Thursday, July 31, 2008

The Banana Test

The Banana Test

There is a very, very tall coconut tree and there are 4 animals,
a lion, a chimpanzee, a giraffe, and a squirrel, who pass by.
They decide to compete to see who is the fastest to get a banana off the tree.

Who do you think will win?

Your answer will reflect your personality.

So think carefully . . . Try and answer within 30 seconds

Got your answer?

Now scroll down to see the analysis.
..
 
 
..
 
 
 
..
 
 
..
 
 
 
..
 
 
 
 
..
 
 
 
 
 
 
..
 
 
 
 
..
 
 
 If you picked:


Lion - you're dull.


Chimpanzee - you're a moron.


Giraffe - you're a complete idiot.


Squirrel - you're just hopelessly stupid.



A Coconut tree Doesn't have Bananas!!!!!

Obviously you're stressed and overworked.
You should take some time off and relax!
Try again next year.

Have a great day!

Monday, July 21, 2008

Rich and Poor Countries

To reflect and... Act.
The difference between the poor countries and the rich ones is not the age of the country.

This can be shown by countries like India & Egypt,
that are more than 2000 years old and are poor.

On the other hand, Canada,
Australia & New Zealand, that
150 years ago were inexpressive,
today are developed countries and are rich.

The difference between poor & rich
countries does not reside in the available
natural resources.

Japan has a limited territory,
80% mountainous, inadequate
for agriculture & cattle raising, but it is
the second world economy. The country is
like an immense floating factory,
importing raw material from the whole
world and exporting manufactured
products.

Another example is Switzerland, which
does not plant cocoa but has the best
chocolate of the world.
In its little territory they raise animals and
plant the soil during 4 months per year.

Not enough, they produce dairy products of
the best quality.
It is a small country that transmits an image
of security, order & labor, which made it
the world’s strong safe.

Executives from rich countries
who communicate with their counterparts
in poor countries show that there is no
significant intellectual difference.

Race or skin color are also not important:
immigrants labeled lazy in their countries
of origin are the productive power in rich
European countries.

What is the difference then?
The difference is the attitude of the people,
framed along the years by the education &
the culture.

On analyzing the behavior of the people in
rich & developed countries, we find that the
great majority follow the following
principles in their lives:

1. Ethics, as a basic principle.
2. Integrity.
3. Responsibility.
4. Respect to the laws & rules.
5. Respect to the rights of other citizens.
6. Work loving.
7. Strive for saving & investment.
8. Will of super action.
9. Punctuality.

In poor countries, only a minority follow
these basic principles in their daily life.

We are not poor because we lack
natural resources or because nature was
cruel to us.

We are poor because we lack attitude.
We lack the will to comply with and
teach these functional principles of
rich & developed societies.
If you do not forward this message
nothing will happen to you. Your pet will
not die, you will not be fired, you will
not have bad luck for seven years and
also you will not get sick.

If you love your country, let this
message circulate for a major quantity
of people could reflect about this &
CHANGE, ACT!!

Wednesday, July 16, 2008

How Leader Should Manager Their Failure

**(Former President of India APJ Abdul Kalam at Wharton India Economic forum, Philadelphia, March 22,2008)*

*Question:* Could you give an example, from your own experience, of how leaders should manage failure?

*Kalam:* Let me tell you about my experience. In 1973 I became the project director of India's satellite launch vehicle program, commonly called the SLV-3. Our goal was to put India's 'Rohini' satellite into orbit by 1980.

I was given funds and human resources -- but was told clearly that by1980 we had to launch the satellite into space. Thousands of people worked together in scientific and technical teams towards that goal.

By 1979 -- I think the month was August -- we thought we were ready. As the project director, I went to the control center for the launch. At four minutes before the satellite launch, the computer began to go through the checklist of items that needed to be checked. One minute later, the computer program put the launch on hold; the display showed that some control components were not in order. My experts -- I had four or five of them with me -- told me not to worry; they had done their calculations and there was enough reserve fuel. So I bypassed the computer, switched to manual mode, and launched the rocket. In the first stage, everything worked fine. In the second stage, a problem developed. Instead of the satellite going into orbit, the whole rocket system plunged into the Bay of Bengal. It was a big failure.

