tag:blogger.com,1999:blog-56111152781110179792024-03-13T09:40:37.738+05:30VsPradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.comBlogger10125tag:blogger.com,1999:blog-5611115278111017979.post-3246348186244828052011-08-06T16:51:00.008+05:302011-08-06T16:53:07.565+05:30Look, See and Watch<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="background-color: black; font-family: "Trebuchet MS",sans-serif;">
<span style="font-size: large;">Look</span> - to look at something for a reason, with an intention.</div>
<div style="font-family: "Trebuchet MS",sans-serif;">
‘Look at that strange man.’</div>
<div style="font-family: "Trebuchet MS",sans-serif;">
‘Look at the pictures I took on holiday.’</div>
<div style="font-family: "Trebuchet MS",sans-serif;">
<br /></div>
<div style="background-color: black; font-family: "Trebuchet MS",sans-serif;">
<span style="font-size: large;">See </span>-to ‘see’ something that comes into our sight that we weren’t looking for.</div>
<div style="font-family: "Trebuchet MS",sans-serif;">
‘Did you see that bird? – I wasn’t looking for it, it just appeared.</div>
<div style="font-family: "Trebuchet MS",sans-serif;">
‘I saw you driving to work today.’</div>
<div style="font-family: "Trebuchet MS",sans-serif;">
<br /></div>
<div style="background-color: black; font-family: "Trebuchet MS",sans-serif;">
<span style="font-size: large;">Watch</span> - to look at something carefully, usually at something which is moving.</div>
<div style="font-family: "Trebuchet MS",sans-serif;">
‘Watch TV’- the TV doesn’t move, but you watch the moving images carefully.</div>
<div style="font-family: "Trebuchet MS",sans-serif;">
‘Watch here you are going! You almost stepped on my foot!’ </div>
</div>
Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com0tag:blogger.com,1999:blog-5611115278111017979.post-17595669209627722182011-06-22T11:15:00.000+05:302011-06-22T11:15:47.458+05:30Off Page SEO Vs. On Page SEO <div dir="ltr" style="text-align: left;" trbidi="on"> <div style="font-family: "Trebuchet MS",sans-serif;"> You may have made sure that you picked one of the best on page optimisation agencies in the industry, got references, asked for case studies then after risking it all with a 12 month contract, you invested all your expectations and large part of your internet marketing budget with the on-page Search Engine Optimisation (SEO) agency.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;"> Months later with your patience worn through and no significant results delivered, you must be frustrated with the lack of returns on your investment and possibly even ready to give up on SEO all together.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;"> We have been very surprised to see how many of the top SEO agencies in the UK have been very slow to change their optimisation strategies; now that on page optimisation has mostly lost all of its affect.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;"> <strong>Is there any need for on-page optimisation?</strong></div><div style="font-family: "Trebuchet MS",sans-serif;"> There are some basic optimisation issues that are critical to have in place and then there are more technical / advanced techniques that can improve your search engine rankings. You should not pay for basic SEO advice and you do not need to pay much for advanced optimisation advice.</div><div style="font-family: "Trebuchet MS",sans-serif;"> We disclose up to date SEO advice and tips to most of our clients at no charge.</div><div style="font-family: "Trebuchet MS",sans-serif;"> After having the basics in place, creating masses of useful content is the main on-page optimisation strategy that a webmaster should focus on, but without off-page SEO you will not see your website’s current ranking increase significantly.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;"> <strong>More on off-page optimisation…</strong></div><div style="font-family: "Trebuchet MS",sans-serif;"> Off page optimisation or off-page SEO is basically controlling how the internet portrays your website. </div><div style="font-family: "Trebuchet MS",sans-serif;"> A professional off-page SEO will be able to employ their own resources* to control how search engines view your website and thereby control your ranking. Most off-page SEO techniques done well will result in very high ROI and high ranking in MSN, Google and Yahoo!</div><ul style="font-family: "Trebuchet MS",sans-serif;"><li> *One way links from their link publishing partners<br />
</li>
<li> Gradual link building technology<br />
</li>
<li> Your business partners and their link publishing resources<br />
</li>
<li> General internet resources: Powerful free directories, one way link brokering etc.<br />
</li>
<li> Online PR campaigns<br />
</li>
<li> News articles<br />
</li>
