tag:blogger.com,1999:blog-63528002779566330362024-03-14T14:46:58.619+05:30My Equationdeepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.comBlogger32125tag:blogger.com,1999:blog-6352800277956633036.post-26167389902786043552008-11-24T09:12:00.000+05:302008-11-24T09:32:01.672+05:30Revisiting 1962's incredible saga of valourSometimes we become so selfish to be only involved in our daily chorus to be someone, to scale never ending heights of success.Today while going through my usual habit of scanning the news items, I came across this link, which made me sit up and think… where is our nation heading now a days.I will just be adding the caption, do read it.On November 18, 1962, 114 soldiers of the 13th Kumaon fought deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-58220216073871590882008-10-15T13:38:00.000+05:302008-10-15T14:06:18.731+05:30The Bubble Anecdote -- on Land/Stock crisis !It describes how an 'asset bubble' builds up and what are its consequences. Read it even if it confuses you a bit… things will be clear as you reach the end…Once there was a little island country. The land of this country was the tiny island itself. The total money in circulation was 2 dollars as there were only two pieces of 1 dollar coins circulating around.1. There were 3 citizens living on deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com1tag:blogger.com,1999:blog-6352800277956633036.post-66166080274124082542008-07-23T09:00:00.000+05:302008-12-09T21:04:29.888+05:30No limitations for helpingdeepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-68140688119026250382008-05-30T15:31:00.000+05:302008-05-30T15:38:23.196+05:30Is it Blackout for BlackBerry in India?The department of telecom (DoT) is learnt to have issued an ultimatum to Canada’s RIM, the maker of the BlackBerry smartphone, that it will have to provide monitoring solutions either in the form of encryption keys, or by shifting servers to India, if it wants to continue operations.In simple terms "Open code or shut shop".more details here..deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-91355405953958728032008-05-28T11:22:00.000+05:302008-12-09T21:04:30.254+05:30Lot More to Do with Webcam with Free ToolsWebcam along with a computer can be used for lot more things apart from video/web chatting.You will be surprised at the amazing things which can be achieved using a webcam and some free utilities. A few are mentioned Below : 1. Keep In Touch with Friends and Family2. Turn Your Webcam into a Motion-Sensing Security Camera3. Login to Windows with Your Face4. Snap Pictures of Would-Be Thieves5. deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-85112514861608250442008-05-20T16:43:00.000+05:302008-12-09T21:04:30.532+05:30Refactoring: Improving the Design of Existing Code by Martin FowlerI liked the below quote from Steve Yegge's blog ..................When I read this book for the first time, in October 2003, I felt this horrid cold feeling, the way you might feel if you just realized you've been coming to work for 5 years with your pants down around your ankles. I asked around casually the next day: "Yeah, uh, you've read that, um, Refactoring book, of course, right? Ha, ha, I deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-82298153922053210352008-05-15T13:32:00.000+05:302008-12-09T21:04:30.693+05:30Developers are Born Brave......Picture says it ALL... deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-90819216057804649652008-05-13T15:02:00.000+05:302008-12-09T21:04:31.280+05:30Data from Hubble cheaper than (SMS)textingA British space scientist has worked out that sending texts via mobile phones works out to be far more expensive than downloading data from the Hubble Space Telescope. Calculations made by the University of Leicester's expert Nigel Bannister, who worked out the cost of obtaining a megabyte of data from Hubble and compared that with the five pence cost of sending a text, were used for the Channeldeepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-18216233561147991302008-05-09T08:36:00.000+05:302008-12-09T21:04:31.639+05:30A PRE-SCHOOL TEST FOR YOUA PRE-SCHOOL TEST FOR YOUWhich way is the bus below travelling?To the left or to the right?Can't make up your mind?Look carefully at the picture again.Still don't know?. . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. Primary school children were shown this picture and asked the same question.90% of them gave this answer:"The bus is travelling to the right.."When asked, "Why do you think deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-15992257148993082662008-05-08T09:10:00.000+05:302008-05-08T09:10:12.115+05:30An Interview with Bjarne StroustrupC++ creator Bjarne Stroustrup discusses the evolving C++0x standard, the education of programmers, and the future of programming.Very Interesting article, check it out....deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-1491734512978187142008-05-06T08:56:00.000+05:302008-12-09T21:04:31.964+05:30195 Free Online Programming Books TechToolBlogIn Case you, like I , always keep on looking for tech books .... better if FREEdeepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-9537477557814789982008-04-23T15:35:00.000+05:302008-04-23T15:41:40.418+05:30Virtual Sticky Notes for a Neat DesktopIt’s paperless!Well, if you happen to be one of those who love a neat desktop or the environment, then you could have a go at trying virtual sticky notes.These are software applications that allow you to put a note on your display just as you would a Word document or presentation---no paper, no gum, and you can get rid of them by just hitting the ‘delete’ button.There are a number of options (deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-86187088548611822202008-04-08T11:44:00.000+05:302008-12-09T21:04:32.592+05:30Importing old email to Gmail.Got a new Gmail ID? But wondering how you can transfer your old mails from your other accounts to it?Here are a few tips by which you can actually make it happen.First, you need to tell Gmail how to retrieve your mail from old accounts using POP. For this you need to set up a Mail Fetcher.* Click Settings from the top of any email page.* Click Accounts.