Thursday, October 29, 2009

Long-Term Goals and Short-Term Objectives

As you analyze your future personality profile, you will probably see that it can be logically broken down into several categories of self-improvement focusing on career, social status & relationships, education & training, communication skills, physical well-being, earning and saving. These elements of your personality profile are the basis for your long-term goals for change. Goals that are too broad or too vague are built on “psychobabble” (“I want to get my head together” or “I want to be a fully actualized human being”) are neither helpful for evaluation of your progress and to know when you have achieved your goals.

With a profile of specific goals in view, you are ready to develop the short-term objectives that will be the stepping-stones to the achievement of your goals. As you do this, it is important to make the objectives observable or measurable in some way. You must have a clear vision of how you will know that you are making progress. This usually involves including a time frame for your goals and objectives. But be reasonable – no one changes overnight. To get started, for each specific long-term goal, you need to ask yourself.

Monday, October 26, 2009

Web Design Tips

Flash technology has been out for some time, and since it appears cool according to many people, it has led to many Flash websites. Such sites require a flash player plug-in to be viewed, and generally take a long time to load. One might ask, why are so many people designing sites using Flash? Like I said, it looks cool, and it sounds very attractive to have such visually rich site. But there are some problems besides long loading time. I am talking about problems indexing Flash-based websites. The search engines are going to have a hard time recognizing a Flash-based website, and even though there has been some progress in this matter, it is still not completely solved.

Another aspect that webmasters should focus on is the choosing the right fonts size. Did you ever stumble on a website that had too small fonts size, and because of that the text was difficult to read? It happens from time to time, however, it is also true that some sites have too large font size. In such cases you may wish that the webmaster have chosen different size of font. I know that a lot of sites lose readers because of it, but there is a solution to this problem. Many browsers offer the possibility of zooming in or out, so depending on the situation the letters will become larger or smaller. It is also very easy to do and in case of Firefox, this can be done simply by pressing Ctrl along with “+” or Ctrl along with “-“. You can restore the original size by pressing Ctrl+0. However, since most visitors may not bother using these features, the best idea is to simply use the right font size in the first place.

Friday, October 23, 2009

Aerosmith

Steve Talloarico (Tyler), Tom Hamilton and Joe Perry came together in 1970 to formed a band in Boston, MA, USA. The band is Aerosmith and they had a contract with Guitarist Brad Whit Ford and Drummer Joey Kramer and came out with their first album “ROCK STAR” in 1973, which had a record breaking sale for nearly two million copies. And they came out with their second album in 1974. “GET YOUR WINGS” which was a very huge hit and earned a very huge fan base. In 1975 they came up with “TOYS IN ATTIC” album which is a mixture of Glam Rock, Heavy Metal, Pop and Blues, the success of Aerosmith’s – Toy in attic was soaring which made them as a International Stars equivalent to the ROLLING STONES. In 1980 and 1985, in the former year had the unveiling mammoth with “Greatest Hits” and latter year had “Done with Mirrors”. They gave some of the best evergreen hits like ‘Janie’s got a gun’, ‘what it takes’ from their album “PUMP”, this album fetched their first Grammy awards. Aerosmith is my evergreen and favorite band, I still listen to the songs and they have given some of the best album.

Tuesday, October 20, 2009

Tennis

This History of tennis yellow page gives fascinating insight about how tennis developed into the game that we love to play. The sport of tennis has been played for hundreds of years, but the game as it is known today is about one hundred and thirty years old.
By the 1850's many versions of the game come into view. The immediate ancestor of the game was called "Sphairistike" invented by Major Walter Clopton Wingfield and first played by him on a grass court in Wales. It was called "Sticky" at first and in books about history of tennis and in popular usage came to be known as "lawn tennis". Eventually the game was played by many people all over England. It will go down in tennis history as simply tennis.
In 1877 the All England Croquet Club formally changed its name to the All England Croquet Lawn Tennis Club and held the first tennis championships in July 1877. The referee was Henry Jones who devised the rules for the tournament with the help of a two-man committee. No scoring rules were in place so what they devised was indeed revolutionary at that time.
Players were required to change ends after each set, matches were the best of five sets, and advantage sets were played only in the final. If a game reached 5-5 in earlier rounds, the outcome of the next game decided the set - like present-day tiebreakers. The shape of the court also changed from hourglass to the modern rectangular with similar measurements. With adjustments that were inevitable during the evolution of the game, tennis owes a lot to Henry Jones. The history of tennis buffs should remember his name.
Players were not seeded - opponents were chosen by draw - and twenty-two men entered that first championship. The first lawn tennis champion was Spencer Gore, who employed the tactic of an intimidating net attack against his opponents. At that time the net was 5 ft high at the posts and only 3ft 3in at the center. It was lowered to its present height of 3ft 6in at the posts in 1882. It would be later before serve and volley would be utilized by the players.


The British Ernest and William Renshaw dominated the 1880s at Wimbledon. With excellent strokes, they set higher standards of tournament play with subsequent public interest in the game. William Renshaw used the smash as a weapon as well as the "rising ball" style of play.
Two other brothers - Henry and Wilfred Baddeley won the doubles title four times in the 1890s. After them, the Doherty brothers, Richard and Laurie, dominated the decade between 1897 and 1906. They won the singles championship a combined total of nine times and winning the doubles eight times. In the history of tennis annals, there is an outstanding performance by brothers.

