Sunday, August 29, 2010

THE MAIN CAUSES OF LIVER DAMAGE

 
1. Sleeping too late and waking up too late are main cause.
2. Not urinating in the morning.
3. Too much eating.
4. Skipping breakfast.
5. Consuming too much medication.
6. Consuming too much preservatives, additives, food coloring
and artificial sweetener.
7. Consuming unhealthy cooking oil. As much as possible
reduce cooking oil use when frying, which includes even the
best cooking oils like olive oil. Do not consume fried foods
when you are tired, except if the body is very fit.
8. Consuming raw (overly done)
Foods also add to the burden of liver.
Veggies should be eaten raw or cooked 3-5 parts. Fried
veggies should be finished in one sitting, do not store.
We should prevent this without necessarily spending more. We
just have to adopt a good daily lifestyle and eating habits.
Maintaining good eating habits and time condition are very
important for our bodies to absorb and get rid of unnecessary
chemicals according to 'schedule.'
Because 
 
 
Evening at 9 – 11 pm:
Is the time for eliminating unnecessary/ toxic chemicals
(detoxification) from the antibody system (lymph nodes).
This time duration should be spent by relaxing or listening to
music. If during this time a housewife is still in an unrelaxed
state such as washing the dishes or monitoring children doing
their homework, this will have a negative impact on health.
Evening at 11pm - 1 am :
Is the detoxification process in the liver, and ideally should
be done in a deep sleep state.
Early morning 1 - 3 am :
Detoxification process in the gall, also ideally done in a deep
sleep state.
Early morning 3 - 5 am :
Detoxification in the lungs. Therefore there will sometimes be
a severe cough for cough sufferers during this time. Since
the detoxification process
had reached the respiratory tract, there is no need to take
cough medicine so as not to interfere with toxin removal
process.
Morning 5 - 7am :
Detoxification in the colon,
you should empty your bowel.
Morning 7 - 9 am :
Absorption of nutrients in the small intestine, you should be
having breakfast at this time.
Breakfast should be earlier, before 6:30 am , for those who
are sick. Breakfast before 7:30 am is very beneficial to
those wanting to stay fit. Those who always skip breakfast,
they should change their habits,
and it is still better to eat breakfast late until 9 - 10 am
rather than no meal at all..
Sleeping so late and waking up too late will disrupt the
process of removing unnecessary chemicals. Aside from that,
midnight to 4:00 am is the time when the bone marrow
produces blood. Therefore, have a good sleep and don't sleep
late.
DO TAKE CARE ABOUT YOUR HEALTH
AND PASS THIS TO ALL WHOM YOU LOVE & CARE FOR !!!

BRAIN DAMAGING HABITS

1. No Breakfast
People who do not take breakfast are going to have a lower
blood sugar level. This leads to an insufficient supply of
nutrients to the brain causing brain degeneration.

2. Overeating
It causes hardening of the brain arteries, leading to a
decrease in mental power.

3. Smoking
It causes multiple brain shrinkage and may lead to Alzheimer
disease.

4. High Sugar consumption
Too much sugar will interrupt the absorption of proteins and
nutrients causing malnutrition and may interfere with brain
development.

5. Air Pollution
The brain is the largest oxygen consumer in our body. Inhaling
polluted air decreases the supply of oxygen to the brain,
bringing about a decrease in brain
efficiency.

6. Sleep Deprivation
Sleep allows our brain to rest.. Long term deprivation from
sleep will accelerate the death of brain cells.

7. Head covered while sleeping
Sleeping with the head covered, increases the concentration
of carbon dioxide and decrease concentration of oxygen that
may lead to brain damaging effects.

8. Working your brain during illness
Working hard or studying with sickness may lead to a
decrease in effectiveness of the brain as well as damage the
brain.

9. Lacking in stimulating thoughts
Thinking is the best way to train our brain, lacking in brain
stimulation thoughts may cause brain shrinkage.

10. Talking Rarely
Intellectual conversations will promote the efficiency of the
brain.

Thursday, August 26, 2010

Top 12 Cancer Facts of the World

  • 20,000 people in the world die daily due to cancer
  • 1 in 8 deaths that occur in the world is due to cancer
  • Cancer deaths outnumber deaths due to AIDS, Tuberculosis and Malaria combined
  • 12 million new cases of cancer will be diagnosed by the end of 2007
  • Cancer death toll will be 7.6 million by end of 2007
  • Cancers of the Lung, Prostate and Stomach are the most commonly diagnosed cancers in men
  • Cancers of the Breast, Cervix and Colon are the most commonly diagnosed cancers in women
  • Relative risk of developing breast cancer is doubled if there is a history of a first degree relative having the cancer.
  • Pap smear for cervical cancer is the single best cancer screening procedure
  • Lifetime risk of an American man developing an invasive cancer is 45%
  • Relative risk of a smoker developing lung cancer is 23 times higher than that of a non-smoker.
  • Tobacco use is the major preventable cause of cancer in the world.
  • In developing countries more deaths occur due to diarrheal disease than due to cancer.
  • Heart disease is still the no.1 Killer in the world.

Russia Plan to Save the Whole Earth-News


Russia's Armageddon plan to save Earth from collision with asteroid:




I have read it from guardian,this is pretty good one...this may useful one to all........

