Saturday, August 30, 2008

Indian Classical Music


Indian classical music is basically composed of 7 basic notes सा रे ग म प ध नि, with five interspersed half-notes, resulting in a 12-note scale


हिन्दुस्तानी music:
This rhythmic group is based on rhythmic patterns called ताल. The melodic fundamentals are ‘melodic modes’, known as थाट , थाट are part of "musical personalities" called राग।

थाट - may consist of up to seven scale degrees or स्वर .

सरगम :

• सा = Do • रे = Re • ग = Mi • म = Fa • प = Sol • ध = La • नि = Ti • सा = Do

A typical rendition of हिन्दुस्तानी raga involves two stages:

अलाप : a rhythmically free improvisation on the rules for the राग in order to give existence to the राग and shape out its characteristics। The अलाप further divided into the अलाप, जोड़ and झल।

बंदिश or गत : It is a fixed, melodic composition set in a specific राग, performed with rhythmic accessory by a तबला or पखावज.
स्थायी : The initial melodic symphony.
अंतरा : The first body phrase melodic symphony
संचारी : The third body phrase melodic symphony, like in ध्रुपद बंदिश
आभोग : The fourth and concluding body phrase, melodic symphony, like in ध्रुपद बंदिश.
There are three variations of बंदिश, regarding tempo:
विलंबित बंदिश : A slow and steady melodic symphony,
मध्यलय बंदिश : A medium tempo melodic competition
द्रुत बंदिश : A fast tempo melodic symphony,


Types of Vocal music compositions:

The major vocal forms-cum-styles related with हिन्दुस्तानी classical music are ध्रुपद , ख्याल , and ठुमरी . Other forms include धमार , तराना , त्रिवट , चैती , कजरी , टप्पा , टाप -ख्याल , अश्तापदिस , दादरा , ग़ज़ल and भजन. Some forms come under folk or Semi-Classical or Classical ('Light' Classical) music,

ध्रुपद music is primarily devotional in theme and content. It contains recitals in praise of particular deities. ध्रुपद compositions begin with a relatively long and acyclic अलाप , traditionally performed by male singers.

ख्याल , is special as it is based on improvising and expressing feeling. ख्याल are also more popularly depicting emotional significance between two lovers, circumstances evoking intense feeling, or situations of ethological significance in Hinduism and Islam.

टप्पा is a form of Indian classical vocal music whose specialty is its rolling pace based on fast, delicate, tricky structure. The arrangement of words, with the help of tone vibrations performed in superb vocal style, create a charming ambiance.

तराना are songs that are used to convey a mood of delight and are usually performed towards the end of a concert. They consist of a few lines of musical sounds or बोल set to a harmony.

ठुमरी is a semi-classical vocal form, Punjabi, लखानोवी and पूरब अंग ठुमरी . Lyrics are in ब्रज भाषा and are usually romantic.

ग़ज़ल is an formerly Persian form of poetry. In the Indian sub-continent, ग़ज़ल became the most common form of poetry in the उर्दू language.

Thursday, August 28, 2008

Basic Customer Service protocols



I am not an expert, but want to share my some thoughts, which I think will be helpful :


Good customer service is the backbone of any business. Offering promotions and slashing the prices to bring in as many new customers as you want, but unless you can get some of those customers to come back, your business won’t be profitable for long.

Good customer service involves bringing old customers back. And about sending them away happy – happy enough to pass positive feedback about your business along to others, who may then try the product or service you offer for themselves and in their turn become repeat customers.


Few steps need to follow, these may be just followed by you, but will refresh your thoughts for once again,

Don’t make promises unless you WILL keep them. Confirm prior to any promise – because nothing annoys customers more than a broken one.

Listen to your customers. Let him complete and show him that you are listening by making the appropriate responses, like 'Ok', 'I see', such as suggesting how to solve the problem.

Deal with complaints. No one likes hearing complaints, and many of us have developed a reflex shrug, saying, “You can’t please all the people all the time”. But if you solve that complaint, it may lead for business positive response.

