Thursday, December 22, 2011

Good Way To Create An Intranet

http://www.tech.blorge.com/Structure:%20/2008/09/09/how-to-setup-an-intranet-with-free-open-source-software/


Great way to create an Intranet!


Happy Holidays!

Friday, October 14, 2011

BlackBerry Letter of "Apology" will they go down the drain?

As the iPhone 4S was launched one million units were sold. This was time for BlackBerry to stand strong as the chief Apple dreamer had passed on. Who will rule the roost in the next five years? The future that was almost decided is now there to challenge them. Or maybe even Steve left a list of the future technology Apple could use to outsmart BlackBerry. Suddenly fruits are fighting:


To All BlackBerry Customers:
I want to first apologise for the service interruptions and delays many of you have been experiencing this week. I also wanted to connect with you directly, give you an update on the service issues we are trying to solve, and answer some of the questions and concerns you've expressed.

You've depended on us for reliable, real-time communications, and right now we're letting you down. We are taking this very seriously and have people around the world working around the clock to address this situation. We believe we understand why this happened and we are working to restore normal service levels in all markets as quickly as we can.

Here is the current status of service and issues for the various regions that were impacted:
For Europe, Middle East, India and Africa (EMEIA):

- Email systems are operating and we are continuing to clear any back logged messages. Support teams are working to minimise the impact on our customers.
- BBM traffic is online and traffic is passing successfully
- Browsing is temporarily unavailable as the Support teams monitor service stability and continue to assess when this service can be safely brought online
-Support teams have added capacity to help with message delivery between regions and continents

We will provide regular updates on BlackBerry.com,
RIM.com and via our social channels. We are doing everything in our power to restore regular service everywhere and to restore your trust in us.

Yours sincerely,

Robin Bienfait
Chief Information Officer, RIM

--------Original Message--------

Thursday, October 13, 2011

Potential smartphone fraud schemes targeting Android users

A number of schemes designed to defraud users of Google Android smartphones exist, but until attackers find a way to carry them out on a massive scale, the threat of mobile malware and other attack techniques remains low, according to a new report.

The Symantec Corp. report, "Motivations of Recent Android Malware," outlines several ways attackers have made money by targeting users of Android smartphones. Premium rate number billing schemes, spyware and pay-per-click monetization schemes have been carried out against a small subset of users, but until attackers can maximise profits, the potential threat to most users remains low, said Vikram Thakur, Symantec's principle security response manager.

"There's no better motivation than money," Thakur said in an interview with SearchSecurity.com. "The desktop is still far greater an attractive target for these attackers than the mobile space at this point."

The Mountain View, Calif.-based security vendor said an increase in mobile malware is dependent on three factors: an open platform, a ubiquitous platform and attacker motivation. So far, Google Android is gaining traction, surpassing Apple iOS in users, according to market share estimates. Remaining unclear is how Microsoft's late entry into the mobile market takes away from the Android or iPhone user base.  Also standing in the way of cyber criminals is the fragmented mobile phone market. Thousands of mobile network operators and different handset models often result in different versions of the Android operating system on phones.

Smartphone platforms are built differently than desktop operating systems. Sandboxing technology used in Android and iOS helps isolate attacks to specific applications, making it more difficult for attackers to tap into the critical processes needed to gain complete control of the smartphone.

Symantec outlined a premium rate number billing scheme in which an application taps into the smartphones SMS application to send text messages to premium rate numbers. Mobile network operators charge up to $50 per text message. The attacker receives 30-70% of the premium rate charge depending on the carrier, amount charged per message, and number of messages received, Symantec said.

Thakur said its very likely in the next several years that attacks designed for the desktop, from search engine poisoning to rogue antivirus schemes, can be applied to mobile platforms. Most smartphones rely on cloud-based services and the browser to tap into data, increasing the potential for Web-based attacks.

"There is a lot more real estate that the desktop malware authors have at their disposal, so the desktop will remain the most lucrative for years to come," Thakur said. "Even though we've seen a surge in the number of financial transactions being performed on the phone, mobile users are still falling way short of similar transactions performed on the desktop."

However, mobile platforms are rapidly becoming more attractive targets. Attackers are also busy designing malicious applications that can track and monitor all communications sent and received by a victim's smartphone. Current spyware applications typically require physical access to the phone. Several malicious applications can be purchased on the black market for as much as $400. The threat potential exists for more sophisticated malware that can be installed remotely and is designed to steal sensitive data, Thakur said.

The mobile technology landscape is rapidly evolving. Near-field communication (NFC), a communications protocol that would enable a person to use the smartphone to pay for goods and services, could increase the threat potential, according to Symantec.  While adoption of the technology could be up to two years away, once highly sensitive data, such as credit card data, is stored on the device, attackers could pounce, Thakur said.

"Consumers might be quick to adapt to new features on their phone, but vendors need to adapt to technology as well, and that's going to take a long time," Thakur said. "A smartphone may soon have the ability to make a payment at a gas station, but the gas station must support the technology; it takes far longer to achieve that on a large scale."

--------Original Message--------

Thursday, September 29, 2011

33 Quotes to fuel the Entreprenuar

"If you don't design your own life plan, chances are you'll fall into someone else's plan. And guess what they have planned for you? Not much."Jim Rohn, Entrepreneur, Author, Motivational Speaker

"In life and business, there are two cardinal sins: The first is to act without thought, and the second is to not act at all." –Carl Icahn, Investor and Entrepreneur

"Do not go where the path may lead, go instead where there is no path and leave a trail."Ralph Waldo Emerson, Poet

"A business has to be involving, it has to be fun, and it has to exercise your creative instincts." –Richard Branson, Entrepreneur

"Can anything be sadder than work left unfinished? Yes; work never begun." –Christina Rossetti, Author

"Destiny is not a matter of chance, it is a matter of choice; it is not a thing to be waited for, it is a thing to be achieved."Williams Jenning Bryan, Politician and three-time Presidential candidate

"Watch, listen, and learn. You can't know it all yourself. Anyone who thinks they do is destined for mediocrity." –Donald Trump, Business Mogul

"High expectations are the key to everything." – Sam Walton, Entrepreneur

"The only place where success comes before work is in the dictionary." –Vidal Sassoon, Entrepreneur

"Do not wait to strike till the iron is hot; but make it hot by striking."William Butler Yeats, Poet

"I know the price of success: dedication, hard work, and an unremitting devotion to the things you want to see happen."- Frank Lloyd Wright, Architect and Entrepreneur

"Opportunity is missed by most because it is dressed in overalls and looks like work." –Thomas Alva Edison, Inventor and Entrepreneur

"If you work just for money, you'll never make it, but if you love what you're doing and you always put the customer first, success will be yours." –Ray Kroc, Entrepreneur

"The secret of success is constancy to purpose." – Benjamin Disraeli, Author, Politician and Scholar

"How many cares one loses when one decides not to be something but to be someone." –Coco Chanel, Entrepreneur

"A successful person is one who can lay a firm foundation with the bricks that others throw at him." - David Brinkley, Newscaster

"I owe my success to having listened respectfully to the very best advice, and then going away and doing the exact opposite." –G. K. Chesterton, Author

"Those who try to do something and fail are infinitely better than those who try nothing and succeed." Lloyd Jones

