Sunday, July 31, 2011

ISO 13485 complete douments

ISO 13485 is an ISO standard, published in 2003, that represents the requirements for a comprehensive management system for the design and manufacture of medical devices [1][clarification needed]. This standard supersedes earlier documents such as EN 46001 and EN 46002 (both 1997), the ISO 13485 published in 1996 and ISO 13488(also 1996).

While it remains a stand-alone document, ISO 13485 is generally harmonized with ISO 9001. A fundamental difference, however, is that ISO 9001 requires the organization to demonstrate continual improvement, whereas ISO 13485 requires only that they demonstrate the quality system is implemented and maintained.

Other specific differences include:

* the promotion and awareness of regulatory requirements as a management responsibility. An example of market specific regulatory requirements is 21 CFR 820 Quality System Regulation for Medical Devices sold in the United States.
* controls in the work environment to ensure product safety
* focus on risk management activities and design transfer activities during product development
* specific requirements for inspection and traceability for implantable devices
* specific requirements for documentation and validation of processes for sterile medical devices
* specific requirements for verification of the effectiveness of corrective and preventive actions

Compliance with ISO 13485 is often seen as the first step in achieving compliance with European regulatory requirements. The conformity of Medical Devices and In-vitro Diagnostic Medical Device according to EEC-decrees 93/42/EEC, 90/385/EEC and 98/79/EEC must be assessed before sale is permitted. The preferred method to prove conformity is the certification of the Quality Management System according ISO 9001 and/or ISO 13485 and ISO 14971 by a Notified Body. The result of a positive assessment is the certificate of conformity allowing the CE marking and the permission to sell the medical device in the European Union.

This standard adopted by CEN as EN ISO 13485:2003/AC:2007 is harmonized with respect to the European medical device directives 93/42/EEC, 90/385/EEC and 98/79/EC

Download the ISO standard free for educational purpose only, please buy the ISO standard for any any commerical purpose only

http://www.mediafire.com/file/i8fh4x968fl59vc/ISO13485.pdf

Wednesday, July 27, 2011

Setting your operating system's default mail program

By default, Firefox will use your system's default mail client to send e-mail for the actions listed above. To change the default mail client using your operating system, follow the instructions below.

Windows 7 and Vista

  1. Click the Start button, then click the Default Programs item.
  2. Click on Set your default programs.
  3. Under Programs, click the e‑mail program you'd like to use (e.g. Thunderbird, Windows Live Mail, Outlook).
  4. Click Set this program as default.
  5. Click OK at the bottom of the window.

Windows XP

  1. Click the Start button, then click on the Control Panel icon to open the Windows Control Panel.
  2. Click the Add or Remove Programs icon to open the Add or Remove Programs applet.
  3. On the left side of the Window click the Set Program Access and Defaults icon.
  4. In the Access and Defaults window, click on the Custom radio button to expand the Custom category.
  5. Underneath Choose a default e-mail program, click the radio button next to the program you want to use (e.g. Thunderbird, Windows Live Mail, Outlook).
  6. Click OK at the bottom of the window.


Using webmail services

Firefox allows webmail services (such as Gmail, Yahoo! Mail, Hotmail, etc.) to enable you to use them for Firefox's mail functions. Use the instructions in the Setting Firefox's mail client section above to use a webmail service with this method.

If the webmail service you want to use is not available in the Applications panel of the Options window, you can use an extension to add support to your webmail services:

How to make Outlook the default mail client

If you have installed multiple e-mail programs on the same computer, the e-mail messages may not be sent from Outlook when you send e-mail messages from any non-e-mail program.

For example, if you have Microsoft Outlook, Microsoft Outlook Express, and Netscape Communicator installed on the same computer, and if you send a message in Microsoft Excel, Outlook may not be used to send the mail.

Also, if you click a Mailto: link on a Web page, your system may not open an e-mail message. Or, the system may use a mail program other than Outlook.

When you send a document from a program by clicking Send on the File menu, or by pointing to Send To on the File menu, and then clicking Mail Recipient, the e-mail program that is set as your default Simple MAPI client is used to send the document.

To change the default mail client in Microsoft Internet Explorer, follow these steps, as appropriate for the version of Microsoft Internet Explorer that you are running.

Internet Explorer 5 and later versions of Internet Explorer

  1. Start Internet Explorer.
  2. On the Tools menu, click Internet Options.
  3. Click the Programs tab.
  4. In the E-mail list, click Microsoft Office Outlook.
  5. Click OK.

Internet Explorer 4.x

  1. Start Internet Explorer.
  2. On the View menu, click Internet Options.
  3. Click the Programs tab.
  4. In the Mail list, click Microsoft Office Outlook.
  5. Click OK.

How To Change the Default Program for a Specific File Extension in Windows XP

Knowing how to change the default program that runs when you open a particular type of file can really come in handy, especially for very common file types like many video, graphics, and audio file types.

Windows XP opens only one program for a particular file extension so if, for example, you like your JPEG files to open with Photoshop and not Windows Paint, then changing the default program for JPEG files is exactly what you need to do.

Follow these very easy steps for changing the program that starts when you open a particular kind of file.

Difficulty: Easy
Time Required: Changing the default program for a file extension in Windows XP usually takes less than 5 minutes
Here's How:
  1. Click on Start, then All Programs, then Accessories, and finally Windows Explorer.

    Note: Any folder window in Windows XP will do just fine. For example, if you preferMy Computer, that will work just fine.

  2. Click on the Tools menu option and then choose Folder Options....

  3. In the Folder Options window, click on the File Types tab.

  4. Under Registered file types:, scroll down until you see the file extension you want to change the default program for.

  5. Click on the file extension to highlight it, once you've found the one you're looking for.

  6. Click the Change... button in the Details for the '[file extension]' extension area near the bottom of the window.

    The Open With dialog box should appear.

  7. Scroll through the options in the Programs area and choose the application that you want to open the file extension with when you double-click on the particular kind of file on your computer.

    Note: Chances are, the applications listed under Recommended Programs will contain the most applicable programs for this file type but be sure to look at the applications under Other Programs as well.

    Note: Click  Browse... to search through your computer for any program not listed that you'd like to use.

  8. Click the OK button on the Open With window.

  9. Click the Close button at the bottom of the Folder Options window.

  10. From this point forward, when you double-click on any file with this particular file extension, the program you chose in Step 7 will launch and load the particular file.

    Important: Whatever program used to automatically open when these types of files were launched will still open these types of files. To use another program, you'll just need to start the program manually and then browse your computer, from within the program, for the particular file.

Tuesday, July 26, 2011

How to become SaaS savvy

How to become SaaS savvy

As cloud deployments increase, so too does overall understanding of how best to approach this new computing model and work with service providers.

It's about developing cloud smarts, if you will. The savvier you are about the cloud, the less prone you are to focus only on basics such as cost, back-end infrastructure and security provisions. Yes, even the latter has become a bit of a no-brainer.

"Originally everybody worried about security. But reputable cloud vendors have incredible security stats, and are able to provide potentially much better security than most corporations have right now because of the way they've designed their software," says Julie Smith David, director of the Center for Advancing Business through IT at Arizona State University. She also wrote a recent cloud integration report from the Society of Information Management's Advanced Practices Council.

This doesn't mean that security isn't a critical asking point, but one that's easily enough satisfied with proof of SAS-70 certification and the like, as well as through interviews with existing users, says Dave Strasser, IT infrastructure services director at Sterling Savings Bank, in Spokane, Wash. Strasser recently put Proofpoint, an e-discovery, compliance and e-mail security software-as-a-service [SaaS] provider through its paces. "We look at published success rates of the solution, and validate those with customer references. It's important to make sure what the sales channel at these vendors are telling us is really the same thing as customer experience."

Have the tough talk

On the flip side, Smith David says, as security concerns lessen and enterprises lock themselves in with a SaaS provider, the greater the risks associated with that vendor. "Vendor survivability or changes in vendor strategy are becoming much more important," Smith David says.

As you evaluate providers, you've got to look not only at the here and now, but also weigh potential futures. The idea of being a big fish in an upstart SaaS provider's small pond may be appealing, but what happens if that company gets acquired and suddenly you're a little fish in a big pond? Not only does your influence diminish, but you're likely paying the same rates for less functionality, cautions Smith David, citing the experience noted by a case study subject she recently profiled.

"Because the functionality was in a proprietary data set, the company was unable to transition to a different SaaS vendor. It had picked the original provider because it had some unique capabilities -- and it still has those -- but the risk of vendor lock-in has proven greater than it would have with on-premises software," she says.

It comes down to having the hard discussions with potential providers about worse-case scenarios. "Every time you adopt a new solution you need to have in place a roadmap of how, if the vendor were to disappear or be acquired, you would be able to take your data, transport it to another platform and be back up and running in how much time," Smith David says.

This makes data-integration capabilities -- or partnerships, as the case may be -- a critical discussion point with cloud providers. "The integration is the avenue to do that data extraction and transformation," Smith David notes.

Experienced cloud users agree about the criticality of data integration. "What APIs are available?" figures among the top questions Schumacher Group asks of potential cloud providers, says Doug Menefee, CIO at the Lafayette, La., emergency management firm. Schumacher Group has 85% of business processes running in the SaaS model today and fires up IaaS server instances in Amazon's Elastic Compute Cloud.

"Figuring out integration requirements and how providers handle those and getting everything in sync have been among our tougher challenges," warns Steven Birgfeld, CIO at Hostess Brands, in Irving, Texas.

To date, Hostess uses SaaS-provided benefits, employee portal, lead management and recruiting applications, Birgfeld says. In these providers' cases, he says, "the models are preset and we've had to push our way into what they have."