Be helpful - even if there’s no immediate profit in it.

Train your staff to be ALWAYS helpful, courteous, polite and knowledgeable. Do it yourself or hire expert to train them. Talk to them about good customer service regularly. Most importantly, give every member of your staff enough information and power to make those small customer-pleasing decisions, so he never has to say, “I don’t have appropriate rights to take this decision.”

Take the extra step. When customer arrives, Wait and see if he has questions about your product, or further needs. Whatever the extra step may be, if you want to provide good customer service, take it. They may not say so to you, but people notice when people make an extra effort and will tell other people.

Throw in something extra. Whether it’s a coupon for a future discount, additional information on how to use the product, or a genuine smile, people love to get more than they thought they were getting. A small thing, but so appreciated.

Its not a complete Customer service guide, but basic things to be followed... ;)

Monday, August 25, 2008

I quit smoking!

I quit smoking..

This is the story of this particular day which made a drastic change in my lifestyle, I hope it changes your perception as well.

All of us who have a smoking habit meet up with friends or colleagues and smoke our time out.
My friend's invitation for a cup of tea will start with obvious question, "Hey Dude, which brand?" and the answer would be either a Marlboro or a Classic Mild. Being well educated we all know the harmful effects of smoking a cigarette and how it affects people around us who don't have this habit. (Yes, even passive smokers have a great chance of having diseases related to smoking) At times its just our attitude which forces us to smoke and its not actually the urge of smoking a cigarette.

It is about this day when we were at this tea stall near a temple with some beggars rounding us for alms. One of them in particular was a grey-haired, wrinkled old beggar woman who approached us with her walking stick for alms of one rupee or more to help her buy lunch for herself. We looked at her and refused to oblige and asked her that how will a rupee get her a meal. She said that she will collect more alms and get the meal for herself.
We crushed our half burnt cigarettes with our shoes and moved forward without giving her any alms. She mumbled when we turned.... "These young men will burn more than a rupee for their bad habit but will never give a rupee to a hungry person."

I didn't say a word to her and went inside the temple but her words were hitting back on me and it was making me really sick about the whole feeling.
After a while when we came out from the temple we saw that the old women was sharing her lunch with another girl who had failed to collect enough alms for her meal.

I went to the beggar and questioned the old women of who the other girl was and she told me about her. (No, the girl was not related to her ) I asked her "You didn't know whether you'll get your lunch for today and here you are sharing your meal with this girl who just met you. How are you going to arrange for your dinner now" She replied to me " Don't worry son, God will arrange my dinner like how he did for my lunch" and I was really shaken by that statement of hers.

I was astonished at her generosity and could not utter a single word. It was a true lesson. The old woman who was not sure whether she would be able to arrange a rupee for her lunch did not hesitate to feed a hungry girl not worrying about her dinner. Her remarks which she made earlier were correct and it was true that two cigarettes could feed two hungry people was for me.

It was for the last time I had tossed that half-burned cigarette and crushed it under my shoes. I got the strength to quit the habit at that moment itself. No "statutory warning" on the cigarette packet or any health related articles could teach me the lesson that the beggar woman did that day"


I am not a saint to tell you about the ill effects of the smoking a cigarette but I am just your friend. The simple fact that a single cigarette can suffice a hungry human being has forced me to quit a habit which was pretty unnecessary in my life. I must tell you the feeling you get when you help a hungry or a needy person is all worth kicking the habit... Don't believe me...Try it!

[Courtesy: Sunday Times of India (24/08/2008)]

Saturday, August 23, 2008

How NAT is configured


As you are going through this topic, you are surely connected to the Internet and it’s for sure that you are in Network Address Translation (NAT) environment.

The Internet has gone bigger than ever imagined. You must be amazed to know the size of the Internet with NAT. To communicate on the internet every computer and web server must have a public IP address. An IP address is a unique 32-bit number. It specifies your location on global network.

