tag:blogger.com,1999:blog-68013263473257914322024-03-05T00:58:21.171-08:00All about OOS and Motivational Memories !!!Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-6801326347325791432.post-8355789265471426732007-10-22T11:21:00.000-07:002007-10-22T12:05:38.395-07:00Some essential LINUX network Interface commands<span style="font-family:times new roman;"><strong><span style="color:#ffcccc;">#ifconfig</span></strong> .....command used to display information abt the currently active interface..</span><br /><span style="font-family:Times New Roman;">The information comprises of :</span><br /><ul><li>The type of interface like eth0,eth1 n so on</li><li>The IP address information like inet address 192.168.0.1,Bcast ip:192.168.0.255 Mask :225.255.225.0, RX-TX packets received-dropped-overrun-frames-collision</li><li>Hardware address HWaddress :00.ad.cc.15.25.22 (6 octate address or 48bytes</li><li>various other statistics </li></ul><p>So therefore to know the inactive interfaces we must run :</p><p><span style="color:#ffcccc;"><strong># ifconfig -a</strong></span> </p><p></p><p>To start and stop the interfaces or in other sense bringing up and gringing down the eth0 we can run following commands:</p><p><strong><span style="color:#ffcccc;"># ifup interfacename</span></strong></p><p><strong><span style="color:#ffcccc;">#ifdown interfacename</span></strong></p><p><strong><span style="color:#ffcccc;">#service network restart/start/stop</span></strong></p><p><strong><span style="color:#ffcccc;">#chkconfig network on/off</span></strong></p><p><strong><span style="color:#ffcccc;">#netconfig interfacename</span></strong> .........to set the IP to the interface</p><p>The file which get modified is :</p><p><strong><span style="color:#ffcccc;">/etc/sysconfig/network-scripts/ifcfg-ethx</span></strong></p><p>DEVICE=ethx</p><p>BOOPRO=dhcp/static</p><p>ONBOOT=yes</p><p><span style="color:#33ff33;">IPADDR=XXX.XXX.XXX.XXX</span></p><p><span style="color:#33ff33;">NETMASK=XXX.XXX.XXX.XXX</span></p><p><span style="color:#000000;">last two inputs are acceptable only if BOOTPRO is static</span></p><p></p><p>Global Network paramaters are available in following file :</p><p><span style="color:#ffcccc;"><strong>/etc/sysconfig/network</strong></span></p><p>NETWORKING=yes/no</p><p>HOSTNAME=fqdn by default</p><p>GATEWAY=XXX.XXX.XXX.XXX</p><p>NISDOMAIN=whatever</p><p><span style="color:#ffcccc;"><strong>/etc/hosts </strong></span><span style="color:#000000;">For small LAN it act as a replacement for DNS</span></p><p>127.0.0.1 localhost.localdomain localhost</p><p>l'm suffering from some back pain so might come into my pace soon...</p><p>by the time this might act an appetiser for you Linux gigs</p><p> </p>Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.com0tag:blogger.com,1999:blog-6801326347325791432.post-27808241419588400992007-10-11T12:00:00.000-07:002007-10-11T12:19:27.728-07:00The Magical Linux Boot Sequence<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnwVxnhUAwZbLVE_It0vvLjfyxItGvWcpFeUJOagHcuMaLP-CJM4F_b3EB7Ig7mrI7xbTATWHobjeDnNz4GtYodTopwY6Dj29S_EZ96vor7nWGu_lK-9ssjidIhQhyphenhyphenNybDMaC74ccAAKM/s1600-h/dual_boot_grub.gif"><img id="BLOGGER_PHOTO_ID_5120160156419569714" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 259px; CURSOR: hand; HEIGHT: 122px; TEXT-ALIGN: center" height="122" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnwVxnhUAwZbLVE_It0vvLjfyxItGvWcpFeUJOagHcuMaLP-CJM4F_b3EB7Ig7mrI7xbTATWHobjeDnNz4GtYodTopwY6Dj29S_EZ96vor7nWGu_lK-9ssjidIhQhyphenhyphenNybDMaC74ccAAKM/s200/dual_boot_grub.gif" width="268" border="0" /></a> <div></div><div>Its been a long time,i wrote anything abt Linux itself in detail….<br />Today I want to suppress my hunger by highlighting the BOOT sequence of Linux OS from scratch…..till the Login promp appears…<br /><br />1)On a very basic level <strong>BIOS</strong><em>(Basic Input/Output System)</em> which is the interface between the Hardware and Software provides the basic set of instruction used by any flavor of OS through <strong>CMOS</strong><em>(Complementary Metal Oxide Semiconductor).</em>The CMOS which is about 64 bytes grabs and stores the hardware peripheral configuration permanently powered by a small battery located in Motherboard.<br />It’s the magic of this battery that CMOS retains the setting like date,time etc.. even when PC is turned off .Thus BIOS Has performed the <strong>POST</strong><em>(Power On Self Test)</em> and now it looks for peripherals and a device to BOOT from.