That day, the chairman of the Indian Space Research Organization, Prof. Sottish Dhawan, had called a press conference. The launch was at 7:00 am, and the press conference -- where journalists from around the world were present -- was at 7:45 am at ISRO's satellite launch range in Sriharikota [in Andhra Pradesh in southern India]. Prof. Dhawan, the leader of the organization, conducted the press conference himself. He took responsibility for the failure -- he said that the team had worked very hard, but that it needed more technological support. He assured the media that in another year, the team would definitely succeed. Now, I was the project director, and it was my failure, but instead, he took responsibility for the failure as chairman of the organization.

The next year, in July 1980, we tried again to launch the satellite -- and this time we succeeded. The whole nation was jubilant. Again, there was a press conference. Prof. Dhawan called me aside and told me, 'You conduct the press conference today.'

I learned a very important lesson that day. When failure occurred, the leader of the organization owned that failure. When success came, he gave it to his team. The best management lesson I have learned did not come to me from reading a book; it came from that experience.

Monday, July 14, 2008

Don’t fool the people

Don’t fool the people

By Ardeshir Cowasjee

THE events that have taken place over the past 60 years of this country’s existence — and particularly over the past couple of decades — make it sure that universally we have no right to call ourselves civilised.

Just to take a few incidents of this past week: when a group of democratic citizens saw to it that seven of their fellow citizens were burnt alive, that others were shot and killed or maimed, and that the properties and vehicles of other fellow citizens were reduced to ashes; when an elected member of a provincial assembly was assaulted with shoes on the premise of the august assembly; when a former minister was physically attacked by a mob in which there were a goodly number of members of the legal profession, upholders of the country’s laws.

Noises were made by the various leaders who supposedly lead, vows were made that investigations and probes would be held, enquiry tribunals set up and the culprits brought to book.

All this will be forgotten as the vows are overtaken by perhaps even more dire events. We had dramatic resignations in protest, but they were withdrawn within the space of five minutes after due protests were made by the ardent followers of the upholders of the betterment of the people and the nation.

In one horrific incident, not so publicized a factory worker of a minority community was conveniently accused of blasphemy and literally beaten to pulp and to death by his fellow co-workers who are protected under Ziaul Haq’s iniquitous blasphemy laws which exist in our penal code to allow victimization and murder.

It is high time they were brought into line with internationally recognized human rights and laws. Will this supposedly ‘secular’ government act and amend?

Then we have the Hudood Ordinances which have been in existence, upheld by a succession of governments, over the past two and a half decades which ensure that if a woman is raped she will suffer legally far more severely than her violator. The pathetic government installed by President Gen Pervez Musharraf in 2002 made efforts to tone down the ordinances, but in a House with a goodly number of obscurantists occupying seats, to do away with them was impossible.

What is this new government going to do about the state of the nation’s women? Is the matter of the Hudood Ordinances high on its list of priorities? It should be. We need the women members of parliament to consolidate themselves and make an effort to have them repealed once and for all.

Let us look at the governments we have had. All have had little regard for the people who have voted them in, scant regard for their inherent rights, their human rights, or for the fundamental rights guaranteed to them by the much vaunted Constitution of 1973 which they profess to hold sacred. We must also look back at the man who made that Constitution, and take careful note of his intentions. He is now proclaimed a shaheed — let him be so regarded.

Early in 1970, after Zulfikar Ali Bhutto had formed his PPP and was readying himself for the coming elections, he met up with that man of integrity who has always spoken the truth (even if taken to task for so doing), Air Marshal Asghar Khan, who was about to form his own political party.

To quote from his book We’ve Learnt Nothing from History (OUP 2005): “…Bhutto had asked me to join the Pakistan People’s Party. We had two long discussions and I had tried to learn something about his political philosophy and economic programme…. He told me that he was sure that if I joined hands with him, and if we both set off from Karachi, he to Dadu and Larkana, and I to Hyderabad and Nawabshah, meeting at Sukkur, and then again forking out in different directions and meeting at Multan, then to Lahore and so on, by the time we reached Rawalpindi, Yahya Khan would be at the railway station to receive us. ‘We can then rule together,’ he had said.