"I've missed more than 9,000 shots in my career. I've lost almost 300 games. 26 times I've been trusted to take the game winning shot and missed. I've failed over and over and over again in my life and that is why I succeed." –Michael Jordan, Basketball Legend and Entrepreneur

"Many of life's failures are people who did not realize how close they were to success when they gave up." - Thomas Alva Edison, Inventor and Entrepreneur

"Not doing more than the average is what keeps the average down."- William M. Winans, Clergyman

"Six essential qualities that are the key to success: Sincerity, personal integrity, humility, courtesy, wisdom, charity." William Menninger, Entrepreneur

"My will shall shape the future. Whether I fail or succeed shall be no one's doing but my own. I am the force. I can clear any obstacle before me or I can be lost in the maze. My choice. My responsibility. Win or lose; only I hold the key to my destiny."- Elaine Maxwell, Author

"It is common sense to take a method and try it. If it fails, admit it frankly and try another. But above all, try something." –Franklin D. Roosevelt, 32nd American President

"You can't build a reputation on what you're going to do."- Henry Ford, Entrepreneur

"The young do not know enough to be prudent, and therefore they attempt the impossible—and achieve it, generation after generation."- Pearl S. Buck,
Author

"It is on our failures that we base a new and different and better success." –Havelock Ellis, Physician and Author

"Whatever you can do or dream you can, begin it. Boldness has genius, power, and magic in it. Begin it
now."- Goethe

"With courage you will dare to take risks, have the strength to be compassionate, and the wisdom to be humble. Courage is the foundation of integrity."- Keshavan Nair, Author–Gandhi Biographer

"To accomplish great things, we must not only act, but also dream; not only plan, but also believe."- Anatole France, Poet

"Only those who will risk going too far can possibly find out how far one can go."- T. S. Eliot, Author

"Some people have thousands of reasons why they cannot do what they want to, when all they need is one reason why they can."Willis R. Whitney,
American Chemist

"For every failure, there's an alternative course of action. You just have to find it. When you come to a roadblock, take a detour."- Mary Kay Ash, Entrepreneur


Sent from my BlackBerry®

--------Original Message--------

Friday, August 12, 2011

I'm Internet

I'm Internet


150 years of MIT

Posted: 14 May 2011 02:05 PM PDT

Posted at Official Google Blog
5/13/2011 03:26:00 PM
2011 marks the 150th anniversary of the Massachusetts Institute of Technology, founded to speed along America's industrial progress through scientific innovation. MIT has been at the forefront of computer science with key advancements in the field, like the invention of core memory, the first file sharing system and RSA, the algorithm for public key encryption. MIT and Google share many of the same goals and philosophies, and as part of MIT's 150th anniversary celebration, we wanted to take stock of the many ways we've been working together.

More than 500 MIT graduates work at Google, in Boston and beyond—on Android, Chrome, crisis relief efforts and more. At our Cambridge, Mass., office—just down the road from MIT's campus—and at the newly acquired ITA office, you can spot many MIT alumni Googlers proudly sporting red and gray in celebration of the milestone anniversary.

We love our Googler MIT grads, but our partnership with the university goes beyond an alumni relationship: we also support the university's mission of discovery and innovation in the sciences. Recently, we gave a focused research award to CSAIL to further research in computer science and artificial intelligence. We also partnered with researchers at the MIT Media Lab on Konbit, a service that helps communities rebuild themselves after a crisis. In the same lines, we're sponsoring MIT Next Lab, a group that researches and develops ways in which people can use mobile platforms to solve global and economic issues. And finally, as part of their 150th anniversary celebration, MIT announced a major Intelligence Initiative (I²) that we're helping to support. Beyond the pure scientific goals, it's hoped that this research will lead to practical applications in the form of more intelligent systems and software that will benefit society broadly

In addition, we have close relationships with some of MIT's faculty, like Hal Abelson, Professor of Computer Science and a member of Google's Visiting Faculty program, who has used our technology to conduct education outreach. He started the Young Android Project in 2007 and helped design App Inventor, which launched in 2010. Hal also teaches classes to non-engineers about building Android apps.

This summer we're looking forward to welcoming high school students into our Boston office through the MIT MITES program to introduce a whole new crop of future scientists to the joys of science and engineering. Plus, 50 MIT students will join Google as interns this summer alone.

Although MIT was established more than 100 years before the Internet was invented, the institution has continued to remain a world leader in technological research, development and advancement. We're excited to celebrate the university on its anniversary, and look forward to a continued and strong relationship for the next century to come.




Original Post

When patents attack Android

Official Google Blog: When patents attack Android: "I have worked in the tech sector for over two decades. Microsoft and Apple have always been at each other’s throats, so when they get into ..."

Official Google Blog: Games in Google+: fun that fits your schedule

Official Google Blog: Games in Google+: fun that fits your schedule: "My family has a games closet. Inside you’ll find a few decks of cards, two decades’ worth of board games and a Twister mat for those times w..."

Wednesday, July 13, 2011

Facebook announces "Facebook for EveryPhone" a low-cost app for feature phones

With all the fuss over Androids and iPhones, it’s easy to forget that there are lots of people out there who are using comparably unsophisticated phones.

Facebook, however, is taking notice with its latest app. Via Facebook for Every Phone, owners of over 2,500 different feature phones (or “dumbphones” as they are often called) can have access to the whole Facebook platform.

This includes basic functionality like the news feed and photos, as well as access to users’ inbox.
(The app also allows users to upload photos, though its unlikely that those photos are going to be particularly good.) So far Facebook for Every Phone is built to run on only Java phones but Facebook says it aims to support many more devices in the future.

But what about data fees? Facebook has that covered as well. Via deals with phone carriers, Facebook is offering free data access to the app for 90 days. Here’s the list, which is notably devoid of U.S. companies. That should be a pretty good indication of Facebook’s target demographic.

Airtel (India)
Banglalink (Bangladesh)
Beeline (Russia)
Celcom (Malaysia)
Etisalat (Egypt, Nigeria)
Globe (Philippines)
Idea (India)
Indosat (Indonesia)
O2 Telefonica (Germany)
Reliance (India)
Smart (Philippines)
Smartfren (Indonesia)
Telkomsel (Indonesia)
Three (Indonesia, United Kingdom)
TIM (Brazil)
TMN (Portugal)
Ufone (Pakistan)
Vodafone (Turkey)
XL (Indonesia)

Tuesday, June 28, 2011

Dummies Guide: How To Be Safe On The Internet

1. Establish guidelines for Internet use with your parents or another adult. Before you go online, decide how much time is okay for you to spend on the Internet each day and figure out what you can and cannot do. After you get more familiar with the Internet, you and your parents can talk again and change the guidelines. Post them next to the computer for easy reference.

2. Don't share your password with anyone else.

3. Before you share any information. about yourself on the Internet, get your parents' permission.

4. Double-check the URL (the address of the Web site) before hitting the Enter key. Make sure the spelling is right. This will help ensure you go to the site you want, and not some other place.

5. Check with your parents or another adult you trust before going into a chat room. Different chat rooms have different rules and different types of people going to them. You and your parents want to make sure it is an appropriate place for you before you enter.

6. If something you see or read online makes you uncomfortable, leave the site. Tell a parent or a teacher right away.

7. Never send a picture of yourself (or anything else) to someone in e-mail unless your parents say it is okay.

8. If you receive unwanted, offensive, mean, threatening, or harassing e-mail, do not respond to it. Tell your parents or another adult right away.

