Current Headline

Listen to Your Daily Tune's

Sunday, January 31, 2010

Thought of the Day

Outward Honor

An outward honor for an inward toil.


Read More ....

Thursday, January 28, 2010

Naruto Manga 480

Naruto Manga 480

Read More ....

Thought of the Day

Learn to love good books. There are treasures in books that all the money in the world cannot buy, but the poorest laborer can have for nothing.

Read More ....

Tuesday, January 26, 2010

Happy Republic Day from Xpert Zone Blogspot

Wishing Everybody a Happy Republic Day 
from Xpert-Zone Blogspot :)

Watch Video Here

Read More ....

Friday, January 22, 2010

Thought of the Day

You can’t put democracy and freedom back into a box.

Read More ....

Wednesday, January 20, 2010

Thought of the Day

The highest compact we can make with our fellow is — “Let there be truth between us two forevermore.”

Read More ....

Tuesday, January 19, 2010

Thought of the Day

"To understand your parents’ love you must raise children yourself."

Read More ....

Saturday, January 16, 2010

Thought of the Day

“The number one benefit of information technology is that it empowers people to do what they want to do. It lets people be creative. It lets people be productive. It lets people learn things they didn’t think they could learn before, and so in a sense it is all about potential.”

Read More ....

Thought of the Day

"Desire is the key to motivation, but it's determination and commitment to an unrelenting pursuit of your goal — a commitment to excellence — that will enable you to attain the success you seek."

Read More ....

Doomsday Clock

Doomsday ClocK

Doomsday Clock has been moved again on this Thursday at 10 am EST at the New York Academy of Sciences. The clock was created in 1947 and has been moved 19 times till now. It is placed at the Bulletin of Atomic Science offices in Chicago, Illinois. It happened for the first time in the history of internet that a website TurnBacktheClock, has been launched to allow everybody from all around the world to get involved and inspire leaders to take action, quoted by Kennette Benedict, the executive director and publisher of the Bulletin of the Atomic Scientists. Last time it was moved in January 2007 when the minute hand was adjusted and forwarded by two minutes from 7 to 6 before midnight.

“The Bulletin of the Atomic Scientists”, is a magazine that’s always carried a close or narrow attention towards the dangers and warned the world about it. On January 2007, when the Doomsday clock was moved, according to the same magazine, “The change was meant to reflect two major sources of potential catastrophe that could bring us closer to **Doomsday**”. For 2010, DOOMSDAY CLOCK ANNOUNCEMENT is done by New York Academy of Sciences. “The Bulletin of the Atomic Scientists” , this time, adjusted the clock by 1 Minute from 5 to 6 Minutes Before Midnight and according to them, “Negotiations on nuclear disarmament, Expansion of civilian nuclear power, Possibilities of nuclear terrorism and last one is climate change, came out to be the factors that was influencing them for changing of Doomsday Clock.”

According to “The Bulletin of the Atomic Scientists” website, the team left a message for everyone. They said, “For the first time in decades we have an opportunity to free ourselves from the terror of nuclear weapons and to slow drastic changes to our shared global environment. We encourage scientists to continue their engagement with these issues and make their analysis widely known. We urge leaders to fulfill the promise of a nuclear weapon-free world and to act now to slow the pace of climate change. Finally, we call on citizens everywhere to raise their voices and compel public action for a safer world now and for future generations.The Clock is ticking.”

Lawrence M. Krauss, co-chair of the Bulletin's Board of Sponsors and a professor at Arizona State University's School of Earth and Space Exploration and its physics department, said, ”We are poised to bend the arc of human history. What that means is that there's great potential for it to move in either direction depending on what happens, adding that while there's been a "sea change" in attitude and the expansion of possibilities, there still hasn't been a lot of action. That's hopeful enough to move it but just by a little bit".

"By shifting the hand back from midnight by only one additional minute, we emphasize how much needs to be accomplished, while at the same time recognizing signs of collaboration among the United States, Russia, the European Union, India, China, Brazil, and others on nuclear security and on climate stabilization," said the official announcement.

The citizens had been given their chances for being a part of it that’s a thing of appreciating. The whole credit goes to Kennette Benedict and The Team who are making so much effort and even launched a website TurnBacktheClock for us providing appropriate info including announcements about the whole event. We are proud of being a part of this. Hats off to the whole team.

Check Video Here:-


Read More ....

If "The Lovely Bones" Fails...

Peter Jackson is outraged by the leak of his latest film "The Lovely Bones." He fears that the leak of the movie will hinder its earning capacity.
Having seen the movie, as many of you have, I don't think it will be the P2P community that will make this movie a box office failure. Several factors will lead to its less than spectacular return on investment.
The biggest thing being that although the film is good, it is not a great film. No "Lord of the Rings" for sure. The film is good, don't get me wrong. Saoirse Ronan does a great job and the casting of her as Susie Salmon was spot on. She carries the film. The role of George Harvey played by Stanley Tucci stands out as well. Not much else to say though. Wahlberg was dry and his emotions seemed forced. And not sure what Sarandon was trying to do, she seemed just way over the top.