“I had asked what his programme would be after he had been installed in power. He had laughed at this enquiry and replied, ‘The programme is to rule. The people are stupid and I know how to fool them. I will have the danda (stick) in my hand and no one will be able to remove us for 20 years.’ I was grateful to him for a frank expression of his views and made up my mind that our paths would be different.”

So much for intent. Then came the elections of 1970 and the story from then on to the end of 1971 when half the country was shed purposefully is far too familiar to bear repetition. Bhutto ruled over the half of Pakistan that was left to us as president up to August 1973 when he promulgated his Constitution and set himself up as prime minister with full powers.

Now we must look at the actual promulgation. Zulfikar had it all set up for noon on August 14, independence day. Celebrations in Islamabad were joyful, the lunch party launch was elaborate. In his pocket Zulfikar had ready an Order for the signature of the appointed president who had taken over from him, that good man, the meek, mild and totally ineffectual Fazal Elahi Chaudhary. At four o’clock that same afternoon the Order was signed by the president and counter-signed by the prime minister under Article 48(3).

Under this Order, the Proclamation of Emergency issued on Nov 23, 1971 was deemed to be a Proclamation of Emergency issued under Article 232 of the Constitution of the Islamic Republic of Pakistan.

Under the Emergency, the president had the right to declare that the right to move any court for the enforcement of the fundamental rights guaranteed by the newly-born Constitution would remain suspended for the period during which the proclamation was in force.

Thus, the right to move any court, including the Supreme Court, stood suspended with regard to the major fundamental rights provided for in Articles 10, 15, 16, 17, 18, 19, 23, 24, 25 and 27 of the sacred and inviolate Constitution given to the people of Pakistan. Thus were the people fooled.

This Order was published ‘for general information’ in The Gazette of Pakistan, Extra, August 15, 1973. It was an act of infamy. Within the next few days, all of Bhutto’s main political opponents were arrested and jailed. The state of emergency and suspension of fundamental rights held throughout the Bhutto regime. When Ziaul Haq came in with his martial law he did a deal with the jailed politicians, freed them, and having no need of a state of emergency it was lifted.

Constitutions are man-made and can be vitiated with ease by storto politicos who have chosen to walk the wrong path. Iman and insanyat are rare commodities in this land of ours. Until someone possessing both qualities springs up from somewhere to lead us, we will remain as we are — a failing state.

Wednesday, July 9, 2008

Microsoft Security for Home Computer Users Newsletter















 





















Microsoft Security Newsletter








Welcome to the Microsoft Security
Newsletter
- a monthly newsletter for IT professionals
and developers bringing security news, guidance, updates,
and community resources direct to your inbox. To view an
online version of this newsletter, please click

here
. If you would like to receive less technical
security news, guidance and updates, please subscribe to
the

Microsoft Security for Home Computer Users Newsletter
.


 






Viewpoint













 

Security Viewpoint
  




By Mark Russinovich, Technical
Fellow, Microsoft Platform and Services Division



In this article, Mark discusses Windows Vista kernel
features and enhancements in the areas of reliability,
recovery, and security including the Kernel
Transaction Manager, enhanced crash support, Volume
Shadow Copy, BitLocker, and Code Integrity
verification.


 







 


Top Stories






 


Manage the full deployment and
update life cycle with streamlined, policy-based
automation and enhanced insight into -- and control
over -- assets and systems compliance. Microsoft
System Center Configuration Manager 2007 offers
optimization for Windows--particularly Windows Server
2008 and Windows Vista--and extensibility to
customized administration experiences and third-party
applications.


 







 


Take advantage of the scalability,
high performance, reliability, security, flexibility,
and manageability that an ideal virtualization
platform should provide. A key feature of Windows
Server 2008, Hyper-V has a thin, micro-kernelized
hypervisor architecture with minimal attack surface,
and can easily plug into your IT infrastructure so you
can capitalize on your existing tools and processes
for patching, provisioning, management, and support.



