Pages


Welcomes you for the new dimension of career

Welcome for the new dimension of your academic, personal as well as career exposure. I am very glad to be a part of your each and every enthusiastic and energetic step towards your career. I request all the students of various discipline to watch it whenever you have time and give us your valuable feedback. I, on behalf of KSRCE, wish you to share your innovative creation of ideas or knowledge and do healthy discussion about it. The topic may be about bioinformatics, networking, data mining, career choices, Higher studies in abroad, Research, Placement activity, ... and so on.I request you for posting and the healthy discussion on any career oriented topic.
Some inspirational quotes for your life are

"Education is not preparation for life; education is life itself".
"The object of education is to prepare the young to educate themselves throughout their lives".
“Life is relationship"
"Twenty years from now you will be more disappointed by the things that you didn't do than by the ones you did do. So throw off the bowlines. Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream. Discover."

Please mail at it.career.solution2010@gmail.com for posting new topic. - Adhithan.S.V.

Tuesday, November 30, 2010

A.Gowri-II MCA Query - "cyclic redundancy check".

I have one doubt about during the software installation there is occur "cyclic redundancy check".

What is the reason for that?

Kirithika II MCA How to allow users to Run only specified programs in Windows 7

You can allow users to run only specified programs in Windows 7 operating systems. It is up to you if you want your shared computer to allow users to run only specified programs in Windows 7. A shared computer in an office, for example, can be set in the same way if the company does not want the employees to run all types of programs. You can allow the users to run only specified programs in Windows 7 by using the Local Group Policy. However, you cannot do this in the Home editions of Windows 7 as it does not provide the Local Group Policy Editor.
Click on the Start button.
Type “gpedit.msc” in the search box of the Start menu and press the Enter button on the keyboard.
Local Group Policy Editor will open. Scroll down to “User Configuration”, “Administrative Templates” and then “System” on the left hand side of the window pane.
On the right hand side of the window, under “Setting”, navigate and double-click on “Run only specified Windows applications”.
Select Enabled from the window.
Click on “Show” under Options.
The Show Contents window pane will appear. Here you can type the applications you want to let the users run.
After you are done, click on the OK button.
Close the Local Group Policy Editor.

Kirithika II MCA How to allow users to Run only specified programs in Windows 7

You can allow users to run only specified programs in Windows 7 operating systems. It is up to you if you want your shared computer to allow users to run only specified programs in Windows 7. A shared computer in an office, for example, can be set in the same way if the company does not want the employees to run all types of programs. You can allow the users to run only specified programs in Windows 7 by using the Local Group Policy. However, you cannot do this in the Home editions of Windows 7 as it does not provide the Local Group Policy Editor.
Click on the Start button.
Type “gpedit.msc” in the search box of the Start menu and press the Enter button on the keyboard.
Local Group Policy Editor will open. Scroll down to “User Configuration”, “Administrative Templates” and then “System” on the left hand side of the window pane.
On the right hand side of the window, under “Setting”, navigate and double-click on “Run only specified Windows applications”.
Select Enabled from the window.
Click on “Show” under Options.
The Show Contents window pane will appear. Here you can type the applications you want to let the users run.
After you are done, click on the OK button.
Close the Local Group Policy Editor.

Maareswari - II MCA Recent rents in IT

The Burton Group has identified IT trends that will ultimately affect enterprise IT practices and strategy. The trends will also bring business and technology stakeholders closer together, especially where pure economics drive enterprise IT decisions, creating a critical junction in the decade beginning in 2010.

Externalization, consumerization and globalization - Externalization plays an important role in IT economics, prompting value assessments of what capabilities should be treated as commodity. Consumerization reflects the desire for individual choice of devices and applications for maximum personal productivity. Democratization is evident in the rise and importance of social networks within and outside the modern enterprise. Ultimately, these elements converge to reshape the perception of enterprise IT and the traditional career path of the IT professional.

Cloud computing - Over the next several years, enterprise demand will lead to maturity in cloud computing solutions, especially with respect to virtualization techniques, risk management and pricing models. Cloud computing offers some uniquely attractive benefits, but also carries some significant risks. The key to cloud computing is comprehension: Knowing what the cloud is, strengths, weaknesses, risks, and usage and pricing models is important for IT organizations that are looking to use the cloud to create a competitive advantage.

Data center transformation - 2010 marks the start of data center transformation by virtualizing many aspects of the data center and establishing a hybrid of internal and external IT providers. The dynamic data center exposes new methods and external offerings that give IT organizations a way to provide the right level business IT services from external specialized IT service providers, including private and public cloud providers.

Social computing – Adoption of social computing is accelerating in organizations worldwide. As social computing moves from niche to mainstream, enterprises are focusing on empowering worker interactions through social networking and are reporting real value. Enterprises must also plan for these factors shaping social computing in 2010 and beyond: business and cultural drivers, increasing risk and vendor strategies.

