Storage and use of explosives

Do’s

1. Store explosives only in licensed magazine.
2. Always maintain magazine in good condition.
3. Always keep gangway of 60 cm between stack of explosives boxes and wall.
4. Get all lightening conductors on magazine tested for continuity and resistance once in a year. The resistance of lightening conductors should less than 10 ?.
5. Mark license no. And validity prominently on licensed premises.
6. Mark 12 mm thick red line 2.5 m above floor level inside the magazine and do not stack explosives boxes above it.
7. Provide fencing at a distance of 15 m from magazine and keep the fenced area free of vegetation.
8. Always keep stock of explosives within licensed capacity.
9. Always issue old explosives first.
10. Provide security guards round the clock.
11. Keep security guard’s shelter at a distance of 30 m from magazine.
12. Always sell explosives to person/firm having valid licence.
13. Always report loss, theft or short receipt of explosives to controller of explosives and police.
14. Always take precautions to prevent mechanical impact of any hard object with explosives.
15. Always employ certified blaster for blasting operations.
16. Mark ‘danger – explosive’ and ‘turn off radio transmitter’ at the site.
17. Sufficient warning like display of red flag, whistle sound shall be given to public before blasting. Also display blasting time.
18. Suspend blasting operations during thunderstorms.
19. Blasting schedules should be arranged in such a manner that all holes charged with explosives are immidiately blasted on the same day. In case, for any reason, such charged holes cannot be blasted on the same day, these sleeping holes charged with explosives should be properly guarded from a suitable safe distance, till the same are blasted.
20. Always return unused explosives after day’s work to the magazine before sunset.
21. Respect explosives.

Don'ts

1. Don’t sell explosives to blaster on the strength of the shot firer’s permit.
2. Don’t sell explosives to unauthorized person.
3. Don’t undertake construction of building for manufacture or storage of explosives unless you obtain construction approval from licensing authority and NOC from district magistrate.
4. Don’t abandon any explosive material after use at site.
5. Don’t store explosives outside magazine.
6. Don’t use sparking tools.
7. Don’t throw, drop boxes of explosives.
8. Never use bale hook during loading/unloading of explosives boxes.
9. Don’t cut explosives cartridges or change description of explosives.
10. Don’t deface markings on cartridge or box of explosives.
11. Don’t store high explosives and detonators together.
12. Don’t use misfired explosives.
13. Don’t use deteriorated or exuded explosives.
14. Don’t attach detonator to detonating cord until every thing is ready for blast.
15. Don’t use mobile phones/pagers near place of storage and use of explosives.
16. Don’t use iron impliments during preparation of charges.
17. Don’t deliver explosives unless photograph and signature of authorized person are verified.

(B) Transport of explosives

Do’s

1. Always maintain transport vehicle in good mechanical & road worthy condition.
2. Always carry two fire extinguishers in explosives van.
3. In case of breakdown of explosives van, inform controller of explosives and local police.
4. Always carry following documents during transport of explosives:
a) Indent in form RE-11
b) Pass in form RE-12
c) Copy of explosives van’s licence.
d) Bill/invoice.
5. Two armed guard should always accompany explosives van during transport of explosives. In sensitive area notified by MHA, the police armed guard shall be provided.
6. Employ only trained driver and cleaner, whose antecedents are verified by police.
7. Always maintain 300 m distance between two vans carrying explosives.
8. Always load/unload explosives only when explosives van’s

a) Engine of the vehicle is stopped.
b) Wheels chocked.
c) Hand brakes applied.

9. Always avoid routes passing through centre of dense habitation and municipal limits.
10. Always give notice of accident to controller of explosives, District Magistrate and police.

Dont’s

1. Don’t stop explosives van un-necessarily or for longer duration during transportation on road.
2. Don’t transport flammable substance with explosives.
3. Don’t transport detonators with other type of explosives.
4. Don’t carry passengers while transporting explosives in van.
5. Don’t employ any person:

1.
Who is below 18 yrs of age.
2.
Who is in state of intoxication.
3.
Who is mentally or physically challenged.

6. Do not transport explosives in the night (from Sunset to Sunrise) in the sensitive areas notified by Ministry of Home Affairs (MHA).