</ul><div style="font-family: "Trebuchet MS",sans-serif;"> <strong>Are there any risks associated with off-page SEO done incorrectly?</strong></div><div style="font-family: "Trebuchet MS",sans-serif;"> We recommend that you only use professionals for your off-page SEO.</div><div style="font-family: "Trebuchet MS",sans-serif;"> Make sure that the company winning your business has been focusing on off page SEO for more than two years and are not late adopters jumping on the band wagon of a new product and service that has been under boom demand of late.</div></div>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com0tag:blogger.com,1999:blog-5611115278111017979.post-2926608197734507082011-03-06T11:14:00.003+05:302011-03-06T11:47:46.804+05:30Talent vs Skill<div dir="ltr" style="text-align: left;" trbidi="on"><div style="color: #f1c232;">Talent is:</div><blockquote>- A special natural ability or aptitude to do something<br />
- Something a person is born with<br />
- Something you cannot teach</blockquote><br />
<div style="color: #f1c232;">Skill is:</div><blockquote>- The ability, coming from one's knowledge, practice, aptitude, etc.<br />
- Something that can be learned, honed and improved<br />
- You can only teach new Skills. Skills and not a substitute for Talent.</blockquote><div style="color: #f1c232;"><br />
</div><div style="color: #e69138;">A few examples:</div><br />
<blockquote>- Writing is a talent, but knowing how to use Microsoft Word is a skill<br />
- Photography is a talent, but knowing how to use a camera is a skill<br />
- Empathy is a talent, but nursing (as in a hospital job) is a skill<br />
- Writing good algorithms is a talent, but developing programs in Java (programming language) is a skill.</blockquote></div>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com0tag:blogger.com,1999:blog-5611115278111017979.post-27744309487657478372010-12-14T13:02:00.000+05:302010-12-14T13:02:14.823+05:30Geo Informatics vs Bio Informatics<div style="color: #3d85c6;"><b>Geo informatics</b></div><blockquote>Geo informatics deals with the application of science and technology to both develop as well as utilize the infrastructure of information science on problems regarding Geo sciences, geography and other related divisions of engineering. </blockquote><blockquote>While Geoinformatics is a branch of engineering which helps to solve the problems of geo science by developing and implementing different infrastructures of information science, </blockquote><div style="color: #3d85c6;"><b>Bio informatics</b></div><blockquote>Bioinformatics is concerned with the application of computer science and statistics in the area of molecular biology. </blockquote><blockquote>Bioinformatics is the enhancement of gene based discovery of drugs and its development with the use of computer technology for the analysis of biological information. </blockquote>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com0tag:blogger.com,1999:blog-5611115278111017979.post-22860586716288788612010-10-22T11:30:00.000+05:302010-10-22T11:30:20.138+05:30Internet vs Intranet<div style="color: #6fa8dc; font-family: "Trebuchet MS",sans-serif;"><b>Internet</b></div><blockquote style="font-family: "Trebuchet MS",sans-serif;">This is the world-wide network of computers accessible to anyone who knows their Internet Protocol (IP) address - the IP address is a unique set of numbers (such as 209.33.27.100) that defines the computer's location. Most will have accessed a computer using a name such as http://www.alertclub-differ.blogspot.com. </blockquote><div style="color: #6fa8dc; font-family: "Trebuchet MS",sans-serif;"><b>Intranet</b></div><blockquote style="font-family: "Trebuchet MS",sans-serif;">This is a network that is not available to the world outside of the Intranet. If the Intranet network is connected to the Internet, the Intranet will reside behind a firewall and, if it allows access from the Internet, will be an Extranet. The firewall helps to control access between the Intranet and Internet to permit access to the Intranet only to people who are members of the same company or organisation.<br />
<br />
In its simplest form, an Intranet can be set up on a networked PC without any PC on the network having access via the Intranet network to the Internet.<br />
<br />
<b>For example</b>, consider an office with a few PCs and a few printers all networked together. The network would not be connected to the outside world. On one of the drives of one of the PCs there would be a directory of web pages that comprise the Intranet. Other PCs on the network could access this Intranet by pointing their browser (Netscape or Internet Explorer) to this directory - for example<br />
<br />
U:\inet\index.htm.<br />
<br />
From then onwards they would navigate around the Intranet in the same way as they would get around the Internet. </blockquote>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com0tag:blogger.com,1999:blog-5611115278111017979.post-43043559898689735312010-10-22T11:15:00.002+05:302011-03-06T11:16:31.099+05:30Spyware vs Virus<div dir="ltr" style="text-align: left;" trbidi="on"><div style="color: #6fa8dc; font-family: "Trebuchet MS",sans-serif;"><b>Spyware</b></div><blockquote style="font-family: "Trebuchet MS",sans-serif;">Spyware is software that can display advertisements (such as pop-up ads), collect information about you, or change settings on your computer, generally without your consent. Spyware can damage your computer or cause you to lose important data.<br />
