Technology News

Instant Messaging Etiquette

  • Inquire
    It is simple etiquette to inquire if the person on the other side has time to chat. To do this you can send a simple message like Hi, can we chat? If the person on the other side replies in the negative, it is important to respect their decision and try another time.
  • Keep your messages brief
    Instant messages should be short and sweet! If you find that you would like convey more in a message then it would be better to either pick up the phone or switch to email.
  • Be careful what you write
    Instant messaging is similar to placing words in a place for all to see, it is thus better to write messages that portrays you in a good light. Remember that instant messages can be saved and forwarded!
  • Keep the message informal
    Using IM to break up with a boyfriend, reprimand an employee or criticize a colleague is a strict no-no. If you need to do any of the following, be brave and tell the person what you feel about them face-to-face.
  • Do not BUZZ
    It's a big NO NO. You should not Buzz your Seniors (in office) and people elder to you. It's shows disrespect.
  • Use jargon sparingly
    Everyone who uses instant messaging may not be comfortable with jargon and abbreviations. It is thus important to first gauge the situation and use jargon appropriately.
  • Use emoticons to express yourself
    If you want to display some emotion use the emoticon. Cute, funny and sad – you can display any emotion using this feature.
  • Avoid careless writing
    Be careful while writing messages because typos are a real turn off! Also remember not to criticize another person's typing.
  • Be careful when multi tasking
    Often communication skills are taxed when you carry on more than one IM conversation, or a phone conversation. It is better to do one action properly rather than ruin all of them.
  • Use message alerts
    Use the instant messaging alerts to let others know when you are going to be out of touch. You can let your creativity flow to make the messages more informative. Go ahead and have some fun!
  • Follow the code of conduct
    Use the instant messaging service appropriately. Do not use another login id to spy on your friends. If you do not want to be disturbed, it would be better for you to avail of the services that are offered on IM.

Mobile Number Portability

Here is a Step By Step Approach on Switching your Mobile Operator while retaining the same Phone Number.

  • Subscriber sends SMS to Donor (existing operator) on '1900'
  • You should send an SMS – PORT <10 Digit Mobile Number> to 1900. For example – PORT 9884098840 if your mobile number is 9884098840
  • Subscribe receives a 8-digit Unique Porting Code (UPC) from '1901'.
  • Subscriber to visit the operator's (Recipient) store and fill up a 1-page application form mentioning the UPC and may be required to show the SIM card for authenticity. May have to pay migration fees (maximum of INR19) depending on Recipient's policy. Will be issued a new SIM card by the Recipient.
  • Subscriber will have to apply for all value-added services including Ring tones, Voice mail activation etc. For all purposes the Recipient to treat it as a new application. So none of the existing services will be automatically transferred.
  • Recipient informs the Donor about the customer's decision to switch
  • Donor likely to check with the Subscriber on the reasons for the switch and may try to retain by offering some attractive schemes
  • If Subscriber decides to stay and not switch then will have to submit a cancellation request within 24 hours to the recipient by visiting the store and hand over the new SIM card.
  • Donor will get 24 hours to either retain or arrange to port the subscriber. If Donor fails to inform clearing house on either action the process to switch will commence automatically at the end of the 24-hour deadline.
  • The switch over to take place between 10pm and 5am. The subscriber to remain disconnected for a maximum of two hours.
  • Recipient to start the mandatory subscriber verification procedure.

