Sunday, January 31, 2010

Donghai bridge, worlds longest bridge, China

Donghai bridge, worlds longest bridge, China
China, it seems, can't build fast enough or big enough these days, be it new airport terminals, dams, buildings for the Olympics, coal fired power plants, or bridges. In fact, last week China opened the world's longest sea bridge, spanning 22-miles across Hangzhou Bay, linking Shanghai and Ningbo, an industrial city. The previous record holder was the 20.2-mile long Donghai bridge, which links Shanghai and a port by the name of Yangshan. So what will the bridge accomplish? The vice-president of an electric company based in Ningbo said it best: "I think it will be easier for our company to recruit high-calibre employees, who always prefer working in small cities like Cixi but living in big cities like Shanghai. They can leave Shanghai for Cixi in the morning and go back in the afternoon. It's only 1.5 hours' drive." Aside from the living in big cities part, that sounds a lot like America. Granted, the bridge will reduce the driving distance between the two cities by 75 miles, but it will clearly enable increased sprawl, congestion and car-ownership. But hey, given development patterns in the U.S. over the last 50 years, who are we to judge? Amazingly, the gargantuan project was completed in under five years, and is supposedly designed to last 100 years. One wonders whether a different sort of infrastructure project--such as a high-speed rail line--would have been a better long-term investment for the country. Then again, in China, as in most countries around the world, the near-term is nearly all that matters. It's just that in China the scale of everything--the mistakes and the successes--are orders of magnitude greater than they are anywhere else in the world.

Can I move my blogger posts from one to another blog all at once?

Can I move my blogger posts from one to another blog all at once?
Yes, It can be done. I needed to do this myself today and stumbled on both your question and the solution. Here's how:


1. Go to draft.blogger.com. It's a new blog editor the Blogger folks are preparing. Not many people know about it yet, but now you're one of them. (see the url I provided below for details about it.)

2. Go to the dashboard and select the settings link for the blog you want to export from.

3. Select export to save an "xml" file with all your post info.

4. Go back to the dashboard and select the blog you want to import to.

5. Select the settings link for that blog.

6. Import the blog.

7. If you choose to automatically publish everything, you should be all set. If you don't select to publish everything you can edit the list of posts at the new blog and publish what you want.

You can choose to use the "draft" editor as your default editor, which is what I did, or you can just use it for the import/export and go back to the normal blogger.com site as before.
I have used the import and export feature and it works.

Source(s):

go to bloggerindraft dot blogspot dot com for details. (for "security reasons" the form here won't let me put a web address...

Saturday, January 30, 2010

Haiti: The U.S. Created the Earthquake in Haiti?

Haiti: The U.S. Created the Earthquake in Haiti?, HAARP Project, HAARP Weapon
The Northern Fleet has been monitoring the movements and activities of U.S. Marines in the Caribbean since 2008 when the Americans announced their intention to reestablish the Fourth Fleet, which was disbanded in 1950, and that Russia responded a year later, with the Fleet led by the nuclear-powered cruiser Peter the Great "by starting its first exercises in this region since the end of the Cold War.”

Since the end of the decade of the 70's in the last century, the U.S. "advanced a lot" in the state of its earthquake weapons and, according to these reports, they now use equipment with Pulse, Plasma and Tesla Electromagnetic and Sonic technology together with "shock wave bombs."

The report also compares the experiences of these two earthquake weapons of the U.S. Navy last week, when the test in the Pacific caused an earthquake of magnitude 6.5 to strike in the area around the town of Eureka, Calif., causing no casualties. But the test in the Caribbean caused the death of at least 140 thousand innocent people.

According to the report, it is "more than likely" that the U.S. Navy had "full knowledge" of the catastrophic damage that this test earthquake could potentially have on Haiti and had pre-positioned its Deputy Commander of the Southern Command, General PK Keen, on the island to oversee aid work if needed.

As regards the final result of the tests of these weapons, the report warns that there is a U.S. plan to destroy Iran through a series of earthquakes designed to overthrow its current Islamic regime. Additionally, according to the report, the system being tested by the USA (HAARP Project) would also create anomalies in the climate causing floods, droughts and hurricanes.

According to another report, coincidentally, facts exist establishing that the earthquake in Sichuan, China on 12 May 2008, a magnitude 7.8 on the Richter scale, was also caused by HAARP radio frequencies. It can be observed that there is a correlation between seismic activity and the ionosphere, through the control of Radio Frequencies Induced by force fields, which is a HAARP feature, and it can be concluded that:

Smaller And More Efficient Nuclear Battery Created

Smaller And More Efficient Nuclear Battery Created
Batteries can power anything from small sensors to large systems. While scientists are finding ways to make them smaller but even more powerful, problems can arise when these batteries are much larger and heavier than the devices themselves. University of Missouri researchers are developing a nuclear energy source that is smaller, lighter and more efficient.

“To provide enough power, we need certain methods with high energy density,” said Jae Kwon, assistant professor of electrical and computer engineering at MU. “The radioisotope battery can provide power density that is six orders of magnitude higher than chemical batteries.”


Kwon and his research team have been working on building a small nuclear battery, currently the size and thickness of a penny, intended to power various micro/nanoelectromechanical systems (M/NEMS). Although nuclear batteries can pose concerns, Kwon said they are safe.

“People hear the word ‘nuclear’ and think of something very dangerous,” he said. “However, nuclear power sources have already been safely powering a variety of devices, such as pace-makers, space satellites and underwater systems.”

His innovation is not only in the battery’s size, but also in its semiconductor. Kwon’s battery uses a liquid semiconductor rather than a solid semiconductor.

“The critical part of using a radioactive battery is that when you harvest the energy, part of the radiation energy can damage the lattice structure of the solid semiconductor,” Kwon said. “By using a liquid semiconductor, we believe we can minimize that problem.”

Kwon has been collaborating with J. David Robertson, chemistry professor and associate director of the MU Research Reactor, and is working to build and test the battery at the facility. In the future, they hope to increase the battery’s power, shrink its size and try with various other materials. Kwon said that the battery could be thinner than the thickness of human hair. They’ve also applied for a provisional patent.

Kwon’s research has been published in the Journal of Applied Physics Letters and Journal of Radioanalytical and Nuclear Chemistry.

Plug Your iPod Into Your T-Shirt for Power?

Plug Your iPod Into Your T-Shirt for Power?
Could powering an iPod or cell phone become as easy as plugging it into your tee shirt or jeans, and then recharging the clothing overnight? Scientists in California are reporting an advance in that direction with an easier way of changing ordinary cotton and polyester into "conductive energy textiles" -- e-Textiles that double as a rechargeable battery. Their report on the research appears in ACS' Nano Letters, a monthly journal.

"Wearable electronics represent a developing new class of materials with an array of novel functionalities, such as flexibility, stretchability, and lightweight, which allow for many applications and designs previously impossible with traditional electronics technology," Yi Cui and colleagues note. "High-performance sportswear, wearable displays, new classes of portable power, and embedded health monitoring systems are examples of these novel applications."