For example, he says, all the providers need core employee data such as name and address. "We built one extract but then had to tweak that for each of these players -- you'd hope they'd have more flexibility, but in these cases, they didn't."

First comes SaaS strategy

On the SaaS side, IT executives need to be just as shrewd about how they're going to embrace services as they traditionally have been about developing internal architecture standards. The onus of doing so becomes increasingly clear, as SaaS adoptions mature and enterprises realize that long-term success hinges on how well the applications can integrate into their technology architecture, Smith David says.

"You've got to ask yourselves, 'Are we going to go with platform as a service [PaaS] so we can develop custom solutions on top of and pre-integrated with the solutions that we're getting ... or are we going to allow best of breed, where we look for ideal SaaS solutions and then rely on an integration approach to make those work seamlessly throughout the business processes?'" she says. Because most SaaS providers' footprints are limited, many IT organizations today will default to the best-of-breed approach -- and that should trigger a bunch of integration-related questions for potential SaaS providers, she says. The most basic among them is whether they've got data integration services or are partnering on integration, she adds.

Workday, an HR and financial management SaaS provider, offers integration on demand through Enterprise Service Bus technology gained in the 2008 acquisition of Cape Clear. Salesforce has Informatica data integration tools available in the cloud through AppExchange.

What you want to determine, Smith David says, is not only what integration services your SaaS provider offers, but also whether those will be sufficient to work with other partners - to pass data back and between Workday to Salesforce, for example.

What's more, if a SaaS provider has an integration platform, you also have to ask whether it has process modelers so you can specify the rules for your organization, Smith David says. If your first choice doesn't have a process modeler, and you've got in-house integration expertise, you could extend your premises-based tools should your vendor offer APIs through cloud vendors. "Many integration vendors are providing good business process modeling tools that allow businesses to specify the process steps and then have either preconfigured integration adapters that allow those to fire or to have an IT person handle some of the mapping across the systems."

If you don't have resident integration expertise, then seeking out SaaS providers with integration as a service is the wise move, she adds. Smith David uses this example:

Say you need to switch from one SaaS CRM provider to another, for whatever reason, and you're evaluating eight stable providers. "If your integration vendor already has adapters between four of those, then it's easy to say, 'Extract my data out of the current system, transform it, and push it out to my second choice system.' That integration vendor has already done the mapping of fields, the logic and can port data out of one and into another.

"But what if the SaaS functionality is in an area that hasn't matured to the level where there's standard data structures, like in knowledge management? For collaboration, one vendor might use Wikis and the other Word docs updated sequentially. Without the adapters, passing data from one out to another will be difficult," she says.

No standing still

Being cloud smart also means probing into the policies providers have in place for software updates, change control and disaster recovery, cloud users and experts say.

With SaaS, you've got to be ready to accept updates when the provider pushes them out - but that shouldn't mean being forced to use them. "The smart vendors give you the option of turning that new functionality on or off depending on your needs," Menefee says. He says Host Analytics and Salesforce.com are good at this.

Likewise, you've got to understand a provider's change control cycles, Birgfeld says. He cites one example in which Hostess discovered that a SaaS provider's implementation was missing some fields that it required. "It had to make a change on its side and we on our side. We were done in a day or two, but the provider couldn't incorporate those for two weeks because the update would have been outside of its change control cycle -- so that delayed the whole process," he says.

Early cloud experiences also have shed new light on what to ask of cloud providers regarding disaster recovery, Smith David says.

"When we started working with companies two to three years ago, we thought if we argued for offsite storage with nightly backups and escrowed software then we were doing a really responsible job of disaster recovery," she says. "But it turns out that that's not enough in this environment because you're going to have to find an alternate platform quickly should you need to move from your existing vendor to somebody else."

With that in mind, she says, you need to be asking about the data structure and demanding that you can get access to the data from your own facility and not just from a third-party off-site location.

"If your SaaS goes out, there may not be any place to put that data. Going and getting it out of some secure facility isn't going to help you if you can't use it on your systems," Smith David says. "We've worked with companies that have gotten data dumps from their SaaS providers that weren't even in a data structure that any of the databases they have can read. So they get a file, they have the off-site backup but it's data that's absolutely unusable to them."

What you want from your SaaS provider is the ability to extract your data and do your own local backups at least once a month, but perhaps more often, depending on how critical that data is, she advises. You need to be sure you can use and manipulate the data should the need arise, she adds.

Such cutover plans have begun working their way into SaaS service-level agreements, Smith David says. "However, I haven't worked with any companies that have used those yet, so I don't know how effective they'll be. Still, that'd be something I'd definitely be looking for during my negotiations with SaaS vendors."

How To Document in the Cloud

There's never been a good excuse for not commenting code or documenting systems, even though these practices are every bit as helpful to cost and quality as test-driven development. But let's face it, documenting systems isn't exactly macho and besides, it doesn't give you the ugly job- security of unmaintainable code (take a look at this page for some terrific worst-practice suggestions).

Working in the clouds, unfortunately, can give developers a new excuse: "I don't have any access or control over that (public-cloud) service, so I can't document anything about it."

Uh-huh. So, call their bluff this way: all consumers of a (public or private) cloud service need to document what the service does, how it's used, and what behaviors (including bugs and error conditions) that the consuming side uses or depends on. Immediately, the whine will come: "but that means we have to document the same cloud service in every module we use it." To which your response should be, 'Put your documentation info in a Wiki, a Google doc, or other collaborative system that the entire development and integration team can access."

This pushes everyone toward the best practice for the external interfaces and dependencies of modules and services: a centralized repository whose content is created and maintained by every member of the development team -- as distributed as they may be. In my experience, the alternative of having a centralized team responsible for creating and maintaining data dictionaries, entity-relationship models, business-process descriptions, or interface documentation produces only two things: an excuse for not doing documentation or, at best, obsolete or often incorrect tomes.

But is a Wiki the best place to document the internals of a module or the administrivia of a variable? It's not a bad idea, but most of the time developers just won't be in the documentation area while they're hacking code or tweaking a variable inside an app. When they're working in their code, in-line commenting must not just be encouraged: it must be measured. For the code we develop, we don't allow any module to be checked in to the system unless at least 10% of the lines are explicit comments, and another 10% of the lines have in-line remarks. The inline code requirement goes double for test modules, as it can be difficult to guess what a particular routing is testing for, and where to look in the module under test when there is a failure. Your code integration system may already have counters and enforcement mechanisms for this, but if they don't you can typically script it to do so.

In some Cloud apps and frameworks there are scripting, workflow, and formula languages that don't natively support comments, but there's always a way to plant comments via with inoperative code fragments containing the documentation message (e.g., IF 0=1, "The comment goes here -- maybe as long as 80 characters").

So we've removed all the excuses for not commenting code. In modern Cloud based applications, though, much of the action is isn't in code: it's declarative programming and custom fields/objects/relations. Here, too, document-as-you-go must be explicitly measured with incentives for both the developer and administrator. In systems like Salesforce.com, every new field has two opportunities for self-documentation: the description area, and the help-bubble information area. I encourage both to be used, with different information in each. If a cloud system doesn't have this, we use dummy fields with names that shadow the real field, adding metadata information in a human-readable way. For example, for the numerical field "salesteam" we'd add a text field "salesteam" and set the default value to descriptive text. If your system doesn't support extended-ASCII in the field name, use a punctuation mark like { or ¡ that forces the variable name to come at the end of any alphabetized list. If your system doesn't support default values for text fields, you'll have to embed as much intelligence as you can into the dummy field name.

What about self-documenting the messages that go between modules? With WSDL or other XML dialects, you can put lots of metadata into the XML itself, or into supporting DTDs. While these can be verbose and arguably slow system response times, most of the time the extra overhead is barely noticeable. When you're making a call to the Cloud directly from your code, the libraries that actually form the REST or SOAP messages typically won't let you control much of what goes over the wire. In this case, sending an extra information-only text variable or two in the outbound request will make both troubleshooting and learning curves a lot easier in the long run.

The bottom line: even though the cloud doesn't force any documentation or make it any easier to enforce, there are clever ways to use cloud app features and Web service protocols to make modern systems more self-documenting. Call it sky-writing, and enforce it in your next cloud project.

The Microsoft/Android war: Which patents are at stake?

You may already know Microsoft has forced five Android vendors to pay royalties each time they ship a device, and is suing Motorola and Barnes & Noble in cases that claim Android steals Microsoft intellectual property.

Exactly which patents are supposedly violated by Google's Android mobile OS? Microsoft isn't revealing the details in cases settled without a lawsuit, including agreements with HTC, Velocity Micro, General Dynamics, Onkyo and Wistron.

against Barnes & Noble detail more than a dozen patents Microsoft claims Android devices violate. Let's take a look first at a Microsoft complaint filed Oct. 1, 2010, with the U.S. International Trade Commission, which describes nine patents Motorola allegedly infringes upon. But legal documents filed last October in the ongoing case against Motorola and in March of this year.

Patents 5,579,517 and 5,758,352, issued in 1996, "relate to implementing both long and short file names in the same file system," Microsoft says. The complaint goes on to mention the FAT16 file system used by MS-DOS and early versions of Windows

Microsoft claims the Motorola Droid 2, the Droid X and numerous other Motorola Android phones violate these and other patents.

Next on the list is U.S. Patent No. 6,621,746, which was issued in 2003 and relates to a monitoring system that determines when to erase data from flash memory devices.

PATENTED: Microsoft patents 'record button on a computer system'.

Microsoft's Patent no. 6,826,762 from 2004 covers APIs related to cellular technology, including one that lets applications "issue commands without needing knowledge of the cellular telephone's underlying radio structure and without needing specific knowledge of the radio network's specific commands."

More patents include:

• No. 6,909,910 from 2005 for "managing changes to a contact database."

