Tuesday, March 22, 2005
 
posted by Div @ 12:52 AM  
  Third-Order Information Arrangement
The first order of object arrangement is by sorting entities in aggregates of primary interest. The second order is to create a metadata of this arrangement. This is the prevalent practice, and we see it all around us…shopping malls, libraries, warehouses etc. But when it comes to information sorting there are differences between the way these are sorted vis-à-vis sorting of physical entities. Physical objects can be present at only one location at a time. This limitation has bound the methods of aggregation for such objects. But information, on the other hand, can be present at many places simultaneously. So, there is no need of neat trees or topological sorts. We can have trees with cobwebs connecting the many branches and leaves.

The concept is to free the information from the shackles of a particular arrangement scheme and let the users decide the way they want the information to be ordered to suite themselves. I get the same feeling when I need to know about a particular movie. In this case, I prefer yahoo movie’s user community based feedback mechanism to google’s page ranking algorithm. One gets a feel of “human touch”, which is missing when googleoids swarm the web searching for information.

Plz visit “Universal Biological Indexer and Organizer”
www.ubio.org for an appreciation of the problem domain.
posted by Div @ 12:42 AM   0 comments
  Google Print
Google Print: "What is Google Print?
Google's mission is to organize the world's information, but much of that information isn't yet online. Google Print aims to get it there by putting book content where you can find it most easily - right in your Google search results.
How does Google Print work?
Just do an ordinary Google search. When we find a book whose content contains a match for your search terms, we'll link to it in your search results. Click a book title and you'll see the page of the book that has your search terms, along with other information about the book and 'Buy this Book' links to online bookstores (you can view the entirety of public domain books or, for books under copyright, just a few pages or in some cases, only the title's bibliographic data and brief snippets). You can also search for more information within that specific book and find nearby libraries that have it. "
posted by Div @ 12:02 AM  
Sunday, March 20, 2005
  Movie Review: The Cellular

Kim Basinger and Chris Evans in 'Cellular'

Cast: Kim Basinger, Cris EvansWhat is the movie all about? Jessica (Kim) is kidnaped from her home by a group of men...who are cops. They take her to a deserted place and lock her up in a room...not before smashing the phone there. Jessica, being a science teacher, manages to place a call to a random number. Ryan (Cris) picks up the call and then tries to help Jessica. The movie has its shares of thrills. Its fast paced and revolves around Ryan holding his mobile and running all over the city to help Jessica. You must be having many unanswered questions: Why did the cops kidnap Jessica (and her family)? Did Ryan manage to save her? And the one on the top of your mind...Did the cell phone batteries run out, lose its signal at times or have cross talk with other mobile phones? (You bet...chuckles)
posted by Div @ 10:24 PM  
  Weekend movie: Sky Captain and the World of Tomorrow

Gwyneth Paltrow, Jude Law and Angelina Jolie in 'Sky Captain and the World of Tomorrow'

The entire movie was shot against blue- and green-screen, with everything except the main characters computer generated.
posted by Div @ 10:20 PM  
Thursday, March 17, 2005
  Movie Review: Austin Powers – International Man of Mystery

Mike Myers and Liz Hurley in Austin Powers: International Man of Mystery.

Movie Rating: Yeah..Baby!!!
Cast: Mike Myers, Elizabeth Hurley (truly **dellic)

Did you know:
www.austinpowers.com is a truly groovy site on this international man of mystery?

Plot, you say…..behaaave
posted by Div @ 6:53 AM   0 comments
Wednesday, March 09, 2005
  BitTorrent

According to British Web analysis firm CacheLogic, BitTorrent accounts for an astounding 35 percent of all the traffic on the Internet -- more than all other peer-to-peer programs combined -- and dwarfs mainstream traffic like Web pages.

Bram Cohen, the programmer who created BitTorrent.
posted by Div @ 4:22 AM  
Tuesday, March 08, 2005
  Top Ten Microadvantages
Individuals send anywhere from 40 to 150 micromessages to each other in an average 10-minute conversation. You can turn these micromessages into microadvantages and build a more inclusive organization with these techniques:

1. Solicit Opinions. Find opportunities to ask, "I'd like your opinion about" This sends a message that you value the thoughts and perspectives of others.