Dos & Don'ts - Fireworks Display

Dos & Don'ts - Fireworks Display

* Buy fireworks of authorized/reputed manufacturers only.
* Light only one firework at a time, by one person. Others should watch from a safe distance.
* Keep the fireworks to be used at a safer place.
* Organize a community display of fireworks rather than individuals handling crackers.
* Always use a long candle/'phooljhari' for igniting fire crackers and keep elbow joint straight to increase the distance between the body and the crackers.
* Keep two buckets of water handy. In the event of fire, extinguish flame by pouring water from the buckets. Every major fire is small when it starts.
* In case of burns, pour large quantity of water on the burnt area.
* In case of major burns, after extinguishing the fire, remove all smoldering clothes. Wrap the victim in a clean bedsheet.
* The patient should be taken to a burns specialist or a major hospital. Don't panicky.
* In case of eye burns, wash the eye with tap water for 10 minutes and take the victim to a hospital.


Don'ts

* Don't ignite fireworks while holding them.
* Don't bend over the fireworks being ignited.
* Don't ignite fireworks in any container.
* Don't approach immediately to the misfired fireworks.
* Don't tamper with misfired fireworks.
* Don't attempt to make fireworks at home.
* Don't allow small children to handle fireworks.
* Don't throw or point fireworks at other people.
* Don't carry fireworks in the pocket.
* Don't store firecrackers near burning candles and diyas.
* Don't light firecrackers in narrow by lanes; preferably use open areas and parks.
* Don't wear synthetic clothing; preferably wear thick cotton clothing.
* Don't wear loosely hanging clothes; secure all clothes properly.
* Don't apply any cream or ointment or oil on burnt area.
* Don't drive recklessly while taking a burn victim to the hospital; a delay of up to one hour is immaterial.
* Don't light flying fireworks if there is a heavy wind

Maintenance Tips for Your PC


Operating & Environment Conditions

* Do not place a PC directly near a heating or cooling source, such as heating vents or air conditioners. Both excessive heat and cold can damage a PC. This includes putting the PC in the path of direct sunlight.
* Manufacturers often recommend that PCs be in a humidity-controlled environment, but again the PC should not be positioned so that an air conditioner is blowing cool air directly onto the unit (as temperature drops, the likelihood of static electricity increases).
* Keep the PC's air vents and fans unobstructed and free of dust.
* Do not smoke around a PC. Cigarette smoke can damage exposed metal contacts.
* Do not place a PC near water sources that can splash onto the components or drip down into them. This includes open windows through which rain can come and also under plants than can drip water down into them.
* Do not connect power sources directly into wall outlets but rather connect them first to some form of surge protector. Surge protectors prevent electrical surges from destroying hard drives and erasing data.
* Buildup of dust can seriously hamper a PC's capability to cool down, and even if you never open your computer's case dust can still get in through the drive openings. Dust also compromises the lifespan of your PC's hardware. An efficient way to clean dust from the inside of a computer is with compressed air, blowing dust away from the motherboard and other components. You should never blow air directly into a floppy drive as this can cause dust to lodge in the drive and cause it to malfunction. Users who are not familiar with working inside a computer case should take the unit to a professional for cleaning because it is possible to do more harm than good to a computer if you do not know how to safely work inside of a case.
* Always turn off and unplug the system before you clean any of the components inside the case. It is also important to ground yourself to prevent static electricity discharge before touching any components inside.
* Be extremely careful when moving a PC from one location to another. Even small jolts can dislodge chips and expansion boards, so be sure to power off the system before moving it — even if it's only going from one side of your desk to another.
* Save all documentation that comes with your PC and its components. You may need to refer to the documentation if something goes wrong.
* Always shut your system down properly (in Windows use the Start --> Shutdown method) whenever possible. It is also important to respond to warnings and error messages to prevent possible data loss or corruption.

