Tuesday, March 26, 2013

HAPPY HOLI TO ALL


History of Holi

Click Here if You cant see Images
Holi is an ancient festival of India and was originally known as 'Holika'. The festivals finds a detailed description in early religious works such as Jaimini's Purvamimamsa-Sutras and Kathaka-Grhya-Sutras. Historians also believe that Holi was celebrated by all Aryans but more so in the Eastern part of India. 

It is said that Holi existed several centuries before Christ. However, the meaning of the festival is believed to have changed over the years. Earlier it was a special rite performed by married women for the happiness and well-being of their families and the full moon (Raka) was worshiped. 

Calculating the Day of Holi
There are two ways of reckoning a lunar month- 'purnimanta' and 'amanta'. In the former, the first day starts after the full moon; and in the latter, after the new moon. Though the amanta reckoning is more common now, the purnimanta was very much in vogue in the earlier days. 

According to this purnimanta reckoning, Phalguna purnima was the last day of the year and the new year heralding the Vasanta-ritu (with spring starting from next day). Thus the full moon festival of Holika gradually became a festival of merrymaking, announcing the commencement of the spring season. This perhaps explains the other names of this festival - Vasanta-Mahotsava and Kama-Mahotsava.

Reference in Ancient Texts and Inscriptions
Besides having a detailed description in the Vedas and Puranas such as Narad Purana and Bhavishya Purana, the festival of Holi finds a mention in Jaimini Mimansa. A stone incription belonging to 300 BC found at Ramgarh in the province of Vindhya has mention of Holikotsav on it. King Harsha, too has mentioned about holikotsav in his work Ratnavali that was written during the 7th century. 

The famous Muslim tourist - Ulbaruni too has mentioned about holikotsav in his historical memories. Other Muslim writers of that period have mentioned, that holikotsav were not only celebrated by the Hindus but also by the Muslims. 

Reference in Ancient Paintings and Murals 
Click Here if You cant see ImagesThe festival of Holi also finds a reference in the sculptures on walls of old temples. A 16th century panel sculpted in a temple at Hampi, capital of Vijayanagar, shows a joyous scene of Holi. The painting depicts a Prince and his Princess standing amidst maids waiting with syringes or pichkaris to drench the Royal couple in coloured water. 

A 16th century Ahmednagar painting is on the theme of Vasanta Ragini - spring song or music. It shows a royal couple sitting on a grand swing, while maidens are playing music and spraying colors with pichkaris. 

There are a lot of other paintings and murals in the temples of medieval India which provide a pictoral description of Holi. For instance, a Mewar painting (circa 1755) shows the Maharana with his courtiers. While the ruler is bestowing gifts on some people, a merry dance is on, and in the center is a tank filled with colored water. Also, a Bundi miniature shows a king seated on a tusker and from a balcony above some damsels are showering gulal (colored powders) on him. 

Legends and Mythology
In some parts of India, specially in Bengal and Orissa, Holi Purnima is also celebrated as the birthday of Shri Chaitanya Mahaprabhu (A.D. 1486-1533). However, the literal meaning of the word 'Holi' is 'burning'. There are various legends to explain the meaning of this word, most prominent of all is the legend associated with demon king Hiranyakashyap. 

Hiranyakashyap wanted everybody in his kingdom to worship only him but to his great disappointment, his son, Prahlad became an ardent devotee of Lord Naarayana. Hiaranyakashyap commanded his sister, Holika to enter a blazing fire with Prahlad in her lap. Holika had a boon whereby she could enter fire without any damage on herself. However, she was not aware that the boon worked only when she enters the fire alone. As a result she paid a price for her sinister desires, while Prahlad was saved by the grace of the god for his extreme devotion. The festival, therefore, celebrates the victory of good over evil and also the triumph of devotion. 

Legend of Lord Krishna is also associated with play with colors as the Lord started the tradition of play with colours by applying colour on his beloved Radha and other gopis. Gradually, the play gained popularity with the people and became a tradition.

