Thursday, May 29, 2008

Windows 7 demo: all multitouch and no meat

The first public demonstration of Windows 7 was made at the D6 conference, showing off Windows 7's multitouch features. Notably absent from the demo was anything new.

read more | digg story

Comma separated list of values of single Database table field

Many times you need to create a comma seperated list of values in a table. Here is a line of T-SQL solution to get comma separated list of values of single field of a database table.
DECLARE @commaSeparatedVal AS VARCHAR(MAX);
SELECT @commaSeparatedVal = ISNULL(@commaSeparatedVal +',','') + CONVERT(VARCHAR,[SKU]) FROM PRODUCT
PRINT @commaSeparatedVal

Wednesday, May 28, 2008

New Google Talk in Lab

Google Talk, Labs Edition is an experimental release of the Google  Talk client. It has many of the same great features as the Google Talk  Gadget, including instant messaging, emoticons, and group chat. Google  Talk, Labs Edition also comes with new desktop notifications from  Calendar, Orkut, and Gmail. You can download it from

browse discussion on

Tuesday, May 27, 2008

Importance of !important in CSS

Do you know What does !important mean in CSS?, an "!important" declaration (the keywords "!" and "important" follow the declaration) this takes high precedence over a normal declaration. And can be framed in this way, this means that the styles are applied in order as they are read by the browser.

CSS it tries to create a balance of power between author and user style sheets. By default, rules in an author's style sheet override those in a user's style sheet. But in CSS1, this is in other way round - Author "!important" rules took precedence over User "!important" rules.

For Example:
User's Style Sheet:
    1: <style> 
    2:   p{font-size: 2em !important;} 
    3:   p{font-style: italic;} 
    4: </style>

Author's Style Sheet:
    1: <style> 
    2:   p{font-size: 3em;} 
    3:   p{font-style: normal;} 
    4: </style> 

If you see in the above instance, the first rule in the User's Style Sheet has "!important" declaration, which will overrides the first rule in the Author's Style Sheet. And if you observe for the second rule in User's Style Sheet it does not contain "!important" so this will be ruled out because here second rule in the Author's Style Sheet has got high preference so the HTML will render by taking size as "p{font-style: normal;}"

If you would like to know more on this, then check with the w3 site: and move to the section called "6.4.2 !important rules"

Monday, May 26, 2008

Download A Firefox Version that speaks your language

The award-winning open source Web browser Firefox 3 Release Candidate 1 is available in more than 45 languages (including Gujarati and Punjabi) as a public preview release intended for developer testing and community feedback. It includes new features as well as dramatic improvements to performance, memory usage and speed.

Check out for more information and download Firefox 3 RC1.


Sudev Gandhi

Disney builds virtual bridge for interactive games

Disney is bridging the gap between gaming and virtual worlds. Disney Interactive Studios on Thursday formally launched DGamer, a free avatar-based community for U.S. buyers of games the company...

read more | digg story

Friday, May 23, 2008

The "Hello World" Program, in 366 Programming Languages!

"Hello World" is the traditional first program you write when learning a new language, first appearing in K&R's "The C Programming Language" book in 1978. Since then it has been implemented in almost every programming language on the planet. This collection has it in 366 coding languages and 58 human ones! Is your favourite here?

read more | digg story

Thursday, May 22, 2008

A Blog From Google Docs

Hi All,

I'm just exploring this exciting feature from Google Docs. You can directly publish your online documents as blogs in simple steps. One more reason to love Google.


Sudev Gandhi

ODF Wins the Office Document Format War

Office 2007 Service Pack 2 will bring improved XML support to the office suite -- but it will be to ODF and not Microsoft's own format.

read more | digg story

Wednesday, May 21, 2008

China Earthquake buried 32 sources of radiation

More than 30 sources of radiation were buried by debris from the massive earthquake in central China last week and all have either been recovered or safely cordoned off, state media reported Tuesday. A French nuclear expert said the radioactive sources likely came from materials used in hospitals, factories or in research, not for weapons.

