We all know how to search on Google. But not many of us know the tips and tricks that can make Google searches better and in easier on Google. Having an alternative to something as useful and vast as Google can help us anytime, anywhere. We bring you eight alternative ways to search the most searched engine:
Friday, July 29, 2011
7 Google tricks you didn’t know about
Saturday, July 23, 2011
Essential add-ons for Twitter and Facebook
Facebook is the world’s number one social networking website with over 400 million active users worldwide. Similarly, Twitter is a leading micro-blogging social website, where users can send and read messages called as tweets, consists of upto 140 characters. Recently, Twitter has achieved yet another milestone by reaching 10 billion "tweets."
Today, people are actively using these mediums to connect socially with their friends, reaching new markets and also for promoting their business profiles. Users love to play games on the Facebook like FarmVille, Mafia Wars, and also create their company’s social profile to promote or make the followers on its home page.
However, the two websites cannot be accepted as perfect product. Users seek that Facebook should bring some updates so that people can hide FarmVille or certain status updates. Similarly, there would be demand for new features in the Twitter.
Here are some add-ons for Facebook and Twitter, which can solve common user problems. But, it should be noted that these add-ons require you to download Greasemonkey and many are not compatible with every web browser.
Add-ons for Facebook:
1. Facebook Fixer: It is one of the extensions for the Google Chrome web browser that improves the user experience on Facebook extensively. The add-on provides various features that include larger profile & album pictures, homepage customization, suggestions & "connect with friends," and calendar integration. Further, you can also sync birthdays with Google Calendar.
2. Facebook Purity: It removes various annoying quiz and app messages like "became friend with", "became a fan", "joined a group" from users’ Facebook homepage. Further, it clears all newsfeeds from the third-party games such as Mafia Wars and FarmVille. You will also have the option for blocking pictures, albums or comments on a status.
3. Unfriend Finder: It is a realtime script that allows you to know that which of your friend removes you on Facebook. It also tells that the persons who deactivate their account.
4. No Facebook Ads: It removes Facebook Flyer, Network, Bumper and other adverts from your Facebook account. The app lets users to clean their homepage.
Add-ons for Twitter:
1. TinyURL Decoder: Today, various URL shorteners save space on Twitter, but users can reach to risky/spam laden messages by clicking those URLs. However, the add-on decodes the shortened URLs on Twitter's website and shows the real URL, so that you have the choice to click or not to click.
2. Nested Twitter Replies: If you want to follow a conversation on Twitter, it will be confusing as the website offers you to view @replies in a list. However, the script systematically shows messages in a nested conversation format.
3. @Troynt's Twitter Script: This script helps users to do various tasks like Nested Replies, Custom Search Tabs, Autocomplete, Pagination, RT button, Media Embed, URL Expansion, Hash Tag Search Links, and Social Links.
4. Twitter Old Style RT Emulator: This add-on works only in Safari and Firefox and convert all retweet symbols and user pictures into RT @username.
Today, people are actively using these mediums to connect socially with their friends, reaching new markets and also for promoting their business profiles. Users love to play games on the Facebook like FarmVille, Mafia Wars, and also create their company’s social profile to promote or make the followers on its home page.
However, the two websites cannot be accepted as perfect product. Users seek that Facebook should bring some updates so that people can hide FarmVille or certain status updates. Similarly, there would be demand for new features in the Twitter.
Here are some add-ons for Facebook and Twitter, which can solve common user problems. But, it should be noted that these add-ons require you to download Greasemonkey and many are not compatible with every web browser.
Add-ons for Facebook:
1. Facebook Fixer: It is one of the extensions for the Google Chrome web browser that improves the user experience on Facebook extensively. The add-on provides various features that include larger profile & album pictures, homepage customization, suggestions & "connect with friends," and calendar integration. Further, you can also sync birthdays with Google Calendar.
2. Facebook Purity: It removes various annoying quiz and app messages like "became friend with", "became a fan", "joined a group" from users’ Facebook homepage. Further, it clears all newsfeeds from the third-party games such as Mafia Wars and FarmVille. You will also have the option for blocking pictures, albums or comments on a status.
3. Unfriend Finder: It is a realtime script that allows you to know that which of your friend removes you on Facebook. It also tells that the persons who deactivate their account.
4. No Facebook Ads: It removes Facebook Flyer, Network, Bumper and other adverts from your Facebook account. The app lets users to clean their homepage.
Add-ons for Twitter:
1. TinyURL Decoder: Today, various URL shorteners save space on Twitter, but users can reach to risky/spam laden messages by clicking those URLs. However, the add-on decodes the shortened URLs on Twitter's website and shows the real URL, so that you have the choice to click or not to click.
