Recent Posts

Pure Salon & Spa Koramangla, Bangalore

Pure Salon & Spa Koramangla, Bangalore Led by veteran hair stylist Pure Salon & Spa offers various services from the simple hair cut and styling for women, men, kids, and brides, to vibrant hair colours, conditioning treatments, and Brazilian blowouts. Located at the heart of Koramangla, Bangalore, the salon has been around since 2015, providing professional hair treatments in a relaxed ambience. This is definitely one of our favourite hair salons in Bangalore.
READ MORE - Pure Salon & Spa Koramangla, Bangalore

How to see who views your Facebook profile

Media_httpfarm7static_qvhrd
By now, you've most likely seen the many apps and Web services claiming to let you see who's viewing your Facebook profile. Is your college ex checking up on you? Is someone from work scrolling through pictures of your beach vacation? Are your parents secretly peeking in on your private life? These apps promise the answers. Unfortunately, they don't deliver.
You can be 100 percent certain that each and every app that says "See who views your profile!" or "stalker tracker" or anything else like that is virus-laden junk. That said, there are a couple ways to get clues and insights into who's been floating around your profile. While you won't end up with the definitive list you're likely looking for, keep reading for tips and tricks that toe -- but don't cross! -- that fine line between natural curiosity and a massive breach of privacy.
Full article at HowStuffWorks.com.
READ MORE - How to see who views your Facebook profile

Use Resource Monitor to monitor storage performance

By Scott Lowe

When Microsoft added the comprehensive Resource Monitor tool to Windows, it added an outstanding at-a-glance tool that allows administrators to glean deep intelligence regarding the operating condition of mission critical Windows servers.
In my four-part series about the Resource Monitor, I will focus on each resource monitoring aspect of the tool: CPU, Memory, Disk, and Network. In this installment, I discuss the various disk-related metrics that you can view with Resource Monitor, explain the graphs you see, and provide some context around each metric.
For the purposes of this article, we'll use the screenshot in Figure A. This figure shows a Resource Monitor view from a production server running Windows Server 2008 R2 and Exchange Server 2010 with all Exchange roles installed; as such, this server has significant need for storage resources that operate within acceptable boundaries. (Note: Like all of our other servers, this server is running as a virtual machine under VMware vSphere 4.1.)
Figure A

One look at Resource Monitor in Windows Server 2008 R2 (Click the image to enlarge.)
Let's start with an overall look at the console. Occupying most of the window is the statistics area, which I'll be explaining in depth. On the right side of the window are a number of graphs, each depicting a key storage-based performance metric.

