Saturday, October 20, 2007

One of the best German car coming to India: The Volkswagen Passat

Now this particular post is purely for my love for this German car: The Volkswagen Passat. I love everything about this vehicle. I drove this car in 2004 for a month and since then I have been in awe with it. Not only the engine of this is best in world (some may not agree), but it is one of the sturdiest and most reliable cars on the road.

I was so happy to read that Volkswagen would be launching their first “assembled in India” model sometime later this year. The first model that they are launching would be “Luxury Sedan Passat”.

passat_coming to India

In US, Volkswagen Passat costs in the range of $25,000/- (around 9 lakh rupees), but in India with the kind of tax structure we have on Luxury Sedans, it is going to end up costing more than 20 Lakhs - which I think is really not worth it at all. As for me, I will be happy seeing them on Indian roads.

Thursday, October 11, 2007

Microsoft’s spyware strategy

Microsoft’s spyware strategy


Spyware is one of the most vexing challenges to face computer users today. Industry analysts, partners, government leaders, and consumer advocacy groups all identify spyware as a serious problem that threatens to undermine public trust in computing.

As Microsoft and its manufacturing and internet service provider (ISP) partners receive ever more support calls related to spyware, Microsoft continually renews its commitment to deliver a powerful response to the threat.

Defining spyware

The term spyware (and other unwanted software) refers to a wide range of programs designed to take partial control of a computer without the consent of the owner or a legitimate user. Spyware uses this control to generate unsolicited pop-up advertising on a computer, track Web-browsing habits for marketing purposes, or change the configuration of a computer.

Effects of spyware

Spyware can be a minor annoyance, or it can have a serious impact on computer performance, security, and privacy. Common symptoms of spyware infestation include:


Advertisements pop up, even when you are not browsing the Web.


Settings change unexpectedly and are difficult to restore. For example, your browser home page or default search engine might change without your consent.


New, unwanted toolbars appear in the browser and are difficult to remove.


Performance suddenly and dramatically slows down.


Operating systems, Web browsers, and common applications crash more often.

Less common but potentially more harmful forms of spyware can also:


Record keystrokes, which allows the spyware to capture passwords and login information.


Collect personal information, such identification numbers, social security numbers (in the United States) or bank information, and send the information to a third party.


Take remote control of a computer to gain access to files, install or modify software, use the computer to help spread viruses, and more.

All forms of spyware are alike in this respect: they are installed without the user's consent and without the user's knowledge of what they will do.
Answering the spyware challenge

Microsoft is focused on helping to solve the problems caused by spyware and other unwanted software.

As the platform of choice for millions of customers and developers worldwide, the Microsoft Windows operating system provides a foundation for new growth and opportunity. Microsoft's vision rests on providing an open and extensible platform, and powerful core components and open application programming interfaces (APIs) that offer exceptional power and flexibility for software development, innovation, and learning.

The popularity of the Windows platform makes it especially attractive to hackers, criminals, and others who seek to exploit its capabilities and widespread use. The challenge for Microsoft and other responsible technology providers is to take advantage of the platform's power and extensibility, while helping customers protect the integrity of their data and configurations.

Microsoft's goal is to help customers make informed decisions about the software that installs and runs on their computers. The company uses four primary approaches to meet this commitment. Microsoft:


Provides technology.


Provides consumer education.


Works with the software industry.


Works with legislators and law enforcement.

Providing technology

Microsoft's vision includes a commitment to providing technology that helps detect and remove spyware, helps improve Internet browsing safety, and includes timely updates that address the latest spyware threats.

Detecting and removing spyware

Microsoft acquired the Windows Defender security technology from GIANT Company Software, Inc. in December 2004. Windows Defender technology can help customers identify and then disable or remove known spyware and other potentially unwanted software from their computers. The software also provides optional regular spyware scans that customers can choose to be run automatically.

Windows XP Service Pack 2 (SP2) also helps provide protection against some of the most common ways that Web sites and programs install spyware on computers. The Pop-up Blocker in Internet Explorer helps prevent installation from pop-up ads, and the Internet Explorer Information Bar helps suppress unsolicited downloads. In addition, with the Internet Explorer Add-on Manager, advanced users and support professionals can see all installed and running Internet Explorer browser add-ons. This enables them to easily remove add-ons that were installed without their consent.

Improving Internet browsing safety

Windows Defender provides a continuous safeguard by monitoring computer software and looking for changes that are characteristic of malicious Web sites or programs. If Windows Defender detects these changes during an installation process, it alerts the user and asks whether to permit the installation.

Windows Defender uses three tools to monitor software behavior:


Internet agents. These agents help protect against spyware that makes unauthorized connections to the Internet or that changes a computer's Internet access settings (including dial-up or wireless settings).


