teaches the basics of Ruby syntax and it gives students a solid foundation in Ruby language.

8. Hopscotch:

Hopscotch teaches programming to children in the simplest possible way. It can be downloaded for free on iPad and kids are taught to develop and create animations, games and stories in an interactive manner through drag-and-drop methods. This tool makes programming fun and enjoyable.

9. Waterbear:

It's a very recent development and inspired by Scratch. It also has drag-and-drop objects and it runs on JavaScript. The program allows children provide the logic via parameters and this learning environment is offered on browsers and now through any download. Waterbear is in its initial stage though, which has to undergo several developments.

10. Kodable:

This app is free and iPad users can use it to teach programming to kids, aged 5 and above. The interface is quite a child-friendly one and it's very simple to understand. Programming becomes fun with this tools too which can be enjoyed by all – from 2nd standard children to 12th graders.

Saturday, 21 March 2015

An attempt to answer the frequent question "What happens when you type google.com into your browser

What happens when...

This blogpost is an attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?"
Except instead of the usual story, we're going to try to answer this question in as much detail as possible.

The "enter" key bottoms out

        To pick a zero point, let's choose the enter key on the keyboard hitting the bottom of its range. At this point, an electrical circuit specific to the enter key is closed (either directly or capacitively). This allows a small amount of current to flow into the logic circuitry of the keyboard, which scans the state of each key switch, debounces the electrical noise of the rapid intermittent closure of the switch, and converts it to a keycode integer, in this case 13. The keyboard controller then encodes the keycode for transport to the computer. This is now almost universally over a Universal Serial Bus (USB) or Bluetooth connection, but historically has been over PS/2 or ADB connections.
         In the case of the the USB example: the USB circuitry of the keyboard is powered by the 5V supply provided over pin 1 from the computer's USB host controller. 17.78 mA of this current is returned on either the D+ or D- pin (the middle 2) of the keyboard's USB connector. Which pin carries the current is rapidly toggled between the two creating a high speed bitstream (the rate depending on USB 1, 2, or 3) serially encoding the digital value of the enter key. This serial signal is then decoded at the computer's host USB controller, and interpreted by the computer's Human Interface Device (HID) universal keyboard device driver. The value of the key is then passed into the operating system's hardware abstraction layer.

Interrupt fires...

The keyboard sends signals on its interrupt request line (IRQ), which is mapped to an interrupt vector (integer) by the interrupt controller. The CPU uses the Interrupt Descriptor Table (IDT) to map the interrupt vectors to functions (interrupt handlers) which are supplied by the kernel. When an interrupt arrvies, the CPU indexes the IDT with the interrupt vector and runs the appropriate handler. Thus, the kernel is entered.

(On Windows) A WM_KEYDOWN message is sent to the app

         The HID transport passes the key down event to the KBDHID.sys driver which converts the HID usage into a scancode. In this case the scan code is VK_RETURN (0x0D). The KBDHID.sys driver interfaces with the KBDCLASS.sys (keyboard class driver). This driver is responsible for handling all keyboard and keypad input in a secure manner. It then calls into Win32K.sys (after potentially passing the message through an 3rd party keyboard filters that are installed). This all happens in kernel mode.
     Win32K.sys figures out what window is the active window through the GetForegroundWindow() API. This API provides the window handle of the browser's address box. The main Windows "message pump" then calls SendMessage(hwnd, WM_KEYDOWN, VK_RETURN, lParam). lParam is a bitmask that indicates further information about the keypress: repeat count (0 in this case), the actual scan code (can be OEM dependent, but generally wouldn't be for VK_RETURN), whether extended keys (e.g. alt, shift, ctrl) were also pressed (they weren't), and some other state.
          The Windows SendMessage API is a relatively straightforward function that simply calls the main message processing function (called a WindowProc) assigned to the window handle (hWnd).
The window (hWnd) that is active is actually an edit control and the WindowProc in this case has a message handler for WM_KEYDOWN messages. This code looks within the 3rd parameter that was passed to SendMessage (wParam) and, because it is VK_RETURN knows the user has hit the ENTER key.

Is it a URL or a search term?

Parse URL...

Check HSTS list...

Convert non-ASCII Unicode characters in hostname

  • The browser checks the hostname for characters that are not in a-z, A-Z, 0-9, -, or ..
  • Since the hostname is google.com there won't be any, but if there were the browser would apply Punycode encoding to the hostname portion of the URL.

