Rss Feed Like Us on facebook Google Plus

August 11, 2013

Best Places to visit in India - The Real Heaven

Have you visited the best places in India? Well you might have but the list never ends for places in India. India is known for its numerous cultures and each place you visit gives a different fragrance of our Incredible India. From heaps of sacred places, serene temples to spirited festivals, magnificent beaches, frosty & snow laid mountains, lantern-lit villages to superlative cities India leaves an impression on you and a never ending memory. 

Although this might not be a holiday season for most of you, you can make list of these places and keep it in your planner to plan your trip in India. These are some of the best places that India has got something unique to offer to its travelers.

Kashmir - Heaven on Earth:

Set high in the North of India, also called the 'Peak of India', Kashmir is surrounded by the Great Himalayas and the Pir Panjal mountain range. Kashmir's valley is made of fresh water streams, delicious apple orchards, mighty ice capped mountains and lush meadows. Among the silent valleys of Kashmir, there is much excitement awaiting those who are interested in adventure sports like river rafting, Trekking and Winter Sports. Be it adventure fanatics, spirituality or just holiday revelers, Kashmir is sure to satisfy everyone.


Ladakh- The Moon Land
Ladakh; called the "land of high passes" is a region of Jammu and Kashmir, the northernmost state of India. It lies between the Kunlun mountain range in the north and the 
main Great Himalayas to the south. The largest town in Ladakh is Leh. It is one of the few remaining abodes of Buddhism in South Asia, including the Chittagong Hill Tracts, Bhutan and Sri Lanka. Once in Ladakh, make sure you visit the Leh Palace, Tso Mori Lake, and Nubra Valley as well the number of monasteries dotting Ladakh. The sheer beauty of this place, combined with its amazing culture and the breathtaking journey. To really experience the true essence of Ladakh, we recommend a road trip by car, bike, jeep or bus.

Rajasthan- The land of the Kings


One of the world's oldest mountain ranges, the Aravalli Range, cradles the only hill station of Rajasthan, Mount Abu, famous for Dilwara Temples, a sacred pilgrimage 
for Jains. Eastern Rajasthan has the world famous Keoladeo National Park near Bharatpur, famous for its bird life and is a World Heritage Site and two famous national tiger reserves, Ranthambore and Sariska Tiger Reserve. Rajasthan was formed on 30 March 1949, when all erstwhile princely states ruled by Rajputs, known as Rajputana, merged into the Dominion of India. Music and culture aficionados will love the highly cultivated classical music and dance unique to Rajasthan.

Kerala- Gods own country
Kerala is a popular tourist destination famous for its backwaters, Ayurvedic treatments and tropical greenery. Backwaters which are a chain of lagoons are an integral pa 
rt of Kerala's Tourism Scenario and provide a really relaxing experience. Must visit places along these backwaters include Kumarakom (bird sanctuary), Astamudi Lake (largest fresh water lake) and Kannur-Valiyaparambu (scenic beauty). Kerala is one of the ten 'Paradises found' declared by the National Geographic Traveler, for its varied geography and devastating greenery.

Goa - The Beach City
Goa India's smallest state by area. However that doesn't stop it from being the best places to visit in India attracting more than 2 million visitors annually. With its pretty beaches, awesome seaf 
ood, vivid nightlife, picturesque churches and water sports, it's not hard to figure out why. If you are looking for your dose of adrenaline, you can indulge in water sports like paragliding, windsurfing, jet skiing and lots more. If food and drink makes your day, try out some of the sumptuous seafood (our pick Goan fish curry!) and the famous Fenny (Goan Liquor) at your disposal.

Courtsy: SiliconIndia

Follow on twitter for latest updates....
Read More

August 10, 2013

Use of HTML5 Download Attribute

As we know, there are many files that are not downloaded directly. For example: images, webpages, PDF files, music files, etc. We have to right click on images and then click on Save Image to save an image file. But if I want to download an image file directly, then I have to use the download attribute.
<a href="Image.jpeg" download>Download image</a>
Simply type download in the <a> anchor tag. By using this, when we click on download image, the image starts downloading. The same method is used for downloading PDF, webpage files (HTML), etc. 