Space scientists in Russia are preparing to boldly go where no man has gone before, except for the actor Bruce Willis.
The head of the Russian space agency said today that it was considering a Hollywood-style mission to send a spacecraft to bump a large asteroid from a possible collision course with Earth.
Anatoly Perminov told the Russian radio station Golos Rossii: "People's lives are at stake. We should pay several hundred million dollars and build a system that would allow us to prevent a collision, rather than sit and wait for it to happen and kill hundreds of thousands of people."
The mission would be aimed at an asteroid called Apophis, he said, which is expected to pass close to the Earth in 2029 and again in 2036. "Calculations show that it's possible to create a special-purpose spacecraft within the time we have, which would help avoid the collision. The threat of collision can be averted."
The Hollywood action films Deep Impact and Armageddon both featured space missions scrambling to avert catastrophic collisions, the latter led by Willis.
But the creation of a system to deflect asteroids has long been the subject of scientific debate. Some experts have proposed sending a probe to circle around a dangerous asteroid and gradually change its trajectory. Others suggested sending a spacecraft to collide with it and alter its momentum, or using nuclear weapons.
Perminov said details of the project still needed to be worked out. But he said the agency would invite Nasa, the European Space Agency and others to participate.
When Apophis was discovered in 2004, astronomers made headlines when they said there was a one in 37 chance that the 350-metre-wide rock would collide with Earth in 2029. Further studies ruled out such an impact, but there remains a one in 250,000 chance it could strike in 2036.
Perminov said he had heard from a scientist that Apophis is getting closer and may hit the planet. "I don't remember exactly, but it seems to me it could hit the Earth by 2032," he said.
Nasa has estimated that if the asteroid hit the Earth, it would release more than 100,000 times the energy released in the nuclear blast over Hiroshima. Thousands of square miles would be directly affected by the blast but the whole of the Earth would see the effects of the dust released into the atmosphere.
Nasa experts have already discussed the option of landing an astronaut on an asteroid to test whether it could develop techniques to deflect a doomsday rock.
Breaking it up with an atomic warhead could generate thousands of smaller objects on a similar course, which could have time to re-form. Scientists agree the best approach, given enough time, would be to nudge the object into a safer orbit.
Matt Genge, a space researcher at Imperial College London, has calculated that something with the mass, acceleration and thrust of a small car could push an asteroid weighing a billion tonnes out of the path of Earth in just 75 days.
Perminov said: "We will soon hold a closed meeting of our collegium, the science-technical council, to look at what can be done. "There won't be any nuclear explosions. Everything will be done according to the laws of physics."
Mirrors, lights and even paint could change the way the object absorbed light and heat enough to shift its direction over 20 years or so. With less notice, mankind could be forced to take more drastic measures, such as setting off a massive explosion on or near the object to change its course.

Science-Tech in Ancient India -Article

  
   India is a fascinating country with a very long history. The earliest evidence of its civilization dates back about 4,500 years. Throughout the time, Indians invented many things. Their discoveries, especially in mathematics, astronomy, and medicine, have had a profound impact on the rest of the world. While it is impossible to catalogue all their achievements, here is a quick run-down that highlights their most important findings. 


   Almost 3,000 years ago, Indians came across a plant called sugarcane that probably originated from New Guinea. They noticed that this plant tasted sweet. To use it as a sweetener in their cooking, they ground sugarcane stalks to extract the juice. Once that was done, they then boiled down the sugary liquid to yield sugary solids. The sugary solids looked like gravel, but tasted sweet. This was what we later called brown sugar. For a while, brown sugar was the best kept secret in India. But that changed after the invasion of the Persian emperor, Darius. When Darius attacked India in 510 B.C., his army stumbled upon this wonderful invention. As Darius and his men had been accustomed to sweetening their food with honey, they were surprised to find that there was another alternative out there. They were quoted as describing the sugarcane as "a reed that gives honey without bees." Though the Persians learned about sugarcane and brown sugar, they did not spread the knowledge to other parts of the world. They and the Indians exported brown sugar as a luxury product and a medicine. They made a lot of money! Their monopoly on sugar production finally came to a halt after the Arabs invaded Persia in 642 A.D. The Arabs learned the secret and made it public free-of-charge!

                                                    Besides sugar, ancient Indians were also credited for being the first people in the world to grow cotton. As far back as 4,500 years ago, they began cultivating cotton in the Indus Valley in the present-day Pakistan. They dug ditches and canals to irrigate their farms. After they harvested their crop, they used a simple wooden spinning wheel to weave it into beautiful clothes. For centuries, India's cotton and China's silk were among the most popular goods on the trading routes between Asia and Europe. Along the process, India learned the silk-making technique from China and, thus, became the textile powerhouse

Tuesday, August 24, 2010

Revolutionize Viral Marketing-Information

http://www.WebTrafficMassacre.com
Had it not been for the use of computers, people would not have agreed to this name. It had been in the world of marketing for a long time; however, not many had the consensus of calling it by the name of viral marketing. Many companies and big business giants have used this form of marketing. Also, it is not something very new and fresh, for it uses the same basics of marketing for ages. They lure the customers, they tell them about the benefits. They offer something extra and make their product so easy to use and access, that people do not think it tasking to try. This is where they are influenced and hence made loyal. However, the medium and the way of tackling is what creates the revolution. Earlier it was Mary Kay in the 1960s and 70s that used the word of mouth to spread the awareness of its presence in the market. It talked to few prospective clients who were then lured by the idea that they shall be provided a commission on bringing in their friends or prospective users. In this way the other prospective clients were being added to the list. With every new person there was a trail of consumers, and later there was a name in every household. After this they started making their consumers as their agents who shall take their products to the other users. Hence, they were not investing a single penny in the whole business, but were still reaping the benefits.
This is what has been taken to the next level by the help of computers. And computer, being a fast medium, has certainly brought a new life in this trade. The most recent example is the popularity of networking sites, which are using an extension to viral marketing. The viral marketing now uses viral loop expansion, which makes the viral loop replicate itself. Hence, they never die out of the system. They are not only taken far and wide, but also sustained forever. The spread of this virus is possible in any form. It can be a text message, to an email or a video clip. Even the flash games are a part of this drive. You get a small snapshot to learn of the game on various websites. Once you get to play it, it invites you to the actual link of the game. Hence, they are using other sites where the user might visit and talking about their services. This is parasitic in its own way. But, this is certainly the future of the marketing industry.
You can use sites of other people to advertise yourself, by tagging on some information about yourself. This was also used by Hotmail. They tagged about their free email service to all the mail users. Hence, whosoever received it had gotten to know about it. Then when someone subscribed, they became a full-fledged carrier of it. The most important thing of this trade is to make the product very simple to use and to access.
Drive more visitors to your website and get your promotions in front of 1,000s, automatically! Web Traffic Massacre will do that for you, guaranteed, and it’s FREE!