<br /><em>Remember , BIOS reads and execute the first physical sector (about 512 bytes )of the chosen boot device.<br /></em><br />2)Now appear the <span style="color:#cc33cc;"><strong>BOOT Loader Components</strong></span><br />Boot Loader is responsible for loading and starting Linux or any other OS successfully.<br /><br />But how is Boot loader invoked... tats the question ?<br />Answer : Certainly in below two possible ways :<br /><br /><strong>1)BIOS passes the control to IPL(Initial Program Loader) installed within the in MBR(Master Boot Record).<br />2)BIOS passes the control to another Boot Loader (like ntldr of Xp ,LILO of Suse) ,which passes the control to IPL installed in boot partition ( /boot of abt 514MB ). </strong><br /><strong><br /></strong>Remember IPL must not exceed the space of 446bytes<br /><br />3)Hence IPL for GRUB is the First stage of Linux whose vital function is to locate and load a SECOND STAGE boot Loader (the blue splash screen)which actually do the most of the work to boot the system…<br /><br />4)The Grub Boot Screen<br />A graphical Splash screen can be accessed by pressing enter key when GRUB starts up from First Boot Loader.This screen has got bootable image stanzas which can also be edited temporarily .Here we can also set Grub Password at Grub Command Line.<br /><br />5) Now GRUB reads the Grub configuration file i.e. /boot/grub/grub.conf….available on the only fs which GRUB can understand i.e ext2/ext3, FAT,minix,FFS and reiserfs.If this file is missing Boot Loader will leave us alone with GRUB command Line which<br />a)can be used to write temporary boot commands from scratch..<br />b)View contents of files on fs,<br />c)perform diagnostic tests<br />d)experiment with GRUB configurations if file is available…<br /><br />6)NOW The Kernel(<a href="http://kernelcoder.blogspot.com/">http://kernelcoder.blogspot.com/</a>) initialization files generate some output which scrolls in microseconds…i.e Device drivers compiled into the kernel are called …and locate their corresponding devices. Successful locations of device logs output to the kernel message buffer.(/var/log/dmesg).But essential drivers for ext3 fs, LVM, Software RAID and SCSI controller supports comes in modules and Kernel gets these modules from /lib/modules/$(uname) path. BUT Linux kernel still has to mount the root fs???????????????<br /><br />Hhhhahahahahahah Big Question ..answer to this will be available in my next BLOG<br /><br />I will welcome guesses , answers and comments …<br /><br /><br />7)After all drivers are located and loaded successfully the kernel mount the root fs ro.<br /><br />8)INIT ----The first Process with (PID)process ID =1 is then loaded and control is now handed over to INIT .<br />Init reads /etc/inittab .which defines the default runlevel to pop into.<br />And further child processes can be run further.<br /><br />9)But who initializes the intended runlevel ?<br />Answer ….<br />The file /etc/rc.d/rc has the responsibility to run or initialize the default runlevel specified in /etc/inittab and also acknowledge to start/stop the services with change in the runlevel.<br />Moreover, Each runlevel has its own corresponding directory with its scripts to run the daemon programs in background.But /etc/rc.d/rc.sysinit has many countless tasks to perform before any runlevel could be started.<br />/etc/rc/rcX.d<br />And then Symbolic links in corresponding run level directories call the /etc/rc.d/init.d scripts with start and stop argument.<br />Now Custom scripts are always run from /etc/rc.d/rc.local before getting Login Prompt<br /><br />10)By default , init process respawns the mingetty services defined in /etc/inittab for each 6 VC. And the First VC /dev/tty7 is reserved for X server(gdm).The contents displayed by each VC is defined by expandable content in /etc/issue.<br />The mingetty and getty services are run for mentioned terminals.They read their configuration file /etc/mingettydefs.<br /><br />11) As per gettydefs file getty process determines the speed of Terminal and Login Prompt with username appears. As we Login with authentic password…the username and passwd are matched with /etc/passwd and /etc/shadow. If match is successful then ,the init run the process mentioned at the of field of /etc/passwd .And we get the bash shell in Linux and bourne in UNIX ….About Xp Login, I donnt know…..God knows…..or may be U.<br /><br />That’s it guys hope u might have true eclectic blend of fun, excitement ,anxiety and Mindblowing Power booster capsules.