DNS lookup...

  • Browser checks if the domain is in its cache.
  • If not found, calls gethostbyname library function (varies by OS) to do the lookup.
  • If gethostbyname does not have it cached then a request is made to the known DNS server that was given to the network stack. This is typically the local router or the ISP's caching DNS server.
  • The local DNS server (or local gateway's) MAC address is looked up in the ARP cache. If the MAC address is missing, an ARP request packet is sent.
  • Port 53 is opened to send a UDP request to DNS server (if the response size is too large, TCP will be used instead).
  • If the local/ISP DNS server does not have it, then a recursive search is requested and that flows up the list of DNS servers until the SOA is reached, and if found an answer is returned.

Opening of a socket

1.Once the browser receives the IP address of the destination server it takes that and the given port number from the URL (the http protocol defaults to port 80, and https to port 443) and makes a call to the system library function named socket and requests a TCP socket stream - AF_INET and SOCK_STREAM.
2.This request is passed to the Transport Layer where the extra love that TCP/IP requires for ensuring packet delivery and ordering is added and then a IP packet is fashioned.
3.The IP packet is then handed off to the physical network layer which inspects the target IP address, looks up the subnet in it's route tables and wrapped in an ethernet frame with the proper gateway address as the recipient.
4.This address lookup and wrapping of datagrams continues until one of two things happen, the time-to-live value for a datagram reaches zero at which point the packet is dropped or it reaches the destination.
5.This send and receive happens multiple times following the TCP connection flow:
  • Client chooses an initial sequence number (ISN) and sends the packet to the server with the SYN bit set to indicate it is setting the ISN
  • Server receives SYN and if it's in an agreeable mood:
    • Server chooses its own initial sequence number
    • Server sets SYN to indicate it is choosing its ISN
    • Server copies the (client ISN +1) to its ACK field and adds the ACK flag to indicate it is acknowledging receipt of the first packet
  • Client acknowledges the connection by sending a packet:
    • Increases its own sequence number
    • Increases the receiver acknowledgement number
    • Sets ACK field
  • Data is transferred as follows:
    • As one side sends N data bytes, it increases its SEQ by that number
    • When the other side acknowledges receipt of that packet (or a string of packets), it sends an ACK packet with the ACK value equal to the last received sequence from the other
  • To close the connection:
    • The closer sends a FIN packet
    • The other sides ACKs the FIN packet and sends its own FIN
    • The closer acknowledges the other side's FIN with an ACK

UDP packets

TLS handshake...

TCP packets

HTTP protocol...

HTML parsing...

  • Fetch contents of requested document from network layer in 8kb chunks
  • Parse HTML document
  • Convert elements to DOM nodes in the content tree
  • Fetch/prefetch external resources linked to the page (CSS, Images, JavaScript files, etc.)
  • Execute synchronous JavaScript code

CSS interpretation...

  • Parse CSS files and

Friday, 6 February 2015

What u can do wid linux....not much..think again

   They say Canonical founder Mark Shuttleworth is aiming for world domination. Well, can you blame him...?All of  this recent years have been a hurricane for Linux and open source. Riding on the back of the Android Wave, Linus Torvald's kernel is going to systems many would never have even imagined. That said, let's look at some of the many things people say you can do with Linux. Try your hand at them too if you can.

