Friday, January 29, 2010

About The Network Which Connects Everybody

Interesting Internet Facts by Robert C. Brenner, MSEE, MSSM

While researching for pricing information, we found the following interesting tidbits. These factoids may be of interest to you.
TOTAL NUMBER OF HOUSEHOLDS ONLINE
1993
– 4.6 million online in US

1995
– 9.6 million online in US
– 19% are shopping online

1996
– 10 million online in US (4% of US population)
– 8% of online users buying products via Internet

1997
– 11 million online in US
– 17% claim to be online buyers spending at least $50 a year
– 27% are shopping online

1998
– 19.1 million online in US
– 20 million users (”netizens”) worldwide say Internet is indispensable
– over 1.2 million users in Russia

1999
– 158 million online worldwide
– 58 million - 92 million online in US (depending on research source)
– average surfer got over 1,700 email messages
– 37 million use Web for e-commerce

2000
– 122.7 million online in US (source Yahoo! Internet Life)
– 180 million online in the US as of December 2000
– 2.1 billion online worldwide (out of 6 billion)
– Internet sales up 1,200% since 1997
– 500,000 new users to Internet every month
– 7 million US homes now getting 10 MB of two-way high speed Internet access

2003
– 500 million users online worldwide

2008
– 215 million online in the U.S. (71.4% of U.S. population)
– 1,464 million online worldwide (21.9% of world population)

INTERNET STATS (as of Septermber 2000)
– 76 million in US surf Internet and use email daily
– (215 million users in 2008)
– 333.5 million e-mail accounts active in US (in 1998 it was 77 million)
– 46% of American workers use the Net for personal reasons
– 48% of engaged couples used Web to gather info on and plan weddings
– 55% of online gamblers are women
– 650 thousand new jobs created based on Internet contact
– 5,400 jobs cut between January and June 2000 due to dot-com failures
– 44% of online surfers have participated in an online auction this year
– 32% used the Net to keep up with and gather voting and election
information
– 18% relay on Internet “completely” or “very much” for daily news
– 68% say that e-mail and instant messaging has reduced long distance
phone bill
– 71% of men have shop online
– 58% of women shop online
– Most likely shoppers are males with at least Bachelor’s degree and
earning $75,000
– Companies are launching Web sites at record pace
– Over half of all businesses with Web sites maintain their own site
– advertising online has gone from $400 million in 1997 to $4.8 billion
in 2000
– 32 million households to bank online by 2003
OTHER INTERESTING STATS
– Total US business at end of 1996 - 6.22 million

– 50% of all business owners are 35-54 years old
– 50% of these are 35-44 years old
– 70% are married
– 54% are home-based sole proprietorships
– 66% are first time businesses
– (2008) 60% of U.S. households have high speed Internet connections
DEMOGRAPHICS OF INTERNET USERS
2000
– 84% Caucasian (1999 - 76% Caucasian)
– 12 % African-American
– 3% Asian
– 1% mixed
–38% have Bachelor’s degree or higher (down from 47% in 1996)
–27% are relatively new to the Web
–60% are married or partnered (was 71% in 1997)
–Over 50% go online every day
TOP ONLINE ACTIVITIES
92% browse the Web
88% send/receive email
87% collect information about hobby or personal interest
81% collect product or service information
74% read the news
65% get business or work information
63% collect travel information
60% download images or photos
58% look up entertainment events
56% check the weather
xx% doing online investing
WHO’S BUYING WHAT (January 1999)
MEN
– men mostly buying computers, CDs and videos
– 12.6 million male shoppers research automobiles and buy auto parts
– 9.4 million men buy computers online
WOMEN
– number of women buyers up 80%
– 9.6 million women bought books, CDs and videos
– 6.9 million women buy clothing online
– 6.4 million women buy computers online
SMALL BUSINESS USE OF INTERNET
72% use for email and customer contact (up from 62% in 1999)
48% operate a Web site
28% sell goods or services online
WEB SITE STATS
Over 1 million active Web sites (over 80 million web pages)
– typical Web page 5k
– typical Web image 12k
– median site has 300 pages
– 50 sites have over 30,000 pages
– top 1,000 sites account for 50% of all web traffic

Tuesday, January 13, 2009


Story About Internet (Amazing WWW World)
The World Wide Web Consortium (W3C)
    In 1994, the (W3C) was created to "Lead the Web to Its Full Potential."—Tim Berners-Lee

Download - The True Story Of The Internet "People Power" - 43:06 - Apr 4, 2008 The

Science Channel host John Heilemann explores the interactive nature of the modern World Wide Web, from early successes like Napster and the still popular Craigslist, to more recent phenomena like the social networking sites MySpace and Facebook. http://science.discovery.com/tv/download/about/about.html In this episode, "People Power," teenager Shawn Fanning invents Napster and forever changes the way music is shared over the Net -- and, later, the way people communicate with each other via this medium. Download: The True Story of the Internet is about a revolution -- the technological, cultural, commercial and social revolution that has radically changed our lives. And for the first time, we hear how it happened from the men and women who made it possible. From the founders of eBay, Yahoo, Amazon, Netscape, Google and many others, we hear amazing stories of how, in ten short years, the Internet took over our lives. These extraordinary men and women tell us how they went from being geeky, computer obsessed nerds to being 21st-century visionaries in the time it takes most people to get their first promotion. And, how they made untold billions along the way. The style of the story-telling is up close and personal. With first-hand testimony from the people that matter, we tell a story that has all the excitement of a thriller -- full of battles and back-stabbing, moments of genius and moments of sheer hilarity. You will never surf the net in the same way again. Download is hosted by technology journalist John Heilemann. He's an edgy, combative, hi-energy New Yorker who never takes anything at face value. He's also a personal friend of most of Silicon Valley's most important characters and he revels in craziness of it all. After all, this is a story in which 20-year-olds become overnight billionaires, create, destroy and re-create more wealth in ten years then human race has ever seen, and still struggle to get a date.

21 Facts About The Internet You Should Know



You probably use it every day but how well do you

know your Internet?


Ever wonder how all this foolishness got started in the


first place and why? How big it really is? How many present


users there are? The average time spent on a website?