 







 


Security Guidance






 


Get the guidance and tools you need
to use new and enhanced security technologies in
Windows Vista to better defend the client computers in
your organization against malware and protect
corporate data. Application compatibility testing
recommendations are also included.


 







 


Find out how UAC works, including
deployment scenarios and ensuring that older
applications will be compatible.


 







 


This article is intended to assist
application developers with designing Windows
Vista-capable applications that are compliant with UAC.
Detailed steps about the design process are included,
along with code samples, requirements, and best
practices. This article also details technical updates
and changes to the user experience in Windows Vista.


 







 


Controlling installation and device
usage this way improves your security, and it enhances
the effectiveness of your help desk by limiting the
devices that users can install to those your
organization approves and supports. Learn how to
control the installation and usage of devices on the
computers that you manage with Windows Vista and
Windows Server 2008.


 







 


This guide covers the fundamental
concepts needed to successfully configure Multiple
Local Group Policy objects on stand-alone computers
running Windows Vista and offers several task-based
scenarios that show you how to use each feature.



 







 


The Enterprise Manager tool allows
you to aggregate reporting and management of up to 10
Forefront Client Security down-level deployments. With
this tool, you can manage up to 100,000 client
computers from a single Forefront Client Security
console.


 







 


Together, Forefront Client Security
and NAP can provide an additional defense-in-depth
layer against malicious attacks and give you a
significant degree of control over the security and
health of networked computers. This collection of
software components and guidance will help you
configure a compliance health policy for computers
that run Forefront Client Security and isolate
noncompliant computers to a restricted network until
compliance can be properly addressed.


 







 


Find information about this
industry-leading software security assurance process,
and quickly access process guidance, training and
resources, tools, and blogs.


 







 


Learn how to export and import
certificates with this short, How-Do-I video.


 







 


This Month's Security Bulletins


Important:




































 


Community / MVP Update













 

Security MVP of the Month: Tony Bradley
  




Tony Bradley, CISSP and Director
with Evangelyze, is focused on consulting, research
and development, and training primarily in the areas
of unified communications and voice over IP (VoIP)
products and services. A respected expert and author
in the field of information security, Tony contributes
to variety of Web and print publications, and has
written or cowritten 8 books. He has also consulted
with Fortune 500 companies on information security
architecture, policies, and procedures, and his
knowledge and skills have helped organizations protect
their information and their communications.


 







 


By Tony Bradley, Microsoft
Enterprise Security MVP and CISSP


This article examines how you can use enterprise
firewall, antivirus, antispam, network access,
authentication, and other security controls to help
mobile computers remain secure outside of the
corporate network.


 







 


Microsoft Product Lifecycle Information


Find information about your particular
products on the

Microsoft Product Lifecycle
Web site.











See a List of Supported Service Packs
: Microsoft
provides free software updates for security and
nonsecurity issues for all supported service packs.







 


Security Events and Training






 


Learn more about

Microsoft Forefront Client Security
-- including
support for Hyper-V and how it improves overall
performance -- then delve into details about the

next-generation versions
of Forefront Client
Security, Forefront Security for Exchange Server,
Forefront Security for SharePoint, and Microsoft
Internet Security and Acceleration Server, which is to
be renamed the Forefront Threat Management Gateway.


 







 


Your network is running smoothly,
your end users are happy with their new PDAs and
laptops, and your boss thinks you’re a security
genius, but how do you know what you’re defending
against? Use these resources to understand the current
threat landscape and identify ways to help protect
your business and customers. You’ll find analysis of
data collected from millions of users -- as well as
respected security experts -- complete with
strategies, mitigations, and countermeasures to help
you take next steps.


 







 


Upcoming Security Webcasts






 


Find upcoming security webcasts in
a dynamic, interactive format.