When 32 bit IP (IPv4) addressing first came out, theoretically it can have 4,294,967,296 unique addresses (232). The actual number of available addresses is much smaller because of the way that the addresses are separated into ‘Classes’ and the need to set aside some of the addresses for multi-casting, testing or other specific use. (I will be posting on IP address classes very shortly.)

Network Address Translation is a single device like a router which acts as liaison between the Internet and a local network. One single unique IP address is required to represent your network of computers in a particular company.

Static NAT – Mapping an unregistered IP address to a registered IP address on a one-to-one basis. This is particularly useful when a device needs to be accessed from outside the network.

Dynamic NAT – Maps an unregistered IP address to a registered IP address from a group of registered IP addresses. Dynamic NAT also establishes a one-to-one mapping between unregistered and registered IP addresses but the mapping could vary depending on the registered addresses available in the pool at the time of communication.

Overloading – A form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports. It is also known as PAT (Port Address Translation), Single Address NAT or Port-Level Multiplexed NAT.

In my upcoming post I’ll let you know on "How your web request from your PC gets served as web page?"

Friday, August 22, 2008

How Spammers Get Email Addresses


How Spammers Get Addresses ? There are so many companies which sell CDs with plenty of valid e-mail addresses. With MS Word, you'd easily make those addresses into lines of 100 addresses each, and then cut and paste those lines in the "To:" field of any e-mail program.The problem with spam is, incredibly easy to send. Practically costs nothing to send it. Reply rate is also very less 1 is to 1000 ratio of e-mails, Where does a company get millions of valid e-mail addresses to put on a CD and sell to you? There are a number of primary sources.

1)
newsgroups & chat rooms, Newbies often provide their screen names, or keep valid e-mail addresses, in newsgroups. Spammers do use a software to extract the screen names and e-mail addresses automatically.


2)
The Web itself. There are thousands of Web sites, The programs that do the spidering is spambots, searchs the Web specifically looking for "@" sign that indicates an e-mail address.


3)
Websites created ONLY to attract e-mail addresses. Just like, a spammer creates a site that says, "Win £1 million!!!, ONLY type your e-mail address here!" In the past, lots of large sites also sold the e-mail addresses of their members. Or the sites created "opt-in" e-mail lists by asking, "Would you like to receive e-mail newsletters from our partners?" If you answered yes, your address was then sold to a spammer.


Probably the most common source of e-mail addresses, however, is a "dictionary" search of the e-mail servers of large e-mail hosting companies like MSN, AOL or Hotmail. In the article Hotmail: A Spammer's Paradise?, the author describes the process:
A dictionary attack utilizes software that opens a connection to the target mail server and then rapidly submits millions of random e-mail addresses. Multiple adresses have slight variations, such as "tanmya@hotmail.com" and "tamnay@hotmail.com." The software then checks which addresses are "live," and adds those addresses to the spammer's list. These lists are typically resold to many other spammers. E-mail addresses generally are not private. Once a spammer gets a hold of your e-mail address and starts sharing it with other spammers, you are likely to get a lot of spam.

So keep in might, You are not safe and secured in this Virtual world!!!

Thursday, August 21, 2008

I don't hate Mozilla but use IE or Else VIRUS…


Here I have spent some time on google to find out the solution for this virus, may it'll help you to protect your computer from this virus! I Dont hate mozilla but use IE or Else… this is a virus…which has also blocked my orkut.com AntiVirus can also not detect it… These virus are spreading through USBs / Pen drives. You'd take precaution to disable the auto run feature in the system.

Follow the simple steps:

1. Start -> Run.
2. RegEdit in the Run text box, press ENTER.

3. In the Registry Editor, locate and click the following registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CDRom
Modify the value of the Autorun to 0 (zero) so that CD-ROMs and Audio CDs do not run and start automatically when inserted.
4. Next navigate to the following registry subkey:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Modify the value of the NoDriveTypeAutoRun entry to 0xb5 value to turn off the AutoRun feature for CD-ROMs by right-click NoDriveTypeAutoRun and then click Modify to type B5 in the Value data box. Select Hexadecimal, and then click OK.
5. Quit Registry Editor.