9. Remember: not everything you read on the Internet is true.

10. Don't give out your age without checking with your parents first.

11. Never give out your full name (first and last). Don't give out your first name without checking with your parents or another adult first.

12. Never give out your home address over the Internet.

13. Ask your parents or an adult before signing up for anything online.

14. Don't give out your credit card number (or anyone else's) without permission from a parent.

15. Remember, when you are online, what you do is up to you. Don't do anything you don't want to do.

16. Don't open files or e-mail from someone you don't know. You don't know what might be inside—the files could contain a computer virus or offensive material.

17. Keep the computer in a common space, like the family room, den, or living room.

18. Never agree to meet someone you met on the Internet in person without your parents' permission. You should never meet someone you met online alone. If you do set up a meeting with an online friend, meet in a public place and go with your parent or guardian.

19. Remember that any information you share about yourself can be seen by anyone who is online.

20. Don't give out your phone number.

21. Talk to your parents (or your teacher or another adult) about the kinds of places you go and things you do and see when you are online.

22. Pick a name—different from your real name—to use online.

23. Before you go into a public area, like a chat room or discussion forum, decide with your parents if it is okay to give out your e-mail address.

24. If someone online asks you too many personal questions, be suspicious. Stop talking with them.

25. Don't give out the name of your school.

26. Always remember that people online may not be who they say they are. It is very easy for people to pretend to be someone they are not.

27. Don't do things online that you wouldn't do in real life.

28. Be careful when someone offers you something for free, like gifts or money. You don't know what their motives are. Decline the offer and tell your parents.

29. Treat other people as you'd like to be treated. Never use bad language or send mean messages online.

30. The "off" button is always there. Use it if you need to. You don't have to stay online if you don't want to.

Sunday, June 26, 2011

Tips On Typing Faster With Your Blackberry

The focus of the BlackBerry platform is communications, and the keyboard on your BlackBerry device serves that purpose well. The keyboard has gotten better and better, too, which makes for faster typing. But unless you're following these quick tips, you're not reaching your typing speed potential.

1. Don't use a period:
One major difference between your BlackBerry keyboard and your desktop keyboard is that you have to shift to hit a period. That can be a pain, since it's the most common punctuation mark. But you don't have to hit Alt+M to get a period. Just hit the space bar twice and your BlackBerry will insert one for you.

2. Skip the shift key:
As on your desktop keyboard, you have to shift on your BlackBerry to get a capital letter. Well, not really. If you just hold down the letter, your BlackBerry will turn it into a capital.


3. Don't type the @ or . in an email address:
When you manually type in an email address, you don't have to hit the shift key to get the @ or the . symbol. Just hit the space-bar. Your BlackBerry will insert the @ symbol after the first space, and a . after each additional space.

Monday, June 13, 2011

schav: REAL "Ugly" Web Sites That Do Just Fine

schav: REAL "Ugly" Web Sites That Do Just Fine: "MySpace's monstrosity of ugliness There was a recent post on the KISSMetrics blog about 4 Ugly Sites That Make Millions .  The post (at l..."

Official Gmail Blog: Introducing Gmail Motion

Official Gmail Blog: Introducing Gmail Motion: "Posted by Paul McDonald, Product Manager In 1874 the QWERTY keyboard was invented. In 1963, the world was introduced to the mouse. Some 50..."

oldSAP: SendMyLocation

oldSAP: SendMyLocation: "Sends SMS at intervals that includes your current GPS coordinate and location name/address/etc Installation: 1. Extract the ZIP file 2. O..."

Publisher Announcements: New Advertisers - June 8

Publisher Announcements: New Advertisers - June 8: "New programs available through Google Affiliate Network Program Highlights: Bounty: $0.75 per action Commission duration: 30 days ..."

Monday, June 6, 2011

Africa Entrepreneur Awards 2011 Launched

The 2011 Africa Awards for Entrepreneurship has
officially opened for entries on May 31st, 2011 and
conclude with an expanded Gala Awards event in
conjunction with a high-profile conference on
entrepreneurship -CONVERGENCE: AFRICA. This
year we have expanded the Africa Awards from
the humble beginnings of five countries
competing in 2007 now to include every country
in Africa.

Your company needs to have been running for at least two years, have plus 10 employees and an income revenue of not more than $15 million. Its a good way of marketing ones company and financing the firm too.

Nominate your company or any other of choice! I wish all companies the best!

Tuesday, May 31, 2011

Smartphone theft, loss outweighs malware risk, McAfee report finds

Smartphone theft or loss is a big security threat for IT professionals who deal with multiple smartphone platforms, ineffective security policies and the overwhelming desire of end users to connect to the company network with one device.

Four in 10 organizations have had mobile devices lost or stolen, and half of those lost or stolen devices contained business-critical data, according to a smartphone security study undertaken by researchers at Carnegie Mellon University. The report, commissioned by McAfee Inc., outlined the results of a survey of 1,500 people from 14 countries, administered by research firm Vanson Bourne.
This is a global survey done; in realising this we will see that this is when we would require offsite data backup and recovery. Here in Zimbabwe we find huge corporates like Econet, Netone, mines like Zimplats, Mbada, Renco, who use the almost up to date technology to run their businesses at this new risk, also with the level of viruses running through the new OS’ company information is at risk of either being lost otherwise used for the wrong reasons by the black hackers.

I would encourage these people to adopt the Juniper software Junos Mobile Security Suite which might help mainly on device encryption, remote backup and disaster recovery. This is very exciting and having the opportunity to test it using the Blackberry; it is worth the amount it calls for as an investment in Smartphone security. In the love and passion for technology, go out and get safe.

Monday, May 30, 2011

Ant Like Anti-Virus under the Miscroscope

There is a new anti-virus currently under test, this application will not be scanning your computer at real-time only but, running all over your network looking for threats. You might notice the common trojan and worm sometimes cannot be traced by our anti-virus (especially the one that replicates folders over the network).

In its launch, I'll definitely share it with you here.

Click title for detailed info

'Dislike' Someone on Facebook and You'll Be Sorry

You may not like someone on Facebook. You may practically despise someone on Facebook. Just don't fall for a new scam that claims to offer you a
chance to vent by giving someone a very public
thumbs-down.

If you see a message offering to enable a “Dislike”
button, beware: security firm Sophos claims the
“fast-spreading scam has caused problems for
social networking users this weekend.”

The message reads:
Facebook now has a dislike button! Click 'Enable
Dislike Button' to turn on the new feature!

According to Sophos, the link supplants Facebook's
“share” button. Clicking it “will not only forward the
fake message about the so-called ‘Fakebook Dislike
button' to all of your online friends by posting it to
your profile, but also run obfuscated Javascript on
your computer.”

“The potential for malice should be obvious,” adds
Sophos.

The potential for annoyance, too. What a mess for
Facebook, or should I say another mess for
Facebook. The site's awash in dubious pseudo-
communiqués. I'm scrubbing link-spam off personal pages daily. It's to the point I'd almost take one of these scammers up if they offered an app to simply blanket "Dislike Facebook."

Thursday, May 26, 2011

Windows 7 Mobile (Mango) Mini Review

I have been reading the unique features of the new Windows Mobile. Having a friend who had to return his phone after a virus attack, I think its ample time I try it then share my personal opinion with you...