2. Nested Twitter Replies: If you want to follow a conversation on Twitter, it will be confusing as the website offers you to view @replies in a list. However, the script systematically shows messages in a nested conversation format.
3. @Troynt's Twitter Script: This script helps users to do various tasks like Nested Replies, Custom Search Tabs, Autocomplete, Pagination, RT button, Media Embed, URL Expansion, Hash Tag Search Links, and Social Links.
4. Twitter Old Style RT Emulator: This add-on works only in Safari and Firefox and convert all retweet symbols and user pictures into RT @username.
Friday, July 22, 2011
How Cloud Computing can benefit business?
The IT world is abuzz with regular updates about cloud computing. Apart from benefiting the enterprise IT departments, it's an absolute blessing to the small and mid-size companies.
Indeed, it is being stated that Cloud Computing is a boon to SMBs and SMEs instead large enterprises since the later ones are capable enough to invest largely in IT infrastructure. While small businesses are treading on the path to growth and profitability. Significance of Cloud computing can never be overlooked.
Adoption Rate for Cloud Computing:
Cloud computing has been largely leveraged towards managing applications and realigning workforce to some more profitable and productive activities. It helps the enterprises to assess their goals and objectives while allowing them to escape from mundane operational tasks.
It is estimated that in some cases between 80 to 90 per cent of a firm's infrastructure and applications are hosted off-site, including email, phone, CRM and other functions. The technology allows the companies to enjoy an edge over their rivals; while lowering down the operational costs.
Four key areas where cloud computing spell boost for the business are:
1. Many businesses have started franchising and they want their franchisees up and profitable as immediate as possible. So spending time or money on building up the infrastructure, would take most of the revenue in the beginning itself. Here cloud computing plays a crucial role. It just takes an hour with a hosted provider managed centrally at a company’s headquarters. That means days of work could be done in minutes thereby leaving lot of time and money to invest on innovation.
2. For the success of a business, mobility plays a key role. And with cloud computing, owners and staff can access key applications from anywhere and most importantly from any device like smartphones or tablets. It gives the liberty to small business owners to move out and pitch some new clients. One can still manage the office despite being physically present.
3. Cloud applications also keep tab on the fuel costs. As many employees drive between several customer sites, heaving gas prices could affect the company's bottom line. A mixture of appointment scheduling, geocoding, driver routing and other strategies has led to a company-wide 50% reduction in miles driven. All of that data is managed centrally in the cloud.
4. The fourth key area allows businesses to operate with a lean-and-mean IT team. Cloud computing minimizes the internal IT needs thereby reducing the headcounts. In fact, they can realign their workforce towards new strategies and technologies, instead investing largely on maintenance and support.
With globalization and mobility being the two integral aspects of any business scenario, the advent and adoption of such technologies help owners run their businesses more efficiently and profitably.
Indeed, it is being stated that Cloud Computing is a boon to SMBs and SMEs instead large enterprises since the later ones are capable enough to invest largely in IT infrastructure. While small businesses are treading on the path to growth and profitability. Significance of Cloud computing can never be overlooked.
Adoption Rate for Cloud Computing:
Cloud computing has been largely leveraged towards managing applications and realigning workforce to some more profitable and productive activities. It helps the enterprises to assess their goals and objectives while allowing them to escape from mundane operational tasks.
It is estimated that in some cases between 80 to 90 per cent of a firm's infrastructure and applications are hosted off-site, including email, phone, CRM and other functions. The technology allows the companies to enjoy an edge over their rivals; while lowering down the operational costs.
Four key areas where cloud computing spell boost for the business are:
1. Many businesses have started franchising and they want their franchisees up and profitable as immediate as possible. So spending time or money on building up the infrastructure, would take most of the revenue in the beginning itself. Here cloud computing plays a crucial role. It just takes an hour with a hosted provider managed centrally at a company’s headquarters. That means days of work could be done in minutes thereby leaving lot of time and money to invest on innovation.
2. For the success of a business, mobility plays a key role. And with cloud computing, owners and staff can access key applications from anywhere and most importantly from any device like smartphones or tablets. It gives the liberty to small business owners to move out and pitch some new clients. One can still manage the office despite being physically present.
3. Cloud applications also keep tab on the fuel costs. As many employees drive between several customer sites, heaving gas prices could affect the company's bottom line. A mixture of appointment scheduling, geocoding, driver routing and other strategies has led to a company-wide 50% reduction in miles driven. All of that data is managed centrally in the cloud.