http://www.WebTrafficMassacre.com

Content Creation Vendors-Article

You need well-written articles, but maybe you do not know how to create them or can not produce a huge volume on your own. What options could you take? In order to do article promotion correctly, you need to get a hold of an article writing agency that is able to provide you with all the write-ups that you require for your business venture. Plenty of companies will be able to supply you with write-ups. But do they turn out premium output? This specific article tackles a few of the essential factors you have to consider when looking for an article writing provider.
Great customer service is important for every company, and that is among the earliest things you ought to take a look at. If you’re interested in an article writing provider, you may want to look into its popularity, if it got favorable remarks as well as recommendations from recent customers, as well as if the agency can revise write-ups that you may not be happy with. It will also help if the agency gives a guarantee.
The second aspect should be the swiftness of the potential article writing service with regard to creating articles. Several inquiries should be asked before you make your mind up: What is its normal turnaround period? When you need a content piece written urgently, can that company finish it by or before your deadline? Does it contract a sole article writer or a team of authors?
Attention to detail and ingenuity are also important with regard to article writing. In every single content piece, your subject matter must be clearly communicated, and it also needs to be logical and adhere to a complete concept which satisfies your specific search phrases. There should be no mistakes in your write-ups: your name of the article has got to be attention-getting and be able to draw many visitors, you must not see any misspelled words and wrong syntax, and your subject matter needs to be evident in the whole write-up.
Employing a specific content creation vendor won’t be fruitful when it doesn’t thoroughly fulfill your expectations and requirements. You need to check with content creation vendors for their writing styles, and if they’re able to take on e-books, press releases and studies, among others. Another necessary inquiry will concern their ability to take care of bulk assignments. It will be extremely beneficial when you employ a vendor which could produce all sorts of things in situations wherein you need more work to be done. This could save you from the stress of searching for a different service for a possible requirement and also help you set up a long-run relationship with a flexible company.
Understand that a higher than average cost doesn’t automatically mean that a vendor generates outstanding output. Nor does an affordable fee denote mediocre workmanship. You want to pay for write-ups that could get visitors to your website or weblog. It’s always best to look for a respected company or person at an agreeable rate that could churn out exceptional results.
Last but not least, keyphrase research is vital for all web-based businesses. A good article agency should be able to do this the correct way to avoid overkill. You also need to find out if you should supply the keywords and meta data, or if the agency is responsible for this task. Ask the provider with regard to its write-ups’ density ratio. Furthermore, you must clarify if, aside from reworking write-ups, the agency is also able to spin these write-ups and if it submits them to article submission websites for you.
The content creation vendor that you will go for will have a big effect on your business venture. The write-ups they make for your requirements can deliver more sales or become a waste of both your time and money. If the chosen agency could respond to all of the inquiries above, is versatile with regard to varying conditions and also deliver output on time, then you can definitely move forward knowing you have made a great investment.

Domains for Your Business-Info

Choosing a domain name that really does not fit your website’s purpose or that contains letters that simply don’t play well when situated next to one another may leave you wishing that you had put a bit more effort into its selection. A savvy webmaster or website owner will go with a name that is simple yet describes what they do, while helping them to stand out from similar domains. Let’s look at best practices to employ when choosing a one for your business.
What’s Your Website About?
It’s certainly true that there are domain names out there that really make no sense unless you know the story behind them. Take twitter for instance. Twitter was well marketed in cyberspace by its creators – now the word “tweet” is actually a noun and a verb used to describe messages sent on its platform and the action of sending a message.
Chances are that you don’t have a huge budget; however, you can successfully spread word about your website online. Visitors to your website should be able to look at your URL in the search engine results page and determine what your website is about without any sense of confusion. Make sure that your domain name relates well to the products and services that you are selling, or potential customers may not take the time to click on your URL to see if you have what they need. They must be able to associate your URL with their own needs before you’ll ever get them “through the door.”
Broaden Your Scope
Let’s say you are selling muffins and discover that muffins-dot-com is available. You’re absolutely ecstatic because this name seems perfect. But what might be the perfect domain right now may not be the best when you broaden your product offerings to include breads, cookies and other baked goods down the road. When you start offering a wider range of products or services, will your business still thrive with muffins-dot-com? Well your muffins may sell well, but your other products may get lost in the shuffle. Think of future needs and leave some breathing room when selecting your domain name in order to stay relevant in the long term and not find yourself back at square one in the future.
Keywords Are Important
Fitting the keywords that will be used by your potential customers to find your website into your web address is an awesome way to become more searchable, so kudos to you if you can pull it off. Your website will be more easily found. If not, then you’re still okay, but never pick a name that is irrelevant to what you’re selling or that looks awkward when keyed in just to get your keywords in there.
Be Memorable
One of the most important aspects of choosing a great domain is to select one that is easy to remember. Unique, short, easy to remember, and easy to type will give your customers a name to associate with your website. An uncomplicated domain name that is simple to process in the mind is very crucial to making it easy to recall.
Snap up the Extensions
Nothing can create a crisis in the brand awareness department faster than having a successful website and then having some idiot grab the same domain but with different extension and build a similar site. Snap up all of the extensions to your website (including dot com, org, and net) while they are still available. It won’t cost that much more when registering and you won’t need to worry about problems arising in the future if someone takes the extension and interferes with your brand’s reputation.

Top 10 Web Hosting Features

Choosing the right web hosting provider is one of the most crucial decisions of a webmaster. A poor web hosting service provider can be your worst nightmare, so this guide will be very useful for beginners. Here are the golden rules:
1. Amount of web space: Consider your required amount of space carefully, especially if your website has lots of videos or rich in graphics. You might want to expand your space tomorrow and be sure that your web hosting company could be able to provide more space. Also, watch out for “unlimited disk space” claims, there may be more to it than meets the eye, and you may soon find out that “unlimited” doesn’t really mean “unlimited”.