Microsoft says Windows 7 Service Pack 1 due in first half 2011
ZDNet (blog)
By Mary Jo Foley | July 20, 2010, 12:01pm PDT Many of the Microsoft watchers and customers I know have been expecting Microsoft to ship the first service ...
See all stories on this topic »
Microsoft gives Adobe Reader a Protected Mode
Ars Technica
By Emil Protalinski | Last updated July 20, 2010 5:19 PM Microsoft has been helping Adobe develop a sandbox similar to the Protected View in Office 2010. ...
See all stories on this topic »
Microsoft Announces Beta of Next Microsoft Security Essentials
PC Magazine
Microsoft said Tuesday that it had begun making available the first beta of the next version of Microsoft Security Essentials, its free security service. ...
See all stories on this topic »
Microsoft, Yahoo begin testing search alliance
Seattle Post Intelligencer (blog)
Microsoft and Yahoo are beginning to test their combined search-advertising platform as the companies prepare to migrate Yahoo advertisers over to ...
See all stories on this topic »
Microsoft's Kin -- and Google's Nexus One -- officially dead
Seattle Post Intelligencer (blog)
Now that the Kin program is dead, Verizon Wireless has stopped selling the two Microsoft social phones, as well. Microsoft pulled plug on Kin after just ...
See all stories on this topic »
Yahoo Search starts testing listings from Microsoft
ZDNet (blog)
While Yahoo executives and analysts were on a conference call to discuss the company's second quarter earnings, the folks working to integrate Microsoft's ...
See all stories on this topic »
PREVIEW-High hopes for Microsoft, but stock still adrift
By Bill Rigby NEW YORK, July 20 (Reuters) - Signs point to strong results for Microsoft Corp (MSFT.O) as companies get around to buying computers after a ...
See all stories on this topic »
Apple, Microsoft in tight earnings race this week
Seattle Post Intelligencer (blog)
It's earnings week for Apple and Microsoft, perhaps the two most-watched high-tech names in the stock market right now. Apple will announce announced killer ...
See all stories on this topic »
Asus Tablet: Hello Android, Bye Windows?
PC World
While Microsoft is fighting to keep its Windows Embedded mobile OS relevant in the 21 st century--the company recently announced a new version for ...
See all stories on this topic »

India is a Spamming Hub

Wonder where all those annoying spam messages come from? Who sends them? Well, you have got some answers here. Panda Security, a player in antivirus and preventive technologies segment, has stated in its report that India is the world's number two spammer. Surprised? Even we were.

Panda Security has released a report stating that Brazil, India, Korea, Vietnam and U.S. head the list of countries from which most spam was sent during the first two months of the year 2010. With respect to the cities from which spam was being sent, Seoul was first in the list, followed by Hanoi, New Delhi, Bogota, Sao Paulo and Mumbai.

The five million emails analyzed by PandaLabs came from a total of almost one million different IP addresses. This shows that the spam is mostly sent from zombie computers belonging to a botnet. This way, the computers of the infected users themselves are those which send the spam. The cybercrooks have thousands of computers at their disposal, which do the dirty work for them.

Spam is nothing but a business and is used primarily either to distribute malware or sell/advertise all type of products. Therefore, as long as there are users, no matter if they are few, who trust these messages, it's enough to continue betting on it.

From :

Why You Need SIP Protocol For Voice Communications

Session Initiation Protocol (SIP) is the transport technology for person-to-person real time traffic over the Web. Its defining specifications come from the SIP working group of the Internet Engineering Task Force. SIP provides access to the public switched telephone network for voice data at 3 kHz bandwidth and common number dialing using Voice over IP (VoIP). It can also be expanded to handle IP telephony combined with video and instant messaging. Future improvements will allow SIP applications such as video conference calls, application sharing, home monitoring, and interactive gaming.

SIP is in most cases thought of as a method to implement the functionality of common telephony over an IP network. It is replacing the older, less versatile protocols used in the old days such as H.323 and MGCP. These older protocols functioned at a very low level to connect IP phones to the public telephone network. SIP, on the other hand, provides a sophisticated and straightforward way to network the enterprise. For instance, SIP uses email addresses as the SIP address instead of a telephone number over the standard phone network.

Suppliers of SIP components are quickly developing innovative products and software to get the upper hand in this new Internet communications method. SIP telephones, PC client software, SIP servers, routers, and firewalls are now obtainable from companies such as Ingate Systems and Cisco.

Prior to implementing a SIP solution in your company, you should consider the proper configuration of your corporate firewall to accept SIP. Many of the typical firewalls already installed in business offices are not designed to allow the SIP protocol. First, SIP media streams are transferred over dynamically allocated UDP ports that are often closed on firewalls. Second, SIP clients within a firewall can not be accessed using IP addresses because these addresses are local and unique to the LAN. Third, you need to ensure that either your T1 line carrier or Metro fiber service is able to support the SIP protocol from your internal network to the outside world. Your IT manager will need to evaluate how to correctly support SIP to overcome these technical problems. By including a SIP proxy and registrar for managing the firewall, it is feasible to deal with complex SIP scenarios for reliable and confidential communications.