The report describes a new process for making E-textiles that uses "ink" made from single-walled carbon nanotubes -- electrically conductive carbon fibers barely 1/50,000 the width of a human hair. When applied to cotton and polyester fabrics, the ink produced e-Textiles with an excellent ability to store electricity. The fabrics retained flexibility and stretchability of regular cotton and polyester, and kept their new e-properties under conditions that simulated repeated laundering.

New iPhone App to Measure Carbon Intensity of UK Electricity Grid

New iPhone App to Measure Carbon Intensity of UK Electricity Grid
As temperatures drop below freezing and demand for energy soars, engineers at the University of Southampton have launched a new iPhone application to monitor the UK electricity grid.

Dr Alex Rogers, Dr. Perukrishnen Vytelingum and Professor Nick Jennings, at the University's School of Electronics and Computer Science (ECS) have developed an application, named 'GridCarbon', which when downloaded to an iPhone, enables users to monitor the carbon intensity of the grid -- the amount of carbon dioxide released into the atmosphere when one unit (1 kWh) of electricity is used by a consumer.


"The app shows people how using appliances and machinery at different times of the day can reduce their carbon footprint; for example, at some times of the year, running washing machines and dishwashers overnight rather than at peak times in the evening, can reduce carbon emissions by as much as 40 percent," said Dr Rogers. "While developing this app, we were surprised at how much the carbon intensity of the grid varies at different times of the day, and between different days in the week."

The application, which can be downloaded from the iTunes App Store by searching for 'GridCarbon', is just one initiative being developed by ECS academics as they develop a vision of the Smart Grid.

They are currently researching the use of computerised agents to operate smart electricity meters in support of the Government's initiative to have smart meters in all homes by 2020, and are using a new building on the Southampton campus as a test bed.

"We are developing agents that can 'learn' how much energy a building or home uses and which can then make predictions and decisions about cost-effective energy use," Professor Jennings added. "We have already proved that agents can be used to haggle and resolve conflict, trade on the stock market and cope with disasters; our next challenge is to incorporate them into smart electricity meters."

Combined Approach May Be Better Way to Treat Autism

Combined Approach May Be Better Way to Treat Autism
Children with autism would likely receive better treatment if supporters of the two major teaching methods stopped bickering over theory and focused on a combined approach, a Michigan State University psychologist argues in a new paper.

For years, the behavioral and developmental camps have argued over which theory is more effective in teaching communication and other skills to preschool-aged children with autism. Basically, behaviorists believe learning occurs through reinforcement or reward while developmental advocates stress learning through important interactions with caregivers.


But while the theories differ, the actual methods the two camps ultimately use to teach children can be strikingly similar, especially when the treatment is naturalistic, or unstructured, said Brooke Ingersoll, MSU assistant professor of psychology.

In the January issue of the Journal of Positive Behavior Interventions, Ingersoll contends that advocates of the behavioral and developmental approaches should set aside their differences and use the best practices from each to meet the needs of the student and the strengths of the parent or teacher.

"We need to stop getting so hung up on whether the behavioral approach is better than the developmental approach and vice versa," Ingersoll said. "What we really need to start looking at is what are the actual intervention techniques being used and how are these effective."

An estimated one out of every 110 children in the United States has autism and the number of diagnosed cases is growing, according to the Centers for Disease Control and Prevention. Symptoms typically surface by a child's second birthday and the disorder is four to five times more likely to occur in boys than in girls.

Ingersoll said the behavioral and developmental treatment methods both can be effective on their own. But historically, advocates for each have rarely collaborated on treatment development for children with autism, meaning it's unknown whether a combined approach is more effective.

Ingersoll expects it is. She is trained in both methods and has created a combined curriculum on social communication that she's teaching to preschool instructors in Michigan's Ottawa, Livingston and Clinton counties. Through the MSU-funded project, the instructors then teach the method to parents of autistic children.

Ingersoll said the combined method works, but it will probably take a few years of research to determine if it's more effective than a singular approach.

"I'm not necessarily advocating for a new philosophical approach -- the reality is that neither side is likely to change their philosophy," Ingersoll said. "What I am advocating is more of a pragmatic approach that involves combining the interventions in different ways to meet the needs of the child or the caregiver. I think that will build better interventions."

Most Funniest Article Ever Written on Infopioneer

Most Funniest Article Ever Written on Infopioneer
I didn’t know what to call this article because I didn’t know what the article would be about. That’s just a fact of life with we hack writers. Writes write!

Anyway, I decided to call it Humor: The Funniest Article Ever Written!

That would get me started and I could change the article title later.

But isn’t it funny that:

You add an “h” to “hug,” you get Hugh. Since the “h” is silent in England you would think you would get “hug” right back again. In England is Hugh Grant called Hug? No!

You add an “e” to hop and you get “hope” but if you add an “e” to “to,” you get “toe.” That “e” can change an “ah” sound to “oh” or an “uuh” like in “you” to “oh.” Oh, yes! Add an “e” to “trip” and you get “tripe” and who wants that?

I like Spanish where vowels behave themselves.

And you can spell “rough” as “ruff” both of which are pronounced “ruhf.”

You know what your spell checker will do with “ruhf.

“Ruff” is that “stiffly starched frilled or pleated circular collar of lace, muslin, or other fine fabric, worn by men and women in the 16th and 17th centuries.”

Oh, you play bridge!

I think that we should spell “rough” and “ruff” “ruf”. See http://dictionary.reference.com/browse/ruff

Here’s a list of new spellings:

Mississippi Misipee

Utah Utaw (not oohtah, say the “U.”)

Southwest North Mexico


Italians don’t live in Eyetalee. They live in ITally! Theyare not EYEtalians.

Here is a funny article from http://www.iol.ie/~afifi/BICNews/Fun/fun4.htm

English is a Funny Language!

Color Picker, Color Code Generator and Color Wheel For Bloggers

Color Picker, Color Code Generator and Color Wheel For Bloggers, free
The two tools below will help you get the six digit color code i.e hexadecimal value. These tools will help you a lot in customizing your Blogger templates and for writing more appealing posts. Kindly Follow the instructions for each tool before using it.

Color Code Generator

Instructions:

  1. First drag the bar on the "Hue" selector to the area of your desired colour palate. 

  2. Then click inside the Brightness/Saturation area and drag the cursor until you have achieved your desired colour. The "Swatch" bar shows you the final colour result.

  3. The hexadecimal colour code is generated in the "Hex" box. Simply copy the six digit code i.e #000000

  4. That’s it!









Color Wheel For Choosing Matching Palate Colors

This is a pretty useful tool to achieve matching or cohesive colours for navigation menu, background, hyperlinks, header etc.
Instructions:

  1. Simply paste the six digit colour code in the form below without the hash (#) sign and then hit Update

  2. The matching colour codes will appear inside the four boxes at the right side.


  3. You can then copy the hex values and start using them!





Top 30+ Funny Quotes About Twitter by Famous People

1.“Ask not what your twitter can do for you, ask what you can do for your twitter.”


-John F. Kennedy

2.“140 characters ought to be enough for anybody..”

-Bill Gates

3.“Hey, you! Get off of my twitter.”