2. Bandwidth/Data Transfer: Data transfer is the amount of bytes transferred from your site to visitors when they browse your site. After you decide on the amount of web space you need, you need to consider sufficient bandwidth for efficient data transfer. Again, beware of “unlimited bandwidth” claims, there is always a limitation. To give you an idea, a typical traffic requirement is usually less than 3 GB of bandwidth per month.
3. Site Builder: If you don’t know anything about programming or making websites, you may need an easy site builder system. Be sure that your web hosting provider has one for you to use.
4. Reliability, security and speed of access: They are extremely important for all online businesses. If your site goes down or is not available, you will lose many visitors, and worst of all, potential customers. So how do you know if a web hosting company is reliable? Ask other customers and read comments and feedback left about the company. Look for a hosting site with 99.5% or higher uptime. No hosting company can guarantee 100% uptime. If anyone says so, make sure you investigate their claims first.
Besides, you have to be very cautious about security; especially if you have an e-commerce website. Your customers will expect security from you. You will definitely need SSL if you want to collect credit card payments on your site.
Test the speed of a host’s network to your location by clicking (for windows users) Start, Run,Type in “command” and Enter, and then type “ping hostdomainname.com”. Wait for it to finish and look for the average ping. The lower the number the better, the faster your site will load. Averaging around an 80 ms could be considered good. You may also want to check if the company is legit by doing a WHOIS for the company’s domain name.
5. Customer Support: Inquire carefully about their support services. Do they provide 24/7 support? Do they provide your preferred contact method, be it telephone, email, or chat support? Check out their FAQ and help pages. Do they charge for support or is it free? How rapidly will they respond to your inquiry? These are all important questions to be answered. Avoid a host immediately that has a poor customer service reputation.
You can even test their support before joining. Make sure you call the technical support department; often Sales departments have better response time, which may give you the wrong idea. And is it in-house Customer Support or is it outsourced? Often an outsourced support department doesn’t have the in-depth knowledge, skills or even the access they need to help you with your problems.
6. Pricing: It’s not necessarily true that most expensive service is the best one. Compare prices and services and decide accordingly. Most web hosts allow you to select an annual payment plan that gives you a cheaper rate than if you were to pay monthly.
7. Email services: Get an email through your domain name. It looks more professional and official and helps you to stay in touch with your visitors. Investigate the email services provided by your hosting company. Do they support POP3 or IMAP4 or only offer webmail? Do they offer Hosted Exchange or Business-Grade email? How many email addresses are provided with their web hosting plans? Can you set an email address to automatically reply (auto responder) or forwarded to your existing e-mail address? Make sure they have all the features you’re looking for in an email host.
8. Logs: All the good hosting services provide you website logs. So you can manage your statistics and monitor your website accordingly. Make sure that at least raw log files are provided.
9. Web Hosting Features: Make sure that your hosting plan has all the features you need to get your site up and running properly. FTP access provides the ability to upload new pages. If you are using personal web builder, FTP access is crucial for you. FTP provides more flexibility when managing your website. Also, if your web site is built with any server side scripting features, make sure you host supports the scripting language you are using, be it ASP or ASP.NET, PHP, Perl and so on. Also chances are that you’ll need a database tool as well, such as Microsoft SQL or MySQL.
10. Control Panel: The Control Panel allows you to manage different aspects of your web account by yourself, such as changing passwords or managing features and add-ons. If you don’t want to call their technical support all the time, you definitely need an extensive control panel.

VoIP Over 3G-Article


More and more VoIP services and providers have emerged in recent years and clearly the direction is to move towards mobile VoIP, allowing the same features and convenience that most fixed-line VoIP users have enjoyed over the years to be available while on the go. As technologies improve, voice and data transmissions quality have significantly improved, with additional multimedia and video conferencing capabilities made available by most providers.
The next step would be to have VoIP capabilities run through standard mobile networks particularly 3G, EDGE and GPRS standards. Previous restrictions have limited VoIP use only through WiFi networks, although recently operators and device manufacturers have started to allow the use of VoIP over their standard 3G networks. The implications of these developments are so profound that it will shake the future of telecommunications in the years to come.


Previous Limitations
The tremendous popularity of smartphones like Apple’s iPhone have taken the mobile world by storm. With the parallel popularity of VoIP usage over fixed-line locations, it would only be a matter or time before mobile users would eventually demand the ability to use VoIP over the mobile systems like 3G. However, restrictions from carriers have relegated VoIP use on devices like the iPhone only through Wi-Fi and are prevented from using the phone’s own data connections.
Many have speculated that these restrictions were brought about by the carriers protecting their own core businesses as telephony providers. Others are seeing an already heavy congestion on the 3G networks that would definitely balloon should VoIP usage come into play. Still, these restrictions have prompted the FCC to pressure these carriers and mobile providers, also due in part to FCC’s commitment to openness policies and consumer support.
The Latest News and Developments
With the popularity of smartphones like the iPhone hitting the market like a wave, so does the clamor for Voice over IP that would allow users to use applications like Skype and Fring to make free calls over their mobile networks. Restrictions placed a lid on this for a while, until announcements made from major 3G carrier AT&T that it has lifted its previous policy of barring use of VoIP over 3G on their iPhone devices.
This news comes as a welcome surprise for the myriad iPhone users and the millions of previously frustrated VoIP application users clamoring for the 3G networks to open up. The first to take advantage is iCall, with Skype, Fring and Vonage following suit, allowing iPhone users to finally make VoIP calls over their phone’s 3G network.

The Future of VoIP over 3G
The use of VoIP applications like Skype over the iPhone and eventually all other smartphones and even Blackberry devices has very significant implications for the mobile communications world, particularly in the area of lower call costs as compared to very expensive carrier plans. This trend is true not only in the United States but in other regions as well such as Europe where cell carriers have blocked VoIP usage over their 3G networks.
Despite the much lower costs in making VoIP calls, comparatively 15 times lower than standard 3G calls, experts have projected a very dynamic forecasts for mobile phone operators with the potential of earning way over $30 billion from the expected exponential growth of mobile VoIP users over 3G networks. Part of this is the integration of VoIP over 3G capabilities in other devices such as the iPad, as well as integration into social mobile networking websites and communities. It’s a whole new realm of global communications.

Sunday, August 22, 2010

Routed vs. Routing Protocol


  • A routing protocol sends and receives routing information packets to and from other routers.
  • A routed protocol can be routed by a router, which means that it can be forwarded from one router to another.
  • A routed protocol contains the data elements required for a packet to be sent outside of its host netowkr or network segment. In other words, a routed protocol can be routed.
  • Protocols used to communicate routing information between routers within an autonomous system are Interior Gateway Protocols (IGP), which are routing protocols, but not routed protocols.
Examples of routed protocols are IP and IPX, and examples of routing protocfols are RIP and IGRP.


As far as the CCNA exam goes, there are three types of routing: static, dynamic, and default.

  • Static routes - are fixed routes that are manually entered by the administrator into the router's configuration.

  • Dynamic routing - is the process by which a network adapts automatically to the changes in topology or traffic as those changes occur.

  • Default routes - are very much like static route. The administrator enters the default route, and it becomes the default path the router uses to forward packets for which it knows no other route to use. Without a default route, packets with unknown destinations are dripped.

