Tips to get more out of Google

Google's main page may look simple, but don't be fooled. Behind that solitary search box lies power that most of us never tap -- not because we don't want to, but because we don't know how.

But with the right commands and shortcuts, you can start using Google in ways you never imagined: as a calculator, a weather forecaster, a travel agent, movie locator, and much more.
Search prefixes
One powerful way to refine your searches is by using search prefixes: words that you follow with a colon and then the search term itself.

For instance, use the prefix 'site' to specify that you'd like to restrict your search to a particular site. The search phrase ' windows xp downloads,' for example, tells Google that you'd like it to retrieve links to downloads applicable to Windows XP from Microsoft's web pages.
File prefixes
You can use the 'filetype' prefix to search for specific types of documents or files. This is very useful if you're searching for, say, Excel files - or for PDFs that you can download and print out in an attractive format. Let's say, for example, that you'd like to search for a PDF of Ernest Hemingway's novel The Sun Also Rises. The proper search phrase would be 'sun also rises filetype:pdf.'

Other handy prefixes include 'define,' for searching for definitions, and 'related,' to search for sites that are similar to ones you like. The 'define' prefix is especially nice for students, young and old, who can instantly retrieve definitions of a word from a wide variety of sources.
Trigger words
You can also perform targeted searches by using what Google calls 'trigger words' -- or words that tell the search engine to return specific types of information, such as the local weather or local showtimes for currently running movies. Like search prefixes, some of these trigger words work best when they are followed by a colon and then by the relevant search phrase.

There are a couple dozen trigger words. Some of the more useful include 'weather,' 'movies,' and 'tracking.' For instance, a search for 'weather:Berlin' will quickly return the five-day weather forecast for Berlin, Germany, as well as dozens of related links to weather in that city.
Use the trigger word 'movie:*** brwill ask you for your location if you haven't registered it already with the search engine. Once you provide that information, Google will instantly return a listing of movie theatres where the film is playing, along with showtimes. The triggers 'film' and 'showtimes' work identically, by the way.
Math genius
The Google search field is a veritable math genius as well. In fact, if you simply type a math equation in the search box, you'll get nothing but the (correct) answer in return. Try it with a simple math problem first. Type 5 * 7, click Search, and Google shows you the result: 5 * 7 = 35.

Math lovers can take the Google search field to the next level, too, with complex problems such as 5*9+(sqrt 10)^3. The answer, 76.6227766, is returned in the blink of an eye.
Simpler conversions -- such as for currency and temperature -- are a cinch for Google, too. Need to find out how many pounds you can get for a certain number of dollars? Easy. Just type, for instance, '1 GBP to USD' .

Similarly, if you want to get a quick conversion from Fahrenheit to Centigrade, just type, for instance, '98 f to c.' Again, you'll get the answer before you can finish typing.
Add words at the end of search phrase
You can add certain words to the end of search phrases in Google to unleash additional features. If you need a quick map, for instance, just type the word 'map' after the name of any country, city, or town. Google will display a thumbnail map, which you can click to explore in a larger, scrollable format using Google Maps.

Similarly, to find an image of a search phrase, just add the word 'image' at the end of the phrase. For example, typing 'Jefferson image' brings up images of Thomas Jefferson. And adding 'time' to the end of the name of a city or country will result in Google's telling you what time it is in that place.

More search features available here

W3C Tools for Quality Assurance

Have you ever checked whether your website has passed all the quality checks?

If you think that your website is perfect and of good quality, then better assure yourself before nodding YES.

Below are the tools provided by W3C and is an open source to assure the website quality:

Reason for curly hair

Straight hair are due to the follicles that produce round strands whereas curly hair are due to follicles that produce oval strands. Curly hair is oval in cross-section while strait hair is round. Some people have curly hair and some have straight hair because we are different. Our eye color, hair color, skin tone, and if our hair is curly or straight are genetic.

One theory also tells that straight or curly hair is due to the temperature in which their ancestors have lived. Straight hair is a sign that the person has lived in a cooler climate, because it will lay flat to conserve body heat. Curly hair is known as a heat coil, meaning that it disperses heat more rapidly. Pepole from arctic regions have straight, oily hair. People who live in desert regions like the desert or in africa have curly hair to disperse the heat.

Difference between 32 bit and 64 bit processors

x86 is a very old technology that started with the 8086 family of processors. It has now evolved into the x86-32 version which is the most common version and its successor the x86-64 or more commonly known as x64. The move gradual shift to x64 has started quite early while there were still no major drawbacks seen in the pc market. This is because the first market to experience the problems related to x86 was those who run high end servers.

Running a system that has 32bit architecture means that you are always limited to what 32bits can point to. In this case, the problem stemmed from memory. A 32bit long pointer could only point to a maximum of 4.2billion addresses which is just about 4GB of memory. As such, it can only allocate up to 4GB of memory to a certain program even if it has 16GB of memory available. This limitation may never be a problem for a home setup but in a server environment, it presents a huge problem. That’s why x64 processors appeared very early for the consumers.

The x64 architecture still follows what x86 has but it improves on it by having 64bits in every address. This means that the memory capacity of the x64 architecture is the square of 4.2billion, which for now is an unimaginable amount of memory. That coupled with certain enhancements makes the x64 architecture a certainly great processor to replace its predecessor.

The problem with x64 is that the software for it isn’t really there yet. Although there are already operating systems that try to take advantage of the x64 architecture, most do not and there are even some that won’t run on an x64 OS. Eventually, the software meant for x64 architecture would arrive and all the 32bit hardware and software would become obsolete. But for now, the x64 architecture is still haunted by software incompatibilities that limit its appeal to the general public.


