lily flower

Lily Flower

Lily Flower

Posted in Photography | Tagged | Leave a comment

Twitter Warns Journalists: “We Believe That These Attacks Will Continue”

In a memo sent to news organizations, Twitter warns that it expects high-profile account hijackings — like the one that took down the AP’s Twitter account last week — to continue. “Please help us keep your accounts secure,” the memo pleads. It returns to a similar note: “Help us protect you.”

Read the complete article and memo Click here

Posted in Technology | Tagged | Leave a comment

Tom the Cat

Cat enjoying evening cool breeze , after a scorching hot afternoon.

Posted in Animals, cats, Pets | Tagged , , | Leave a comment

Fat-Fat go away

Body fat (obese) one of the most scary thing, and I off late been worried if I have added extra fat and hope am not looking fat!

I been in active sports and athletics never had these worries related to body fat and was always athlete build in body structure. As time passed professional life always took priority over active sports and then came the thought of body fat.

Do I look fat or overweight?

All though there was nothing but the phobia “Obesophobia” was killing, and wanted to have zero fat! Well that was too good to be true, until I took efforts to understand all about fat.

Body fat that I used to think of as enemy to my good health, realized “body fat” is one of the most important things for our body.

Imagine our vital organs been protected by fat! Yes its true , fat plays very important role in protecting vital organs. Fat also helps in regulating appetite and helps brain to trigger hunger as and when needed to safeguard going down on body weight. Fat plays very important role in females for supporting their “reproduction cycle” and so on…

After all body fat is not that bad if kept under control, eat healthy and exercise well and most important control stress!

Posted in Health | Tagged , | Leave a comment

As Schmidt speaks of caution, Google Glass gets hacked

Not long after Google’s Eric Schmidt talks of how apps for Glass will require Google’s approval, a renowned hacker/developer gains access to the gadget’s operating system. But just what might that mean? 

The most important question remains, is the user information safe with these smart gadgets? These smart gadgets and their strong coupling relationship with Personally identifiable information (PII) including full location, camera etc which is prone to be taken over by a compromised computer or malware.

These smart devices are user data centric & it is compelling to create new security solutions that are hardware-agnostic. Therefore, there is a clear need and demand for PII data to be protected in the case of loss, theft, or capture of the hardware.

 Read this article by Eric Mack on CNET on Google Glass gets hacked.

http://news.cnet.com/8301-17938_105-57581724-1/as-schmidt-speaks-of-caution-google-glass-gets-hacked/

Posted in Technology | Tagged , , , , , | Leave a comment

God made women from rib taken out of man and ……

What have we done?

Why do we look upon women and where is the society headed?

My heart cries out with pain and agony when I hear and see brutality towards women in our society. India has always given special place for women right from child, young to old women. On one hand we worship deity and call her “Maa” and on other hand we see and hear brutality against this lovely creation of god.

Women is “derived out of man”

God created women from man’s ribs and we fail to understand that god never created women from man’s feet so that we crush her under our feet nor did he create from man’s head so that women is to be kept over his head, women was created from mans side so that she can equal to man and be and support man in all walks of life in different roles from sister, wife, mother etc.

A woman is man’s companion and is held in very highest regard and far more respected than anything. It is said where women is respected that where prosperity is….

In the Indian tradition when the daughter is born, she is referred to as Lakshmi and it is often said that Gods reside where women are respected, honored, and protected.

Today when I see wide-spread brutality against women in every form and if we do not respect, honor and protect women we would responsible for our own extension.

What are we supposed to change?

First things first, we have to respect, honor and protect women in every role, there needs to be drastic change in our mentality to acknowledge women, respect, support and protect her. Society is made up of “us” and every individual has to change. I hear people blaming politicians, police, systems, process etc., but we fail to understand that they are “one” of us and till the time “we” change the system would never change.

System has to be same for all and equal to all, the day we start implementing this change, we would see major difference in our society in every respect. We see brutality against women since we don’t have “zero tolerance” and it is very important that we have “zero tolerance “ against any crime against women however big or small the crime and brutality is.. This would bring deterrence and fear in minds of these “so called criminals” who commit brutality and crime against their own part “women”

Brutality has to stop against women and to have clean society we have to show respect and protect our women

Lets bring the change from right this moment and each one of us has to ensure we bring the change in our life and society.