There are also a few other legends associated with the festival - like the legend of Shiva and Kaamadeva and those of Ogress Dhundhi and Pootana. All depict triumph of good over evil - lending a philosophy to the festival.

Shayari for Best Friend in Hindi

Dosti Ki Dor

Koshish Koi Aapse Na Ruthe,
Zindagi Me Apno Ka Sath Na Chhute,
Dosti Koi Bhi Ho Use Aisa Nibhao,
Ki Us Dosti Ki Dor Zindagi Bhar Na Toote.
कोशिश करो कोई आपसे ना रूठे,
जिंदगी में अपनों का साथ ना छूटे,
दोस्ती कोई भी हो उसे ऐसा निभाओ,
कि उस दोस्ती की डोर जिंदगी भर ना टूटे।
Dosti Ki Dor - Best Friend Shayari
Aap Jaisa Dost
Aansu Bahe To Ehsaas Hota Hai,
Dosti Ke Bina Jeevan Kitna Udaas Rahta Hai,
Umr Ho Aapki Chand Jitni Lambi,
Aap Jaisa Dost Kahan Har Kisi Ke Pas Hota Hai.
आंसू बहें तो एहसास होता है,
दोस्ती के बिना जीवन कितना उदास होता है,
उम्र हो आपकी चाँद जितनी लंबी,
आप जैसा दोस्त कहाँ हर किसी के पास होता है।
Dosti Shayari - Aap Jaisa Dost
Marna Akele Hi Hai
Ek Chahat Hoti Hai Dosto Ke Saath Jeene Ki Janab,
Warna Pata To Hume Bhi Hai Ki Marna Akele Hi Hai.
एक चाहत होती है दोस्तों के साथ जीने की जनाब,
वरना पता तो हमें भी है की मरना अकेले ही है।
dosti shayari

Aap Ki Taraha Anmol Nahi Hota

Muskurahat Ka Koi Mol Nahi Hota,
Kuch Riston Ka Koi Tol Nahi Hota,
Log To Mil Jate Hai Har Modh Par ,
Har Koi Aap Ki Taraha Anmol Nahi Hota.
मुस्कराहट का कोई मोल नहीं होता,
कुछ रिश्तों का कोई तोल नहीं होता,
लोग तो मिल जाते है हर मोड़ पर,
हर कोई आप की तरह अनमोल नहीं होता।
dosti shayari
Muskurana Hi Khushi Nahi Hoti,
Umr Bitana Hi Zindagi Nahi Hoti,
Dost Ko Roz Yaad Karna Padta Hai,
Dosti Kar Lena Hi Dosti Nahi Hoti.
मुस्कुराना ही ख़ुशी नहीं होती,
उम्र बिताना ही ज़िन्दगी नहीं होती,
दोस्त को रोज याद करना पड़ता है,
दोस्ती कर लेना हीं दोस्ती नहीं होती।

Dosti Khareed Lenge

Gham Ko Bechkar Khushi Khareed Lenge,
Khwabon Ko bechkar Zindagi Khareed Lenge,
Hoga Imthaan To Dekhegi Duniya,
Khud Ko BechKar Aapki Dosti Khareed Lenge.
गम को बेचकर खुशी खरीद लेंगे,
ख्वाबो को बेचकर जिन्दगी खरीद लेंगे ,
होगा इम्तहान तो देखेगी दुनिया,
खुद को बेचकर आपकी दोस्ती खरीद लेंगे।
dosti

Dosti Shayari SMS



Dost Ki Jarurat Har Pal

Geet Ki Jarurat Mehfil Me Hoti Hai,
Pyar Ki Jarurat Har Dil Me Hoti Hai,
Bina Dost Ke Adhuri Hai Zindagi,
Kyunki Dost Ki Jarurat Har Pal Me Hoti Hai.
गीत की जरुरत महफ़िल में होती है,
प्यार की जरुरत हर दिल में होती है,
बिना दोस्त के अधूरी है जिंदगी,
क्योंकि दोस्त की जरुरत हर पल में होती है।