In the sections below, I will provide details for each metric. I won't repeat metrics; if one type of metric appears in multiple areas, I only list it once.
Processes With Disk Activity
This section of the Resource Monitor window shows you a list of all of the running processes that are using disk resources. You are shown the name of the executable and a number of performance statistics.
  • Image. Process executable file name. This is the name of the process that is actively using the disk.
  • PID. The ID number associated with the process. This is useful if you want to use other utilities to manage processes, or if you want to easily match up processes with Task Manager.
  • Read (B/sec). The average number of bytes read per second by the process in the past minute.
  • Write (B/sec). The average number of bytes written per second by the process in the past minute.
  • Total (B/sec). The average number of bytes accessed per second in the past minute.
The information you're provided in this section isn't particularly useful when troubleshooting except to show you which processes are consuming the most disk performance resources. In Figure A, you can see that the process named DPMRA.exe is doing a ton of reads from the disk.
Disk activity
This section of the Resource Monitor window provides you with more useful troubleshooting information. In particular, the response time metric is probably the most useful metric of the bunch, as it's directly observable without having to really understand the underlying storage configuration.
To the right side of this section label, you'll see two quick-glance information boxes. The green box shows you the current disk I/O (i.e., the amount of data that is being transferred right now), and the blue box lists the highest amount of active time for the disks in the system.
  • File. The name of the file that is being used by the active process. You'll notice that you're pointed to the full path so it's easy to find the file.
  • I/O Priority. The priority of I/O transfers.
  • Response Time (ms). Disk response time in milliseconds. For this metric, a lower number is definitely better; in general, anything less than 10 ms is considered good performance. If you occasionally go beyond 10 ms, you should be okay, but if the system is consistently waiting more than 20 ms for response from the storage, then you may have a problem that needs attention, and it's likely that users will notice performance degradation. At 50 ms and greater, the problem is serious. Figure A shows that my Exchange server is seeing 5 and 6 ms response times, so the storage is doing fine as per this metric.
Storage
  • Logical Disk. The drive letter associated with a disk.
  • Physical disk. Which physical disk is being monitored on this line?
  • Active Time (%). This shows the percentage of time that the disk is not idle and is actively serving requests. If a disk is constantly running at very, very high levels (say, more than 80%), it may point to a storage-related bottleneck. If your users are seeing performance issues, and you're seeing 100% active times, you might need faster or more disks.
  • Available Space (MB). How much disk space is available on the volume?
  • Total Space (MB). What is the total size of the volume?
  • Disk Queue Length. Average disk queue length. The queue length metric displays the number of outstanding requests (read and write) at any given time. A high number can indicate that there are not enough disk spindles to service the needs of the application or that the existing storage is too slow to keep up with requests. However, how you define a "high number" in this context requires that you have a deep understanding for how the underlying volume is created on the SAN. Each disk that makes up the underlying volume provides additional resources that go into disk queue length (simplistically, the more disks, the higher the disk queue length can be).
    For additional complicating factors, the RAID level and stripe size you choose can affect this value as well. If you're running on a single disk system and your queue length remains consistently greater than 2, you should add more resources. If it goes beyond 5, you have serious problems that need to be addressed. If you know how many disks make up your underlying volume, multiply the number of disks by 2 to get a very rough, ballpark queue depth maximum value. So, if you're running on a 10 disk system and the queue depth is 18, you should be fine.
The graphs
The graphs are very useful tools. The top graph shows you the transfer rates between the storage and the system for the past minute. The green portion is the current overall I/O, while the blue line displays the disk active time for that period. The remaining graphs show you the queue length for each disk in your system.
I have four disks (SAN volumes) in this Exchange server. Because of the way that the underlying SAN volumes are created in my array, I have no queue length-based performance issues at all.
Scott Lowe has spent 15 years in the IT world and is currently the VP and CIO of Westminster College in Fulton, Missouri.
READ MORE - Use Resource Monitor to monitor storage performance

15 Keyboard Shortcuts To Enhance Your PC Productivity

If you fancy yourself a PC power user, you know how valuable it is to keep your hands on the keyboard. Constantly switching between typing and mousing can really slow you down when you're powering through that TPS report.
Lucky for you, the wizards at Microsoft have built some time-saving (if little-known) keyboard shortcuts into their operating systems over the years, with some really handy ones gracing Windows 7 and most modern Web browsers.
If you're aiming to speed up your workflow and impress your colleagues at the same time, check out these little gems.
1. Move the cursor one word at a time
Cut through large swaths of text with this handy trick.

2. Select one word at a time
Similarly, you can highlight entire words in your text without pecking at those arrow keys.

3. Delete entire words
Bulldoze those terrible sentences more efficiently with this shortcut.

4. Select all text on the current line, relative to the cursor
Don't reach for that mouse. Instead of click-dragging the cursor, snap right or left with this fancy method.

5. Minimize all windows
Keep this macro in mind if you tend to browse Facebook at the office.

6. Cycle between windows
If you really want to show off the glitz of Windows 7, give this combo a try.

7. Lock the computer
Stepping away from the screen for a light lunch? Lock that puppy down with one swift stroke, especially if it's April Fool's Day.

8. Launch the Task Manager
Applications acting up on you? Need to check your system's resources? Skip the clicking and get into the Task Manager with this shortcut.

9. Take a screenshot of the active window only
Trimming down screengrabs can be a pain, especially if you have a lot of desktop real estate. This shortcut lets you capture only the window you're working in.

10. Rename a file
Forgo that right-clicking nonsense and give this file renaming trick a shot. It also works great if you've selected multiple files or folders.

11. Zoom in and out
This one works in a variety of applications, including browsers, word processors, and Photoshop, among others.

12. Return to default zoom
When you're ready to return to the normal view, strike this keyboard combo.

13. In browser: open a new tab
This one may be common, but it's worth mentioning if it will save users the effort of clicking up there in a mess of browser tabs.

14. In browser: reopen closed tab
This one can be a life-saver, especially if you've accidentally closed a webpage you've been searching diligently for.