Secondly the murder and rape of children (yes the book) is just not something we enjoy to think about. It tugs at our heart strings, we are touched and walk away feeling somewhat sick to our stomach then we try to forget about it. In this economy I know I would rather spend my money being swept away to an alien planet and visually wowed rather than feeling the anxiety and fear of a child’s rape and murder. And yes I realize that is not what the film is about. But it is still there.

Thirdly is the budget: 100 Million. When compared to other movies that are tear jerkers this is rather high. The combined estimated budgets of The Road (20 mil), The Blind Side (29 mil and Precious (10 mil) was only 59 Million. Yes, the Road has not faired well but I think that is due to the bleak economy right now; whereas the Blind side and Precious have both faired very well.

One of the most anticipated movies of 2009, "Where the Wild Things Are", had an estimated budget of 100 million as well. Since its release in October it has only earned 87 Million Worldwide. It will need to earn another 13 Million in DVD Sales just to break even.

So in conclusion Peter Jackson should not blame the P2P community when the movie does not match the profit margin of LOTR. He should blame himself. High production cost, questionable casting and poor editing will lead to the less than spectacular performance of the movie. Not a handful of people who have seen the movie via the Internet.

Read More ....

Friday, January 15, 2010

Thought of the Day

Nothing average ever stood as a monument to progress. 
When progress is looking for a partner it doesn't turn to those who believe they are only average. 
It turns instead to those who are forever searching and striving to become the best they possibly can. If we seek the average level we cannot hope to achieve a high level of success. 
Our only hope is to avoid being a failure.

Read More ....

PC Running Slow , Hanging , Well here could be Solution

PC Running Slow , Hanging , Well here could be Solution 

Slow Computer Checklist

Because many members post about their computer responding slowly, VS is posting a summary checklist of general steps a member can take to resolve this problem, and briefly discussing the three most common causes: malware, uncontrolled applications, and lack of maintenance.


Perhaps the greatest contributor to a poorly performing computer is malware. Usually this is associated with downloading an application that contains spyware, by not having browser security settings high enough, by carelessly downloading P2P files, or by failing to install security patches in a timely manner.

Step 1.
Update the definitions of your anti-virus and run a complete scan of your hard drive in Safe Mode. Resolve any unfixable issues. Note that some viruses require additional steps before they can be removed; usually a websearch will find specific instructions or a special removal tool. If you cannot find a solution, use the VS Lab to request help.

Step 2.
If the sluggishness is sudden, and you have recently downloaded an application, the problem may reside there. Test this by completely removing it. A wise user will generally perform a websearch about the application before downloading it because in most cases, any potential problem with malware or poor performance will have surfaced.

Step 3.
Adware and Spyware can drastically effect your computer’s performance, and these are all over the Internet. A very recent study indicated that one out of every 20 executable files on Web sites is spyware, and 1 in 25 domains contain at least one piece of spyware waiting for victims
Update the definitions of your anti-spyware applications and scan your hard drives in Safe Mode. Experienced users will regularly run two or three of these applications, because each company has its own criteria for what constitutes spyware and will only search against their own set. (A list of very good, free anti-spyware applications is provided by VS). Again, resolve any open issues before proceeding to the next step.

Uncontrolled Applications

Step 4.
Review applications that self-launch on startup. You computer can be a battleground for your attention. Many programs, for instance, install a quick-launch feature that allows them to be opened quickly; other programs will include an automatic update feature that requires them to be running in the background. Each of these slows down your launching Windows and each requires a small bit of resources while your computer is running.
The easiest way to review and than to manage start-ups is to use one of the many small utilities . If, for example, you have Spybot Search and Destroy, you can use its startup tool that lists startups and allows you to turn off any you do not need. If you are unsure about what can be safely deleted, remember that VS maintains a very comprehensive Startup Database that includes information about whether the questioned item is needed, optional, or not needed.
At the same time, remember that all those icons on your Desktop also take a small amount of boot time to place themselves.

Lack of Maintenance

Step 5.
Clean up your hard drive (preparation for Step 7). Delete unused programs and transfer old files to a CD. Unplayed games, lots of family pictures, zipped files that you have already opened, applications you have not used in two years, software for that old printer you threw away last year---these are some examples of files you can delete. Then use Window’s Disk Cleanup to delete temporary internet files, temporary PC health files, etc..
(Note for advanced users: some experts would include the additional maintenance step of cleaning up the Windows registry, and there are several applications to help do this. For the most part, registry maintenance will not make a significant difference, and unless you are very comfortable with Windows, and carefully make backups of the registry, you can do serious harm by making registry changes, so this step is not included.)