Here are 21 facts you might or might not want to know


about the Internet.




1. Who coined the phrase 'World Wide Web'?


Tim Berners-Lee in 1990. He's also considered by most


people as the person who started the whole thing rolling.




2. How did the Internet Start and Why?


It all started with the time-sharing of IBM computers in the


early 1960s at universities such as Dartmouth and Berkeley in


the States. People would share the same computer for their


computing tasks. The Internet also received help from Sputnik!


After this Russian Satellite was launched in 1957, President


Eisenhower formed ARPA to advance computer networking and


communication.


Plus, we won't even mention that whole industry where


people show their naughty bits.




3. Who was J.C.R. Licklider?


Licklider is often referred to as the father of the Internet because


his ideas of interactive computing and a "Galactic Network" were


the seeds for the Internet. His ideas would be developed thru


DARPA,(Defense Advanced Research Projects Agency) in 1962.


Later he would help form ARPANET and the Internet was on it's way.


Vinton Gray Cerf was another founding father of the Internet. He


played a key role in the creation of the Net by developing


the TCP/IP protocols we use for the Internet.




4. What was ARPANET?


ARPANET stands for 'Advanced Research Projects Agency Network'


Came about in the arena of Sputnik and the cold war. The military


needed a method of communicating and sharing all the information on


computers for research and development. It would also be a handy


communication system if all traditional ways were wiped out in


a nuclear attack!




5. What was the First long distance Connection?


In 1965 using a low speed dial-up telephone line, MIT


researcher Lawrence G. Roberts working with Thomas Merrill,


connected the TX-2 computer in Massachusetts to the Q-32


in California. The phone lines weren't quite up to the task!




6. Who was Leonard Kleinrock?


Kleinrock came up with the theory of packet switching,


the basic form of Internet connections. With a group


of UCLA graduate students on Oct. 29, 1969, Kleinrock


connected with the Stanford Research Institute but as


they typed in the G in LOGIN -- the system crashed!




7.What is an Ethernet?


It's a protocol or system for a set of computer networking


technologies for local area networks (LANs), the origins of


which came from Bob Metcalfe's Harvard's dissertation on


"Packet Networks."




8. When was the first mouse introduced?


The first computer mouse was introduced in 1968 by


Douglas Engelbart at the Fall Joint Computer Expo


in San Francisco.




9. Did Al Gore really invent the Internet?


No, but give credit where credit is due. He did the most of


any elected official to actively promote the Internet. However,


he wasn't even in Congress when ARPANET was formed in 1969


or even when the term 'Internet' came into use in 1974. Gore was


first elected in 1976.


Gore himself may be the cause of this Urban Legend or


Internet myth - during a Wolf Blitzer CNN interview on


March 9, 1999 - Al Gore did say: "During my service in the


United States Congress, I took the initiative in creating


the Internet."


Causing himself some ridicule but also paving the way for


such future one-liners as: "I invented the environment!"




10. Who coined the phrase 'information superhighway'?


Wikipedia says Nam June Paik coined the phrase "information


superhighway" in 1974.


Al Gore popularized the phrase in the early 1990's.




11. Which decade really saw the explosion of the net?


The 1990s. The Internet exploded into the mainstream with


the release of the first popular web browser Mosaic in 1993.




12. How fast is the Internet growing?


Very fast! It took 38 years for radio to reach 50 million users,


13 years for TV, and only 5 years for the Internet. Source:


CyberAtlas.com




13. Number of Internet Users and Breakdown.


The Internet is roughly 35% English, 65% Non-English with


the Chinese at 14%. Yet only 13% of world's population,


812 million are Internet users as of Dec. '04. North America


has the highest continental concentration with 70% of the


people using the Internet.




14. Country with the highest percentage of net users?


Sweden at 75%.




15. How big is the Internet's surfing world?


Google's index now stands at over 8 billion pages. There are


now over a Billion Internet Users and that number is growing


rapidily.




16. What was the Net's first index called?


Archie, other than library catalogs, this was the first


index created in 1989 by Peter Deutsch at McGill in Montreal.


Although it spouted such others as Veronica and Jughead, Archie


was short for Archiver and had nothing to do with the


comic strip. Backrub was the original name for Google! Larry Page and Sergey


Brin used this term for their search engine in 1996, Google as we


know it debuted in 1998. The name Google is a twist on the word


Googol, a number represented as 1 followed by 100 zeros.




17. Who coined the phrase 'The Web might be better than sex'?


Bob Metcalfe in 1995.




18. What does HTTP stand for?


HyperText Transfer Protocol - it's the protocol for moving files


across the net; it requires two client programs. The HTTP client


and the server.




19. What is an ISP?


Internet Service Provider - This is the service or company you use to


access the Internet.




20. What is HTML?


Hypertext Markup Language - it's the coded format language for


transmitting and creating hypertext web pages.




21. What are your average surfing habits according to Nielsen


NetRatings?


Each month you usually visit 59 domains, view 1,050 pages allocating 45


seconds for each page and spend about 25 hours doing all this net activity!


Each surfing session lasts 51 minutes.




One last thought - Henry Edward Hardy in his Master's Thesis (1993) on


The History of the Net stated "The Net is Immortal". Ever wonder what


this baby will be like in a 100 years? a 1000 years? Just something


to think about as you keep your eye on that cursor.


The Dark Side of the Internet






       In an online world of millions of people, you are bound to have bad guys and dishonest individuals. The tough part is that they can know deceive you just by knowing a little more technology than you do. But don't fear: About.com wants to help you see when you are being scammed or attacked by a dishonest internetizen. And we want to help you defend against these bad boys of the internet.




1) What is “Spyware”?


Forget viruses, spam and hacker attacks..."spyware" is now the single largest problem facing internet users today. These nasty little rogue programs have become so widespread and so infectious, their volume far outstrips spam and regular viruses. The spyware problem has grown to such an immense breadth and depth, we cannot even agree on what to call it.


2) Spyware = 'Malware'


Most people historically call these rogue programs "spyware". That name comes from the 1990's where nasty little programs secretly observed and logged your web surfing habits. The spyware problem, however, has now grown into dozens of other malicious formats, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms


Because the spyware problem has mutated so much, we now describe spyware as part of a much larger category of rogue software called "malware" (malicious software programs). .