System agents. These agents help protect against spyware that makes unauthorized changes to the computer's settings (including security permissions, password settings, and other critical system settings).


Application agents. These agents help protect against spyware that makes changes to applications (such as modifying Internet Explorer by adding unwanted toolbars, automatically downloading Internet Explorer add-ons from the Internet, or starting potentially unwanted programs when the computer is turned on).

Updating against the latest threats

As new instances of spyware appear and spread, Microsoft updates Windows Defender to help you protect yourself against the latest spyware threats. You can choose to have Windows Defender automatically download and install new updates, or you can choose to update the software manually. If AutoUpdater is not turned on, a yellow indicator appears in the Windows notification area to alert you when updates are available. You can click the Check for Updates button to download software enhancements and spyware definition updates.

Microsoft spyware team. Researchers at Microsoft work to discover new spyware and other potentially unwanted software, then create and release updates to help detect it.

Windows Defender customers. A network of Windows Defender users also help define which suspicious programs are classified as spyware. Any Windows Defender user can join this network and help report potential spyware to Microsoft. Those who participate in the global network help the Microsoft spyware team discover and respond to new threats quickly so that everyone gets better protection.
Top of pageTop of page
Providing consumer education

Microsoft provides up-to-date information from trusted resources on how to avoid and remove spyware. This helps customers learn what to look out for before they are tricked into downloading spyware by deceptive advertisements, alerts, or sites that bundle spyware with "free" programs. The Microsoft Web site also provides public newsgroups on spyware topics. These newsgroups are monitored by security-focused Microsoft Most Valuable Professionals (MVPs) who assist the online community through forums and discussions of spyware-related issues.

Working with the software industry

Until now, individual industry leaders have used a variety of approaches to address the problem of spyware. This lack of cohesion has limited everyone's ability to make a broad, coordinated impact on the problem. Now Microsoft and other industry leaders work together to share best practices and create common ways to identify and address spyware issues. This cooperative effort has resulted in the creation of common understandings of unwanted software, and industry-standard spyware definitions.

Microsoft is also actively engaged with other industry groups—such as the Center for Democracy & Technology and its Consumer Software Working Group—to help focus regulatory and enforcement efforts on truly deceptive spyware practices. Additionally, Microsoft works with top manufacturing and ISP partners to share best practices that help identify new instances of spyware.

Industrywide best practices provide an incentive for legitimate software publishers to distinguish themselves from less scrupulous publishers. This helps them minimize the risk of being classified with those who engage in unwanted behavior.

Working with legislators and law enforcement

Few laws apply to the development or distribution of spyware. This limits the ability of law enforcement agencies to identify and pursue spyware-related activity. Microsoft works with the appropriate government leaders and law enforcement agencies to help ensure that perpetrators of spyware are forced to cease illegal practices. Microsoft cooperates with law enforcement and regulatory agencies to assist them in their effort to enforce existing laws. (Examples include the PC Fraud and Abuse Act in the United States and similar international consumer protection laws). Consistent enforcement could put the most insidious violators out of business, which would help dramatically reduce the amount and type of spyware produced and distributed.

Microsoft also works with legislators on technologies as needed for those practices not already considered illegal under existing laws. It is important to note that Microsoft believes that any legislation should be carefully crafted to avoid unnecessary regulation on legitimate programs that enhance a computer user's experience.

Vision for the future

The threat of spyware and other unwanted software, like all security threats, is unlikely to be eradicated. Hackers, criminals, and others with malicious intent will always attempt to exploit computers and computer networks for vandalism or profit. Nevertheless, Microsoft is deeply committed to continue its intensive efforts to counteract security threats.

Microsoft is committed to help preserve the right to privacy, and fully supports a person's right to be left alone. Customers must be free to have access to any of their personal information and to control how it is used. They must be able to trust that their personal information is only used appropriately and with their consent. Microsoft regards the protection of customer information as a vital element of trust, and it regards customer trust as vital to the success of its business.

What customers can do

Microsoft invites customers to evaluate Windows Defender.

Microsoft also strongly recommends that customers:


Use an Internet firewall on all computers.


Use up-to-date antivirus software.


Update all computers with the latest security updates, available at Microsoft Update.

Additionally, Windows XP users should install Windows XP SP2, which includes advanced security technologies to help users protect themselves against viruses, hackers, and worms.

Saturday, October 6, 2007





WORLDS MOST EXPENSIVE CARS


According to Forbes, these are the world's most expensive cars. Surprisingly enough, you won't find Lamborghini, Bentley, Ferrari (where's the Enzo?) or Rolls Royce on this list. More after the jump.