Operating System & Data Maintenance

* Always ensure you have downloaded and installed the latest patches and service updates for your operating system, especially on a Windows-based PC. These updates will fix bugs and security exploits.
* Keep the root directory organized. Only keep your system's startup and software initialization files in the root directory. Application files and their data belong in a separate directory from the root directory.
* Do not store data files in the same directory that you store the software. This will eliminate the possibility of accidentally erasing or overwriting a software file.
* Keep a set of backup rescue disks for the operating system.
* Keep meticulous records of default settings, any changes you make in a system's CMOS setup that differ from the default settings, and any maintenance you perform on the system. You can often use this record to backtrack when you are troubleshooting a problem and will become valuable if you decide to upgrade any of the system's components. It is also possible for the CMOS to lose settings and you will want a record of the setup to reconstruct it.
* Keep backup copies of any important data on a removable medium. Hard drives can fail and having important data on more than one medium can save a lot of stress and headaches.
* If possible use a secondary hard drive in your system for saving files. Your main drive, which is accessed more frequently is prone to mechanical drive failure sooner than your less frequently accessed secondary hard drive would be.
* Over time when you add and remove software, devices and drives, you'll be left with extraneous system registry entries, which can lead to slower performance. You can use system utilities (purchased or good shareware) that will help you keep your Windows system registry cleaned.

Hardware & Hard Drive Maintenance

* Keep records of any expansion cards you install and the procedures you follow to install them.
* Windows has a disk clean up function which will remove temporary files created by programs. This can free up additional hard drive space.
* Defrag your hard drives. A PC runs better with regular disk Defrag. Defragging your hard drive organizes your hard drive so that access to files and programs is more efficient.



* If you are using a trackball mouse be sure to frequently clean the rollers inside to keep the mouse moving smoothly.
* Clean your CRT monitor with standard glass cleaner and a lint free cloth. Be sure to spray the cloth with cleaner and then wipe — do not spray cleaner directly on the monitor.
* Most LCD displays can be cleaned with isopropyl. However, you should check your manual for the manufacturer's cleaning recommendations.
* Extend the lifespan of your computer monitor by shutting it off when not in use.
* Be sure to update drivers and software for your expansion cards, such as video or sound cards. By using updated drivers your hardware usually will run better.

Software Maintenance

* Keep a backup copy of original software, either on CD or DVD. This type of software copying is perfectly legal.
* Be wary of installing file sharing and other peer-to-peer software as they represent a security risk to your PC. While the software itself may very well be virus-free and not represent a security risk, sharing your files and downloading other users' files can be.
* Purge your software. Getting rid of unused software frees up additional system resources and hard disk space. To uninstall software on a Windows PC, use the "Add/Remove Programs" function from the Control Panel.
* For better system performance avoid using shareware (or freeware) wallpaper, screensavers, and similar audio and visual apps. These will usually require extra system resources to run.

Antivirus Protection

* Install an antivirus program that automatically scans for viruses when the system boots.
* Once you have an antivirus program you will need to update the virus definitions daily to ensure your system is protected against the latest threats.
* Do not download any files from the Internet unless you are certain the source is not transmitting a virus to you.
* Do not use any storage media that has been used in another computer unless you are certain the other computer is free of viruses and will not pass the virus on to your system.
* Never open e-mail attachments from people you don't know; and don't open any file attachment that ends in '.exe., All downloaded files should be scanned by your anti-virus application before you run or install it.

List

list of Web service protocols.

BEEP - Blocks Extensible Exchange Protocol
E-Business XML
Hessian
JSON-RPC
Qworum - Defines the concept of Qworum services, which are building blocks for web applications. Qworum services return XML results like conventional RPC services. In addition they can interact with the end-user through web pages during the call, and they can call other Qworum services.
REST (Representational State Transfer)
SOAP - outgrowth of XML-RPC, originally an acronym for Simple Object Access Protocol
Universal Description, Discovery, and Integration (UDDI)
Web Services Description Language (WSDL)
WSFL - Web Services Flow Language (superseded by BPEL)
WSCL - Web Services Conversation Language
XINS Standard Calling Convention - HTTP parameters in (GET/POST/HEAD), POX out
XLANG - XLANG-Specification (superseded by BPEL)
XML-RPC - XML Remote Procedure Call

List of markup languages for web services.