What is OpenID and how it works?

Many websites offer features that are only available to users who first log-in to the system. In a typical application, user identity is confirmed ("authenticated") upon entering the username and password for the account. This approach is straightforward and works, but there are drawbacks. Users are usually required to remember a username/password for every website they use, which can be problematic.

OpenID ( is an open standard that defines a way that web-based applications  can authenticate users by delegating the responsibility of authentication to identity providers. With OpenID, users have a single identity that can be used on any OpenID-enabled application, and they only need to remember one password.
In this article, I describe the OpenID authentication system and show how a web application built with Ruby on Rails can use OpenID to authenticate its users.

How OpenID Works
OpenID relies on the HTTP protocol to exchange messages between users and "identity providers." Consider a user named Bob, whose identity provider is myOpenID ( Bob uses the Drupal content-management system that happens to be an OpenID consumer. Here's the general workflow when Bob logs into his Drupal account through OpenID:
  1. Arthur visits any OpenID-driven website.
  2. Arthur enters his OpenID identity URI, "," in the login form and clicks a Submit button. That's his OpenID identity URI, which looks like a website address, but identifies Bob and his identity provider.
  3. Arthur's web browser is redirected to a web page served by myOpenID, where he is prompted for his password.
  4. Arthur enters his OpenID password and clicks a Submit button.
  5. myOpenID confirms Arthur's password, and his web browser is redirected to the website he opened with automated log-in.
Arthur entered his password only on the identity provider website, and never on the consumer website. The user's password is not shared with the consumer and only needs to be submitted once by users to the identity provider, preferably over a secure connection.

Following diagram best explains how OpenID works:

OpenID is an open standard that defines a way that web-based applications can authenticate users via a single identity. OpenID provides several benefits to users and developers. Users only need to remember one username (their identity URI) and password to access multiple applications. With a simple cookie and Remember Me checkbox, an OpenID identity provider can act as a convenient Single Sign-On (SSO) solution for someone who uses multiple OpenID consumers.
OpenID identity providers are responsible for the authentication of users It's now-a-days common for web apps to offer OpenID support as an alternative to traditional authentication methods, but letting experts handle password security reduces the risk of accounts being compromised.
One of the very popular OpenID providers is

But you will be glad to know that Google also provides OpenID. Use to know your OpenID provided by Google.

Reference: Dr. Dobb's

Circuit Filter in Stock Market

SEBI has a rule called Circuit Breaker in Stock Market for both Index and Stock specific Circuit Limits. The Circuit filter limit is introduced in intention to reduce the speculations in the market and stock specific trading. There will be two ways a circuit filter applied, upper circuit filter and lower circuit filter. So when buying stocks in the current stock markets you must first learn about the stock market and know the stock market prices and then consider online trading stocks.

Index specific Circuit Filter
Index specific circuit filter applied to either BSE Sensex or the NSE S&P CNX Nifty whichever is breached earlier. Now there are three filters for Index based circuit viz 10%, 15% and 20%.
If either BSE Sensex or NSE S&P CNX Nifty falls 10% before 1.00pm then trading halts for one hour in the market. If index drops after 1.00pm but before 2.30 pm then trading halts for half hour. If the index drops after 2.30pm then there will be no halt for trading at 10% level and market shall continue trading for the remaining time.
If either BSE Sensex or NSE S&P CNX Nifty falls 15% before 1.00pm then trading halts for two hour in the market. If index drops after 1.00pm but before 2.00 pm then trading halts for one hour. If the index drops on or after 2.00pm then there will be no trading for the remaining time.
In case of 20% drop in either of the index then the trading halts for the remaining day.
This percentage of circuit filters are revised after every quarter and new percentages are arrived for the next quarter.

Stock specific Circuit Filter
Stock specific circuit filters are applied in both BSE and NSE index, the percentage for circuit filter limit is 2%, 5%, 10%, 20%. When a stock is on upper circuit limit then there will be only buyers in the market and no seller exists and hence the price is up. On the other hand lower circuit limit is when there are only sellers in the market for that stock and hence the stock price is down.

Online Aircraft Tracking

Ever wondered that you can now track aircrafts from your home?
Visit and enjoy the heights of technology.

Right to Information

Every citizen has a right to know how the Government is functioning. Right to Information empowers every citizen to seek any information from the Government, inspect any Government documents and seek certified photocopies thereof. Some laws on Right to Information also empower citizens to official inspect any Government work or to take sample of material used in any work.

Right to Information includes the right to:
a) Inspect works, documents, records.
b) Take notes, extracts or certified copies of documents or records.
c) Take certified samples of material.
d) Obtain information in form of printouts, diskettes, floppies, tapes, video , cassettes or in any other electronic mode or through printouts.

"information" means any material in any form, including records, documents, memos, e-mails, opinions, advices, press releases, circulars, orders, logbooks, contracts, reports, papers, samples, models, data material held in any electronic form and information relating to any private body which can be accessed by a public authority under any other law for the time being in force.

"record" includes:
a) Any document, manuscript and file
b) Any microfilm, microfiche, and facsimile copy of a document
c) Any reproduction of image or images embodied in such microfilm (whether enlarged or not); and
d) Any other material produced by a computer or any other device;

An applicant cannot ask for opinions/advice/views under the RTI Act, unless the opinion/advice/view is already on "record".

However, under Section 4(1)(d), an applicant can ask for "reasons" behind a administrative or quasi judicial decision of a public authority, especially if he is a "affected person".

To lodge your complaint, click here