Dosti Ka Shukriya

Yaad Dosti Shayari
Dosti Ka Shukriya Kuch Ish Trah Ada Karu,
Aap Bhul Bhi Jao To Main Yaad Karu,
Dosti Ne Bas Itna Sikhaya Hai Muze
Ke Khud Se Pahle Apke Liye Dua Karu.
दोस्ती का शुक्रिया कुछ इस तरह अदा करूँ,
आप भूल भी जाओ तो मैं हर पल याद करूँ,
खुदा ने बस इतना सिखाया हैं मुझे,
कि खुद से पहले आपके लिए दुआ करूँ।

Dosti Dard Nahi


Dosti Dard Nahi Khushiyon Ki Saugat Hai,
Kisi Apne Ka Zindagi Bhar Ka Saath Hai,
Ye To Dilo Ka Wo Khoobsurat Ehsaas Hai,
Jiske Dum Se Roshan Ye Saari Kaaynat Hai.
दोस्ती दर्द नहीं खुशियों कि सौगात है,
किसी अपने का ज़िन्दगी भर का साथ है,
ये दिलो का वो खूबसूरत एहसास है,
जिसके दम से रोशन ये सारी कायनात है।

Friendship Shayari SMS

Dost Aap Jaise


Diye To Aandhi Me Bhi Jala Karte Hain,
Gulaab To Kaanto Me Hi Khila Karte Hain,
Khush-Naseeb Bahut Hoti Hai Woh Shaam,
Jisme Dost Aap Jaise Mila Karte Hain.
दिए तो आंधी में भी जला करते हैं,
गुलाब तो काँटों में ही खिला करते हैं,
खुशनसीब बहुत होती है वो शाम,
जिसमे दोस्त आप जैसे मिला करते हैं।

AAJ KE DAUR MEIN

Aaj ke daur mein aye dost yeh manzar kyun hai?
Zakhm har sar pe, har ek haath mein patthar kyun hai?

AAJ KHUDA SE MULAKAT

Aaj khuda se mulakat huyi, thodi hi sahi par baat hui, maine aapke baare mein pucha ye insaan kaisa hai, khuda bola sambhaal ke rakhna bilkul mere jaisa hai.

AANKHON MEIN BASNE WAALA

Aankhon mein basne waala pyaara sa ishara ho. Andheri raat mein chamakta sitara ho. Chhu bhi nahi sakti udaasi kabhi usko. Jiska koi dost itna pyaara ho…

AANKHON SE DUR HO

Aankhon se dur ho par dil se nahin,
dil mein zarur ho par milte nahin
bas yehi gila hai tumse dost
tum milte zarur ho par dil se nahin.

Friendship Shayari in Hindi

1) Dost Itna Pyara


Aasmaan Se Tod Kar Sitara Diya Hai,
Aalam-e-Tanhai Mein Ek Sharara Diya Hai,
Meri Kismat Bhi Naaz Karti Hai Mujhpe,
Khuda Ne Dost Hi Itna Pyara Diya Hai.

आसमान से तोड़ कर सितारा दिया है,
आलम-ए-तन्हाई में एक शरारा दिया है,
मेरी किस्मत भी नाज़ करती है मुझपे,
खुदा ने दोस्त ही इतना प्यारा दिया है।

2) Dost Khuda Hota Hai


Dosti Mein Dost, Dost Ka Khuda Hota Hai,
Mahsoos Tab Hota Hai Jab Wo Juda Hota Hai.

दोस्ती में दोस्त, दोस्त का ख़ुदा होता है,
महसूस तब होता है जब वो जुदा होता है।
3) Na Tum Door Jaana Na Hum Door Jayenge,
Apne-Apne Hisse Ki Dosti Ko Nibhayenge.