Web template
Web Services Description Language (WSDL) from the W3C
XML Interface for Network Services (XINS) provides a POX-style Web service specification format
Web Services Conversation Language (WSCL)
Web Services Flow Language (WSFL) (superseded by BPEL)
WS-MetadataExchange
Representational State Transfer (REST) versus remote procedure call (RPC)
XML-RPC - XML Remote Procedure Call



A list of web service frameworks:

Name Platform Messaging Model (Destination) Specifications Protocols
Apache Axis Java/C++ Client/Server WS-ReliableMessaging, WS-Coordination, WS-Security, WS-AtomicTransaction, WS-Addressing SOAP, WSDL
Apache Axis2 Java/C Client/Server/ Asyn Support WS-ReliableMessaging,WS-Security, WS-AtomicTransaction, WS-Addressing ,MTOM ,WS-Policy, WS-MetadataExchange SOAP,MTOM, WSDL 2.0, WSDL
Apache CXF Java Client/Server/ Asyn Support WS-Addressing, WS-Policy, WS-ReliableMessaging, WS-Security, WS-SecureConversation, WS-SecurityPolicy, WS-Trust, MTOM SOAP1.1, SOAP1.2,MTOM, WSDL 2.0, WSDL
Java Web Services Development Pack / GlassFish Java Client/Server WS-Addressing, WS-Security, ??? SOAP, WSDL, ???
.NET Framework C#, VB .NET Client/Server WS-Addressing, WS-Security, SOAP, WSDL, ???
Web Services Interoperability Technology Java Client/Server WS-Addressing, WS-ReliableMessaging, WS-Coordination, WS-AtomicTransaction, WS-Security, WS-Security Policy, WS-Trust, WS-SecureConversation, WS-Policy, WS-MetadataExchange SOAP, WSDL, MTOM
Web Services Invocation Framework Java Client ??? SOAP, WSDL
Windows Communication Foundation .Net Client/Server ? WS-Addressing, WS-ReliableMessaging, WS-Security SOAP, WSDL
WSO2 WSF/PHP PHP Client/Server SOAP MTOM, WS-Addressing, WS-Security, WS-SecurityPolicy, WS-Secure Conversation, WS-ReliableMessaging SOAP, WSDL
XFire became Apache CXF Java Client/Server WS-Addressing, WS-Security SOAP, WSDL
XML Interface for Network Services Java Server ? ?? SOAP, XML-RPC, WSDL, JSON-RPC, JSON