Click link to see review

Always Clean History and Cookies on a Public Computer using IE

In recent findings, as by norm, crackers are accessing the IE flow and collecting user Facebook information. We all know Facebook is the popular zone being attack as most of the users barely know any cyber security.

It brings up the point, never put personal credit card on your Facebook, unless it is on "https" and you see a locked lock sign on the right of your browser. It social business for these ruthless internet Jack Sparrows.

Click title for full IE cookie story

Wednesday, May 25, 2011

Some Of The Things One Should Never post on Facebook

Follow the link and learn what to and what not to on this social network. Besides having your boss as a friend, why not create a LinkedIn account which has professionalism in thought?

http://linkedin.com

Monday, May 23, 2011

I thought Technology was that easy

In my current findings, researsh was done on that a person can develop expertise of a specific field in ten years. You can't be a good runner in five years, you can't be good in writing in a year. One needs to develop a skill and embrace that, judging from me, I'm left with about eight years which is not so much time.

Mark Zuckerberg the Facebook inventer started hacking at a tender age a few years gave birth to Facebook, ten years down the line became the youngest billionaire.

It gives a point, a successful entrepreneur, needs ten years to develop a good idea into something almost perfect. Why not start at a young age and develop the skill... It will be a good empire. William Gates, the Google group, Steve Jobs, yes made money earlier but maturity in the business was marked at ten years.

To the point you're like me, you want to do technology, you want an empire, those are already twenty years. Life expectancy in Zimbabwe now is 39! I'll be dead by the time I think I'm maturing in the field. Then what's the point? For me I'm following this path because in this century, technology is like prostitution, it is never legal everywhere in Cyber but we can't all live without it. Its a necessity!

Love or hate, China are guru crackers!

Sunday, May 22, 2011

A Season Or A Lifetime

When people come into your life for a SEASON
Its because your twin has com to share, grow and to learn
They bring you an experience of peace, or make you laugh.
They may teach you something you never done
They usually give you an unbelievable amount of joy
Believe it! Its real! But, only for a SEASON.

Lifetime friendships teach you lifetime lessons, things you must build upon in order to have a solid, emotional foundation.
Your job is to accept the lesson, love the person, and put what you have learned to use in all other relationships,
And areas of your life.
It is said that love is blind, but friendship is clairvoyant.

Thank you for being a part of my life!
If asked what's more important, my life or my friendship with you. I would sa my life and you would walk away, not knowing that my friendship with you is my life!

Apple patent application reveals an LCD with switchable, privacy-protecting viewing angles

Don't you hate it when the guy next to you on the subway is looking over your shoulder, watching you screw up in Fruit Ninja? Well, Apple could have predicted your discomfort -- back in November 2009, before the iPad was anything more than a unicorn, the company applied for a patent on an LCD display with adjustable viewing angles, explicitly designed to "shield the display away from unintended viewers." According to the filing, the display would include steering modules made of liquid crystal material, which aim the so-called scattering modules that sit on top of them. The top layer then redirects the light, making it possible to narrow down and alter the viewing angle. The patent specifically calls out cellphones and laptops, paving the way for discreet displays on MacBooks and iPhones, though the broad phrase "other portable electronic devices" leaves plenty of room for iPads and iPod Touches. No word, of course, on when or if Apple will secure this patent and if so, what devices might incorporate such screens. We may just be seeing this concept go public now, but it seems consumers could use this even more today than they did back in the fall of '09, when all they had to worry about was a stranger squinting at their 3GS' 3.5-inch screen.

Step by Step Guide to Setting Up a New Whm Cpanel Server for Web Hosting Accounts

This is a guide to setting up a new WHM cPanel Server to be used forweb hosting accounts. It is intended for web hosting company administrators and dedicated server owners. For under $99 per month, it is easier than ever to manage and run your own dedicated server. You can have guaranteed uptime from your datacenter, and outsourced support starting at $30/month. All you need to do is set up the server and get going. Whether it is for a web hosting company or a couple of personal websites, an inexpensive Linux server is powerful, reliable, and easy to setup.

Web Host Manager (WHM) is a common Linux based tool for managing websites on a server. Panel is a common control panel to manage an individual website. It allows you to add email accounts, view stats, make backups, install programs, etc. These 2 tools are the most inexpensive set used commonly to manage hosting accounts, and you will find them very prevalent in the budget shared hosting world. It usually adds about $20/month to the cost of a dedicated server but provides most of the features of the more expensive tools.

Whenever you order a dedicated server from a datacenter, you will receive a welcome email with details of theserver including the server name, ip addresses, and root password. This information will allow you to setup and configure WHM so that you can host websites and use your own custom Domain Nameserver instead of a raw IP address.and server contact email address.
1) Login to root WHM (http://:2086) 2) In the left margin, click Next to run the setup wizard 3) Agree to the end-user license agreement 4) Edit setup a. Server contact email address: info@yourdomain.com This email address is being protected from spam bots, you need JavaScript enabled to view it b. Default Cpanel theme: x c. Default home directory: /home d. Home directory prefix: home e. Main shared virtual host IP: xx.xxx.xxx.xx (should be main IP of server) f. Hostname: server.yourserver.com g. Primary name server: dns1.yourserver.com h. Secondary name servers: dns2.yourserver.com I. Leave everything else unchanged j. Click Save

Next, you need to setup the system quota. To do this follows these instructions: 5) Click Next Step in left margin – system sets up initial quota. No need to wait for initial quota to setup….Click Next Step again 6) DOES NOT enable names ever. Click Next Step again
Now we need to setup the Resolve. This is specific to your datacenter and the information will be provided in the Welcome details for your dedicated server. 7) Resolve setup: a. Click Continue b. Primary Resolve: xx.xx.xx.xx (this is datacenter specific) c. Secondary Resolve: xx.xx.xx.xx (this is datacenter specific) d. Tertiary Resolve: leave blank e. Click Continue f. Click Next Step  Not necessary to enter a MySQL root password 9) Click Finish

Initial setup is done, and you should now be able to login to root WHM. Now you can create the accounts needed to setup the name servers that you want to use on this dedicated server. 1) Login to root WHM again 2) “Create a New Account” (this is to be the main account: yourserver.com). Do not give this account a dedicated IP…. It will use the main server’s shared IP address. 3) Under “IP Functions”, click “Show IP address usage”. If only the mainserver IP is listed, that means you have to add the additional IP address to the server. Click “Add a New IP address”, and enter: xx.xx.xx.xx-xx Leave subnet mask unchanged, and click “Do It” 4) Click Show/Edit Reserved IPs, and check an IP to reserve it, and enter a reason (i.e. dns2.yourserver.com) 5) Under “DNS Functions” click “Edit DNS Zone”, then select yourserver.com and click “Edit”. Use the main IP address for the first 2 lines and the next IP address assigned to the server for the third line. A. Under “Add new entries below this line”, enter: server 14400 IN AN xx.xx.xx.xx (leave far right box blank) dns1 14400 IN AN xx.xx.xx.xx (leave far right box blank) dns2 14400 IN AN xx.xx.xx.xx (leave far right box blank) b. Note: The above entries are DNS entries for the two name servers being created, and the sever name dana.hostyourself.com. Once you’ve enter the three entries, click “Save” 6) If you get an “Error reloading BIND” error, go to “Restart Services” and click “DNSServer (BIND)”, then click YES to restart Bind.