<br /><br />Do leave your valuable comments and modifications if applicable…….<br /><br />Thanking You<br /><br />Nitin (kevin)</div>Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.com1tag:blogger.com,1999:blog-6801326347325791432.post-31096170068238740942007-09-22T23:29:00.000-07:002007-09-22T23:55:45.936-07:00The Magical KARMA<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp9T8hWDw5pNAdWXM8iZC5sfa8gDBGslCS8UMjqj3tnfT8G_0DXCdRwpR9KYA8_Uvo4WkpWNlNbCRhsiARum7GsJyqW5Z5Fo3rhI5CQRcHiMflDa-IEEkpisHhRz97dMpXERsUhymYpqA/s1600-h/waterfall.jpg"><img id="BLOGGER_PHOTO_ID_5113289441401583650" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp9T8hWDw5pNAdWXM8iZC5sfa8gDBGslCS8UMjqj3tnfT8G_0DXCdRwpR9KYA8_Uvo4WkpWNlNbCRhsiARum7GsJyqW5Z5Fo3rhI5CQRcHiMflDa-IEEkpisHhRz97dMpXERsUhymYpqA/s200/waterfall.jpg" border="0" /></a><br /><div><blockquote>One cannot sit idle in life and expect life to take care of itself.<br />Karma,<br />the fulfilment of one's duties is the ultimate objective of all<br />human<br />existence and if we fail to fulfil our duties towards life, life<br /><span style="color:#ff99ff;">inevitably</span> fails us.<br /></blockquote><strong><span style="color:#cc66cc;">Life is like an unstoppable,unobstructed,uncontrolled infinite river flow.</span></strong><br />Breaking rule to go against the flow welcomes resentments,defeat,anger,frustration,Lost possetions and many social evils.Marauding Flow consumes everything that comes its way.Therefore clinging on to any real or Virtual Thing in Life for a long time brings inevitable unfavourable consecuences.Accept the changes,challlenges,reinventions,discoveries,innovations and Flow in direction of River by performing <strong><span style="color:#cc33cc;">KARMA.</span></strong></div>Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.com0tag:blogger.com,1999:blog-6801326347325791432.post-36641757670020985122007-09-21T12:55:00.000-07:002007-09-21T14:01:29.582-07:00Special Thanks To Special<embed src="http://www.pageplugins.com/generators/flash_pictures/show.swf?txt=Thank%20You%20%0DVery%20much%20%0D%0DDear%20%0DJ%20a%20s%20j%20e%20e%20t&card=http://www.pageplugins.com/generators/flash_pictures//cards/cool/cool1.jpg&clickURL=http://www.pageplugins.com/&type=0&tc=16776960&sc=16711680&font=http://www.pageplugins.com/generators/flash_pictures/fonts/plainn_lib.swf&tr=-2&ts=88&tx=-4&ty=0&glitter=1&rounded=1&bevel=0&sepia=0&shadow=1&theme=http://www.pageplugins.com/generators/flash_pictures/themes/time.swf&theme_al=36" quality="high" bgcolor="#ffffff" width="300" height="300" name="show" align="middle" allowScriptAccess="always" wmode="transparent" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer"/></embed><br><a href="http://www.pageplugins.com/"></a><br /><strong>Sweet Cat= Sweet Pride Loving<br />Falling Watches = <em>Impecable Timing </em><br />Twinkling Stars = <em>Brightest Kohinoor (Face in the crowd not among the Crowd)</em><br />Green sheet of grass = <em>Luck in its Court</em><br />Strange Eye = <em>Strange Impact (Hypnotises Opposite sex)</em><br />Dimple Cheeks = <em>Giant World envy </em></strong><br /><br /><strong>Thats why CAT rules Night Creatures !!!</strong>Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.com0tag:blogger.com,1999:blog-6801326347325791432.post-74383117044069362632007-09-18T12:20:00.000-07:002007-09-21T14:06:40.442-07:00AJAX !!!<span style="color:#ffffff;"></span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilp2R_hyphenhyphen9DWX4MGN9kOzFW549P6ag-c6FxSmt3wH-PqQHsjWC67LJHKJ71alKiUb28by4eGi3rEr5YzfSzM4kBFPjPiRVib2-P3XTjFmscBswGiL9dVkloXBrrmF6A-J1AG7s9m7NYFOQ/s1600-h/ajax.png"><img id="BLOGGER_PHOTO_ID_5111632941427174098" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilp2R_hyphenhyphen9DWX4MGN9kOzFW549P6ag-c6FxSmt3wH-PqQHsjWC67LJHKJ71alKiUb28by4eGi3rEr5YzfSzM4kBFPjPiRVib2-P3XTjFmscBswGiL9dVkloXBrrmF6A-J1AG7s9m7NYFOQ/s200/ajax.png" border="0" /></a><br /><div><br /></div><div>Today, I'm not focusing on <strong>AJAX Soccer team</strong> but trying to share something about this astonishing Technique known as<strong><span style="color:#3333ff;"> Asynchronised Javascript and XML.</span></strong></div><div><br /><br /></div><div><span style="color:#000000;"><span style="color:#ffffff;">This</span> <em><span style="color:#ff0000;">Web Development Technique</span></em> </span><span style="color:#ffffff;">is used for creating interactive Web Applications.Four major benifits of AJAX are INCREASED</span></div><div><br /><br /></div><ol><br /><br /><li>Interactivity</li><br /><br /><li>Speed </li><br /><br /><li>Usability</li><br /><br /><li>Functionality</li></ol><div><br /><br /></div><p><span style="color:#ff0000;"><strong><em>Whats does it comprises of ?