<br />
In a general sense, spyware are programs designed to record your various activities on your computer (hence the prefix "spy") may it be internet browsing habits or software that you use on your computer. Spyware usually isn't designed to be directly harmful to your computer, unlike a virus, but instead can be extremely annoying, invasive to your privacy and suck system resources causing slow downs to your computer.</blockquote><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="color: #6fa8dc; font-family: "Trebuchet MS",sans-serif;"><b>Virus</b></div><blockquote style="font-family: "Trebuchet MS",sans-serif;">A computer virus is a malicious computer program designed specifically to replicate itself and spread from computer to computer. Like spyware, a virus can damage hardware, software, or data.<br />
<br />
Viruses on the other hand are designed to run helter-skelter through your computer and caused actual, intentional damage to the computer itself. This can be in the form of corrupting files on your computer, damaging your personal documents, photos, music track, and more to rendering the computer completely unusable. Viruses usually don't have an ulterior motive like spy ware programs do, they are made to maliciously damage your computer and cause you problems. Like human viruses, computer viruses also replicate themselves, and spread by embedding into email attachments and other shared files. It only takes one file getting "infected" and distributed online (many times unknowingly) to spread at alarming rates if that file is accessed by others.</blockquote></div>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com1tag:blogger.com,1999:blog-5611115278111017979.post-37226755764387607852010-10-20T19:58:00.004+05:302011-03-06T11:18:09.959+05:30Debugging vs Testing<div dir="ltr" style="text-align: left;" trbidi="on"><div style="color: #6fa8dc;"><b>Debugging</b></div><blockquote>* Debugging done in the devlopment phase by the devlopers. <br />
* In devlopment phase devloper fixes the bug (i.e)called debugging.<br />
* Debugging-Fixing the identified Bugs.<br />
* Debugging is the act of fixing the bugs that is reported by either the testing team or by the end users. <br />
* Debugging: It is done by the Developer. It is nothing but fixing the developer.</blockquote><br />
<div style="color: #6fa8dc;"><b>Testing</b></div><blockquote>* Testing is conducted by the testers in testing phase. <br />
* In Testing phase tester will finds the bug (i.e)called testing to improve the quality of the product. <br />
* Testing-Locating/Identifying Bugs. <br />
* Testing is the performed by tester with the intent of finding a bug in an application. Upon finding a bug the tester will be reporting it to development team. <br />
* Testing: It is done by Tester.Testing is nothing but finding out the errors.</blockquote></div>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com2tag:blogger.com,1999:blog-5611115278111017979.post-79166663129601997042010-10-18T13:21:00.004+05:302010-10-18T13:53:28.984+05:30DBMS vs RDBMS<table border="0"><tbody>
<tr><td><div style="color: #6fa8dc; text-align: center;">DBMS </div><ul><li>DBMS data is stored in the form of rows and columns</li>
</ul><ul><li>Data stored in dbms is temporarly</li>
</ul><ul><li>DBMS is DATA BASE MANAGEMENT SYSTEM </li>
</ul><ul><li>In DBMS keys are not used.</li>
</ul><ul><li>In DBMS duplication of rows ans columns.</li>
</ul><ul><li>In DBMS rows and columns are independent.</li>
</ul><ul><li>DBMS is for single user only.</li>
</ul><ul><li>DBMS does not satisfies codd's rules.</li>
</ul><ul><li>Eg: DBMS: Sysbase foxpr</li>
</ul></td> <td><div style="color: #6fa8dc; text-align: center;">RDBMS </div><ul><li>RDMS data stored in the form of tables </li>
</ul><ul><li>where as in rdbms is permanently </li>
</ul><ul><li>RDBMS is RELATIONAL DATABASE MANAGEMENT SYSTEM.</li>
</ul><ul><li>In RDBMS keys are used.</li>
</ul><ul><li>But in RDBMS there is no duplication of rows and columns.</li>
</ul><ul><li>But in RDBMS rows and columns are dependent. </li>
</ul><ul><li>RDBMS is for multi-user.</li>
</ul><ul><li>RDBMS satisfies codd's rules. </li>
</ul><ul><li>Eg: RDBMS: Oracle, SQl server</li>
</ul></td></tr>