That’s it! Now the server is all setup and ready to host cPanel hosting account with the name servers dns1.yourserver.com and dns2.yourserver.com. Of course you still need to go to your registrar and register these 2 new name servers and wait for normal propagation of 24-48 hours until the new name servers will work. 

If this is a server being setup for a dedicated customer, be sure to tell them: 1) IP addresses of name servers so he can register them with his registrar 2) Root login information 3) Login info of main account you created for him 4) Tell him NOT to delete the main account, since doing so will also delete the DNS zones you setup above 5) New DNS zones should be added to the old server to help with DNS propagation.

If you follow these simple instructions once you get your server from the datacenter, then you will be ready to load websites and hit the internet. With cheap outsourced support companies available and world class datacenters providing under $99 servers there is no reason not to tackle the world of dedicated servers and webhosting for you.

Will You Be There

In my darkest hour
In my deepest despair
Will you still care?
Will you be there?
In trails and my tribulations
There are doubts and frustrations
In my violence, in my turbulence
Through my fear and my confessions
In my anguish in my pain
In my joy in my sorrow
In the promise of another tomorrow
I’ll never let you part
You will always be in my heart

Copied from the song Will You Be There by Michael Jackson

Saturday, May 21, 2011

JCI Harare Be Better!

Being a member of JCI Harare, I have learnt a lot. The positive impact is bringing changes to me. The whole concept of this, get there and start a conversation. Naturally I don't like crowds and talking (as you might have noticed already) but chatting up with these young big ideas can bring light to your life. I now have a vision I never had, I have plans I never thought. I would think or was capable of thinking.

Now its all positive energy oozing in my system, adrenalin, hope, every positive expression or word you might imagine. I don't know if I'm a good active citizen as yet but as they say, BE BETTER!

Live life to the fullest whether business, school, music, or clubbing makes you feel fulfilled, do it and invit others to maintain being better and responsible!

xoxo

Tuesday, May 17, 2011

Q

We would accomplish more things. If we did not think of them as impossible

Disagree? (Lighter Side)

Long, unproductive meetings are often the bane of corporate life. My very funny boss at the software company where I work has come up with what just might be the perfect way to cut business conferences short before they start rambling out of control. There comes a time when he announces, "All those opposed to my plan say, 'I resign."
End of meeting.

Saturday, April 30, 2011

Multi Touch Technology; The Birth

Multi-touch
Multi-touch screen
On touchscreen displays, multi-touch refers to
the ability to simultaneously register three or
more distinct positions of input touches. It is
often used to describe other, more limited
implementations, like Gesture-Enhanced Single-
Touch, Dual-Touch or real Multi-Touch.
The interaction of touch and movement on
surfaces is a function on electronic visual displays
and touchpad pointing devices to interact with
content. It is an intermediary connection and
detection method from hardware to computer
software, to enact a users intention.

Implementations
Multi-touch has been implemented in several
different ways, depending on the size and type of
interface. The most popular form are mobile
devices ( iPhone, iPod Touch), touchtables
(Microsoft Surface) and walls. Both touchtables
and touch walls project an image through acrylic
or glass, and then back-light the image with LEDs.
Types
Bending Wave Touch
Dispersive Signal Touch (DST)
In-Cell
Infrared Touch (IR)
Optical touch technology
Near Field Imaging (NFI)
Optical Imaging
Projected Capacitive Touch (PST)
Resistive Touch
Surface Acoustic Wave Touch (SAW)
Surface Capacitive Touch
The optical touch technology functions when a
finger or an object touches the surface, causing
the light to scatter, the reflection is caught with
sensors or cameras that send the data to software
which dictates response to the touch, depending
on the type of reflection measured. Touch
surfaces can also be made pressure-sensitive by
the addition of a pressure-sensitive coating that
flexes differently depending on how firmly it is
pressed, altering the reflection. Handheld
technologies use a panel that carries an electrical
charge. When a finger touches the screen, the
touch disrupts the panel's electrical field. The
disruption is registered and sent to the software,
which then initiates a response to the gesture.
In the past few years, several companies have
released products that use multi-touch. In an
attempt to make the expensive technology more
accessible, hobbyists have also published
methods of constructing DIY touchscreens.

History
The use of touchscreen technology to control
electronic devices pre-dates multi-touch
technology and the personal computer. Early
synthesizer and electronic instrument builders
like Hugh Le Caine and Bob Moog experimented
with using touch-sensitive capacitance sensors to
control the sounds made by their instruments.
IBM began building the first touch screens in the
late 1960s, and, in 1972, Control Data released the
PLATO IV computer, a terminal used for
educational purposes that employed single-touch
points in a 16x16 array as its user interface.
The prototypes of the x-y mutual capacitance
multi-touch screens (left) developed at CERN
One of the early implementations of mutual
capacitance touchscreen technology was
developed at CERN in 1977 based on their
capacitance touch screens developed in 1972 by
Danish electronics engineer Bent Stumpe. This
technology was used to develop a new type of
human machine interface (HMI) for the control
room of the Super Proton Synchrotron particle
accelerator.
In a handwritten note dated 11 March 1972,
Stumpe presented his proposed solution – a
capacitative touch screen with a fixed number of
programmable buttons presented on a display.
The screen was to consist of a set of capacitors
etched into a film of copper on a sheet of glass,
each capacitor being constructed so that a nearby
flat conductor, such as the surface of a finger,
would increase the capacity by a significant
amount. The capacitors were to consist of fine
lines etched in copper on a sheet of glass – fine
enough (80 μm) and sufficiently far apart (80 μm)
to be invisible (CERN Courier April 1974 p117). In
the final device, a simple lacquer coating
prevented the fingers from actually touching the
capacitors.

Multi-touch technology began in 1982, when the
University of Toronto's Input Research Group
developed the first human-input multi-touch
system. The system used a frosted-glass panel
with a camera placed behind the glass. When a
finger or several fingers pressed on the glass, the
camera would detect the action as one or more
black spots on an otherwise white background,
allowing it to be registered as an input. Since the
size of a dot was dependent on pressure (how
hard the person was pressing on the glass), the
system was somewhat pressure-sensitive as well.

In 1983, Bell Labs at Murray Hill published a
comprehensive discussion of touch-screen based
interfaces. In 1984, Bell Labs engineered a
touch screen that could change images with more
than one hand. In 1985, the University of Toronto
group including Bill Buxton developed a multi-
touch tablet that used capacitance rather than
bulky camera-based optical sensing systems.
A breakthrough occurred in 1991, when Pierre
Wellner published a paper on his multi-touch
“ Digital Desk”, which supported multi-finger and
pinching motions.
Various companies expanded upon these
inventions in the beginning of the twenty-first
century. The company Fingerworks developed
various multi-touch technologies between 2001
and 2005, including Touchstream keyboards and
the iGesture Pad. Several studies of this
technology were published in the early 2000s by
Alan Hedge, professor of human factors and
ergonomics at Cornell University.