• No. 7,644,376, issued in 2010 to cover an API that lets mobile apps learn about state changes in the device.

• No. 5,664,133 from 1997 covering "context sensitive menu system/menu behavior," known more generally as a graphical user interface that lets users "quickly and easily select/execute the desired computer resource."

• No. 6,578,054 from 2003 covering online and offline transmission of data through methods that "eliminate data transmission and allow multiple copies of data to be synchronized via incremental changes."

• No. 6,370,566 from 2002, with the self-explanatory title, "Generating Meeting Requests and Group Scheduling From a Mobile Device."

Microsoft goes on to claim Motorola "unlawfully sells... devices, associated software, and components thereof that infringe the Microsoft patents," and even that "Users making routine use of the Motorola products also infringe the Microsoft patents."

In supporting documents, Microsoft details aspects of the Motorola Droid 2, noting the existence of flash memory, a calendar and other characteristics that Microsoft claims violate intellectual property. The patents are also detailed in Microsoft's complaint against Motorola in the U.S. District Court in Seattle.

Moving on to the complaint against Barnes & Noble, Microsoft claims the Android-based Nook e-readers infringe on five patents. These include:

• No. 5,778,372 from 1998, titled "Remote Retrieval and Display Management of Electronic Document with Incorporated Images," covering a browser that initially displays electronic documents without background images so they can be loaded more quickly.

• No. 6,339,780 from 2002, titled "Loading Status in a Hypermedia Browser Having a Limited Display Area," referring to a temporary graphic element that displays while a browser is loading content.

• No. 5,889,522 from 1999, titled "System Provided Child Windows Controls," covering a dynamic link library for implementing window controls in an operating system.

• No. 6,891,551 from 2005, titled "Selection Handles in Editing Electronic Documents," a method of highlighting and selecting elements in documents with the ability to resize and drag selections.

• No. 6,957,233 from 2005, titled "Method and Apparatus for Capturing and Rendering Annotations for Non-modifiable Electronic Content," letting users select objects on pages they otherwise cannot edit, and storing annotations "separately from the non-modifiable portion of the file."

Clearly, Microsoft is asserting a broad range of patents against vendors that build Android-based products. In addition to suing Motorola and Barnes & Noble, Microsoft is reportedly demanding $15 from Samsung for every Android smartphone it sells.

Although a quick summary of these patents may make the technologies seem vague or obvious, Microsoft has to prove that products infringe all aspects of a patent to win in court. Given that a deep-pocketed vendor like HTC already settled with Microsoft and is paying Redmond each time it sells an Android phone, it would seem Microsoft's lawyers can be quite convincing.

India starts blocking file storage websites in a move against piracy

File storage websites such as Megaupload, Putlocker, Rapidshare are being blocked in India.

A thread started on a popular online forum focused on developments in Indian broadband has furious and surprised users sharing a list of websites blocked by their Internet service providers. Going through the thread and my Twitter interactions, India's Department of Telecommunication is behind the block.

Some users say they are not able to browse the file uploading websites, others say they can access and download content. A screenshot shared by Sunny Chahal on Twitter confirms that the block is in effect. Some other users are seeing the same notice. The error message:

Users of popular Internet Service Providers MTNL, BSNL and Airtel have confirmed seeing the same error while visiting some or all of the following websites:

Megaupload.com
Mediafire.com
Megavideo.com
VideoBB.com
Novamov.com
Movshare.net
Rapidshare.com
Putlocker.com
Hotfile.com
Fileserve.com
Filesonic.com
Filesonic.in
Depositfiles.com
Wupload.com

The decision behind banning the websites looks like piracy. Most of these websites are widely used to  share content production houses and record labels would want users to pay for. Users are comparing the ban to Internet rules in China. The Department of Homeland Security in the US also made definitive moves against piracy by seizing domains of websites hosting pirated content.

As of now there is no official word from the DoT, the story will be updated as we get more information.

(hat tip to @kalpik for the headsup.)

Update: Reliance BIG Pictures obtained a court order to get the sites banned. Users are reporting that most of these websites are now working.

Files Sharing Sites Blocked In India Because Reliance BIG Pictures Got A Court Order

File sharing websites have been blocked in India since yesterday on some ISPs because Reliance BIG Pictures got a "John Doe" order allowing them to service cease and desist notices on movie pirates pirating the film Singham, Mahesh Rangathantan, COO at Reliance Entertainment, told MediaNama. Singham is releasing in theatres tomorrow. What is unique about this order through, according to Big Pictures VP (Music and Anti Piracy) Sanjay Tandon, is that it also covers Internet Service Providers, and not just people selling pirated DVDs or cable operators. "A John Doe order is given against unidentified people, because the copyright owner doesn't know who is going to infringe. We anticipate that certain entities are going to infringe, and the Delhi High Court has granted us a John Doe order," Tandon said.

Yesterday, Airtel Broadband users reported that several file sharing websites like MediaFire had been inaccessible,and a notice was displayed, stating that the site has been blocked on request of Department of Telecom. A traceroute search suggested that the block was instituted at Flag Telecom. Our readers also indicated that with certain other ISPs – Zylog and MTNL Triband – the file sharing sites were not accessible.

Tandon said that the order doesn't necessitate blocking an entire website, but only that ISPs should not make the film Singham accessible: the order only pertains to the access of the film. "Our only appeal with this order is that you cannot make the film available through your network. It's a matter for the ISPs to look into,because it becomes their liabiltiy."

Our Take: What About The Rights Of The Customer?

So here is what appears to have happened: the court order apparently allows Reliance Big Pictures to ask ISPs to ensure that Singham isn't pirated, and since the only the ISPs cannot ensure or monitor individual instances of piracy, they appear to have gone ahead and blocked the filesharing sites, probably deciding that it's better to be safe than sorry, and ended up throwing out the baby with the bathwater.

This reminds me of the 2006 blogger block, wherein instead of blocking sub-domain pages, on orders of DoT, the ISPs completely blocked blogger, typepad etc.

In this case, by blocking access to these sites, the ISPs appear to have ensured blocking of legitimate file sharing as well.

What can be done about it? Frankly, I don't know. The question that you have to ask yourself is – as a customer of an ISP, what are your rights, and is the ISP liable for preventing your access to the world wide web? The court order in this case apparently doesn't direct ISPs to block filesharing sites in their entirety. By going beyond the apparent mandate of the court order, aren't your rights being infringed upon? What gives an ISP the freedom to do that?

Unfortunately, unless someone takes an ISP to court, I suppose we will never know.

What if Chromebooks were made by Apple?

If my calculations are correct (because I'm that big a nerd), the new 11″ MacBook Air I ordered will be coming into the Memphis FedEx superhub any minute now. Again, because I'm pretty nerdy, I was surprised to not see the typical Shanghai to Anchorage leg for my laptop (and a few thousand other Apple, HP, and Dell products that fly out of Pudong International every day). After all, FedEx invested heavily in Anchorage because of the ability to fly cargo through it easily with relatively short hops from most of the developed world (short hops=less fuel=more cargo). Then I saw it. One of FedEx's relatively new Boeing 777 extended range cargo jets, FDX Flight 90, now flies direct from Shanghai to Memphis.

Why do I share this shameful little story of geeky, gadget lust-driven OCD? I like Apple products, but I'd hardly consider myself a fanboi. If I'm a fanboi of any type, it's of the Google variety. Because I'm hardly the only one that Apple manages to lure to sights like FlightAware and FlightStats in the hopes of seeing just where that particular bit of Jobsian goodness might be on its journey to my laptop bag. Which, by the way, probably needs updating to accommodate my new diminutive computing companion.

A quick search for Shanghai to Anchorage flights yields almost exclusively results for people wanting to track their Apple shipments. People are really passionate about their Apple products, even if they're not particularly passionate about technology.

A little update, by the way. FedEx Flight 90 just landed in Memphis and my FedEx tracking status just updated (they sit side-by-side in a couple of browser tabs). My Mac is in Memphis: Boeing 777-200LR/F (long-range freight) to the rescue. Alaska no longer stands between me and Apple hardware. Just a 13-hour flight straight to the continental US, a mere single time zone away. So for those of you who just couldn't resist an updated Mac and live somewhere near the east coast, Flight 90 is your friend.

The point of all of this is Apple's ability bring out the inner gadget junkie in many of us represents something of a secret sauce. Compelling products + reality distortion field + short upgrade cycles = geeks who refresh their FedEx tracking pages a bit too often.

The MacBook Air that has me all a-twitter is really the ultimate netbook. Full-sized backlit keyboard, virtually instant on, and basically the size of an iPad. Oh yeah, and a Core i7 processor to boot. Google's Chromebooks actually fit the typical usage of a MacBook Air pretty well and the two have been compared ad nauseum. And yet, when it comes down to it, I bet there aren't too many people, no matter how geeky, tracking the whereabouts of their Chromebooks literally to the second as they near their destination.

I love my Chromebook and I think that Google has done something very cool with Chrome OS. If you live in the browser, it's a great tool and the business and educational applications are extensive. And yet, one of the more innovative products to hit the PC market in a long time landed on American shores with something of a sigh. Now if Apple had made a browser-only product, with great hardware and a brilliant screen, done something cool with an offline mode, and applied their marketing muscle, people would have been tracking their Safaribooks (I just made that one up) with the same zeal they apply to iPads and MacBooks.

The point? The Chromebook concept rocks. The implementation? It has a ways to go. The marketing? Well, let's just say that it's too bad the Apple folks don't talk to the Google folks very much anymore. They might learn a thing or two from each other.

An Apple/HTC patent deal could signal big trouble for Android

HTC has indicated that it is prepared to negotiate with Apple over the ongoing patent dispute. But will Apple choose to settle? And if HTC and Apple do settle, what does this mean for Android as a whole?