ना तुम दूर जाना ना हम दूर जायेंगे,
अपने-अपने हिस्से की दोस्ती निभाएंगे।

4) Yaad Karoge Is Pagal Dost Ko


Hum Jab Bhi Aapki Duniya Se Jayenge,
Itni Khushiyan Aur Apnapan De Jayenge,
Ke Jab Bhi Yaad Karoge Is Pagal Dost Ko,
Hansti Aankhon Se Aansoo Nikal Aayenge.

हम जब भी आपकी दुनिया से जायेंगे,
इतनी खुशियाँ और अपनापन दे जायेंगे,
कि जब भी याद करोगे इस पागल दोस्त को,
हँसती आँखों से आँसू निकल आयेंगे।
5) Dosti Naam Hai Sukh-Dukh Ki Kahani Ka,
Dosti Raaz Hai Sadaa Hi Muskurane Ka,
Ye Koi Pal Bhar Ki Pehchan Nahi Hai,
Dosti Vaada Hai Umr Bhar Saath Nibhane Ka.

दोस्ती नाम है सुख-दुःख की कहानी का,
दोस्ती राज है सदा ही मुस्कुराने का,
ये कोई पल भर की जान-पहचान नहीं है,
दोस्ती वादा है उम्र भर साथ निभाने का।
6) Aadatein Alag Hain Meri Duniya Walo Se,
Dost Kam Rakhta Hoon Par LaJawab Rakhta Hoon.

आदतें अलग हैं मेरी दुनिया वालों से,
दोस्त कम रखता हूँ पर लाजवाब रखता हूँ।
7) Sachche Dost Kabhi Girne Nahi Dete,
Na Kisi Ki Najron Se Na Kisi Ke Kadmon Mein.

सच्चे दोस्त हमें कभी गिरने नहीं देते,
न किसी कि नजरों मे न किसी के कदमों में।

What’s the Difference Between a Virus, a Trojan, a Worm, and a Rootkit?

Pretty much everyone has heard of the terms spyware, malware, virus, trojan horse, computer worm, rootkit, etc, etc, but do you really know the difference between each of them? I was trying to explain the difference to someone and got a little confused myself. With so many types of threats out there, it’s hard to keep track of all the terms.
In this article, I’ll go through some of the major ones we hear all the time and tell you the differences. Before we get started, though, let’s get two other terms out of the way first: spyware and malware. What’s the difference between spyware and malware?
Spyware, in its original meaning, basically meant a program that was installed onto a system either without your permission or clandestinely bundled with a legit program that collected personal information about you and then sent it off to a remote machine. However, spyware eventually went beyond just computer monitoring and the term malware started to be used interchangeably.
Malware is basically any type of malicious software intended to do harm to the computer, gather information, gain access to sensitive data, etc. Malware includes viruses, trojans, root kits, worms, keyloggers, spyware, adware, and pretty much anything else you can think of. Now let’s talk about the difference between a virus, trojan, worm and rootkit.

Viruses

Virus
Malware threats
So what is a virus? It’s basically a program that can spread itself (replicate) from one computer to another. The same is true for a worm also, but the difference is that a virus usually has to inject itself into an executable file in order to run. When the infected executable is run, it can then spread to other executables. In order for a virus to spread, it normally requires some kind of user intervention.
If you have ever downloaded an attachment from your email and it ended up infecting your system, that would be considered a virus because it requires the user to actually open the file. There are lots of ways viruses cleverly insert themselves into executable files.
One type of virus, called a cavity virus, can insert itself into used sections of an executable file, thereby not damaging the file nor increasing the size of the file.
The most common type of virus nowadays is the Macro Virus. These are sadly viruses that inject Microsoft products like Word, Excel, Powerpoint, Outlook, etc. Since Office is so popular and it’s on the Mac too, it’s obviously the smartest way to spread a virus if that’s what you’re looking to accomplish.