Step 6.
Run scandisk/checkdisk in Safe Mode. Have it repair anything it finds.

Step 7.
Defragment your computer. Windows tends to put new files in any available open space; defragging will place associated segments of files closer together so your read arm has less travelling around the hard drive to do, saving wear and tear while speeding up programs.

Read More ....

Naruto Manga - Chapter 478 [HD]

Read More ....

Wednesday, January 13, 2010

Thought of the Day

"It is hard to be truly excellent, four-square in hand and foot and mind, formed without blemish."

Read More ....

Tuesday, January 12, 2010

Thought of the Day

"You must motivate yourself EVERYDAY!

Read More ....

Saturday, January 09, 2010

Some Google Commands

Some Google Commands - This command will show you all of the backlinks to your site. Handy tool for finding out who is linking to you. - This command will show you a list of pages that Google thinks are related to your site in some way. - Searches only those pages from the site you list.

allinurl: - If you start a query with [allinurl:], Google will restrict the results to those with all of the query words in the url. For instance, [allinurl: google search] will return only documents that have both "google" and "search" in the url.

define: - The query [define:] will provide a definition of the words you enter after it, gathered from various online sources. The definition will be for the entire phrase entered (i.e., it will include all the words in the exact order you typed them).

inurl: - If you include [inurl:] in your query, Google will restrict the results to documents containing that word in the url. For instance, [inurl:google search] will return documents that mention the word "google" in their url, and mention the word "search" anywhere in the document (url or no). Note there can be no space between the "inurl:" and the following word.

allintitle: - If you start a query with [allintitle:], Google will restrict the results to those with all of the query words in the title. For instance, [allintitle: google search] will return only documents that have both "google" and "search" in the title.

intitle: - If you include [intitle:] in your query, Google will restrict the results to documents containing that word in the title. For instance, [intitle:google search] will return documents that mention the word "google" in their title, and mention the word "search" anywhere in the document (title or no). Note there can be no space between the "intitle:" and the following word.

cache: - If you include other words in the query, Google will highlight those words within the cached document. For instance, [ web] will show the cached content with the word "web" highlighted.

info: - The query [info:] will present some information that Google has about that web page. For instance, [] will show information about the Google homepage. Note there can be no space between the "info:" and the web page url.

spell: - Does a spell check of any given word.

stocks: - If you begin a query with the [stocks:] operator, Google will treat the rest of the query terms as
 stock ticker symbols, and will link to a page showing stock information for those symbols. For instance, [stocks: intc yhoo] will show information about Intel and Yahoo. (Note you must type the ticker symbols, not the company name.)

filetype: - Does a search for a specific file type, or, if you put a minus sign (-) in front of it, it won’t list any results with that filetype.

daterange: - Is supported in Julian date format only. 2452384 is an example of a Julian date.

maps: - Is a shortcut to do a google maps search.

phone: - Searches for anything that looks like a phone number.

allinlinks: - Searches only within links, not text or title.

allintext: - searches only within text of pages, but not in the links or page title.

 Check Video Here:-

Read More ....

Friday, January 08, 2010

Plastic Logic

Plastic Logic e-reader aims to challenge Kindle
UK firm Plastic Logic has launched its Que e-reader in a bid to challenge the dominance of Amazon's Kindle.

The lightweight, touch-screen device went on display at the Consumer Electronics Show in Las Vegas.
The Que e-reader is based on Cambridge University research and has taken over 10 years to develop, with more than $200m of investment.
However the device, which has wireless and 3G connectivity, will not immediately be available in Britain.
"British users may be disappointed that this British company is yet to announce plans to bring this product to the UK," said the BBC's technology correspondent Rory Cellan-Jones.

Flexible technology

The gadget has a black and white screen and is aimed at "mobile professionals", according to the company. It is currently a lot more expensive than its rival the Kindle.
The 4GB and 8GB models are priced $649 and $799 (£407 and £501) while the latest Kindle retails on the Amazon website at $259 and $489 (£162 and £306).
It is the first of a new range of products that the company hopes to build using flexible plastic electronic displays rather than heavier glass-based screens.

"They have built an impressive global business but are taking a risk by going on their own rather than licensing their technology to a better known name," added Mr Cellan-Jones.
However Plastic Logic - a spin out form Cambridge University's Cavendish labs - intends to build partnerships with other companies in the future to share its technology.
Digital books for the e-reader are being supplied by Barnes & Noble, whose eBookstore houses over 700,000 digital books compatible with various mobile devices.
It has also struck deals with newspapers such as USA Today.
Amazon, by comparison, says that it now provides more than 400,000 books and 100 newspapers and magazines on the Kindle. 