read more | digg story

Tuesday, May 20, 2008

The Google File System - Google's core storage platform

Google File System - large distributed log structured file system in which they throw in a lot of data. Reliable scalable storage is a core need of any application. GFS is Google's core storage platform.Google File System (GFS) is a proprietary distributed file system developed by Google for its own use. Its point is both to assure reliablity by using redundant copies and to allow individual most used data to selectively receive more resources (more dedicated hardware or/and redundant copies).GFS is optimized for Google's core data storage needs, web searching, which can generate enormous amounts of data that needs to be retained; Google File System grew out of an earlier Google effort, "BigFiles", developed by Larry Page and Sergey Brin in the early days of Google, while it was still located in Stanford. The data is stored persistently, in very large, multiple gigabyte-sized files (around 100GB) which are only extremely rarely deleted, overwritten, or shrunk; files are usually appended to or read. It is also designed and optimized to run on Google's computing clusters, the nodes of which consist of cheap, "commodity" computers, which means precautions must be taken against the high failure rate of individual nodes and the subsequent data loss. Other design decisions select for high data throughputs, even when it comes at the cost of latency.

read more digg story

Bigtable: A Distributed Storage System for Structured Data

Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. Many projects at Google store data in Bigtable, including web indexing, Google Earth, and Google Finance.

read more digg story

Ten technology trends that will shape 2008

Grid computing

India is the fastest adopter of grid computing in the world, according to Oracle’s Grid Index IV. Oracle should know, since it has 70 customers in India using its grid solutions.

Grid computing is applying the resources of many computers in a network to a single problem at the same time. It is not a new phenomenon. Research organisations, government agencies and universities have been using this concept for years. What’s new is that Indian corporates are now latching on to the concept.

Some of the enterprises using grid computing in India include the Gujarat Electricity Board, Saraswat Bank, National Stock Exchange, Indian Railway Catering & Tourism Corporation, General Insurance Company, Syndicate Bank, Ashok Leyland, Maruti Suzuki India Ltd and Municipal Corporation of Hyderabad.

Last year saw two major developments that will prove important for the adoption and acceptance of grid computing in India. First was the Computational Research Laboratories (CRL) — a subsidiary of Tata Sons —developing Eka, the world’s fourth fastest computer and two the Centre for Development of Advanced Computing’s (CDAC’s) Garuda finally got off the ground.

For all those chief technology officers who are constantly looking at reducing their hardware costs Grid Computing may provide an answer, say analysts. Traditionally, companies bought hardware to support certain applications. However, these applications have peak processing hours and slack time. Grid computing takes advantage of the slack time and transfers the processing loads on systems that are being underutilised.

“Indian businesses are going global. As part of their growth strategy, they have to take risks and decisions – whether it means investing in people or technology. Organisations from sectors like telecom, financial services, travel, construction & engineering, media and utilities are convinced of the benefits of grid computing because it allows for superior scalability and better return on investment,” explains SPS Grover, vice-president, Technology Business Unit, Oracle India.

Sunny side up

Photovoltaics (PV) promise to remain a hot topic in 2008. PV is the creation of electricity from a light source – sunlight, for instance.

A basic photovoltaic, also known as a solar cell, is made of materials like silicon and thin-filaments, commonly used in the micro-electronics industry. These are capital-intensive projects. PV modules connect many solar cells together and mount them on a frame or platform. Their margins are better.

India is becoming an attractive solar market, and IT firms like Moser Baer, Signet Solar and Webel Solar are confident of the growth. The recent semiconductor policy sops and the government policy for “off-grid” electrification, are added incentives.

Electricity and social development go hand in hand. Rural areas of India are so far-flung that in some cases the small population and high cost of laying down power lines may not make it a viable proposition.

Conventional generator sets too may not be feasible due to recurring maintenance problems. The best solution under the circumstances is solar PV-based systems to generate power, run irrigation sets, heat water and lighting up homes and streetlights.

India offers 100 per cent subsidy on solar PV systems for remote village electrification; and for villages with electricity, the government offers 60 per cent subsidy. Moser Baer’s $880 million (around Rs 3,500 crore) 8-year sourcing tie-up with Norway based, REC Group furthers this line of thinking.

The deal could get Moser Baer Photo Voltaic (MBPV) around $1 billion in revenues over the period of the contract. The global photovoltaic market is expected to grow over six times to $40 billion by 2010.