Apple acquired Fingerworks and its multi-touch
technology in 2005. Mainstream exposure to
multi-touch technology occurred in 2007 when
the iPhone gained popularity, with Apple stating
they 'invented multi touch' as part of the iPhone
announcement, however both the function
and the term predate the announcement or
patent requests. Publication and demonstration
using the term Multi-touch by Jefferson Y. Han in
2005 predates these,[16] but Apple did give multi-
touch wider exposure through its association with
their new product and were the first to introduce
multi-touch on a mobile device. Microsoft's
table-top touch platform Microsoft Surface, which
started development in 2001, interacts with both
the users touch and their electronic devices.
Similarly, in 2001, Mitsubishi Electric Research
Laboratories (MERL) began development of a
multi-touch, multi-user system called
DiamondTouch, also based on capacitance but
able to differentiate between multiple
simultaneous users (or rather, the chairs in which
each user is seated or the floorpad the user is
standing on); the Diamondtouch became a
commercial product in 2008.
Small-scale touch devices are rapidly becoming
commonplace, with the amount of touch screen
telephones expected to increase from 200,000
shipped in 2006 to 21 million in 2012. More
robust and customizable multi-touch and gesture-
based solutions are beginning to become
available, with interfaces that register multiple
touch points and gestures.

Brands and manufacturers
A virtual keyboard on an iPad
There have been large companies in recent years
that have expanded into the growing multi-touch
industry, with systems designed for everything
from the casual user to multinational
organizations.
Laptop manufacturers have begun to include
multi-touch trackpads on their laptops, as well as
constructing tablet computers such as the iPad
that respond to touch input rather than
traditional stylus input. Synaptics has been a
major supplier and developer of multi-touch
technology for this market.
In the wake of the iPhone, several mobile phone
manufacturers have begun to replace traditional
push-button interfaces with multi-touch
interfaces on their handheld devices as well. So
far, such innovations are mostly restricted to the
higher-end smartphones used for web browsing
and computing in addition to phone-based
functions.
A few companies are focusing on large-scale
surface computing rather than personal
electronics, either large multi-touch tables or wall
surfaces. These systems are generally used by
government organizations, museums, and
companies as a means of information or exhibit
display.
Apple Inc. is the active holder of the trade mark
"Multi-touch" and is the final stages of getting
registration, and, correspondingly, lists
"Multi-Touch" on their page of trademarks.
Apple was also awarded a patent covering multi-
touch on 20 January 2009.
Software
Operating systems
Many recent operating systems support multi-
touch, including Mac OS X, Windows 7 and
Ubuntu (full support since version 10.10, partial
support in 10.04), Apple's iOS, Nokia's Symbian ^3
OS on the flagship model Nokia N8 & the Nokia
E7, Samsung's Bada, Google's Android, Palm's
webOS, Microsoft's Windows Phone 7, BlackBerry
OS 5.0 (on Storm models) and 6.0, Xandros.
Applications develop and design for
multitouch :
Microsoft Touch Pack for Windows 7:
Microsoft Blackboard is a physics puzzle game.
Microsoft Garden Pond is a game where you
move fish by tapping on the water.
Microsoft Rebound is a cool two-player ball
game. Reminds of flipper.
Microsoft Surface Collage lets you create a
collage of pictures by dragging, resizing and
rotating them on a canvas. The collage can then
be saved as a picture and be set as the
background.
Microsoft Surface Globe is Bing Maps 3D
(Virtual Earth 3D), but with multitouch input.
Microsoft Surface Lagoon is a screensaver that
lets you tap on the water to scare the fish.
Windows 7 built-in:
Panning is enabled “everywhere” where
scrollbars exist.
Paint support multi touch finger painting.
Hearts/Solitaire have been optimized for
multitouch.
Taskbar Jump Lists by dragging the icons
upwards.
Optimisation for multitouch in Windows Photo
Viewer and XPS Viewer and Windows Live
Photo Gallery
On-Screen Keyboard works with multitouch.
Internet Explorer 8 supports basic gestures
Other
EarthPlusPlus (Multitouch Google Earth)
Marine route navigation
BumpTop 3D Desktop
Fishbowl- offline Facebook from Microsoft.
Crazy Coins is an ATM that spits out money to
be collected by piggy banks
Firefox Browser with basic gestures support
(beginning with version Firefox 4)
Popular culture references
Pop culture has also portrayed potential uses of
multi-touch technology in the future, including
several installments of the Star Trek franchise.
The television series CSI: Miami introduced both
surface and wall multi-touch displays in its sixth
season. Another television series, NCIS: Los
Angeles make use of multitouch surfaces and wall
panels as an initiative to go digital. Another form
of a multi-touch computer was seen in the motion
picture, The Island, where the professor, played
by Sean Bean, has a multi-touch desktop to
organize files, based on an early version of
Microsoft Surface. Multitouch technology can
also be seen in the James Bond film, Quantum of
Solace, where MI6 uses a touch interface to
browse information about the criminal Dominic
Greene. In an episode of the popular TV series
The Simpsons, when Lisa Simpson travels to the
underwater headquarters of Apple Inc. to visit
Steve Jobs, the erstwhile pretender to the throne
of Mapple is shown to be performing multiple
multi-touch hand gestures on a large touch wall.
A device similar to the Surface was seen in the
1982 movie Tron. It took up an executive's entire
desk and was used to communicate with the
Master Control computer.

Multi Touch Technology; The Birth

Multi-touch
Multi-touch screen
On touchscreen displays, multi-touch refers to
the ability to simultaneously register three or
more distinct positions of input touches. It is
often used to describe other, more limited
implementations, like Gesture-Enhanced Single-
Touch, Dual-Touch or real Multi-Touch.
The interaction of touch and movement on
surfaces is a function on electronic visual displays
and touchpad pointing devices to interact with
content. It is an intermediary connection and
detection method from hardware to computer
software, to enact a users intention.

Implementations
Multi-touch has been implemented in several
different ways, depending on the size and type of
interface. The most popular form are mobile
devices ( iPhone, iPod Touch), touchtables
(Microsoft Surface) and walls. Both touchtables
and touch walls project an image through acrylic
or glass, and then back-light the image with LEDs.
Types
Bending Wave Touch
Dispersive Signal Touch (DST)
In-Cell
Infrared Touch (IR)
Optical touch technology
Near Field Imaging (NFI)
Optical Imaging
Projected Capacitive Touch (PST)
Resistive Touch
Surface Acoustic Wave Touch (SAW)
Surface Capacitive Touch
The optical touch technology functions when a
finger or an object touches the surface, causing
the light to scatter, the reflection is caught with
sensors or cameras that send the data to software
which dictates response to the touch, depending
on the type of reflection measured. Touch
surfaces can also be made pressure-sensitive by
the addition of a pressure-sensitive coating that
flexes differently depending on how firmly it is
pressed, altering the reflection. Handheld
technologies use a panel that carries an electrical
charge. When a finger touches the screen, the
touch disrupts the panel's electrical field. The
disruption is registered and sent to the software,
which then initiates a response to the gesture.
In the past few years, several companies have
released products that use multi-touch. In an
attempt to make the expensive technology more
accessible, hobbyists have also published
methods of constructing DIY touchscreens.