SIP trunking brings a number of perks to the business user such as cost savings, networking flexibility, and emergency disaster recovery. It can eliminate the high subscription costs of basic rate interfaces and primary rate interfaces. It also optimizes the bandwidth usage by providing both voice and data over the very same connection. Businesses will have the flexibility to route calls to preferred carriers and the redundancy of using several service providers.

Article Source :Why You Need SIP Protocol For Voice Communications

How to Explain SIP to a Non-Technical Person

SIP... or Session Internet Protocol... isn't necessarily a new communications concept. It has been around awhile although it seems to be garnering a resurgence in Telephony applications today. But... how do you explain what SIP is when asked?

Good luck with this one, trying to explain SIP to technical people is tough enough.

Here's some very simple short statements that may help...

- SIP enables telephony over the internet network

- SIP allows us to packetize and prioritize voice traffic over digital circuits.

- SIP is a way voice is packed into a digital signal that is then enabled for transfer through the internet.

- SIP digs a channel in an IP network so voice/video can flow between two (or more) places. When you finish talking, SIP shuts the channel up.

- It's an internet protocol like HTTP for web browsing, only this one is used to make a phone-like connection between computers, pda, voip-phones or other devices that can talk over the internet.

- SIP is a protocol that allows unlike mediums to communicate. All you really need to know is that SIP is the new PRI and is more cost effective from a trunking perspective.

- SIP has nothing to do with the internet.... regardless of where, when, or how voice traffic is being transmitted. f it's being sent as 0's and 1's... SIP is what differentiates voice from all other data.

- SIP enables you to eliminate the cost of maintaining two networks (POTS + Ethernet) by putting your phone traffic on your Ethernet network.

- SIP is a business-class, integrated voice and data service with connectivity provided to your IP-PBX (a telephone switch that supports voice over IP)

Or... you may explain to a non-technical person by describing the SIP VoIP operation like this:

1. Callers and callees are identified by SIP addresses.

2. When making a SIP call, a caller first locates the appropriate server and then sends a SIP request. (The most common SIP operation is the invitation).

3. SIP or VoIP is a technology that allows you to make calls between devices, be it over the local network or over the Internet (Managed or un-managed). SIP is a standards based technology that behaves very much like your old telephone line but just uses the Internet as its medium.

4. Instead of directly reaching the intended callee, a SIP request may be redirected or may trigger a chain of new SIP requests by proxies.

5. Users can register their location(s) with SIP servers.

6. SIP messages can be transmitted either over TCP or UDP

7. SIP messages are text based and use the ISO 10646 character set in UTF-8 encoding.

8. Lines must be terminated with CRLF.

9. Much of the message syntax and header field are similar to HTTP.

10. Messages can be request messages or response messages.

Taken From :How to Explain SIP to a Non-Technical Person

Microsoft, Citrix Offer To 'Rescue' VMware Customers

Microsoft and VMware have been engaged in a snippy back-and-forth over virtualization  for the past couple of years, and a new Microsoft-Citrix joint promotion is further inflaming partisan passions on the issue.

Last week, Microsoft and Citrix unveiled their "Rescue for VMware VDI" promotion, which lets customers trade in their VMware View software licenses for the same number of Microsoft VDI Standard Suite subscription and Citrix XenDesktop VDI Edition annual licenses, free of charge. The promotion, which runs through the end of the year, is open to Microsoft customers with Core Cal or E-Cal with Software Assurance.

VMware has been using View, its desktop virtualization software, to sell its server virtualization technology, but some customers haven't been able to deploy it successfully, according to Sumit Dhawan, vice president for Citrix XenDesktop at Citrix. The "rescue campaign" gives customers a way out and underscores the maturity of the Microsoft-Citrix desktop virtualization offering, he said.