  • A static route is configured on the router with a command like this:
    ip route [destination_network] [mask] [next_hop_address or exit interface] [administrative-distance] [permanent]
    Example: RouterA(config)#ip route 192.168.1.0 255.255.255.0 192.168.1.1 3
    Using the previous command example the key elements of the static router configuration command are:

  • ip route: This is the command used to designate a static route.

  • destination address: in this example, 209.220.93.243 is the IP address of the destination network.

  • submet mask: 192.169.1.0 is a Class C IP address and is using the default subnet mask for Class C addresses, 255.255.255.0

  • next hop: Following the subnet mask is the address of the next hop router, 192.168.1.1

  • administrative distance: This is a number between 0 and 255 that indicates how well the route can be trusted. The higher the number, the lower the trust.

  • permanent: if the interface is shut down or the router cannot communicate to the next hop router, the route is automatically discarded from the routing table. Choosing the permanent option keeps the entry in the routing table no matter what happens.

  • Static routing has the following benefits:

  • No overhead on the router CPU

  • No bandwidth usage between routers

  • Security (because the administrator only allows routing to certain networks) Static routing has the following disadvantages:

  • The administrator must really understand the internetwork and how each router is connected to configure the routes correctly.

  • If on network is added to the internetwork, the administrator must add a route to it on all routers.

  • It's not feasible in large networks because it would be a full-time job.


  • Routers use a series of calculations and metric-based decisions to determine the most efficient and economical router for a packet to use to reach its destination. In general, these calculations and decisions are embedded in an algorithm.
    Here are some of the metrics used to determine the better route:

  • Bandwidth: Maximum throughput speed in bits-per-second.

  • Cost: A arbitrary value assigned by the administrator for the crossing and intersection of networks.

  • Delay (latency): A group of factors such as congestion or distance.

  • Hop Count: The number of routers a packet passes through to reach its destination.

  • Load: The measure of traffic that flows through a router.

  • MTUs (maximum transmission unit): The largest message size allowed on all routes to the destination.

  • Reliability: A value representing the amount of downtime for a network.

  • Ticks: A measurement of delay, based on the clock in a personal computer, where one tick is 1/18 of a second. It's used as part of the metric in IPX (Novell) RIP.

  • For the CCNA exam, you should remember that a distance-vector algorithm is concerned primarily with hop count, or the number of routers that a packet must pass through to reach its destination. RIP and IGRP use distance-vector algorighms. In each of these routing protocols, the routing table lists a remote network and also the number of hops required to get to it.
    RIP uses a maximum hop count of 15 and IGRP uses a maximum hop count of 255. Both are distance-vector routing protocols and interior routing protocols.
    Three mechanisms used with distance-vector protocols to control routing (count to infinity) loops are split horizon, route poisoning, and hold-downs.

    RIP (Routing Information Protocol) is a classful, distance-vector routing protocol. As such, it uses information provided to it by its neighboring routers to maintain information in a routing table about the cost, in terms of hops and other metrics, of a particular route. For the CCNA exam focus on adding RIP statements to the router.
    The IGRP router command requires an autonomous system number to be assigned to the network entries included in the command.
    An IPX network address is an 80-bit number that is made up of a 32-bit network ID and the 48-bit MAC address. Because an IPX address includes the MAC address of a node, there's no need for ARP translations on an IPX network.
    Novell encapsulations and their Cisco equivalents:

    Interface Cisco Command Word
    Ethernet novell-ehter
    Token Ring sap
    FDDI snap
    Serial hdlc
    Novell Frame Types and Their Cisco Equivalents:

    Novell Cisco
    Ethernet_802.2 sap
    Ethernet_802.3 novell-ether (default)
    Ethernet_snap snap
    Ethernet_II arpa
    FDDI_snap snap (default)
    FDDI_raw novell-fddi
    FDDI_802.2 sap
    Token-Ring sap (default)
    Token-Rint_snap snap
    Cisco Commands used to Monitor Router Operations:

    Command Action
    Privileged Exec Mode You must be in this mode to use the remaining commands in this table.
    ping Verifies that a network connection is reachable.
    show ipx traffic Displays IPX traffic statistics.
    show ipx route Displays all IPX entries in the routing table or just one entry if the network value is entered.
    show ipx interface Displays a detailed view of an interface's IPX settings.
    show ipx servers Lists the IPX servers discovered through SAP advertisements.
    debug ipx sap Displays messages regarding SAP updates.
    debug ipx routing Displays messages about each routing update.

    Router Basics


    Cisco routers have four basic types of memory: 
    • RAM/DRAM, 
    • NVRAM, 
    • ROM, 
    • Flash (EPROM) memory.
    Memory/Type Contents
    RAM/DRAM Active program and operating system instructions, the running configuration file, routing tables
    NVRAM Startup configuration file
    ROM POST, bootstrap, and startup/power-up utilities (usually limited version of), Cisco IOS
    Flash Cisco IOS

    For the exam, remember that the router's RAM is volatile DRAM that holds the working data and files of the router, and when the power is turned off, the contents of the RAM are lost.
    Where DRAM is volatile and must have a power source to hold its contents, nonvolatile RAM (NVRAM) can hold its contents when the main power source is lost. You may even know this type of memory as static RAM (SRAM), but on the CCNA exam, remember it as NVRAM. The Cisco router uses NVRAM to store its startup configuration file.
    There's another type of memory, called ROM (Read-Only Memory), that's even more reliable than NVRAM. Like NVRAM, ROM does not lose its contents when the power is turned off. On the Cisco router, ROM contains the program instructions for the power-on self-test (POST) diagnostics, the bootstrap program, which is the startup program for the router, and the router's operating system. 

    Cisco routers contain two copies of the IOS, a stripped won version that is stored in ROM and the full up-to-date version stored in Flash. The IOS version in Flash memory is the one you should focus on for the exam. 

    The Cisco Discovery Protocol (CDP) is a proprietary Cisco protocol that allows you to get information about directly connected CIsco router, bridges, and switches.
    Stuff to memorize about CDP
     

  • CDP uses SNAP at the data link leve, which makes it protocol independent.

  • CDP detects attached devices regardless of what protocol they're running.

  • CDP is enabled by default when the router is booted on all interfaces.

  • CDP update requests are multicast by default every 60 seconds using layer 2 multicast messages.

