Friday, February 8, 2008

Look at the following two pictures of the calendars carefully!!!!







Have u ever seen the calendar for September 1752???

If you are working in Unix, try this out.


At $ prompt, type: cal 9 1752
Surprised??? ?
not only in unix, u can also search it in google
See the explanation for what you see.

Isn't the output queer?

A month with whole of eleven days missing.

This was the time England shifted from Roman Julian Calendar to the Gregorian Calendar, and the king of England ordered those 11 days to be wiped off the face of the month of September of 1752. (What couldn't a King do in those days?!) And yes, the workers worked for 11 days less, but got paid for the entire 30 days.

And that's how "Paid Leave" was born.Hail the King!!!

Just try this....

1. Open a blank Notepad file
2. Write .LOG as the first line of the file, followed by a enter. Save the file and close it.
3. Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the line after.
4. Type your notes and then save and close the file.and see the fun.

If you share your Windows XP.Professional system with many other users, you have no doubt experienced how pressing Ctrl+Alt+Del results in the name of the last user logged on to be displayed automatically in the username portion of the logon box. While this is great if you were the last one to log on, it can be frustrating if you weren’t. More often than not, users won’t even bother looking at the username portion of the box and just type their password, resulting in a failed logon.

To address this issue, you may want to consider disabling the automatic display of the last user’s name in the logon dialog box. This is accomplished via a Registry edit. To ensure that the user portion of the logon box remains unpopulated, follow these steps:

1. Click Start > Run. Type Regedit.exe in the Open text box and click OK.
2. Browse to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
3. Right click in the right-hand side of the screen and select New > DWORD value. Name the value DontDisplayLastUserName.
4. Double-click DontDisplayLastUserName and set its value to 1.


You can subsequently re-enable the setting by changing its value to 0 if need be. Close the Registry Editor and reboot to check your new logon settings.

Wednesday, January 30, 2008

Power of Innovation!! !

Radical new tire design by Michelin. The next generation of tires.




These tires are airless and are scheduled to be out on the market very soon!!!

The bad news for law enforcement is that spike strips will not work on these tires. This is what great R&D will do, and just think of the impact on existing technology:


no more air valves
no more air compressors at Petrol Pumps
no more flat tires in the middle of long drives


These are actual pictures taken in the South Carolina plant of Michelin. It will be awhile before they are available to the automotive industry.










Great power of Innovation.........

Tuesday, January 29, 2008

I was collecting information on Natural language processing.
This is when I met ELIZA.
It is a nice program which you would definitely love.
It speaks with you!!!



ELIZA is a computer program by Joseph Weizenbaum, designed in 1966, which parodied a Rogerian therapist, largely by rephrasing many of the patient's statements as questions and posing them to the patient. Thus, for example, the response to "My head hurts" might be "Why do you say your head hurts?" The response to "My mother hates me" might be "Who else in your family hates you?" ELIZA was named after Eliza Doolittle, a working-class character in George Bernard Shaw's play Pygmalion, who is taught to speak with an upper class accent.

Want to chat with ELIZA?????

Click here to meet ELIZA

ELIZA - a friend you could never have before

Eliza: Hello. I am ELIZA. How can I help you?



This is how the page will look!!!!
But dont try the questions here...
It wont work!!!

Sunday, January 27, 2008

Last week I had my department function(virtuoso).It was really cool and I worked for 2 events in the function.One was best manager and the other was Project presentation.Project presentation was my favourite and it was rocking.One of the project presented there was steganography.This term was relatively new to me.But my senior informed me that it was a very common project and it was used by Osama Bin Laden!!!This kindled interest in me to find more on this subject.This post contains some nice information on steganography such that,even a novice could understand!!!

Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet -- a change so subtle that no one who isn't actively looking for it is likely to notice it.


Image of a tree.
By removing all but the last 2 bits of
each color component, an almost
completely black image results. Making
the resulting image 85 times brighter
results in the image below.


Image extracted from above image.

Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents.
The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in countries where encryption is illegal.Often, steganography and cryptography are used together to ensure security of the covert message.

Steganography used in electronic communication include steganographic coding inside of a transport layer, such as an MP3 file, or a protocol, such as UDP.

Monday, January 21, 2008

#include stdio.h
#include conio.h
int main(void)

{
float A,Bb,D,G,F;
A = 440;
G = 780;
Bb = 461;
D = 586;
F = 687;

sound(G); delay(500); nosound(); sound(G); delay(250); nosound(); sound(G); delay(250); nosound(); sound(G); delay(500); nosound(); sound(2*D); delay(500); nosound(); sound(2*A); delay(250); nosound(); sound(2*Bb); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(500); nosound(); sound(2*A); delay(500); nosound(); sound(G); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();

sound(G); delay(500); nosound(); sound(G); delay(250); nosound(); sound(G); delay(250); nosound(); sound(G); delay(500); nosound(); sound(2*D); delay(500); nosound(); sound(2*A); delay(250); nosound(); sound(2*Bb); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(500); nosound(); sound(2*A); delay(500); nosound(); sound(G); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();

//end 2

sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();


//end 3

sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound(); return 0;

}

This source code is not mine but probably the best that you could ever see....
It plays the airtel music!!!

Wednesday, January 16, 2008



For all those who wondered what was special about this photo,
here it is: This is a digitally altered image which shows the same person in different forms.. and u thought all chinese looked alike!!

Monday, January 14, 2008



These shortcuts are mentioned in IE itself!!!!
I discovered that today only.
And made a post out of it!!

Keyboard shortcuts

Open links in a new tab in the background CTRL+click
Open links in a new tab in the foreground CTRL+SHIFT+click
Open a new tab in the foreground CTRL+T
Open a new tab from the Address bar ALT+ENTER
Open a new tab from the search box ALT+ENTER
Open Quick Tabs (thumbnail view) CTRL+Q
Switch between tabs CTRL+TAB/CTRL+SHIFT+TAB
Switch to a specific tab number CTRL+n (n can be 1-8)
Switch to the last tab CTRL+9
Close current tab CTRL+W
Close all tabs ALT+F4
Close other tabs CTRL+ALT+F4

Mouse shortcuts

Open a link in a background tab Click the middle mouse button on a link
Open a new tab Double-click the empty space to the right of the last tab
Close a tab Click the middle mouse button on the tab

Most of you would have known this already!
But people who did not know this,would have found it very useful!!!
For those who are still using IE6, Click here to download IE7.