Software on demand

Software-as-a-service or (Saas) is a trend that will see considerable uptake among business users, say analysts. Saas is a software application delivery model, wherein the user pays according to the usage rather than for owning the software (license fee).

With close to eight million small and medium enterprises (SMEs) in India, Saas providers can start counting cash in 2008. Ravi Shekhar Pandey, research manager, Springboard Research, feels that the year 2007 was of creating awareness among the users and 2008 will finally see Saas’ adoption increasing.

“Earlier was the only vendor that was propagating the concept in India. But now even traditional software vendors like Microsoft, Oracle and SAP have introduced Saas in their suite of offerings,” he adds.

“In 2006-07, 79 per cent of the companies that we spoke to were aware of the concept but in 2007 it has increased to 90 per cent,” Pandey adds.

Enterprise mobility

The concept of anywhere-anytime connectivity has changed the way enterprises do business today. Connectivity is not just restricted to the globetrotting top executives but also to the sales team on the field. IDC projects that by 2009, there will be around 880 million mobile workers worldwide demonstrating that mobility is going mainstream.

Companies like Sun Pharmaceuticals, Dr Reddy’s and Parryware, a division of EID Parry (India) are some examples where handhelds have been used to automate the sales force for real-time information.

Rajiv Sehgal, head (Value Added Services), Airtel Enterprise Services in a seminar on enterprise mobility said, “Enterprises are implementing mobile solutions to realise benefits in terms of product enhancement.” Analysts predict that banking and financial segment is one segment that has a huge opportunity in going mobile.

Go mobile and entertain

Entertainment devices will abound this year. They will be with you on the move (your laptops, PDAs and cellphones), at airports, your workplace, home and more importantly, in your pockets. TVs (both LCDs and Plasmas) will becomes larger and cheaper, and so will high-end mobile screens, offering services like TV on mobile, gaming, social networking, etc.

Mobile TV — which enables TV services on handhelds such as mobiles, handheld TVs, car TV, GPS terminals, game devices, laptop PCs, and other portable devices — is also closer to seeing the light of day in India. It’s an important development given that there are almost 225 million mobiles in the country, of which around 30-40 per cent are TV-capable. Besides, it will help increase the average realisation per user (ARPU) for telecom operators.

The Telecom Regulatory Authority of India (Trai) has already initiated the process, and given its recommendations on January 3 based on the feedback it received from around 30 telecom players, broadcasters, technology providers and direct-to-home (DTH) players in September 2007.

The world over, a number of mobile operators have conducted successful mobile TV field trials. Mobile broadcasting commercial services have been introduced in countries like Korea, the US, Finland, and Germany.

In India too, Doordarshan has launched a Mobile TV pilot project, and is in the process of introducing commercial Mobile TV services. UK-based mobile applications developer ROK Entertainment Group too has launched its streamed mobile TV system (called Tiny TV) in India through BSNL.

Entertainment will also become increasingly interactive. IOL Broadband already started the trend by launching India's first IP-based on-demand television service (IPTV) a year ago. With IPTV offering from players like MTNL, Bharti and Reliance, the ‘on-demand’ entertainment is music to the ears of most people. It will also help increase the revenue for broadcasters and mobile operators.

Virtual nightmares ride high

Cybercrime is estimated to be a $105 billion market and looks set to grow this year as the complexity of cybercrimes intensifies.

The year 2008 is expected to be a year of an exponential increase in the activities of cyber criminals. Phishing — an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details continues to be a major concern during the year, claim security vendors.

Theft of intellectual property is expected to be another grave issue which needs to be tackled in the new year. “India is in the process of acquiring special technologies for cyber and digital frauds, international vendors of tools to trace cyber criminals, are now also showing interest in the Indain market,” says Computer Forensic Expert, Samir Datt.

Minister for Communication and Information Technology, A Raja, recently announced grants to enable the CBI install the latest technology enabling the investigative agency train officials in complex cybercrimes and also help in the mutual exchange of information with the Interpol.

The government is also in the process of amending the IT Act 2000 to address problems of data protection, data theft, e-commerce frauds and child pornography etc.

‘Open source’ makes inroads

‘Linux’— a free operating system (OS) as opposed to Microsoft Windows or Vista — is fast making inroads in the country.