Read More: Click Here

HP Partners with Polycom as Cisco Split Grows

Microsoft Speeds Desktop Virtualization Protocol

Microsoft, trying to gain a larger footprint in desktop virtualization, has applied a protocol acceleration technique to its lagging remote user protocol, RDP, and is widening its partnership with Citrix Systems.

The desktop acceleration technology was acquired from Calista in 2008 and is now called RemoteFX into Microsoft Remote Desktop Services, its former terminal services.

Remote Desktop Services includes the RDP protocol, which feeds the desktop display to either a terminal, or more frequently today, a virtualized desktop device, such as a laptop or thin client. RemoteFX will act as an accelerator for RDP but it will do so only for the clients of a server running Windows 7 Service Pack 1 server.

Read More : Click Here
Microsoft Office asks if my software's genuine
By STEVE ALEXANDER Microsoft has started this campaign to verify that people's software is genuine. Now my Microsoft Office programs say that my software is ...
See all stories on this topic
Quest Software Supports Microsoft Communications Server "14"
MarketWatch (press release)
s unified communications strategy as a Microsoft Gold Certified Partner by announcing that Quest MessageStats(R) will support Microsoft Communications ...
See all stories on this topic
Should Microsoft acquire Palm?
Seattle Post Intelligencer (blog)
For the last year or so, as Palm's leaders repeatedly said they were open to an acquisition, some industry followers have wondered whether Microsoft would ...
See all stories on this topic
Nikkei edges lower; ANA falls but Toshiba gains
T) finished 3.6 percent higher after it said it was in talks with a company backed by Microsoft Corp (MSFT.O) Chairman Bill Gates to jointly develop ...
See all stories on this topic
Microsoft Speeds Desktop Virtualization Protocol
With help from Citrix Systems, Microsoft steps up its efforts to offer a competitive virtual desktop infrastructure. By Charles Babcock Microsoft, ...
See all stories on this topic
Can Microsoft capitalize on Google's decision on China?
Seattle Post Intelligencer (blog)
Regardless, Microsoft's search presence there is small. Could Microsoft capitalize on the possible Google vacuum before Baidu rushes in? ...
See all stories on this topic
Microsoft Unveils Talk to Text Mobile App for Sprint
PC Magazine
by Sean Ludwig Microsoft on Monday launched its Talk to Text mobile application, which allows BlackBerry users on Sprint to accurately transcribe their ...
See all stories on this topic
Dialogic Announces Survivable Branch Appliance for Microsoft Unified ...
MarketWatch (press release)
Microsoft Corp. is addressing this need with its release of Communications Server "14," and Dialogic has developed a software migration path for its DMG4000 ...
See all stories on this topic
Why Microsoft really, really, hates the cloud
ZDNet (blog)
Read on for a controversial and eclectically illustrated perspective of why, for Microsoft, it may be more a case of 'all over' than 'all-in' when it comes ...
See all stories on this topic
Microsoft Bing to Surface More Web Services, Director Says
Microsoft Bing will more tightly integrate with Web services providers, and the search engine will improve its coverage in search verticals this spring as ...
See all stories on this topic

Microsoft Sued Again After Infringement Verdict

It may seem like a déjà vu situation to Microsoft's legal team. The software giant lost an important patent infringement lawsuit on Tuesday, but the winning parties aren't satisfied yet.

So on Wednesday, the plaintiff -- a small holding company called VirnetX from Scotts Valley, Calif. -- sued Microsoft (NASDAQ: MSFT) again, for the same infringement. However, this time VirnetX is going after Microsoft for using the infringed patents in Windows 7 and Windows Server 2008, according to the plaintiff's filing in the new case.

Read More : Click Here

Tandberg launches desktop HD videoconferencing

Computerworld - Tandberg, in the process of being acquired by Cisco Systems, today launched the EX90, a high-definition videoconferencing desktop system focused on executive users.

Providing full 1080p30 resolution on a 24-inch HD desktop screen will allow executives to interact with customers, employees and others "as if they were sitting across the desk," Tandberg CEO Fredrik Halvorsen said in a statement.

The EX90 monitor can double as a PC monitor or it can be coupled with a second monitor in a package where one shows all videoconference communications and the other provides for joint viewing of documents and other materials.

Read More : Click here