At its most basic definition, malware is when insidious little software programs covertly install themselves on your computer, and then perform secret operations without your permission. Once in place, malware programs may do hundreds of nasty things to your computer. Malware will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.


3) What does Spyware/Malware specifically do to my computer?


Malware will perform a variety of nasty activities, ranging from simple email advertising all the way to complex identity-theft and password-stealing. New nasty functions are created every week by malware programmers, but the most common malware functions are:


  1. Malware steals your personal information and address book (identity theft and keystroke-logging).
  2. Malware floods your browser with pop-up advertising.
  3. Malware spams your inbox with advertising email.
  4. Malware slows down your connection.
  5. Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.
  6. Malware uses your computer as a secret server to broadcast pornography files.
  7. Malware slows down or crashes your computer.


4) Where does Spyware/Malware come from?


Spyware/malware programs are authored by clever programmers, and then delivered to your computer through covert Internet installs. Usually, malware will piggyback on innocent-looking web page components and otherwise-benign software such as game demos, MP3 players, search toolbars, software, free subscriptions, and other things you download from the web. Subscribing to online services is especially bad for getting malware. In particular, whenever you sign up for a so-called "free" service or install new software, you must accept an "end user license agreement" (EULA). The fine print of the EULA will often include the phrase "the vendor is allowed to install third-party software on your computer". Since most users don't bother to read this EULA fine print, they naively click "accept", and install malware out of sheer ignorance.


5) What kind of personal information does Spyware/Malware steal?


This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.


How Do I Protect Myself from this 2008 Epidemic of Spyware/Malware?


Answer: Avoiding and destroying spyware is not instant, and it is not a one-time event like an inoculation. Instead, stopping spyware/malware is a long-term game that is exactly like cleaning dirt out of your home. You need constant vigilance, and a regular habit of cleaning malware out of your computer every week.


Note: Additionally, as an educated user, you must also adopt a "buyer beware" attitude whenever you install new software from the Net or even from CD...you need to read every end user license agreement on your screen before you click "accept".


Here is the checklist for detecting and destroying malware


Install two or three different anti-spyware programs ("spyware cleaners") on your computer, and update their definition lists regularly. Because every anti-spyware cleaner is imperfect, it is necessary to use combinations of these programs to catch the greatest breadth of malware. Also, the anti-spyware manufacturers regularly add new entries to their "definition" lists, just like anti-virus software. Make sure to keep your spyware cleaners updated with these lists!





  1. Build a weekly habit of "scan and detect". Like cleaning house, this should be done every few days. At the very least, this should be done whenever you install new software. Many anti-spyware programs can be set to automatically perform scan-and-detect nightly.




  2. Carefully read every EULA (end user license agreement) before clicking "accept". If you see the phrase "3rd-party software may be installed", make sure to follow the software install with a spyware cleaning.




  3. Educate yourself on the latest strains of malware. In particular, start visiting these recommended anti-spyware sites, and update yourself on the latest malicious programs.






  1. Save your data, and backup often! As much as it sounds like broken-record preaching, backing-up is how an intelligent user prepares for the worst. Backing up means: keep your original software CDs in a safe accessible place, constantly save copies of your important work files on CD or separate drives, and presume you will actually need them one day. This way, if you ever experience the extreme spyware circumstance of having to reformat your hard drive, you can at least recover your important work.



There you go, fellow Internet users. Your lives now have an extra complexity as you add one more cleaning habit to your weekly routine. The good news is: once you build a regular scan-and-detect habit, then spyware and malware will be reduced to a mere annoyance, and you can get back to business of enjoying the internet! Personally, I think of it as having one more room in my house to dust and vacuum.

How To Write Thesis (Phd Computer Science)

Gxtechno Tags: , , , , , ,

Please this is the common observation which is followed by the most researchers. This is not compulsory format to follow.

Computer Science Thesis Format

This is a format and guidelines for writing your computer science thesis. This is your finally-written computer science thesis should look like.
  • Introduction
    1. Introduction the topic thesis
    2. Focusing the task
    3. State the usefulness and aim of the study
  • Stating the initial point
    1. State previously developed methods in the research area
    2. Which conditions (for execution: hardware and software among others) are present?
  • Develop a solution model
    1. Critical assessment of the literature: What is possible?
    2. Starting from the previous item: Development of solution concept
    3. Solution concept rationalization: Comparing the alternatives
  • How solution concept would be executed?
    1. Tool selection
    2. Documentation of important design decisions
    3. Critical assessment of the implementation
  • Conclusion
    1. Summary
    2. Recommendations
I specially thanks to the author.
About The http://www.educationalwriting.net/resource_center/Thesis/Writing/Computer_Science_Thesis.htm
Derek Gendron has been tutoring students of all ages for more than 5 years. He has helped students achieve higher grades and win their degrees by providing assistance with their essays, research papers, theses, and dissertations. In January 2007, he has started selling his service on the internet.




A CS Research Topic Generator
or
How To pick A Worthy Topic In 10 Seconds

Computer Science is facing a major roadblock to further research. The problem is most evident with students, but afflicts many researchers as well: people simply have a tough time inventing research topics that sound sufficiently profound and exciting. Many PhD students waste needless years simply coming up with a thesis topic. And researchers often resort to reading documents from government grant agencies so they will know what to work on for the next proposal!
Good news for the CS community: the problem has at last been solved. The table below provides the answer.
Column 1
Column 2
Column 3