Friday, October 16, 2009

Ports are not only for sailors

When dealing with TCP or UDP packets, you often hear the term port. No, this doesn’t mean that these protocols are designed for mariners. Instead, a port is a number that identifies where a packet came from on the sending host, and where it should go to on the receiving host. If you compare an IP address to a street address for mail delivery, the port number is like an apartment number.
When a server application, such as a Web server, runs on a computer that uses TCP/IP, it reserves a port on that computer. This reservation is nothing more than telling the networking software that any packet that is addressed to this port should be forwarded to the server application. Any application that sends TCP or UDP packets also sends them from a port. This way, the TCP/IP stack knows what application should receive return packets. In addition to source and destination addresses, IP packets also contain source and destination ports.

Tuesday, October 13, 2009

Private IP addresses are more safer

Some ranges of IP addresses are reserved and not assigned to any computers connected directly to the Internet. These addresses are allocated for use only on private networks and between computers that aren’t connected to the Internet. These private IP address ranges are 10.0.0.0–10.255.255.255, 172.16.0.0–172.31.255.255 and 192.168.0.0–192.168.255.255. Using addresses from these ranges for the computers within an organization’s networks means that you don’t have to allocate any of the increasingly sparse regular addresses for all computers. You also increase security because a hacker can never send network packets directly from the Internet to a computer that’s inside a network that uses private addresses.

Saturday, October 10, 2009

Bill Gates

Any one, who wants to study the progress of the computer, particularly software, is conscious of what might be called the Legend of Bill Gates, who’s unattractive, DOS OS, acquired from someone else, but endorsed to fame by then leading IBM to avoid the antitrust breakup that had then just hit AT&T, came to dominate the market. In Boca Raton, where the IBM PC was urbanized, some of us used to fun that PC, meant "piece of crap," and that is still true of Micro Soft, especially some of its recent invention farces! It is possibly among the least innovative companies in history. [See the film, "Pirates of Silicon Valley" for a small part of this story.]
Bill Gates and his hirelings such as Michael Kinsley, continue to endorse that legend, with what has become a fabric of lies, around the supposed smarts of Gates' and his newly discovered "Creative entrepreneurship." When he accepted his voluntary degree from Harvard, the drop-out expediently mislaid the role of his dead mother Mary, in talking IBM's CEO into giving DOS a shot. IBM's organization choose DOS over the advice of its own engineers accurately because of its poor quality as they predictable, wrongly it turned out, they could take over the OS feature as well as hardware, after the heat was off with respect to antitrust.

Tuesday, October 6, 2009

Hacked Microprocessors

Generally speaking, hackers try to take control of a computer by infecting a computer with malicious software. However, it appears that there is another way that hackers might want to get access to our computers, namely, by hacking microprocessors. Last year researchers from the University of Illinois altered a computer chip to grant attackers back-door access to a computer. If hackers would decide to do this, detecting what is wrong with the computer would be virtually impossible. The way it technically works is that malicious firmware would be injected into the chip’s memory that would allow the attacker to log into the machine as if he were a legitimate user. For this type of attack to work, the hacker or his associates would have to get physical access to the processor which fortunately is unlikely. However, the possibility still exists, and it is quite scary that any one of us could be using such hardware.
Of course, it is a lot easier to defend from software threats such as viruses and spyware. In order to be well protected you should be simply using a safe browser, and have an up-to-date antivirus and anti-spyware program. Firefox is generally considered to be the safest browser so keep that in mind.

Thursday, October 1, 2009

Types of wireless phones in use

There are many types of wireless telephones in use today. The functionality of today’s wireless phones comes in many, many flavors. From a high-level perspective, though, all wireless phones fall into one of the following two categories:

Portable telephones are the type of handset that users are able to carry with them anywhere. They are the most popular form of wireless phone. They are small and relatively lightweight, and today many people wear them on their belts for easy access and to easily hear them ring. Most wireless subscribers today seek the convenience of a phone they can take with them in their pockets or on their belts in order to truly achieve "anytime, anywhere" communication ability.

Mobile telephones are stationary, non-removable phones that are mounted in automobiles. These phones are not produced or sold on a mass-market basis anymore. They have become very rare due to the appeal, size, and ease of use of the modern portable cell phone. The only mobile phones that are still being produced are for automobile manufacturers as add-ons to some car models.There are many types of wireless telephones in use today. The functionality of today’s wireless phones comes in many, many flavors. From a high-level perspective, though, all wireless phones fall into one of the following two categories:

Portable telephones are the type of handset that users are able to carry with them anywhere. They are the most popular form of wireless phone. They are small and relatively lightweight, and today many people wear them on their belts for easy access and to easily hear them ring. Most wireless subscribers today seek the convenience of a phone they can take with them in their pockets or on their belts in order to truly achieve "anytime, anywhere" communication ability.


Mobile telephones are stationary, non-removable phones that are mounted in automobiles. These phones are not produced or sold on a mass-market basis anymore. They have become very rare due to the appeal, size, and ease of use of the modern portable cell phone. The only mobile phones that are still being produced are for automobile manufacturers as add-ons to some car models.
 

Copyright 2007 All Right Reserved. shine-on design by Nurudin Jauhari. and Published on Free Templates