Wirelesses everything - With the explosive growth and widespread availability of wireless networking products and services, substantial changes lay ahead for enterprise networks. Greater use of wireless mobile devices owned by employees is causing IT to rethink standard policies of issuing smartphones and even laptop computers to everyone. Employees are increasingly using their own wireless mobile devices, and enterprises must consider mobility as a strategic initiative rather than tactical capability.

Maareswari - II MCA Recent rents in IT

The Burton Group has identified IT trends that will ultimately affect enterprise IT practices and strategy. The trends will also bring business and technology stakeholders closer together, especially where pure economics drive enterprise IT decisions, creating a critical junction in the decade beginning in 2010.

Externalization, consumerization and globalization - Externalization plays an important role in IT economics, prompting value assessments of what capabilities should be treated as commodity. Consumerization reflects the desire for individual choice of devices and applications for maximum personal productivity. Democratization is evident in the rise and importance of social networks within and outside the modern enterprise. Ultimately, these elements converge to reshape the perception of enterprise IT and the traditional career path of the IT professional.

Cloud computing - Over the next several years, enterprise demand will lead to maturity in cloud computing solutions, especially with respect to virtualization techniques, risk management and pricing models. Cloud computing offers some uniquely attractive benefits, but also carries some significant risks. The key to cloud computing is comprehension: Knowing what the cloud is, strengths, weaknesses, risks, and usage and pricing models is important for IT organizations that are looking to use the cloud to create a competitive advantage.

Data center transformation - 2010 marks the start of data center transformation by virtualizing many aspects of the data center and establishing a hybrid of internal and external IT providers. The dynamic data center exposes new methods and external offerings that give IT organizations a way to provide the right level business IT services from external specialized IT service providers, including private and public cloud providers.

Social computing – Adoption of social computing is accelerating in organizations worldwide. As social computing moves from niche to mainstream, enterprises are focusing on empowering worker interactions through social networking and are reporting real value. Enterprises must also plan for these factors shaping social computing in 2010 and beyond: business and cultural drivers, increasing risk and vendor strategies.

Wirelesses everything - With the explosive growth and widespread availability of wireless networking products and services, substantial changes lay ahead for enterprise networks. Greater use of wireless mobile devices owned by employees is causing IT to rethink standard policies of issuing smartphones and even laptop computers to everyone. Employees are increasingly using their own wireless mobile devices, and enterprises must consider mobility as a strategic initiative rather than tactical capability.

Maareswari - II MCA - Planning To Redesign Your Website? Check these Simple Tips

There’s no secret sauce and this redesign was more about implementing the various things I have learned in the last 5 years. I’ll try to cover all the points here as they may help people who are planning to launch a new website or getting a fresh coat of paint for an old site.
1. Old Google Analytics reports helped me determine all the non-English languages that were most popular with visitors. I used that data to order the various languages in the translation drop-down above.
2. All clicks on social sharing tools (like delicious, StumbleUpon, etc) are again tracked via Google Analytics. This helps in keeping the layout less cluttered as we can remove services that are less frequently used.
3. A lot of people still prefer to print pages so there’s a separate print stylesheet that removes all the non-essential stuff from the pages while printing. The same format is available when saving pages as PDF which is another hugely popular option.
4. If you look at the subscription buttons in the top right corner of the page, the RSS readers are placed in the order of popularity using data from FeedBurner.
5. m.labnol.org – The mobile friendly version of the blog is implemented using Google Reader. The difference is that the Google Reader page is rendered inside a frame so you have an easy to remember web address.
6. There’s a dedicated search page powered by Google Custom Search – this makes it easy for people to search DI from the address bar of new browsers like Chrome (see #4).
7. There are detailed pages like About Me, FAQ, Tools & Widgets, Press, etc. These small things do help in converting a casual search visitor into a regular reader. And please don’t feel shy in writing about yourself because nobody else is going to do that for you.
8. Always add a detailed Advertising page to help potential advertisers get an idea about advertising rates and different ad slots available on your website and RSS feeds. I use Google Ad Manager for managing all the direct advertising campaigns.
9. Always create an HTML sitemap of your site that is different from the regular XML sitemap. The whole idea is that search engines should be able to discover all pages on your site within two levels.
10. Common files like CSS, JavaScript and images are now hosted on Amazon S3 – this helps reduce the number of incoming connections (and load) on the main web server thus improving overall performance.
11. I ran a heat map test using CrazyEgg for about a month to determine the right placement of certain section of this site.
12. The blogroll page received a huge response from readers and also helped me build relationships with certain bloggers whom I read regularly but never got an opportunity to interact before.
13. The actual content is served from www.labnol.org while the images are served from another sub-domain at img.labnol.org. Why? Since browsers create only a limited number of connections to one site, serving images from another location probably speeds up loading.
To know how this can be implemented, read these WordPress Tips & Tricks.
14. Divya Manian played a major role in the redesign of Digital Inspiration.
15. Whenever possible, I try adding text captions to images as that helps improve rankings in Image Search engines thus bringing indirect traffic.
16. I moved from Blogger to WordPress about an year ago but didn’t move the old Blogger articles in WordPress since that would break all the organic rankings. Looking at the current traffic on the old blog, I think that was not a bad decision – something you may wish to consider when planning to move to your own domain from blogspot.com or wordpress.com.
17. I take my Google Webmaster Central reports very seriously – Big G is responsible for ~90% of the search traffic.
18. I try to use short URLs (aka post slugs) for articles taking a hint from Matt Cutts.
19. AdSense ads are not displayed on articles for three days from the date of publishing. Thus people who follow the site regularly don’t see ads.
20. The new design uses section targeting and that has definitely helped in increasing the overall relevancy of AdSense ads.