integrated mobile network
parallel functional preprocessor
virtual programmable compiler
interactive distributed system
responsive logical interface
synchronized digital protocol
balanced concurrent architecture
virtual knowledge-based database
meta-level multimedia algorithm
optimized binary toolkit
active object-oriented display
parameterized secure technology
conceptual high-speed solution
scalable real-time language
dynamic functional agent
high-level parallelizing theorem prover
collaborative watermarking work cluster
type-safe proxy cache
To generate a technical phrase, randomly choose one item from each column. For example, selecting synchronized from column 1, secure from column 2, and protocol from column 3 produces:
A synchronized secure protocol
Best of all, two phrases can be combined with simple connectives, making the result suitable for the most demanding use. Possible connectives include:
for
related to
derived from
applied to
embedded in
For example, one could generate a thesis title by selecting a second phrase and a connective:
A synchronized secure protocol for an interactive knowledge-based system
The technique described here for selecting a research topic is far superior to the method currently in use because it can be automated -- a computer program can be written to select a phrase at random whenever one is needed. Furthermore, thanks to an enhancement by Ian Stark at The University of Edinburgh in Scotland, it is possible to automate an additional step in the research process by performing an automated literature search. Try the system by first generating a random topic and then performing an automated literature search.
This is the list of topic fields :
  • GXT. Advanced Computational Linguistics
  • GXT. Advanced Computer Graphics
  • GXT. Advanced Performance Modeling
  • GXT. Animation for Everyone
  • GXT. ATLAS Interdisciplinary PhD Seminar
  • GXT. Automata for Cyber Physical Systems
  • GXT. Bioinformatics
  • GXT. Chaotic Dynamics
  • GXT. Code Generation and Optimization
  • GXT. Computation for Cognitive Science
  • GXT. Computational Biology and Health Informatics
  • GXT. Computational Biomechanics
  • GXT. Computational Genomics
  • GXT. Computational Geometries
  • GXT. Computer Architecture and Compiler Technology Research
  • GXT. Computer Mediated Interaction
  • GXT. Computer Privacy
  • GXT. Computer Science/Cognitive Science
  • GXT. Cryptanalysis
  • GXT. Cryptography
  • GXT. Data Mining
  • GXT. Design, Creativity, and New Media
  • GXT. Design, Learning and Collaboration
  • GXT. Designing the Future Internet
  • GXT. Designing the Information Society of the Next Millennium
  • GXT. Digital and Social Systems Foundations
  • GXT. Distributed, Mobile and Pervasive Runtime Systems
  • GXT. Educational Computing
  • GXT. Elements of Statistical Inference
  • GXT. Foundations of Computer and Network Security
  • GXT. Future of Library Science and Computer Science
  • GXT. Game Programming
  • GXT. Games for Health
  • GXT. Graphics
  • GXT. Groupware and Workflow
  • GXT. High-Performance Scientific Computing 1
  • GXT. High-Performance Scientific Computing 2
  • GXT. Human Computer Interaction -- Survey and Synthesis
  • GXT. Human-Centered Computing Foundations
  • GXT. Inference, Models and Simulation for Complex Systems
  • GXT. Information Storage Software
  • GXT. Internet Dreams
  • GXT. Introduction to Robotics
  • GXT. Issues and Methodologies in Cognitive Science
  • GXT. Machine Vision
  • GXT. Mathematical Foundations of Programming Languages
  • GXT. Medical Informatics
  • GXT. Modern Information Retrieval
  • GXT. Multi-Robot Systems
  • GXT. Multimedia Networking
  • GXT. Network Systems
  • GXT. Object-Oriented Analysis and Design
  • GXT. Open Source Development of Cognitive Technology on a Mobile Platform
  • GXT. Quantum and Molecular Computing
  • GXT. Reconfigurable Computing
  • GXT. Software Architecture
  • GXT. Software Defined Radios
  • GXT. Software Systems Management
  • GXT. Speech Recognition and Synthesis
  • GXT. Spoken Dialogue Systems
  • GXT. Systems and Algorithms for Massive Data Applications
  • GXT. Teaching Computer Science
  • GXT. Technical Writing
  • GXT. UNIX System Administration
  • GXT. Visual Programming
  • GXT. Web Development
  • GXT. Wireless Networking
  • GXT. Workflow Management Systems

Some PhD research areas I am interested in

Generally, I am interested in supervising PhD research in all aspects of programming languages. More specifically, the interaction of programming languages and computer security is an exciting new research area. We have strength here in both programming language and computer security research.
Safe systems-level programming
C is still the language of choice for programming operating systems and other code that needs to be efficient and manage system resources. However, C code is often afflicted with buffer overflows and other memory corruption vulnerabilities. Some experimental programming languages (such as Vault and Cyclone) aim to give the same power as C while being much safer (eliminating buffer overflows, for instance). A PhD thesis could build on the lessons learnt from those languages to defend against more classes of attacks.
Concurrent programming and security
Some of the most subtle security flaws arise due to race conditions in concurrent access to some critical resource. The time-of-check-time-of-use (TOCTOU for short) vulnerability class is a classic example. Race conditions and other concurrency problems are likely to become more prevalent in distributed computing and the spread of multi-core processors. A PhD could use types and logics for concurrency to address these problems. My current PhD student Horia Corcalciuc is working in this research area.
Defending against command injection attacks
The most widely known form of command injection attack is the SQL command injection attack, the scourge of many websites. However, the phenomenon of command injection is quite general, as it arises whenever data can be interpreted as code. Programming language research should be useful for understanding the problem and developing principled means of defence.
Type and effect systems
I have done some work on type and effect systems for control (continuations); it would be interesting to see whether these results fit into a broader picture of computational effects in general, using mathematical tools like modal and classical logics.
Principled access control in programming languages
Java and .NET use stack inspection to control access to system resources. It is not always easy to understand what this mechanism does and whether it correctly protects resources. A number of static access control systems have been proposed that can ensure access control at compile time rather than by dynamic checks. I am interested in type and effect systems for access control, which could be a good thesis topic.

Wednesday, January 27, 2010

Import The Contents From Other Accounts to Gmail.

Gxtechno Tags: , , , , ,

Do not need to transfer your mails and contact one by one on your Gmail account only follow some steps and feel the magic.

If you are now looking to transfer all your mails on your Gmail account, then do not worry i can help you. You can now Import your mails from from Yahoo, Hotmail, AOL, or other webmail or POP3 accounts to Gmail all you need is to follow few simple steps.

Step1:- Open your Gmail account and Click the Settings link.

Step2:- Click on  Accounts and Import tab, click the Import mail and contacts button.

Step3:- In the new Dialog Window, enter the email address of the account you’d like to import contacts from and Click  Continue.