Internet Timeline


1969
ARPA (Advanced Research Projects Agency) goes online in December, connecting four major U.S. universities. Designed for research, education, and government organizations, it provides a communications network linking the country in the event that a military attack destroys conventional communications systems.
1972
Electronic mail is introduced by Ray Tomlinson, a Cambridge, Mass., computer scientist. He uses the @ to distinguish between the sender's name and network name in the email address.
1973
Transmission Control Protocol/Internet Protocol (TCP/IP) is designed and in 1983 it becomes the standard for communicating between computers over the Internet. One of these protocols, FTP (File Transfer Protocol), allows users to log onto a remote computer, list the files on that computer, and download files from that computer.
1976
Presidential candidate Jimmy Carter and running mate Walter Mondale use email to plan campaign events.
Queen Elizabeth sends her first email. She's the first state leader to do so.
1982
The word “Internet” is used for the first time.
1984
Domain Name System (DNS) is established, with network addresses identified by extensions such as .com, .org, and .edu.
Writer William Gibson coins the term “cyberspace.”
1985
Quantum Computer Services, which later changes its name to America Online, debuts. It offers email, electronic bulletin boards, news, and other information.
1988
A virus called the Internet Worm temporarily shuts down about 10% of the world's Internet servers.
1989
The World (world.std.com) debuts as the first provider of dial-up Internet access for consumers.
Tim Berners-Lee of CERN (European Laboratory for Particle Physics) develops a new technique for distributing information on the Internet. He calls it the World Wide Web. The Web is based on hypertext, which permits the user to connect from one document to another at different sites on the Internet via hyperlinks (specially programmed words, phrases, buttons, or graphics). Unlike other Internet protocols, such as FTP and email, the Web is accessible through a graphical user interface.
1990
The first effort to index the Internet is created by Peter Deutsch at McGill University in Montreal, who devises Archie, an archive of FTP sites.
1991
Gopher, which provides point-and-click navigation, is created at the University of Minnesota and named after the school mascot. Gopher becomes the most popular interface for several years.
Another indexing system, WAIS (Wide Area Information Server), is developed by Brewster Kahle of Thinking Machines Corp.
1993
Mosaic is developed by Marc Andreeson at the National Center for Supercomputing Applications (NCSA). It becomes the dominant navigating system for the World Wide Web, which at this time accounts for merely 1% of all Internet traffic.
1994
The White House launches its website, www.whitehouse.gov.
Initial commerce sites are established and mass marketing campaigns are launched via email, introducing the term “spamming” to the Internet vocabulary.
Marc Andreessen and Jim Clark start Netscape Communications. They introduce the Navigator browser.
1995
CompuServe, America Online, and Prodigy start providing dial-up Internet access.
Sun Microsystems releases the Internet programming language called Java.
The Vatican launches its own website, www.vatican.va.
1996
Approximately 45 million people are using the Internet, with roughly 30 million of those in North America (United States and Canada), 9 million in Europe, and 6 million in Asia/Pacific (Australia, Japan, etc.). 43.2 million (44%) U.S. households own a personal computer, and 14 million of them are online.
1997
On July 8, 1997, Internet traffic records are broken as the NASA website broadcasts images taken by Pathfinder on Mars. The broadcast generates 46 million hits in one day.
The term “weblog” is coined. It’s later shortened to “blog.”
1998
Google opens its first office, in California.
1999
College student Shawn Fanning invents Napster, a computer application that allows users to swap music over the Internet.
The number of Internet users worldwide reaches 150 million by the beginning of 1999. More than 50% are from the United States.
“E-commerce” becomes the new buzzword as Internet shopping rapidly spreads.
MySpace.com is launched.
2000
To the chagrin of the Internet population, deviant computer programmers begin designing and circulating viruses with greater frequency. “Love Bug” and “Stages” are two examples of self-replicating viruses that send themselves to people listed in a computer user's email address book. The heavy volume of email messages being sent and received forces many infected companies to temporarily shut down their clogged networks.
The Internet bubble bursts, as the fountain of investment capital dries up and the Nasdaq stock index plunges, causing the initial public offering (IPO) window to slam shut and many dotcoms to close their doors.
America Online buys Time Warner for $16 billion. It’s the biggest merger of all time.
2001
Napster is dealt a potentially fatal blow when the 9th U.S. Circuit Court of Appeals in San Francisco rules that the company is violating copyright laws and orders it to stop distributing copyrighted music. The file-swapping company says it is developing a subscription-based service.
About 9.8 billion electronic messages are sent daily.
Wikipedia is created.
2002
As of January, 58.5% of the U.S. population (164.14 million people) uses the Internet. Worldwide there are 544.2 million users.
The death knell tolls for Napster after a bankruptcy judge ruled in September that German media giant Bertelsmann cannot buy the assets of troubled Napster Inc. The ruling prompts Konrad Hilbers, Napster CEO, to resign and lay off his staff.
2003
It's estimated that Internet users illegally download about 2.6 billion music files each month.
Spam, unsolicited email, becomes a server-clogging menace. It accounts for about half of all emails. In December, President Bush signs the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act), which is intended to help individuals and businesses control the amount of unsolicited email they receive.
Apple Computer introduces Apple iTunes Music Store, which allows people to download songs for 99 cents each.
Spam, unsolicited email, becomes a server-clogging menace. It accounts for about half of all emails.
Apple Computer introduces Apple iTunes Music Store, which allows people to download songs for 99 cents each.
2004
Internet Worm, called MyDoom or Novarg, spreads through Internet servers. About 1 in 12 email messages are infected.
Online spending reaches a record high—$117 billion in 2004, a 26% increase over 2003.
2005
YouTube.com is launched.
2006
There are more than 92 million websites online.
2007
Legal online music downloads triple to 6.7 million downloads per week.
Colorado Rockies' computer system crashes when it receives 8.5 million hits within the first 90 minutes of World Series ticket sales.
The online game, World of Warcraft, hits a milestone when it surpasses 9 million subscribers worldwide in July.
2008
In a move to challenge Google's dominance of search and advertising on the Internet, software giant Microsoft offers to buy Yahoo for $44.6 billion.
In a San Fransisco federal district court, Judge Jeffrey S. White orders the disabling of Wikileaks.org, a Web site that discloses confidential information. The case was brought by Julius Baer Bank and Trust, located in the Cayman Islands, after a disgruntled ex-employee allegedly provided Wikileaks with stolen documents that implicate the bank in asset hiding, money laundering, and tax evasion. Many web communities, who see the ruling as unconstitutional, publicized alternate addresses for the site and distributed bank documents through their own networks. In response, Judge White issues another order to stop the distribution of bank documents.
Microsoft is fined $1.3 billion by the European Commission for further abusing its dominant market position, and failing to comply to their 2004 judgment, which ordered Microsoft to give competitors information necessary to operate with Windows. Since 2004, Microsoft has been fined a total of $2.5 billion by the Commission for not adhering to their ruling.