  • CDP has a default holdtime. The amount of time a device holds a CDP update before discarding it is 180 seconds.


  • The two Exec modes in the user interface are User Exec and Enable Exec (a.k.a. Privileged) modes.
    Setup Mode:
    when a router is first configured from the console port, Setup Mode is invoked. Setup mode can also be invoked from the Enable Exec mode prompt with the setup command, or by rebooting the router after deleting its startup-config file through the erase startup-config command.
    Another way to restart the router is to issue the reload command.


    Configuration Mode:
    Like the setup mode, you can enter the configuration mode by using a command, in this case config. To move into what is called global configuration mode, enter the following config command at the Enable Exec prompt (the one with the # symbol):

    ROUTERNAME#config terminal
    The parameter terminal or its abbreviation t is absolutely necessary.

    The prompt for Configuration Mode is:
    RouterA#(config)

    The prompt for Configuration Interface Mode is:
    RouterB#(config-if)
    The suffix -if means interface.
    Enhanced Editing Keyboard Commands
    Key(s) Action
    Ctrl+A Move to the beginning of the current line
    Ctrl+E Move to the end of the current line
    Ctrl+B (or left-arrow key) Move back one character
    Ctrl+F (or right-arrow key) Move forward on character
    Ctrl+N (or down-arrow key) Recall most recent command
    Ctrl+P (or up-arrow key) Recall previous command
    Esc+B Move back to beginning of previous word (or beginning of current word).
    Esc+F Move forward one word
    Tab Complete the current word (shortcut command)
    Other configuration commands used in editing the comand history are:

  • Show history: This command displays the contents of the command history.

  • Terminal history size: This command is used to change the default value of ho wmany lines of the command history are to be displayed by a show history command. The default is to show the last 10 commands.

  • Terminal no editing: This command turns off the enhanced editing feature and is used to exit enhanced editing.

  • Terminal editing: This command turns the enhanced editing feature back on. Enhanced editing is on by default and must be turned off with the terminal no editing command.

  • Naming Your Router


  • You must first enter Enable Exec (privileged), the one that displays the number or pound sign prompt, and then enter Global Configuration mode, the one that adds the word "config" in parentheses.

  • The command used to assign the hostname is hostname. - Router(config)#hostname Name

  • Saturday, August 21, 2010

    Operating system Overview

    Operating system ABCs
    An operating system, or OS, is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer would be useless.

    Operating system types
    As computers have progressed and developed so have the types of operating systems. Below is a basic list of the different types of operating systems and a few examples of operating systems that fall into each of the categories. Many computer operating systems will fall into more than one of the below categories. 

    GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and icons and is commonly navigated by using a computer mouse. See our GUI dictionary definition for a complete definition. Below are some examples of GUI Operating Systems.
    System 7.x
    Windows 98
    Windows CE

    Multi-user - A multi-user operating system allows for multiple users to use the same computer at the same time and/or different times. See our multi-user dictionary definition for a complete definition for a complete definition. Below are some examples of multi-user operating systems.
    Linux
    Unix
    Windows 2000.

    Multiprocessing - An operating system capable of supporting and utilizing more than one computer processor. Below are some examples of multiprocessing operating systems.
    Linux
    Unix
    Windows 2000.

    Multitasking - An operating system that is capable of allowing multiple software processes to run at the same time. Below are some examples of multitasking operating systems.
    Unix
    Windows 2000

    Multithreading - Operating systems that allow different parts of a software program to run concurrently. Operating systems that would fall into this category are:
    Linux
    Unix
    Windows 2000.

    Troubleshooting
    Common questions and answers to operating systems in general can be found on the below operating system question and answers. All other questions relating to an operating system in particular can be found through the operating system page.
    Linux / Variants
    MacOS
    MS-DOS
    IBM OS/2 Warp
    Unix / Variants
    Windows CE
    Windows 3.x
    Windows 95
    Windows 98
    Windows 98 SE
    Windows ME
    Windows NT
    Windows 2000
    Windows XP
    Windows Vista
    Windows 7

    Information Structure-SAP

    Information Structure:

    A table in which data is collected in the Logistics Information System.
    An information structure defines a group of fields. It is used for the reduction of data from an operative application (for example, sales or purchasing).
    Data relating to events in the operative applications (such as purchase orders and sales orders) is updated periodically in the information structures. Information structures form the basis for analyses and evaluations.
    An information structure consists of:






  • A period unit 

  •  

            Gives the structure a time reference.

    • Characteristics
    Provides information (such as sales organization or purchasing organization) with reference to which other information is cumulated.

    • Key figures
    Provides information (for example, invoiced sales or invoice value) which is cumulated with reference to characteristics

    SAP-INFO

    Today's topic: SAP Center's of Excellence. If I could suggest one thing that will significantly improve a company's chances for SAP support success, it would be to establish/implement a SAP Center of Excellence (COE).



    Without a SAP COE, you will lack the necessary support ecosystem - including resources, funding funnel, and governance body - and more importantly, the strategy and roadmap that are required to launch and sustain a successful support organization.

    Let's explore the key concepts of a COE.

    COE Overview

    Whether your company is just going live with SAP or has been live for quite some time, its never to late to put the proper infrastructure in place to effectively support your SAP environment.

    One of the biggest hurdles for COE set up is to get company's (management) to view SAP as a long-term commitment and to manage the SAP platform as a business asset.

    Given the lifespan of the SAP business platform (analyst estimates range from 15 - 25 years), and the financial investment made for the software and implementation, it is clear the emphasis of SAP planning needs to shift from "wow, we are live, what do we do now", to crafting a SAP Support strategy, which incorporates a COE.

    The next hurdle is to regain the best practices that were most likely employed pre-live. Once you go live, there is no reason to abandon the core success factors that were pertinent to the implementation. For example:

    • Aligning business owners with IT
    • Identifying value-added and non-value-added processes
    • Benchmarking results against initial ROI projections
    • Simplifying SAP instances
    • Developing infrastructure and enhancement standards and procedures
    • Committing to ongoing training and knowledge transfer
    • Institutionalizing change management

    Lastly, it is important to understand that there is no universally accepted standard for COE's, as it will vary from organization to organization. Accordingly, there is no off-the- shelf solution or silver bullet for implementing a COE within an organization.