Check Video Here:-

Read More ....

'Shorter' people get more lung disease

'Shorter' people get more lung disease

People who develop chronic lung disease are more likely to be shorter in height than the general population, researchers say.

The University of Nottingham team looked at more than one million people aged over 35 for their study.
They say those with Chronic Obstructive Pulmonary Disease (COPD) were 1.12cm shorter on average.
They believe that this lack of height may be a 'marker' that people have come  from a poorer background.

Writing in the Journal of Epidemiology and Community Health, they say that historical studies had shown a strong relationship between adult height and the risk of developing COPD but they wanted to test whether the effect remained today now that living conditions have improved.

They obtained data on 1,025,662 people from a general practice database called the Health Improvement Network.
The association between height and lung disease was strongest in people aged 35 to 49 years and decreased progressively with age.
The smallest height difference was in the over 90s where the average difference was only 0.51cm.
They say this could be because many of the older generation who suffered from the disease actually died from it in recent years.

People with COPD have permanent scarring to the lung tissue caused mostly be smoking.
It is estimated that 3.7 million people in the UK have the disease, but only 900,000 are currently diagnosed.
The researchers think that people who came from poorer backgrounds were more likely to have had mothers who smoked, had poor nutrition during their early years affecting general growth and lung development, and were more likely to live in smoking households and smoke themselves.

Richard Hubbard, professor of respiratory epidemiology at the University of Nottingham, who co-authored the study said: "There's a double whammy associated with deprivation.

"Poorer nutrition in the 'womb' and when growing up as a child can affect general growth and lung development.

"This is combined with an increased likelihood to live with families and peers who smoke - influencing the chance of taking up and sticking with the habit.
"We know that smoking is the principal cause of COPD and all of these factors combined could increase the risk even more."
Professor Mike Morgan, chairman of the British Thoracic Society, said: "We need to make it easier for people from disadvantaged backgrounds to make positive life choices and improvements to their health - whether it be eating well or stopping smoking.
"GPs and primary care professionals could also look out for height alongside smoking status and other chronic lung disease symptoms, to ensure that the disease is caught early."

A Department of Health spokesman said several factors which may affect growth, such as poor nutrition, are also risks for COPD.
"As part of the forthcoming national strategy on COPD we will be investigating how we can best identify these risk factors and take action to either prevent people developing respiratory conditions or halt the progression of the disease once diagnosed.

Check Video Here:-

Read More ....

Thursday, January 07, 2010

Jan IT Events

New IT Events are coming:

Business Continuity Seminar Lochristi

Started: 26-January-2010
A-Server Headquarters,
IT Valley Lochristi, Belgium
A-Server is proud to invite you to an exclusive seminar about business continuity for small and medium-size businesses. During the seminar we will demonstrate our backup and disaster recovery solutions. The product we offer is specifically designed for IT resellers..


3rd mobile Commerce Summit Asia 2010 - Manila, Philippines

Started: 24-March-2010
The Crowne Plaza Galleria Manila
The Roadmap of Mobile Commerce is to be revealed in Asia.
The 3rd Mobile Commerce Summit Asia 2010 will be happening in the premier spot of Mobile Commerce in the World – Manila, Philippines. This will bring you the untold story of how the ecosystem should get together in achieving the most rewarding benefits of Mobile Commerce Services in this dynamic world that we are living in.

Workshop Data Integration with Oracle - Lisbon, Portugal

Started: 12-January-2010
Sana Lisboa Park Hotel
Fontes Pereira de Melo, 8
1069-310 Lisboa, Portugal
Integration Data: Service Innovations in Real-Time Enterprise
Are you looking for proven solutions that make reality the concept of real-time enterprise?
As a leader in data integration, Oracle offers its customers a complete platform of products that provides the architecture for real-time data faster and more expandable than ever. By unifying superior capabilities in terms of moving data in real time, changes in group data and data quality, companies can better manage business information (Business Intelligence) in all departments and ensure a high level of performance and expansion and a reduced TCO.

UX London 2010

Started: 19-May-2010
Cumberland Hotel
London, UK
Learning of inspiration for designers of user experience.
UX London is a unique three-day talks that combines deep inspiration with workshops given by some of the biggest names in the industry.

Oracle Application Grid Tech Day: Your Enterprise Middleware Foundation - Chennai, India

Started: 13-January-2010
Chennai, India
Increase the level of efficiency, performance and reliability
The most widely deployed technology for enterprise middleware software is Java and Oracle WebLogic? Suite 11g is the fastest and most comprehensive platform for running Java applications. The latest release brings information from the company to new levels of reliability, performance and scalability.