4. The fourth key area allows businesses to operate with a lean-and-mean IT team. Cloud computing minimizes the internal IT needs thereby reducing the headcounts. In fact, they can realign their workforce towards new strategies and technologies, instead investing largely on maintenance and support.
With globalization and mobility being the two integral aspects of any business scenario, the advent and adoption of such technologies help owners run their businesses more efficiently and profitably.
Managing Internet, the secure way
With an increase on the internet traffic, there is an increase towards compromising of security as well. Today, there is a growing concern about the way internet security is being treated. The nature of the web, global access, ease of connectivity and interaction, and lack of true client control
creates an environment where application misuse or abuse can create serious issues for an organisation. As such, almost any discussion of web applications and data integration quickly becomes a discussion of security. Web application developers must fully understand the security risks in order to address the legitimate concerns, while ignoring the hype.
If we look at the overall security scenario, web application security risks fall into three major categories of Snooping and Eavesdropping, User impersonation and Unauthorized access.
Eavesdropping
It is roughly defined as the risk of having someone “overhear” data being sent over the Web is a primary concern when sending confidential data, such as credit-card information, over public connections.
On routed IP networks like the Internet data moves in the form of packets and it is relatively difficult to eavesdrop on specific connections without having privileged access to the local ISP routers. Communications packets of any given message could be sent over completely different routes to get from the sender to the receiver, rendering the coherent snooping of the ransmission nearly impossible.
The risk of “packet sniffing” is still there, however, especially in Local Area Network (LAN) settings.
What is User Impersonation?
There is a big risk of non-trusted users gaining access to secure information by impersonating trusted users. User authentication is the foundation of Internet based application security, and inadequate authentication leaves applications vulnerable to attack.
Unauthorized Access
This is defined as the risk of exposing sensitive information to unauthorized users is the biggest and most complex security risk, because the Internet effectively links every computer to one large network. While completely allowing or disallowing access to a given system or data source remains relatively straightforward, partial access remains risky. At the same time, access to distributed systems is what makes the Internet a valuable business tool.
Trends in the Market
Every Internet based application needs to address these basic security concerns. Over the past few years, several technologies and techniques have evolved as standard mechanisms with which to secure web applications.
HTTP data is often transmitted over open lines, shared data channels, and public access providers. If electronic snoops were to “eavesdrop” on this connection they would be able to copy every byte of data transmitted. While not a common occurrence, this kind of theft is technically possible, making this a legitimate concern, particularly for sensitive data such as credit-card information.
Data encryption is a mechanism used to prevent data from being stolen in-transit between the client and server machines. Electronic thieves can still grab the data being transmitted, but they will find it useless in its encrypted state.
The most common form of data encryption used by web-based applications is Secure Sockets Layer (SSL). SSL is a security protocol that provides Internet application protocols (like HTTP) with data encryption using public key cryptography.
Most web servers support SSL, allowing administrators to install a private key that is used to decrypt inbound data and encrypt outbound data. Once installed, the web server automatically encrypts or decrypts data as it is received or transmitted.
creates an environment where application misuse or abuse can create serious issues for an organisation. As such, almost any discussion of web applications and data integration quickly becomes a discussion of security. Web application developers must fully understand the security risks in order to address the legitimate concerns, while ignoring the hype.
If we look at the overall security scenario, web application security risks fall into three major categories of Snooping and Eavesdropping, User impersonation and Unauthorized access.
Eavesdropping
It is roughly defined as the risk of having someone “overhear” data being sent over the Web is a primary concern when sending confidential data, such as credit-card information, over public connections.
On routed IP networks like the Internet data moves in the form of packets and it is relatively difficult to eavesdrop on specific connections without having privileged access to the local ISP routers. Communications packets of any given message could be sent over completely different routes to get from the sender to the receiver, rendering the coherent snooping of the ransmission nearly impossible.
The risk of “packet sniffing” is still there, however, especially in Local Area Network (LAN) settings.
What is User Impersonation?
There is a big risk of non-trusted users gaining access to secure information by impersonating trusted users. User authentication is the foundation of Internet based application security, and inadequate authentication leaves applications vulnerable to attack.
Unauthorized Access
This is defined as the risk of exposing sensitive information to unauthorized users is the biggest and most complex security risk, because the Internet effectively links every computer to one large network. While completely allowing or disallowing access to a given system or data source remains relatively straightforward, partial access remains risky. At the same time, access to distributed systems is what makes the Internet a valuable business tool.
Trends in the Market
Every Internet based application needs to address these basic security concerns. Over the past few years, several technologies and techniques have evolved as standard mechanisms with which to secure web applications.