 



For IT Professionals



















Enterprise Information Classification: Ensuring
Persistent Encryption


Thursday, July 24, 11:00 AM Pacific Time

Tim Upton, CEO and Founder of Titus Labs






TechNet Webcast: High Availability in Exchange Server
2007 SP1 (Part 2 of 2): Disaster Recovery and SCR Deep
Dive (Level 300)


Thursday, July 31, 9:30 AM Pacific Time

Scott Schnoll, Principal Technical Writer,
Microsoft Corporation







TechNet Webcast: Information About Microsoft August
Security Bulletins (Level 200)


Wednesday, August 13, 11:00 AM Pacific Time

Bill Sisk, Security Response Communications
Manager, Microsoft Corporation and Adrian Stone, Lead
Security Program Manager, Microsoft Corporation



For Developers











MSDN Webcast: Unit Testing for Mobile Devices (Level
300)


Wednesday, July 23, 10:00 AM Pacific Time

Constanze Roman, Content Project Manager II,
Microsoft Corporation, and Maarten Struys, Windows
Embedded Evangelist, PTS



Microsoft On-Demand Webcasts












Windows Vista: Improve Your Desktop Security and
Deployment Strategy


Tune in to this series of webcasts, podcasts, and
virtual labs to see how Windows Vista advancements in
security and reliability, along with its operational
efficiencies, give you and your users confidence in
your organization's PCs.








 







 



© 2008 Microsoft Corporation. All rights
reserved. Microsoft, Forefront, Hyper-V, MSDN, Windows,
Windows Server, and Windows Vista are either registered
trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries. The names of actual
companies and products mentioned herein may be the trademarks
of their respective owners.




Legal Information.




This newsletter was sent by the Microsoft Corporation

One Microsoft Way

Redmond, Washington, USA

98052



 

 





 

 

Tuesday, July 8, 2008

Security for Home Computer Users: Protect yourself while travelling this summer


Security for Home Computer Users Newsletter


 


 


 


Welcome to Security for Home Computer Users--a monthly newsletter
bringing security news, guidance, updates, and community resources
directly to your inbox. If you would like to receive more technical
security information, please subscribe to the

Microsoft Security Newsletter
.




Protect yourself while travelling this summer


Protect yourself while travelling this summer

It's summer! The kids are out of school, and it's time to travel,
right? Just make sure to protect yourself. If you bring your
portable computer or mobile phone with you, start with
3
ways to protect your laptop on the road
or tips to

avoid wireless attacks through your Bluetooth cell phone
. If
you're travelling sans mobile devices, you'll find these other tips
helpful:



>
5 safety tips for using a public computer


>
Use public wireless networks more safely


 


How to get rid of spyware



Spyware Removal: How to Get Rid of Spyware



Many kinds of unwanted software, including spyware, are designed to be
difficult to remove. If you try to uninstall this software like any other
program, you might find that the program reappears as soon as you restart
your computer.


If you're having trouble uninstalling unwanted software, you may need
to download a tool to do the job for you. Several companies offer free and
low-cost software that will check your computer for spyware and other
unwanted software and help you remove it.


Some Internet Service Providers (ISPs) include antispyware software in
their service packages. Check with your ISP to see if they can recommend
or provide a tool. If your ISP doesn't offer a removal tool for spyware
and other unwanted software, ask people you trust to recommend one, or see
the links in step 1 below.


Keep in mind that removing unwanted software with these tools may mean
you will no longer be able to use a free program that came with the
spyware.


To remove spyware







1. Use Windows Defender. Windows Defender comes with

Windows Vista
. If you use Windows XP SP2, you can download

Windows Defender
for no charge.











Run the tool to scan your computer for spyware and other unwanted
software.
Review the files discovered by the tool for spyware and other
unwanted software.
Select suspicious files for removal by following the tool's
instructions.

Improve Web Safety. Protect Kids Online.


10 things you can teach kids to improve their Web safety

Before you allow your child to go online without your supervision, make sure you establish a set of rules that you can all agree on.

If you're not sure where to start, here are some ideas on what to discuss with your kids to teach them about using the Internet more safely.

1. Encourage your kids to share their Internet experiences with you. Enjoy the Internet along with your children.

2. Teach your kids to trust their instincts. If they feel nervous about anything online, they should tell you about it.

3. If your kids visit chat rooms, use instant messaging (IM) programs, online video games, or other activities on the Internet that require a login name to identify themselves, help them choose that name and make sure it doesn't reveal any personal information about them.

4. Insist that your kids never give out your address, phone number, or other personal information, including where they go to school or where they like to play.