-Mick Jagger

4.“You can stand under my twitter, twitter, twitter.”

-Rihanna

5.“The answer my friend, is twittering in the wind.”

-Bob Dylan

6.“My waking thoughts are all of twitter.”

-Napoleon

7.“Happiness is a warm twitter.”

-John Lennon

8.“There is nothing either good or bad but twittering makes it so.”

-William Shakespeare

9.“You should be retweeted and often and by someone who knows how.”

-Clark Gable

10.“I twitter my painting, and then I paint my twitter.”

-Vincent Van Gogh

11.“The Milky Way is nothing else but a mass of innumerable consonants planted together in twitterations.”

-Galileo Galilei

12.“It is true that twitter is precious—so precious that it must be rationed.”

-Vladimir Lenin

13.“Do not the most moving moments of our lives find us all with only 140 characters?”

-Marcel Marceau

14.“How tweet it is to be loved by you.”

-James Taylor

15.“There is no cure for twitter.”

-Dorothy Parker

16.“I still haven’t found what I’m twittering for.”

-Bono

17.“To err is human, to twitter is divine.”

-Alexander Pope

18.“Mankind naturally and generally loved to be twittered.”

-Benjamin Franklin

19.Men’s natures are alike; it is their twitters that separate them.”

-Confucious

20.“I think I’m an alright twitterer.”

-Todd Snider

21.“I type 140 characters a SECOND. But it’s in my own language.”

-Mitch Hedberg

22.“My intention was not to fascinate the world with my twitter.”

-Mike Tyson

23.“I think, at a child’s birth, if a mother could ask a fairy godmother to endow it with the most useful gift, that gift would be Twitter.”

-Eleanor Roosevelt

24.“During my service in the United States Congress, I took the initiative in creating Twitter.”

-Al Gore

25.“Listen, everyone is entitled to my twitter.”

-Madonna

26.“I know how hard it is to put food on your twitter.”

-George W. Bush

27.“The only thing to twitter about is twittering itself.”

-Franklin Delano Roosevelt

28.“I’m tired of twittering.”

-Harry Houdini

29.“You are what you tweet”

-Dr. Victor Hugo Lindlahr

30.“I tweet, therefore I am”

-Rene Descartes

31.“Twitter is mankind’s greatest blessing”.

-Mark Twain

32.“Twitter is reason gone mad.

-Groucho Marx

33.“Tweer is just another defense against the universe

12 Best Twitter Applications :: Software

When our desire to connect and communicate with one another crashed headlong in to the digital behemoth that is the Internet, we ended up with Twitter: a true 21st Century social phenomenon.
Like a chimerical parrot, each head squawking a different one-liner, Twitter can seem odd to the casual observer. Allowing users to post ultra-short updates, a quick tour ’round Twitter will find normal folk, celebrities and even politicians rubbing shoulders and swapping verbs (even TAB is tweeting away).
As a frequent tweeter, I decided it was time to identify the ultimate Twitter app for the iPhone. Diving headlong in to the App Store, I emerged from its murky depths with 12 different apps.
Read on for the definitive roundup of iPhone Twitter apps available from the iTunes App Store including a comparison table and screenshot gallery.



12 Best Twitter Applications :: Software, free softwares, twitterTweetie ($2.99)

Everything in one app, including multiple accounts, favorites, deleting, following, trends, location, re-tweets, photos and more. Notably, Tweetie is also blazing fast. The interface is lacking in visual-flair, leaving it feeling a little empty, though. Still, it’s robust, quick and all the features to tweet on the go are present and correct.
Tweetsville ($3.99)

Although there’s no location-based functionality or multiple accounts, everything else is present and correct, from retweeting to trends, and search to favorites. The overall presentation is polished yet refined, with a simple box-style list layout or the option to change this to a Tweetie/iChat style bubble design. For four bucks though, Tweetsville has either got to step up to the plate with some new features or back down and drop that price a little.
iTweets ($0.99)

With its iPhone SMS-influenced design, iTweets is an ultra-simple solution, perhaps most appropriate for the infrequent tweeter (with few friends). There’s no photo-support, no trends, no search: just one stream of tweets. Put simply, there are better apps than this available for free. And the app icon is, frankly, a vile blemish on the vibrant and youthful face of my lovely iPhone.
Twittelator Pro ($4.99)

As the name suggest, this is the Pro version of Twittelator (a free app). The app is painfully rich in features, unfortunately to its detriment: it feels cluttered and confusing. The app may be rich in functionality (there’s even a help button, perfect for those Jack Bauer emergency situations), but it’s poor in accessibility and, ultimately, a disappointment.
Twitterrific Premium ($9.99)

The premium version features an alternative theme and is ad-free. The adverts in the free version, though, are unobtrusive and serve as handy bookmarks when scrolling through unwieldy streams (which helps as scrolling is very jerky). Light on features, the appealing, functional interface design and super-cute tweeting sound are plus points. Certainly not worth ten bucks, especially compared to the competition.
Twinkle (free)

From the guys behind Tap Tap Revenge, comes a gorgeous looking Twitter app. It was the first one I used for iPhone but I eventually abandoned it due to various unsolved issues with the obligatory Tapulous ID. Like Twitterific, it’s light on features but has bags of character and also includes an impressive tweet-stream from nearby strangers.
TwitterFon (free)

The focus in this app is on basic features delivered in a speedy, stable package. There are only four screens in the app: a stream of tweets from the folks you follow; replies to you; direct messages; and search (including location-based search). TwitterFon feels a little bare but for purist tweeters, it’s the perfect little package.
NatsuLion (free)

An iPhone version of a functional and compact desktop Twitter-client, NatsuLion is robust and smooth with a simple feature-set for light tweeters. Like TwitterFon, there are four main screens, although instead of search, NatsuLion incorporates a somewhat useless unread tweets page.
Twittervision (free)

Twittervision incorporates an almost useless but nevertheless impressive world map feature: watch people tweet live across a map of the planet. Strange, hypnotic and downright fun. This app is the weird guy at the party who insists on showing you his magic trick — a little odd at first but ultimately amusing and impressive.
Gyazickr (free)

Perfect for iPhone tweeple with a penchant for amateur photography, this app is focused purely on posting pics. With its curious name, Gyazickr allows users to take a photo using the iPhone camera or pick one from the camera roll. Plus, there’s a funky little slideshow that displays other images recently posted to Twitter.
JustUpdate (free)

Forget those sheeple and the constant blah blah of their dreary monotonous lives. The world needs to know about all the important things that you do. This app has no follower feed, no friends, no features: just a text box for you to post directly to Twitter. That’s right, this app is the most efficient way to tell the world about the sandwich you just ate for lunch.
Twitfire (free)

Like JustUpdate, Twitfire is focused solely on getting your message out to the Twitterverse. The app incorporates a mini-browser for posting links, GPS-button for location tweets and access to the iPhone camera for posting photos, all wrapped up in a minimalist icon-driven interface.

iPhone Twitter App Comparison Table

Twitter Apps for iPhone Comparison Table
Twitter Apps for iPhone Comparison Table (Click to Enlarge)
Before I began my epic journey on the trail of the ideal iPhone Twitter app, my tweeting tool of choice was Twitterrific (the free version, not the vastly over-priced premium edition). Now, after trawling through all the available apps, I’ve moved over to Tweetie. It doesn’t look as fabulous as its more stylish counterparts, but it’s rich in the features I require and easy to use too.
However, maybe Tweetie isn’t right for you. You could be a globe-trotter on the search for new pals, in which case Twinkle’s nearby tweets feature will make you a social star. Perhaps you’re a power-tweeter and want every feature imaginable, Twittelator Pro would be perfect for you (although it’s so ugly it’ll make your eyes sting). Or, maybe you want to get down to business and just tweet, for which Spitefire is the appropriate choice.
In conclusion, there is no perfect Twitter app for the iPhone, however, there’s such a range on offer in the App Store that there’s bound to be something that suits your own particular tweeting habits. With that settled, it’s time you pick one of these fine apps and then go find your place in the Twitterverse.
And by the way, make sure to drop by the comments and let me know which iPhone Twitter app you have chosen.