Trojan Horse

Trojan horse
A Trojan Horse is a malware program that does not try to replicate itself, but instead get installed onto a users system by pretending to be a legitimate software program. The name obviously comes from Greek mythology since the software presents itself as harmless and thereby tricks the user into installing it on their computer.
Once a Trojan Horse gets installed on a user’s computer, it doesn’t try to inject itself into a file like a virus, but instead allows the hacker to remotely control the computer. One of the most common uses of a computer infected with a Trojan Horse is making it part of a botnet.
A botnet is basically a bunch of machines connected over the Internet that can then be used to send spam or perform certain tasks like Denial-of-service attacks, which take down websites.
When I was in college back in 1998, one crazy popular Trojan Horse at the time was Netbus. In our dorms, we used to install it on each other’s computers and play all kinds of pranks on each other. Unfortunately, most Trojan Horses will crash computers, steal financial data, log keystrokes, watch your screen with your permissions and lots more devious stuff.

Computer Worm

Computer worm
A computer worm is just like a virus, except that it can self-replicate. Not only can it replicate on it’s own without needing to a host file to inject itself into, it normally also uses the network to spread itself. This means that a worm can do serious damage to a network as a whole, whereas a virus usually targets files on the computer that is infected.
All worms come with or without a payload. Without a payload, the worm will just replicate itself across the network and eventually slow the network down because of the increase in traffic caused by the worm.
A worm with a payload will replicate and try to perform some other task like deleting files, sending emails, or installing a backdoor. A backdoor is just a way for to bypass authentication and get remote access to the computer.
Worms spread primarily because of security vulnerabilities in the operation system. That’s why it’s important to install the latest security updates for your OS.

Rootkit

Rootkit
A rootkit is malware that is extremely hard to detect and that actively tries to hide itself from the user, the OS and any anti-virus/anti-malware programs. The software can get installed in any number of ways including exploiting a vulnerability in the OS or by gaining administrator access to the computer.
After the program has been installed and as long as it has full administrator privileges, the program will then go about hiding itself and altering the currently installed OS and software to prevent detection in the future. Rootkits are what you hear will turn off your anti-virus or install into the OS kernel, whereby your only option sometimes is to reinstall the entire operating system.
Rootkits can also come with payloads whereby they hide other programs like viruses and key loggers. To get rid of a rootkit without reinstalling the OS requires users to boot to an alternative operating system first and then try to clean the rootkit or at least copy off critical data.

Friday, March 22, 2013

7 Signs You've Got Malware


Does your computer have a malware problem? Here are seven warning signs that your PC's security has been compromised.

7 Signs You
Computers are complicated enough that they don't always do precisely what we expect. Sometimes an unexpected behavior is just a fluke; other times, it's an outward and visible sign of an inward and terrible malware infestation. If you notice any of these security warning signs, your system may well be compromised.
1. Popup ads appear even when no browser is open. While not as common as they used to be, adware programs bombard their victims with advertisements. Sometimes they're ads for legitimate products, other times they contain links to malicious websites, sites that will attempt to drop more malware on your PC.
2. Browser navigation gets redirected. Not every site redirect is malicious, but if you find that trying to reach Google takes you to an unfamiliar search site, you've almost certainly got a problem. Sometimes the redirection is more subtle. For example, a banking Trojan might divert your browser to a fraudulent site that looks just like your bank's real site. In that case your only clue is the unfamiliar URL in the Address bar.
3. A security program you never installed pops up scary warnings. Creating and distributing fake antivirus programs is a lucrative business. The perpetrators use drive-by downloads or other sneaky techniques to get the fake antivirus onto your system, then display scary warnings about made-up threats. Naturally you have to register a payment before the fraudulent tool will "fix" the problem. And of course scanning for malware with the fake AV is super-fast, since it's not actually doing anything.
4. Posts you didn't write appear on your social media pages. Malware focused on Facebook and other social media sites propagates by generating fake posts. Typically these posts include an inflammatory statement of some kind, like "OMG were you really that drunk? Look at this picture!" Anyone who falls for the fake and clicks the link will become the next victim.
5. A program holds your PC for ransom. Some malware programs literally hold your PC or data for ransom. Overt ransomware threats may encrypt all your pictures and documents and demand that you pay to get them back. Others try to obscure what they're doing. For example, they may display a warning supposedly from the FBI stating that your computer was used to send spam and demanding that you pay a fine before you're allowed to use it again. Of course, even if you do pay, you may not get your system back.
6. Suddenly you can't use common system tools. A smart user, suspecting the presence of malware, might launch Task Manager to investigate, or check settings using Registry Editor. If you suddenly find that trying to use these or other system tools triggers a message saying your Administrator has disabled them, it may well be an attempt at self-defense by malware on your system.
7. Everything seems perfectly normal. That's right. Some types of malware do their best to hide all activity, leaving no visible traces. Even when you don't notice anything unusual, it's possible that a 'bot on your system may be quietly awaiting instruction from its command and control system, or a Remote Access Trojan may be harvesting your personal information.
If you think that malware has taken up residence in your PC, install a powerful antivirus utility or security suite immediately. Already got one? Then apparently the malware got past its protection. Make sure your antivirus is fully up to date, and run a full scan. Also get a second opinion from a free cleanup-only antivirus like Malwarebytes Anti-Malware 1.70 or Comodo Cleaning Essentials 6. You definitely want to get that nasty, malicious program out of your system as soon as possible, before it invites "friends" to make your security problem even worse.