HTTP data is often transmitted over open lines, shared data channels, and public access providers. If electronic snoops were to “eavesdrop” on this connection they would be able to copy every byte of data transmitted. While not a common occurrence, this kind of theft is technically possible, making this a legitimate concern, particularly for sensitive data such as credit-card information.
Data encryption is a mechanism used to prevent data from being stolen in-transit between the client and server machines. Electronic thieves can still grab the data being transmitted, but they will find it useless in its encrypted state.
The most common form of data encryption used by web-based applications is Secure Sockets Layer (SSL). SSL is a security protocol that provides Internet application protocols (like HTTP) with data encryption using public key cryptography.
Most web servers support SSL, allowing administrators to install a private key that is used to decrypt inbound data and encrypt outbound data. Once installed, the web server automatically encrypts or decrypts data as it is received or transmitted.
Thursday, July 21, 2011
For your eyes only
Looking good may be high on your priority list but make sure your eyes don't give you away.
Looking fashionable is not just about a healthy skin and body, your eyes also play an important role in helping you look good. We believe in caring for our bodies but very often neglect the eyes. These windows to your soul also need your attention to stay beautiful. Tired or unwell eyes can completely ruin your looks. Harsh sunlight and dust and grime are the reasons for swollen eyes. Monsoon increases the chances of infections, polluted rainwater can discolour eyes, and even not eating right can cause problems.
Suggestions
Protect your eyes while working: It's important to protect your eyes from injury, foreign particles and strain. Wear protective eyewear when playing games or while engaging in outdoor activities. Many eye care providers and sports goods stores sell protective eyewear. Employers are required to provide a safe work environment. When protective eyewear is required as a part of your job, make a habit of wearing the appropriate type at all times.
Wear Sunglasses: Sunglasses can not only give you that awesome style statement, but also protect your eyes from the sun's ultraviolet rays. When purchasing sunglasses, look for ones that block out 99 to 100 per cent of both UV-A and UV-B radiation and wear them even on cloudy days
Don't smoke: Research has linked smoking to an increased risk of developing age-related macular degeneration, cataract, and optic nerve damage, all of which can lead to blindness, so kick that butt for good.
Clean your hands: To avoid the risk of infection, always wash your hands thoroughly after working or engaging in outdoor activities. Direct eye contact of infected hands is a leading cause for many eye infections. Clean your hands before putting in or taking out your contact lenses. Clean your hands after any outdoor or messy activity.
Watch your weight: Being obese increases your risk of developing diabetes and other systemic conditions, this can lead to vision loss, such as diabetic eye disease or glaucoma. If you are having trouble maintaining a healthy weight, take the help of professionals and consult your physician.
Know your family's medical history: Certain illnesses are hereditary and signs for them have to be watched for at an early stage. Talk to your family members about their eye health history. It's important to know if anyone has been diagnosed with a disease or condition that can be hereditary. This will help to determine if you are at higher risk for developing an eye disease or condition in the future.
Visit your doctor frequently: Regular checks can go a long way in maintaining a healthy eye. Visit your doctor regularly and get a comprehensive dilated eye examination. When it comes to common vision problems, many people don't realise they could see better with glasses or contact lenses. Besides, eye conditions like glaucoma and age related degeneration can be caught early with a dilated eye exam and treatments can be started to cure or control the condition.
Balanced diet
You've heard carrots are good for your eyes. But eating a diet rich in fruits and vegetables, particularly dark leafy greens such as spinach is important for keeping your eyes healthy too. Research has also shown there are eye health benefits from eating fish high in omega-3 fatty acids, such as salmon and tuna.
Regular rest
Your eyes get strained when working or reading for long hours. If you spend a lot of time at the computer or on focusing on a particular object for long hours, you sometimes forget to blink and your eyes can get fatigued. The 20-20-20 rule is very beneficial in these situations: Every 20 minutes, look away about 20 feet in front of you for 20 seconds. This can help reduce eyestrain to a great extent.
Dr.B.S.R.MURTHY is a Chief Medical Officer & Consultant Ophthalmologist, Vasan Eye Care Hospital.
Ginger can help reduce side-effects of chemotherapy: doctors
Doctors at AIIMS are now working upon an herbal way to help cancer patients cope with the side-effects of chemotherapy.
Oncologists at the hospital here have been experimenting with ginger root powder in order to reduce the severity of the chemotherapy induced nausea vomiting (CINV).
Nausea and vomiting are the major side effects that a cancer patient encounters after chemotherapy treatment.