Earlier this month the ITC (International Trade Commission) ruled that HTC was infringing on two of Apple's patents. That's a big deal for Apple, but it's also a big deal for the Android platform as a whole since it is likely that these patents apply to every Android device out there. That's a very big deal.

Now, if this was the state of play then HTC would be in big trouble. Fortunately the company has an ace up its sleeve. Earlier this month HTC announced a $300 million deal to buy S3 Graphics, an announcement that came just days following S3 winning an ITC ruling against Apple over two compression technology patents.

So HTC has some big guns of its own, and it's willing to come to the table with Apple to sort things out:

"We have to sit down and figure it out," Winston Yung, chief financial officer of the Taoyuan, Taiwan-based company, said by phone today. "We're open to having discussions."

So HTC isn't defenseless after all. If HTC didn't have any patents to fight Apple with, it's likely that Apple wouldn't choose to settle (after all, it's not like the company needs the cash and collecting nickles and dimes in patent loot would bust be a drop in the cash ocean). But given that HTC has something that Apple wants (at least it'll be HTC's when its buyout of S3 is complete) then a settlement seems far more likely.

But, remember how those two patent ruling that Apple won against HTC most likely extend to all Android devices out there. If Apple and HTC can reach a deal through both having technology that the other side wants to license, where does that leave all the other OEMs out there? Also, where does that leave Android?

In trouble, that's where it leaves them. If I were an Android OEM I'd be spending some time examining my patent portfolio in the hope that I can either find something that Apple might be infringing on, and then launching a infringement claim (and hoping that the HTC agrees with me), or looking for some patent that might be of interest to Apple. An Android OEM that doesn't have technology that Apple is infringing on (or just wants) is in serious trouble.

Oh, and remember that Android as it is at the center of 49 federal and ITC infringement suits, so it's likely that things are going to get worse before they get better.

List of all of the new Windows Phone 7 Mango features

I've just compiled a relatively long list of all the most important new features that are going to be introduced with Windows Phone 7 Mango later this fall. Some features are still probably missing either because they haven't been announced yet or because I forgot about them so feel free to let me know in the comments and I'll update this list. You will notice that there's obviously less that 500 features which is the official PR claim. Unfortunately Microsoft isn't saying what is exactly counted as new feature so I'm going to guess that it's mix between some of the new APIs and end-user functionalities. Hit the break to check the most important features:

Last Updated: July 26 2011

People, Messaging, Outlook:

- Twitter, LinkedIn, Viadeo integration in the People Hub
- Groups: Organize contacts by groups which can also be pinned on the start screen
- Contact cards now include all the contacts conversation history (sms,mails,mms etc..)
- Facebook Places check-in support
- Windows Live Messenger and Facebook Chat integration
- Threads: All messaging communication organized in a single thread (IM+SMS/MMS)
- Threaded email conversations support
- Outlook Tasks support: via Exchange. Tasks / To-Do's are then located in the calendar
- Facebook events integrated into the calendar
- Linked mail accounts: Multiple email accounts can be combined and linked into one inbox.
- Built-in voice-to-text/text-to-voice functionality, which will allow for hands-free texting or chatting.
- Server Search (Exchange)
- Complex (alpha-numeric) password support
- Information Rights Management support for protecting e-mails and Office documents
- Outlook Out Of Office replies support
- Visual Voice Mail: depends on carrier support

Bing:

- Bing Vision: barcode (US only), covers (US Only),DVD/CD/BR scanning (US Only), QR Code ,MS Tags and OCR text translation
- Bing Audio / Music Search; Shazam like audio search
- Bing Local Scout: Around me business locator
- Bing Quick Cards: Product/Media information, reviews
- Bing Maps: Indoor Maps (US Only) (Video demo)
- Bing Search: Image search results
- Bing Search: Extras / App Connect
- Bing Maps: Turn-by-Turn navigation Voice guidance
- Bing Maps: Submit correction for POIs to Microsoft directly from the handset
- Color dithering applied to Bing Daily image

Office Hub:

- Skydrive and Office 365 documents syncing. (PDF supported but Adobe PDF app required to view them)
- Share Skydrive hosted content over email, SMS and chat (Messenger / Facebook)
- Excel Mobile now supports Sum function
- Microsoft Lync support via downloadable application

Pictures Hub:

- Direct access to the camera roll
- People / Groups photo gallery (Skydrive and Facebook syncing)
- People tagging in the photos (Skydrive and Facebook syncing)
- Photo Auto-Fix: Automatically improves sharpness, brightness etc..
- Picture Hub Tile is now animated
- Video sharing via MMS and Email
- Video uploads to Facebook and Skydrive (upload is done in the background)

Music & Video:

- Zune SmartDJ Mix support
- Artist picture now displays on lock screen when music is played
- UI change of the media controls on the lock screen
- Re-located playback controls
- Re-located Shuffle / Repeat controls
- Ability to re-size video aspect-ratio during playback
- Single music track repeat without having to pin it on the start screen
- Podcast downloads / Subscriptions (US only)
- Open / Play media content by voice
- Improved artist images
- Improved History and New
- Better data management for Zune Pass subscribers: shows current data consumption
- Ability to create music playlists directly on the phone
- Improved color dithering in the video player
- Ability to scrub/seek in videos via the timeline

Marketplace:

- Revamped Marketplace UI and search
- New categories

Camera:

- Disable/Enable Shutter sound
- UI changes (new icons + added arrow icon on the lower left of the viewfinder to indicate camera roll)
- Settings are now saved when the Camera application is closed
- Smoother 720P video recording
- Touch Focus Touch the screen to trigger the camera shutter
- Front Facing camera support

Xbox / Games hub:

- Re-designed games hub
- 3D Avatar
- Avatar customization is now integrated in the Hub
- Friends and achievement now integrated in the hub
- In-Game purchase API
- Improved game request notifications
- Improved Spotlight content
- Improved Xbox LIVE messaging
- Edit your profile
- Improved Spotlight Content

IE9 Mobile:

- Hardware accelerate HTML5 rendering
- Support for HTML5 video playback (through the native media player) and Background Audio Streaming
- Geolocation
- New JavaScript Engine and support for CSS3
- New UI with URL bar at the bottom of the screen
- URL Bar and UI now available in landscape
- Color dithering is now enabled in the browser and Browser control

Other OS changes:

- Third party applications Multi-Tasking and fast application switching
- Battery Saver: Enabling this feature will allow the phone to automatically disable power consuming services and applications running in the background.
- Hardware search button will now always access Bing Search. A search Icon is now added in the native apps to search in them.
- Ringtone manager
- Search icon and Jumplist added to the application list
- 16 new languages supported
- East-Asian hand-written recognition
- New on screen Keyboard with support for new languages and emoticons
- New Live tiles (can have content displayed on the front and back)
- Live Tasks and Background agents
- App Connect: Deep linking into third party applications. A specific application feature can also be pinned on the start screen
- Hidden WiFi network support
- Optional 32bit color support for Silverlight applications
- Silverlight 4 support with all of its 1500+ APIs
- Silverlight + XNA support in the same application
- Raw Camera feed access
- New Sensor API (Compass, Gyro, Accelerometer)
- New Listbox control with improved scrolling performances
- New WebBrowser control uses IE9 rendering engine
- Clipboard API
- Hardware accelerated video decoding in the Mediaplayer control
- TCP/IP Sockets support
- SQL Compact 4.0 engine Embedded Database
- Background file transfer
- Generational Garbage Collector
- NEON/SIMD support for XNA applications
- Qualcomm MSM7X30 and MSM8X55 SoCs support
- XNA games are no longer limited to 30fps (info)
- Phone shutdown confirmation: long press on the power button and then slide down the screen to shutdown

Five Communication Mistakes That Are Holding You Back

There’s just something about communications that’s harder than it should be.

Of all the skills we develop as leaders and professionals, communicating is one that we’ve been practicing since birth. And yet it often gets in our way, causes stress, and leaves us at a loss. We too frequently miscommunicate, obfuscate the point, cause an unintended reaction, or avoid a messy discussion altogether.

Who hasn’t left a conversation thinking, now that didn’t go like I wanted it to?

The comforting news is that it’s a universal struggle, with few escaping unscathed. Remember watching in dismay as BP’s then-CEO Tony Hayward stumbled through a series of awkward public conversations after the Gulf oil spill, trying to empathize by saying, he too, wanted his life back?

Just this month Juniper’s stock fell 10% after the CEO’s evasive comments made investors jittery. If we jump to the political side, it’s a gaffe-a-minute watching the debt ceiling debate play out — and that’s without Anthony Weiner to kick around anymore.

And these are professional communicators!

Luckily, for most of us, millions don’t witness our communications mishaps. In my book, Power of Presence: Unlock Your Potential to Engage and Inspire Others, I discuss the common communications mistakes that professionals make that have a major impact on their performance. These communications pitfalls affect your ability to execute, influence, be heard and understood. They also undermine your executive presence.

The good part is there are easy fixes to each of them, and noticing is half the battle. Read on and see which ones resonate for you.

1. Failing to ask for clarification.

This comes up in my work with executives, and it’s evidenced across levels. We walk around with a lot of confusion about what we’re actually supposed to deliver that can be clarified if we simply ask.

Whether it’s a CEO who doesn’t know what the board wants to see at the board meeting, or a junior employee who doesn’t understand what the boss wants in a pending report, the rationale is the same: nobody wants to look incompetent in front of authority. So what happens? We waste time guessing, miss the mark too frequently, and create more work for everyone.

By the way, this works the other way as well. Managers doing the delegating don’t clarify with employees because they’re worried they’ll be micromanaging or quashing creativity. Most employees would rather take a few extra minutes to be clear, and save lots of time and energy to get it right the first time.

