Wednesday, February 07, 2007

Top 9 features of newly launched W880, thinnest handset by Sony Ericsson







Sony Ericsson launches new walkman phones. They call it to be the thinnest and slimmest handset ever released by them. Following are the features:

  • 9.4 millimeter-thin mobile phone design

  • Preloaded with following:

  • Walkman Player 2.0

  • Disc2Phone music management

  • TrackID music recognition applications

  • 1G-byte Memory Stick Micro (M2) card, capable of storing up to 900 tunes

  • 1.8-inch QVGA, 262k TFT (thin-film transistors) display

  • 2 mega pixel camera

  • Bluetooth Music Receiver MBR-100 system: This feature uses short-range wireless technology to stream music from the user's phone directly to a home or car stereo, using the phone as a remote control to alter the volume or skip through tracks.

  • A flight mode for use on airplanes.

  • Equipped with a battery capable of playing music up to 20 hours or offering 6.5 hours of talk time.

  • Based on GSM standards and supports GPRS and 3G technologies. It offers a range of communication services, such as a push e-mail, Web surfing and video streaming.

W880 is an enhancement of W610 which is a slightly larger Walkman phone, minus a few features.

For more readings, visit http://www.pcworld.com/article/id,128789/article.html.

Tuesday, February 06, 2007

Top 8 tips to decide whethar to help a beggar!



I came across various kinds of beggars. After lot of thinking, I came down to following points which I generally use to decide whether to give money or help a beggar:

  1. Beggar under age of 10 years: I never give him money as that could inculcate a habit of asking for money. Instead, I try giving him a meal or old clothes I have. But, money is NO NO.

  2. Beggars between ages of 10 to 20: They are a bit grown up. I decide on the spur of moment. If I find some elders with them and find them in physically disabled condition, I give him some money. The person looks to be in real need. If he/she is begging alone, I do not prefer to give them money reason being same as said in point 1. However, when some of them tell their misery, I decide on the spur of the moment.

  3. Beggars in age group of 20 to 40: I generally don’t give them money except for the case of physical disability.

  4. Beggars of age greater than 40: I keep them in old beggars’ category. I generally give them money. It seems to me that if person could not change himself till date, no amount of words could change them. Also, there is definitely some strong reason if a person of age greater than 40 is begging. I give theme benefit of doubt and pay them money.

  5. Female beggars below age of 20: I do not give them money except for the case of physical disabilities.

  6. Female beggars above age of 20: I do give them money as I believe there must be some strong reason for female to do begging. She must be placed in real compromising condition. So, I do help them.

  7. Female beggars with baby: Help them definitely without any doubt.

  8. Above 60 years age female beggars: Help them definitely without any doubt.

Random thoughts on Network Layer

IPv6 Protocol

The IPv6 protocol provides different types of addresses, including those for different casting(e.g., multicast, anycast, and unicast) and for different scopes (e.g., global, site-local, and link-local).

IPv6 packets consist of a basic header and number of optional extension headers. One such extension header is routing header which consist a list of all other routers including final destination. Basic header contains address of next specified router in the path. Each intermediate router swaps the next address in the list with the current destination address in the basic header.

ICMP Network Probe

This ICMP packet is the much talked about “ping” packet. What is the “echo request” used for though? Well primarily the ping packet is used to confirm if an IP address is assigned or not i.e.: is there a computer at a specific IP address? If there is then a reply will be issued by that IP address, and if not then an ICMP error message will be generated and returned.

Within the Internet Protocol, data is carried by the TCP, UDP etc. We however also need something to tell us whether the part of the Internet we are connected to or want to access is in working condition or not. This is done by ICMP. Thus all that ICMP does is perform diagnostic tasks on the Internet, and is not used to carry any data. In this sense, the structure of ICMP is a lot like IP. In fact, ICMP is always carried by the IP or encapsulated within the IP data packets.

Normally ICMP is used and implemented more in routers than in individual computers on the Internet. On the other hand, TCP is implemented in the individual computers and not in routers. ICMP is an extremely simplistic protocol. The first four bytes of any ICMP message always have the same format. The rest of the message depends upon the version of IP being used. ICMP is closely tied to IP. The new version of IP, IPv6 has a completely new ICMP protocol. The reason ICMP changes with every version of IP is because it deals with IP and routing error messages most of the time and when the base technology evolves, ICMP has to mutate to keep up.

The ICMP protocol is quite simple. In the present format the first byte is a number that tells us the Type of the ICMP packet. The second byte is called Code. From a combination of Type and Code, we can determine the exact nature of any problem on the Internet. These two bytes are followed by two bytes used for Checksum which is calculated taking into account the entire ICMP packet.

Ping – ICMP tool

In a Ping program, the first ICMP packet starts off with an 8 which stands for 'Echo Request'. This means we're asking the destination server to Echo the packet back to us when it receives it. In this way we can both time the packet and check the reliability of the link. This first byte is known as the Type Field.

The next byte is a zero and stands for the Code.

After that come two bytes for the Checksum and right after that come another two bytes for the IDentification number. The ID has to be unique, so most UNIX boxes set the ID's to the number of the current process.

The next two bytes constitute the Sequence Number.

Finally, we can add any optional data if we so desire.

Monday, February 05, 2007

Mariyah Moten, Lady to be in Black is in whites!



Mariyah Moten is Miss Pakistan World, Pakistani first Miss Bikini. Oops! Alright! That sounds brave. That also sounds beautiful. She must be a courageous girl at heart to stretch it off to take part in miss world contest.


I am sure the reaction in Pakistan must have been of violent nature. The country where women are not allowed to even show their faces is forced to have someone like Mariyah representing them in Miss World contest in semi nude picture. Note that Moslem women wear “Burkhas” as part of tradition. “Burkhas” are black dress that Moslem wears to cover their entire body.

However, if everything goes fine, this would be a new start for Pakistani women. Way to Go! Way to Go, Mariyah! World is watching this event.

Check out the following links:

http://www.dailymail.co.uk/pages/live/articles/news/news.html?in_article_id=404132&in_page_id=1770

http://wordpress.com/tag/mariyah-moten/