Saturday, May 12, 2012

Facebook newsfeed link by: Occupy Human Rights

Occupy Human Rights shared the following link:

http://www.dailymail.co.uk/news/article-2143409/Theyre-Occupy-protesters-retu...

It is part of a global day of action seeing thousands of people rallying in cities including Moscow, New York, Athens and Madrid, organisers said.
Sent from VishwaCloud®

Friday, May 11, 2012

Facebook newsfeed link by: Tandra Mukherjee

Tandra Mukherjee shared the following link and had this to say about it:

arise awake dear friends come lets conquer the heart s of people.

http://www.facebook.com/media/set/?set=a.374760465869706.94643.37474518587123...


Sent from VishwaCloud®

Facebook newsfeed link by: Help for those children who don't have money for their study

Help for those children who don't have money for their study shared the following link and had this to say about it:

"The President is Not one to ask Anything for HIMSELF" - SHARE... if u want APJ again President

http://www.videofy.me/v/320534

WATCH ALL VIDEO'S & KEEP SHARE IN YOUR WALL
Sent from VishwaCloud®

Tuesday, May 8, 2012

Save the Koodankulam Protesters

------Original Message------
From: Ricken Patel - Avaaz.org
To: aalok.biswas@live.com
Subject: Save the Koodankulam Protesters
Sent: May 8, 2012 5:45 PM

Dear friends across India, Over 6,000 people are facing charges for their peaceful opposition to a Tamil Nadu nuclear plant, and 300 have started a hunger strike demanding their right to peaceful protest. If we stand with them now, we can force the government to drop this oppressive attack. Sign the petition now: Over 6,000 people face prison for their non-violent opposition to a massive nuclear plant in Tamil Nadu. Now, many of them have commenced an indefinite hunger strike in a last-ditch attempt to save their freedom and stop the nuclear plant. If we support them now we can force the government to stop this illegal persecution of peaceful protesters. Authorities are cracking down mercilessly on the villagers opposing the Koodankulam nuclear plant. Mothers have been forced to feed their babies sugar water as a government blockade has stopped milk as well as other food and drink. Over 6,000 villagers have been charged for their protests. But the hunger strike is putting pressure on local officials to drop these charges. Together we can make a difference. Click here to sign the petition urging the Tamil Nadu and central governments to drop all charges against these non-violent protesters and allow them to freely exercise their constitutional rights: http://www.avaaz.org/en/petition/Save_the_Koodankulam_Protesters/?vl The Fukushima disaster in Japan in 2011 provides unambiguous testimony of the dangers of nuclear power, and the Koodankulam plant has also been constructed in an area susceptible to earthquakes and tsunamis. But the struggle in Tamil Nadu is about something even greater than threat from a very dangerous technological dream. It is about the collapse of freedom in a country that has long claimed to be the world’s largest democracy in the tradition of Mahatma Gandhi. Over 300 men and women have now started an indefinite hunger strike to call on authorities to drop the charges -- and they urgently need our help while they still have their health and lives. Sign the petition now: Sent from VishwaCloud®

Monday, May 7, 2012

Apple's OS X security blunder; Best Android tablets; Bad cyber laws | Tech Update Today

Sent from VishwaCloud®

From: ZDNet Tech Update Today <newsletters@zdnet.online.com>
Date: Mon, 7 May 2012 08:38:11 -0700 (PDT)
Subject: Apple's OS X security blunder; Best Android tablets; Bad cyber laws | Tech Update Today

Trouble viewing this mail? Read it online | Manage my newsletters | Previous Edition
 
ZDNet Tech Update Today
ZDNet Member | May 07, 2012
Home | News & Blogs | Galleries | White Papers | Small Business | Downloads | Reviews | Podcasts | RSS Feeds

Today's Top Picks

Apple security blunder exposes Lion login passwords in clear text

With the latest Lion security update, Mac OS X 10.7.3, Apple has accidentally turned on a debug log file outside of the encrypted area that stores the user's password in clear text.

READ FULL STORY | SHARE ON FACEBOOK

Recommended

Free 2011 Salary Report

IT Professionals - Register on activeTechPros for immediate access

Business Professionals - Join the activeBizPros community to view the report


If VLC can ship a free DVD player, why can't Microsoft?