FIX: If you don’t understand what success looks like, ask for clarification, specifics or examples. If you ask well-informed questions, you’ll look a whole lot smarter than if you execute incorrectly.

2. Not framing your remarks at the appropriate level.

People at different corporate levels require different levels of granularity, and in general, the higher up the audience, the less detail you should be providing. The CEO of a company needs to know a little about many functions, whereas a functional manager needs to be deep in the weeds of his division. It’s a critical skill that’s also called “top lining,” or pulling out comments that are aimed to the appropriate level for your audience.

Frequently, executives get tuned out when they report to higher levels and provide too much detail about their topic. Conversely, if you’re speaking to a lower level in the organization, you have to be more detailed about what matters to that group. (Not as BP’s Hayward did, discussing what mattered to him — his own personal discomfort.) Professionals who can speak at the level of their audience, and address what the audience needs to know, exude presence and good judgment.

FIX: Cater your comments to the highest level person in the room, and address what he or she will find valuable. Put the details in an appendix or have them ready so they’re available, and you can easily pull them out if asked.

3. Littering your speech with qualifiers.

You can leave much of your power and influence on the table just by using qualifiers such as “I think” or “we might” or “I hope to” before your points. It shows confidence to commit and put a stake in the ground. Consider the difference between “I think we’ll hit our goal” and “We will hit our goal.”

As a bonus, what you declare is more likely to happen. In our CYA culture, it may feel uncomfortable to be so resolute when hedging is the norm. Therein lies its power. And besides, you’re just as responsible for the commitment anyway.

FIX: Start paying attention to how you use language, and if you’re hiding behind qualifiers. Tape yourself or ask a colleague to take note of when you use them, and find a comfortable phrase to replace them such as “I plan to” or “I will.”

4. Being negative to appear analytical.

In any organization, this similar dynamic plays out: one person throws an idea on the table and others jump in to pick it apart. There’s a cultural norm that smart people have an analytical ability to point out potential hurdles. Hence if you want to appear smart, you start by going negative.

This norm serves a great purpose in that bad ideas can be debated and debunked. However, it also kills a lot of good ideas as well. Negative is a default approach. (And let’s face it, people aren’t 100% behind what they’re saying anyway because they haven’t thought about it all that much.)

On a personal level, this approach can get carried too far, and people get labeled as difficult, negative, or the catchall having a bad attitude. While we appreciate analysis, we also want our colleagues to be supportive.

FIX: Stop yourself from first pointing out what’s wrong in a situation, and make it a habit to jump to what’s right instead. If an idea is simply rotten, say how much you appreciate the thought or effort, and explain why you feel it falls short and how it can be improved. If you kill it, provide an alternative.

5. Being overly agreeable.

This is the opposite side of the continuum, and occurs when we want so much to be a likeable team player that we come across as a yes person. Every idea is great, each deadline is possible, and new projects are all upside. This happens frequently in professional services relationships when enthusiastic sales people agree to a client’s unrealistic expectations, only to have the account people cringe at their impossibility.

Of course you know how this plays out, we often can’t achieve what we signed on to do, or deadlines are missed because we’re overextended, and our credibility is damaged. The intention, to be a good colleague, is an honorable one. However, what people respect is honesty.

You’ll build more trust and admiration by being truthful to yourself, and others, by saying maybe or no when that’s the best answer. (Body language tip: continuous head nodding gives the impression of being too agreeable as well.)

FIX: When you find yourself tempted to state agreement even though you don’t feel it, express your true opinion. You can still say this politely, and rather than simply say what you can’t do, let the person know what you can do, and believe to be the best solution for all.

These are a few career-limiting communications behaviors I see in my work, but there are certainly plenty more. What communication missteps have you encountered, or learned to improve? I’d love to hear about them.

Monday, July 25, 2011

Airtel Broadband Review pune

Airtel Broadband.

I have been a Airtel Customer for 3.5 years, And I am leaving the connection. when I had selected the connection, I required a decent speed and ok-ok service.

But later during the years, there was always an arguments during each six monthly renewal of the services with Airtel.

There are constant billing problems with them.They try to inflate the bill by all the means by either extending the month and charging me on as is prorata. Or worst they include the a pack for the speed on demand. For nullifying the charges, they took nearly 06 months.

Gradually I matured with the Airtel connection and required more FUP but the Airtel had no intention of providing the same.

Later, the services where quietly withdrawn like home bill collection and technical support. Then it was so bad, that I paid 850 bucks a month for broadband connection which had so much restrictions (like fup of 10 GB, uploading will be calculated, you pay us money now,you have activated speed on demand, you call too much) that I could not move ahead with them.

The Airtel people are such that they may deploy thousands of sales man/ MBA students for the sake of the sales. But when it gets to serve a mature customers, these people fail.

Also the funniest part with them is one lady with them states that the airtel provides a connection of 512 kbps and not 64kb DOWNLOAD, she did not knew the difference between the bit and byte.

Also their retention team are quiet funny regarding the various reasons for the retenting the Airtel connection.

In the end, I have an advice for the Airtel, grow up as the customers have with you. And stop marketing your self as a premium service as you do not have the same with you. I am not paying 850 for 500 rs connection and be waiting in the line for the paying the bill or wait for the 03 days for fault repairing.

How to install Hathway Connection with Wifi router

Hathway has good schemes and reasonable bandwidth.

I have just installed Hathway connection in my home. and have install the same over the network.

I have installed the same on Linksys WRT-54GH.

open the wifi router page in an browser, by going thru 192.168.1.1 then search for the cloning tab.

Press the clone the MAC id tab.

The router will have a internal mac as the computer attached.

simply plug the lan cable from the hathway modem to the router WAN port, it will start working.

If the computers on the network experience a very slow speed, simply call the hathway call center number and keep account number handy for the call center personnel.

during the call, keep the apparatus on computer+router+hathway cable modem

They will detect and adjust the MAC as per the setup.

All the computers on the network will start sharing the same internet connection.

If you have any questions, please post the same below.

How to import mails from the Rediffmail to other mails

Rediffmail is famous e-mail service provider in India. Rediffmail provides fastest mail. It provides unlimited space for mails. You can forward all mail from rediffmail.com to your Gmail account.

For forward automatically all mails from rediffmail follow following instruction .

(1) Go to My Setting.

(2) Click On Option

(3) Click On Forward Mail Option

(4) Write your another email (Gmail, Yahoo, MSN or any other) in box on which you want receive mails of rediffmail.

(5) Click on “Submit”.

Now you can get all mail of your rediffmail on other mail account.

THIS THING IS A BIG LIE!! REDIFFMAIL HAS REMOVED THE OPTIONS FROM THE SETTINGS.

THE ONLY THINGS WORKS IS IF YOU PAY TO THE REDIFFMAIL.COM 400BUCKS...

I AM QUITTING THE REDIFFMAIL SERVICE ASAP.

IF ANY ONE HAS A SOLUTION PLEASE MENTION THE SAME ON THE LIST

I hate Rediffmail

I hate Rediff mail!!
I hate Rediff mail!!
I hate Rediff mail!!
I hate Rediff mail!!

I do not like the rediff mail service, the website or the mail service. the servers are slow and their professional service also sucks.

Please rediffmail repair the interface, for god sake the interface is so poor. The new rediffmail look has such a requirement for the bandwidth, it is better to load the basic html version.

Both the mail interfaces are so poor and they know about the same. they allow to open the new mail ids for free, but do not allow people to move their mails from the account to some other account, they suck.

They ask for money for the POP services and in fact I have used their professional services,and to you the truth they are hell to work with.

Rediff mail allow people to move their mails from your old mailboxes which do not have the search or anything other facilities in them.

I hate Rediffmail!!
I hate Rediffmail!!
I hate Rediffmail!!

Medical devices — Quality management

ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electro technical Commission (IEC) on all matters of electrotechnical standardization.

This International Standard specifies requirements for a quality management system that can be used by an organization for the design and development, production, installation and servicing of medical devices, and the design, development, and provision of related services.

It can also be used by internal and external parties, including certification bodies, to assess the organization’s ability to meet customer and regulatory requirements.

Information marked “NOTE” is for guidance in understanding or clarifying the associated requirement.

It is emphasized that the quality management system requirements specified in this International Standard are complementary to technical requirements for products.
The adoption of a quality management system should be a strategic decision of an organization. The design and implementation of an organization's quality management system is influenced by varying needs,particular objectives, the products provided, the processes employed and the size and structure of the organization. It is not the intent of this International Standard to imply uniformity in the structure of quality management systems or uniformity of documentation.

There is a wide variety of medical devices and some of the particular requirements of this International Standard only apply to named groups of medical devices. These groups are defined in Clause 3.

If you require the ISO document of ISO 13845, please comment below.

Regards

How to Monitor My Broadband Cable Connection?

Monitoring your broadband cable Internet connection is a fairly simple procedure that can help you diagnose problems with your service and monitor your usage to ensure you are not approaching your provider's usage cap. Several broadband Internet service providers have imposed caps on residential usage, such as Comcast's 250 gigabyte cap that went live October 1, 2008. While many households do not use anywhere near this amount, if you are using your broadband connection a lot, you may want to monitor the connection and usage to make sure you stay under the cap.

Instructions

Choose the broadband monitoring software you want to use. There are several free and low-cost programs available that allow you to monitor both your connection and usage, so research thoroughly to choose which program best meets your needs. You can find a list of user-tested software at Gecko and Fly's website.

Pay any required charges for your software using a credit or debit card and download your software. If you chose freeware, there will be no need to pay. If the freeware you chose asks you for credit card information, do not download it and choose another software.

Install the downloaded software using the installation manager. You can configure exactly which portions of the program are installed to your computer in the installation manager.

