Tuesday, October 25, 2011

Facilities at Google, Facebook and Twitter Workplace

Are you a techie looking for work? We recently offered some tips on landing jobs at Google, Apple and Facebook, but there are more companies in the Valley than those three. And you might be wondering what the culture is like at each of these companies, as well as at LinkedIn, Twitter, Eventbrite, Gaia and Tagged.

Back in August, we brought you word of awesome perks at various startups; now, we bring you perks at a number of Silicon Valley’s largest and finest. From yoga to catered lunches, 401(k)s to dry cleaning, sports teams to vacation days, these tech companies seem to understand that quality of life affects productivity — and that having to run fewer errands after work means you’re more likely to stay at the office.

Check out the info graphic below from ResumeBear for a breakdown of who offers what perks. Do you work at any of these companies and take advantage of any of these perks? Let us know in the comments below.

facilities for Google Facebook and Twitter Employee

Tuesday, October 18, 2011

Increase mozzila browsing performance

How To Remove Mozilla Hanging Problem

"From Last some days I am facing the hanging and show working problem while using Mozilla Firefox and finally I got the final solution to resolve this problem and I want to share this to my all friends"
                  To improve performance when navigating (studies show that 39% of all page navigations are renavigations to pages visited less than 10 pages ago, usually using the back button), Firefox implements a Back-Forward cache that retains the rendered document for the last five session history entries for each tab. This is a lot of data. If you have a lot of tabs, Firefox’s RAM memory usage can climb dramatically. It’s a trade-off. What you get out of it is faster performance as you navigate the web.

Reduce the amount of RAM Firefox uses for it’s cache feature:

Lets know how to do it:
  • Type “about:config” (no quotes) in the address bar in the browser.
  • Find “browser.sessionhistory.max_total_viewer
  • Set it’s value to “0“(Zero)

Increase the Speed in Which Firefox loads pages:


1. Type “about:config” into the address bar and hit Enter.
(Normally the browser will make one request to a web page at a time. When you enablepipeliningit will make several at once, which really speeds up page loading.)
2. Alter the entries as follows:
Set “network.http.pipelining” to “true
Set “network.http.proxy.pipelining” to “true
Set “network.http.pipelining.maxrequests” to some number like 10.
This means it will make 10 requests at once.
3. Lastly, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0“;.(Zero)
This value is the amount of time the browser waits before it acts on information it receives. If you’re using a broadband connection you’ll load pages faster now.
Optionally (for even faster web browsing) here are some more options for your about:config (you might have to create some of these entries by Right Click –> New– > Interger or String
network.dns.disableIPv6: set “false” 
content.notify.backoffcount”: set “5“; (Five)
plugin.expose_full_path”: set “true”.
ui.submenuDelay”: set “0; (zero)

Reduce RAM usage to 10mb when Firefox is minimized:


(This little hack will drop Firefox’s RAM usage down to 10 Mb when minimized)
1. Open Firefox and go to the Address Bar. Type in about:config and then press Enter.
2. Right Click in the page and select New -> Boolean.
3. In the box that pops up enter “config.trim_on_minimize”. Press Enter.
4. Now select True and then press Enter.
5. Restart Firefox.

These simple tweaks will make your web browsing with Mozilla Firefox 2-3 times faster and easier.

Sunday, October 16, 2011

Mozilla to Develop OS based on android!

Mozilla, who are renowned for their successful internet browser, are entering the mobile race, developing a new web-centric OS that will directly compete with Google, Apple and Microsoft.
mozilla developing OS based on android

                   If the name Mozilla rings any bells it's because they're the tech boffins who put together Internet Explorer, the browser that Windows defaults to. Mozilla took the leviathan computing company on with its Firefox browser, and today it stands as the second most popular browser worldwide.Now the company who was underdog to Microsoft looks to be playing the same role, but this time against internet mogul Google.

                  Announced on the Mozilla discussion forum, Mozilla have begun coding for phones and tablets. The BBC revealed the mobile operating system will draw on Android code, with Mozilla writing as much fresh code as possible. The hybrid-like operating system will be named Boot To Gecko. 

                   It is an unusual name for an OS, until you remember Gecko is the rendering engine employed by the Firefox browser that interprets web page coding and displays it in a screen-friendly format, a homage to its origins. Even though Android coding will form the operating system's foundations, Mozilla hope to add a much more open wrapper around it than Google currently do, making it more versatile as an operating system.