Novell along with the Electronics Corporation of Tamil Nadu (ELCOT) is installing Suse Linux in around 40,000 desktops in the state.

This is the second-largest implementation of Linux on the desktop – the biggest one being that of around 60,000 desktops in Life Insurance Corporation (LIC) of India by Red Hat, which is estimated to have implemented over 200,000 desktop OS installations. Canara Bank too has around 10,000 Linux OS desktops.

Major firms and institutions like the LIC, Industrial Development Bank of India (IDBI), IndiaBulls and HDFC use Linux on the servers, for “mission-critical” applications too.

Linux has gained the support of corporations such as IBM, Sun Microsystems, Dell, Hewlett-Packard, and Novell, and is used as an operating system for a wide variety of computer hardware, including desktop computers, supercomputers, and embedded devices such as mobile phones and routers.

In India, besides major firms, state governments in Tamil Nadu, Karnataka, Kerala, Madhya Pradesh, Delhi and Maharashtra too have started using Linux in a bid to promote “open-source” environments.

SMEs are picking up the cue since you can install Linux on your desktop or server and reduce your operation costs. Microsoft counters this line of thinking by saying that the total cost of ownership (TCO) of its OS is lower than that of Linux.

The open source community that promotes Linux pooh-poohs this argument. One fact, though, remains: Linux is robust, steady, virus-free to a great extent and most importantly, FREE. Which means you can download it from the Internet or get companies like Red Hat and Novell (in India) to install it on your machines and provide maintenance services for a nominal fee.

Linux on the desktop is not as popular as Linux on the server. The reason is that Linux as an OS is a little difficult to use, especially if you’ve been used to a Windows environment. For new users, it would hardly matter.

Moreover, the argument that Linux does not have adequate support and lacks drivers for audio, video and gaming hardly holds water any longer.

Face to face

If corporate security is the buzzword in 2008, then biometrics will be the most probable answer to all such concerns. Biometric solutions for industrial applications surged to Rs 150 crore as an industry, according to a Frost and Sullivan report.

Although 80 per cent of the biometrics business still comes from the corporate sector, but the adoption of biometric systems among residential complexes is rising steadily and is expected to bring in the next phase of growth in 2008.

Also gaining traction are biometric segments like iris scan, middleware, multi-modality, voice recognition and signature verification.

The Indian biometrics market, which mainly consists of access control applications, is used extensively by the Defence and Security industry and fingerprint identification systems by the police administration, is now rapidly moving towards biometric regime.

The finance ministry too has set up an internal group to finalise norms for introducing iris-based biometric Permanent Account Numbers (PANs) for all income tax payers.

Similarly, the Ministry of Home Affairs is toying with the idea of introducing biometrics-based citizen identity cards and even biometric passports. This could be the turning point for the industry which is targeting an over Rs 1,800 crore turnover this year.

Arguably, the cheaper biometric solutions like fingerprint readers are now common on consumers devices like mobiles and laptops. This biometric application contributed more than 70 per cent in revenues to the domestic biometrics market last year.

PCs are safe no longer

Back in 1983, when virus researcher Fred Cohen coined the term ‘computer virus’ - referring to a programme code that can explicitly copy itself and has the ability to affect other programmes by modifying them or their environment - a lot has happened. Viruses of yore have turned into malware, broadly defined as software designed to infiltrate or damage a computer system.

The nightmare does not end here. Mutations of e-worms like Trojan horses, spyware, rootkits, dishonest adware, and other malicious software have crowded the cyber world.

Security vendors like McAfee, F-Secure, Symantec, MessageLabs and others agree that there will be a rise in the number of attacks seeking to capture a user's ID and password by displaying fake sign-in pages.

Analysts have also painted a grim picture about instant messaging (IM). Most web-based IM clients have become quite popular among the Web 2.0 generation. IM features like file transfers and webcam support, make it prone to the virus attacks and 2008 might just be the year for IM attacks in offices or home.

Flash memory

Mainstreaming of flash with several fabs being put into production happened early last year, with a vast majority of these fabs producing flash chips. We saw major technology companies introducing computers without disk drives, with flash being considerably faster and more durable.