Open the monitoring software when the installation is complete. Each monitoring software will work differently, but most are simple to set up to start monitoring your connection and usage.

Also you can search for free version of a software "Netmeter Pro".

If you need the software comment below.

Regards,

How to Renew a Computer's IP Address?

It happens to all of us. You're browsing the internet and suddenly you get the "Page Not Found" error. You check your modem and everything seems to be working and now you decide to call customer service--what a hassle. Often, the problem is that you need to renew your computer's Internet Protocol (IP) address. These steps explain how to renew your IP address and hopefully save you a call to customer service.

Click on the "Start" button and choose "Run."

Type "cmd" in the box and click on "OK." A window with a command prompt appears. It resembles the old DOS operating system.

Type "ipconfig /release" and press "Enter." This releases your computers current IP addresses.

Type "ipconfig /renew" and press "Enter." This assigns your computer a new set of IP addresses.

Type "Exit" and press "Enter" to close the window. You computer now has a new IP address.

Read more: How to Renew a Computer's IP Address | eHow.com http://www.ehow.com/how_2081578_renew-computers-ip-address.html#ixzz1T6g8tzB1


If the above steps don't resolve your connectivity issue, try unplugging your modem and/or router for a few seconds and then repeat the process.

The command "ipconfig" reveals the IP address assigned to your computer. If you have more than one connection to your computer (i.e. having both a wireless and LAN network card) the command "ipconfig /all" reveals all your assigned IP addresses.

How to install Hathway Connection Manually.

Hathway offers good plans in reasonable costs. and we need to work with their cable network.

I recently got the hathway connection for the my home, I got the cabel dropped as soon as possible with them.

I got their modem at late evening at their office, so there was no installation engineer available for the installation at my home.

So I had to install the connection at my end itself.

First screw the cable wire into the wire holder and fast the cable by winding the bolt already on the cable.

now plug the power cable.

then plug the LAN cables to the RJ45 on the modem with RJ45 port on the PC back side.

Power on the modem.

Then start the computer, the modem will take time for the acquiring the a IP address from the Hathway dynamic connections.

After five minutes the internet connection will be established and internet will start.

If the internet connection does not starts, then check for the lights on the front of the modem. Ideally it should be all lit well. if not check the connection at the cable to modem bolt. Else call the hathway personnel.

If the connection is very very slow then this is primarily because of the MAC id problem with the Hathway. Keep the apparatus "NO" and call technical Hathway personnel on the call center numbers. Also keep your account details with you for sharing the same with Technical personnel.

They will ask you the account number and will detect the modem you are using and will finally update their system for your MAC id and your modem will be validated and activated over the line. Then you will receive great speed.

For USB installation, be sure to connect the usb cable and most important the drivers are required for the installation.

If you have more problem, please comment.

Regards,

How to setup the WRT-54GH for Airtel Router

Dear All,

I had a hell of the time for configuring the Airtel ASDL router with the Wifi router WRT54GH or any WIFI router.

For prior to the installation, check the alternate DNS settings in the network settings.

Make the necessary back up of the DNS settings and write the same on a piece of paper.

Now link the powered wifi router to the a PC (LAN connection) and do not connect the ADSL router at this stage and open http://192.168.1.1/ which is the home page of the router.

Now on the main page, change the Router ip address from 192.168.1.1 to 192.168.0.1.

In the DHCP server settings, start the IP range from 192.168.1.100 to 192.168.0.100
for the next connections.

Now plug the router in the network (wirelessly or by the pluging the 4 ports behind it) and the configuration will set a IP address to each of the computers. From the start of 192.168.0.101 to 192.168.0.150.

After the same, plug in the internet connection of the Airtel ASDL connection, the internet connection will commence and all the computers will receive the internet connection.

This is a simply procedure which I have learned the hard way.

By the way I have considered that you have a complete access to your Wifi router and are admin on the PC. And there is a single router on the lan.

Please comment if you need and more information.

Murphy’s love laws Part 3

the guy who buys it won’t use it,

the guy who uses it could give a shit about it,

so don’t give a shit and you will have it all.

Love has all the answers. But till then sex brings up some good questions.

Sex on the TV can’t hurt you unless you fall off.

Anticipation is 98% of the pleasure

The amount of members of the opposite sex you pursue is inversely proportional to pretty much everything about you, such as intelligence.

If you are interested in someone, a close friend will grab their attention.

This is especially likely if they:
A.) Don’t want the attention of said person and/or
B.) Are already dating someone else

The ABC rule:
If A is attracted to B, and you are attracted to C, A has a better chance with B than you do with C.
B and C are often the same person.

The uglier the girl the closer she lives.

If any things will happen on the first date, you won’t have a condom.

The size of the pencil is not as important as the quality of the writing.

Corollaries: The quality of the writing is affected by the quality of the paper.

Regardless of how well one writes, it is difficult to write at all unless there is lead in the pencil.

Marriage is the greatest leveler.

Girls are like toilet rooms. Either it is taken, or full of sh t.

If you’re having difficulties choosing between potential two girls, you’ll always pick the wrong one.

If it seems perfect today, tomorrow it will end.

If a girl tell you “let’s stay friends”, she won’t call ever again. If you call, she won’t answer.

You’ll always catch fever before the first date.

Never make love in your back garden. Love is blind, but not your neighbors.Or in another version:

Don’t make love by the garden gate, love is blind but the neighbors ain’t.

Love is blind. Marriage is an eye opener

When it comes to love and lost, doing the right thing always hurts.

Being honest with someone will always turn that person into an enemy.

When you’re girlfriend says that you have to talk the relationship is over.

The day you decide to tell you’re girlfriend you could not live without her she will leave you the next day.

You’re best friend stop being you’re best friend the instant a beautiful woman walks in and you both are attracted to her.

The more you want a women the least she will want you.

When she says: “Don’t buy me anything expensive” and you listen, expect to be single.

Even the most beautiful woman in the world has at least one guy who is tired of her.

If you marry a beautiful girl she’ll turn into her mother.

If you marry a plain girl she’ll turns into her dad.

Thou shalt not covet thy neighbor’s wife. But they never said anything about their daughter.

The mother of the man, or the father of the woman you love will invariably hate you.

The best men (or women) are always taken–or crazy.

When you take your time getting ready your date will arrive 20 min. early; when you’re on time they’re 30 min. late.

As soon as you break up the man (or woman) who couldn’t commit TO YOU will get married.

A good women/men are like parking spots, all the good ones are taken.

Procrastination is a lot like masturbation, it feels good until you realize your just fucking yourself

Women are like boats: they require constant maintenance and attention, and they cost a lot of money.

Men are like buses: another one will eventually come along.

Never forget: Don’t fuck with Mrs. Murphy!

Marriage is the ending of a perfectly good sex life

Albert Einstein Gravity Law
Gravity cannot be held responsible for 2 people falling in love.

The difference between love and the common cold is that for the common cold there is a vaccine.

The Tommy Lee/Pamela Anderson law for celebrity couple Persona-polarization:
The most beautiful women in the world, always marry the most ugly men.

The Carmen Electra/ Dennis Rodman corollary
The most beautiful men in the world ALSO marry the most ugly AND most crazy men in the world.

If you love her/him, s/he doesn’t love you

If you are in love, he/she isn’t

If you want love, you don’t get it

If a beautiful wo/man loves you, it’s fake

If you are happy together, wait till you are married

It’s always the quiet ones that have the two dozen corpses in their basements.

love can be your best friend and/or your worst enemy

Wedding cake cures nymphomania.

Everyone believe in love, but wonder if it exists

You may get off on a cheap hooker but you can’t get off on a cheap lawyer

The one thing that will almost certainly come between two friends is a girl

The sexier a man is, the better the chances that he is gay

Being told that someone doesn’t want to date you because you’re such a good friend, is like being told that you didn’t get the job because you’re overqualified

When you’ve got them by the balls, their hearts and minds will follow
the girl/boyfriend who says s/he is… isn’t

You don’t fall in love, you fall in a hole. The depth of the hole is proportionate to how oblivious you are of the fall.

The best way to get over a woman…..is to get over another

You always need a more patient partner no matter how patient s/he is

Even when a man is listening, he’s gonna get it wrong.

Absence makes the heart go wander.

The person you want the most will end up with the person you hate the most.

If you get it, it will be taken away.

The perfection of a person is proportional to how much you love him/her.

The imperfection of a person is proportional to how much you hate him/her.

In any married couple, both members think that they will be the first one to die, which means that at least 50% of the people will be wrong.

You’ll think of a great line to say to someone the moment after your chance is gone.

Sunday, July 24, 2011

Murphy’s love laws Part 2

It is better to be looked over than overlooked.

Never say no.

A man can be happy with any woman as long as he doesn’t love her.

Folks playing leapfrog must complete all jumps.

Beauty is skin deep; ugly goes right to the bone.

Never stand between a fire hydrant and a dog.

A man is only a man, but a good bicycle is a ride.

Love comes in spurts.

The world does not revolve on an axis.

Sex is one of the nine reasons for reincarnation; the other eight are unimportant.

Smile, it makes people wonder what you are thinking.

Don’t do it if you can’t keep it up.

There is no difference between a wise man and a fool when they fall in love.

Never go to beds mad, stay up and fight.

Love is the delusion that one woman differs from another.

“This won’t hurt, I promise.”

Nothing improves with age.

An ex-wife/husband will always be “till death do us part”.

When a man wants his wife to hear, she doesn’t listen.

When that same man doesn’t want his wife to hear, she’s all ears.

It’s always easier to get a partner if you already have one.

Although it may seem like that on the outside, no one is having fun being single
If you’re heart is broken, sweep up the pieces.

There will always be someone who will want to put it back together.

Love and high-school must NEVER go together.

If a man speaks deep in the forest and there is no woman there to hear him; is he still wrong?