If we want to give a new name to the download file, then we have to write:
<a href="Folder/myimagehavenoname.png" download="myImage">Download image</a> 
Here, we write download="myImage". When we click on Download image, then an image file is downloaded with  name myImage with a .png extension. The browser automatically detects the correct file extension and adds it to the downloaded file. So there is no need to add the file extension in the download attribute.

CHECK BROWSER SUPPORT :

For checking our browser support download attribute, we have to use JavaScript:
var a=document.createElement('a');
if(typeof a.download !="undefined")
{
    document.write('Download attribute supported');
}
else
{
    document.write('Download attribute not supported');
}
Currently, Chrome 14+ and Firefox 20+ supports the download attribute (tried and tested by me on Chrome).

I am including the .zip file for downloading in which I am showing the use of the download attribute as well as checking browser support for the download attribute.

Read More

August 9, 2013

Disable Ctrl+C ,Ctrl+V ,Ctrl+A in a web page : Javascript

Question How to disable Ctrl+C , Ctrl+V , Ctrl+A in any web page by using javascript.

More..
Disable Button after clicking on it.

Solution:
just copy and paste below script in <head> section


<script type="text/javascript">
        function Disable_Control_C() {
            var keystroke = String.fromCharCode(event.keyCode).toLowerCase();
 
            if (event.ctrlKey && (keystroke == 'c' || keystroke == 'v' || keystroke == 'a')) {
                alert("This function not allowed");
                event.returnValue = false; // disable Ctrl+C
            }
        }
    </script>

and call the function in html body

<body onkeydown="javascript:Disable_Control_C()">
Hello World!
</body>
</html>
Read More

August 7, 2013

Disable Right Click Button - Javascript

while developing web application ,some situation arises where we have to disable right click button of a mouse in web pages of Asp.Net,PHP ,JSP. you can achieve this by using Javascript.

Qusetion - How to disable right click button of mouse in webpage.

Solution- 
add below script in head section of web page

<script type="text/javascript">
        var msg = "This function is disabled!";
        var bV = parseInt(navigator.appVersion)
        var bNS = navigator.appName == "Netscape"
        var bIE = navigator.appName == "Microsoft Internet Explorer"
 
        function nrc(e) {
            if (bNS && e.which > 1) {
                alert(msg)
                return false
            } else if (bIE && (event.button > 1)) {
                alert(msg)
                return false;
            }
        }
 
        document.onmousedown = nrc;
        if (document.layers) window.captureEvents(Event.MOUSEDOWN);
        if (bNS && bV < 5) window.onmousedown = nrc;
    </script>
..........................................................................................

Read Also...

How to prevent page going back on backspace button click

Read More

August 5, 2013

The History of IPhone : Story so Far

In a scant few hours now, we’ll dive into chapter five in one of the most compelling stories of our digital-dominated era: The Life And Times of the iPhone. So for those of you who haven’t been paying attention, and even those of you who have (hands up if you remember the ROKR iTunes phone), here’s a recap.


Hover over the infographic to reveal pictures, videos and links from iPhone history. (The launch date of each phone is at the top of its screen.) Take note of the chips used in each iteration, and find out more about the real genius behind the iPhone’s design. Wax nostalgic in the comments about your favorite moments. And get ready for a whole new chapter Tuesday morning, whether it’s the iPhone 5, the 4S or both.




Read More

August 4, 2013

Grow Your Busines with Facebook


Facebook Business Page
Facebook on Tuesday debuted a step-by-step online guide aimed at helping small businesses use the social networking site.


The company is billing the new webpage, found at Facebook .com/business, as an "online education centre" that gives directions on such things as how to set up a profile page, create targeted ads and deals, and interact with customer feedback online.


The timing is interesting, as it comes just a week after Google began shutting off all company profiles on its Google + social network. The search engine giant says it's just company policy to restrict Google+ access to individual users, a stance that has inspired a good deal of controversy in recent days.


Facebook's new business webpage does not come along with any new features, it simply puts a lot of information that may be handy for small businesses in one place. Perhaps most importantly, it serves as a nicely timed reminder that unlike Google+, Facebook encourages companies to use its service for company branding.


"Facebook allows small businesses to create rich social experiences, build lasting relationships and amplify the most powerful type of marketing, word of mouth," a Facebook spokesperson wrote in an email. "We created Facebook.com/business to make it even easier for people to reach these objectives and grow."