Maareswari - Some facts about C

Learning a language is not all about learning the keywords and functions. It is more about learning about the history and philosophy
surrounding its conception. Only then can one become a true programmer and a true scholar.

History and traditions are what make us what we are.

So…here are some facts about C language:
* C was developed by Dennis Ritchie at Bell Telephone laboratories in 1972.
* It was named “C” because many its features came another language called “B” which itself came from another language called BCPL.
* There is a strong association between C and the UNIX operating system. Derivatives of UNIX like Linux, for example, are predominantly
written in C.
* Many new languages like python, php, etc have been developed in C.
* C is still used extensively in systems programming, games and graphics, and in embedded systems.

Maareswari - How to Customize CTRL+ALT+DELETE Option in Windows 7

Every one must be familiar with the CTRL+ALT+DEL hotkey combination in windows. This combination is used at times when we experience a full system freeze, it brings up the task manager giving access to other options like lock computer, switch user, change password and log off. But most of the times it is seen that we do not use many of these features. These unwanted entries can be enabled or disabled using Tweak CTRL+ALT+DEL Option Tool.CTRL+ALT+DEL Option Tool is windows portable freeware application that allows you to tweak these options easily. Only thing you have to do is run the application and choose the appropriate options that will appear in the CTRL+ALT+DEL menu screen. If you want to change the options you can do it any time just by altering the changes made.

Mareeswari II MCA-A 5 Things You Never Knew Your Cell Phone Could Do

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival.

Check out the things that you can do with it:

FIRST

Emergency

The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile network and there is an Emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly, this number 112 can be dialed even if the
keypad is locked. Try it out.

SECOND
Have you locked your keys in the car?

Does your car have remote keyless entry? This may come in handy some day. Good reason to own a cell phone:
If you lock your keys In the car and the spare keys are at home,call someone at home on their cell phone from your cell phone. Hold your cell phone about a foot from your car door and have the person at your
home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of
miles away, and if you can reach someone who has the other 'remote' for your car, you can unlock the doors(or the trunk).. Editor's Note: It works fine! We tried it out and it unlocked Our car
over a cell phone!'


THIRD
Hidden Battery Power

Imagine your cell battery is very low. To activate, press the keys *3370#. Your cell phone will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your cell phone next time.


FOURTH
How to disable a STOLEN mobile phone?

To check your Mobile phone's serial number, key in the following Digits on your phone: *#06#. A 15-digit code will appear on the screen. This number is unique to your handset. Write it down and keep
it somewhere safe.

When your phone gets stolen, you can phone your service provider and give them this code. They will then be able to block your handset, so even if the thief changes the SIM card, your phone will be totally
useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.



And Finally... .

FIFTH
Free Directory Service for Cells

Cell phone companies are charging us $1.00 to $1.75 or more for 411 information calls when they don't have to. Most of us do not carry a telephone directory in our vehicle, which makes this situation even
more of a problem. When you need to use the 411 information option, simply dial: (800)FREE-411, or (800) 373-3411 without incurring any charge at all. Program this into your cell phone now. This is sponsored by McDonalds.

This is the kind of information people don't mind receiving. So pass it on to your family and friends.

Choose career by yourself

Dear Friends,
It is now the right time for you to select your career, which is on the basis your interest only. So choose your career in which you are interested in. Let me be clear in that.
If you are interested in pointing out errors in a web page or application, then it means you are interested in Testing. Or else if you are good in programming, you can choose Development side. Or else if you are good in hardware side, you can go for networking side to shine your future. To my perception, the following will be nice to choose your career.
1. You do SWOT analysis. (S-Strengthens, W-Weakness, O-Opportunities T-Threat).
a. For example, if you are good in Testing(Strength), you have to think for the milestone of the field(How about the opportunities and how long it will give u good salary). And based on that u have to choose ur career path.
2. Basically to my knowledge, there are 4 lines you can choose.
a. Development
b. Testing
c. BPO
d. Network

So first choose your fiels. Develop ur skills in that field. Try to get certification from a reputed group. Live with that. Surely you will have satisfied life. All the best. Comments are welcome.

Vijay Kumar/Ap/MCA/KSRCE Get prepare for CCNA exams

I have browsed a website labled http://www.freebooksclub.net/certification/ccna-for-dummies-0764506900.html#more-2046. And the contents are nice. Please visit the site and give the feedback through comments.