History
The use of touchscreen technology to control
electronic devices pre-dates multi-touch
technology and the personal computer. Early
synthesizer and electronic instrument builders
like Hugh Le Caine and Bob Moog experimented
with using touch-sensitive capacitance sensors to
control the sounds made by their instruments.
IBM began building the first touch screens in the
late 1960s, and, in 1972, Control Data released the
PLATO IV computer, a terminal used for
educational purposes that employed single-touch
points in a 16x16 array as its user interface.
The prototypes of the x-y mutual capacitance
multi-touch screens (left) developed at CERN
One of the early implementations of mutual
capacitance touchscreen technology was
developed at CERN in 1977 based on their
capacitance touch screens developed in 1972 by
Danish electronics engineer Bent Stumpe. This
technology was used to develop a new type of
human machine interface (HMI) for the control
room of the Super Proton Synchrotron particle
accelerator.
In a handwritten note dated 11 March 1972,
Stumpe presented his proposed solution – a
capacitative touch screen with a fixed number of
programmable buttons presented on a display.
The screen was to consist of a set of capacitors
etched into a film of copper on a sheet of glass,
each capacitor being constructed so that a nearby
flat conductor, such as the surface of a finger,
would increase the capacity by a significant
amount. The capacitors were to consist of fine
lines etched in copper on a sheet of glass – fine
enough (80 μm) and sufficiently far apart (80 μm)
to be invisible (CERN Courier April 1974 p117). In
the final device, a simple lacquer coating
prevented the fingers from actually touching the
capacitors.

Multi-touch technology began in 1982, when the
University of Toronto's Input Research Group
developed the first human-input multi-touch
system. The system used a frosted-glass panel
with a camera placed behind the glass. When a
finger or several fingers pressed on the glass, the
camera would detect the action as one or more
black spots on an otherwise white background,
allowing it to be registered as an input. Since the
size of a dot was dependent on pressure (how
hard the person was pressing on the glass), the
system was somewhat pressure-sensitive as well.

In 1983, Bell Labs at Murray Hill published a
comprehensive discussion of touch-screen based
interfaces. In 1984, Bell Labs engineered a
touch screen that could change images with more
than one hand. In 1985, the University of Toronto
group including Bill Buxton developed a multi-
touch tablet that used capacitance rather than
bulky camera-based optical sensing systems.
A breakthrough occurred in 1991, when Pierre
Wellner published a paper on his multi-touch
“ Digital Desk”, which supported multi-finger and
pinching motions.
Various companies expanded upon these
inventions in the beginning of the twenty-first
century. The company Fingerworks developed
various multi-touch technologies between 2001
and 2005, including Touchstream keyboards and
the iGesture Pad. Several studies of this
technology were published in the early 2000s by
Alan Hedge, professor of human factors and
ergonomics at Cornell University.

Apple acquired Fingerworks and its multi-touch
technology in 2005. Mainstream exposure to
multi-touch technology occurred in 2007 when
the iPhone gained popularity, with Apple stating
they 'invented multi touch' as part of the iPhone
announcement, however both the function
and the term predate the announcement or
patent requests. Publication and demonstration
using the term Multi-touch by Jefferson Y. Han in
2005 predates these,[16] but Apple did give multi-
touch wider exposure through its association with
their new product and were the first to introduce
multi-touch on a mobile device. Microsoft's
table-top touch platform Microsoft Surface, which
started development in 2001, interacts with both
the users touch and their electronic devices.
Similarly, in 2001, Mitsubishi Electric Research
Laboratories (MERL) began development of a
multi-touch, multi-user system called
DiamondTouch, also based on capacitance but
able to differentiate between multiple
simultaneous users (or rather, the chairs in which
each user is seated or the floorpad the user is
standing on); the Diamondtouch became a
commercial product in 2008.
Small-scale touch devices are rapidly becoming
commonplace, with the amount of touch screen
telephones expected to increase from 200,000
shipped in 2006 to 21 million in 2012. More
robust and customizable multi-touch and gesture-
based solutions are beginning to become
available, with interfaces that register multiple
touch points and gestures.

Brands and manufacturers
A virtual keyboard on an iPad
There have been large companies in recent years
that have expanded into the growing multi-touch
industry, with systems designed for everything
from the casual user to multinational
organizations.
Laptop manufacturers have begun to include
multi-touch trackpads on their laptops, as well as
constructing tablet computers such as the iPad
that respond to touch input rather than
traditional stylus input. Synaptics has been a
major supplier and developer of multi-touch
technology for this market.
In the wake of the iPhone, several mobile phone
manufacturers have begun to replace traditional
push-button interfaces with multi-touch
interfaces on their handheld devices as well. So
far, such innovations are mostly restricted to the
higher-end smartphones used for web browsing
and computing in addition to phone-based
functions.
A few companies are focusing on large-scale
surface computing rather than personal
electronics, either large multi-touch tables or wall
surfaces. These systems are generally used by
government organizations, museums, and
companies as a means of information or exhibit
display.
Apple Inc. is the active holder of the trade mark
"Multi-touch" and is the final stages of getting
registration, and, correspondingly, lists
"Multi-Touch" on their page of trademarks.
Apple was also awarded a patent covering multi-
touch on 20 January 2009.
Software
Operating systems
Many recent operating systems support multi-
touch, including Mac OS X, Windows 7 and
Ubuntu (full support since version 10.10, partial
support in 10.04), Apple's iOS, Nokia's Symbian ^3
OS on the flagship model Nokia N8 & the Nokia
E7, Samsung's Bada, Google's Android, Palm's
webOS, Microsoft's Windows Phone 7, BlackBerry
OS 5.0 (on Storm models) and 6.0, Xandros.
Applications develop and design for
multitouch :
Microsoft Touch Pack for Windows 7:
Microsoft Blackboard is a physics puzzle game.
Microsoft Garden Pond is a game where you
move fish by tapping on the water.
Microsoft Rebound is a cool two-player ball
game. Reminds of flipper.
Microsoft Surface Collage lets you create a
collage of pictures by dragging, resizing and
rotating them on a canvas. The collage can then
be saved as a picture and be set as the
background.
Microsoft Surface Globe is Bing Maps 3D
(Virtual Earth 3D), but with multitouch input.
Microsoft Surface Lagoon is a screensaver that
lets you tap on the water to scare the fish.
Windows 7 built-in:
Panning is enabled “everywhere” where
scrollbars exist.
Paint support multi touch finger painting.
Hearts/Solitaire have been optimized for
multitouch.
Taskbar Jump Lists by dragging the icons
upwards.
Optimisation for multitouch in Windows Photo
Viewer and XPS Viewer and Windows Live
Photo Gallery
On-Screen Keyboard works with multitouch.
Internet Explorer 8 supports basic gestures
Other
EarthPlusPlus (Multitouch Google Earth)
Marine route navigation
BumpTop 3D Desktop
Fishbowl- offline Facebook from Microsoft.
Crazy Coins is an ATM that spits out money to
be collected by piggy banks
Firefox Browser with basic gestures support
(beginning with version Firefox 4)
Popular culture references
Pop culture has also portrayed potential uses of
multi-touch technology in the future, including
several installments of the Star Trek franchise.
The television series CSI: Miami introduced both
surface and wall multi-touch displays in its sixth
season. Another television series, NCIS: Los
Angeles make use of multitouch surfaces and wall
panels as an initiative to go digital. Another form
of a multi-touch computer was seen in the motion
picture, The Island, where the professor, played
by Sean Bean, has a multi-touch desktop to
organize files, based on an early version of
Microsoft Surface. Multitouch technology can
also be seen in the James Bond film, Quantum of
Solace, where MI6 uses a touch interface to
browse information about the criminal Dominic
Greene. In an episode of the popular TV series
The Simpsons, when Lisa Simpson travels to the
underwater headquarters of Apple Inc. to visit
Steve Jobs, the erstwhile pretender to the throne
of Mapple is shown to be performing multiple
multi-touch hand gestures on a large touch wall.
A device similar to the Surface was seen in the
1982 movie Tron. It took up an executive's entire
desk and was used to communicate with the
Master Control computer.