This represents the second time in a month that Facebook has followed Google+ news with its own feature launch. Earlier in July, Facebook announced a partnership with Skype to bring video chat features within the social networking site, just one week after Google+ made waves with its own in-app video chat feature called Hangouts.


The timing of these events could certainly be coincidental, but it does look like Facebook is taking Google's recent entry into the social networking landscape seriously, and is increasing its feature updates and user satisfaction initiatives in turn. The new competition may be stressful for Zuckerberg and company, but ultimately it's great for consumers if both Google and Facebook continue to bring their A-games.


FB's new trick
The new webpage, found at http://facebook.com/business, gives directions on how to set up a profile page, create targeted ads and deals, and interact with customer feedback online. The timing is interesting, as it comes just a week after Google began shutting off all company profiles on Google+. This represents the second time in a month that Facebook has followed Google+ news with its own feature launch.
Read More

August 3, 2013

GPG Dragon Box v3.26 Ready to download

GPG Dragon Box v3.26 Ready to download . Features og GPG Dragon v3.26
  • Add SPD 8825\6825 CPU Support [First in the World]
  • Add SPD 8825\6825 CPU Write Flash Support
  • Just Support Factory Flash PAC Format File
  • Move the MTK 6575 NAND Write Flash Support 0x840 page
  • Add MTK android IMEI Change with USB Cable Support 
  • <Without Root\more easy do it!!!>
  • Software Add Set Pinout Windows
  • in Software Tools Add Dragon V2 software 
  • Add Reset Foramt for SPD android Phone [beta]


Download Now


Reference Link
http://www.4shared.com/get/6XwUfG4j/dragon_v326_only.html
Read More

July 24, 2013

How to do Effectively Working from home



Tips for Effectively Working from Home



If you're considering working from home, it's important to find a healthy balance between getting your work done and having a healthy home life. Before you commit to anything, you might try out working from home for a short period of time to see if it's the right environment for you. A lot of people can have a difficult time disconnecting from their work, even after the work day is over, which can cause them to work too much and over exert themselves. Other people have difficulties focusing when they work from home. In the end, it's all about finding the balance between work life and home life.


You should take time to consider the effects of working from home before you fully commit to it, because you may not realize that there is a difficult balance of separating your work life from your home life. In addition, it can be difficult for remote workers to feel connected to the office environment simply because you're not in the same place as your co-workers. This means it will take extra effort on your part and on the part of your co-workers and employer to stay connected and in constant communication. There are so many benefits to working from home, but it's also important to make sure it's the right and healthy choice for you. We've compiled some tips to help you find the perfect balance between your personal life and your work life, and hope these help you effectively and happily work from home.

Define Your Workspace





One of the first things you should try to do if you're going to work from home is set aside a space to work where you can completely focus on work. It's nice to have a little area that is specifically set aside to get things done that you need to. At the end of the day you can step away from this space, with the comfort of knowing all your work papers and documents are safely in one place.


Partitioning off a part of your home is a great way to help you find a balance between work and home. Setting aside a space just for your work, means that the rest of your home is dedicated to your home and personal life.

Stay Organized





Sometimes it's difficult to separate work life from home life, but it can become increasingly more difficult when you're working from home. The key is to stay organized. For different people, this means different things, but it's all about finding what is going to work for you.


Check out these ways to stay organized:

Keep an Up-To-Date Calendar: Use a paper calendar or a digital calendar to keep track of upcoming tasks and events. Whatever system works for you, use it so that you don't forget what you have to do or get done.

Use a To Do List: Create a daily, weekly, or hourly to-do list to help you keep track of the variety of things you need to get done.

Everything has a place: In your defined workspace, make sure that you keep all of your different papers and projects neat and organized, don't complicate your space by incorporating household bills or projects...

Understand Your Expectations


Before you can work from home and have it be effective for both you and your company, there should be expectations established on both sides. The employer has to fully trust the employee and lay their expectations out on the table clearly. Are there work hours? Are you expected to be online and available at certain times? Do you simply have to get the job done as best you can, no matter what your hours? From the worker perspective, you have to trust yourself that you can get the job done from home. If you're easily distracted and this could impact the performance of your work, why tempt fate?