</em></strong></span></p><div><br /></div><ul><li>XHTML(or <a title="HTML" href="http://en.wikipedia.org/wiki/HTML">HTML</a>) for marking up information. </li><br /><br /><li>The <a title="Document Object Model" href="http://en.wikipedia.org/wiki/Document_Object_Model">DOM</a> accessed with a <a title="Client-side" href="http://en.wikipedia.org/wiki/Client-side">client-side</a> <a title="Scripting language" href="http://en.wikipedia.org/wiki/Scripting_language">scripting language</a>, such as <a title="JavaScript" href="http://en.wikipedia.org/wiki/JavaScript">JavaScript</a> and <a title="JScript" href="http://en.wikipedia.org/wiki/JScript">JScript</a>, to dynamically display and interact with the information presented. </li><br /><br /><li>The <a title="XMLHttpRequest" href="http://en.wikipedia.org/wiki/XMLHttpRequest">XMLHttpRequest</a> object is used to exchange data asynchronously with the web server. In some <a title="Ajax framework" href="http://en.wikipedia.org/wiki/Ajax_framework">Ajax frameworks</a> and in certain situations, an <a title="IFrame" href="http://en.wikipedia.org/wiki/IFrame">IFrame</a> object is used instead of the XMLHttpRequest object to exchange data with the web server, and in other implementations, dynamically added <<a title="Client-side JavaScript" href="http://en.wikipedia.org/wiki/Client-side_JavaScript">script</a>> tags may be used. </li><br /><br /><li><span style="color:#ffffff;">XML is sometimes used as the </span><a title="File format" href="http://en.wikipedia.org/wiki/File_format"><span style="color:#ffffff;">format</span></a><span style="color:#ffffff;"> for transferring data between the server and client, although any format will work, including preformatted HTML, plain text and </span><a title="JavaScript Object Notation" href="http://en.wikipedia.org/wiki/JavaScript_Object_Notation"><span style="color:#ffffff;">JSON</span></a><span style="color:#ffffff;">. These files may be created dynamically by some form of</span> <a title="Server-side scripting" href="http://en.wikipedia.org/wiki/Server-side_scripting">server-side scripting</a><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"></span></span></span></span></span></span></span></span></li></ul><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><blockquote><p><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#000000;"><span style="color:#ffffff;">Ajax is asynchronous in the loading and does not interfere with<br />normal page loading. </span><a title="JavaScript" href="http://en.wikipedia.org/wiki/JavaScript"><span style="color:#ffffff;">JavaScript</span></a><span style="color:#ffffff;"> is the programming<br />Language in which Ajax function calls are made. Data retrieved using the<br />technique is commonly formatted using XML, as reflected in the naming of the</span> <a title="XMLHttpRequest" href="http://en.wikipedia.org/wiki/XMLHttpRequest"><span style="color:#cc33cc;"><em><strong>XMLHttpRequest</strong></em></span></a><span style="color:#cc33cc;"><em><strong> </strong></em></span><a title="Object (computer science)" href="http://en.wikipedia.org/wiki/Object_(computer_science)"><span style="color:#cc33cc;"><em><strong>object</strong></em></span></a> </span></span></span></span></span></span></span></span><span style="color:#ffffff;">from which Ajax is<br />derived.</span></p></blockquote><p></span><span style="color:#ffffff;"><br /><br /></span></p><blockquote><blockquote><blockquote><blockquote><blockquote><blockquote><p align="left"></span></span></span></span></span></span></span></p></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote><span style="color:#ffffff;"></span><span style="color:#ffffff;">AJAX is cross platform used on distinct</span> <span style="color:#006600;"><strong>Web browsers,Operating Systems and computer architecture <span style="color:#ffffff;">because it uses Open standard like XML and javascript.</span></strong></span> <div><br /><br /></div><p><strong>This is one of many reasons why Open source utilities provide us the Platform independent benifites.</strong></p><div><br /><br /></div><p><strong><span style="font-family:courier new;font-size:130%;color:#ff0000;">OPEN Source rocks !!!!!!!!!!!!!!!!!!