Step4:- Enter the password for your other email account and click Continue. Select all the checkboxes that apply:

  • If you choose to import contacts, the information in your contacts list in your old account will be imported to your Contacts section in Gmail.
  • If you select the Import mail checkbox, your existing messages in that account will be imported to your Gmail inbox.
  • If you want, you can also select the Import new mail checkbox so that messages sent to your old account for the next 30 days will be imported to your Gmail account. These messages won’t appear in Gmail immediately once they’re sent to your other account, but should update within a day or two
  • Finally, you can automatically apply a label to your imported messages to indicate that those were sent to your other account.

Click Start Import. The import will continue if you leave the Settings page or sign out of Gmail.Your contacts and/or messages will be imported. It may take 24-48 hours before you see your imported messages, so don’t worry if they’re not there as soon as you click OK. You can check the status of your import by clicking the Accounts and Imports tab on the Settings page. Once the import is complete, you’ll see a confirmation message at the top of your inbox.

Tuesday, January 26, 2010

How to be a good presenter

If you would like to learn about presentation skill, you should know the great Steve Jobs. Who is the greatest presenter and CEO of apple.
stevestare_iphone
Steven Paul "Steve" Jobs (born February 24, 1955) is an American businessman, and the co-founder and chief executive officer of Apple Inc. Jobs previously served as CEO of Pixar Animation Studios.
Jobs' history in business has contributed much to the symbolic image of the idiosyncratic, individualistic Silicon Valley entrepreneur, emphasizing the importance of design and understanding the crucial role aesthetics play in public appeal. His work driving forward the development of products that are both functional and elegant has earned him a devoted following.
Steve Jobs is probably one of the most polished presenters in the world. He doesn’t use any bullet points in his presentations, his keynote addresses are free of any jargon, there are very few words in the slides but they have photographs and headlines that are hard to forget (everyone still remembers “the world’s thinnest notebook,” a phrase that Steve used to describe Macbook Air).

Just act like Steve Jobs

If you like to learn some of the techniques and styles that make Steve Jobs such a great presenter, here’s some excellent advice [video + slides] from Businessweek columnist Carmine Gallo, who is also the author of the book -- The Presentation Secrets of Steve Jobs.



“Steve Jobs may be a hard act to follow. But once you start using his techniques in your own presentations, you’ll be hard to forget.”



Launch your own SlideRocket presentation!
To turn really interesting ideas and fledgling technologies into a company that can continue to innovate for years, it requires a lot of disciplines.
Steve Jobs - Skill - Technology - Innovation
A lot of companies have chosen to downsize, and maybe that was the right thing for them. We chose a different path. Our belief was that if we kept putting great products in front of customers, they would continue to open their wallets.
Steve Jobs - Marketing - Challenges - Customers
The people who are doing the work are the moving force behind the Macintosh. My job is to create a space for them, to clear out the rest of the organization and keep it at bay.
Steve Jobs - Work - Management
Innovation distinguishes between a leader and a follower.
Steve Jobs - Leadership - Innovation
Apple's market share is bigger than BMW's or Mercedes's or Porsche's in the automotive market. What's wrong with being BMW or Mercedes?
Steve Jobs - Questions
I think we're having fun. I think our customers really like our products. And we're always trying to do better.
Steve Jobs - Work - Success - Customers

Wednesday, January 20, 2010

This is India

GenXTechno Tags: , , , ,
You might have read most of this before including this, but a few new points have been added by the former President it seems to make the article more relevant. Worth reading again.


Letter of some facts of India - APJ
The President of India DR. A. P. J. Abdul Kalam 's Speech in Hyderabad .
Why is the media here so negative? Why are we in India so embarrassed to recognize our own strengths, our achievements? We are such a great nation. We have so many amazing success stories but we refuse to acknowledge them. Why?


We are the first in milk production.
We are number one in Remote sensing satellites.
We are the second largest producer of wheat.
We are the second largest producer of rice.


Look at Dr. Sudarshan , he has transferred the tribal village into a self-sustaining, self-driving unit. There are millions of such achievements but our media is only obsessed in the bad news and failures and disasters.
I was in Tel Aviv once and I was reading the Israeli newspaper. It was the day after a lot of attacks and bombardments and deaths had taken place. The Hamas had struck. But the front page of the newspaper had the picture of a Jewish gentleman who in five years had transformed his desert into an orchid and a granary. It was this inspiring picture
that everyone woke up to. The gory details of killings, bombardments, deaths, were inside in the newspaper, buried among other news.
In India we only read about death, sickness, terrorism, crime.. Why are we so NEGATIVE? Another question: Why are we, as a nation so obsessed with foreign things? We want foreign T.Vs, we want foreign shirts. We want foreign technology.
Why this obsession with everything imported. Do we not realize that self-respect comes with self-reliance? I was in Hyderabad giving this lecture, when a 14 year old girl asked me for my autograph. I asked her what her goal in life is. She replied: I want to live in a developed India . For her, you and I will have to build this developed India You must proclaim. India is not an under-developed nation; it is a highly developed nation.


Do you have 10 minutes? Allow me to come back with a vengeance.
Got 10 minutes for your country? If yes, then read; otherwise, choice is yours.
YOU say that our government is inefficient.
YOU say that our laws are too old.
YOU say that the municipality does not pick up the garbage.
YOU say that the phones don't work, the railways are a joke. The airline is the worst in the world, mails never reach their destination.
YOU say that our country has been fed to the dogs and is the absolute pits.
YOU say, say and say. What do YOU do about it?

