Here's a small list of tips that may help you use Google search better.
1. If you're on Google's homepage, click on "I'm feeling lucky" if you're searching for the site of a company or the official site of a product. "I'm feeling lucky" sends you to the first search result and saves you one click.
Example: use this for [bmw], [France Telecom], but not for general terms like [used cars], [mobile phones history] because for these queries you'll want to visit more than one page.
2. If you're not sure how to spell a word, or if you remember only the first letters of a word, use Google Suggest. You'll find it in Firefox 2 search box, in Google Toolbar or at its homepage.
3. Google shows direct answers for simple questions above the search results. When you try to find a simple fact, enter you query this way: "Italy population", and not as a complicated question like "How many people are in Italy?" because you might confuse Google.
If Google doesn't show an answer, try to imagine a page that answers your question. How would the answer sound like for a question like: "What is the fastest animal on land?". Of course, the page might contain this sentence: "[some animal] is the fastest animal on land".
Build your query this way:
* surround it by quotes, to obtain only results that contain that phrase
* instead of the answer, use a star for each word of the expected answer
For example, "* is the fastest animal on land".
4. The order of your keywords is important, so you'll get different results for "search history" and "history search". Type only the important keywords, in a logical order.
5. If you search for a file, you could:
* add filetype:[extension] for Office documents, text files, PDFs (for example: divine comedy filetype:pdf)
* use inurl: operator if you actually know the name of the file (for example: inurl:divina-comedia.pdf)
* exploit the standard format of Apache directory listings by adding intitle:"index of" parent directory to your query (for example: bigfix.exe intitle:"index of" parent directory).
6. You won't find information about a breaking news in Google search, so it's a good idea to try Google News and Blog Search. If the event is really important, Google will show results from Google News at the top of the page, in a OneBox.
7. Very few people use this option, even though it's really useful. If you found a good page, and you want to see related pages, click on the "Similar pages" next to the search result. Google will show 30 high-quality sites on the same topic. It's a good way to discover interesting sites.
8. If you found a site using Google search, but you don't remember too much about it, try Google Search History. You can browse all your search queries and the pages visited from Google, bookmark interesting sites and more.
9. When you want to explore a domain you aren't familiar with, a Wikipedia page is a good place to start. Add "wiki" or "wikipedia" to your Google search query to find the top results from Wikipedia. You can restrict your search to a site, by adding site:domainname to a query (for Wikipedia, you should add site:en.wikipedia.org).
10. Google doesn't give you a feed for search results, but Web Alerts sends you email updates with the latest relevant Google results for a query.
11/26/08
Google Search Tips
11/20/08
Windows Server 2008
1(One) : Server Core. Here is where the world could really change for Microsoft going forward: Imagine a cluster of low-overhead, virtualized, GUI-free server OSes running core roles like DHCP and DNS in protected environments, all to themselves, managed by way of a single terminal.
If you're a Unix or Linux admin, you might say we wouldn't have to waste time with imagining. But one of Windows' simple but real problems as a server OS over the past decade has been that it's Windows. Why, admins ask, would a server need to deploy 32-bit color drivers and DirectX and ADO and OLE, when they won't be used to run user applications? Why must Windows always bring its windows baggage with it wherever it goes?
Beginning with Windows Server 2008, the baggage is optional. As product manager Ward Ralston told BetaNews in an interview published earlier this week, the development team has already set up Beta 3 to handle eight roles, and the final release may support more.
What's more, with the proper setup, admins can manage remote Server Core installations using a local GUI that presents the data from the GUI-less remote servers. "We have scripts that you can install that enable [TCP] port 3389," Ralston told us, "so you can administer it with Terminal Services. [So] if you're sitting at a full install version and let's say I bring up the DNS, I can connect to a Server Core running DNS, and I can administer it from another machine using the GUI on this one. So you're not just roped into the command line for all administration. We see the majority of IT pros using existing GUIs or using PowerShell that leverages WMI [Windows Management Instrumentation] running on Server Core, to perform administration."
PowerShell can run on Server Core...partially, Iain McDonald told us. It won't be able to access the .NET Framework, because the Framework doesn't run on Server Core at present. In that limited form, it can access WMI functions.
But a later, more "component-ized" version of .NET without the graphics functionality may run within Server Core. This could complete a troika, if you will, resulting in the lightest-weight and most manageable servers Microsoft has ever produced. It may take another five years for enterprises to finally complete the migration, but once they do...this changes everything.