Is Internet Addiction Real ?

Internet addiction. Phone addiction. Technology addiction. Whatever you call it, a lot of parents are expressing worries that their children are addicted to their devices.
Is the behavior that parents are concerned about really addiction?
What parents are alarmed about is usually two things: the sheer amount of time their kids spend on screens, and their kids’ resistance to cutting back on that screen time. Getting them to put away their devices and come to dinner, engage in other activities, go outside or do their homework (without also checking social media and streaming TV shows) seems to be an increasingly uphill battle.
Kids sometimes use the word “addiction” to describe their own behavior, too. In a 2016 survey by Common Sense Media, half of teenagers said they “feel” they’re addicted to their mobile device. Three quarters of them said they felt compelled to immediately respond to texts, social media posts and other notifications.
“More often than not, when people say that someone is addicted to the internet or addicted to their phone, they’re using it colloquially,” notes Dr. David Anderson, a clinical psychologist and director of the Behavior Disorders Center at the Child Mind Institute. By calling it addiction, parents are often communicating their concern that so much screen time is unhealthy, as well as their feeling that they’re powerless to stop it.

Are kids addicted?

While the comparison to substance abuse is tempting, because devices are stimulating to the same reward centers of the brain, experts point out crucial differences.
“Addiction doesn’t really capture the behavior we’re seeing,” says Dr. Matthew Cruger, a neuropsychologist and the director of the Learning and Development Center at the Child Mind Insititute. “With addiction you have a chemical that changes the way we respond, that leads us to be reliant on it for our level of functioning. That’s not what ‘s happening here. We don’t develop higher levels of tolerance. We don’t need more and more screen time in order to be able to function.”
There is, technically, no such thing as internet or phone addiction. Some in the psychiatric community have proposed  a new disorder called internet gaming disorder, to recognize unhealthy patterns of game-playing. But to rise to the level of a disorder, Dr. Anderson notes, the behavior would would be very extreme, and seriously impairing to a child’s life.
That would mean an amount of screen time that’s not only more than parents feel comfortable with, but that crowds out other age-appropriate activities, like socializing, sports, school work — even hygiene and sleep. “We would be looking at adolescents who are pushing everything else out of their lives,” explains Dr. Anderson.  “They are not having friendships, not engaging socially — at least offline — and they may be failing in school.”
Some parents may see addict-like behavior, Dr. Anderson adds, when kids get angry if they’re required to stop, insist on more and more screen time, spend a lot of offline time thinking about how and when they will get back online. But these kind of behaviors can be prompted by many pleasurable activities, and don’t constitute an addiction. “More often than not, what I see are parents who are concerned about their teenager’s behavior around screens use the word addiction when it doesn’t really fit.”
One reason to be cautious about using the term, he added, “is that we have a tendency right now within the zeitgeist to pathologize normal adolescent behavior.”