  1. Inventory your collection in a database. Linux comes packed with many different types of database tools. For example: You could run a database server with MySQL then use Calligra to connect to it and get a visual overview of your databases.
  2. Fully customize your desktop. I know this seems like a lame thing to throw in the middle of a list of cool things to do, but we all love making Linux our own and Linux offers more options for desktop customization than most OS's. You can even change your window manager.
  3. Learn to program in python, C, C++, Assembler, Scratch, or another language with the wealth of compilers, debuggers and visual editors in Linux.
  4. Test hardware with software like memtest86 or one of the hundreds of tools in the Phoronix Test Suite.
  5. Face off against your friends in a friendly 3D game of Alien Arena.
  6. Host you own cloud server with OwnCloud.
  7. Virtualize other operating systems with virtualization software like Xen, VirtualBox or VMWare.
  8. Go Wardriving for access points: wardriving.com has a lot of links to Linux wireless software.
  9. DJ a party or just remix music you like with Mixxx.
  10. Security and surveillance. You can set up a simple web camera streaming to a website with Camstream or opt for a more professional solution using Zoneminder.
  11. Check out the stars with astronomy and space simulation software (Celestia).
  12. Build a MAME cabinet and run retro games all from one box. One guy's blog about building a mame cabinet.
  13. Hunt hurricanes - older Linux Journal article.
  14. Build a cluster with PelicanHPC - we've actually tried this and it takes less than 20 minutes to set up.
  15. Make movies. Linux has lots of great software that can be used to edit and cut movies including: OpenShot, Kdenlive, LIVES, Toonloop, Avidemux, Kino (old) and Cinelerra.
  16. Write a blog. If movies aren't your thing, but you can write, Linux has lots of software that can connect to blogs (Blogilo), check spelling (spell), or just give you a distraction-free slate (pyroom) to write on.
  17. Edit, organize and publish photographs to social networking sites with software like F-Spot, Shotwell, Fotoxx, Digikam or Rawtherapee.
  18. Create PDFs without expensive software (LibreOffice).
  19. Boot Linux from a Live USB key for troubleshooting or just keeping your surfing secure on a different computer.
  20. Record a podcast with Audacity, and create the music with different midi software (Rosegarden).
  21. Conduct biological sequence analysis. Link to what looks spammish but is actually a large collection of Linux biological sequence analysis software at Bioinformatics.org.
  22. Create 3D models and renderings for your movies or games with Blender.
  23. Build a custom Personal Video Recorder (PVR) with MythTV. Want to never worry about drive space on your PVR? Put a few 4 terabyte drives in a system and run MythTV.
  24. Build a robot using an embedded board and Linux. Linuxpcrobot.
- If you’re a programmer, then Linux has a number of compilers, visual editors and debuggers to offer. These will aid you in your endeavours in programming languages like C++, Scratch, Assembler, Python and others.

Wednesday, 21 January 2015

Microsoft is all set to show off Windows 10 tonight.....

        At an event at its Redmond headquarters, the company will finally unveil the Consumer Preview of Windows 10, the next version of Windows, to the world. To be fair, some of us have already been playing with the Technical Preview, an early, unpolished version of Windows 10 that Microsoft released in September last year. But the Consumer Preview marks a special milestone: for the first time, Microsoft will show off brand new features that it hopes will set right everything that Windows 8 did wrong. Here are some of them listed...

1. Continuum
Sure, Windows 10 runs great on traditional laptops and desktops. But what if you have one of those newer, hybrid devices that combine a tablet with a detachable keyboard? Microsoft's solution to fix this problem was something called 'Continuum,' a feature that dynamically changes the user interface as soon as you snap a keyboard on or off. Check out the video below to get an idea of what it will look like.

2. Cortana
 Microsoft's intellligent voice-controlled assistants on its phones will finally be seen in Windows on your laptop and desktop. Talking to your computer isn't as natural as talking to your phone, so we'll have to wait and see if Cortana in Windows is really useful or just a gimmick. But at any rate, it will give Microsoft a one-up over Apple, which doesn't have Siri integrated into its own OS X operating system yet.



3. Support for more media formats
Are you an audiophile that prefers uncompressed FLAC audio over crummy little MP3 files? A serial downloader that gets their movies in open-source MKV? Windows 10 will support these file formats out of the box. Bye bye VLC.

4. Better XBOX integration
While it's unclear how exactly will Microsoft will bring Windows, the world's dominant desktop operating sytstem, and XBOX, one of the two biggest gaming platforms in the world together, rest assured that this will happen. Last year, CEO Satya Nadella made clear that XBOX was an integral part of Microsoft's Windows 10 strategy. Will we be able to stream XBOX One games right down to your Windows PC as some gamers are claiming? We'll find out tomorrow.


5. Windows Phone

http://www.hindustantimes.com/Images/popup/2015/1/WindowsPhone.jpg
Microsoft's mobile platform is just about hanging in there with a 3 percent market share around the world but the company isn't going to give up just yet. Expect Microsoft to unify the underlying code behind Windows and Windows Phone so make it easy for developers to write apps that will run on both desktop and mobile devices seamlessly.
 