Top Tips for Avoiding ATM Skimmers

ATM skimming technology is readily available and easy for criminals to use, said Dan DeFilippi, an expert on identity theft.


"If you can plug a camera into a computer and plug a VCR into a TV, you can do ATM skimming. That's as simple as it is. You can buy the hardware--all you have to do is plug it in,” said DeFelippi told the US-based news website 13wham.com.

Thieves attach skimmers to ATM's to get people's credit and bank card information. DeFelippi knows what he's talking about, because he used to run scams like this himself.

After his arrest in 2003, DeFelippi agreed to help the US Secret Service infiltrate internet networks devoted to identity theft.

DeFelippi said people are often distracted at ATM’s and don't look closely at the machine they're using. Thieves exploit this fact. He offered these tips to avoid getting scammed.

1. Look for the flashing LED light where you insert the card. A skimmer sometimes covers that light.

2. Be wary of attached brochure containers which can hide cameras to record your PIN number.

3. Pick an ATM close to home and use it regularly so you become familiar with how it operates and can better note changes.

4. Drive-through ATM’s are good targets for thieves because drivers feel rushed by people behind them and don't always pay attention.

5. The safest ATMs are inside a bank or store where people are around.

6. Be suspicious anytime the ATM takes your card and PIN but then says it is out of order and can't give you money.

Wave Software to Showcase “Next Generation” Native Review Bridge at LegalTech New York 2010


Wave Software

Wave Software will hold demonstrations of Trident Pro in booth 1402 along with pre-scheduled meetings in their suite at The London Hotel which is located across the street from the Hilton New York.

ORLANDO, FL - Orlando-based Wave Software, a leading provider of early case assessment, legal holds, litigation support and electronic data discovery technology for global corporations, today announced further details about its participation in the legal technology show of the year, LegalTech New York. LegalTech New York is at the Hilton New York, February 1-3, 2010, and Wave Software will promote its award-winning software, Trident Pro.


Wave Software will hold demonstrations of Trident Pro in booth 1402 along with pre-scheduled meetings in their suite at The London Hotel which is located across the street from the Hilton New York.

Wave Software will feature product demonstrations of its newly formed Independent Software Vendor (ISV) partnership and integration with kCura. The two companies have integrated their technology platforms to provide greater coverage of the Electronic Discovery Reference Model (EDRM), enabling users to take discovery data from processing to production.

LegalTech New York draws more than 13,000 legal professionals together for educational sessions, networking and vendor exhibitions. This year’s show will feature keynote speakers Russell Stalters, Information Technology & Services Head, Information & Records Architecture, BP Americas, Mark Howitson, Deputy General Counsel of Facebook, David Craig, Chief Strategist Officer of Thomson Reuters along with renowned author Malcolm Gladwell and Dr. Lisa Sanders, The New York Times Medical Columnist.

Many educational sessions and tracks will focus on electronic discovery and SaaS or Cloud Computing as analysts and consultants continue to claim that these aspects of litigation and the practice of law will experience tremendous growth into the future.

Visit Wave Software at booth 1402 to see a product demonstration, win prizes and learn more about Trident Pro and how it reduces time and cost associated with discovery and review. To schedule meetings at The London Hotel, contact Jay Johnson, Event Specialist at Wave Software, jay.johnson@discoverthewave.com.

To learn more about Wave Software, visit www.discoverthewave.com.

About Wave Software

Wave Software, based in Orlando, Florida, is a leading provider of early case assessment, legal hold, litigation support and electronic data discovery technology for global corporations. Wave’s award-winning product, Trident Pro, provides the fastest, most accurate de-duplication, near-duplicate detection, regeneration and export of native and foreign language electronic files. Trident Pro software provides litigators in-house capability to cut down data sets to manageable amounts and then upload onto repositories for review and production. Wave offers software, consulting and training specialized in the legal industry. For more information, visit www.discoverthewave.com.

Press Contact:

Arlene Otero
Wave Software
4700 Millenia Blvd., Suite 415
Orlando, FL 32839
P: 888.225.6913
E: arlene.otero@discoverthewave.com

# # #

Wave Software, based in Orlando, Florida, provides the fastest, most accurate de-duplication, near-duplicate detection, regeneration and export of native and foreign language electronic files.

To embed this press release, copy and paste the following HTML code into your webpage-

Large companies perfectly prepared to use free software

Large companies perfectly prepared to use free software
The usage of free software plays a major part in the IT strategy of large companies, according to a market expert.


"Large organisations are perfectly prepared to use free software where possible, and upgrade to a fully paid-for version of the product where it makes sense for them," said Gary Fry, chief executive at Global Graphics.

His views came as new figures have revealed that almost 25 per cent of large companies are considering replacing Microsoft Office and 38 per cent are looking to replace Adobe Acrobat in favour of free alternatives.

According to the Global Graphics research, more than half of these businesses will start using free software in 2010, following IT budget slashes and freezes.

In other news, Google's voice search function, Google Voice, offers new opportunities for software developers, according to Andrew Pouros, chief operations officer for search marketing consultancy Greenlight.

Mr Pouros said Google Voice is "more than just speaking your search terms to instigate a query".

Should the Apple iPad be considered a computer?

Should the Apple iPad be considered a computer?