6. Restart your computer.
Now time to remove it completely,
* Open you task manager by pressing Ctrl+Alt+Del

* Now go to processes tab and arrange the processes by users.

* Now look for svchost.exe run by User name “user” or “admin” or “your computer name”. Right click and end the svchost.exe processes where the User Name is not “SYSTEM” or “NETWORK SERVICE” or “LOCAL SERVICE”.
* Next Open you command prompt, Start > Run and then typing cmd in the text box and hit enter.

* In the dialogue window, type cd\ and press Enter
* It will change to C:\>

* Next, type " attrib -s -r -h heap41a /s /d and hit Enter.

* Then Open C: on My computer and delete the folder heap41a i.e., C:\heap41a
* Now remove C:\heap41a\svchost.exe shortcut from C:\Documents and Settings\USER\Start Menu\Programs\Startup (Or Start > All Programs >Startup)


Now you have deleted the virus. Whenever you insert a pen drive , try to delete the autorun.inf file in it and other hidden .exe files inside it which are shown with folder icon.

[P.S.: This post is also available on other websites also..]

Wednesday, August 20, 2008

Why application Pool crashes?


Why application Pool crashes for websites? I kept my promise to post about this issue. Quickest resolution for the application pool crash, may be the permission issue, which can be fixed easily, but if it fails then, Application pool crash may be the result of its actually crashed process or just got hang because of multiple queries.
Lets see the difference between a crash and a hang on the Windows Server .

A crash is the one who will remove out the host process; this will lead to stop the server side work and affect the output of that process been assigned. In old versions of IIS, whenever crash occurred, will go down and the browsers will display a disconnected connection and report some service disconnected or unknown error. In IIS6 Worker Process Isolation Mode, the HTTP.SYS holds the connections in kernel-mode, so even if user code running in w3wp.exe crashes, the connection remains connected and IIS takes care to start up a new process to handle further requests - so browsers like mozilla, IE will not see a disconnection for a crash. But the request in the crash process cannot be re-executed, [serious issue with any money transaction processes]. Now a hang, will keep its host process running but the it prevents to make any sort of changes in. Application code may be waiting for a lock that never gets released, may be because it was leaked or may be a logical deadlock or live lock, or may be infinite loop, etc. Any non processed response will never happen once the application code hang. From browser point of view, both the things, a crash and a hang on the server may prevent a complete HTTP response from being sent back, so may look quite similar. Now a crash is an unrecoverable event that may be resulted from some flaw/bug in the code that is executing. A bug is a logical flaw in the code that may result in some arbitrary set of inputs. so roughly you can say that bugs can cause crashes to the application... I want to make one point here, users attempt to resolve their crashes without diagnosing the cause. Like, most users just look at pattern matching problem symptoms and event log entries and applies presumed solutions and BLINDLY try them all, hoping that some of the solution may work... But its dangerous, leading to making it more complicated issue, than resolving in easy steps.

Now the scene arises that, if you do not know, which bug is causing this,
Now its time to look for debugging, so that NEXT crash can be avoided. you cannot do anything about the crash that has already occurred. You SHOULD NOT change any server settings to avoid it. You can set up debugging monitors like IIS State or DebugDiag for necessary processes running code those are crashing and then WAIT for the next crash. ;)

So whenever failure occurs, These debugging tools will record the event with the cause. After taking out the report from these tools, you will see, there is either only one culprit who is recursively causing it or there are multiple issues. So in initial stage, you can keep watch on the result and also get them fixed as soon as they occur.

Sunday, August 17, 2008

How application pool works under IIS?



How application pool works under microsoft IIS?

As we all know, ASP application works on application pool structure, its all processes and connectivity with the database is controlled by this application pool concept. Here I have tried to explain how it work?

Prior to proceeding, let me put up the scenario of the Application Pool. On Web Server, there are dedicated/shared application pools assigned to particular website running on it. Each application pool is handled and processed by the worker process. Worker process plays vital role in ASP applications.