What are kids doing online?

The amount of time teenagers typically spend on phones and other devices can be misleading as a measure of whether they are unhealthily engaged. That’s because many of the things kids do on those devices are age-appropriate activities that in the past have been done offline: socializing with peers, exploring personal interests, shopping, listening to music, doing schoolwork, watching movies or TV.
Texting and use of social media sites, for instance, have become important channels for adolescents connecting to others and being validated. Role-playing games allow kids to interact not only with friends, but to people around the world. A 2016 report by Common Sense Media concluded: “What looks like excessive use and distraction is actually a reflection of new ways of maintaining peer relations and engaging in communities that are relevant to them.”

Is it masking a mental health disorder?

When a child seems unhealthily focused on video games, to the point of social isolation, the behavior may be, rather than addiction, a product of other mental health problems.
Dr. Anderson reports that he finds himself saying to parents, “We understand your hypothesis that your kid is addicted to games, but it may be that he is socially anxious. It may be that he is depressed. It may be that he has a learning disorder.”
Dr. Anderson recalls treating a 16-year-old whose mother was adamant that he was addicted to video games. “I was doing in-home sessions with him, and it was, indeed, very hard to get him off playing Call of Duty to even have the session. But what I realized very quickly was that he had both ADHD and depression, and he had been failing school for as long as he could remember.”
Call of Duty was actually a positive in his life, Dr. Anderson said, “the only thing that provided solace, a sense of belonging. He had joined a crew of people who play Call of Duty and post YouTube videos of them playing.”
Once his ADHD and depression got appropriate treatment, he was able to cut back on Call of Duty, and make offline friends. “He joined the football team at school. His grades improved,” said Dr. Anderson. “In that sense, it was treatment of ‘internet addiction’ through treatment of the actual underlying conditions.”

Problematic use

While experts say that parents should remain skeptical of the notion of addiction, they also argue that parents should be alert for potential negative fallout from screen use. Apps and games are designed to keep us engaged as much as possible, and it can be hard for children to exercise self-control when their impulse is to keep scrolling.
There is ample evidence that intense social media use is correlated with an increase in anxiety and depression as teenagers, especially girls, compare themselves unfavorably to their peers and worry about missing out.
Research shows that excessive gaming — spending two-thirds or more of free time — is correlated with negative mental health outcomes, including higher incidence of anxiety, depression and substance use.
There is evidence that multitasking — using social media, texting, watching tv while doing homework — undermines cognitive functioning and decreases learning.
And, of course, experts note constant attention to devices comes at the cost of other activities that are ultimately more valuable, and developmentally important.

Superficial engagement

“Our brains are hardwired to like things that are novel and stimulating, and the phone captures that,” notes Dr. Cruger. “It’s easier to engage in constantly checking your phone or playing a game than tasks that require more mental effort, though those are ultimately more rewarding for a lot of people.”
Dr. Cruger sees an anaology to gambling in that checking devices is only intermittently reinforcing. “People spend a lot of time looking briefly at things, not diving down, hoping it’s going to be rewarding, though often it’s not.”
Why would you pick up a book if you’re stimulated by Instagram or Candy Crush, Dr. Cruger asks. “You still retain the capacity to apply more mental effort to things but the opportunity is lost when you’re constantly superficially engaged.”
“There are absolutely alarms to be sounded,” concludes Dr. Anderson, “but the vast majority of kids are engaging in screen-related behaviors that may not be
either pathological or damaging.”