“The severity of chemotherapy induced nausea vomiting was reduced by ginger, our experiments showed. After the success of the study, we can say that there is a need to have ginger root powder available as capsules in varied dosages in order to use it as an add-on therapy in patients receiving chemotherapy with high vomiting potential,” said Dr Sameer Bakhshi, additional professor, department of medical oncology, AIIMS.
A total of 60 patients, between the age categories of eight to 21 years were randomly selected for the study.
“It was a double-blind randomised single institutional study carried out at our centre in 2009. Neither the patient nor the interviewer with the patients knew about the patient being administered with the dosage of ginger root powder,” Dr. Bakhshi, who led the study, said.
He said that dosages were administered according to the weight of the person. While those who weighed between 20kg to 40 kg were given 167 mg of ginger root powder capsules, those in the weight category of 40kg to 60kg were given 400 mg. Six capsules were given at different time intervals after start of chemotherpy infusion.
“Even though ginger root powder was effective in reducing the severity of acute and delayed CINV, it did not eliminate them completely. The capsules were well tolerated by the children and young adults in our study and there was no side effect,” he said.
The work has been published in the international journal of Pediatric Blood and Cancer.
Wednesday, July 20, 2011
8 easy tips to avoid cellphone radiation
If you are worried about recent revelations about cell phone radiation by the WHO, do not despair. There are a number of ways in which you can safeguard yourself to to a large extent. According to well-known American non-government organization Environmental Working Group, or EWS, cellphone users can follow these tips to reduce the risk of exposure to cancerous electro-magnetic rays that cellphones may be emitting.
1.Buy a low-radiation phone
Always try to look up buyers' guide or Internet, or seek experts' advise to know about the radiation levels of your phone, or the model you intend to buy. Most phones' model numbers are printed under the battery. Consider replacing your phone with one that emits the lowest radiation possible and still meets your communication needs.
2.Use a headset or speaker
Headsets - whether Bluetooth or wired - emit much less radiation than phones. Choose either wired or wireless according to convenience and your needs.However, it is not advisable to continuously wear the headsets above the ears as most Bluetooth headsets emit continuous, low-level radiation. So take it off your ear when you're not on a call. Using your phone in speaker mode also minimises radiation to the head.
3.Poor signal? Stay away from phone
Fewer signal bars on your phone means that it emits much higher radiation to get the signal to the tower. Make and take calls when your phone has a strong signal, instead of incessantly using it and cursing your mobile operator. Remember, it is your brain that will be getting fried due to poor signal!
4.Skip the radiation shield
Radiation shields such as antenna caps or keypad covers reduce the connection quality and force the phone to transmit at a much higher power with higher radiation. So while they may be protecting your phone, it is at the cost of your own health.
5.Limit children's phone use
Young children's brains absorb twice as much cell phone radiation as those of adults. Along with health agencies in at least 6 countries, EWG has recommended parents to set up limits for children's cell phone use, such as for emergency situations only. They may be encouraged to either make short, sweet conversations, or use the good, old landline phones.
6.Listen more, talk less
Cellphones emit maximum radiation when you talk or text, but not when you're receiving messages or listening. Hence, the age-old saying of listening more and talking less can come in handy here in reducing your exposure level.
7.Hold phone away from body
Hold the phone away from your torso when you're talking (with headset or speaker), not against your ear, in a pocket, or on your belt where soft body tissues continuously absorb radiation. Even while sleeping, avoid keeping it under the pillow or next to you. It should ideally be kept a few feet away even if you want to keep it handy just in case the President or the Prime Minister decide to call upon you in the dead of night.
8.Choose texting over talking
Phones use less power (and hence less radiation) to send out text than voice communication. And unlike when you speak with the phone placed next to your ear, texting keeps radiation away from your head.
Tuesday, July 19, 2011
SOCIAL NETWORKING: IS YOUR CHILD AN ADDICT?
From being just a fad, Facebook has grown to the point where users are being afflicted with FAD (Facebook Addiction Disorder). And children are as vulnerable as adults.
By PRIYANKA TILVE
A standard nine student of a reputed city school had to miss a term because he was in depression. He would make up excuses to miss school, grew listless and would spend a lot of time locked up in his room. Concerned by his behavior, his parents took him to a psychologist and that’s when he divulged the cause of his angst. They found out that his depression was not due to academics, but because his friends from school had taken to teasing him about his weight on a social networking site. After sessions of counseling, coupled with intervention on the part of the school teachers, he finally came out of his depression.
A matter of great concern was that he was targeted on a social networking site, which is a public forum. This is not a one-off occurrence; many such incidents have come to light in recent years on social networking sites, and looking at the ever increasing number of kids signing up at social networking sites, it will be a serious issue in the coming years.