 

Saturday, 17 January 2015

Most Useful Ubuntu Utilities

8 Most Useful Ubuntu Utilities To Make Your Experience Better

          If you are a beginner in Ubuntu or an expert, it doesn’t matter, what we want is just to enrich your Ubuntu experience by every possible means. Ubuntu has much more to offer than initially it seems. You can refine the look of your Unity desktop, tweak the desktop to perform system maintenance and whatever else you wish to do. There are a huge array of utilities which can customise Ubuntu in a way that it meets all your needs. Here are eight best utilities or apps to make your Ubuntu experience much and much better.

1. Unity Tweak Tool:
       Unity Tweak Tool is the best example of customisation options on Ubuntu as it offers a set of system tweaks for both Ubuntu and Unity desktop. It’s packed with full of switches and control and you can configure Unity as however you wish. You can change the GTK theme and icon set without much hassle, adjust launcher size, add or remove workspaces and more. Unity Tweak Tool is available for free at the Software Center.

2. Disk Utility:
       This is an awesome utility application which allows easy management of any disk drive in the computer. Users can format, partition and erase hard drives easily and also clone, copy and backup from one disk to another one. It’s very helpful for a Ubuntu novice who is not very aware of the formatting and partition requirements in the operating system.

3. Proprietary Drivers:
       You must install proprietary drivers which allow hardware to function in a better way than open source drivers, which come with Ubuntu. It depends on your system’s hardware, if the drivers can be installed or not. The most common types of hardware which have these drivers available are AMD and NVIDIA graphics cards and Broadcom wireless chipsets. The drivers can be found at Software & Updates utility.

4. Graphical Firewall Config Utility:
          Install graphical firewall configuration utility to enable and configure a firewall for your Ubuntu system. Linux is usually immune to viruses but hackers can gain remote access to the systems if there is no firewall which protects network ports. Run the command: sudo apt-get install gufw and configure firewall.

5. WinFF: GUI for FFMPEG:
      It provides graphical user interface or GUI for FFmpeg. It also helps convert a video file to any format and WinFF can convert multiple files in multiple formats at one time. There are also a variety of preset conversion settings for common formats and devices in this package.

6. Unity Privacy Indicator:
           Privacy is a big issue and Privacy Indicator is a useful tool to help you stay informed about which files, folders and services are getting accessed and logged in your Ubuntu desktop. If you click on the ‘eye’ icon, you can enable the privacy settings on your system.

7. System Load Indicator:
       If you want to keep a tab on apps and your hardware status, then it’s an easy job on Linux. There is  no dearth of mediums through which you can monitor CPU usage, network traffic or GPU temperature. System Load Indicator is available from the Ubuntu Software Center which has a host of configuration options.

8. Disk Space Visualiser:
         In this era of hard drives which have huge storage options, we don’t worry much about disk space and all. But if there is smaller SSD and multiple partitions are run and a virtual machine is worked upon with a fixed size virtual disk, then freeing up disk space might become a huge requirement. GNOME Disk Space Visualiser, which comes as default in Ubuntu, is very useful for locating hidden logs, cache files and media files.

Saturday, 10 January 2015

Top 10 Things To Do After Installing Fedora 21

     Several advance changes have been made to the latest version of Fedora.Following steps will help you in configuring a basic working system based on Fedora 21. This OS supports lots of applications and users can also start working as soon as Fedora is booted. 




Here are ten things which you need to do after installing Fedora 21:

1. Run command and configure GNOME Shell interface:
First make sure that you are using the latest updates from Fedora 21 repositories through this command:

$ sudo yum update.

Then configure default GNOME Shell. Use the Gnome Tweak Tool and to install run this command: 

$ sudo yum install gnome-tweak-tool. 

Open “Gnome Tweak Tool” from the applications menu, and configure the GUI options easily. You can also browse available tabs to see the available options.

2. Configure keyboard shortcuts:
There are several pre-configured shortcuts which are available with GNOME 3.14. There are some additional shortcuts too which might prove helpful for you. Search ‘keyboard’ in overview, open keyboard app and click on shortcuts tab. You can configure the existing shortcuts and you can also make additional shortcuts too by selecting custom shortcut from the bottom of the list.
 Click on + button and add the shortcut name as well as the command.

3. Install extra repositories:
The official repository of Fedora has not much software as there are patent and licensing issues. That’s why third party repositories are used just like other Linux based operating systems. Add RPMFusion repository to install applications and there are two repositories within RPMFusion. Enable the free repository and then that one which is not free. Install both the repositories.