Whenever Client request for any ASP page, the request for concern page on the Web server is followed in the stepwise fashion. Kindly refer to the diagram, while going through the explaination.

Client request first gets forwarded on the Kernel, which is on the Http.sys/cache takes care of initial request status. Network stack and Http.sys/cache forwards corresponding ASP page request to concern worker process of that application pool.

Now this worker process communicates with User application through ASP.NET/CLR. Here for example, I have taken User application, which communicates with the MSSQL database. This application fetches requested data and displays it on the ASP page requested by the client.

As each worker process on IIS handles different Application pool, so even if one worker process fails resulting in application pool crash, other application continues its process without interruption. So that you can restart this crashed application pool.

Very shortly, I am going to post article on "Why application Pool crashes?" forthcoming attraction ;)

Saturday, August 16, 2008

Morachi Chincholi: Peacocks Town = Chincholi (Morachi) Picnic spot near Pune

My home town is from Pune to Ahmednagar is an interesting one. prosperity is apparent, though area battled with severe drought just a couple of years ago. The village of Chincholi Morachi. means the abode of peacocks and tamarind trees, both of which are in abundance in my town.

This quaint little village, almost 60 km from Pune, is home to a population of around 2,500 people, as well as an equal number of peacocks. The peacock is not just protected, but also revered. This small town is surrounded by Nighoj (World famous Pot holes), Malthan, any many more natural dweller villages.

Our
peacocks have helped the villagers in their own way. They help in keeping snakes at bay & act as a natural biological control by eating the insects on the crops.


Last year MTDC for Morachi Chincholi has approved it as tourist picnic spot near Pune and Mumbai. And latest achievement for us, as Thopate family is that, we got ATDC (Agree Tourism Development Corporation) approval for our site. So in week ends, you will find ample amount of tourists visiting to Chincholi Morachi. You can contact for accommodation to me. An NGO has in with plans to create a peacock sanctuary near the village. And if all goes well, the national bird can continue to enjoy its pride of place in Morachi Chincholi.

You can contact me on www.chincholimorachi.com


A day after night shift


Ahhaa... Its early morning 06:00am, World is getting ready for its new day with fresh air, fresh mood. Hmm and I am feeling drowsy now... after a long night shift, now brain is getting slight heavy (& eyes too;)) .

But its nice experience to work in Night Shift.. its silence, which you'll never get in day time. You can work along with a bit enjoyments. And especially, you get freedom of work as per your choice, no surrounding disturbance...




Freedom of thoughts makes you much more perfect in your profession .
Because of night work culture, I have managed to devote time for Friends, studies and many interesting things... In these 9 months, I learned that, there are lot many things to do in your life..

Life is mystery... Don't try to reveal it, it gets much complicated in its own.. Just enjoy it...

Friday, August 15, 2008

On 62th Independence Day Dawn


Hi,
"Vande Mataram"
On the dawn of 62th Independence day, We all remember the sacrifices done by our National Heroes for the freedom of self respect and self identity. Country has paved a long journey of 61 years of freedom, contributing in National growth on global platform and making an big entity in this competition. India has made its presence in developing nations.
But have we ever though about our internal issues? I am not talking about our political level, where every politician want to enjoy the cream layer of our economy and making country more poor