</span></strong></p><div><br /><br /></div><p></p>Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.com0tag:blogger.com,1999:blog-6801326347325791432.post-36209494202299207602007-09-15T11:54:00.000-07:002007-09-15T12:52:23.023-07:00Benifits of Open Source OS<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYzB3XO27oy7veWbvixkNIFhOanvXKRSl_jKf3AnYILPVTKhF7-UAnOR77qwUfrkZJKJEx_tB0vX_CT7LP9aHKDwomvUx0HAUdnHqlkwi_fiiS9VsfgUb6T78L4cInhFdDjNMb2uwIDhM/s1600-h/pengun.bmp"><img id="BLOGGER_PHOTO_ID_5110520592142149954" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYzB3XO27oy7veWbvixkNIFhOanvXKRSl_jKf3AnYILPVTKhF7-UAnOR77qwUfrkZJKJEx_tB0vX_CT7LP9aHKDwomvUx0HAUdnHqlkwi_fiiS9VsfgUb6T78L4cInhFdDjNMb2uwIDhM/s200/pengun.bmp" border="0" /></a> <span style="font-family:arial;font-size:130%;"><strong>Total Cost of Ownership</strong></span><br /><span style="font-family:verdana;">Open Source systems</span> are dramatically less expensive than proprietary systems in initial cost. The Open Source OS such as Unix,Linux,Suse,Mendrin are free, easy to install and easy to use. The extra value added by these efforts results in a very low initial cost. There are many open source software applications like OpenOffice which are free or low-cost whose quality equals--and in many cases surpasses--the quality of proprietary software applications.<br /><br /><strong><span style="font-family:arial;font-size:130%;">Maintenance</span></strong><br /><div><p>Open source software and operating systems can often be easier to maintain over the long run than their proprietary counterparts. With open source software such as the <a href="http://www.getfirefox.com/">Mozilla,Firefox</a> web browser, a friendly reminder notifies you to download updates. The onscreen instructions are easy to walk through. When you next go online, the updates are installed and operating.<br />Other types of open source software, such as <a href="http://www.openoffice.org/">OpenOffice.org</a>, is very stable, robust, and functional for long periods of time, and there is no need for frequent updates. Open source operating systems can also run stably, robustly, and continuously for long periods without crashing or causing problems, therefore little maintenance is necessary. </p><p>Finally, security issues and maintenance issues are connected. For example, there are frequent security flaws discovered in proprietary OS and software, consequently frequent downloads and maintenance for these systems are mandatory. Open source software and OS are inherently more secure. There are far fewer security patches to download and install because the software contains far fewer security flaws.</p><p><span style="font-family:arial;font-size:130%;"><strong>Licenses</strong></span></p><p>With open source systems, licensing is virtually a non-issue! How is this possible? Because open source software and operating systems are licensed in an entirely different fashion that includes customer rights of distribution. Much open source software and operating systems are distributed under the <a href="http://www.gnu.org/copyleft/gpl.html">GNU Public License</a>, which is different than a traditional proprietary license. The GNU Public License gives you as a customer far more freedom and flexibility in how you install, copy, and use the product. Since much open source software is free, you can have as many copies of it as you like! Even open source system licenses you pay for are often far less restrictive than proprietary licenses. Not only does this type of licensing save you money in the initial purchase of an open source system, it often saves you a lot of money in the long run over upgrades, which are often inexpensive or even free. Upgrades for proprietary systems are sometimes almost as expensive as the initial purchase</p><p><span style="font-family:arial;font-size:130%;"><strong>Reliability</strong></span></p><p>Because Open source systems are inherently more stable, they enjoy considerably greater uptime than proprietary systems. Open source systems simply do not crash or freeze as often as proprietary systems do. This increased uptime means increased consecutive productive work hours combined with a decrease in time spent on crash recovery, document recovery, and troubleshooting. </p><p><strong><span style="font-family:arial;font-size:130%;">Tried & Tested</span></strong></p><p>Open source systems are tried and tested by government agencies, universities, and scientific institutions. Increasing numbers of such enterprises are migrating to open source platforms, including organizations for whom reliability and security are paramount concerns.