Often, when you select a link from an application native to the Android or iOS market, the operating system will have to open a new webpage in the browser. Boot To Gecko aims to limit this by making applications much more web-centric.

If the venture proves successful, Mozilla will be waging war against industry giants, with Google, Apple and Microsoft dominating many facets of the technological world. 

Mozilla have acknowledged the project is in infancy and have chosen to make the development public in hope it will attract talented enthusiast coders who will contribute to the Boot To Gecko's cause.

Researcher Andreas Gal, who announced the development, admits the company has set a high target, but wants to do it "the way we think open source should be done. 
Gal says his ultimate goal is to break "the stranglehold of proprietary technologies over the mobile device world," implicitly referring to the practices of Apple, Windows Phone and Google.

Thursday, October 13, 2011

How to increase your wi-fi signal

Increase your Wi-Fi Signal speedBest technique to boost your Wi-Fi Signal with an Empty Can of Coke

"A piece of Aluminum foil is probably the easiest and cheapest way to boost your Wi-Fi signal"

You just need to position the foil behind the antenna of your wireless router and the curved foil will then direct the Wi-Fi signals in your preferred direction thus boosting the overall signal strength.

Other than using an Aluminum foil, as Kim Komando explains in the following video, you may also make your own Wi-Fi extender at home using an empty can of beer or soda.

The cans are obviously more sturdy than the foil and the can’s lid acts as a stand but you need to be a bit more careful while cutting the can’s body with that knife. Also make sure that the can’s inner body is completely dry before you slip it into the router’s antenna.

"Increase Wi-Fi Range with a Beer /Soda Can"

Tuesday, October 11, 2011

Chrome extension enables remote computer control

"Chrome Remote Desktop BETA is the first installment on a capability allowing users to remotely access another computer through the Chrome browser or a Chromebook"

remote computer control using Chrome extension

Months of work on "chromoting" have reached fruition with Google's release on Friday of a new Chrome extension to let a person on one computer remotely control another across the network.

It is fully cross-platform, so you can connect any two computers that have a Chrome browser, including Windows, Linux, Mac and Chromebooks. 
Chrome remote desktop sharing
           The Chrome Remote Desktop beta version, which arrived Friday, is a browser-based equivalent of remote desktop software for conventional operating systems. Such software is handy for IT administrators managing employees' machines, people taking care of their relatives' computers, or individuals getting access to their own machines from afar.

           It's that latter category that likely was a very important factor in the development of the technology. Google's Chrome OS is geared in part toward organizations that want to lower their computer administration costs, and remote management is an important factor when it comes to that goal.
Chrome remote desktop connecting process

Using the Chrome remote desktop extension requires that the person sharing access to a computer give an access code to the person who will tap in to it remotely.
The technology right now is limited so that permission must be granted each time remote administration is activated. "This version enables users to share with or get access to another computer by providing a one-time authentication code. Access is given only to the specific person the user identifies for one time only, and the sharing session is fully secured," the release notes said.
Technology and Protocols Used For Implementation

  • Bottom layer is p2p connection established by libjingle [a Google collection of peer-to-peer software tools], this can be UDP, TCP, or relay through Google.
  •  We use PseudoTcp implementation in libjingle to provide reliable connection.
  • On top of that is SSL connection.
  •  Protobuf [Google's protocol buffers software] is used for structured data and framing.
  • Graphics is encoded using VP8 [Google's video codec]. 
The implementation is open-source," with source code available through the Chromium project that underlies Chrome.

Tips to manage your windows files and folders

How to organize files and folder of your computer to save searching time?

"There are a lot of methods and techniques for managing or organizing computer files into appropriate folders and sub folders into folders with high efficiency, increased productivity and reducing searching time"

The following 8 tips will help you for organizing your computer files.

1. Use Documents : 
how to manage windows file and folders                                   For many reasons, it's smart to take advantage of the Documents feature, which is called Documents in Windows 7 and in Windows Vista and is called My Documents in Windows XP. To open Documents in Windows 7 and Vista, click Start, and then click Documents to discover an easy way to store your personal documents.