5. Teach your kids that the difference between right and wrong is the same on the Internet as it is in real life.

6. Show your kids how to respect others online. Make sure they know that rules for good behavior don't change just because they're on a computer.

7. Insist that your kids respect the property of others online. Explain that making illegal copies of other people's work—music, video games, and other programs—is just like stealing it from a store.

8. Tell your kids that they should never meet online friends in person. Explain that online friends may not be who they say they are.

9. Teach your kids that not everything they read or see online is true. Encourage them to ask you if they're not sure.

10. Control your children's online activity with advanced Internet software. Parental controls can help you filter out harmful content, monitor the sites your child visits, and find out what they do there.

Is the Alexa Ranking correct?




 


Alexa's traffic
rankings are based on the usage patterns of Alexa Toolbar users over a rolling
3 month period. A site's ranking is based on a combined measure of reach &
pageviews. Reach is determined by the number of unique Alexa users who visit a
site on a given day. Pageviews are the total number of Alexa user URL requests
for a site. The site with the highest combination of users and pageviews is
ranked #1.




But is this
the correct way to judge or rank a website.





Apart from
the biased that it is based on the sample of Alexa tool bar users, it is
browser specific and it can be easily manipulated, the formula itself is
debatable.




We started
off by quoting the number of “Hits” for determining traffic of a website. But
eventually, we moved away from the term "hit" because everyone realized it was
pretty meaningless. A hit was often counted not just for a page load, but for
every element included on the page, as well. So if a site was less graphical
and had equal usage would register half the hits.





And then
came Reach and Pageviews.




As such, it
would not be fair to compare two websites that belong to different categories.
But measuring reach (number of unique visitors) is important because
mainstream advertisers want to reach a lot of people but not just the same
people over and over. It also gives an idea of popularity and growth of a
website.




Pageviews
became the primary metric not because they were more meaningful but because
they helped in closing Ads deals since Ads were sold primarily on a CPM basis
and its counts are as susceptible as hit counts to site design decisions that
have nothing to do with actual usage.





Someone has
brilliantly analyzed that the part of the reason MySpace drives such an
amazing number of pageviews is because their site design is so terrible.




As the way
we interact with the web is changing, and technology makes it easier for users
to have access to multimedia content on a single web page, are page views
still relevant? AJAX, RSS, Feeds, Widgets. Streaming etc. are making things
worse.




So what's a
better way for comparison? Good question.




As I have
mentioned earlier also, it is not fair to compare two websites that belong to
different categories. The measurement of success also varies from website to
website. So it could be registered users, files uploaded/downloaded, posts,
hits, searches, revenue, and it may even be pageviews. But internal metrics
aren't enough, since we want to compare ourselves to other players in the
market. So we also need some apples-to-apples comparison.





If I had to
pick one, in addition to unique visitors (reach), I'd say time spent would be
much more useful than pageviews.


Time spent
interacting with a site is a much better basis on which to compare sites'
relative ability to capture attention/value than pageviews is. Especially when
it comes to media like audio or video, an increasing percentage of the web
consumption, time obviously means a great deal more than a pageview.




However,
time is a bit harder to measure.





HTTP doesn't
actually have a concept of time spent. So if you read this whole post and then
click off to another site, my web server won't know whether you were here for
five minutes or five seconds. I don’t even know whether you have been reading
this post for last 10 mins or you are having a coffee with this page open in
your browser.




Finally,
there's a big argument against time as a measure:





People don't
spend much time on Google search, because it gives them what they want so
fast, and they go away (which is obviously good for them and for users). But
the average time spent per visit will be very low.





And just as
pageviews can be gamed, you can slow your users down unnecessarily (or
accidentally because your servers are too slow) and increase time spent.


In short,
there's no easy solution but there's a BIG opportunity (though very tough job)
for someone to come up with a meaningful metric that weighs a bunch of
factors.


 

Ten principles that contribute to a Google user experience

I got this article through an email from one of my colleague and I found it really interesting.