Posted in Society | Leave a comment

Data protection law is in danger of lagging behind technological change

John Burn-Murdoch guardian.co.uk, Friday 12 April 2013

“Law is always going to be playing catch up to technology”, says senior UK data protection lawyer, as Britain negotiates new EU data protection regulations

 

Data processing practices are evolving faster than the law can adapt to them, according to a senior British lawyer at an international law firm specialising in data protection.

Ask a lawyer and a database administrator for their definitions of “delete” or “anonymise” and you will quickly realise the size of the task facing legislators around the world as they seek to define and prevent irresponsible and outright criminal uses of data in 2013.

 

Speaking to the Guardian, Bridget Treacy, leader of UK Privacy and Information Management practice at law firm Hunton & Williams stated her belief that legislation will always be playing catch up to technology in this area, adding “that’s just the way it is”.

 

Among the most contentious areas of data protection law in the UK are the dual concepts of anonymisation and pseudonymisation of data.

 

Anonymous data is data that is in such a format that it is impossible to establish the identity of any individuals whose details are contained in a database. Pseudonymous data has had personal details removed – such as names replaced with unique ID codes – but still contains sufficiently detailed information for someone to be able to establish the identities of individuals, even if this required combining it with a second database not held by the company in question.

 

If data is fully anonymised, it is no longer subject to the Data Protection Act (DPA), because it no longer relates to an identified or identifiable individual. In contrast, pseudonymous data remains personal data because it is capable of being related to an identified or identifiable individual, and thus remains subject to the DPA.

 

Chief among the challenges facing legislators in this area is the question of whether any individual dataset can be considered truly anonymous if its owner also holds the raw, personally identifiable data from which it was created.

 

“How do we decide whether the data is really anonymous when we hold all of the constituent elements of it?”, asks Treacy. “If I have a list of information where I’ve replaced individuals’ names with codes, but I also have – perhaps at another location – the same list with the names instead of the codes, I have pseudonymised information, but not anonymised information, if I can link the data sets.

“Our definition of personal data in the DPA refers not just to information that is readily to hand, but also to information that you are likely to obtain, so it takes a much broader perspective. I think therefore it is quite hard for companies to seek to anonymise data but still hold the keys that unlock it. Sometimes a trusted third party can be utilised to ensure the data sets are not combined.”

 

Read the complete article on http://goo.gl/ZzRN0

 

Posted in Technology | Tagged | Leave a comment

We’re heading for a world with more smartphones than bank accounts

Bank accounts are out, smartphones are in. In 2011, some 2.5 billion people in the world were “unbanked” (pdf), as the lingo goes, according to the World Bank. By 2016, more people will have bank accounts, but in regions like the Asia-Pacific and the Middle East, even more will have smartphones, research and consulting firm Analysys Mason predicts in a report today.

As we’ve written before, the increasing availability of cheap smartphones in emerging markets is one of the most important consumer trends today. Smartphone penetration should reach 46% in Asia by 2017 from 23% in 2012, and 29% in the Middle East and North Africa from 7% last year. The International Data Corporation forecasts that 70% of all smartphones shipped will be destined for emerging markets by 2017.

Read complete article on http://qz.com/66061/were-heading-for-a-world-with-more-smartphones-than-bank-accounts/

Posted in Technology | Tagged | Leave a comment

After so many hacks, why won’t Java just go away?

Experts say Oracle needs to re-think its approach to security

By Joshua Kopstein on February 22, 2013 12:30 pm

If you’ve been paying any attention to the security breaches hitting Apple, Facebook, Twitter, NBC, and others these past few weeks, you’ve probably noticed a common culprit: our poor old pockmarked friend, Java.

As a web plugin, Oracle’s aging code deployment platform has practically been a revolving door for widespread malware attacks recently, and for years the general consensus has often been that its risks have outgrown its usefulness. After spending a week Java-free back in 2010, PCMag’s Larry Seltzer concluded that the Java platform as a whole “is pretty clearly a failure, and all that remains of it is a big fat attack surface on your computer.”