In Windows 7, the Documents feature is actually a virtual library. By default, the Documents library includes your My Documents or Documents folder and the Public Documents folder. You can customize the Documents library (in addition to the Music, Pictures, and Videos libraries that are also included by default) in Windows 7 to group files and folders from any location on your computer—without actually moving them. Or you can build your own libraries to easily organize your files. Learn more about working with libraries.

2 : Adopt consistent methods for file and folder naming : When learning how to manage files and folders, it is important that you develop a naming scheme for the kinds of files you create most often and then stick to it. To change an existing file or folder name, right-click the name in the folder structure. ClickRename, and then type the new name.

3: Keep names short : Even though you can use long file names in Windows, you should not necessarily do so. Long file names can be harder to read.

windows file management
Let your folder structure do some of the naming. For example, rather than creating a file called Great American Novel Chapter One First Effort, you can build a structure like this

4: Separate ongoing and completed work : To keep the Documents folder from becoming too unwieldy, use it only for files you're actively working on. As a result, you can reduce the number of files you need to search through and the amount of data you need to back up. Every month or so, move the files you're no longer working on to a different folder or location, such as a folder on your desktop, a special archive folder, a flash drive, an external hard disk drive, or even a CD.

5: Use shortcuts and shortcut links instead of multiple copies : If you need to get to the same file from multiple locations, don't create copies of the file.Create shortcuts to it instead. Shortcuts are links to files or programs and are represented by icons with an arrow in the lower-left corner. To create a shortcut, right-click the file and then click Create Shortcut. You can drag the shortcut to other locations. 

6: Quickly get to the items you use every day : Jump Lists, a fun new feature in Windows 7, are lists of recently opened items, such as files, folders, or websites that are organized by the program that you use to open them. You can use a Jump List to open items, and you can even pin favorites to a Jump List. 

Mostly liked readers tip

    windows file and folder management techniques
  • Use abbreviations.
  • Use thumbnails or icons.
  • Use common names. 
  • Don't save unnecessary files. 
  • Use Recent Items. 
  • Put Documents on the desktop. 
  • Organize files by dates. 
  • Color-code your folders: Use a third-party program which allows you to "color" certain folders in Documents. This helps you find your documents even more quickly and is especially useful with folders that you use every day.

Sunday, October 9, 2011

How to Block Unwanted Websites

Want to block unwanted websites and ads popping up in your browser ? This can be done by a little windows hack.Try this for fun.
how to block unwanted website

  • Go to C:\WINDOWS\system32\drivers\etc\  and open the file hosts in a notepad
  • Go to the bottom and in a new line Write    

0    site_to_block.com
process for blocking a website

  • Write the site you want to block in place of  site_to_block.com
  • After that Save it and try to open the blocked site in your browser. It shows up an error.
  • You can also do this by a piece of software Website Blocker

Thursday, October 6, 2011

Apple's new iPhone 4S features:Better Graphics, Speed, Speech and Signal

Apple’s IPhone5: Features, Images , Videos, Comparison with iPhone4 and much more..

apple iphone 4s features"The device has lots of technical upgrades, and one feature -- the new Siri -- did get rabid, enthusiastic response from the audience," Wisdom, principal of Wisdom Consulting, told MacNewsWorld.

apple iphone5 features
Don’t get mislead by the outer look of iPhone 4s because may be its looks like the same as iPhone 4 but its all new inside. With a new chip , new camera , new antenna , and with new guts it has almost everything you wanted.

Apple has unveiled its new iPhone 4s at an event in Cupertino California. Tim Crook as the CEO reveals the most amazing iPhone. Steve Jobs the founder of the Apple did not show up at the event but yet Tim Crook handle the stage nicely.The new iPhone 4S, which comes with 16, 32 or 64GB of storage, will be released in seven countries, including Britain, on October 14th.

New Features in iPhone 4s

    new features in iphone 4s
  • Siri:

Use your voice to send messages , set reminders , search for information , and it will work as you assistant and you can just fix your meetings by just communication orally with your 4s.

  •  8 MegaPixel Camera:
Apple iphone 4s camera
  •             iOS 5:

iphone 5 camera 


"This is going to give the Android folks and the Microsoft (Nasdaq: MSFT) folks a huge amount of confidence that they can move against Apple because it makes Apple look weak," 
iPhone4 vs iPhone 5

Apple4 Vs iphone45

The iPhone is now Apple’s most successful product. More than 20 million iPhones were sold in the second quarter of this year, despite the growing likelihood of a new model.