10. Maybach 57S - $367,000

9. Maybach 62 - $385,250

8. Porsche Carrera GT - $440,000

7. McLaren SLR - $452,750

6. Koenigsegg CCR - $545,568

5. Saleen S7 Twin-Turbo - $555,000

4. Leblanc Mirabeau - $645,084

3. SSC Ultimate Aero - $654,500

2. Pagani Zonda Roadster F C12S 7.3, Clubsport - $667,321

1. Bugatti Veyron - $1,192,057

Friday, October 5, 2007

BladeCenter HT Chassis

BladeCenter HT Chassis

BladeCenter HT Chassis


  • BladeCenter HT is the right choice for the ultimate combination of high performance and durability in telco, military, medical, government and industrial deployments.


  • IBM BladeCenter HT tightly integrates servers, storage, networking, I/O and applications, allowing clients to build robust and flexible IT infrastructures using common building blocks.


  • Flexible modular technology integrates Intel® Xeon, AMD Opteron, and IBM POWER™ processor-based blade servers supporting a wide range of operating systems.


  • Take command of your Central Office or IT infrastructure with powerful IBM Cool Blue™ technology, a portfolio of products and tools to help customers plan, manage and control power and cooling — helping to build greener networks and infrastructures.


  • BladeCenter Open Fabric is a highly adaptable portfolio of products and tools that delivers a flexible, open, connected infrastructure to help optimize application performance.


  • A powerful set of management tools help simplify the IT environment. BladeCenter provides tools that are open, easy and seamlessly integrated, allowing you to focus on your business, not your networking or IT.


  • Dramatically increase high-speed connectivity and throughput with multi-terabit networking (more than 1.2 Tbps internal chassis throughput on backplane) and 40 Gbps aggregate internal throughput per blade server


  • Improve network flexibility and interoperability bridging new services to control gateways supporting SS7, VoIP, legacy PSTN, WAN devices and network interfaces with special purpose telecommunications blades


  • Efficiently consolidate network resources while delivering high scalability for NGN applications such as IPTV, VoD and IMS, with higher port concentrations and 10 Gbps Ethernet network bandwidth


  • Certified testing by Underwriters Laboratories® (UL) of the BladeCenter HT chassis is in progress, and when complete, the BladeCenter HT chassis will be covered under a UL-certified NEBS Level 3/ETSI test report, which will be available for review with customers

BladeCenter HT helps reduce network infrastructure costs while increasing network infrastructure performance and flexibility—making it the ideal platform to run your next-generation network (NGN) end-to-end infrastructure applications.

Product features Hardware summary
  • Chassis features the functionality of BladeCenter with the added performance capabilities of multi-terabit networking (more than 1.2 Tbps throughput on backplane), a 10 Gbps-capable fabric and a very robust thermal solution.
  • Delivers increased network infrastructure performance ideal for telecommunications Service, Control and Transport plane applications
  • Improves network flexibility and interoperability via support for many blade processor types and operating systems
  • Advanced proactive management, providing rich and broad systems management capabilities
  • Certified testing by UL of the BladeCenter HT chassis is in progress, and when complete the BladeCenter HT chassis will be covered under a UL-certified NEBS Level 3/ETSI test report, which will be available for review with customers
  • Three-year planned production life
  • 12U rack-optimized chassis supporting up to 12 blade server bays
  • Supports high-performance dual-core and quad-core Intel Xeon, AMD Opteron and IBM POWER and a wide variety of operating systems, including Linux®, Windows®, IBM AIX® and Sun Solaris 10
  • Up to four traditional hot-swap and redundant switch modules supporting Gigabit Ethernet and Fibre Channel
  • Up to four new high-speed capable switch module bays supported by 10 Gbps fabric
  • Up to four hot-swap and redundant load-balancing power supply modules, DC or AC power
  • Four hot-swap, redundant fan modules
  • Redundant removable media trays with optional Compact Flash, two external USB ports and full alarm management panel
  • High-availability midplane helps enable maximum uptime and enhances investment protection for future technologies
  • Hot-swappable midplane active components help provide maximum reliability for deployment into a telecommunications central office
  • Demonstrated history of compatibility so operators can standardize on a particular configuration for extended period of time

Wednesday, October 3, 2007

BMW Debuts Its 2008 1 Series Convertible

BMW Debuts Its 2008 1 Series Convertible

BMW has launched its BMW 1 Series Convertible, the fourth model in its series. The vehicle features an electro hydraulic operated soft top that closes within 22 seconds and can accelerate from 1 to 100km/h in 5.6 seconds. The convertible also includes BMW's Efficient Dynamics system in all engine models.