With 64GB in flash memory now available, affordable, smaller solid-state disks will be hitting the mainstream in a big way, leading to more crash-resistant and faster laptops. The year 2008 will see flash-based storage making a move towards the datacentre both as a green and a faster access option.

Flash’s main contribution in India would be in making the handheld devices more competitive than the laptop PCs.

Monday, May 19, 2008

Rules to Better Virtual PCs

Microsoft Virtual PC provides facilities to run a complete operating system and hard drive images on top of a host operating system. This is a boon for testing in multiple environments and for hosting providers.However, to run Virtual PC in a most efficient way, we have developed a few rules for a better Virtual PC usage.

read more digg story

Saturday, May 17, 2008

Safety based on radar technology – Audi braking guard - Auto

Audi braking guard forms part of the radar-based adaptive cruise control system, or ACC for short. This system regulates the speed and the distance from the vehicle in front at speeds between 30 and 200 km/h, independently applying the brakes within certain limits in the process. The amount of traffic on our roads is increasing constantly, as is the amount of information that needs to be processed – meaning that the task of driving is becoming ever more demanding. Audi has developed a technology which promises more relaxed, safer motoring: the Audi braking guard brake assist system is designed to reduce the risk of rear-end collisions. It is one of a whole generation of intelligent assistance systems which monitor the area surrounding the car in order to offer additional protection. Audi braking guard is available for the A4, A4 Avant, A6, A8 and Audi Q7 model lines, as well as for the new Q5.The computer is integrated into the vehicle data bus network and is able to communicate with the control units for the engine, automatic transmission and brakes – all within a few thousandths of a second! The entire expertise that Audi has amassed in this field is behind the software’s architecture and detailed design.

read more digg story

Google Introduces Brand New Google Reader For iPhone

Searching through all of those RSS subscriptions on a small screen can be quite a bit of a cumbersome experience, but to make Google Reader for iPhone even better, Google took advantage of the device’s capabilities and released a new beta version designed for the iPhone and other mobile phones with advanced browsers.Visit my homepage ( ) for latest news headlines.

read more digg story

Friday, May 16, 2008

Naming Polygons

What do you call an 11-sided polygon? A 14-sided polygon? Can you give me a list of names of polygons?This answer represents excerpts from contributions made by Prof. John Conway of Princeton University to the and geometry.pre-college newsgroups. For an etymological discussion in the Dr. Math archive, see "Naming Polygons."
When naming polygons, for the "numerical" part of the name, we use the Greek prefixes: mono, di, tri, tetra, penta, hexa, hepta, octa, ennea,
1 2 3 4 5 6 7 8 9
deca, hendeca, dodeca, triskaideca, tetrakaideca, ..., enneakaideca,
10 11 12 13 14 19

icosa, icosikaihena, icosikaidi, icosikaitri, ..., icosikaiennea,
20 21 22 23 29
triaconta, triacontakaihena, ..., triacontakaiennea, tetraconta, ...,
30 31 39 40