Take a person on his way to Singapore . Give him a name - 'YOURS'. Give him a face - 'YOURS'. YOU walk out of the airport and you are at your International best. In Singapore you don't throw cigarette butts
on the roads or eat in the stores. YOU are as proud of their Underground links as they are. You pay $5 (approx. Rs. 60) to drive through Orchard Road (equivalent of Mahim Causeway or Pedder Road)
between 5 PM and 8 PM. YOU come back to the parking lot to punch your parking ticket if you have over stayed in a restaurant or a shopping mall irrespective of your status identity… In Singapore you don't say anything, DO YOU? YOU wouldn't dare to eat in public during Ramadan, in Dubai YOU would not dare to go out without your head covered in Jeddah.. YOU would not dare to buy an employee of the telephone exchange in London at 10 pounds (Rs.650) a month to, 'see to it that my STD and ISD calls are billed to someone else.'YOU would not dare to speed beyond 55 mph (88 km/h) in Washington and then tell the traffic cop, 'Jaanta hai main kaun hoon (Do you know who I am?). I am so and so's son. Take your two bucks and get lost.' YOU wouldn't chuck an empty coconut shell anywhere other than the garbage pail on the beaches in Australia and New Zealand.
Why don't YOU spit Paan on the streets of Tokyo ? Why don't YOU use examination jockeys or buy fake certificates in Boston ??? We are still talking of the same YOU. YOU who can respect and conform to a
foreign system in other countries but cannot in your own. You who will throw papers and cigarettes on the road the moment you touch Indian ground. If you can be an involved and appreciative citizen in an alien
country, why cannot you be the same here in India ?
Once in an interview, the famous Ex-municipal commissioner of Bombay, Mr. Tinaikar, had a point to make. 'Rich people's dogs are walked on the streets to leave their affluent droppings all over the place,' he
said. 'And then the same people turn around to criticize and blame the authorities for inefficiency and dirty pavements. What do they expect the officers to do? Go down with a broom every time their dog feels
the pressure in his bowels? In America every dog owner has to clean up after his pet has done the job. Same in Japan .
Will the Indian citizen do that here?' He's right. We go to the polls to choose a government and after that forfeit all responsibility.
We sit back wanting to be pampered and expect the government to do everything for us whilst our contribution is totally negative. We expect the government to clean up but we are not going to stop
chucking garbage all over the place nor are we going to stop to pick a up a stray piece of paper and throw it in the bin. We expect the railways to provide clean bathrooms but we are not going to learn the proper use of bathrooms.
We want Indian Airlines and Air India to provide the best of food and toiletries but we are not going to stop pilfering at the least opportunity. This applies even to the staff who is known not to pass on the service to the public.
When it comes to burning social issues like those related to women, dowry, girl child! and others, we make loud drawing room protestations and continue to do the reverse at home. Our excuse? 'It's the whole
system which has to change, how will it matter if I alone forego my sons' rights to a dowry.' So who's going to change the system?
What does a system consist of? Very conveniently for us it consists of our neighbours, other households, other cities, other communities and the government. But definitely not me and YOU. When it comes to us
actually making a positive contribution to the system we lock ourselves along with our families into a safe cocoon and look into the distance at countries far away and wait for a Mr.Clean to come along & work miracles for us with a majestic sweep of his hand or we leave the country and run away.
Like lazy cowards hounded by our fears we run to America to bask in their glory and praise their system. When New York becomes insecure we run to England When England experiences unemployment, we take the next flight out to the Gulf. When the Gulf is war struck, we demand to be rescued and brought home by the Indian government. Everybody is out to abuse and rape the country. Nobody thinks of feeding the system. Our conscience is mortgaged to money.
Dear Indians, The article is highly thought inductive, calls for a great deal of introspection and pricks one's conscience too…. I am echoing J. F. Kennedy's words to his fellow Americans to relate to Indians…..
'ASK WHAT WE CAN DO FOR INDIA AND DO WHAT HAS TO BE DONE TO MAKE INDIA WHAT AMERICA AND OTHER WESTERN COUNTRIES ARE TODAY'
Lets do what India needs from us.
Forward this mail to each Indian for a change instead of sending Jokes or junk mails.
Thank you,
Dr. Abdul Kalam

Tuesday, January 12, 2010

Easy website building tools

Now no need to spent 1yr training in web developing, these tools makes it easy for you.

1. Office Live Small Business

While the name may suggest that the service is only for small business owners, just about anyone can create their website here.
office live website
Website Builder inside Office Live Small Business
Office Live is easy and filled with goodies – you have tons of professional web templates and color themes to choose from, there’re ready-made modules for common tasks like web forms, photo galleries, live maps,  email newsletters, etc. plus you can also upload office documents to the website.
Everything is free including web hosting and server space.

2. Weebly – This is powerful but very user friendly and easy web page builder where you start with a blank canvas and build the page by dragging elements that include text, videos, pictures, maps and more.
weebly-editor
Geeks can write their own HTML and add them to Weebly pages. There’s support for Google ads as well so you can even monetize sites created inside Weebly. Another advantage – site publishers download their full site with pictures and CSS as a zip file. Free users gets 100 MB of free storage space and there’re no bandwidth limitations.

3. Snap Pages – This is Flash based website editor that is very beautiful and may be a perfect place if you looking to create a small website for sharing some photos and your calendar. The options are slightly limited for non-premium users as they can’t create new pages.

snap pages

4. Edicy Pages – It’s a new website creation tool that is just perfect for the techie crowd who wants more control over their site layout.
Start by picking a design from the template gallery and then you may completely change the look and feel of your site by editing the blog template similar to WordPress themes or Blogger template. It also supports JavaScript code and like Google Sites, Edicy tracks all changes made to a site.

5. Synthasite – This is again an easy yet very powerful tool for building websites but unlike competition, Syntasite is completely free. Images uploaded to Synthasite can be diretly edited in Picnik just like you have in Flickr. The tool also lets you embed Google AdSense ads in web pages much like Weebly.

Note:- Some more site builders worth checking out are WebOn, WebSketch, Viviti, Wix and Webs.

Hide Drives and Partitions

Do you have data on a partition or hard drive that you don't want tampered with or easily accessible to other users? Well, you can hide any drive/partition in Windows XP, NT, and 2000. That means that they won't show up in Explorer or My Computer.

If you want access to that drive from your user account you should create a desktop shortcut before proceeding. Once hidden, you can still access by typing the drive letter and a colon in Start/Run—for example, "D:" will bring up a folder of the contents on your D drive.

The easiest way with Win XP is to use the TweakUI power toy from Mcft. Go to Start/Run and type in "tweakui" (without the quotes).

Go to My Computer/Drives and uncheck the drive/partition(s) you want hidden. Click "Apply" or "OK" when finished.