15. In browser: focus cursor on URL/search field
If you need to navigate the Web quickly, this combo will get you moving in two keystrokes.

Which time-saving macros do you use at your desk? Share them with the class in the comments below.
Image credit: chromatix d-sign.
READ MORE - 15 Keyboard Shortcuts To Enhance Your PC Productivity

A beginner's guide to telecom jargon


Verizon Wireless executives are just a few of the telecom insiders who love their jargon.
(Credit: Verizon Wireless)
The mobile world moves at a breakneck pace, and it's difficult to keep up--even without the technical jargon most industry insiders throw around. And they do love to toss those terms about.
Whether it's the difference between CDMA and GSM, the importance of backhaul to the speed of your connection, or what metering means, it's easy to have information blow over your head when reading about this field.
So for some light Saturday reading, we thought it would be nice to explain what exactly telecom experts are talking about when they use these terms they assume everyone understands.
4G:Blame the incessant commercials touting "blazing fast 4G service," as well as the liberal use of the term 4G--everyone thinks they've got a next-generation wireless device. According to consumer retail site Retrevo, more than a third of iPhone owners mistakenly believe they have 4G service.
There are three flavors of 4G: LTE, WiMax, and HSPA+. LTE, or Long-Term Evolution, is the Los Angeles Lakers of the 4G world, acknowledged as the fastest existing standard. It may be faster, but be wary of the lightning bolt commercials; it's not that fast. LTE is also the standard that's attracting most wireless providers, including Verizon Wireless, AT&T, and eventually Sprint Nextel--so the term isn't going away. I was the first to report that Verizon Wireless would cover 100 markets with LTE by next week.
Sprint is using an older version of 4G called WiMax. For years, WiMax was the only game in town, allowing Sprint to boast about its speed advantage. That edge has all but disappeared with the rise of LTE. WiMax is like the Philadelphia 76ers: a team with a strong history but that's faded into an also-ran.
That leaves HSPA+, which is what AT&T and T-Mobile use, as the Los Angeles Clippers of the wireless world; yeah, it's technically a 4G technology, but only begrudgingly so. Last year, T-Mobile kicked things off by renaming its HSPA+ network a 4G one, prompting AT&T to do the same. AT&T is ready to move on though; it plans to launch 4G LTE in five cities this summer.
The International Telecommunications Union, a standards body affiliated with the U.N., initially ruled that none of these technologies met its criteria for 4G. But the ITU has since backtracked and has opened up the definition to include all three. Even for the experts, it's confusing.
Churn: The word refers to the rate at which customers are running for the hills and away from a subscription service. It's also one of the critical financial metrics investors use to grade a company's performance.
Churn was a popular term to throw around this week when Netflix decided to hike up the price of its DVD plans, causing an avalanche of criticism and threats of cancellation. CNET found that 41 percent of Netflix customers polled wanted to cancel. Which is fitting, since churn is defined as "agitating with violent motion."
Cramming: It's the practice of adding third-party charges onto a phone bill. Consumers hate it because they're getting charged for services they never signed up for, and in many cases don't even know about. Regulators and carriers hate it because they have to deal with customer complaints. Earlier this week I reported that the FCC voted to crack down on the practice. Yet it continues to exist. Go figure.
NFC: Another in a long line of technology acronyms, this one stands for near-field communications. The technology allows for a quick burst of data sent from one NFC chip to another, and is the key to mobile transactions in the field. This week, PayPal showed off an NFC test at the MobileBeat conference that allowed one Nexus S smartphone to transfer funds to another by way of a simple tapping together of the devices.
Credit card companies, retailers, and technology companies like NFC because they see simplifying the payment process as another way to get money out of our wallets faster.
Throttling: No, throttling doesn't consist of physically choking users, though I imagine some carriers have at least considered this in regard to some of their more taxing customers. Throttling occurs when a customer consumes some maximum amount of data. Once that limit is reached, the carrier will slow down the customer's connection speed, dropping it to a snail's pace. This phrase popped up again when Virgin Mobile said on Wednesday that it planned to start throttling users of excessive bandwidth.
More importantly, throttling allows carriers to keep boasting that they offer "unlimited data" plans. While technically accurate, customers who face 2G speeds toward the end of the month would probably disagree.
READ MORE - A beginner's guide to telecom jargon