4. Install Gnome Shell extensions:
After setting up Fedora 21 you have to include extensions. They are useful for users as these extensions will modify the GNOME Shell interface as per user requirements. Install the extensions via ‘Gnome Shell Extensions’ website. This is an official website of the Gnome project. Enter the website and choose the extensions you want. Install them with a single click only.

5. Install multimedia codecs:
Fedora doesn’t offer proprietary multimedia codecs which are important for playing media files. RPMFusion repositories have these codecs. After installing these repositories, you can install the necessary multimedia codecs through this command: 

$ sudo yum -y install gstreamer1-libav gstreamer1-plugins-bad-free-extras gstreamer1-plugins-bad-freeworld gstreamer1-plugsins-base-tools gstreamer1-plugins-good-extras gstreamer1-plugins-ugly gstreamer1-plugins-bad-free gstreamer1-plugins-good gstreamer1-plugins-base
6. Install VLC:
VLC is popular as it can play any video format. It also converts media formats and you can also extract audio from video files. It can also play online videos from YouTube. Install VLC by this command: 

$ sudo yum install vlc

 It can also be found in the RPMFusion repositories.

7. Install Yum fastest mirror plugin:
If you have a slow Internet connection then this plug-in can be really helpful. It automatically selects nearest mirror server available and it speeds up downloading packages process. Run this command to install it:

 $ sudo yum install yum-plugin-fastestmirror.

8. Install Flash Player:
Adobe flash player is the most popular one to view flash content. It’s a closed-source content and that’s why it’s not packed by Fedora officially. You can use the following command to add Adobe Flash Player repository to Fedora.

## Adobe Repository 32-bit x86 ##
 
$ sudo rpm -ivh http://linuxdownload.adobe.com/adobe-release/adobe-release-i386-1.0-1.noarch.rpm
 
$ sudo rpm –import /etc/pki/rpm-gpg/RPM-GPG-KEY-adobe-linux

## Adobe Repository 64-bit x86_64 ## 
$ sudo rpm -ivh http://linuxdownload.adobe.com/adobe-release/
adobe-release-x86_64-1.0-1.noarch.rpm  

$ sudo rpm –import /etc/pki/rpm-gpg/RPM-GPG-KEY-adobe-linux

Then install the flash player by running: 

$ sudo yum install flash-plugin nspluginwrapper alsa-plugins-pulseaudio libcurl

9. Install Chrome browser:
Gnome’s Epiphany has been replaced by Firefox in Fedora 21. If you want Google Chrome you can install it by downloading the binaries from the respective websites. From the Chrome download page, get the .rpm binaries as per your system’s requirement. Double click on the binaries or right click and choose ‘Open with Software Install”. Follow the given instructions there.

10. Install other desktop environments:
Some famous desktop environments such as Mate, KDE, XFCE, LXDE, etc.. are available for download from the official repositories for Fedora 21. To install Mate desktop run: $ sudo yum install @mate-desktop. To install KDE desktop run: 

$ sudo yum install @kde-desktop. 

To install XFCE desktop: 
$ sudo yum install @xfce-desktop. 

To install LXDE desktop run: 
$ sudo yum install @lxde-desktop. 

To install Cinnamon desktop run: 
$ sudo yum install @cinnamon-desktop.

Thursday, 8 January 2015

The entire Internet may crash on June 30.......

 Internet may crash on June 30.......

         So here’s something interesting, 2015 is going to be a little longer than other years, quite literally, and we do mean little. In order to account for the slowing down of the Earth’s rotation, scientists have added one measly second to the calendar. Doesn’t make a difference right? Google thinks it does. Apparently, the addition of a second can break the Internet. So, Google is reportedly taking preemptive action for the same.

          