pentaconta, hexaconta, heptaconta, octaconta, enneaconta, hecta
50 60 70 80 90 100
Prof. Conway writes:
Antreas Hatzipolakis and I worked out a complete system up to the millions from which this is taken, and which has also been "vetted" by several other scholars. The most important of the reasons which make me prefer the "kai" forms is that they permit these prefixes to be unambiguously parsed even when concatenated, as they are in Kepler's names for certain polyhedra; for example, the icosidodecahedron or (20,12)-hedron, so called because it has 20 faces of one type and 12 of another. Kepler said "this particular triacontakaidihedron I call the icosidodecahedron", a remark showing that he also preferred the kai forms.
John Conway
Names of Polygons 1 monogon (Monogon and digon can only
2 digon be used in rather special
3 trigon, triangle circumstances. Trigon and
4 tetragon, quadrilateral tetragon are alternatives to
5 pentagon triangle and quadrilateral;
6 hexagon the adjectival forms trigonal
7 heptagon and tetragonal are more common.)
8 octagon
9 enneagon
10 decagon
11 hendecagon
12 dodecagon
13 triskaidecagon
14 tetrakaidecagon, tetradecagon
15 pentakaidecagon, pentadecagon
16 hexakaidecagon, hexadecagon
17 heptakaidecagon
18 octakaidecagon
19 enneakaidecagon
20 icosagon
21 icosikaihenagon, icosihenagon
22 icosikaidigon
23 icosikaitrigon
24 icosikaitetragon
25 icosikaipentagon
26 icosikaihexagon
27 icosikaiheptagon
28 icosikaioctagon
29 icosikaienneagon
30 triacontagon
31 triacontakaihenagon
32 triacontakaidigon
33 triacontakaitrigon
34 triacontakaitetragon
35 triacontakaipentagon
36 triacontakaihexagon
37 triacontakaiheptagon
38 triacontakaioctagon
39 triacontakaienneagon
40 tetracontagon
41 tetracontakaihenagon
42 tetracontakaidigon
43 tetracontakaitrigon
44 tetracontakaitetragon
45 tetracontakaipentagon
46 tetracontakaihexagon
47 tetracontakaiheptagon
48 tetracontakaioctagon
49 tetracontakaienneagon
50 pentacontagon ...
60 hexacontagon ...
70 heptacontagon ...
80 octacontagon ...
90 enneacontagon ...
100 hectogon, hecatontagon
1000 chiliagon
10000 myriagon
The "gon" has an interesting etymology: it is ultimately derived from the Greek word "gonu" for "knee", which they transferred to "angle". This word goes straight back to the Indo-European, and is essentially the same in lots of languages: gonu (Greek)
genu (Latin)
k nee (English)

French is similar to Latin here, and German to English (except that the "K" is still pronounced.

Astronomers baffled by weird, fast-spinning pulsar

Astronomers are baffled after finding an exotic type of star called a pulsar apparently locked in an elongated orbit around a star much like the sun -- an arrangement defying what had been known about such objects. The rapidly spinning pulsar -- an extraordinarily dense object created when a massive star exploded as a supernova -- is called J1903+0327 and is located about 21,000 light years from Earth, the astronomers said. A light year is about 6 trillion miles, the distance light travels in a year." The big question is -- how in the heck did this thing form, because it doesn't follow our standard models of how these things form," astronomer Scott Ransom of the National Radio Astronomy Observatory in Charlottesville, Virginia, said in a telephone interview on Thursday.
This object is known as a millisecond pulsar because of its speedy whirl -- it spins on its axis 465 times per second. Until now, all of the ones found orbiting with another star have been doing so with a white dwarf, another type of dying star. In each case, they shared a perfectly circular orbit. But this one has a very elongated orbit around a star similar in size and composition to our sun."What we have found is a millisecond pulsar that is in the wrong kind of orbit around what appears to be the wrong kind of star," astronomer David Champion of the Australia Telescope National Facility said in a statement. "Now we have to figure out how this strange system was produced."
Pulsars are a rare type of neutron star whose strong magnetic fields channel lighthouse-like beams of light and radio waves that whirl around as the star spins.
Typical pulsars spin once a second to about 10 or 20 times a second. But millisecond pulsars spin far more rapidly.
It was detected using a radio telescope in Puerto Rico.

To view latest news around the world... visit my Google Page

read more digg story

Thursday, May 15, 2008

Make more money with adsense

A very interesting ‘make more money with adsense’ success story. The earnings went up about 400% and we do indeed make more money with adsense now!

read more | digg story

Scientists aim to unlock deep-sea “secrets” of Earth’s crust

During the five-week expedition they will use explorer robots to map individual volcanoes on the Mid-Atlantic Ridge tectonic plate boundary – which effectively runs down the centre of the Atlantic Ocean - almost two miles (3km) below the surface of the sea.The work is funded by a grant from the Natural Environment Research Council, which also owns and operates the RRS James Cook.

read more | digg story

Top 10 “top 10 SEO tips” from Google

Click Here to see them in detail...

Sudev Gandhi

read more digg story

Tuesday, May 13, 2008

How To Get Hardware Information Using MS.Net Code

For numerous reasons, you may need to access system hardware information. One example is when you have created a software and you want to put a lock on that software or you want to uniquely identify the a computer. Following article demonstrates how to achive this task using managed MS.Net code. must say its awsome piece of code.

read more | digg story