For those whose definition of pure driving pleasure includes wind in the face and sunshine above, the new BMW 1 Series Convertible follows the tradition established by the iconic BMW 2002 sport sedan. The essence of such driving purity - a responsive six-cylinder engine positioned within a rear-drive chassis to provide balanced, sporty dynamics - is at the heart of this compact four-place convertible.

The 128i Convertible, which joins the new 1 Series Coupe going on sale in the spring of 2008, will be powered by BMW's 3.0-liter, 230 horsepower inline six-cylinder engine generating 200 lb-ft of torque. Like its fixed-roof stablemate, the 128i Convertible will feature Valvetronic valvetrain management and aluminum/magnesium cylinder block construction-core elements of BMW's EfficientDynamics.

The 135i Convertible, on sale later in 2008, features BMW's twin-turbocharged 3.0-liter inline six-cylinder engine producing 300 horsepower and 300 lb-ft of torque from as low as 1,400 rpm. With its direct piezo gasoline injectors, twin low-mass turbochargers and air-to-air intercooler, optimum performance and economy is achieved with no loss in engine response. For the 135i Convertible, acceleration from 0-62 mph is accomplished in 5.6 seconds and top speed is electronically limited to 155 mph. Both engines feature on-demand engine coolant pumps that improve fuel economy and reduce parasitic losses for increased efficiency.

What to do after a car accident



What to do after a car accident


Your heart is beating hard, you're breathing fast and you can't believe you just got into an accident. Look around. You're alive? Good. Everyone else? Even better. Now here's what you need to do once the dust settles.

You should:

  • Keep your auto insurance information in the glove compartment, including a pre-printed form allowing you to provide the particulars of any accident, including a sketch of the scene. (Even better, use that disposable camera you keep in the car. You don't? You should.)
  • Stay at the scene of the accident until police have come and gone, making sure you have the name of the officer(s) and that they have your version of what happened. Do not assume a police report will "take you off the hook" or even that one will be generated in the event of a minor accident ("minor" may mean no one is injured even though your car suffers a direct hit).
  • Exchange names, addresses, driver's license and insurance information with the driver of the other car.
  • Review your policy to make sure of your coverage. Make a list of questions and related information you want to know.
  • Report the accident promptly to your insurance company. This may not seem wise or necessary to you. The accident may be minor, you may not want to risk seeing your rates rise or you may live in a no-fault state and think that the other driver's insurance company will pay for everything. But state laws generally protect you from higher rates unless an accident was your fault. And even though you may think no-fault lets you off the hook for the other driver's medical expenses, it does not. It simply says his insurance will pay for his expenses (up to the limits of his coverage), regardless of who is at fault. But rest assured his insurance company will come knocking on your insurer's door seeking repayment if it believes you were at fault in the accident. The point is, your insurer should be informed.

Think that's the end of it? Read on.

Admit it. You've never read your auto insurance policy, you don't want to read it and even if you're in an accident, you're still not sure if it would force you into those endless lines of fine print and insurance-speak. Assuming you can even find the policy.

If you can, look in the back for what are called the conditions of your policy -- what you are supposed to do in the event of an accident. These requirements are pretty straightforward, although compliance may seem like a hassle when you're already upset by the accident itself. But you may forfeit some of your rights if you don't follow these instructions.

Next, look at the cover sheet of the policy, which is called the declarations page and which lists the types and dollar limits of your coverage, including short-hand references to any discounts or special provisions you have elected to purchase.

Last, there's the actual insuring agreement itself, which explains what your insurer is protecting you against, including definitions of terms used in the agreement and explanations of what's not covered (called the exclusions).

If you don't understand your policy, keep calling your agent and/or state insurance department until you get clear answers to your questions. Most people have heard that ignorance is no defense under the law, but they don't think they'll ever have to find out. Auto accidents are one of the most common ways to discover the sobering cost of ignorance.

The payments

Hopefully, your accident involves only damages to things and not to people. And, hopefully, it wasn't your fault.

Even if it's just your car that's banged up, repairs can be a major headache. This is where the reality sets in that replacement cost is not the same thing as market value. Your car can easily be declared a total loss even though the money you'd receive is nowhere near what it would cost you to replace the vehicle.

The best advice about getting your car fixed is to remember that the money may be coming from the insurance company but you should control the repair process. This means refusing to settle for a repair job you don't like. And it may also mean refusing to accept the use of generic replacement parts instead of the original manufacturer's parts (your policy may give your insurer the right to use generic parts, so it's important to check the fine print to know your rights). Even if your favorite shop doesn't do the repairs, you can still have your mechanic look at the car (although this may be at your personal expense) and provide an assessment of what should be fixed. Ultimately, it's your car and your call about what's done to it.

Talk to your agent and/or insurer about your rights (better still, you should really ask these questions before you buy a policy). And if you don't like the answers, call your state insurance department.