Tuesday, October 4, 2011

Verify OR Identify a fake email address

How to Verify if an Email Address Is Real or Fake?
"In a simple solution send a test mail to that email address(say abc@example.com) and if your message doesn’t bounce, it is safe to assume* that the address is real."

[*] Some web domains may have configured a catch-all email address meaning that messages addressed to a non-existent mailbox will not be returned to the sender but in most cases, such email messages will bounce.
Verify using Ping:

When you send an email to someone, the message goes to an SMTP server which then looks for the MX (Mail Exchange) records of the email recipient’s domain.

For instance, when you send an email to xyz@gmail.com, the mail server will try to find the MX records for the gmail.com domain. If the records exist, the next step would be to determine whether that email username (xyz in our example) is present or not.

Using a similar logic, we can verify an email address from the computer without actually sending a test message.
Process: Follow the following steps with me.
Ex. Check if the address pavan@gmail.com exists or not?
  • Enable telnet in Windows.  Or if you already have the PuTTY utility, skip this step.
  • Open the command prompt and type the following command:
             nslookup –type=mx gmail.com

[This command will extract and list the MX records of a domain as shown below. Replace gmail.com with the domain of the email address that you are trying to verify.]

       gmail.com MX preference=30, exchanger = alt3.gmail-smtp-in.l.google.com

       gmail.com MX preference=20, exchanger = alt2.gmail-smtp-in.l.google.com

       gmail.com MX preference=5,  exchanger = gmail-smtp-in.l.google.com

       gmail.com MX preference=10, exchanger = alt1.gmail-smtp-in.l.google.com

       gmail.com MX preference=40, exchanger = alt4.gmail-smtp-in.l.google.com
  • As you may have noticed, it is not uncommon to have multiple MX records for a domain. Pick any one of the servers mentioned in the MX records, may be the one with the lowest preference level number (in my example, gmail-smtp-in.l.google.com), and “pretend” to send a test message to that server from you computer.
now type the following commands in the listed sequence:
      1. Connect to the mail server:
                 telnet gmail-smtp-in.l.google.com 25 

       2. Say hello to the other server


       3. Identify yourself with some fictitious email address

                 mail from:<pavan@codeimagine.com>

       4. Type the recipient’s email address that you are trying to verify:

                rcpt to:<pavan@gmail.com>

Result: The server response for ‘rcpt to’ command will give you an idea whether an email address is valid or not. You’ll get an “OK” if the address exists else a 550 error like:

Online Tools to Verify the Email Address:

2. Rolosoft
3. Emailfinder

Always Remember:
  • Look closely at the email address. If the alphanumeric string before the @ sign is gibberish, with a lot of letters and numbers intermixed, it can normally be considered a fake email address. The only time you would actually open an email with an email address of this type is if you know the sender. 

  • Many crooks are taking advantage of free email services online. You can spot a fake email address easily when it starts with a known company name and finishes up with an @(add free email service provider here).com. This can also be true of lottery and banking scams, as they will try to trick you into believing they are having you contact a banking institution at a free email address.
  • Clues within the email message can help you recognize a fake email address. A message that is "urgent" or that needs "immediate attention," ones with spelling and grammatical errors, any email asking for personal information, like passwords or bank account numbers, and emails with impersonal greetings (e.g. "Dear valued customer").

Saturday, October 1, 2011

10 Technology Myths

technology myths

Sqaush these 10 Technology Myths

Ah, the world of tech myths! Despite countless efforts to kill them, a host of myths continue to persist. Some of them are result of plain ignorance while a few had genuine lineage but as the technology moves forward, do not hold true anymore.

We take a look at 10 of these fallacies and squash them.

More mega pixels mean better picturesWe wish it could be true. Because then we all would have been pro photographers. More mega pixels were a big deal when digital cameras were new. But once the threshold of five mega pixels was reached, the number stopped being the most important factor in a camera.
In any modern camera, image quality primarily depends on sensor size and quality of lens. This is the reason why you are likely to get better images from say a Nikon D40, a 6 mega pixel camera, than a new point-and-shoot slick camera that can capture photos in 14 mega pixels.