Take Breaks





When you work at the office, you're bound to take breaks. Whether it's going to get coffee, or taking a few minutes to chat with your co-workers, you won't always be going 24/7. When you work from home, it's important to remember to take time for yourself to breathe and step away from from your work. You still need to eat meals and give your brain some time to pause and relax for a little while. Scheduling reminders to take a break may seem a little silly, but hey, whatever works!



Define Work Hours







Try to set certain hours that you're going to work when you work from home so that you continue to maintain some sort of a schedule. Tell yourself you're going to work from 8-5 and take breaks in between. When 8am comes around you should be ready to work with 100% effort, and then when it's 5pm it should be time to stop and take care of yourself and go out and have a little bit of fun. Maintaining balance is important so that you don't burn out and end up driving yourself mad.

Don't Isolate Yourself, But Also Set Boundaries






It's super important to stay connected with your co-workers, or if you work by yourself, to try and stay connected with the outside world in some way. You can try going to a co-working space, a coffee shop, or anywhere where you're not always by yourself. If you want the ambiance of a coffee shop, but can't leave your house, you might try something like Coffitivity to bring the coffee shop to you.


It's also important to set boundaries with your friends and family. Make sure the people in your life know that you have a job and you have to get work done, even if you're working from home.

If Possible, Go Into the Office
Sometimes it's good to go in to the office and actually get people to see your face in real life. It will make a big impression and show a lot if you make that little bit of extra effort to be present and show your face to the company. Skype is great, but so are face-to-face meetings.

The Final Word: Working from home is a privilege, you just want to make sure that you don't let your work life completely consume your home life. Be sure to take breaks, find the balance between working, and having a healthy personal life.
Read More

July 23, 2013

How to Password-Protect to Your Digital Life


If you're using weak passwords, you're doing so at your peril. Hardening them may seem like an onerous task, but it's nothing compared to the energy you'll have to expend -- not to mention the losses you might incur -- if you allow an important account to be breached. Cut the job down to size by following a few simple password rules of thumb. Start by setting some priorities.


It's no longer acceptable to use dates of birth, pet names and so on for passwords. These easily guessed words were never secure, but it didn't matter much in the past -- quite frankly, who cared if a black hat got into your email account? So what?
However, things are much different today, because our lives are now digitally enveloped. Everything from banking to relationships is now inexorably online.
Here's how to protect your digital life with hardened passwords.

Step 1: Strategic Planning

Determine which accounts to start hardening. Aim to systematically re-password the online accounts related to money first.
This can be quite a project, so start with banks and other valuable Web accounts; progress to email and social networks. End up -- on a rainy day -- rebuilding passwords for minor accounts like loyalty cards.

Step 2: Choose Good Passwords

Vary passwords and create different ones for every account. This is particularly important for any sensitive accounts like banking. Make up passwords by hand using a combination of letters, numerals and characters.
Introduce upper-case letters randomly within words; if you spell words, spell them wrong and use multiple unrelated words. Use numbers in lieu of letters from time to time, for example substitute a zero for an "o."
Alternative methods include thinking of a phrase and taking the first letter of each word -- or variations on that theme.
Tip: Crackers can use computer-driven dictionaries, pattern checking and word list substitutions that can attempt millions of passwords per second.

Step 3: Re-invent the Security Question Answer

Do not directly answer the security question. For example, if the security question requests a mother's maiden name or first school, fabricate them.
Tip: Use the same construction technique as in the previous step -- for example, misspelling your answer to beef things up even more. Just don't forget what the answer is.

Step 4: Two-Step Authentication

Use two-factor authentication if it's offered. This method of protection uses two factors, usually a password (something you know) and a phone or other device (something you have in your possession).
I've written about Google's authentication before. Facebook also offers this method of authentication.

Tip: Don't maintain a password list on a device you're using for two-step authentication.

Step 5: Stay Alert

Be aware of social engineering attempts. These are human interventions that are designed to trick you into giving your password to a criminal. Avoid this problem by never giving out your password.
Tip: Reset a password if you're in any doubt that you may have been tricked.