---------------------

1. Focus on people – their lives, their work, their dreams

The Google User Experience team works to discover people's actual needs, including needs they can't always articulate. Armed with that information, Google can create products that solve real-world problems and spark the creativity of all kinds of people. Improving people's lives, not just easing step-by-step tasks, is our goal.

Above all, a well-designed Google product is useful in daily life. It doesn't try to impress users with its whizbang technology or visual style – though it might have both. It doesn't strong-arm people to use features they don't want – but it does provide a natural growth path for those who are interested. It doesn't intrude on people's lives – but it does open doors for users who want to explore the world's information, work more quickly and creatively, and share ideas with their friends or the world.

2. Every millisecond counts

Nothing is more valuable than people's time. Google pages load quickly, thanks to slim code and carefully selected image files. The most essential features and text are placed in the easiest-to-find locations. Unnecessary clicks, typing, steps, and other actions are eliminated. Google products ask for information only once and include smart defaults. Tasks are streamlined.

Speed is a boon to users. It is also a competitive advantage that Google doesn't sacrifice without good reason.

3. Simplicity is powerful

Simplicity fuels many elements of good design, including ease of use, speed, visual appeal, and accessibility. But simplicity starts with the design of a product's fundamental functions. Google doesn't set out to create feature-rich products; our best designs include only the features that people need to accomplish their goals. Ideally, even products that require large feature sets and complex visual designs appear to be simple as well as powerful.

Google teams think twice before sacrificing simplicity in pursuit of a less important feature. Our hope is to evolve products in new directions instead of just adding more features.

4. Engage beginners and attract experts

Designing for many people doesn't mean designing for the lowest common denominator. The best Google designs appear quite simple on the surface but include powerful features that are easily accessible to those users who want them. Our intent is to invite beginners with a great initial experience while also attracting power users whose excitement and expertise will draw others to the product.

A well-designed Google product lets new users jump in, offers help when necessary, and ensures that users can make simple and intuitive use of the product's most valuable features. Progressive disclosure of advanced features encourages people to expand their usage of the product. Whenever appropriate, Google offers smart features that entice people with complex online lives – for instance, people who share data across several devices and computers, work online and off, and crave storage space.

5. Dare to innovate

Design consistency builds a trusted foundation for Google products, makes users comfortable, and speeds their work. But it is the element of imagination that transforms designs from ho-hum to delightful.

Google encourages innovative, risk-taking designs whenever they serve the needs of users. Our teams encourage new ideas to come out and play. Instead of just matching the features of existing products, Google wants to change the game.

6. Design for the world

The World Wide Web has opened all the resources of the Internet to people everywhere. For example, many users are exploring Google products while strolling with a mobile device, not sitting at a desk with a personal computer. Our goal is to design products that are contextually relevant and available through the medium and methods that make sense to users. Google supports slower connections and older browsers when possible, and Google allows people to choose how they view information (screen size, font size) and how they enter information (smart query parsing). The User Experience team researches the fundamental differences in user experiences throughout the world and works to design the right products for each audience, device, and culture. Simple translation, or "graceful degradation" of a feature set, isn't sufficient to meet people's needs.

Google is also committed to improving the accessibility of its products. Our desire for simple and inclusive products, and Google's mission to make the world's information universally accessible, demand products that support assistive technologies and provide a useful and enjoyable experience for everyone, including those with physical and cognitive limitations.

7. Plan for today's and tomorrow's business

Those Google products that make money strive to do so in a way that is helpful to users. To reach that lofty goal, designers work with product teams to ensure that business considerations integrate seamlessly with the goals of users. Teams work to make sure ads are relevant, useful, and clearly identifiable as ads. Google also takes care to protect the interests of advertisers and others who depend on Google for their livelihood.

Google never tries to increase revenue from a product if it would mean reducing the number of Google users in the future. If a profitable design doesn't please users, it's time to go back to the drawing board. Not every product has to make money, and none should be bad for business.

8. Delight the eye without distracting the mind

If people looked at a Google product and said "Wow, that's beautiful!" the User Experience team would cheer. A positive first impression makes users comfortable, assures them that the product is reliable and professional, and encourages people to make the product their own.