If you have XP but not Tweak UI you can download it here...
http://www.Mcft.com/windowsxp/downloads/powertoys/xppowertoys.mspx

For Win NT, 2000, and XP you can use the following Registry edit:

*Be sure to back up the Registry before proceeding
http://www.worldstart.com/tips/tips.php/401

Open the Registry Editor by going to Start/Run and typing in "regedit" (without the quotes). Find your way to...

HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVersion\Policies

Click on "Explorer".

Double-click the "NoDrives" key in the right column. If you don't find a "NoDrives" registry key, just right-click in the right pane and choose "New/DWORD Value" then name the key "NoDrives".

You'll see a value like "0000 00 00 00 00". This is where the fun starts. The four sets of double zeros (after the "0000") are where you'll enter the values for the drive/partitions. Now, stay with me on this—it's not as complicated as it sounds:

The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.

The values for each drive are as follows:

1 - A I Q Y
2 - B J R Z
4 - C K S
8 - D L T
16 - E M U
32 - F N V
64 - G O W
80 - H P X

So, let's say you want to hide drive D. In the first column you would put "08". For drive K you would put "04" in the second column.

But what if you want to hide more than one drive in a column? Simply add the values together: D+E = 8+16 = 24. So in the first column you would put "24".

Still baffled? If you have XP then go get TweakUI and save yourself the math.

Whichever method you use, you can rest easy knowing that the files on that drive or partition are less accessible to other users.

Firefox_Tweak_Guide_4Power Users

Gxtechno Tags: , , , , ,

Extensions

Extensions in Firefox and Mozilla are add ons that give Mozilla/Firefox additional functionality. Some extentions include one that makes Firefox a pure tabbed browsing environment while others will be more familiar like the Firefox Googlebar which emulates the Google Toolbar for Internet Explorer. There is a good number of extensions of various functionality and scope that can be found at The Mozilla Update Page.

The Firefox Googlebar

Themes

For those who use applications like Winamp, Litestep, and WinBlinds, the concept of skins or themes should not be foreign. For the uninitiated, skins and themes allow the customization of the look and feel of Firefox. Themes can be found again on the Mozilla Update site under the Themes portion. For those that are willing to dabble a bit in creating their own theme, here is a good resource to get started.

Conclusions

Firefox is a cool product with a lot of potential. It upgrades browser functionality whereas Microsoft has left IE for dead stating that it is good enough in its current state. With the alarming number of security flaws in IE, Firefox should be looked at seriously as an alternative browser. While I have not yet migrated fully to Firefox, I do most of my browsing on it, I would say about 90%. This is coming from a former jaded Netscape user who switched to IE5 and never looked back till Firefox came around.
For the poweruser, Firefox is a pretty ideal browser. Being a no frills package it weighs in at under 10MB for the entire browser when the current trend in the industry is to get bigger. Firefox offers a lot of oppurtunities to fine tune the browser to the needs of the end user through from the backend all the way up to the visual style of the browser. For the more intrepid, the source code is also available to poke around at. A final note is that it is free. Give it a shot. At worst it will not be used and will take up only 10MB. At best it might save your computer from a trashing when you miss the bulletin for the next IE Critical Vulnerability. For most people, it will provide things that Microsoft has not yet got around to, such as tabbed browsing and pop up blocking. Choice is a good thing and Firefox is that one of those choices that is not as radical as a suggestion to switch to Linux but yet can improve the Internet experience.

Firefox Keyboard Shortcuts

Power users (lazy people) love keyboard shortcuts and we have a semi exhaustive list of the common ones here. The most important ones (in our opinion) are near the top while the more benign ones are closer to the bottom. If we have missed anything that you think is important be sure to let us know.
To use the keyboard shortcuts hold down CTRL and press one of the following:
T
Opens a new tab and takes the focus to the new tab
O
Open Local File. This is one of the biggest changes from IE where both Ctrl-O and Ctrl-L opened a dialogue box for a URL.
L
Changes focus to the Address bar
Tab
Scrolls through the tabs from current window towards the right. Loops back to the first tab when rightmost tab is reached
1..0
The numbers 1 to 0 takes the focus to Tab 1 to 10
N
Opens a new window like IE
W
a tab or if there are no tabs, close the window
B
Open bookmark sidepanel
D
Bookmark current page
H
Brings up the history dialogue box on the right. Useful if you closed a page accidentally and forgot the URL. Or to make sure your kids are not looking at pr0n
U
Show page source
Y
Open downloads window
K
Focus goes to search bar
Some of the more common shortcuts just for the heck of it.
R
Refresh current page
F
Find in page
G
Find Again (used in conjunction with Ctrl F)
J
Page Info (same as properties in IE)
-
Decrease font size
+
Increase font size
S
Save current page to disk
P
Print current page
A
Select All
A note about copy and pasting in Firefox; it is not integrated as closely as IE and the Office Suite for better or worse. For example copying the contents of a page directly in IE and pasting into Word for example keeps the formatting most of the time. Doing the same thing with Firefox results in plain text being copied over.
*edit An astute reader has pointed out another shortcut, "/" just the slash, not brackets which activates an incremental search; it will go to the first instance of the string that is typed in. Hit F3 to find again or hit ESC to cancel the search.
A more specific version of the incremental search is "'" which only finds links with the string entered.
*few more shortcuts as well as a small note - increasing the font size is the = and + key an would more correctly be CTRL =
F5 - refresh page
F6 - Same as CTRL-L, focus is taken to the address bar
CTRL Y - Open up the downloads window
CTRL K - Focus is taken to search bar

Speed up Firefox

Yes, Firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?
That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.
Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.
Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.
Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300
One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.
Now you should notice you’re loading pages MUCH faster now!