Some Health Tips
Prevention is better than cure.
Good diet, calm mind and adequate exercise are the secrets of health.
A good diet will include fresh fruits and raw vegetables wherever possible.
Self-medication is dangerous. Consult your doctor.
Avoid consulting quacks.
If you have a family history of diabetes, high blood pressure or heart attack consult your doctor and get checked for any early detection.
Regular exercise or games for about 30 minutes a day and at least 6 days in a week will keep you healthy and will improve your memory capacity.
Walking and cycling are much healthier than scooter/motorcycle riding.
More the exercise at your young age (between 15 and 25 years), more the blood supply to the heart, brain, kidney, lungs etc. and a healthier life after the age of 40

.NET Framework

The .NET Framework is designed to fulfill the following objectives:

* To provide a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely.
* To provide a code-execution environment that minimizes software deployment and versioning conflicts.
* To provide a code-execution environment that promotes safe execution of code, including code created by an unknown or semi-trusted third party.
* To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments.
* To make the developer experience consistent across widely varying types of applications, such as Windows-based applications and Web-based applications.
* To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code.

Project Estimations

1. Project estimates must be based on the application’s architecture. Making estimates based on an application’s architecture should give you a clear idea of the length of the entire development project phase. Moreover, an architecture-based estimation provides you a macro-level view of the resources needed to complete the project.
2. Project estimations should also come from the ground up. All estimates must add up, and estimating the collective efforts of the production teams that work on the application’s modules helps identify the number of in-house and outsourced consultants that you need to hire for the entire project, as well as have a clear idea of the collective man-hours required to code modules or finish all features of the application. Ground-up estimates are provided by project team members and do not necessarily match top-level estimates exactly. In this case, it is best to add a percentage of architecture-based estimates to give room to possible reworks, risks, and other events that may or may not be within the control of the project staff.
3. Do not forget modular estimates. Once you have a clear idea of the architecture, it becomes easier to identify the modules that make up the entirety of the application. Knowing the nature of these modules should help you identify which can be done in-house or onshore, or by an offshore development team. Moreover, given the location and team composition of each development team that works on a module, it becomes easier to identify the technical and financial resources needed to work on the codes.
4. Development language matters. Whether the development language is Java, .Net, C++ or any other popular language used by software engineers, team that will be hired for the project must be knowledgeable in it. Some development efforts require higher skills in these languages, while some only need basic functional knowledge, and the levels of specialization in any of these languages have corresponding rates. Most of the time, the chosen development language depends on the chosen platform, and certain platforms run on specialized hardware.
5. You cannot promise upper management dramatic costs from offshoring. While there are greater savings from having development work done by offshore teams composed of workers whose rates are significantly lower from onshore staff, you must consider communication, knowledge transfer, technical set-up, and software installation costs in your financial estimates. Estimating costs is often more about managing expectations, but as the project matures, it should be clearer whether the money spent on it was money that was spent well.
6. Project estimation software and tools help identify “what-if” scenarios. Over the years, project managers have devised ways to automate project schedule, framework, cost, and staffing estimates. Some estimation applications also have sample historical data or models based on real-world examples. If your business has a lot in common with the samples in the estimation tool, it can help you identify what-if scenarios and in turn include risks, buffers, and iteration estimates.
7. Price break-down helps in prioritization. Breaking down the total cost of the project helps management decide which parts of a system should be prioritized, delayed, or even cancel. Estimating costs for a new project may not be easy, but project sponsors and managers must be able to know and agree on the breakdown of costs of development, technical requirements, and overhead.