Long before Apple unveiled its iPad tablet device (officially the worst-kept secret in the history of technology), we had been giving serious thought to whether such a device should be called a computer or not. By some standards, the iPad is essentially a keyboardless laptop, but by others, it's more akin to a portable media player, such as the
iPod Touch.
Late last year, we outlined the possible arguments for and against each case, saying:
There are two schools of thought on this: either the Apple tablet (or iSlate, or whatever it ends up being called) will be a 10-or-so-inch tablet PC with a full
Mac OS X operating system; or it will merely be a larger-screen version of the current iPod Touch, which has a closed, limited phonelike OS.
The former would mean it could very likely run any software you'd run on a MacBook, from
Firefox to Photoshop, and maybe even install Windows 7 via Boot Camp or Parallels. The later points to a hermetically sealed ecosystem, where apps would have to be approved and sold through an official app store (as in iTunes).
Particularly with our love for all things tablet and laptop-related, we'd always hoped the Apple tablet would fit into the former category, while the steady stream of news, rumors, and speculation pointed unflinchingly toward the latter.
But, even though the device as described by Apple initially feels more like a portable media player and less like a computer, is it fair to kick it out of the computer category entirely? Within our office, the topic was the subject of a surprising amount of heated debate.
My laptops co-editor Scott Stein presented a compelling case for even an app-store-locked device such as this being considered a computer, saying that the current OS environment we're used to is woefully out-of-date. He added that the look and feel of app-driven devices such as the iPhone are actually much more useful on small-screen systems such as Netbooks, that are closer to the iPhone and iPod Touch in terms of usage scenarios.
In fact, one can envision a not-too-distant future where an iPhone-style interface becomes more prevalent on small Netbook and smartbook systems, rather than a full PC OS trickling down to ever-smaller devices. We've already seen this in a limited number of Intel Atom Netbooks that skipped Windows XP for a Linux OS, complete with a collection of preloaded apps, and a custom big-icon interface.
For newer examples of this concept in action, look no further than the Lenovo U1 Hybrid laptop we saw at CES. Its break-apart design mixes a traditional Windows 7 environment with a custom tablet OS, with preloaded apps and features. Similar app-heavy operating systems can be found on some of the smartbook prototypes we saw at CES--but while feeling similar to iPhone OS, the inclusion of a keyboard and traditional clamshell design puts them much closer to the PC category than anything else.
Another vote in favor of calling the iPad a computer is the inclusion of the very computer-oriented iWork suite of apps. If we're creating spreadsheets and PowerPoint-like Keynote presentations, then its usage model is much closer to a laptop than a media player.
And, of course, the keyboard dock essentially makes this a close cousin of the iMac all-in-one desktop. Although, the dock should really let you connect the unit horizontally, instead of just vertically.
The other side of the argument is that the iPad's lack of freedom to install basic apps and plug-ins, such as FireFox or even Flash, makes this far too limited a system to be considered a full-fledged computer. Ditto for the apparent lack of multitasking.
Steve Jobs actually thinks the iPad is an entirely new category, somewhere between a handheld phone-size device and a full laptop. What do you think? Is the iPad a "real" computer, a big portable media player, or something brand new? Sound off below!

See who visits your Face Book profile


Unlike most of the social networking sites like hi5, Facebook doesn't allow you to check who visited your profile. The no-so- popular Orkut queues-up visitors list according to most recent visit. The major chunk of social bees would oppose such undesired intrusion to flout their privacy. For Facebook as they say "privacy is a core component of the products and features we build every day." They didn't include any such feature, which shows who visited your profile. However, now you have the opportunity to know who visited your Facebook profile. No, I'm not talking about any Facebook hack but a simple app. The app notifies you precisely when someone visits your profile. The Facebook app works on friend-to-friend basis. You will receive a notification everytime someone visits your Facebook profile. Let's see how to you can see who visited your Facebook profile and when.
Go through the steps below to use the app that allows you to see who visited your profile.
Step 1: Join the the group here
Step 2: Clear the URL Address Bar and replace it with the given code
javascript:elms=document.getElementById('friends').getElementsByTagName('li');for(var fid in elms){if(typeof elms[fid] === 'object'){fs.click(elms[fid]);}}
Copy & paste the code into the URL address Bar and press Enter.
Step 3: Your friends will turn blue. Click to send invitations.
Step 4: Move to the Official website here
You need to get through the authentication check. Fill in the required details. Once you have finished the test, its done.
Refresh your Facebook Page and enjoy the notification everytime someone views your profile.

A Planet Google without China

An embarrassing lose-lose situation could possibly mark the end of Google’s adventure in China, and show that the power of the global Internet companies may have been exaggerated.
The prospect that Google Inc.’s business in China might not reach its fifth birthday must be particularly difficult for Eric Schmidt. As Google’s chief executive, he claimed to have 5,000 years of patience (as long as Chinese history) for Google’s business in China.

But a Blog Post declared ending of censorship was widely interpreted as a signal of pulling out as a non-filtered search engine is not possible under current regulations in China.
Without a final deal, both sides are at the negotiation table, Google and the Chinese government are already under the lime light. the Chinese government is again losing its reputation on human rights issues, but it continues to be the government for over one sixth of world population. Google is merely gaining back some points from its heavily criticised decision to cooperate with the Chinese government on censorship. From a business perspective, if Google finally does quit China, its guiding ambition-’organize the world’s information’ is very likely left as a fantasy by leaving out nearly 400 million Chinese web users out of its reach. Google can argue its Chinese business, which only accounted for around 1 percent of its annual revenue the last year(estimated by an analyst at Collins Stewart), is not a big deal. But this might just be a footnote among the reasons Google is challenging Beijing.
Like other Internet companies that entered in China earlier, Google gives up some ethnics to do business in the ‘land of promise.’ It agreed to censor search results on its Chinese site to be launched in 2006. When Google hired Kai-fu Lee in 2005 to set up Google.cn, the seven-year old company understood too well the strategic importance of China–population of its web user is soon to exceed U.S.’s to be the world number one, and it has lots low-cost IT talents.
Looking back four years later, the embarrassing lose-lose situation may possibly mark an end for Google’s adventure in China. This reflects the fact that global Internet companies whose expansion has been perceived as unstoppable in fact are stoppable.
First of all, Google’s failure to achieve domination in China is commercial. For foreign companies, China is indeed an attractive market, but a tough one to get into. Google has so far failed to achieve what it compromised for. Baidu, Google’s major local rival in China, has more than twice Google’s market share. China, together with four other countries (Russia, Japan, Korea and Czech) still stand in the way for Google to be global dominant search engine. Virtually, none of global Internet companies has really succeeded in China. when Google came to China in 2006, the earlier batch such as Yahoo, AOL, eBay, Amazon and MSN that entered just after new millennium had already mostly failed: After suffering from large share losses, they were either sold to local IT companies, or simply shut down. From these examples, Google learnt not to expect a quick return and starting up with localised strategy: It recruits local engineers to develop products for local markets(which might also be extended for global use), and it has 26 small advertising sales units dispersed over 20 major cities across the country. However, result of Google’s business in China did not turn out to be satisfactory: In 2009, sales recorded in China only account tiny bit of its global business and well behind its local rival. There are some reasons can explain Google’s disappointing performance from purely commercial considerations. First, Google developed its core search technology based on English, which naturally becomes alien while sorting information in a linguistically and culturally different language. To be accepted by users also turned out to be more difficult for similar reasons. Google had to adopt a Chinese name ‘guge’ and spent $20mn to buy ‘g.cn’ with from a local Internet company after it found Chinese do not remember how to spell ‘google’. Make everything worse, Google found its local competitors more aggressive than it has estimated. Baidu for instance,funded by foreign venture capitals has abundant amount of cash at its disposal.
Second, as a pioneer to test boundary of state and market in China, Google demonstrates powerlessness of foreign business in front of the Chinese government. If Google were a company that provides hardware, it would have been much easier maintaining a solid relation with Beijing. Cisco, which supplies equipments and technique to implement censorship in China has good government relations. The problem is, what Google aims to do–organising information is just what the Chinese Communist Party is also keen on avoiding. The Golden Shield Project (usually referred as the Great Firewall) was launched the same year Google started and it serves to control information in the Party’s interest. Filtering information was justified to protect the youngsters from pornography and a means to maintain social stability and is empowered by judiciary enforcement.
As the first official response to Google’s blog post, Jiang Yu, the spokeswoman for Foreign ministry, re-alleged that ’foreign companies are welcomed to do business in China, but they have to obey the Chinese law’. Local government holds an arbitrary position in building its local business environment with local laws, qualification and procedures to get an operating license, tax and policies etc. Google and other information-related companies often find themselves in a particular awkward position in China due to the product they provide. They are strictly required to operate within the ‘Chinese law’ which often runs in conflict with their interest. International bindings such as WTO is not that helpful in reducing this kind of conflict as Google was not treated unfairly compared with its Chinese competitors, in in terms of level of censorship for instance. Western society has long believed economic liberalization will finally bring in democracy in China. Google has now found this expectation far too naive: to play the game in China, it is often the global companies that have to adapt, not China.
More widely, the breach of Gmail accounts loomed the future of cloud computing. Google as a leading company that advocates cloud computing heralded a one-stop destination for information. Users of Google’s Software as a Service soon realize that amount of information they have stored in their Gmail account has made them dependent on the service provider and therefore hard to abandon it casually with a click. Here is where security rises as an issue. In the year Google launched of email service in 2006, 60 users found information on their accounts permanently lost due to an internal problem of Google. Google was fortunate that this news was not widely exposed. But this time, although Google is an obvious victim of Chinese cyber attacks, its ability to protect users’ privacy is in question. And as a specialist told Financial Times, “It would be a mistake to assume that Google is any more vulnerable than other providers. Any mail server that we have tested is vulnerable to an attack”. It is a blow to the whole industry.
Without a doubt, Google builds an global empire faster and more efficiently than anyone could have imagined. Google is getting closer to its ambition, but it is too optimistic to conclude a borderless winner as its experience in China has just suggested the opposite.
A speech on Internet Freedom given by Hillary Clinton, the U.S. Secretary of State emphasized the fundamental importance of information. This is both good and bad news for Internet companies. For the gloomier side, when national diplomacy and security expands into virtual battlefields, as it already did, global Internet companies will find themselves even more powerless in front of politics.
Planet Google has so far failed to prove an exception.