The situation doesn’t look to be getting any better: since last year, zero-day exploits have been appearing with a crippling consistency, and lately Oracle has found itself fervently rushing to apply patches on an almost monthly basis. One of them, which emerged in January, caused Apple to start blocking Java 7 completely on OS X. And even after it had been patched, the US Department of Homeland Security’s Computer Emergency Readiness Team (CERT) joined security experts in recommending that users keep their Java browser plugins disabled indefinitely. Now many are beginning to wonder, as they have many times before, whether the platform and its associated language are finally on their last legs, about to be pummeled out of existence by hackers and a declining developer base.

Read complete article on http://www.theverge.com/2013/2/22/4016582/after-so-many-hacks-why-wont-java-just-go-away

Posted in Technology | Tagged | Leave a comment

The Top Ten Challenges in Time Management

What are some of the common obstacles keeping people from getting what they want, and what can be done to leap over these hurdles? Here are the top ten challenges people face when they try to accomplish things, in reverse order, like David Letterman does with his top-ten lists.

Challenge 10: I feel overwhelmed. This feeling is usually caused by one of two things. The first is that people think they have to do everything, assuming that more is better. The best way to solve this problem is to focus on achieving just a few things. Prioritize and learn to say no to anything that is not on your short list.

The second reason people feel overwhelmed is they look at all the things they have to do and tend to think everything needs to be done now. To minimize this feeling, try jotting down all the things that can be done tomorrow. Put that list in a safe place, and don’t think about anything on the list until tomorrow.

Challenge 9: I’m always in reactive mode. When you get stuck in reactive mode, it’s hard to make progress on the most important things. Take a little time out each day to work on those projects dearest to you. Get into the habit of solving problems ahead of time, before they turn into crises.

Challenge 8: I don’t finish what I start. Working on a project, but not bringing it to completion, is usually a big waste of time. Moreover, since almost everything we do is for somebody else, not only do you need to finish what you start, you also have to hand it off to the next person in such a way that they understand the value of what you’ve done. Remember that part of finishing something is making it presentable.

Challenge 7: I don’t stop doing things that are no longer worth doing. We have such trouble accepting loss that we just can give up things we know are no longer working. Cutting your losses requires that you accept defeat; it also usually requires you to deliver bad news to other people involved. Both are difficult. The good news is that both can be made easier through practice.

Challenge 6: I procrastinate. Research has shown that one of the biggest reasons we procrastinate is that we don’t feel we’ve freely chosen what we’re doing. If somebody else has forced it on us, or if we decide to do something out of pride, guilt, or jealously, we haven’t really chosen the project. In such cases, we usually wind up putting off work as much as possible.

The second big reason we procrastinate is that we feel our self image is at stake. If we fear the result of a project might dramatically alter the perception we have of ourselves (either positively or negatively), we tend to shy away.

Challenge 5: I don’t have enough energy to do the things I want. If you alter your eating habits, so that you eat a nutritious breakfast and a light lunch, you might find you have more energy throughout the day. Regular exercise and good sleep patterns will also help you get through your important projects with more zest.

Challenge 4: I’m easily distracted by things that are not important. To overcome this obstacle, start out by setting aside exactly one hour each day to work on only one thing. Once you get into this habit, try increasing the duration of these periods, or try setting aside more than one period per day.

Challenge 3: I don’t feel satisfied when I do finish something important. Feeling satisfied after accomplishing what you set out to do serves the same purpose as oxygen to a runner – you need to it to propel you forward.

If you suffer from this problem, try writing down each goal before you start working towards it. When you complete the goal, look back at your list and remind yourself how challenging it appeared before you started.

Challenge 2: I don’t know how to say no. Since time is such a precious resource, the only way you can free yourself to do the things you want is to say no frequently. Practice makes perfect.

And now for the number one challenge in time management …

Challenge 1: I don’t know what I want. The best way of overcoming this problem is to set aside a little time every day just to think. The most successful people in the world recognize the need for think time, and make a conscious effort to set that time aside. For many it becomes a kind of ritual.

That’s my list of the top ten challenges in time management. Let me know if you’ve observed other, more formidable obstacles.

This article as published on http://www.forbes.com/sites/patbrans/2013/02/19/the-top-ten-challenges-in-time-management/

Posted in Leadership | Tagged | Leave a comment