ACCU 2010 Conference in Oxford, UK

Started: 14-April-2010
Barcelo Oxford Hotel
Oxford, UK
A non-commercial technical conference sponsored by the ACCU, an association dedicated to professionalism in programming. This is a four-day event dedicated to everything related to software development - from geek programming techniques to software processes and project management. In 2010 there will be a special issue on software testing.

Oracle Database Upgrade Workshops in London, UK

Started: 13-January-2010
Oracle Customer Visit Centre London
Knightsbridge Suite
One South Place
London EC2M 2RB, UK
Get the most from your Oracle database by upgrading to Oracle 11g Release 2
Did you know that the three biggest challenges for IT management are:  Cost reduction, Allow Change, Minimizing risk?

Learntec 2010: International Trade Fair and Conference For Professional Education, Learning And IT - Karlsruhe, Germany

Started: 02-February-2010
Karlsruhe Trade Fair Center,
Karlsruhe, Germany
LEARNTEC is the leading international trade fair and conference for professional education, learning and IT. Offers information on how online and traditional media can be effective and time-independent learning.

Briefing Inventory Optimization with SAP - Event in Stuttgart, Germany

Started: 28-January-2010
Maritim Hotel Stuttgart,
Stuttgart, Baden-Wurttemberg, Germany
In 2010,  it is important to optimize liquidity and cost management. In the logistical environment plays the inventory optimization a very important role.
SAP offers you with SAP SCM and the add-on tools to SAP ERP and SAP APO-performance applications.

 NAW (National Association of Wholesaler-Distributors) Executive Summit 2010 - Washington, DC, USA

Started: 26-January-2010
The Fairmont Washington Hotel,
Washington, DC, USA
The 2010 NAW Executive Summit focuses on several key issues and fundamental: Where is the economy headed? Where are the companies and wholesale distributors, in particular, is it going? Where is our country headed in the Obama in the U.S., continues to battle through the worst recession since the Great Depression?

SAP Business Objects Customer Day - Netherlands

Started: 28-January-2010
SAP Netherlands,
's-Hertogenbosch, Noord-Brabant,
The Netherlands
SAP Business Objects Business Intelligence has proved a valuable addition to the range of SAP. Indeed, SAP and Business Objects now increasingly in to each other touching, take the synergy benefits is increasing. On January 28, 2010 we tell you all about. During the midwinter afternoon several practical and attractive aspects of SAP Business Objects Business Intelligence explained.

IQPC Call Center Summit - Orlando, FL, USA

Started: 26-January-2010
Gaylord Palms Hotel & Convention Center
Orlando, Florida, USA,
In an economic storm, every call center professional must have the latest tools and strategies to maximize their call centers. The 5th Annual Call Center Summit is the conference you need to attend in 2010 to ensure that your call center becomes a revenue generator. You will leave with important tools for improving agent performance, leverage tools and technology, management of customer feedback, and tie every effort to return to business results.

Adobe Dreamweaver CS4 Intensive One Week Course in London, UK

Started: 15-February-2010
Macresource Computer Training Centre
London, UK
Adobe Dreamweaver CS4 Intensive One Week Course offers complete coverage of basic and advanced features. Delegates will learn the essentials of the program and the process of building basic sites and make them live. However, the course also covers the more sophisticated features of Dreamweaver to create interactive web pages.

Managed Services & Network Sharing 2010 - London, UK

Started: 19-April-2010
Hilton London Tower Bridge Hotel,
London, UK
Economic activities of the network are at the heart of strategies for mobile operators in 2010.
The current economic crisis and the consequent lack of availability of credit is pushing mobile operators to dramatically reduce the CAPEX and OPEX. Based on the business models of alternative industries such as aviation and transport, many large groups for operators with the development of innovative business partnerships to reduce capital expenditures and fixed Opex pass led models.

ProcureCon Indirect 2010 - Conference in London, UK

Started: 19-April-2010
Le Meridien Piccadilly Hotel
London, UK
ProcureCon Indirect is in its 4th year and be widely recognized by the industry, is an event in the CPO and indirect procurement heads of large companies with hiring practices couples present their case studies and share successful solutions.

Read More ....

Thought of the Day

"Even to a wicked man a divinity gives wealth, Cyrnus, but to few men comes the gift of excellence."

Read More ....

In 9 years, not one conviction of cyber criminals in state

In 9 years, not one conviction of cyber criminals in state

BANGALORE: It has been nine years since the IT Act 2000 was passed. Since then, there has been a lot

On practical challenges in cyber crime investigation, Guruprasad said the cyber police station was inaugurated in 2001, a few months after the IT Act 2000 was passed, yet only 307 cases have been registered in the past nine years. “The annual average of cases is 37. If we look at the chargesheeted ones, only 60 cases come up out of these 307 cases. But there has not been a single conviction till date in Karnataka,” Guruprasad said.