The ‘The New Generations 2011 Study’ conducted by television channel Cartoon Network revealed that 22 percent the kids today have access to the computer and the Internet; more than ever before. The study further revealed that 45 percent of kids went online to search for information; 26 percent for email; 23 percent for homework; and 19 percent for social networking. Amongst those who visited social networks, Facebook topped the popularity list with 93 percent, followed by Orkut at 50 percent. What makes the results interesting is that the kids surveyed for the study were between ages 7 and 14, while the minimum required age for registration on most social networking sites is 13. This means that most of the 19 percent of kids accessing social networks are not supposed to be on these sites.
Kids and Social Networking
There are many reasons why teenagers may take to social networking sites, but Varkha Chulani, a prominent psychologist, says that there is an underlying emotional condition that you need to look at. She says, “What we need to look at is whether this is an escape that the child is using for the fear of being rejected in the real world, which makes him turn to the computer to be able to say what he wants to say. Many teenagers do not have the confidence to be able to go out in the real world and manage real affairs with real people. So the computer and the social network become a safe ground for them to target their enemies or people with whom they can’t get even with or people they can’t talk back to in real life situations. So often this is an escape, and in a way a very protective mechanism, to help the person express what he wants to. Some of us don’t have the courage to say what we want to say, so through social networking sites, we get this false confidence to speak because the ramifications are not face-to-face but in writing. This doesn’t carry the same impact as it would if somebody directly told you something in reaction to a comment you made.”
Cybermum is a part of McAfee’s initiative to help parents deal with issues related to the cyberworld. Anindita Mishra, a Cybermum, says that parents need to come to terms with this unfortunate reality with social networking becoming a way of life for most kids and teenagers. “Since social networking sites allow users to indulge in activities like link sharing, status updates and instant messaging, kids find them more useful as they consume less time. While it is not recommended for kids under 13 to be on social networking sites, there are cases of many kids that even lie about their age to become active on such sites,” she says.
The fact that parents are themselves hooked on to these sites and rarely supervise their kid’s online behavior only makes matters worse. Varkha says, “I think the computer and the Internet is being used to unhealthy disadvantages. It is not the Internet or the computer itself, but the lack of control that the parents exercise on their children that is to blame. There is just no supervision, discipline or any sort of expectations that the parents voice to the kids. As a result, kids are doing as they please and getting addicted to gaming sites, social networks, etc.”
Take Precautions
While there is no way to keep your children away from social networking sites, supervision is essential. Parents must supervise their children’s online activities and set a limit to their Internet time. More importantly, you have to set a good example for your children to follow. You cannot expect your kids to not spend time on the Internet when they see you constantly texting or glued to a computer screen. Anindita says, “Parents need to come to terms with this unfortunate reality with social networking becoming a way of life for most kids and teenagers. However, the solution is not to forbid children from using the Internet because they can easily access it even in their parents’ absence through school computers, Internet cafes and friends’ mobile phones. Instead, parents must play a proactive role and ensure that their children are not made victims in cyberspace. They must note that an active cyber identity brings with it a host of dangers ranging from malware attacks to more grave ones such as cyber bullying, cyber stalking, sharing of unnecessary or confidential information with online strangers, etc.”
From Fad to FAD
It’s almost become imperative to have an account on social networking sites and Facebook is by far the most popular. While being on a social networking site in itself is not a bad thing, the growing obsession with it is. Children and teenagers are a vulnerable bunch as their actions are dictated by their peers. There is a need to fit in and belong. You will find that they obsess over their display pictures, status updates, number of friends, likes, groups, pages, etc. to the point where the virtual world may take precedence over the real one.
American psychologists have coined the term FAD (Facebook Addiction Disorder) to explain such behavior. How does one identify FAD? Very simple; the first thing these people will do when given a computer is log on to Facebook. They constantly update their status messages, often multiple times in a day, and sometimes even with inconsequential updates like ‘Good Morning’ or ‘Good Night’. When they are out, they will take pictures and will immediately upload them on to Facebook. They will grow restless when they are not able to access their account. What will also set them apart are the mood swings that are caused by negative or positive comments on their profiles.
This addiction to social networking sites is similar to drug addiction, as it triggers the same response. Varkha says, “The only difference is that drugs create a disadvantage to the body, whereas the disadvantages that arise from social networks are mostly in terms of lack of sleep, attention deficit disorder, distractibility, etc. So the physiological manifestations don’t come in the way drugs would cause them, but there are different kinds of manifestations that would come from addiction to the social networking sites.” So if you find that your child is addicted to social networking sites, then it’s important that you seek professional help. Therapy sessions educating them about better ways of communication and interaction, and encouraging social activities will help them get rid of the addiction.