Show me a husband who won’t, I’ll show you a neighbor who will

It doesn’t matter HOW good it was, if you end up worrying or regretting it, it was bad sex

You get the best sex from the worst one for you

Never trust a woman who acts like you are so sexy she can’t help herself but drag you to bed

No one is as fascinating as they think

If you believe a relationship can’t work, but feel the need to try, it won’t.
Corollary: You will later find out that your lack of belief caused it to fail.

The duration of a relationship to a person is inversely proportionate to the importance of person to you.

The Key to a woman’s heart is an unexpected gift at an unexpected time.

The two thing no man can ever understand; Women and what makes all men complete damm fools over women.

Love makes believers of us all.

Translation: Love obscures common sense.

Being taken attracts women. Being single makes them avoid you like the plague.

If you go behind a girl you are heading to trouble.

In the eternal battle of the sexes, women are already the winners.

When with your girlfriend you will always have gas.

Celibacy is not heredity.

The hornier someone is, the less likely that it will be they have sex.

Corollary Horniness is inversely related to one’s chance of scoring

The man shalt not win the argument he started

The man shalt not win the argument he didn’t start

If a man won an argument, it was just in his head

(for the ladies) Try and try as you might, there will still be times where men are just assholes. We can’t help it and we’re sorry

A love will tell you they love you endlessly. A true love will tell everyone else they love you endlessly despite the embarrassment factor

When all else fails, have hope

Eichel’s Rule – During sex, try to sweat

In Romance; and in Finance we play with Figures.

A cauliflower resembles a rose, if your eyesight is not 6/6

Before falling in love do take your backup, it always helps in recovery.

if a man has it he won’t want it,

Murphy’s love laws Part 1

All the good ones are taken.

If the person isn’t taken, there’s a reason.

The nicer someone is, the farther away (s)he is from you.

Brains x Beauty x Availability = Constant.

This constant is always zero.

The amount of love someone feels for you is inversely proportional to how much you love them.

Money can’t buy love, but it sure gets you a great bargaining position.

The best things in the world are free — and worth every penny of it.

Every kind action has a not-so-kind reaction.

Nice guys (girls) finish last.

The good ones die first.

If it seems too good to be true, it probably is.

Availability is a function of time. The minute you get interested is the minute they find someone else.

The more beautiful the woman is who loves you, the easier it is to leave her with no hard feelings.

Nothing improves with age.


No matter how many times you’ve had it, if it’s offered take it, because it’ll never be quite the same again.

Sex has no calories.

Sex takes up the least amount of time and causes the most amount of trouble.

There is no remedy for sex but more sex.

Sex appeal is 50% what you’ve got and 50% what people think you’ve got.

No sex with anyone in the same office.

Sex is like snow; you never know how many inches you are going to get or how long it is going to last.

A man in the house is worth two in the street.

If you get them by the balls, their hearts and minds will follow.

Virginity can be cured.

When a man’s wife learns to understand him, she usually stops listening to him.

Never sleep with anyone crazier than yourself.

The qualities that most attract a woman to a man are usually the same ones she can’t stand years later.

Sex is dirty only if it’s done right.

It is always the wrong time of month.

The best way to hold a man is in your arms.

When the lights are out, all women are beautiful.

Sex is hereditary. If your parents never had it, chances are you won’t either.

Sow your wild oats on Saturday night — Then on Sunday pray for crop failure.

The game of love is never called off on account of darkness.

It was not the apple on the tree but the pair on the ground that caused the trouble in the garden.

Sex discriminates against the shy and the ugly.

Before you find your handsome prince, you’ve got to kiss a lot of frogs.

There may be some things better than sex, and some things worse than sex. But there is nothing exactly like it.

Love your neighbor, but don’t get caught.

Love is a hole in the heart.

If the effort that went in research on the female bosom had gone into our space program, we would now be running hot-dog stands on the moon.

Love is a matter of chemistry, sex is a matter of physics.

Do it only with the best.

Sex is a three-letter word which needs some old-fashioned four-letter words to convey its full meaning.

One good turn gets most of the blankets.

You cannot produce a baby in one month by impregnating nine women.

Love is the triumph of imagination over intelligence.

It is better to have loved and lost than never to have loved at all.

The person who said that it is better to have loved and lost than to have never loved at all…NEVER loved and lost!

Thou shalt not commit adultery…..unless in the mood.

Never lie down with a woman who’s got more troubles than you.

Abstain from wine, women, and song; mostly song.

Never argue with a women when she’s tired — or rested.

A woman never forgets the men she could have had; a man, the women he couldn’t.

What matters is not the length of the wand, but the magic in the stick.

A girlfriend is like a credit card, if you have one it’s easier to get a new one.

The best way to loose a good girlfriend is to have your wife find out about her

Love cease to exist as soon as expressed

If you can’t find Mr Right, go for Mr Fits Best

Murphy’s computers laws

* Any given program, when running, is obsolete.

* Any given program costs more and takes longer each time it is run.

* If a program is useful, it will have to be changed.

* If a program is useless, it will have to be documented.

* Any given program will expand to fill all the available memory.

* The value of a program is inversely proportional to the weight of its output.

* Program complexity grows until it exceeds the capability of the programmer who must maintain it.

* Every non trivial program has at least one bug

Corollary 1 – A sufficient condition for program triviality is that it have no bugs.

Corollary 2 – At least one bug will be observed after the author leaves the organization.

* Bugs will appear in one part of a working program when another ‘unrelated’ part is modified.

* The subtlest bugs cause the greatest damage and problems.

Corollary – A subtle bug will modify storage thereby masquerading as some other problem.

* Lulled into Security Law

A ‘debugged’ program that crashes will wipe out source files on storage devices when there is the least available backup.

* A hardware failure will cause system software to crash, and the customer engineer will blame the programmer.

* A system software crash will cause hardware to act strangely and the programmers will blame the customer engineer.

* Undetectable errors are infinite in variety, in contrast to detectable errors, which by definition are limited.

* Adding manpower to a late software project makes it later.

* Make it possible for programmers to write programs in English, and you will find that programmers can not write in English.

* The documented interfaces between standard software modules will have undocumented quirks.

* The probability of a hardware failure disappearing is inversely proportional to the distance between the computer and the customer engineer.

* A working program is one that has only unobserved bugs.

* No matter how many resources you have, it is never enough.

* Any cool program always requires more memory than you have.

* When you finally buy enough memory, you will not have enough disk space.

* Disks are always full. It is futile to try to get more disk space. Data expands to fill any void.

* If a program actually fits in memory and has enough disk space, it is guaranteed to crash.

* If such a program has not crashed yet, it is waiting for a critical moment before it crashes.

* No matter how good of a deal you get on computer components, the price will always drop immediately after the purchase.

* All components become obsolete.

* The speed with which components become obsolete is directly proportional to the price of the component.

* Software bugs are impossible to detect by anybody except the end user.

* The maintenance engineer will never have seen a model quite like yours before.

* It is axiomatic that any spares required will have just been discontinued and will be no longer in stock.

* Any VDU, from the cheapest to the most expensive, will protect a twenty cent fuse by blowing first.

* Any manufacturer making his warranties dependent upon the device being earthed will only supply power cabling with two wires.

* If a circuit requires n components, then there will be only n – 1 components in locally-held stocks.

* A failure in a device will never appear until it has passed final inspection.

* Adding manpower to a late software project makes it later.

* A program generator creates programs that are more buggy than the program generator.

* All Constants are Variables.

Sent by Risto Matikainen

* Constants aren’t

* Variables won’t

The last two laws were sent by Hnathoo

* A part dropped from the workbench will roll to a degree of un-reachability proportional to its importance.

Sent by Neal Buddenberg

* In a transistor circuit protected by a fuse, the transistor will always blow to protect the fuse.

Sent by Neal Buddenberg

* The best way to see your boss is to access the Internet.

Or…

No matter how hard you work, the boss will only appear when you access the Internet.

* The hard drive on your computer will only crash when it contains vital information that has not been backed up.

The last two laws were sent by Charles L. Mays

* Computers don’t make errors-What they do they do on purpose.

Sent by Terry Jaster

* If Murphy’s laws are so true then how come I can log onto this site and submi…………

[connection reset - error message 928 ]

Sent by Paul Breen

* Gumption’s Law (?)

Any problem, no matter how complex, can be found by simple inspection.

Corollary: A nagging intruder with unsought advice will spot it immediately.

Sent by Ray Geist who found it handy when he was debugging computer code.

* Each computer code has five bugs, and tis number does not depend on how many bugs have been already found (it is conservative).

Sent by Andrew

* Profanity is one language all computer users know.

Sent by Jeff Webb

* The number of bugs always exceeds the number of lines found in a program.

Sent by Yaron Budowski

* The most ominous words for those using computers: “Daddy, what does ‘Now formatting Drive C mean’?”

Sent by Yael Dragwyla

* When putting something into memory, always remember where you put it.

Sent by Paul Pigott

* Every non-trivial program contains at least one bug.

* Every non-trivial program can be simplified by at least one line of code.

The conclusion of the last two laws: Every non trivial program can be simplified to one line of code, and it will contain a bug.

Sent by Brandon Aiken

* An expert is someone brought in at the last minute to share the blame.

Sent by Bassey Essien.

* Debugging is at least twice as hard as writing the program in the first place.

So if your code is as clever as you can possibly make it, then by definition you’re not smart enough to debug it.

Sent by Brian Kernighan

* Bahaman’s Law:

for any given software, the moment you manage to master it, a new version appears.

Sent by Bahaman.

Yakko’s addition:

The new version always manages to change the one feature you need most.

Sent by Yakko

* Patches – don’t.

Sent by Doru Tasca

* Most computer errors can be attributed to a similar problem – a screw loose behind the keyboard.