2. Connect on a Personal Level. Take a few minutes to engage in a non-business conversation with a colleague. This helps build the feeling that you are interested in them as a person and often results in heightened loyalty and commitment.

3. Ask Questions. When you have a negative reaction to a colleague's statement or suggestion, lead your response with a question, not a statement.

4. Attribute/Credit Ideas. Acknowledge, by name, the "owner" of an idea in a meeting.

5. Monitor Facial Expressions. Be conscious of your facial expressions while listening to a colleague. Most Microinequities are communicated through facial expressions. These often go unnoticed because we don't see our own expressions.

6. Actively Listen. Sending a clear message of being attentive to the speaker enhances the quality of their message.

7. Draw in Participation. When addressing a group, send messages that encourage participation from everyone. In some cultures, making routine eye contact encourages participation.

8. Monitor Personal Greeting. Be sensitive to how you greet someone with whom you have a close relationship in the presence of others.

9. Respond Constructively to Differences. When responding to someone's comment you disagree with, show that you understand their perspective before you offer a different view.
posted by Div @ 3:18 AM  
Wednesday, March 02, 2005
  The Definitive guide to getting the best out of your computing environment.
Managing to get work done in this networked world is getting tougher by the day, more so getting the best out of it. Out of my experience with these systems for the past few years, I wish to share some BKMs (as we at Intel call it 'best known methods') on getting your work done and getting the best out of your computing environment.

ANTIVIRUS:
A good antivirus forms the backbone of a secure system. This is a musthave in this list.
My recommendation is McAfee Antivirus. It works perfectly in the background, not consuming a lot of memory or processor cycles. The definition file must be updated every week. Norton is good, but if you wish to do anything on your computer other than scanning viruses then don't install this. Norton consumes a lot of RAM and definitely slows down the system by 20%.
There is also a good online solution. Panda Antivirus has a online virus scanner. Just connect to http://www.pandasoftware.com/activescan/, select free scan and your system will be scanned, updated for the latest virus.

FIREWALL:
This is a must for online security. If you don't want any hassle of installing and configuring a firewall, then at least enable the default firewall provided by windows. This will block most of the ports.
My recommendation is Zone Alarm Pro. A firewall is good only to the extent of the rules you define. In ZoneAlarm, for home, set protection to 'high' and individually grant internet access to programs. Zone Alarm is very easy to use. For Intranet, explicitly give access to systems (either by hostname or IP address) on explicit ports. The most common ports are Remote Access: port 3389; file sharing: port 139. All the other ports and IP addresses should be blocked.

MALWARE: Use the free version of AdAware Personal (http://www.lavasoftusa.com/software/adaware/). Every week, update your definition files and scan for malware.ADS/POP UPS: Use the trial version of AdMuncher (http://www.admuncher.com/).

INTERNET SPEED:
Install System Mechanic 5. Use this to set the type of connection you have (eg. 56kbps, 128kbps DSL, LAN, etc). This will optimize the internet packet size according to your net connection.

SYSTEM PERFORMANCE:
Using System Mechanic, regularly check the registry for errors. Do not compress the registry, as this would slow the system down. Defrag the system using DiskDefragmenter every month. I do not recommend using third party software for doing this (like diskkeeper or system mechanic) as they are likely to crash the system. I do not recommend boot-time defrag, the risk doesn't seem worth it (unless ofcourse you're doing it on a non-system partition with no critical data).
Backup your registry (preferably on a separate system/cd) every month. You can do this either using regedit or system mechanic.
Enable system restore, at least on your system partition. You do not need to give more than 200MB for this task.

Keep a boot CD handy. I highly recommend having Hiren's Boot CD. It boots the system with its own OS, scans viruses at disk level (no interference from windows), recovers deleted files, recovers bad formatting/partition error, creates/restores disk images and much much more.
Pay regular visit to
www.windowsupdate.com and download all updates. As of this writing, I do not recommend Windows SP2. It still has many issues. But you must get all the updates for SP1.Hope you find all this information useful.
posted by Div @ 12:59 AM   0 comments
>
Previous Post
Archives
Links