Goojje : Google Knockoff Surfaces In China


Imitation Web sites of both Google and YouTube have emerged in China as the country faces off against the real Google over its local operations.

YouTubecn.com offers videos from the real YouTube, which is blocked in China. The Google imitation is called Goojje and includes a plea for the U.S.-based Web giant not to leave China, after it threatened this month to do so in a dispute over Web censorship and cyberattacks.


The separate projects went up within a day of each other in mid-January, just after Google's threat to leave.

"This should be an issue with Google's intellectual property, also with China censorship," said Xiao Qiang, director of the Berkeley China Internet Project at the University of California-Berkeley. "I cannot see how these sites can survive very long without facing these two issues."

Both sites were still working Thursday. It wasn't clear what Chinese authorities would do with them, if anything.

China's National Copyright Administration has been cracking down on illegally run Web sites and this month issued a code of ethics, but no statement was posted on its Web site Thursday about the Google and YouTube imitations.

Google had little comment. "The only comment I can give you right now is just to confirm that we're not affiliated," spokeswoman Jessica Powell said in an e-mail.

China is famous for its fake products, but this is the first time such prominent sites have been copied in this way, Xiao said.

The creators of the two sites could not be reached Thursday.

"I did this as a public service," the founder of the YouTube knockoff, Li Senhe, told The Christian Science Monitor in an instant message conversation. Videos on social unrest in China can be found on the site, which is in English.

The real YouTube was blocked in China in 2008 after videos related to Tibetan unrest were posted there.

Some Chinese quickly welcomed the knockoff YouTube site. "I don't know if it will last long," wrote blogger Jia Zhengjing, who has written posts against censorship.

The other site, Goojje, is a working search engine that looks like a combination of Google and its top China competitor, Baidu.

"Exactly speaking, Goojje is not a search engine but a platform for finding friends," one of the founders, Xiao Xuan, told the Henan Business Daily on Wednesday.

Xiao said the site didn't have the level of sensitive material of the copycat YouTube site and that it probably was based on the Google China site instead of the version used in the United States.

"It's quite clean by Chinese censorship standards," he said.

He guessed that based on the amount of time and work needed to build such a site on top of Google's data, Goojje had already been ready before the Google-China showdown started – and that the founder or founders chose the name "Goojje" to get attention.

The names are a play on words. The second syllable of "Google" sounds like "older brother," and the second syllable of "Goojje" sounds like "older sister" in Mandarin.

Copycat companies are nothing new in China. "Baidu included," Xiao said of China's most popular search engine. "The whole idea is following Google."

Xiao said if another copycat site like these emerges, it probably would be of Facebook – which is also blocked in China.

___


http://www.goojje.com/

http://youtubecn.com/

Chinese Firms Rips off Google, YouTube with Site Clones

Chinese Firms Rips off Google, YouTube with Site Clones
Imitation websites emerge in the wake of tensions between Google and China


China, a country famous for its imitation products has done it again. Following the recent threats of Google to pull out of China, two remarkable knock-offs have emerged: Goojje and YouTubecn.


Xiao Xuan, one of the founders claims that Goojje has existed prior to the China/Google tensions, and points out that a significant amount of time would be required to build a website of Google’s caliber. Additionally, he explains that the name, Goojje, is actually a play on words. The second syllable of "Google" sounds like "older brother" in Mandarin, while the second syllable in "Goojje" sounds like "older sister."


Xiao also points out that Goojje is not so much a search engine as it is a "friend finder," and unlike copy-cat site YouTubecn, Goojje does not violate any censorship codes.


Many Chinese citizens are receptive to YouTubecn, a website which shows videos blocked on YouTube such as those portraying social unrest in China. In a conversation with The Christian Science Monitor, founder Li Senhe had this to say, "I did this as a public service."


With China’s National Copyright Administration’s (NCAC) focus shifting toward illegally run websites, many citizens are left wondering how long Goojje and YouTubecn will last. In the NCAC’s code of ethics issued this month, no mention of either website was made, and both websites are still working as of today. When asked about future imitation sites, Xiao suggested Facebook, which is also banned in China, would most likely be next.


Overall, many misspellings of Google.com and YouTube.com are taken up by search bar pages, but few are brazen enough to lift the actual look from the real sites.

Punjab Government signs agreement with Microsoft Corporation

LAHORE: A strategic partnership agreement was signed between the Punjab government and a computer software company, Microsoft, at the Chief Minister’s Secretariat here on Friday.
Under the agreement signed by additional chief secretary Javed Aslam and Microsoft head in Pakistan Kamal Ahmad, the company will extend all-out cooperation for training and development of the local IT industry in Punjab. It will also set up an innovation centre at the Software Technology Park.