Google+ privacy: 5 things to know
Google’s mint fresh social networking site, Google+ has been the talk of the town. It has created a buzz in social media circles and among tech experts.
While Facebook has carved a huge leadership position for itself, a lot of attention has now turned to Google+ and it will be interesting to see the competition between the two even as Google feverishly works to improve the product.
Their battle apart, privacy will continue to remain a huge concern for a large number of users of both networks. Specially for those who like to keep things restricted to a small group of their social contacts.
Much has been talked about Facebook's privacy controls and settings. Let us see where does Google+ figure on this count.
1.How to block someone on Google+ from mailing you.
Google+ allows anyone to send a mail to a person. This might give rise to the problem of spam and unwanted emails. If you do not want such a scenario, the first step would be to uncheck the box that enables this feature. Also, if you want some people to be able to keep mailing you, then you can click on the drop-down menu and select only those who can have this access.
2.How to prevent someone from re-sharing your posts on Google+
Those using Google+ will have seen that posts or links can be re-shared. You can post a link or write an update and choose the friends you want to share it with. Your friends in turn have the option of re-sharing these posts with their own circles and friends.
However, this action of re-sharing can be prevented. Here’s how: once you have shared your post or link, click on the drop- down menu towards left and select ‘disable re-share.’ Using the same drop-down menu, three more settings can be changed, namely editing a post, deleting a post and disabling comments.
3.How to disable email notifications on Google+
Do not want to receive an email or SMS every time a friend tags you in a photo, comments on one of your posts or adds you to a circle? Go to ‘Google+ Settings’ in the gear icon on the top right of the Google+ page.
Click on ‘Google+ tab’ on the left of the page and you will be able to see which emails you are currently receiving. Uncheck those boxes on which you do not want to receive a notification.
4.How to transfer Google+ data to your computer.
Data can be transferred from your Google+ account to your computer. The same applies to your personal Picasa Web Album, Google profile, Google Buzz data, stream activities and Google contacts.
The steps to this are: highlight your full name or email address in Google+ bar and click on ‘account settings’. Then select ‘data liberation.’ After this you can either click ‘download your data’ or select a specific service.
4.How to opt out of Google+
If at any given point of time, you want to quit Google+ you can do either of these two things:
a) You can change your profile visibility settings. This will only show your name and photo to everyone. Through this setting, only the content that you have shared with people will be available to them. It will let you hide the content on your profile. To activate this setting, click on ‘profile’ and then click on ‘Edit Profile.’ Choose the ‘About’ tab. Next, click on those sections that you want to hide and save them.
b) Another option is that you can delete your Google+ account without losing access to other Google services such as Gmail or Picasa Web Albums. For this option you need to highlight your name or email address in Google+ bar. Click ‘Account Settings’ and then go to ‘Account Overview.’ Next, click on ‘Delete profile and remove associated social features.’
Monday, July 18, 2011
Why going 'veg' is good for you
Detoxifies: A veggie diet contains dietary fibre (bottle gourd, pumpkins, spinach, cabbages), which flushes toxins out of the body. A diet containing only eggs, fish and mutton is a poor source of fibre.
Stronger bones: Gorging on meat can lead to protein overload. This can tax our kidneys, interfere with the absorption of calcium and prompt the body to extract existing calcium from the bones. Such calcium excretion is rare amongst vegetarians.
Carb deficiencies: A non-vegetarian diet is a poor source of carbohydrates. Carb-deficiency can lead to ketosis - a condition where the body starts breaking down fat (instead of carbs) as a source of energy.
Easy digestion: Complex carbohydrates in vegetarian foods are digested gradually providing a steady source of glucose. Conversely, meats rich in fat and proteins are difficult to digest.
Healthy skin: Eating beetroot, tomato, pumpkin and bitter gourd can clear off blemishes. And guava, apples, pears and peaches, eaten along with their peel, promise a glowing complexion.
Weight management: Avoiding meat is the simplest way to reduce fat intake. Instead, eating whole grains, legumes, vegetables, nuts, and fruits, lowers cholesterol levels, blood pressure, and obesity.
Easy on the teeth: Our molars are more suitable for grinding grains and vegetables than tearing flesh. Digestion begins with the saliva, which can only digest complex carbohydrates present in plant foods.
Phyto nutrients: Diabetes, cancer, kidney disease, stroke and bone loss are partially preventable with a good intake of phytonurtients. As these are present only in vegetarian diet, the non-vegetarians are at a loss.