:: Useful web links List

Site Keyword tags

Abbreviations (1) Acting choices (1) actress-actors (2) addons (1) ads (33) adsense drawbacks (1) advantages (6) advantages of chennai (1) Advantages of Links directory (1) advantages of plastic cheppal stand (1) advices (2) affiliates (1) all ads (1) amazon (1) android (2) articles (34) asp (6) ASP dot Net design issues (1) astrolgy (2) autobiography (2) automobile (1) avoid hacking (1) avoid snake bite (1) backgrounds (1) banners (2) BCS (2) Best category for best collections (1) best PPT Presentations (1) best things (1) biodata (1) blog (1) Blog Advertising (1) blog stats (1) blogger (1) blogger drawbacks (1) blogs (3) Browser errors (2) Browser Issues (5) bus ticketing machines (2) business (2) business loss (11) Business Plan (1) Business rental (1) business wise drawbacks (1) Buying Expired Domains (1) capgemini (1) Car buying tips (1) certified professional (1) cheat frauds (7) Cinema industry (1) cities (15) clients (2) Closed IT/Software companies (1) closed websites (1) codings (21) Commented topics of my blog (1) comments (6) companies (11) Construction (1) contacts (1) Copyright (1) creativity (1) Credit Card Prefix Numbers (1) css (7) CSS drawbacks (1) CSS elements combination (1) CSS errors (2) css ID rules (1) css limitations (1) css links (1) css selectors (1) Cute babies (1) cv (1) demonetization (1) design category (2) disclaim (1) DNS error (1) Documentation (3) domain (2) drawbacks (9) Drawbacks in Madurai bus stand (1) drawbacks of legins (1) drawbacks of strike (2) drawbacks_others (3) duty (1) education (2) electronics (2) emails (1) embedded (2) empty post (1) emptyland (1) Error Code and Message (1) eshop (13) Extra expenses (1) Face detection apps use (1) family (1) FAQ (2) FENG OFFICE (1) finance loans (2) firecrackers (1) firewall nonblockable sites (1) food (3) For sales (1) Free (1) fresh content (6) friends (2) fun (1) general - new - temp (5) GHS (3) girls (8) google (5) google Ads (1) Google Adsense Revenue Sharing Sites (1) government (1) GPS merits (1) graphicsbg (1) Green earth (1) Hacking Methods (1) hand held machines (1) handicapped reservation (1) header wordings (1) health (2) Helpful Slogams (1) HM (1) home shifting (1) how to avoid social media spam (1) HTML (5) html encoder (1) HTML5 website layout (2) IBM (1) IDEA (1) IE (1) IE problems (1) india (1) infosys (1) internet (1) Internet/Social Media Marketing (1) interview questions (4) ISBN (1) IT hardware products for rental (2) IT Hardware-software (2) ja (1) jallikattu (1) javascripts (2) job (7) job analysis (1) joomla (2) KSRTC (1) kvic (1) links (33) links_background verification websites (1) links_blogs (8) Links_certifications (1) links_different websites (1) links_letterwise (1) Links_mobile websites (2) Links_My Designs (3) links_my SMM (2) links_other states (1) Links_Product_brand websites (1) links_Reciprocal Links (1) links_SEO/SEM (1) links_Tamilnadu (1) links_tenders (2) links_tools (2) links_UI design (1) links_use for all* (2) list (1) list of industrial estate (1) list of IT parks (1) list of toll free numbers (1) M2M (1) Madurai (1) Madurai 2020 (1) Mail box folder maintenance (1) Malayalam (1) Malayalam movie my reviews (1) manjula miss (1) Manufacturing Industries (1) marketing (3) marketing ideas (1) me at divisional sports (1) MNC site bugs (1) mobile (4) monthly extra (1) Multiple options in codings (1) my (2) my achievements (1) my achivements (1) My advt - ads (10) My all ads (1) My best collections (1) my best ideas (1) my comments (2) My cousin's post in FB (1) My donations (1) my friends with actor actress (1) My Google dashboard (1) My horoscope (2) my linkedin profile (1) My online interview (1) My Portfolio (2) my posts links (1) My questions (2) my SEO experience (1) my social media profiles (2) my stack overflow profiles (1) My Stackoverflow site answers (2) My works (1) Names (1) nested html (1) Netscape Navigator (1) new blogs (1) New build house for sale (1) New Concepts (1) news (4) online earnings (3) online generators (1) online scams (2) open office drawbacks (1) Open source (2) Opera (1) orkut drawbacks (1) Others view (21) our grandparents (1) Our ID and Numbers (1) outsource statistics (1) own ideas (15) own ideas_aboutme (13) own views (51) page pixel collapse when scrolling in firefox (1) Page Speed Performance (1) parallax scrolling websites (1) Partners (2) Personals (1) photos (23) Photos - art (3) Photos_actress (7) photos_screenshots (1) PHP (3) plans (1) Plots for sale (2) poems (3) policy (1) Pollution Facts (1) powercut (1) Powerpoint (1) press release (1) Problems and solutions - ATM (1) Problems and solutions - Education (2) Problems and solutions - Hardware (4) Problems and solutions - Mobilephones (4) Problems and solutions - NGO (7) Problems and solutions - Software (6) Problems and solutions - Website (7) problems in browsing center/internet cafe (1) Products (16) programmers problems (1) programs (7) proxy software (1) Quality guidelines (2) Rajamani (1) realesate (2) reasons for power shortage (1) Recent comments (1) relatives (2) relatives business (1) resume (1) RS 232 dotmatrix printers (1) rti (1) sales (6) SBI (1) search engine (2) search type websites (1) security (2) Security Alert regarding Serious CMS Attack (1) SEM portfolio (2) SEO Difficulty (1) SEO for blogs (1) SEO portfolio (1) SEO tools (2) SEO-SMM-ORM Plan (1) SEO/SEM (29) sil ads (1) Site Tags (4) siteworth (1) slogans (1) SMS benefits (1) Social Interest - public use (33) social media marketing (13) Social Media Optimization (1) social media widgets (1) softland-palmtec (2) software errors (1) Software Testing (6) Softwares (8) solairaja (1) sports (1) SQL (1) SQL queries (3) stars (1) statistics (10) stop software patents (1) tablet Grip and interaction (1) Tamil - Tamilar - Tamilnadu (22) TATA (1) TCS (1) technicals (11) Technology (5) tenders (4) Testing Tips (1) text magics (1) Thanks (1) Things to do before you die in India (1) Things to Watch in 2014 (1) thirumalai (1) Tips (5) Tips - Buseness tips (23) Tips - Health tips (8) Tips - life tips (18) tips for demo video preparation (1) Tips for doing SEO/SMM (3) Tips for Good-Employee (1) Tips for HR (2) Tips for old money (1) tours (1) Travels (1) TV (1) UI Certifications Q & A (1) UI design (4) useful best software latest versions (1) Useful websites for HTML Developer (1) videos (1) visa (1) vista icons (1) w3c standards (1) wallpapers (2) ways to find a job (1) Web design (9) Web design and developments (34) Web developments (6) Web Services (1) web UI design shapes (1) webhosting (10) Website Features (1) website templates (1) Widgets collections (4) Yahoo (1) சுயசரிதம் (1)