2(Two): PowerShell. At last. For two years, we've been told it'll be part of Longhorn, then not really part of Longhorn, then a separate free download that'll support Longhorn, then the underpinning for Exchange Server 2007. Now we know it's a part of the shipping operating system: the radically new command line tool that can either supplement or completely replace GUI-based administration.
Last week at WinHEC, Windows Server programming chief Iain McDonald flat out proclaimed, "If I could set the direction of it, I would like to make PowerShell the default shell for Windows. That's my personal bias."
At TechEd 2007 in Orlando in early June, we'll be seeing some new examples of PowerShell in the WS2K8 work environment - hopefully unhindered now that the product is shipping along with the public Beta 3...at least unless someone changes his mind. We hope that phase of PowerShell's history is past it now3(Three): Windows Server Virtualization. Even pared down a bit, the Viridian project will still provide enterprises with the single most effective tool to date for reducing total cost of ownership...to emerge from Microsoft. Many will argue virtualization is still an open market, thanks to VMware; and for perhaps the next few years, VMware may continue to be the feature leader in this market.
But Viridian's drive to leverage hardware-based virtualization support from both Intel and AMD has helped drive those manufacturers to roll out their hardware support platforms in a way that a third party - even one as influential as VMware - might not have accomplished.
Consolidation helps businesses to reclaim their unused processor capacity - which could be as much as 85% of CPU time for under-utilized servers. Neil cited IDC figures estimating US businesses have already spent hundreds of billions on processor resources they haven't actually used. It's not their fault - it's the design of operating systems up to now. "So obviously, we're trying to drive that utilization further and further," Neil said.
4(Four): Windows Hardware Error Architecture (WHEA). That's right, Microsoft has actually standardized the error - more accurately, the protocol by which applications report to the system what errors they have uncovered. You'd think this would already have been done."One of the problems facing error reporting is that there's so many different ways that devices report errors," remarked Russinovich. "There's no standardization across the hardware ecosystem. So that made it very difficult to write an application, up to now, that can aggregate all these different error sources and present them in a unified way. It means a lot of specific code for each of these types of sources, and it makes it very hard for any one application to deliver you a good error diagnostic and management interface."
Now, with hardware-oriented errors all being reported using the same socketed interface, third-party software can conceivably mitigate and manage problems, reopening a viable software market category for management tools.
5(Five): Address Space Load Randomization (ASLR) Perhaps one of the most controversial added features already, especially since its debut in Vista, ASLR makes certain that no two subsequent instances of an operating system load the same system drivers in the same place in memory each time.
Malware, Mark Russinovich described it (as only he can), is essentially a blob of code that refuses to be supported by standard system services. "Because it's isn't actually loaded the way a normal process is, it would never link with the operating system services that it might want to use," he described. "So if it wants to do anything with the OS like drop a file onto your disk, it's got to know where those operating system services live.
"The way that malware authors have worked around this chicken-and-egg kind of situation," he continued, "is, because Windows didn't previously randomize load addresses, that meant that if they wanted to call something in KERNEL32.DLL, KERNEL32.DLL on Service Pack 2 will always load in the same location in memory, on a 32-bit system. Every time the system boots, regardless of whose machine you're looking at. That made it possible for them to just generate tables of where functions were located."
Now, with each system service likely to occupy one of 256 randomly selected locations in memory, offset by plus or minus 16 MB of randomized address space, the odds of malware being able to locate a system service on its own have increased from elementary to astronomical.
6(Six): SMB2 network file system. Long, long ago, SMB was adopted as the network file system for Windows. While it was an adequate choice at the time, Russinovich believes, "SMB has kind of outlived its life as a scalable, high-performance network file system."
So SMB2 finally replaces it. With media files having attained astronomical sizes, servers need to be able to deal with them expeditiously. Russinovich noted that in internal tests, SMB2 on media servers delivered thirty to forty times faster file system performance than Windows Server 2003. He repeated the figure to make certain we realized he meant a 4000% boost.
7(Seven): Kernel Transaction Manager. This is a feature which developers can take advantage of, which could greatly reduce, if not eliminate, one of the most frequent causes of System Registry and file system corruption: multiple threads seeking access to the same resource.