Speaking on the occasion, Chief Minister Shahbaz Sharif said the three-year agreement would prove to be a milestone in the promotion of information technology in the province.

He said the Punjab government had adopted a comprehensive strategy for promoting IT and foundation of a revolution in the education sector had been laid by setting up of IT labs in schools.

He said information technology would also be used for evolving a system of accountability for eradication of corruption which was the most serious problem being faced by the country. In addition to uplift of the education sector, Microsoft would also extend cooperation in improving the efficiency of Technical Education and Vocational Training Authority (Tevta) besides providing free software to 454 IT academies running under its control, he said.

Mr Sharif said under the agreement, IT training centres would also be set up in Punjab which would be managed by Microsoft for one year. Master trainers would be trained in these institutions and sent to far-flung areas. It would help produce a large number of IT experts. An IT Park would also be set up in consultation with Microsoft to promote IT activities, he said.

The chief minister said under the agreement, the Punjab government would invest Rs3 billion in three years and Microsoft Rs1.5 billion, and resultantly the government would earn a profit of Rs500 million.

Microsoft Company for Middle East and Africa President Ali Faramawy said the agreement would help improve the efficiency of education and other sectors in Punjab, and this partnership would leave a far-reaching impact.

Thursday, January 28, 2010

Apple announced its latest creation to the world called Apple IPAD

Today, January 27, 2010. Apple announced its latest creation to the world called Apple IPAD. Recently, Google also entered in the world of gadget by introducing “Nexus”. Now lets see the competition of both big companies which company wins the race.

Watch Apple IPAD Announcement Event Live - Latest Updates
Watch Apple IPAD Announcement Event Live - Latest Updates


The Apple IPAD was introduced in San Francisco at 10 AM by the CEO of Apple.

The Apple Event Live will be held at Yerba Buena Center for the Arts Theater in San Francisco, CA.

Please check your local time for this much awaited Apple Event.

08:00AM – Hawaii

10:00AM – Pacific

11:00AM – Mountain

12:00PM – Central

01:00PM – Eastern

06:00PM – London

07:00PM – Paris

09:00PM – Moscow

02:00PM – Philippines (January 28th)

03:00AM – Tokyo (January 28th)
You can watch Live Streaming Video of Apple IPAD on the internet.

Now, several blog sites will be blogging live from the Apple Event Live where Apple will probably announce its latest Apple Tablet. If are curious enough, you can visit the following websites and blogsites as they have the live coverage on Apple Tablet Announcement Live Event: Engadget live coverage, Gizmodo liveblog, CNET liveblog, and MacWorld Live Update.

Wednesday, January 27, 2010

Google Directions Gadget Direct Customers To Your Office

Google Directions Gadget Direct Customers To Your Office
Directing customers to visit your office or business site is crucial in marketing your products or services. It might significantly affect your business if the directions to your business place is unclear or too vague. To assist businessmen particularly to post clearer directions to their business place in their websites, Google has rolled out a new service, Directions Gadget, which allows users to add customized Google Maps directions to their websites.



With Google’s Directions Gadget, users can save a lot of hassle in updating and preparing the directions to their sites. What they need to do is to use the service, pre-fill the destination (one or multiple addresses) at the “To” field, set the language and embed the gadget to their site.







Visitors or customers can thence fill in the “From” field and get the directions indicated in the Google Map. Users can view or print out the direction for easy reference.



For avoidance of doubt, the service also provides a list of suggestions for a more exact address in the event visitors enter a vague address.




Google’s Directions Gadget offers 23 languages in the service. It is pretty user-friendly for both webmasters and end users. End users which are customers or visitors in this context can enter either the ZIP code, address keyword or latitude-longitude coordinates to get the correct directions.

Auto Publish Feed to Twitter in Real-Time with FeedBurner (TwitterFeed Alternative)


Content publishers and bloggers who want to tweet the new blog posts as status update to Twitter normally have to manually post the tweets via Internet and SMS, or rely on plugin or addon which available for the platform website is built on, or use TwitterFeed.



TwitterFeed makes it easy for webmasters to feed and publish blogs, forums, and any site with syndication RSS feed to tweet the latest posts or articles on Twitter, by grabbing title and content from the feed. However, TwitterFeed is slow to tweet, as TwitterFeed depends “pull”, which runs on schedule to read the feed at fixed interval, with limited number of items (up to 5) been posted each time. In addition, when adding new feed to TwitterFeed, the tweet update to Twitter is subjected to at least 30 minutes delay.
For people who looks for faster alternative to TwitterFeed, now FeedBurner is offering the ability to direct the feed in real-time to Twitter endpoint. With “Socialize” feature, FeedBurner can automatically publish the feed items that meet any filtering criteria to Twitter, using the Google URL shortener at goo.gl.
Here’s the guide on how to turn on and enable Socialize in FeedBurner to tweet the feed content to Twitter:
  1. Login to FeedBurner.
  2. Select the feed which user wants to tweet in realtime.
  3. Go to the Publicize tab.
  4. Go to the Socialize service.
  5. Click on Add a Twitter account button.
  6. Login with username or email with password, then click Allow button to authorize and add the Twitter account to which user would like to post items from the feed.
  7. Change the formatting options and item selection settings if prefer.
  8. Click on Activate or Save button to start the auto-tweet function.
Tip: To ensure that any new feed item is been sent to Twitter in near real-time, just ping the FeedBurner whenever the feed is updated.
For example, visit My Digital Life blog tweet @mdlblog.
There are few disadvantages with FeedBurner’s Socialize though. It doesn’t have the ability to send update to other sites such as Facebook. And only goo.gl URL shortener is supported, and there is no click-through report or any tracking statistics available, although publishers can get possibly get the data from FeedBurner and/or Google Analytics.

Easily Login to Windows XP with No Password Administrator Account Backdoor Trick

In password-protected Windows XP Home or Professional edition system, each user logs on to his or her own user name and password to have full access to the Windows computer. However, Windows user or administrator can still log in to the Windows XP machine without knowing the original password, if they have lost or forgotten the user ID or password, by using various bypass or crack method such as using DreamPackPL to bypass the need to logon using valid account or password, crack or brute force retrieve the Windows passwords for various user or administrator account with Ophcrack2, and using third party services such as Login Recovery to retrieval and recovery of Windows user name and passwords. However, there is one simpler method to hack into a Windows XP system, if the computer owner installed Windows XP, and forgot or not set the Administrator account password.



By default installation, Windows XP has a built-in Administrator account which equivalent to root or superuser privilege account in Linux or Unix that contains no password. In other word, hacker or any people can simply key in Administrator as user name at the Windows Logon Welcome Screen prompt with blank password (no password) and get full administrative access as superuser to the Windows PC. Worse, most computer owners don’t even know such an Administrator account is actually existed, don’t even mentioned they will create or set a password for Administrator user account.



So this security vulnerability flaw provides an easy way to hack into any Windows XP computer that the user forgets or simply does not set a password for the Administrator user ID. The problem is that in normal Windows XP Welcome Screen where you choose which user name you want to log onto, the Administrator user name is not displayed and is not shown. If you can’t choose or select the Administrator from the login screen, then how are you going to log-in with the Administrator account? The following video clip provides a simple hack and trick.