</tbody></table>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com31tag:blogger.com,1999:blog-5611115278111017979.post-34834438135400400342010-10-17T14:15:00.008+05:302010-10-18T12:05:25.193+05:30Aims Vs Objectives<div style="font-family: "Trebuchet MS",sans-serif;"><b style="color: #ffd966;"><span style="color: #6fa8dc;">-</span> <span style="color: #6fa8dc;">Aims</span></b> are actually Goals which you set for yourself in life.</div><div style="font-family: "Trebuchet MS",sans-serif;"><b><span style="color: #6fa8dc;">- Objectives</span> </b>are the measures which you Undertaken to achieve your Aims.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="color: #6fa8dc; font-family: "Trebuchet MS",sans-serif;"><b>In Short</b></div><div style="font-family: "Trebuchet MS",sans-serif;">Aims are what you want to achieve, Objectives are what you will do to achieve them. </div><div style="font-family: "Trebuchet MS",sans-serif;">So, an Aim would be the overall thing you want to eventually achieve.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif; text-align: center;">-------------</div><div style="font-family: "Trebuchet MS",sans-serif; text-align: center;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;">A<span style="color: #ffd966;"> </span><b style="color: #6fa8dc;">Goal</b><span style="color: #ffd966;"> </span>is something you work toward, a setpoint.</div><div style="font-family: "Trebuchet MS",sans-serif;">An <b style="color: #6fa8dc;">Aim</b> is a focal point, something to keep your eye on.</div><div style="font-family: "Trebuchet MS",sans-serif;">An<span style="color: #6fa8dc;"> </span><b style="color: #6fa8dc;">Objective</b><span style="color: #6fa8dc;"> </span>is a more strategic goal, and usually indicates more planning or organization</div>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com0tag:blogger.com,1999:blog-5611115278111017979.post-72172677752422316362010-10-17T01:50:00.001+05:302010-10-17T15:07:05.003+05:30Authentication Vs Authorization<dl style="font-family: "Trebuchet MS",sans-serif;"><dt style="color: #6fa8dc;"><span style="font-size: large;"><b>Authentication</b></span> </dt>
<dd>An <i>authentication</i> system is <u>how you identify yourself to the computer</u>. The goal behind an authentication system is to verify that the user is actually who they say they are. There are many ways of authenticating a user. Any combination of the following are good examples.
<dl><dt><b>Password based authentication</b> </dt>
<dd>Requires the user to know some predetermined quantity (their password).
<li><b>Advantages:</b> Easy to impliemnt, requires no special equipemnt. </li>
<li><b>Disadvantages:</b> Easy to forget password. User can tell another user their password. Password can be written down. Password can be reused. </li>
</dd></dl><dl><dt><b>Device based authentication</b> </dt>
<dd>Requires the user to posses some item such as a key, mag strip, card, s/key device, etc.
<li><b>Advantages:</b> Difficult to copy. Cannot forget password. If used with a PIN is near useless if stolen. </li>
<li><b>Disadvantages:</b> Must have device to use service so the user might forget it at home. Easy target for theft. Still doesn't actually actively identify the user. </li>
</dd></dl><br />
<dl><dt><b>Biometric Authentication</b> </dt>
<dd>
<li><i>My voice is my passport. Verify me.</i> This is from the movie sneakers and demonstrates one type of biometric authentication device. It identifies some physical charactistic of the user that cannot be seperated from their body. <br />
<br />
<br />
<dl><dt><b>Retina Scanners:</b> </dt>
<dd>
<li><b>Advantages:</b> Accurately identifies the user when it works. </li>
<li><b>Disadvantages:</b> New technology that is still evolving. Not perfect yet. </li>
</dd></dl><br />
<br />
<br />
<dl><dt><b>Hand Scanners:</b> </dt>
<dd>
<li><b>Advantages:</b> Difficult to seperate from the user. Accurately identifies the user. </li>
<li><b>Disadvantages:</b> Getting your hand stolen to break into a vault sucks a lot more than getting your ID card stolen. </li>
</dd></dl></li><br />
<br />
<br />
</dd></dl></dd></dl><dl style="font-family: "Trebuchet MS",sans-serif;"><dt style="color: #6fa8dc;"><span style="font-size: large;"><b>Authorization</b></span> </dt>
<dd>Once the system knows <b>who</b> the user is through authentication, <i>authorization</i> is how the system decides <u><b>what</b> the user can do</u>. A good example of this is using group permissions or the difference between a normal user and the <i>superuser</i> on a unix system. There are other more compicated ACL (Access Control Lists) available to decide what a user can do and how they can do it. Most unix systems don't impliment this very well (if at all.)
<div style="text-align: center;">_______________ </div><div style="text-align: center;"><b>In Short: </b></div><div style="text-align: center;"></div><div style="text-align: left;"><span class="WikiBody" gxformat="1" id="W0025BODY"><b style="color: #f6b26b;">Identification</b><span style="color: #f6b26b;">:</span> Who are you? </span> <span class="WikiBody" gxformat="1" id="W0025BODY"> <b style="color: #f6b26b;">Authentication</b><span style="color: #f6b26b;">:</span> Prove it. <b> </b></span> <span class="WikiBody" gxformat="1" id="W0025BODY"><b style="color: #f6b26b;">Authorization</b><span style="color: #f6b26b;">:</span> Here is what you can do.</span></div></dd></dl>Pradeep Sharmahttp://www.blogger.com/profile/16599944266800316442noreply@blogger.com0