In a formal database, a set of instructed changes is stored in memory, in sequence, and then "committed" all at once as a formal transaction. This way, other users aren't given a snapshot of the database in the process of being changed - the changes appear to happen all at once. This feature is finally being utilized in the System Registry of both Vista and
8(Eight): Clean service shutdown. One of Windows' historical problems concerns its system shutdown procedure. In XP, once shutdown begins, the system starts a 20-second timer. After that time is up, it signals the user whether she wants to terminate the application herself, perhaps prematurely. For Windows Server, that same 20-second timer may be the lifeclock for an application, even one that's busy spooling ever-larger blocks of data to the disk.
In WS2K8, that 20-second countdown has been replaced with a service that will keep applications given the signal all the time they need to shut down, as long as they continually signal back that they're indeed shutting down. Russinovich said developers were skeptical at first about whether this new procedure ceded too much power to applications; but in practice, they decided the cleaner overall shutdowns were worth the trade-offs.
9(Nine): Parallel session creation. "Prior to Server 2008, session creation was a serial operation," Russinovich reminded us. "If you've got a Terminal Server system, or you've got a home system where you're logging into more than one user at the same time, those are sessions. And the serialization of the session initialization caused a bottleneck on large Terminal Services systems. So Monday morning, everybody gets to work, they all log onto their Terminal Services system like a few hundred people supported by the system, and they've all got to wait in line to have their session initialized, because of the way session initialization was architected."The new session model in both Vista and WS2K8 can initiate at least four sessions in parallel, or even more if a server has more than four processors. "If you've got a Vista machine where this architecture change actually was introduced, and you've got multiple Media Center extenders, those media center extenders are going to be able to connect up to the Media Center in parallel," he added. "So if you have a media center at home, and you send all their kids to their rooms and they all turn on their media extenders at the same time, they're going to be streaming media faster from their Vista machines then if you had Media Center on a XP machine."
10(Ten): The self-healing NTFS file system. Ever since the days of DOS, an error in the file system meant that a volume had to be taken offline for it to be remedied. In WS2K8, a new system service works in the background that can detect a file system error, and perform a healing process without anyone taking the server down.
"So if there's a corruption detected someplace in the data structure, an NTFS worker thread is spawned," Russinovich explained, "and that worker thread goes off and performs a localized fix-up of those data structures. The only effect that an application would see is that files would be unavailable for the period of time that it was trying to access, had been corrupted. If it retried later after the corruption was healed, then it would succeed. But the system never has to come down, so there's no reason to have to reboot the system and perform a low-level CHKDSK offline."
11/18/08
Biometric controlled USB Drives
This is Biometric Access Controlled USB Flash Drive which gives fingerprint access control to the content of the USB key for secure storage of your data and applications. Lightweight and compact, the BioDisk is incredibly small and can fit right into your pocket. The casing is black and it has a pen-style clip on the back. The fingerprint sensor is on top.
It doesn't require any cable, power supply, or battery.
Act as a removable hard drive when plugged into a USB port. It is truly plug-and-play on Operating Systems that support USB 1.1 or USB 2.0, like Windows ME, 2000, and XP.
Windows 98 requires a driver to be installed before the BioDisk can be used normally.
Usage
By default the drive is locked and only the Run.exe file is shown when browsing the flash disk. Right clicking on the Drive Tray Icon lets me choose to unlock the Flash Drive. A dialog pops up and asks for the fingerprint. When recognizing the print all files show up in the file explorer dialog. Right clicking on the tray icon then lets me to choose lock the disk. All in all very easy to use.
ThinkPad USB Portable Secure Hard Drive
Lenovo launches ThinkPad USB Portable Secure Hard Drive
November 17th, 2008Expanding the renowned ThinkPad, Lenovo rolls out its latest portable hard drive, called the ThinkPad USB Portable Secure Hard Drive in two high-storage capacities such as 160 GB and 320 GB.
Promising to offer simple-to-use design, the device possesses two important attributes that make it unique from the rest of the hard drives - its portability and enhanced security.
The ThinkPad USB Portable Secure Hard Drive is about 3×5-inch in size and 1-inch thickness, ensuring mobility while globe trotting. The drive also employs a numeric keypad for users to keep it password protected. In order to provide a secured way to protect sensitive data, the lightweight storage device enables users to punch-in their passcode, ensuring Read th