Basically, at Windows XP Welcom Screen, simply press Ctrl-Alt-Del keys sequence together twice, and you will be shown a Log On to Windows menu which you can specify User Name and Password. In the User Name text box, key in “Administrator” (without quote) and leave the Password field blank. Then press Enter or click on OK. If there is not password protects the Administrator account, or blank password is set, then you will be able to access the Windows with full administrative privileges as Administrator.
Note: You can unhide or show the Administrator account on the Welcome screen.
Check out more ways to recover from forgotten Windows password.

Trick to Enable and Allow Windows XP and Vista Remote Desktop Login Without Password (or With Blank Null Password)


When attempting to connect or establish Remote Desktop connection to a remote Windows XP or Windows Vista computer in order to remotely logon to the machine, the log on may be rejected with Remote Desktop client returns one of the following error messages.


Your credentials did not work.
or,
Unable to log you on because of an account restriction.
or,
An authentication error has occurred.

The Local Security Authority cannot be contacted
Remote Computer: xxxxx
By default, Windows XP and Windows Vista does not allow nor permit user account without password set or user name with blank (null) password to connect and log in remotely via Remote Desktop Protocol (RDP).
The obvious resolution is definitely to create and set a password for the user account that requires to logon remotely to a computer via Remote Desktop, and it’s recommended for security reason too. However, user who for some reason such as for the purpose of convenient, and thus unable or cannot assign a password to the user account, can use the following workaround to allow user to login remotely via Remote Desktop Connection (RDP) client to Windows XP and Windows Vista PC.
How to Enable Remote Login via Blank Passwords using Local Security Policy or Group Policy Editor
The configuration to enable null (blank) passwords logon must be done on the host computer, i.e. the remote computer to remotely controlled. To configure the Remote Desktop host computer to accept user name with blank password, go to Control Panel -> Administrative Tools (Under System and Maintenance in Windows Vista) -> Local Security Policy. Alternatively, run GPEdit.msc (Group Policy Editor).
Then, expand Security Policies -> Local Securities -> Security Options (for user using Group Policy Editor or GPEdit.msc, expand Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options). Locate Accounts: Limit local account use of blank passwords to console logon only policy, and set its value to Disabled.



Once disabled, user account with blank or null passwords can now login remotely instead of just able to do so via local console.
How to Configure Blank Passwords Allowed for Remote Log On via Registry
Windows XP and Windows Vista stores the value of the policy set above in a registry key named “LimitBlankPasswordUse”. To unlock the limitation of cannot establish Remote Desktop logon with user account without a password, simply set the value data for LimitBlankPasswordUse to 0 (so that there is no limit on blank or null password use), as according to the code below. Alternatively, copy and paste the following text to a text file, and save with a .reg extension. Then run the .reg file to merge the value to registry.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa]

"LimitBlankPasswordUse"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]

"LimitBlankPasswordUse"=dword:00000000
For convenient, two registry files have been created and available for free download, which will enable or disable usage of blank password (or absent of password) to login remotely. Download BlankPasswords.zip and run EnableBlankPasswords.reg to enable or DisableBlankPasswords.reg to disable remote login via blank password.
The trick works on both 32-bit and 64-bit operating systems.

How to Open the Local Group Policy Editor in Windows 7 and Vista

Local Group Policy Editor is a Microsoft Management Console (MMC) snap-in that provides a single user interface through which all the settings of Local Group Policy objects (GPO) of the computers can be managed. The Local Group Policy objects include settings for Computer Configuration, where the policies are applied to whole computer regardless of logged-on users, and User Configuration, where policies are applied to currently logged-on user across all computers (for users on domain).



In order to view, edit, manage, change, delete or manipulate software settings, Windows settings and administrative templates of Local Group Policy Objects, it’s easier to do so via Local Group Policy Editor. User can open the Local Group Policy Editor by using the command line or by using the Microsoft Management Console (MMC).



Note: User must be an administrator in order to open the Local Group Policy Editor.
Method 1: Open Local Group Policy Editor from Command Prompt
Click on Start button, type gpedit.msc in the Start Search box, and then press ENTER. Press Yes if User Account Control (UAC) dialog prompts.
Tip: gpedit.msc file is located in \Windows\System32 folder.
Method 2: Open the Local Group Policy Editor as MMC Snap-In
  1. Click on Start button, type mmc in the Start Search box, and then press ENTER to open MMC (Microsoft Management Console).
  2. Press Yes if User Account Control (UAC) dialog prompts.
  3. On the File menu, click Add/Remove Snap-in.
  4. In the “Add or Remove Snap-ins” dialog box, click Group Policy Object Editor, and then click Add.
  5. In the “Select Group Policy Object” dialog box, click Browse.
  6. Click This computer to edit the Local Group Policy object.
    Alternatively, user can choose to connect to GPO of remote computer, or click Users tab to selectively edit GPO for Administrator, Non-Administrator, or per-user Local Group Policy objects.

  7. Click Finish.
  8. Click OK to open the Local Group Policy Editor.

Local Group Policy Editor is only available in Professional (Business), Enterprise and Ultimate Editions of Windows 7 and Windows Vista. Users of Windows 7 or Windows Vista Starter, Home Basic and Home Premium will not get Local Group Policy Editor.

Download Firefox 3.6 Final Release

Have you upgrade your Firefox browser to Firefox 3.6 Release Candidate 2 which has been released by Mozilla developers on 17 January 2010? If you not yet done then you can skip it by upgrade its to Firefox 3.6 final release. The Firefox 3.6 is built on Mozilla’s Gecko 1.9.2 web rendering platform which has been under development since early 2009. The Firefox 3.6 web browser has been improved to support for new and developing web standards, increased performance and an overall better experience for web users and developers.





The Firefox 3.6 includes the following features:
  • Improved JavaScript performance, overall browser responsiveness and startup time.
  • Support for a new type of theme called Personas which allow users to change Firefox’s appearance with a single click.
  • Protection from out-of-date plugins to keep users safer as they browse.
  • Open, native video can now be displayed full screen and supports poster frames.
  • The ability for web developers to indicate that scripts should run asynchronously to speed up page load times.
  • Continued support for downloadable web fonts using the new WOFF font format.
  • Support for new CSS attributes such as gradients, background sizing, and pointer events.
  • Support for new DOM and HTML5 specifications including the Drag & Drop API and the File API, which allow for more interactive web pages.
  • Changes to how third-party software can integrate with Firefox in order to prevent crashes.
  • Available in more than 70 languages.
The final release of Firefox 3.6 is now available for free download at Mozilla official site. Just head to the following URL to access official Firefox 3.6 download:
Windows (English)- http://download.mozilla.org/?product=firefox-3.6&os=win&lang=en-US

Linux (English) – http://download.mozilla.org/?product=firefox-3.6&os=osx&lang=en-US

Mac OS X (English) – http://download.mozilla.org/?product=firefox-3.6&os=linux&lang=en-US
Other localized versions can be downloading from here.