Stronger bones: Gorging on meat can lead to protein overload. This can tax our kidneys, interfere with the absorption of calcium and prompt the body to extract existing calcium from the bones. Such calcium excretion is rare amongst vegetarians.
Carb deficiencies: A non-vegetarian diet is a poor source of carbohydrates. Carb-deficiency can lead to ketosis - a condition where the body starts breaking down fat (instead of carbs) as a source of energy.
Easy digestion: Complex carbohydrates in vegetarian foods are digested gradually providing a steady source of glucose. Conversely, meats rich in fat and proteins are difficult to digest.
Healthy skin: Eating beetroot, tomato, pumpkin and bitter gourd can clear off blemishes. And guava, apples, pears and peaches, eaten along with their peel, promise a glowing complexion.
Weight management: Avoiding meat is the simplest way to reduce fat intake. Instead, eating whole grains, legumes, vegetables, nuts, and fruits, lowers cholesterol levels, blood pressure, and obesity.
Easy on the teeth: Our molars are more suitable for grinding grains and vegetables than tearing flesh. Digestion begins with the saliva, which can only digest complex carbohydrates present in plant foods.
Phyto nutrients: Diabetes, cancer, kidney disease, stroke and bone loss are partially preventable with a good intake of phytonurtients. As these are present only in vegetarian diet, the non-vegetarians are at a loss.
Veggie delight (Getty Images)
Friday, July 15, 2011
Take tea without milk for weight loss
Beware, especially if you want to lose weight - don't add milk to tea, or you would pile on the pounds.
Scientists have discovered that tea contains high levels of compounds that help reduce the amount of fat but proteins found in cows' milk neutralise this fat-fighting ability.
New research has shown that the compounds, called theaflavins and thearubigins, prevent obesity when given to rats that were also on a high-fat diet.
Researchers now believe this could explain why people in Britain appear not to benefit from the healthy affects of tea despite being among the world's biggest consumers of the beverage, the Telegraph reports.
Devajit Borthakur, a scientist at the Tea Research Association at Jorhat in the Indian state of Assam, said: "When tea is taken with milk, theaflavins and thearubigins form complexes with the milk protein, which causes them to precipitate."
"It means that we don't get the health benefit from these compounds nor from milk protein. Therefore, it is always advised to take tea without milk."
A study by scientists in Japan, reveals that extracts from tea leaves inhibit the absorption of fat in the guts of rats being fed high-fat diet.
These rats also had less fat tissue on their bodies and lower fat content in their livers, reports the Journal of Nutrition.
Hiroaki Yajima, a scientist with the Kirin Beverage Company in Japan who carried out the Japanese research, said: "Black tea extracts may prevent diet-induced obesity by inhibiting intestinal lipid absorption."
Scientists have discovered that tea contains high levels of compounds that help reduce the amount of fat but proteins found in cows' milk neutralise this fat-fighting ability.
New research has shown that the compounds, called theaflavins and thearubigins, prevent obesity when given to rats that were also on a high-fat diet.
Researchers now believe this could explain why people in Britain appear not to benefit from the healthy affects of tea despite being among the world's biggest consumers of the beverage, the Telegraph reports.
Devajit Borthakur, a scientist at the Tea Research Association at Jorhat in the Indian state of Assam, said: "When tea is taken with milk, theaflavins and thearubigins form complexes with the milk protein, which causes them to precipitate."
"It means that we don't get the health benefit from these compounds nor from milk protein. Therefore, it is always advised to take tea without milk."
A study by scientists in Japan, reveals that extracts from tea leaves inhibit the absorption of fat in the guts of rats being fed high-fat diet.
These rats also had less fat tissue on their bodies and lower fat content in their livers, reports the Journal of Nutrition.
Hiroaki Yajima, a scientist with the Kirin Beverage Company in Japan who carried out the Japanese research, said: "Black tea extracts may prevent diet-induced obesity by inhibiting intestinal lipid absorption."
Nandi Hills Journey (10/07/2011)
NANDI
HILLS:
|
Nandi Hills, a solid monolithic mass of granite and the best
scenic hill station in the vicinity of Bangalore (60 Km away). Its height is
about 4,851 feet above MSL and acquires an area of 97 acres.
Nandi Hills is the birth place of rivers Arkavathi and Palar.
The temperature range at Nandi Hills is about 25 to 28 Degree Celsius during
summer and 8 to 10 Degree Celsius in winter. At Nandi Hills we can see
Rain-fall of 100 to 150cms every year. Mahatma Gandhiji has stayed for 45
days for his health revival at this place.
To more about Ndandi hills:
|
Subscribe to:
Posts (Atom)