Why is the number of convictions so low? According to him, several investigating officers themselves don’t know much about cyber crime. He narrated an incident to illustrate his point, relating to a multi-crore rupees scam in Belgaum.

“A year ago, there was a multi-level marketing scam to the tune of Rs 200 crore, and it was registered in Bellary. A lot of evidence were seized and on one occasion, when our team went to that police station, the personnel had secured some desktops and laptops. Surprisingly, there were no hard disks in them. The personnel even asked us what is a hard disc,” he said.

After the amendment to the IT Act in 2009, jurisdictional inspectors can also be investigating officers. “But there is not much awareness about this. We also need to educate prosecutors and the judiciary on how to investigate and punish cyber criminals,” he added.

IT secretary Ashok Kumar Manoli congratulated the cyber lab for its performance. “The government will set up another cyber lab in Mangalore,” Manoli said.

Read More ....

Wednesday, January 06, 2010

Brand, Perry engaged in India

Brand, Perry engaged in India 

Singer Katy Perry and comic actor Russell Brand got engaged during their recent trip to India.

Brand popped the question and presented Perry with a ring just before midnight on New Year's Eve in Jaipur, Rajasthan. Dressed in traditional Indian outfits, the couple took blessings from a spiritual guru in a private ceremony that took place in a tent at the foot of a Jaipur mountain, reported

"Russell wanted to do something special for Katy to show her how much she means to him," said a source.

"They wanted to take part in a traditional ceremony and thought there was no better time than on New Year's Eve. The ceremony is usually used to bless new couples in the hope it might lead them toward marriage," added the source.

After visiting India, Brand has now taken Perry to Thailand.

Check Video Here:-

Read More ....

Tuesday, January 05, 2010

The 82nd Annual Academy Awards

The 82nd Annual Academy Awards

The Academy Awards have been a monumental celebration in the industry of motion pictures for 82 annual ceremonies now. The impact that reigns from even being nominated for an award, let alone winning one, can move actors, actresses, producers, directors, or studios into an entirely new level of recognition. Being tied into an Oscar consideration has brought some of the relatively unknown into super-stardom.

For the past century of film and broadcast, nothing has had more of an effect upon the success of those involved in the movie industry, more than the epic Oscar nomination and victory. Only the most excellent of the realm are invited to participate in this catastrophic award show. This year, for 2010, we expect no less than perfection.

The celebration is slated to take place on March 7th of 2010, at the Kodak Theatre in Hollywood, Los Angeles, California. Slated to be televised in the United States on ABC networks. Actors Alec Baldwin and Steve Martin are assigned to host the awards ceremony. Martin will make his appearance as host for the third time, after previously presiding over the 73rd and 75th ceremonies, while Baldwin will host the show for the first time.

The official nominees for the 82nd annual Academy Awards will be announced live on Tuesday, February 2, 2010 at the Samuel Goldwyn Theater in Beverly Hills, California, by Tom Sherak, president of the Academy of Motion Picture Arts and Sciences (AMPAS) and a guest announcer.

New this year, is an upgrade from the usual five Best Picture nominations, to ten total Best Picture nominations. This is an increase that will allow many other popular films to be considered for the "Best Picture" award, which is always the "Main Event" so to speak of the ceremony. A bit of fact chasing here, is that from 1932 to 1943 there were ten nominations for "Best Picture" (in 1934 and 1935, in fact, there were 12), but for the ceremony honoring 1944's best movies, the Academy switched that number to the current five which has held up until this year. The increase is due to the extremely large amount of successful box office films which were premiered in 2009.

We certainly expect this years ceremony to be high profile. 2009 was a record breaking year for the entertainment industry, with many films such as Transformers 2, District 9, Avatar, Terminator Salvation, Star Trek, Harry Potter And The Half-Blood Prince, Inglourious Basterds, Up, Public Enemies, Twilight: New Moon, and many others, all reaching an extreme amount of international box office sales.

Considering the unprecedented and success of 2009, it's looked back upon by critics as one of the best years in motion pictures in nearly a decade, even while the world economy is struggling. Further showing that if they produce quality films, then people will pay the price to see the films.

One thing is certain, the 82nd annual Academy Awards will be highly rated and viewed all over the world, and it will clarify which of all the great films of 2009, were considered the best by the insiders of Hollywood.

As soon as the nominees are announced, we will post them here on ET Articles, exclusively for our community. Respect to the Oscar award and the Academy Award ceremony, as for many years it's created a dominant showing amongst the best in film, and it's been a breakout leap for so many in Hollywood. Let's only hope that 2010 offers each of us as many great films as 2009 did, and thus far from the way this year has kicked off, it's looking more and more like it will be another major year for highly anticipated films.

Read More ....