Step 6: Looking in Gift Horses' Mouths

Add password protection when offered. Laptops and phones can get lost -- or compromised by casual thieves.
It's not just professional crackers that you need to protect yourself from. Laptops are often fenced and resold.

Step 7: Harden Further

Delete emails from new-account senders that include your password. Always change the initial setup password when prompted.
Set parental controls on in-app purchases for your mobile device. This is an area where a password becomes useful in thwarting any game upgrades that can inexplicably and rapidly occur when you lend your iPad to a child for games -- as has happened to me. I am about US$40 poorer than I was before I lent the tablet, because I left restrictions open.
Tip: Apple's device "Restrictions" are in Settings. Android controls in-app purchases in the Google Play store. Both let you set passwords, which you should not share with kids.

Step 8: Repeat

Do it all again when you've finished. Password cracking is all about time -- how many attempts at a guess can be made over a period.
The more often the password is changed, the less likely it is to be cracked.

Read More

July 21, 2013

How to optimize a Stored Procedure - SQL Server

We will go over how to optimize Stored Procedure with making simple changes in the code.
  • Include SET NOCOUNT ON statement: With every SELECT and DML statement, the SQL server returns a message that indicates the number of affected rows by that statement. This information is mostly helpful in debugging the code, but it is useless after that. By setting SET NOCOUNT ON, we can disable the feature of returning this extra information. For stored procedures that contain several statements or contain Transact-SQL loops, setting SET NOCOUNT to ON can provide a significant performance boost because network traffic is greatly reduced.

CREATE PROC dbo.ProcName
AS
SET
NOCOUNT ON;
--Procedure code here
SELECT column1 FROM dbo.TblTable1
-- Reset SET NOCOUNT to OFF
SET NOCOUNT OFF;
GO

  • Use schema name with object name: The object name is qualified if used with schema name. Schema name should be used with the stored procedure name and with all objects referenced inside the stored procedure. This help in directly finding the complied plan instead of searching the objects in other possible schema before finally deciding to use a cached plan, if available. This process of searching and deciding a schema for an object leads to COMPILE lock on stored procedure and decreases the stored procedure’s performance. Therefore, always refer the objects with qualified name in the stored procedure like

SELECT * FROM dbo.MyTable -- Preferred method
-- Instead of
SELECT * FROM MyTable -- Avoid this method
--And finally call the stored procedure with qualified name like:
EXEC dbo.MyProc -- Preferred method
--Instead of
EXEC MyProc -- Avoid this method

  • Do not use the prefix “sp_” in the stored procedure name: If a stored procedure name begins with “SP_,” then SQL server first searches in the master database and then in the current session database. Searching in the master database causes extra overhead and even a wrong result if another stored procedure with the same name is found in master database.

  • Use IF EXISTS (SELECT 1) instead of (SELECT *): To check the existence of a record in another table, we uses the IF EXISTS clause. The IF EXISTS clause returns True if any value is returned from an internal statement, either a single value “1” or all columns of a record or complete recordset. The output of the internal statement is not used. Hence, to minimize the data for processing and network transferring, we should use “1” in the SELECT clause of an internal statement, as shown below:

IF EXISTS (SELECT 1 FROM sysobjects
WHERE name = 'MyTable' AND type = 'U')

  • Use the sp_executesql stored procedure instead of the EXECUTE statement.
    The sp_executesql stored procedure supports parameters. So, using the sp_executesql stored procedure instead of the EXECUTE statement improve the re-usability of your code. The execution plan of a dynamic statement can be reused only if each and every character, including case, space, comments and parameter, is same for two statements. For example, if we execute the below batch:

DECLARE @Query VARCHAR(100)
DECLARE @Age INT
SET
@Age = 25
SET @Query = 'SELECT * FROM dbo.tblPerson WHERE Age = ' + CONVERT(VARCHAR(3),@Age)
EXEC (@Query)

If we again execute the above batch using different @Age value, then the execution plan for SELECT statement created for @Age =25 would not be reused. However, if we write the above batch as given below,

DECLARE @Query NVARCHAR(100)
SET @Query = N'SELECT * FROM dbo.tblPerson WHERE Age = @Age'
EXECUTE sp_executesql @Query, N'@Age int', @Age = 25

the compiled plan of this SELECT statement will be reused for different value of @Age parameter. The reuse of the existing complied plan will result in improved performance.