BURNING X-BOX & GAMECUBE GAMES USEING CDRWIN

Gxtechno Tags: , , ,

------------------------------------------------------
1) Insert your original in your CD-ROM.
2) Open CDRWin (or any other image extractor) to make an iso image of the game
on your hard disc. Click on 'Extract Disc/Tracks/Sectors'
3) Here are the settings which work for me (!):
Disc Image/Cue sheet
File-Format: Automatic
Reading-Options:
RAW, CD+G, CD-TEXT and MCN/USRC all Unchecked
Error Recovery: Ignore
Jitter Correction: Auto
Subcode Analyses: Fixed
Data-Speed: MAX
Read Retry Count: 10
Audio Speed: MAX
Subcode Threshold: 900
There are a lot of reports, that Raw reading also works, but I had problems with it enabled.
4) Click on 'Start'
--------------------------------------------------------------------------------
RECORDING TO A DISC
--------------------------------------------------------------------------------
1) Install Fireburner

2) Double click on the Cue File For The Game
3) Right Click And select burn To CD
That’s all there is record DAO, and you can try to burn it fast at 2X.

Using PNY Black Diamond CDR'

Monday, January 4, 2010

Free Internet Download Manager

New! New discounts. Get Internet Download Manager for a low price now!

New! Try Internet Download Manager 5.18 (Added support for Chinese, Japanese and other East Asian languages. Improved FLV grabber to save videos from web players on YouTube, Google Video, MySpace TV, and other popular sites)

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

Version 5.18 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

Windows 7

Top features

Curious about what’s new in Windows 7? Of the dozens and dozens of features, here are some we think you’ll especially like:

Snap Live Taskbar Previews HomeGroup
Snap Live Taskbar Previews HomeGroup
Instantly arrange two windows exactly side by side. Scan through open files to find just what you're looking for. Share files, music—even printers—in just four clicks.
Pin Windows Search
Pin Windows Search
Keep programs and files handy: pin them to the taskbar or Jump Lists. Search on your PC the same way you search on the Internet.

Other Features

Windows 7 simplifies everyday tasks

HomeGroup

HomeGroup

Takes the headache out of sharing files and printers on a home network.

Jump Lists

Jump Lists

Speedy access to your favorite pictures, songs, websites, and documents.

Snap

Snap

A quick (and fun!) new way to resize and compare windows on your desktop.

Windows Live Essentials

Windows Live Essentials

7 great programs, 1 free download. Mail, Movie Maker, Photo Gallery, and more.

Windows Search

Windows Search

Find virtually anything on your PC, instantly.

Windows Taskbar

Windows Taskbar

Better thumbnail previews, easier-to-see icons, and more ways to customize.

Windows 7 works the way you want

Full 64-bit support

Full 64-bit support

Windows 7 makes the most of powerful 64-bit PCs, the new desktop standard.

More personal

More personal

Redecorate your desktop with fun new themes, slide shows, or handy gadgets.

Performance improvements

Performance improvements

Designed to sleep and resume quicker, be less memory hungry, and spot USB devices faster.

Windows 7 makes new things possible

Play To

Play To

Play your media on other PCs, stereos, or TVs around the house.

Remote Media Streaming

Remote Media Streaming

Enjoy music and video on your home PC—even when you're not at home.

Windows Touch

Windows Touch

Pair Windows 7 with a touchscreen and you won't always need a keyboard or mouse.

Windows 7 price in India

windows-7
Windows 7 price in India

Microsoft’s latest operating system , Windows 7 , has been launched in India . It will replace the not-so-successful Windows Vista OS.The price in India of the new Windows 7 are around 40% less than the its US prices.

The prices of Windows 7 in India are:

  • Windows 7 Home Basic – Rs.5,899
  • Windows 7 Home Premium – Rs.6,799
  • Windows 7 Professional – Rs.11,199
  • Windows 7 Ultimate – Rs.11,799

Note:- These price for single user.

About Different Win7 Editions

Windows 7 Starter
The least-featured edition of Windows 7; the Windows Aero theme is not included, and it isn't available in a 64-bit variant. The desktop wallpaper, and Visual Style (Windows 7 Basic) is also not user-changeable, although third party software such as Stardock MyColors can allow these changes to be made. This edition is available pre-installed on computers through system integrators or computer manufacturers.
Windows 7 Home Basic
Windows 7 Home Basic is available in emerging markets such as Bangladesh, Brazil, People's Republic of China, India, Indonesia, Mexico, Pakistan, the Philippines, and Thailand. It is not available in countries such as Australia, Canada, France, Germany, Italy, Ireland, Japan, The Netherlands, New Zealand, Saudi Arabia, United Arab Emirates, the United Kingdom and the United States. Some Aero options are excluded along with several new features. Home Basic, along with other editions sold in emerging markets, include geographical activation restriction, which requires users to activate Windows within certain region or country.
Windows 7 Home Premium
This edition contains features aimed at the home market segment, such as Windows Media Center, Windows Aero and touch-screen controls.
Windows 7 Professional
This edition is targeted towards enthusiasts and small business users. It includes all the features of Windows 7 Home Premium, and adds the ability to participate in a Windows Server domain. Additional features include operating as a Remote Desktop server, location aware printing, Encrypting File System, Presentation Mode, Software Restriction Policies (but not the extra management features of AppLocker) and Windows XP Mode.
Windows 7 Enterprise
This edition targets the enterprise segment of the market and is sold through volume licensing to companies which have a Software Assurance contract with Microsoft. Additional features include support for Multilingual User Interface (MUI) packages, BitLocker Drive Encryption, and UNIX application support. Not available through retail or OEM channels, this edition is distributed through Microsoft Software Assurance (SA). As a result it includes several SA-only benefits, including a license allowing the running of multiple virtual machines, and activation via VLK.
Windows 7 Ultimate
Windows 7 Ultimate contains the same features as Windows 7 Enterprise, but unlike that edition it is available to home users on an individual license basis. Windows 7 Home Premium and Windows 7 Professional users are able to upgrade to Windows 7 Ultimate for a fee using Windows Anytime Upgrade if they wish to do so. Unlike Windows Vista Ultimate, the Windows 7 Ultimate edition does not include the Windows Ultimate Extras feature or any exclusive features.

Upgrade

It's possible to use the Product Key from a Standard upgrade edition to accomplish an in-place upgrade (e.g. Home Premium to Ultimate).

  • Starter to Home Premium.
  • Home Premium to Professional.
  • Professional to Ultimate.
  • Home Premium to Ultimate.

Search This Blog