    Before discussing an approach for implementing a COE - which I will do in Part II - it's important to understand some of the characteristics and objectives of a COE. Based on my experience, many people in IT/SAP Support can not properly define a COE or describe some of the key components or objectives. So, lets put some context around COE's. Hopefully, these will resonate with your particular situation.

    What is a COE and Why do I need it?

    First, it's important to understand the purpose of the COE. For many companies, the COE provides business and application expertise to support an organizations global or domestic SAP implementation, by designing new processes, optimizing current ones, managing complex implementation projects, providing user support and training, and keeping the complex SAP system landscape up and running 24/7. In addition, the COE helps optimize the use of all SAP products implemented in a cost-effective manner, contributing to the overall Company's success.

    Meta Group defines the critical functions as:

    • Operational support
    • Application management and enhancements
    • Infrastructure management
    • Change management

    Some of the key characteristics of a functional COE:

    • Business-led
    • IT-supported
    • Possibly virtual organization
    • Varies according to enterprise size & organization
    • Optimization of current system usage (business and IT levels)

    It is true that every company will have different objectives or goals in setting up a COE, so it is impossible to capture the entire spectrum of what the COE is meant to accomplish. Having said that, however, I think it would be beneficial to state some of the key functions and benefits of the typical SAP COE. These include:

    • A unique platform for creating global SAP solutions
    • A standard vehicle for deployment of SAP best practices
    • A central point of contact for all SAP related matters
    • Development of strong competencies in all SAP areas
    • Enhance the value of the SAP Solution - More standardization and better integration
    • Improvements in User Productivity
    • Reduced Cost of SAP Operations (TCO)
    • Improved retention of key SAP personnel
    • Improved Service Levels

    SAP-Install Notes

    Steps to Install SAP Note

    Go through following Steps:
     
    1.      Check Note Validity
    a.       Log on to SAPNet (or use SAP Service Marketplace on the Web)
              i.      Click Gen. Functions
              ii.      Click Display
              iii.      Enter note # and click Execute
              iv.      Click Note Administration
              v.      Click Support Package Tab to display note package level
              If no value exists for package level
    a.       Follow the steps in the Solution to apply the note
    b.      Go to transaction code spam
              i.      Click Package Level to display current package level
    c.       Compare note package level with current package level
              i.      If note package level < or = current package level, note has already been applied through support packages.
                      No additional steps necessary
              ii.      If note package level > current package level, note must be applied. Go to Step 2
    2.      Go to transaction code snote
    3.      Download SAP note
    a.       Click Goto à Download SAP note
    b.      Enter note #
    c.       Click Execute
    4.      Implement SAP Note
    a.       Select note and click Implement SAP Note icon
    b.      Request – Click Create; Enter note # and description
    c.       Take note of transport #
    5.      Test transport before migration
    a.       Notify requestor to verify changes before migrating to the next environment
    b.      After thorough testing has been completed, release transport
    c.       Migrate transport to the other environments

    Entering content frameBC - Note Assistant

    Use

    The Note Assistant (transaction SNOTE) helps you to implement SAP Notes. You can use this tool to load SAP Notes into your SAP System from both the SAP Marketplace and SAPNet -R/3 Frontend.
    After you have loaded the SAP Notes you need into your system, you can automatically implement the source code corrections (correction instructions) contained in the notes into your system.



    Features

    The Note Assistant includes the following functions:

    • Reporting

    You can display an overview of all existing SAP Notes and their processing status, as well as all implemented source code corrections.
    • Project Administration

    You can assign SAP Notes to users who then specify a processing status for the notes. The system informs you if an SAP Note has an inconsistent status.
    • Logging

    The system logs all processing steps.
    • Corrections

    You can automatically implement the source code corrections (correction instructions) contained in SAP Notes into your system.
    • Integration

    When you import Support Packages or upgrade your system, the system automatically recognizes which SAP Notes have already been completed by an imported Support Package or upgrade, and which correction instructions still need to be implemented.

    SAP

    SAP is a German software development and consulting corporation, which provides enterprise software applications and support to businesses of all sizes globally.
    Headquartered in Walldorf, Germany, with regional offices around the world.
    Third Largest Company in the world next to IBM.


    There are 5 types of currency in SAP r/3 system.
    1. Group Currency: You define Group Currency when you define Client (SCC4)

    2. Global Company Currency: You define Global Company Currency when you define Company that is assigned to your company code.

    3. Hard Currency: YOU define Hard Currency when YOU define the Country that your Company code assigned to. A hard currency is used in countries with high inflation.


    4. Index-Based Currency: You define IB Currency when You define Country that your company code assigned to. An index-based currency is stipulated for external reporting (for example, tax returns), in some countries with high inflation.

    5. company code Currency: You define the company code Currency when you define Company Code.
    Now with this 5 types of Currency, you can maintain a Parallel Currency in your system under the SPRO – Multiple Currency. SAP give you to maintain 3 Parallel Currencies, it means when you post a transaction using Trans Currency, system will convert to the others curr that you set in this setting.

    Thursday, August 19, 2010


    Air-to-air missiles
    Astra


    Anti Ballistic Missiles

    Prithvi Air Defence Missile (Exo-atmospheric Anti-ballistic missile)
    Advanced Air Defense Missile (Endo-atmospheric Anti-ballistic missile)


    Surface-to-surface missiles
    Short Range Ballistic Missiles
    Prithvi I
    Prithvi II
    Prithvi III
    Dhanush


    Medium Range Ballistic Missile
    Agni I
    Intermediate Range Ballistic Missiles
    Agni-II
    Agni-III

    Intercontinental Ballistic Missiles
    Agni V

    Cruise Missiles
    Subsonic Cruise Missiles
    Nirbhay
    Supersonic Cruise Missiles
    BrahMos
    Hypersonic Cruise Missiles
    BrahMos II


    Shaurya

    Submarine Launched Ballistic Missiles
    K-15 Sagarika


    Surface-To-Air Missiles
    Trishul
    Akash

    Guided Missiles
    Anti-Tank Guided Missiles
    Nag Anti-tank guided missile
    Helina Air launched Anti-tank missile

    Google, Apple prepare for mobile ads battle-NEWS

    Apple’s bid to run advertisements inside apps is expected to make its U.K. debut in September. Separately, Google has adopted what its chief executive, Eric Schmidt, calls a “mobile first” approach, prioritising investment in a medium that has become “fundamental to everything we do”.