  • Try to avoid using SQL Server cursors whenever possible: Cursor uses a lot of resources for overhead processing to maintain current record position in a recordset and this decreases the performance. If we need to process records one-by-one in a loop, then we should use the WHILE clause. Wherever possible, we should replace the cursor-based approach with SET-based approach. Because the SQL Server engine is designed and optimized to perform SET-based operation very fast. Again, please note cursor is also a kind of WHILE Loop.
  • Keep the Transaction as short as possible: The length of transaction affects blocking and deadlocking. Exclusive lock is not released until the end of transaction. In higher isolation level, the shared locks are also aged with transaction. Therefore, lengthy transaction means locks for longer time and locks for longer time turns into blocking. In some cases, blocking also converts into deadlocks. So, for faster execution and less blocking, the transaction should be kept as short as possible.
  • Try to Avoid Inner Query (sub Query) - do not use inner queries in your stored procedure it slows down your sp.
  • Use Table Indexes - Tables should have proper indexes and should be compiled time to time as indexes may be weird off after some time due to huge data insertion or deletion.
  • Use TRY-Catch for error handling: Prior to SQL server 2005 version code for error handling, there was a big portion of actual code because an error check statement was written after every t-sql statement. More code always consumes more resources and time. In SQL Server 2005, a new simple way is introduced for the same purpose. The syntax is as follows:

BEGIN TRY
--Your t-sql code goes here
END TRY
BEGIN CATCH
--Your error handling code goes here
END CATCH

Read More

July 16, 2013

How To Change Oil and Flatten Tyre | Jump Start a Dead Battery in car

Why There is Need for Oil Changes ?

Like everything, automobiles also require maintenance. One of them is oil Changes. Regular oil changes ensure longer engine life of an automobile. For automobiles with frequent short trips where there is no chance to warm up completely, oil changes becomes more important because acid and moisture buildup does not have a chance to burn off. There are new engines that normally run very hot. Missing even a single oil change can cause an engine to develop sludge which can cause engine damage early on.
Modern oils generally contain detergents and additives that are designed to protect against sludge formation but if you regularly do a lot of short trips viz. during rush hour traffic, engine heat will eventually break down these additives hence stop protecting car engine. Thus, best way to protect your car, with regular oil changes. Here, is a full guide on how to change Car oil.

How To Change Car Oil – 10 Simple Steps

1. Keep yourself equipped all your materials: new oil, filter, oil pan, pliers, screwdriver and correct size wrench.
2. Lift the car safely by using the jack stand on the frame of the car.
3. Now, pour out used oil from car. Remove drain plug and drain the used oil into oil pan.
4. After pouring out the used oil, put plug back in and tighten it.
5. Locate the oil filter and remove it.
6. Put on the new oil filter in place.
7. Now, remove Jack stands and lower your car.
8. Add 4 half quarts of oil.
9. Start your car and let it run for 10-20 seconds.
10. Check if required quantity is there or not. Check oil and add correct amount.

How to Change a Flat (Punctured) Tyre – 10 Step Guide

    1. 1. Move to the side of the road and turn on hazard lights.
      2. Put on the E-Brake and get your tool trunk out.
      3. Get tools out of the trunk (jack, wrench, tyre). Get spare tyre out from the trunk.
      4. Loosen lugnuts slowly.
      5. Check for a good place on the frame to lift up the car using Jack stand.
      1. 6. Take lugnuts off and take off the flat tyre.
        7. Put the spare tire on. Tighten down all the lugnuts.
        8. Double check lugnuts.
        9. Now, lower the jack.
        10. Put the flat tire and tools back to the trunk, remove E-Brake, turn off hazard lights, and check for traffic before pulling back onto the road.


    1. Jump Start a Dead Battery – 5 Step Guide

      1. 1. Bring the two Cars closer enough to make the efficient connection between them. Line cars up so that batteries are close as possible. Make sure car engines are off and batteries not leaking.
        2. Connect positive on good or working battery.
        3. Connect negative on dead battery.
        4. Turn good battery on and turn key on the dead car.
          5. If car doesn’t start, check connections and try again.
          6. And there you go Battery will jump start. Unhook cables, close the bonut, and drive away


    Read More

    July 14, 2013

    Data, Information and Knowledge

    Data by itself is useless. An MP3 file is garbage without software to render it into a song, which is a kind of information. Ditto with your bank balance and the video you shot over the holiday, or the formula or source code for a new product. Instead of making data security our top priority, wouldn't we be better off focusing on data transformation?