Internet Error Codes

Internet Error Codes

Sometimes when you try to visit a Web site, instead of seeing what you expected, you see an error code. Some of these codes may be familiar, but there are a lot that you may have never seen. To give you a greater understanding of these errors, here is a list of the most popular codes.

As a rule of thumb, the first thing you should if you get an error is make sure that you have typed in the URL or page address correctly.

Bad request 400
The request could not be understood by the server due to bad syntax. You should not repeat the request without modifications.

Unauthorized 401
The creators of a Web page may want only certain people have access to that page. You should only retry the request if you know that you have authorization.

PaymentRequired 402
This message gives a specification of charging schemes which are acceptable. You may retry the request with a suitable ChargeTo header.

Forbidden 403
The request is for something forbidden. Authorization will not help. This status code is commonly used when the server does not wish to reveal exactly why the request has been refused, or when no other response is applicable. (The file needs to be set with "read permissions" for all users.)

Not found 404
The server has not found anything matching what you requested. Make sure that the Web address (URL) that you typed in exactly matches the address you were given. Check that the capitalization matches, spelling, and punctuation, like dots (.) and slashes (/), are correctly placed. Be sure you are using the forward slash (/) and not the backward slash (\).

405 Method Not Allowed
The method specified in the Request-Line is not allowed for the resource identified by the request. The response must include an Allow header containing a list of valid methods for the requested resource.

406 Not Acceptable
The resource identified by the request is only capable of generating response entities which have content characteristics not acceptable according to the accept headers sent in the request.

407 Proxy Authentication Required
This code is similar to 401 (Unauthorized), but indicates that you must first authenticate yourself with the proxy. The proxy must return a Proxy-Authenticate header field (section 14.33) containing a challenge applicable to the proxy for the requested resource. You may repeat the request with a suitable Proxy-Authorization header field (section 14.34). HTTP access authentication is explained in section 11.

408 Request Timeout
The client did not produce a request within the time that the server was prepared to wait. You may repeat the request without modifications at any later time.

409 Conflict
The request could not be completed due to a conflict with the current state of the resource. This code is only allowed in situations where it is expected that the user might be able to resolve the conflict and resubmit the request.

410 Gone
The 410 response is primarily intended to assist the task of web maintenance by notifying the recipient that the resource is intentionally unavailable and that the server owners want remote links to that resource be removed.

411 Length Required
The server refuses to accept the request without a defined Content- Length. The client may repeat the request if it adds a valid Content-Length header field containing the length of the message-body in the request message.

412 Precondition Failed
The precondition given in one or more of the request-header fields evaluated to false when it was tested on the server. This response code allows the client to place preconditions on the current resource metainformation (header field data) and thus prevent the requested method from being applied to a resource other than the one intended.

413 Request Entity Too Large
The server is refusing to process a request because the request entity is larger than the server is willing or able to process. The server may close the connection to prevent the client from continuing the request.

414 Request-URI Too Long
The server is refusing to service the request because the Request-URI is longer than the server is willing to interpret.

415 Unsupported Media Type
The server is refusing to service the request because the entity of the request is in a format not supported by the requested resource for the requested method.

Internal Error 500
The server encountered an unexpected condition which prevented it from fulfilling the request. Your request could not be processed due to an internal server error.

Not implemented 501
The server does not support the functionality required to fulfill the request. This is the appropriate response when the server does not recognize the request method and is not capable of supporting it for any resource.

502 Bad Gateway

The server, while acting as a gateway or proxy, received an invalid response from the upstream server it accessed in attempting to fulfill the request.

503 Service Unavailable
The server is currently unable to handle the request due to a temporary overloading or maintenance of the server. The implication is that this is a temporary condition which will be alleviated after some delay. If known, the length of the delay may be indicated in a Retry-After header. If no Retry-After is given, you should handle the response as it would for a 500 response.

504 Gateway Timeout
The server, while acting as a gateway or proxy, did not receive a timely response from the upstream server it accessed in attempting to complete the request.

505 HTTP Version Not Supported
The server does not support, or refuses to support, the HTTP protocol version that was used in the request message. The response should contain an entity describing why that version is not supported and what other protocols are supported by that server.

Read More ....

Warning on harmful hidden fat

Warning on harmful hidden fat

A new survey has indicated that ninety per cent of Irish people are unaware of a significant health risk, visceral fat.

Visceral fat surrounds abdominal organs and can increase the risk of life-threatening diseases such as type 2 diabetes and heart disease.

The European survey, which included Ireland, included over 12,000 adults who wanted to lose weight.
It showed that 90% of Irish people do not know what visceral fat is but after hearing about the associated risks, 79% said they were more motivated to lose weight.

Waist measurement is regarded as the best clinical indicator of excess visceral fat and therefore the best predictor of risk.
Experts say visceral fat is a stronger predictor of premature death than overall weight.
Steady weight loss with a 5% to 10% decrease in body weight can reduce visceral fat and significantly benefit health.
The study found that of the Irish people surveyed who had previously dieted at New Year, almost half admitted to being unsuccessful.