* In the Get mail from other accounts deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-69978455478913283582008-04-01T19:25:00.000+05:302008-04-01T19:31:38.377+05:30Detect Heap Corruption -- Using CrtCheckMemory()To debug code that caused heap corruption,We normally do struggle against the computer in order to understand what causes the corruption and how.In the search for memory validation APIs I have found _CrtCheckMemory() API which is being used by debug version of C run-time libraries. Using this API wrapped with an assert macro gives us the opportunity to check the heap every few lines of code deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-30382778007327382972008-03-25T08:50:00.000+05:302008-03-25T09:02:04.972+05:30Forcing Cpp Functions To Be Called Non-inlinedCan you think of a way to force a function (usually a very small one) from not being inlined by a compiler for optimization purpose.Often such little functions are auto-inlined by the optimizer, when compiling in release/optimized mode. Although there is a way to prevent function from inlining by prototyping it with the _cdecl keyword, sometimes all you need just specific calls to be deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-6290616157688466862008-03-24T13:35:00.000+05:302008-03-24T13:49:41.608+05:30Preventing object creation on stackIn C++, sometimes you don't want the user of your class to create the object of it on stack, because the stack resource is rare. Is there any way to do this?Yes!!!What you should do is to make your destructor private, rather than public or protected.You can do like this:class CTest {private:~CTest ();}Why only private, because if you make it protected, yes the object this class can't not be deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-11351867870511254472007-11-28T10:58:00.000+05:302007-11-28T11:06:57.515+05:30'Google's Gdrive on Way'Google Inc is preparing a service that would enable users to store data from their personal hard drives on its computers, the Wall Street Journal reported Tuesday in its online edition. Users would be able to house files they would normally store on personal computers -- such as word-processing documents, digital music, video clips and images -- on Google's computers, the Journal said, citing deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-61890920402312167162007-08-23T09:19:00.000+05:302007-08-23T09:24:46.012+05:30Wikiscanner."Wikipedia is like SecondLife for corporations...WikiScanner threatens a concept that's even more American than democracy." -Stephen ColbertEver heard of a Wikipedia reconnaissance tool?Now you can with the Wikiscanner list anonymous wikipedia edits from interesting organizations.You see, that is why Wikipedia rocks.Try it outdeepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-50533691461473582682007-07-17T10:04:00.000+05:302008-12-09T21:04:33.414+05:30Voyage of windows - IWindows_1.01Windows_2.03Windows_3.00deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-65550044711278248852007-07-04T08:49:00.000+05:302008-12-09T21:04:33.612+05:30iPhone securityiPhone security settings - iPhone User's Guide (Manual) - VPN technologies it works with - Apple data leak- iPhone Mail,Safari,VPN,Wireless settings- & Many more ,Good reference site for quick iPhone security manual by Xeno Kovah. Link here.deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-53381343258737632652007-07-04T08:42:00.000+05:302008-12-09T21:04:33.944+05:30iPhone activationInteresting stuff for security geeks:Activation of the iPhone works in a similar manner to windows activation (standard signature handshake). iTunes gets three things from the phone, the DeviceID, the IMEI, and the ICCID. This is called the token and is unique to every iPhone. This token is then sent to the apple server (alfred.apple.com) via SSL. Apple uses their private key to sign the token deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-22149926463023563162007-06-12T13:30:00.000+05:302007-06-12T13:37:18.410+05:30Google's new cookie recipe!Following reports from ,Privacy International, a London-based organization focused on privacy intrusions by government and businesses,that analyzed the privacy practices of 22 Internet companies. Google received the lowest mark, followed by Yahoo, Windows Live Spaces, Hi5, Apple and AOL.Reacting to this Google is thinking up a new cookie recipe!Google Inc is scaling back how long it keeps deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-11545636242334836702007-05-22T08:51:00.000+05:302008-12-09T21:04:34.232+05:30Combinational Game TheoryA game, in its simplest terms, is a list of possible "moves" that two players, called left and right, can make. Every move is in fact, another game, such that each game can be considered a single state that the game can exist in.Combinatorial game theory (CGT) is a mathematical theory that only studies two-player games which have a position which the players take turns changing in defined ways ordeepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-52033961425810425252007-05-08T09:01:00.000+05:302008-12-09T21:04:34.350+05:30Google: Champions Of InnovationGoogle has added one more fantastic feature to its search queries. A Link to the Stock quote of the searched company in the first search result.This is going to add lot more value to it.Although this was available with Yahoo Search Engine, but I feel there interface is not so good, because it leads you to a different page with all data stuffed in a single page.Googlers score in 1. Easy deepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0tag:blogger.com,1999:blog-6352800277956633036.post-60132327901860703952007-05-08T08:18:00.000+05:302008-12-09T21:04:34.522+05:30How Googling a.k.a Google works?It takes 8 not so simple steps to Google to find millions of results in fraction of a Second.Lets’ find out what are they-A peep inside Google’s Web Google searches harness one of the world’s most powerful computers. A search, which typically takes less than half a second, is the result of a complex journey that typically makes at least two stops, often thousands of miles apart. Googlebots Googledeepakhttp://www.blogger.com/profile/11300263711306795245noreply@blogger.com0