Thursday, March 19, 2009

run an application automatically on system boot

How to configure your system to run an application automatically whenever you boot your system?

First create a shortcut of the application you want to run & put this shortcut in the following location-

D:\Documents and Settings\\Start Menu\Programs\Startup

You can put that application directly to this location if you don’t want to put the shortcut.

Following are some typical examples one would like to start automatically whenever he starts system-

à Microsoft Office

à Web Browser

à Your mostly used IDE

à Any exe file

Bottom line Revenue and Top Line Revenue

Did you know the difference between Bottom line Revenue and Top Line Revenue, the terms that the Management uses during Quarterly Results?

A company's bottom line is its net income, or the "bottom" figure on a company's income statement. More specifically, it's a company's income after all expenses have been deducted from revenues. These expenses include interest charges paid on loans, salary to teams, general and administrative costs and income taxes. A company's bottom line can also be referred to as net earnings or net profits.

The top line refers to a company's gross sales or revenues. Therefore, when people comment on a company's "top line growth" they are making reference to an increase in gross sales or revenues.

Both these figures are useful in determining the financial strength of a company, but they are not interchangeable. Bottom line describes how efficient a company is with its spending and operating costs and how effectively it has been controlling total costs. Top line, on the other hand, only indicates how effective a company is at generating sales and does not take into consideration operating efficiencies which could have a dramatic impact on the bottom line.

Remote Desktop-maximum no of allowed users

Sometimes we are not able to login to a machine via Remote Desktop because maximum no of allowed users is over.

There is a trick to by pass this problem.

I would like to explain it by a live example.

Sometimes, Me & A friend, both need to work on a machine via Remote Desktop simultaneously.

But only one person is allowed at a time because of this restriction.

What we do is, one person log in there twice & then log off one session. At this moment if another person tries to login, he become able to login.

I am not sure, whether this will work in all conditions, just thought to share with you.

MS Word to PDF converter

Step are-

1) Upload your word document in gmail.

2) Open this in Google docs from there, it will be online only.

3) Modify online if you want.

4) Save as PDF on your desktop.

What is an Umbrella Term?

What is an Umbrella Term?

A term used to cover a broad category of functions rather than one specific item. An umbrella term is often a marketing strategy to keep a name visible over a long period. Example: - Web 2.0 is an umbrella term for the second wave of the World Wide Web. Sometimes called the "New Internet," Web 2.0 is not a specific technology but it is a collaborative mane for all the new technologies those are influencing the web experience as blogging, social book marking, and pod casting.

"Logging Off" versus "Disconnecting" from remote desktop sessions

The most common way to access any Windows-based remote hosted server is through a native technology available in every edition of Windows 2000 and 2003: Remote Desktop. However, when using Remote Desktop to deal with a server that's not on your premises, you need to be careful.

When you use the Remote Desktop client to remote into one a server, there are two distinct ways to end your session: logging off and disconnecting. Under most circumstances, it is generally preferable to choose "Log off..." from the Start menu as opposed to just "disconnecting" by closing the remote desktop window (clicking the X that appears when you hover your mouse at the top of the screen). This is because logging off will close all your applications and free up all the memory that was keeping your session alive. By contrast, disconnecting keeps all the info about your session in memory and is waiting for you the next time you log back in.

This sounds like a good thing, but on a slower machine, it has the effect of taking up resources (clock cycles, memory) that aren't being actively used. This can slow the machine down for others who are trying to log in. Also, Two is the maximum allowed no. of remote sessions for systems that use Remote Desktop for administration. Hence remember you might be unnecessarily hogging the session. . If you need the session to persist - e.g., you are running a really time-consuming query/process and don't want to have the window open while it runs - then "disconnecting" is fine and necessary. But if you're done working on the server for the time being, it's probably better to "log off", so your session ends properly.

Wake On Lan (WOL)

Wake On Lan (WOL) is an interesting concept which allows a user to power on a system from a remote machine/site.

WOL is based on the following principle:
What is WOL

"When the PC shuts down, the NIC still gets power, and keeps listening on the network for a 'magic' packet to arrive. This packet must contain a certain byte-sequence, but can be encapsulated in any kind of packet (IPX, IP, anything)"

WOL Requirements

For the WOL to work we would require the following :

ATX Motherboard
NIC (Network Interface Card) which supports WOL
We must also enable WOL in System BIOS WOL to work.
How WOL works

With WOL enabled, when you poweroff your system, the entire system goes down but the NIC still gets power and keeps listening for a "Magic" packet. As soon as it receives the packet, it know that it has to switch on the system and hence boots the system.

Magic Packet

The Magic Packet is a broadcast frame, transmitted over port 7 or 9. It can be sent over a variety of connectionless protocols (UDP, IPX) but UDP is most commonly used. In our case too we use UDP. The data that is contained in a Magic Packet is the defined constant as represented in hexadecimal: FF FF FF FF FF FF followed by sixteen repetitions of the target computer's MAC address.

The Magic Packet is actually broadcasted and not unicasted over the network. In other words the Magic Packet is a broadcast frame. The Magic Packet is broadcasted on the broadcast address for that particular subnet or the entire LAN. The listening computer receives this packet, checks it for the correct information, and then boots if the Magic Packet is valid. Since the packet contains the MAC Address of the target machine, only the machine whose MAC address matches with the one in the packet, is booted.

There are lotz of free WOL programs that are available on the net:

Using these you can "wakeup" any system which is WOL compatible.

Recover permanently deleted mails from Microsoft Outlook

Procedure to recover shift deleted [permanently deleted] mails from Microsoft Outlook.
1) First go to Run and type regedit
3) Right click options and add new DWORD VALUE (data type is REG_DWORD) and then right click and rename to DumpsterAlwaysOn. It is case sensitive.
4) Then rights click and modify and make the value 1 to turn the Recover Deleted Items menu choice on for all folders or enter 0 to turn it off.
5) Then go to Outlook , choose "Recover deleted items" option from the Tools Menu to get back your "permanently deleted" mails!

Note: This procedure can recover mails which were deleted by pressing shift+del in the past 30 days.

Hope this is useful to some of us.

Google codesearch

Good News for Software Developer........
Google simplifies the code searching, at least to some extend...try it out

Google launches search service for computer code -

Google Code Search, a site that simplifies how software developers search for programming code to improve existing software or create new programs.

Google Code Search helps you find function definitions and sample code by giving you one place to search publicly accessible source code hosted
on the Internet. With Google Code Search, you can:

Use regular expressions to search more precisely. Restrict your search by language, license or file name. View the source file with links back to the entire package and the web page where it came from :

FAQ for this new product from Google labs :