Higher dynamic contrast ratio is betterMonitor and TV makers love to bandy about dynamic contrast ration. For example, Acer says its S231HL monitor has a dynamic contrast ratio of 12,000,000:1. In reality, this number doesn’t mean anything.

This contrast ratio can be achieved only when the monitor is displaying a completely black image. During normal use, the ratio is likely to be lot less than the static contrast ratio, which is 1000:1. Dynamic contrast ratio is a just a marketing scam so steer clear of that.

More RAM in a graphics card is betterThis is another marketing scam. And many gamers fall prey to it. In a graphics card, everything depends on the kind of processing chip that is used and not on amount of RAM. While buying a graphics card users need to pay close attention to the name. For example, AMD Radeon HD 6850 with just 1GB RAM will be more than four to five times faster than AMD Radeon 6450 with 2GB RAM.

Macs don't have virusesIt’s not really a myth. There is some truth to it. People using Apple’s MacBook, iMac or Mac Pro are less likely to face computer viruses. But this is not because Apple’s computers or operating software are virus-proof. The fact is that cyber criminals largely focus on Windows because that is used by majority of people. But as popularity of Apple’s computers increases, cyber criminals are taking note and new viruses and trojans on Mac have started appearing.

Right click+refresh makes PC fasterAround 15 years ago, computers were always running out of memory. RAM was very expensive and most computers had just 4MB to 8MB RAM. Then, there were poorly-coded applications that caused memory leaks. This led to the practice of right click+refresh on the desktop as by refreshing the display or in other words Explorer, in some cases users quickly reclaimed free RAM after closing a process.

On modern computers, which have ample RAM, doing a right click+refresh is nothing more than a foolish habit.

For graphics work, a Mac is bestThis one too was true sometime back. But now it’s more of a myth than a fact. Before 2006, Apple was using processors based on PowerPC architecture by IBM. Compared to Intel or AMD processors, PowerPC chips had an advantage in graphics-heavy work. But after 2006, Apple shifted to Intel processors. A Mac still has some advantage in font management as well as quality of bundled monitor. But if you are a graphic designer who knows your trade well and who takes care while choosing his gear, you don’t need to pay premium and buy a Mac just because someone told you that it is better for graphics work.

To delete a file permanently, delete it from Recycle BinAfter deleting a sensitive file from recycle bin, never think that you have obliterated it. Using recovery programmes, even a kid can retrieve the file back. When you delete a file from recycle bin, Windows just changes its file name and makes it invisible to user. The file does not get deleted unless it is overwritten, which happens over a period of time when you create new files.

CPUs with more cores/Ghz are betterAnother marketing lie. In any processor or computing chip, the underlying architecture is what matters. This is the reason why even slower AMD Athlon processors were considerably faster than Pentium 4. And the architecture is reason why nowadays a four-core Sandy Bridge processor from Intel is faster than six-core processors that AMD sells.

You need to buy expensive security softwareThis was true when no good security software were available for free. But situation has changed a lot in the last few years. Nowadays, if you want some cyber security on a home computer you don’t really need to spend any money.

Microsoft Security Essentials, which is a free dowanload, will do the job. And so will free anti-virus programs from AVG, Avast or Avira.

You need to stop a USB drive before taking it outThis is true but partially. If there is a file transfer going on, which means if you are moving files between pen drive and computer, you may need to stop USB drive before unplugging the pen drive.

But if there is no file transfer happening, you can pluck out the pen drive right away. We assure you that it won’t go up in flames.

Search Only Code with the Website of Programmers & Developers

If you are a programmer or a web developer who often needs to shuffle between writing code in multiple languages, check out searchco.de – this is an instant search engine for all programming related documentation and nothing else.

search code for web developers

You type a function name and searchco.de will pull a list of all languages where that function is available along with the syntax and description. Alternately, you may prefix the function name with the language name – like jquery slide - to limit your search results to a particular language.

In addition to regular programming languagessearchco.de also indexes documentation for Windows and Linux commands.

However, if you are looking to search for code snippets or to debug problems in your existing code, Google’s Code Search is still your best friend. You can even find code using regular expressions, a feature that is not available inside Google's web search.

Google Code Search is part of Google Labs so am not too sure if it will survive once Google retires the Labs section altogether.

       Google Code Search

Powered by Code Imagine