    With the iPhone moving into mass market territory and the iPad selling 200,000 units a week, Apple’s decision to start selling mobile advertising seems likely to concentrate a few media minds.
    In early June, Steve Jobs demonstrated iAds in front of Apple developers in San Francisco. The ad he showed off was a work-in-progress by Nissan. The demo, which included a 15-second video, an interactive application and a form to sign up for a competition, didn’t quite live up to Jobs’s aim of “trying to combine the emotion of video with the interactivity of the web”. But it was slick. In the future, Jobs promised, iAds would bring in the revenue that would allow developers to continue producing “free and low-cost apps to delight users”.
    There are early signs that mobile advertising, like everything else touched by Cupertino’s genius, will turn to gold. During the eight weeks leading up to the presentation in San Francisco, Apple sold $60m-worth of iAds to the likes of Unilever and Disney. This compares with the $250m mobile online display revenue generated across the whole of 2009 in the U.S.
    Smaller bite for media owners
    For media owners, there are two major problems with Apple’s ad model, which the analyst Toni Sacconaghi of Bernstein Research suggested in a recent report has the potential to become an $800m-a-year business within the next year.
    First, Apple’s approach threatens to reduce media owners to the status of “developers” alongside tens of thousands of competitors. The second problem is that Apple’s business model, like Google’s, reduces media owners’ involvement in advertising markets to a minimum.
    Apple and Google already own the world’s two largest mobile ad networks. Both are already selling ads directly to advertisers. Advertisers, for their part, aren’t paying to reach mobile users attracted by a specific media company. Instead, in the case of iAds, they pay Apple to reach broad swaths of iPhone and iPad users who share common demographic characteristics.
    In order to stitch together these communities of users, Apple has been analysing the purchasing history of its 150 million iTunes account holders worldwide who also use iPhones and iPads. Its own hardware produces a separate stream of data about what users do, and where and how they do it. Notably, the privacy policy associated with the iPhone 4 allows Apple, for the first time, to collect anonymised real—time location data on its users.
    On sharing
    How much of this data will Apple share with advertisers and publishers? “We talk to Apple a lot,” says one publisher. “But we haven’t had that conversation yet.” The ad industry seems similarly uncertain. Michael Collins, the chief executive of Joule, a WPP-owned mobile agency, recently told Business Week that data sharing is “the question that many of us in the industry are very curious about”.
    Google, too, is forging ahead, but in a different way. On the mobile web, it continues to emphasise lead generation rather than branding. Ian Carrington, director of mobile ad sales for Google Europe, Middle East and Africa, sketches out a scenario in which a mobile user is reading a book review on a handset in a cafe. “The accompanying ad will understand its context,” he says. “It will know what book is being discussed in that review. He adds: “You’ve also got GPS in most smartphones now, so your handset can tell you that this book is GBP5.99 in a shop 100 yards away, and GBP4.99 in a shop a mile away.” Google, Mr. Carrington says, already knows how to do “the contextual part” of a scenario like this. “We’re still working on the location-based bit,” he adds. Yet the bottom line is that Google’s results-based approach will probably yield small revenues on the mobile web, just as it did on the desktop web.
    Despite different approaches to advertising, one thing unites Apple and Google. Both companies want to hold on to a relatively large proportion of the ad revenue they generate. Apple, for example, proposes to pass on to developers 60% of the revenue generated by iAds. Google continues to suggest it passes on to publishers “at least 50%” of the revenue generated by ads it runs next to publishers’ content. These levels of commission will look high to anyone who recalls the 15% commission that used to go to media agencies for bringing in advertising for publishers.
    There’s a further reason for publishers to be wary about the mobile web. As it turns out, Apple and Google plan to take a large slice of what, by anyone’s standards, is a very small pie. Last year, the latest in a series of years dubbed the “year of mobile advertising” by industry boosters, advertisers spent a mere GBP35m trying to reach British mobile users, according to Enders Analysis. That’s 1% of what advertisers spent on all digital advertising and, as Benedict Evans, a consultant at Enders Analysis, points out, less than the GBP50m he estimates Britons shelled out last year to have pornographic images texted to their handsets.
    In the words of one publisher, the cumulative effect of these challenges is a “cautious” and “risk-averse” approach to publishing on tablets and handsets.
    Others take a more positive view: Matt Kelly, digital content director at Trinity Mirror’s national papers, says Apple has the upper hand “because they’re first into the market, they’ve done all of the development, all of the creative hard work”. “They’re reaping that reward,” he adds. “At the moment, content producers are at the mercy of great technology innovators. But it won’t stay that way forever. We may see a swing towards publishing content on Android if Google’s business terms become more attractive.” Not a bad deal Kelly is also wary of the argument that Apple and Google are skimming off too much mobile ad revenue. “The overheads at Trinity Mirror’s newspapers are 75% of revenue - for paper, ink, transport and so on. If someone comes along and says, we’ll replicate the revenues, but the bulk of your costs will be 40%, it’s not automatically a bad deal.” Kelly remains confident about the value of content: “Technology will become commoditised and homogeneous, more open for third parties to come in and innovate and copy. The profits for platforms will decline and the profits associated with content will increase.” Steve Pinches, lead product development manager at ft.com, says that Apple wants to use iAds to sustain a “huge long tail of apps that really have no easy way of monetising themselves”. Big media is different, argues Mr. Pinches. “We have very deep relationships with our advertisers that have been formed over years and years,” he says. “We also have an incredibly deep relationship with our readers.” Evans also sees positives in Apple’s pricing of iAds. “They’re trying to catalyse the market,” he says. “If they’d gone out and said this is going to be cheap, advertisers would have carried on with their small experimental budgets. “But Apple has told advertisers they’re not spending $80,000 on another experimental campaign. Instead they’re each going to spend a minimum of $1m on each iAds campaign.” Rupert Murdoch thinks the iPad “may well be the saving of the newspaper industry”. Yet Apple would like to claim the lion’s share of profits from the mobile web by charging a high price for its hardware. By contrast, Mr. Schmidt at Google foresees a future in which handsets and airtime are free, subsidised by advertising.
    Both Apple and Google need what Jobs describes as “free and low cost” content that engages users and attracts advertisers. On the mobile web, the task facing media owners is to figure out how much revenue they can wring out in return.