आज एक भारतीय होने के नाते आपने देशके लीए कया कीया है? आज जब भी रोडपे दुर्घटनाऐ होती है आज हमसे कीतने अपने भाईयोंकी मदत करते है? आज जब कोई मजलूम को पीड़ित कीया जाता है, हमेसे कीतने उनके लीए अत्याचार के खिलाफ आवाज़ उठाते है? हम आज इतने निर्दयी हो गए की, अपने ही देश वासियों की दुखों को यूँ नजर अंदाज़ कर रहे है। आतंकवादी हमले होते है तब हम कोसते है की "इस देश का कुछ नही हो सकता" हाँ पर इसमे आप भी जिम्मेदार है | आप की इसी आदत के वजह से आतंकवादी आज हमारे मातृभूमि को छल्लनी कर रहे है... अगर आज हम थोडी सतर्कता दिखाए तो हम अपनी भारतमाता को इस आतंक से बचा सकते है।
थोडी सतर्कता और थोड़ा भाईचारा हमारे देश को इस आतंक और जुल्म से बचा सकता है। ख़ुदके बारे में तो सभी सोचते है, थोड़ा वक्त अपने भारतमाता का कर्ज अदा करने के लीए भी तो निकालो॥!!
------------------------------------------------------------------------------------
देश की गरीमा और स्वतंत्र भारत के चरनोमें समर्पित... जय हींद !!!!

Thursday, August 14, 2008

Windows Security Tab missing in Windows 2003


Hi,

Recently I have faced very strange problem with Windows 2003 Server Operating System. I am trying get it resolved but failed. :(

Strange thing is that, I can view security tabs for all other folders along with it. But this is the ONLY one folder whose security tab is missing.

Hope some one will help me in this issue...


-------------------------------------------------------------------------------------------------
I was in search of its solution, Hope following one will help you!!!

1) Open command prompt on your system (Drive should be NTFS file type), User should have at least read privilege on rshx32.dll, generally it is available, but one should cross check it.

C:\Documents and Settings\Administrator>cacls \windows\system32\rshx32.dll
C:\windows\system32\rshx32.dll BUILTIN\Users:R
BUILTIN\Power Users:R
BUILTIN\Administrators:F
NT AUTHORITY\SYSTEM:F

You can get more info on cacls as cacls /?

2) Assign its preceding folder proper permission and hit apply its inherit permission.

Wednesday, August 13, 2008

Windows 2003 commands

Windows 2003 commands
Management Consoles

compmgmt.msc - Computer management
devmgmt.msc - Device Manager
dfrg.msc - Defragment
diskmgmt.msc - Disk Management
eventvwr.msc - Event Viewer
gpedit.msc - Group Policy -XP Pro only
iis.msc - Internet Information Services
lusrmgr.msc - Local Users and Groups
mscorcfg.msc - Net configurations
secpol.msc - Local Security Policy
services.msc - System Services
wmimgmt.msc - Windows Management

Server Security Against Attack


Hi,
Now a days, Your computer needs security tighten with the IPSec policy, You can go through following steps to make it effective:

Start > Program Files > Administrative Tools > Local Security Policy > Create IP security policy'

Click Next and provide your policy 'Block those IP' and type its description (if you want ;)).

Click Next then leave activate ticked & then click Next

leave all default settings as it is and click Finish

Now you are at the properties window.

Here Click ADD then Next.

(Precaution, do not play with it, otherwise your RDP session will get lost) Leave 'This rule does not specify a tunnel' selected and click Next

Leave All Network Connections as it is & click Next

Now important task is here, IP filter list. Now create a new filter, Click Add new filter.

Provide a Name for the list, call it 'Block those gatecrashers'

Click Add then Next to continue.

In the description box type a IP address. If you want you can assign Filter name or only IP as its name.
Let it be ticked the Mirrored. Match packets with the exact opposite source and destination addresses Click Next

The Source address should be kept as My IP address & click Next

Now select A Specific IP address for the Destination address. (You will get multiple option in this drop down list, you can check them, as per your need)
Provide the IP address to be blocked & Click Next

Let it be protocol type as Any and click Next and alas Finish

Now Last but not the least, Right Click Block those IP policy, and say Activate.
--------------------------------------------------------------------------------------------------------------
This seems to be a bit complicated process, but its very effective one.

About Myself!











Hi,

Very Good Morning! I Tanmaya N Thopate, BE (Electronics) 2005. Right now being achieved the altitude of Administration in Windows Hosting And being emphasized its horizon by distance learning program for MBA.
Plenty of things are there in life to do... but less time :)
Planned for achieve horizons of this galaxy.