A minimalist aesthetic makes sense for most Google products because a clean, clutter-free design loads quickly and doesn't distract users from their goals. Visually appealing images, color, and fonts are balanced against the needs for speed, scannable text, and easy navigation. Still, "simple elegance" is not the best fit for every product. Audience and cultural context matter. A Google product's visual design should please its users and improve usability for them.

9. Be worthy of people's trust

Good design can go a long way to earn the trust of the people who use Google products. Establishing Google's reliability starts with the basics – for example, making sure the interface is efficient and professional, actions are easily reversed, ads are clearly identified, terminology is consistent, and users are never unhappily surprised. In addition, Google products open themselves to the world by including links to competitors and encouraging user contributions such as community maps or iGoogle gadgets.

A greater challenge is to make sure that Google demonstrates respect for users' right to own and control their own data. Google is transparent about how it uses information and never shares data outside Google without a user's explicit consent. Our products warn users about such dangers as insecure connections, different privacy policies on other websites, actions that may make users vulnerable to spam, or the possibility that data shared outside Google may be stored elsewhere. Google is reassuring but truthful about data sharing so that users can make informed choices. The larger Google becomes, the more essential it is to live up to our "Don't be evil" motto.

10. Add a human touch

Google includes a wide range of personalities, and our designs have personality, too. Text and design elements are friendly, quirky, and smart – and not boring, close-minded, or arrogant. Google text talks directly to people and offers the same practical, informal assistance that anyone would offer to a neighbor who asked a question. And Google doesn't let fun or personality interfere with other elements of a design, especially when people's livelihood, or their ability to find vital information, is at stake.

Google doesn't know everything, and no design is perfect. Our products ask for feedback, and Google acts on that feedback. When practicing these design principles, the Google User Experience team seeks the best possible balance in the time available for each product. Then the cycle of iteration, innovation, and improvement continues.

Allah o Akbar =

AAAD+nation

Monday, July 7, 2008

Letter of appriciation

July 1, 2008
Prime Minister of Pakistan
President Of Pakistan
Co-Chairman Pakistan Peoples Party
Federal Finance Minister

Dear Sirs
Thank you so much for increasing the prices of petroleum products, after the shortage of edible commodities this increase is like a cold breeze in hot summer, specially your new gift to the nation at the start of the fiscal year 2008-09 by increasing the CNG prices to 31%, we as a nation sincerely appreciate your efforts to support us.
Dear Sirs, we further suggest the following measures to be taken in the broader interest of the nation as soon as possible, the way the nation is enjoying the following benefits, is not the right of this nation and it also hurt your efforts for the stability of economy.
Your kind attention to the following will help to strengthen the economy of the country;

- Breathing - The tax may please be imposed on breathing.

- Eating - The tax may please be imposed on the eating 2 meals a day, (Because of the strong economy now the nation do not afford to eat 3 meals).


- Drinking of Water - The tax may please be imposed on drinking more than 2 glasses daily, additionally taking bath more than once a month should be Taxed

- Clothing – Wearing Cloths may please be taxable and additional tax on changing the suits/shirts on daily basis.


- Travelling - Journey through the public transport should be allowed once a day, means if someone comes to work by bus/rail he should not be allowed to use the same for going back, when the nation will start to walk back to homes it will help to keep them healthy.

- Birth – Tax may please be imposed on the birth of every child, the tax should be the 10% of the monthly wage rate of the father and if the mother is a working woman, she will also have to pay 10% of her wage, it is also suggested that this tax should be increased 20% to 30% on every additional birth.


- Death – A death tax may please be imposed on every person who dies, an additional tax is also suggested to the suicidal or accidental death.

There are so many other items that are still identifiable and we will try to let you know as soon as we realize the taxability of those.
Now at the end we recommend to award “Nishan-e-Haider”, “Tamgha-e-Khidmat” to the former Prime Minister of Pakistan Mr. Shaukat Aziz and his team for the efforts they made to revive the dying economy of Pakistan.

An increase of 100% in the packages of Members of Assemblies / Ministers and other officials is also suggested, it will help them to serve the nation better, after all we have to take care of the interests of the nation.

Thanking you in advance
Pakistani Nation
M.Arshad Minhas
0344-2212377