Microsoft's decision to remove support for playing DVD movies in Windows 8 has caused some confusion. If the VLC media player can provide DVD support for free, why can't Microsoft? For starters,...

READ FULL STORY | SHARE ON FACEBOOK

A funny thing happened on my way to everywhere

Mobile gadget users are greatly impacted by the battery life of those devices, and that's not going to change anytime soon.

READ FULL STORY | SHARE ON FACEBOOK

Letting our lawmakers make laws about cybersecurity is probably a mistake

We'll wind up with a law that substantially reduces our privacy, increases costs to most companies, does not protect us from cyberattacks, and doesn't get the job done.

READ FULL STORY | SHARE ON FACEBOOK

Is the iPad the new normal for data visualization?

Gartner publishes its report on Mobile BI and the winning vendor finds mobile is the driving factor in more and more of its pipeline.

READ FULL STORY | SHARE ON FACEBOOK

Hot Topic Spotlight

Your IT Department: Cost Center or Profit Center?

There's increasing pressure to transform IT into a business. What kind of transformation makes the most sense for your shop?

READ FULL STORY  | SHARE ON FACEBOOK


Featured Photo Gallery

Best tablet for those who don't want an iPad

While I firmly believe that the iPad is the best tablet out there, there are some fantastic Android tablets on offer. Here are my top six Android tablets.

VIEW THE GALLERY  | SHARE ON FACEBOOK

More photo galleries:

20 things we want in iOS 6

Featured Product

LG launching HDTV sets equipped with Google TV on May 21

After unsuccessful first-generation products from Logitech and Sony, LG will be releasing sets based on the second-generation Google TV platform starting in two weeks.

READ FULL STORY  | SHARE ON FACEBOOK

More product coverage:

Not all iPad 2s are created equal
Like gadgets? Sign up for ZDNet's Product Watch Newsletter

Latest News

No Windows 8 DVD playback will mean increased costs, and consumer confusion

Facebook blames Scoble snafu on spam false positive

Who falls first: RIM or Nokia?

'TeleHuman' taps Kinect for 3D holographic videoconferencing

Google mobile apps: Banned in China?

Lithium: On the path, running...

Paul Ceglia sanctioned in Facebook lawsuit, has two weeks to pay

Parents of underage Facebookers should be reported, Principal says

Read more News >>


Connect with ZDNet

Become a fan on Facebook

Follow us on Twitter

Watch us on YouTube


Small Business Center

Mobile-friendly Web sites still an SMB rarity (survey)

Most small businesses believe mobile marketing will factor heavily in business growth over the next five years but few have moved to optimize their Web presence for mobile devices.

READ FULL STORY  | SHARE ON FACEBOOK


Featured Video

Facebook COO: 'Our dream is to save lives' (video)

Facebook COO Sheryl Sandberg talks about why the social networking giant has suddenly become interested in organ donation and what exactly Menlo Park is trying to achieve with its new feature.

WATCH VIDEO  | SHARE ON FACEBOOK

Watch more Videos >>
 

Recommended Downloads

 

Send us your feedback here.

Sign up for more free newsletters from ZDNet! | To manage your account settings or to remove yourself from all ZDNet communications, please visit our Subscription Center.

The e-mail address for your subscription is vishwaalok@mail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Copyright CBS Interactive, Inc. All rights reserved.
ZDNet is a registered service mark of CBS Interactive, Inc.

ZDNet
235 Second Street
San Francisco, CA 94105
U.S.A.

Friday, May 4, 2012

Facebook newsfeed link by: Encyclopaedia Britannica

Encyclopaedia Britannica shared the following link and had this to say about it:

Peter Bergen, CNN analyst, national security wonk, and author of Britannica’s article on 9/11, considers the question: What would Mitt do?

http://www.cnn.com/2012/05/04/opinion/bergen-bin-laden-mission/index.html

Peter Bergen says it's far from clear that other presidents would have overruled experienced advisers and okayed the mission
Sent from VishwaCloud®

Thursday, May 3, 2012

Facebook newsfeed post by: Aalok Biswas

Aalok Biswas wrote:

Don't site examples unless you become one. Similarly, if you can't feel, you can't heal as well. Don't expect change unless you don't change.@abiir @vishwacloud
Sent from VishwaCloud®

Tuesday, May 1, 2012

Communicating for Success

------Original Message------
From: Harvard Business Review
To: aalok.biswas@live.com
Subject: Communicating for Success
Sent: Apr 30, 2012 11:37 PM

Having trouble viewing this email? Click here to see it in a web browser. THE MOST IMPORTANT SKILL YOU'LL EVER LEARN The Communicating for Success Collection Nearly every other management skill depends on your ability to communicate effectively—formally or informally, in person or in writing. And that makes this collection a must for every manager's bookshelf. ORDER NOW AND SAVE 25%* Communicating for Success Collection comes with a 30-day money-back guarantee.   Only $125** THIS SPECIALLY PRICED 7-VOLUME COLLECTION WILL HELP YOU: Make presentations that change minds and inspire action. Create and manage meeting agendas for maximum efficiency. Guide employees with effective feedback. Use nonverbal communication to reinforce your message. SAVE 25%* Communicating for Success Collection is yours for only $125**. ORDER NOW The Communicating for Success Collection includes: CD-ROM Communicating for Results This hands-on CD-ROM program covers making a presentation, negotiating, persuading others, and writing for business. Each module includes a comprehensive overview in core concepts, a set of "how to" action steps, tips, a self-test, and audio-enhanced practice exercises. PAPERBACK Harvard Business Review on Communicating Effectively If you need the best practices and ideas for communicating effectively—but don't have time to find them—this book is for you. This indispensable volume will help you customize your delivery for maximum persuasive power. HARDCOVER Failure to Communicate: How Conversations Go Wrong and What You Can Do to Right Them Holly Weeks shows how to master the combat mentality, emotional maelstrom, and confusion that poison difficult conversations. This book equips you with the strategies and practices you need to transform even the toughest conversations. PAPERBACK Guide to Persuasive Presentations Packed with practical advice on everything from structuring content to overcoming stage fright, this gu
Sent from VishwaCloud®

A new approach to preempting insider threats

Sent from VishwaCloud®

From: "Intel IT Center" <information@intel.marketingstudio.com>
Date: Tue, 01 May 2012 17:03:10 -0400
To: Aalok Biswas<vishwaalok@mail.com>
Subject: A new approach to preempting insider threats

Intel IT Center
Intel® IT Center webinar invite:
Mitigate insider threats: Use business intelligence and new open-source software to detect suspicious events and perpetrators
Get proactive protection from insider threats with open-source software
and best practices from Intel IT

Intel® IT Center Talk to an Expert webinar series
Mitigate Insider Threats with Open-Source Intelligent Security
Thursday, May 24, 2012
9 a.m. Pacific Daylight Time

Register Now

Join Grant Babb, Proactive Investigations Program manager for Intel IT, as he discusses the impact of insider threats on organizations and the software and best practices Intel has developed to preempt this type of attack. You'll learn about:
  • A new approach to preempting insider threats: How we combined business intelligence and behavioral monitoring
  • How Intel IT developed Intel® Pro-I: A new software tool used by Intel to proactively identify potential insider threats that is now freely available through General Public License (GPL)
  • Insider threat personas: Profiles of insiders who—for one reason or another—deliberately compromise IT data and systems
  • The changing security environment: Why the way we work today via mobile and cloud has changed the way we need to approach insider threats
  • The skills you need: The knowledge and expertise you need on staff to mitigate the risk of insider threats and make the best use of this unique approach
Also be sure to bring your questions about insider threats for Grant to answer during the moderated question-and-answer portion of the webinar.

Intel IT Center Talk to an Expert webinar series
Mitigate Insider Threats with Open-Source Intelligent Security
Thursday, May 24, 2012
9 a.m. Pacific Daylight Time

Register now >

Intel | Sponsors of TomorrowThis e-mail is provided to Intel IT Center members.

Copyright © 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel Corporation in the U.S. and/or other countries.

*Trademarks | Privacy




Unsubscribe

Intel Corporation ATTN Privacy, Mailstop RNB4-145 2200 Mission College Blvd. Santa Clara, CA 95054 USA

Pages