    I still see far too many examples of content confusing the ideas of data and information. Sometimes it seems a writer is simply trying to avoid being redundant when using data and information in the same sentence to mean the same thing. Of course, they are different, and the result is unnecessary confusion.

    I just wrote a paper for a European law journal on the topic, and I learned more about it than is healthy for one person. The piece will be out in August. Generally, I admire the effort the Europeans are making to get it right, though they are less concerned with data and information per se than they are with privacy and security. These things all intersect but in sometimes unpredictable ways. The more I think about things, the less I am sure of -- and the more questions I have.

    The European parliament is trying to figure out laws that protect individual rights to privacy, which necessarily affect what data is kept and what is not. That makes sense, and it sounds simple, but how do you do that? Does a person walking on a street have a right to privacy and thus a right to determine how you use a crowd photo?

    What if a corporation like Google or a government takes the photo? Are we to prevent photos, based on the premise that someone someday might do something to a person in one of the photos based on the picture? From there it gets silly, but there are some concrete situations that are nothing to laugh at.

    The Persistence of Memory

    Take the case of a nurse in Connecticut who was arrested for possessing a small amount of pot. The case was dismissed when she agreed to take some drug education courses, according to an article in The New York Times. In the good old days, that would have been the end of it, because according to Connecticut law -- and the laws in many other states -- her record was wiped clean with the dismissal. Under Connecticut law, she can even testify under oath that she has never been arrested now that the record has been cleared.

    That all makes good sense to me. It might not be factually correct, but these expungement laws are one of the fictions we create in modern life to keep the world spinning. However, with the Internet, there's no such thing as expungement, and a search still comes up with the original news article that -- while true when it was published -- is now false.

    It matters, because this nurse can't find a job any more, thanks to the simple expedient of prospective employers doing a rudimentary search on every new job applicant. What to do? She's suing the news organizations that wrote the story for slander, but the story was true when it was reported. Yikes!
    The Internet and our modern world are full of examples like this. Society used to be able to conveniently forget small indiscretions, and we all got on with life. Now that's being taken away, without anyone even giving permission or any new law being adopted. The Internet is the defacto repository of all things digital about us -- but should it be? The Europeans take all this very seriously, and perhaps we should too.

    Information Alchemy

    It seems to me that the biggest issue we have with data and information today is not data security, even though lots of it gets stolen (I'm talking to you People's Liberation Army unit 61398). In fact, I think we've put too much emphasis on physically securing data and given too little thought to how it is transformed into information.

    After all, data by itself is useless. An MP3 file is garbage without software to render it into a song, which is a kind of information. Ditto with your bank balance and the video you shot over the holiday, or the formula or source code for a new product.

    Wouldn't we be better off focusing on data transformation? A new photo sharing service, SnapChat, takes this approach by delivering photos that disintegrate after 10 seconds. That's far from ideal for most applications, but it's on the right track.

    Generally, I think data ought to be handled like milk in a supermarket; it ought to have an outdate after which it automatically becomes archival. You might be able to access archival data, but transforming it back into its original information content would have to be restricted in some way.
    Look, we can still access information about various flat Earth theories, but we all know this is archival and historic and no longer scientific. Some of us can still take it seriously if we want to, but we can't take it to the bank or whatever -- you know what I mean.

    We don't have anything like that for data yet -- something that says this does not yield not the information it once did. On a parallel path, if we were better able to control the conversion of data to information so that only the data's owners could de-encrypt it, might we have less data theft and the loss of intellectual property that goes with it?

    If any of this makes sense, then it's not data security we should focus on as much as secure data conversion or transformation into information -- those are different issues with different approaches. When you think of it this way, the differences between data and information are starkly clear. It gives us all good reason to consciously choose the right words to convey our meaning.

    Read More

    © 2011-2016 Techimpulsion All Rights Reserved.


    The content is copyrighted to Tech Impulsion and may not be reproduced on other websites.