</p><p><strong><span style="font-size:130%;"><span style="font-family:arial;">Legacy</span> <span style="font-family:arial;">Support</span></span></strong></p><p>Many proprietary system vendors cease supporting older versions of their products because they make more money by selling upgrades and new products. For many organizations, legacy applications must remain for a variety of reasons. Often, business owners are hit twice regarding upgrades, because in order to upgrade an application, the operating system, the hardware, or both must also be upgraded. Open source operating systems can often run on older computers that are too slow for the newest versions of proprietary software or operating systems. The open source community is comprised of people who are dedicated to what works best in a given situation, not necessarily to what's new. You may expect solid and lasting support for legacy applications and systems</p><p><strong><span style="font-family:arial;font-size:130%;">Open Source Systems are Safer and More </span></strong></p><p>Open source is the choice of organizations concerned about the safety and security of their data. The vast majority of viruses, worms, and browser hijacks simply do not affect open source systems. One reason why is that they all target Microsoft™ systems. The other reason is that proprietary systems are inherently less secure than open source systems.</p><p><strong><span style="font-family:arial;font-size:130%;">It's a Matter of Trust</span></strong></p><p>Proprietary software involves trust in a corporation where decisions are based on marketing and shareholder concerns, rather than the concerns of customers. Open source software involves trusting craftspeople who take pride in their work and their reputation among a community of their peers--the "shareholders" and the "customers" are one and the same.</p></div>Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.com0tag:blogger.com,1999:blog-6801326347325791432.post-33872035393548466252007-09-15T01:50:00.000-07:002007-09-15T02:27:51.899-07:00Understanding Forgiveness (internal peace)People often misunderstand “forgiveness” as condoning the terrible things someone may have done to them. People are responsible for their own hurtful and painfull actions. <strong>Forgiving does not mean we forget the abuse, betrayal or damage others have caused. </strong>Anger can both motivate and paralyze us for getting the positive things we hope to deserve in life by hook or by crook.<br />Hanging on to our deep bitter pain, holding a resentment and not able to achieve peace from our infinite bad past memories are real barriers to our overall well-being. <br /><strong></strong><br />Sustained prolonged anger and other negative emotions contribute to heart disease. So we must look at forgiveness as a healthy snack, an alternative option to release our anger. Similarly, we must not remain angry, but instead try to know that negative experiences have much to teach us about not being a victim again.<br /><br />Of course, when we have been severely mistreated or violated by a friend, a sister or brother, a parent or child, we might say, “I’ll never trust her/him again,” or “I’m not going to be stupid again.” <strong>You take steps or take a stance to protect ourself</strong><br />Indeed, making a decree is about “standing in our power with the understanding that all the help we need in life is available to us right now,” or “I am whole; I am strong; and I have strong boundaries to protect myself from negativity;I am more stronger than before,” are examples of expressions of decrees.<br /><br />Forgiving is about our understanding that we’re not a fool or a victim. Forgiving is about self-healing.<br /><em><strong>My hope is that everyday somewhere, someone betrayed,abused or misunderstood will find ways to somehow heal and mend by FORGIVING.</strong></em>Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.com0tag:blogger.com,1999:blog-6801326347325791432.post-41359033785530831902007-09-15T01:25:00.000-07:002007-09-15T01:30:58.187-07:00Versatility is one of your outstanding traitsEverton's bid price of <em><strong>"10 million pounds" </strong></em>to lure Neveille was denied to them.<br />Therefore go ahead with Scholes n Owen to prove your deserving position in the Barclays English Premier League Top 5 .Kevinhttp://www.blogger.com/profile/11401284612489380840noreply@blogger.com0