 The extra second will be added to the calendar on June 30, precisely at 11.59.60. How ? Well, clocks will stand still for an entire second in order to add the time. Even though hardly anyone will realise it, the day will have 86,401 seconds instead of 86,400 seconds. This will have consequences for the Internet and computers at large. This had happened back in 2012, when websites like LinkedIn, Reddit and Yelp had gone down. The reason for the same is that the extra second cause computers to malfunction as more and more computers sync with atomic clocks today, because of which, even the difference of one second could cause them to malfunction.
       Further, Google has reportedly figured out how to prevent websites from crashing during this time. The search giant will be adding a millisecond to its system clocks gradually, instead of pausing for a second on the day. As a result, the computers will be corrected over time and won’t have to count the same second twice. Let's hope it works
So here’s something interesting, 2015 is going to be a little longer than other years, quite literally, and we do mean little. In order to account for the slowing down of the Earth’s rotation, scientists have added one measly second to the calendar. Doesn’t make a difference right? Google thinks it does. Apparently, the addition of a second can break the Internet. So, Google is reportedly taking preemptive action for the same. - See more at: http://www.digit.in/internet/google-wants-to-stop-the-internet-from-crashing-on-june-30-24939.html#sthash.EC2y5Ccd.dpuf
So here’s something interesting, 2015 is going to be a little longer than other years, quite literally, and we do mean little. In order to account for the slowing down of the Earth’s rotation, scientists have added one measly second to the calendar. Doesn’t make a difference right? Google thinks it does. Apparently, the addition of a second can break the Internet. So, Google is reportedly taking preemptive action for the same. - See more at: http://www.digit.in/internet/google-wants-to-stop-the-internet-from-crashing-on-june-30-24939.html#sthash.EC2y5Ccd.dpuf




The entire Internet may crash on June 30 & Google wants to stop it

- See more at: http://www.digit.in/internet/google-wants-to-stop-the-internet-from-crashing-on-june-30-24939.html#sthash.EC2y5Ccd.dpuf




The entire Internet may crash on June 30 & Google wants to stop it

- See more at: http://www.digit.in/internet/google-wants-to-stop-the-internet-from-crashing-on-june-30-24939.html#sthash.EC2y5Ccd.dpuf

Monday, 5 January 2015

Big Tech Stories of 2015

        2015 will be an amazing year, and the amount of turmoil we will see likely will make 2014 look tame by comparison. Scandals, robots, elections, and the emergence of a variety of new technologies should define this space. As crazy as 2015 will be, 2016 is likely to be even crazier.

We'll have robots, self-driving cars, armed autonomous drones, the professional proliferation of head mounted cameras, some scandals, and some interesting political implications.

Wireless Everything:

          In 2015, we will begin to talk about the implementation of a number of technologies we saw previewed in 2014 and that will be introduced at CES next week. One of the biggest is resonance charging, which allows you to put a device in the vicinity of a charger and have it charge wirelessly. This will show up first for cellphones and tablets, and then later for laptops.
Mu-MIMO, which was announced this year, provides networking performance in line with gigabit switches. We'll move to 10 gigabit products in 2015, showcasing how incredibly fast this technology is advancing.
        We'll also move to shared WiFi hotspots more aggressively, so you can automatically connect to a WiFi network in a house or business that is part of the same network you already subscribe to. Oh, and while 4G has been talked up a lot this year, next year we'll start hearing more and more about 5G. Just as 4G made 3G look like crap, 5G will do the same to 4G. 5G is going to make a mess of WiFi and Bluetooth as well, because we are the tech market, and we like to mess with your heads.
Another Nail in Passwords' Coffin
We'll see biometrics move much more broadly. Already in a number of phones (mostly Apple), it will move aggressively into tablets and PCs. We should see a shift from fingerprint scanners to facial recognition as the way to get into our accounts.
We'll likely still need at least one more element -- a cellphone, tablet or PC -- to make sure we are who we say we are. The Blackberry solution of using the cellphone as a token also will become more widespread, since it provides an even more secure way to ensure we are who we say we are.
Sony RIP?
      Sony just showcased the extreme and powerful benefits to doing this and now this behavior will likely spread like wildfire. I expect the escalation will result in the release of emails and other internal documents that highlight just how badly some folks in power behave.
I also expect a lot of executives will be virtually unemployable when all the dust settles. There is even a possibility that the damage to the Sony brand will be unrecoverable, because its behavior likely will be showcased as the cause for the resulting mess. This is another reason Sony likely should have separated the content business from the rest of the company some time ago.
Glass vs. Sapphire
       A lot of the coverage of the scandal surrounding the failure of the Apple supplier to create the screens for the iPhone 6 seemed to revolve around implications the company was incompetent. In 2015, we'll likely better understand why sapphire just doesn't work as well as hardened glass.
Phones flex, but crystal doesn't, making it totally unacceptable for phones. However, we will see this battle recur over and over again in the coming year. 