Friday, April 29, 2011

Fake Email: The Achilles Heel of Facebook Pages

Posted by Chris Gayomali

A loophole in one of Facebook's laxer policies has
been getting some unwanted shine in recent weeks:
for whatever their reasons, users have been able to
take down popular pages (like Ars Technica's)
using little more than a fake email address.
Read Write Web reports that the DMCA (Digital
Millennium Copyright Act) was originally intended
to protect copyrighted material that fails to qualify
under "fair use" -- content that basically has the
right to be freely distributed. However, trolly
Internet users of late have been able to pen letters
under fake email addresses, posing as the owners
of said copyrighted material when submitting
takedown complaints to Facebook.

But the main problem is that Facebook doesn't do
enough to verify the identities of the fakers in
question, who end up causing headaches for the
actual companies maintaining the pages. Though
they ask for a user's name, mailing address,
telephone, email and details, they don't do much to
double check if the information supplied is
legitimate or not.

This wouldn't be a problem if Facebook started
validating a complainant's email address (like: Hey, click this link we're emailing back to you... Thanks!)
But my guess is that with all these angry Internet
types waving pitchforks at Facebook's doorstep,
we'll begin seeing more rigorous identity-checking
measures soon.

In the meantime, you should Like our Facebook
page! Just please don't pretend to be us and have it
taken down...

todays children touch generation

Todays Children Touch Generation



From UberGizmo

BLACK. PEOPLE, READ THIS

BLACK PEOPLE,
PLEASE, READ & HEED. POIGNANT!!!
The sad thing about this article is that the essence
of it is true. The truth hurts. I just hope this sets more Black people in motion towards making real progress.. Chris Rock, a Black comedian, even joked that Blacks don't read.

Help prove them wrong! Read and pass on.

Please Note:
For those of you who heard it, this is the article
Dee Lee was reading this morning on a New York radio station. For those of you who didn't hear it, this is very deep. This is a heavy piece and a Caucasian wrote it.

Dee Lee, CFP
Harvard Financial Educators

Dee Lee
THEY ARE STILL OUR SLAVES

We can continue to reap profits from the Blacks
without the effort of physical slavery. Look at the current methods of containment that they use on themselves: IGNORANCE, GREED, and SELFISHNESS.

Their IGNORANCE is the primary weapon of
containment. A great man once said, 'The best way to hide something from Black people is to put it in a book.'

We now live in the Information Age.. They have
gained the opportunity to read any book on any subject through the efforts of their fight for freedom, yet they refuse to read. There are numerous books readily available at Borders, Barnes &Noble, and *Amazon.com*
< http://amazon.com/>, not to mention their own Black Bookstores that provide solid blueprints to reach economic equality (which should have been their fight all along), but few read consistently, if at all..

GREED is another powerful weapon of
containment. Blacks, since the abolition of slavery, have had large amounts of money at their disposal. Last year they spent 10 billion dollars during Christmas, out of their 450 billion dollars in total yearly income (2.22%).

Any of us can use them as our target market, for
any business venture we care to dream up, no matter how outlandish, they will buy into it. Being primarily a consumer people, they function totally by greed. They continually want more, with little thought for saving or investing. They would rather buy some new sneaker than invest in starting a business.

Some even neglect their children to have the
latest Tommy or FUBU, And they still think that having a Mercedes, and a big house gives them 'Status' or that they have achieved their Dream. They are fools! The vast majority of their people are still in poverty because their greed holds them back from collectively making better communities. With the help of BET, and the rest of their black media that often broadcasts destructive images into their own homes, we will continue to see huge profits like those of Tommy and Nike.

(Tommy Hilfiger has even jeered them, saying he doesn't want their money, and look at how the fools spend more with him than ever before!). They'll continue to show off to each other while we build solid communities with the profits from our businesses that we market to them. SELFISHNESS, ingrained in their minds through slavery, is one of the major ways we can continue to contain them. One of their own, Dubois said that there was an innate division in their culture.. A 'Talented Tenth' he called it. He was correct in his deduction that there are segments of their culture that has achieved some 'form' of success.

However, that segment missed the fullness of his
work. They didn't read that the 'Talented Tenth' was then responsible to aid The Non-Talented Ninety Percent in achieving a better life.. Instead, that segment has created another class, a Buppie class that looks down on their people or aids them in a condescending manner. They will never achieve what we have.... Their selfishness does not allow them to be able to work together on any project or endeavor of substance. When they do get together, their selfishness let's their egos get in the way of their goal Their so-called help organizations seem to only want to promote their name without making any real change in their community.

They are content to sit in conferences and conventions in our hotels, and talk about what they will do, while they award plaques to the best speakers, not to the best doers. Is there no end to their selfishness? They steadfastly refuse to see that Together Each Achieves More (TEAM).

They do not understand that they are no better
than each other because of what they own, as a matter of fact, most of those Buppies are but one or two pay checks away from poverty. All of which is under the control of our pens in our offices and our rooms.

Yes, we will continue to contain them as long as
they refuse to read, continue to buy anything they want, and keep thinking they are 'helping' their communities by paying dues to organizations which do little other than hold lavish conventions in our hotels. By the way,
don't worry about any of them reading this letter, remember, 'THEY DON'T READ!!!!

(Prove them wrong. Please pass this on! After Reading

Tuesday, April 26, 2011

Sunday, April 24, 2011

Qualities of a Successful Leader by Napoleon Hill

Personal initiative heads the list of qualities a successful leader must possess. These qualities are:
Personal initiative
The adoption of a definite major purpose.
A motive to inspire continuous action in pursuit of a definite major purpose.
A master mind alliance through which you may acquire the power to attain your definite purpose.
Self-reliance in proportion to the scope and object of your major purpose.
Self-discipline sufficient to insure mastery of the head and the heart, and to sustain your motives until they have been realized.
Persistence, based on the will to win.
A well-developed imagination, controlled and directed.
The habit of reaching definite and prompt decisions.
The habit of basing opinions on known facts instead of relying on guesswork.
The habit of going the extra mile.
The capacity to generate enthusiasm at will, and to control it.
A well-developed sense of details.
The capacity to take criticism without resentment.
Familiarity with the ten basic motives that inspire all human action.
The capacity to concentrate your full attention upon one task at a time.
Willingness to accept full responsibility for the mistakes of subordinates.
The habit of recognizing the merits and abilities of others.
A positive mental attitude at all times.
The habit of assuming full responsibility for any job or task undertaken.
The capacity for applied faith.
Patience with subordinates and associates.
The habit of following through with any task once begun.
The habit of emphasizing thoroughness instead of speed.
Dependability, the only requirement of leadership that can be stated with one word – but no less important to success on that account.
There are qualities of minor importance which leadership in many fields of endeavor may require, but those listed above are on the must list of all able leaders. Measure any successful leader by the list and observe how many of the traits he applies, although he may do so unconsciously.
Source: PMA Science of Success Course. Pgs. 201-203.

Saturday, March 5, 2011

the touch generation

Investigation in the Plasma/LCD screen & try to configure touch/motion capabilities to function the device & also control (access) to some of the house basic features. It shld be connected w infra-red motion cameras allowing maximum power thru solar power extracted from e windows