Check Video Here:-

Read More ....

Monday, January 04, 2010

High blood sugar linked to cancer risk

High blood sugar linked to cancer risk

A new study warns that high levels of blood su gar could elevate the risk of developing cancer in both men and women, with women being more susceptible to the illness

Findings of the study suggest those who have increased levels of glucose in their blood are not only prone to cancer but also likely to die of the disease.
Lead researcher Dr Tanja Stock said, “The results suggest that, for women, the higher the level of sugar in the blood, the higher the risk. For men, there was still an association, but it was weaker."

Study details
To reach this conclusion, researchers from the Umea University in Sweden, carried out a study on 2,74,126 men and 2,75,818 women from Norway, Austria and Sweden. The average age of the participants was 44 years.
For the study, researchers examined the blood sugar levels of all the participants who were followed for 10 years.
During the follow-up period, the researchers continued keeping the medical record of subjects on how many of them developed cancer as well as died of the illness.

Cancer risk linked to high blood sugar levels
Analysis of the data revealed noteworthy associations between those who had high blood sugar levels and cancer development.

"Significant increases in risk among men were found for incident and fatal cancer of the liver, gallbladder, and respiratory tract, for incident thyroid cancer and multiple myeloma, and for fatal rectal cancer,” the study authors said.

"In women, significant associations were found for incident and fatal cancer of the pancreas, for incident urinary bladder cancer, and for fatal cancer of the uterine corpus, cervix uteri and stomach," they added.

High blood sugar levels, not the sole risk factor
Regardless of the findings, the researchers claimed that increased blood sugar levels may not be the only factor triggering cancer tumor growth. There could be other risk factors responsible for cancer development, they said.
Dr Iain Frame, Director of Research at Diabetes UK, said, “It would be wrong to conclude that high blood glucose levels alone are causing the increase in cancer cases and deaths. Nor can we say that, by controlling blood glucose levels alone, we could lower the risk of cancer."

The study appears in the 'Public Library of Science Medicine' journal.

Check Video Here:-

Read More ....

Sunday, January 03, 2010

Edit Any Website

Edit Any Website 

This is really easy and pretty fun to impress friends with.

- Go to any website.
- Delete the URL and replace it with this:


javascript: document.body.contentEditable= "true"; document.designMode= "on"; void 0

Only for fun

Read More ....

Increasing Your Virtual Memory

Increasing Your Virtual Memory

This makes your computer faster by utilizing your HD space as virtual RAM. ( Takes around a gigabyte of space,when initialized. but still speeds up your computer greatly!)
I do not recommend doing this if your hard drive space is less than 20gb.

Alright, this is how you do it:

1. Hold down the Windows Key and press the Pause/Break button at the top right of your keyboard (another way is right-c$$$$ your computer and c$$$$ Properties). 2. Click on the Advanced tab.
3. Under Performance, click Settings.
4. Then click the Advanced tab on the button that pops up.
5. Under Virtual Memory at the bottom, click Change.
6. Click the Custom Size button.
7. set the virtual memory 2.5 times of your RAM Size this is what is recommended 
e.g if i got 256 mb ram i ll need set just 640 MB in the settings tab and moreover make the Initial Size value and Maximum size value to the same value i.e in my case i ll set both initial and maximum size to 640 MB thats it..
8. Click Set, and then exit out of all of the windows.
9. Finally, restart your computer.
10. You now have a faster computer and 1-2gb of virtual RAM!


Check Video Here:-

Read More ....

Thought of the Day

 Excellence is to do a common thing in an uncommon way.

Read More ....

Saturday, January 02, 2010



CPU-Z is a freeware that gathers information on some of the main devices of your system.

  • Name and number.
  • Core stepping and process.
  • Package.
  • Core voltage.
  • Internal and external clocks, clock multiplier.
  • Supported instructions sets.
  • Cache information.
  • Vendor, model and revision.
  • BIOS model and date.
  • Chipset (northbridge and southbridge) and sensor.
  • Graphic interface.
  • Frequency and timings.
  • Module(s) specification using SPD (Serial Presence Detect) : vendor, serial number, timings table.
  • Windows and DirectX version.

Virusscan Result

Download Links
1. CPU-Z
2. CPU-Z

Direct Link

Check Video Here:-

Read More ....

Friday, January 01, 2010

Happy New Year 2010 to all Xpert-Zone Blog Users

Happy New Year to all Xpert-Zone Blog users.

Make the 2010 can be a year to be in history with someting notable,

May god fill all ur dream and wish and all ur dream come true

Read More ....

Related Posts with Thumbnails

Xpert-Zone Blog Overview