Robots :
       Robots are advancing at an amazing/alarming rate. From robots used to drive cars to robots for manufacturing lines to robots flying armed aircraft, we will see a lot of amazing stories in 2015. Amazon replaced a large number of full time workers with robots in 2014, and it and other firms likely will accelerate this in 2015. I think we'll be surprised at how capable these machines will become and just what jobs are at risk.
On the other hand, we'll likely see far safer workplaces, safer roads, and safer skies as a result of this -- at least initially -- until Skynet goes live and they take over the world.
Head-Mounted Cameras and Displays
While Google has effectively killed Google Glass, due to really bad husbanding, it did effectively launch this class of hardware. There is now a massive amount of pressure to put cameras on police officers, and because head-mounted devices see what the officer sees, they likely will emerge as far better for both the officer and the citizen than those mounted on a shirt or car.
There have been huge successes in trials for doctors, technicians, assembly workers, and other professions in which it's beneficial to share what is being done with remote folks who can help, as well as see manuals while keeping hands free. 

Bad Analytics Stories:
         We've been rolling analytics platforms into the market and into companies and government agencies aggressively in 2014. Most of this stuff hasn't properly vetted the data going in. Nor have the efforts ensured that the executives who need the answers know how to use these systems.
I think that is going to result in stories about the massive amount of waste and bad decisions that resulted from these systems being implemented improperly and incompletely.
Windows 10
        This product has been far better than anything I've seen from Microsoft in years in terms of addressing the problems that kept people from buying or appreciating Windows 8. It works far more like Windows 7 and Windows XP did, but better. Though it still works better than those products did with touch, it doesn't require it.
        I think we'll be surprised how popular this platform will be, especially in business, which seems to have a love affair with it. This could be the closest thing Microsoft has to a Windows 95 moment since, well, Windows 95.

Google in the Headlines:
         Google, for good or bad, increasingly will be a news magnet. It is the company most of us are afraid of when it comes to someone developing a hostile AI. It is being forced out of some European countries, and the EU is talking about breaking it up.
This year, it brought out products (Google Glass) that got users beat up, and it doesn't seem to be learning from any of this. So I expect Google will be in the news a lot in 2015. 

Applied Social Media:
         I think we'll see a lot more focus on applied social media.
From consumer services like Nextdoor (which currently is doing a good job of protecting people from package theft) to business services like Ombud (which connects purchasing agents to make sure vendors aren't taking advantage of them), this idea of creating a specific social network designed to focus on a clearly defined need is proving to be very valuable.

Ashton Kutcher as Lenovo's Steve Jobs:
          I've been suggesting that the magic Steve Jobs created at Apple could be recreated with a charismatic executive who has a love for products. Lenovo is the only company giving this theory a shot, and the only firm that has been able to get the idea of a celebrity executive partnership to work.
Kutcher is personally husbanding Lenovo's next generation of tablets to market, and they are stunning. Lenovo's Yoga offerings already represent some of the best in their product class -- but to break out, you need magic and Kutcher apparently plans to bring it.
This should all come together next week, and we'll then know whether you really can recreate some of the old Steve Jobs Apple magic at another company.
I should point out that the only reason this seems to be working is that Kutcher studied to be an engineer (so he talks the language), does have a passion for hardware (isn't just a paid shill), and has a chip on his shoulder because he was criticized for playing Steve Jobs in the movie so he has something to prove.
All of this will work into the stories of 2015. By the way, this is the Yoga version he had the biggest impact on.   

Apple Watch:
       Speaking of Apple, the wearable space still doesn't have a defined reason for being, and products are all over the map. The only vendor that has demonstrated it can pull the market together on an idea in recent years is Apple, and the Apple Watch should at least drive some focus into the market.
In addition, this will be the true test of Tim Cook, because this will be the first high-profile new segment product that will be launched under his leadership. Regardless, it undoubtedly will pull a lot of interest.
Nextbook Windows 2-in-1 Tablet
Nextbook Windows 2-in-1 Tablet
        Typically, products in this class that run full Windows 8, not Windows RT, hit price points above $750 -- and often are nearly twice that. This is at a price point below where netbooks played and Chromebooks play, and both of those products are crippled -- at least when compared to a fully featured product. The Nextbook even has an impressive seven hours of battery life and four processor cores.
I think this is going to break open products in this price range and both fuel a stronger response by Microsoft against the Google Chromebook and put a massive amount of pressure on the PC segment to reduce prices to never-seen-before lows.