* Whenever you need a crucial file from the server, the network will be down.

* Whenever you need a crucial file from your hard drive, your computer will crash.

* E-mailed tasking will always come just before you log off.

* A quarantined virus – will be opened.

* A chain letter – will be sent. To global. A dozen times.

* The chance of a virus infecting your network is directly proportional to the amount of damage it does.

* The chances of getting off work on time is inversely proportional to how much e-mail the boss leaves for until end of the day.

* The faster you need a hardcopy, the more people will be using the only office printer.

* General Fault Errors are the “Check Engine” light of computers. If it can be fixed, chances are it’s not by you.

* A patch is a piece of software which replaces old bugs with new bugs.

* The chances of a program doing what it’s supposed to do is inversely proportional to the number of lines of code used to write it.

The last twelve laws were sent by Ryan Sylvester

* The probability of forgetting your password is directly proportional to the frequency of changing it.

* No matter how fantastic your latest and greatest PC is, you will be able to buy it for half the price in 12 months.

The last two laws were sent by Zain

* The longer it takes to download a program the more likely it won’t run.

Sent by Skwirl

* Failure is not an option, it’s included with the software.

Sent by Paul

* A program is good when it’s bug free – which is impossible.

Sent by Hans van Rijsse

* If you forget to save you’re work every 5 minutes, it will break down after you’ve been at it for an hour.

Sent by Eric Guilbault

* It’s not a bug, it’s an undocumented feature.

* The amount of time taken to successfully complete a software project is in direct proportion to the amount of Marketing input.

Corollary: Marketing should not be located in the same city – much less on the same campus – as Engineering and/or Programming.

* The only thing worse than an end-user without a clue is an end-user who has a clue – usually the wrong one.

* According to most Tech Support people, the most common user error message (regardless of Operating System) is ID 10T.

End-users’ Corollary 1: most application failures occur between the hours of 2 and 4 am on a Sunday night – with a 6 am Monday deadline for the project.

End-users’ Corollary 2: On the graveyard shift, there’s no Tech Support to hear you scream!

The last four laws and corollaries were sent by Jim Kirk

* Bugs mysteriously appear when you say, “Watch this!”

corollary: If you call another programmer over to see if he knows what’s wrong the bug disappears.

The corollary was sent by S. Bussell.

* The probability of bugs appearing is directly proportional to the number and importance of people watching.

The last two laws were sent by Bill Smith.

* An employee rank is in inverse proportion to his use of a computer, and in proportion to its performance.

Sent by Dan Wasson

* The only program that runs perfectly every time, is a virus

Sent by DaRk_jAcKaL

* If a project is completed on schedule, it wasn’t debugged properly.

* Non Crash Operating System aren’t.

* The worst bugs in your program will show up only during the final review.

The last three laws were sent by Kiran

* The people who say that computers are simple to use are the same people who tell you how to build a watch when you ask what time it is.

Sent by Jack Betz

* Philington’s First Law

If it works, it’s production. If it doesn’t, it’s a test.

* Philington’s Second Law

Real programmers don’t comment their code. If it was hard to write, it should be hard to understand.

The last two laws were sent by Philip Partington

* Format C: fixes all

Sent by Ron Westby

* Law of Computer Generated Aerodynamics

Computers suck.

* Law of Recycling

A computer that has been on the market for 6 weeks is still usable as a boat anchor.

* Law of Anti-security

The best way past a pesky security feature is a 13-year-old.

* Law of Acceleration

A computer that has surpassed its user’s frustration capacity (FC) will accelerate downwards at 9.8 meters per second squared.

The last four laws were sent by Timothy Boilard

* Computers let you waste time efficiently

Sent by Jim F.

* Make a system even a moron can use and a moron will use it.

* Make one that requires training or intelligence and only a moron will use it, but there will be more help desk calls.

Sent by S. Bussell

* The likelihood of problems occurring is inversely proportional to the amount of time remaining before the deadline.

* You will always discover errors in your work after you have printed/submitted it.

The last two laws were sent by Niels Hageman

* 90% of a programmer errors come from data from other programmers.

Sent by Emanuel

* ‘Illegal Error’ messages only happen when you forget to save your work

Sent by Abdul Mohsin

* If you make the letters in your Word document bigger and then you print it out, you’ll have everything on the first page and only one line on the second.

Sent by Nadine

* the OEM did not actually manufacture the part you need to replace

Sent by Bryan Lord

* By the time you learn your new computer you’ll need a new one.

Sent by romanaround

* After a software is released, the first bug found will be by a person who normally does not use that portion of the program but was wondering why he can’t do something he normally would not do.

Sent by Rick G.

* When the Downloading Window says “99%complete”, there will be a fluctuation in the voltage and you’ll have to start all over again.

Sent by Sagar Kalantre

* Millions of people believe they are animals, but I have yet to meet one that believe in Windows’ stability. Even human stupidity has limits ;-)

Sent by Sylvain Galibert

* The troubleshooting guide contains the answer to every problem except yours.

Sent by Jesse Janowiak

* Plugins Law

Whenever you install a group of plugins one by one just to find out which one can make your software work, you either haven’t gotten the right one, or have accidentally skipped the right one or it has become the last one installed.

Sent by Laudney Ren

* No matter what problem you have with your computer – Its Always Microsoft’s fault

Corollary: If its not their fault – Blame them anyway :-)

Sent by Andrei Keren

* You will get disconnected from the Internet or experience a computer crash when you are downloading. If you don’t experience one within 80% completion, then it will happen at 99%. If you do manage to get the file, then it will turn out to be completely useless and/or invalid.

Sent by Hyung Jin Lee

* You’ll always receive an e-mail from a web site that you never visit before.

* 75% of the bugs laws in this page can be applied to MS Windows (Any version).

The last two laws were sent by Christian C

* Auto Correct – isn’t

* Microsoft excel- doesn’t

the last two laws were sent by Alegna

* If you need to shutdown your PC ASAP, It will restart.

* The quickest way to shutdown a PC is to unplug it.

Corollary: ACPI shutdown (sometimes faster to get to than the plug) does not always work.

Corollary: ACPI shutdown will fail most frequently when you run the risk of being caught doing something.

Corollaries were sent by Stravag

* No matter how big a hard drive you buy, you’ll need to double it in a year.

the last three laws were sent by Pliaskos

* Complete computer breakdown will happen shortly after the maintenance person has left.

Sent by Jan Wenall

* A virus will be erased when the hard drive crashes, making it useless for antivirus program to fix it.

Sent by mitch

* The problem always exists between one keyboard and it’s respective chair.

(On submission problem was insomnia… zzzzzz)

Sent by Cpt_Anderson

* A program that compile on the first run has an error in the algorithm

Sent by Iavor Dimitrov

* Edward V. Berard Law

Walking on water and developing software to specification are easy as long as both are frozen.

Sent by Andre Van Dun

* The smaller the size of your email account, the more junk mail you will get

* The boss will always come to your workspace when you accidentally open an adult link

* The more pop-up screens you have, the more likely the boss will come by

The last three laws were sent by Mark

* A computer is only as smart as the person using it

* If it ain’t broke, Overclock it!

The last two laws were sent by Michael Horvath

* If you’re in a hurry, your computer will crash, a hard drive will become corrupted, or your files will be erased. Any way, you’re screwed if you have a deadline.

Sent by Logan

* Software Reliability:

Investment in software reliability will increase until it exceeds the probable cost of errors.

Sent by Bill Pramik

* Computer sadism: When the computer causes physical or mental damage to a person and can’t receive such a return favor (due to management rules).

* Computer masochism: When a computer takes all the abuse you think you can give it and continues working as it should.

* The sound of grinding metal or the sight of smoke coming from a case is a warning that you are trying to do too much with too little.

* The survivability of a system is directly proportional to the price of the cooling system applied to it and inversely proportional to the amount of use it sees.

* Antivirus systems only effectively work on a virus after given virus has passed its prime.

* The most frightening of viruses is the virus you do not know is already there.

The last six laws were sent by Stravag

* The amount of damage that a string of code can do is inversely proportional to the length of the string

Sent by Kit Balmer

* You only receive instant messaging, when working on a project that’s due instantly

Sent by Keith

* When designing a program to handle all possible dumb errors, nature creates a dumber user

Sent by Rich Spejcher

* There is an inverse relationship between an organization’s hierarchy and its understanding of computers.

* Pioneers get arrows

Last two laws were sent by Sam Leonard Sarasota, Florida

* The smallest problems will immediately be brought to the attention of the CEO, but the big problems will be ignored until the affected system goes down.

Sent by Neal Miller

* Leet speak is nothing more than some poor fool’s attempt to type really, really fast.

* Computers never work the way they are supposed to. Especially when nothing is wrong with them.

* A program will work the you think is should only when you don’t care if it does.

* Software does not fail when the technician is in the room.

Last four laws were sent by protoborg@comcast.net

* as soon as you download a big file, your computer with shut down

Sent by TJ Engelking

* The longer the e-mail, the greater the chance it will not make it to its detination, for whatever reason

* If you were preventive enough to save a copy of anything, you will not need it. Therefore – Not saving a copy of anything is directly proportional to the value of the information lost and the amount of time invested in gathering and typing it

* Proof-read all e-mails three or four times before sending it. All errors are detected immediatly after being sent

The last three laws were sent by Ing. David Contreras-Sáez

* Murphy works for Microsoft. In fact, he is in charge of their QA

Sent by xslf via twitter

* the chance to lose data is inversely proportional to the number people in the room when updating a simple server program

Sent by Sandi Jerič

* Good enough – isn’t, unless there is a deadline.

* Don’t take it personally, stupid

Last two laws were sent by Aaron Howell

Search This Blog