Milestones in Digital Storage

7 of the Most Important Milestones in Data Storage

Cloud storage services, like Dropbox, are but the latest in a long line of incremental developments in data storage throughout time. From the early days of punch cards, how we store, read-write, and transfer data has changed beyond all recognition to only 100 years ago.
What the future of data storage will entail is anyone's guess but there are certainly some interesting proposals.
In the following article, we'll explore what is meant by terms like "Cloud Storage," how big one Terabyte is, and highlight some of the major milestones in data storage history.
We will also try to put a TB into perspective by estimating how many of each milestone would be required to provide the same amount of data storage (where applicable).

What are some historical data storage achievements throughout history?

Here are some of the major milestones in data storage throughout time. You won't be surprised to hear that this is far from exhaustive.

1. Punch cards and tape helped kick the whole thing off

data storage punch cards
Mid-20th Century punch card. Source: Pete Birkinshaw/Wikimedia Commons
Punch cards and tape are one of the very first "data" storage methods in computer history. Forms of this technology have been in use since the early beginnings of the Industrial Revolution and were commonly employed in the textile industry.
They were originally used for controlling mechanized looms but were adopted in the 20th Century for use in early computers. For computers, punch tape and cards could be used as a basic method of data input as well as data output.
Each row on the cards and/or tape represented a single character. Punch cards and tape were very common throughout much of the 20th Century until about the mid-1970s.
Interestingly enough, they were also a vital component of Allied Forces' Bletchley Park project during the Second World War for storing decrypted German messages.
Punch cards, on average, could "store" 80 characters each. That's about 80 bytes per card or 1.26 x 1010 cards (give or take).
They are, of course, today widely considered obsolete.

2. IBM’s Winchester hard-drive disk architecture was a "big bang" moment

The IBM 3340, code-named "Winchester," is widely considered to be something of a "Big Bang" moment in data storage. It was first introduced in the early-1970s and used removable data modules with each including a head and arm assembly.
"Winchester" had an access time of 25 milliseconds and data transfer rates of 885 kB/s. It also came in two sizes including a 35-megabyte capacity version and 70-megabyte version.
To get 1 TB of storage you would need 1,000,000 megabytes, so with the larger 70-megabyte storage, you'd need 14,286 "Winchester" units.
It would prove highly successful and was finally withdrawn in the mid-1980s. While "Winchester" was the product of earlier work on hard-drives (like RAMAC), many in the industry consider this a watershed moment in data storage development.

3. Magnetic Tape and Cassettes changed everything

data storage cassette
Source: Pexels
The advent of Magnetic Tape was revolutionary in the early-1950s. One of the first was called UNISERVO, which was the main I/O device for the UNIVAC 1 computer and the first commercially sold computer.
UNISERVO had a transfer rate of 7,200 characters per second and data was stored in 365 meters long tape contained in a metal case.
This technology would eventually mature into one of the most iconic data storage systems of all time - compact cassettes. These would become incredibly popular storage devices and were very common between the 1970s and 1990s.
They had many applications from computer storage to the music and gaming industries.
To get 1 TB storage using cassette tapes you'd need (based on C64 format and 2MB storage) around 500,000 cassettes.  The calculation here is thanks to BuffaloX on ubuntuforums.

4. The Floppy Disk was another "watershed moment"

data storage floppy disk
Source: Pexels
The development of the Floppy Disk was a huge moment in data storage. It almost single-handedly drove the consumption for the Personal Computing (PC) industry. This, in turn, pushed manufacturers to develop ever bigger and better hard drives.

PCs also indirectly promoted the development of network-attached storage that would eventually lead to things like NAS, SAN, and RAID (not to mention the internet).
This technology was developed by IBM and came into common use around the mid-1970s. It proved so successful that they were still a common sight well into the 1990s.
The first versions were 8-inches (203 mm) in size and had about 80 kB of data storage capacity. The later versions of the Floppy Disks were reduced in size to 5.25-inch (133 mm) and 3.5-inch (90 mm) formats and able to increase storage to over a MB a piece.
Using later formats with about 1 MB of storage, you'd need 1,000,000 floppy disks for 1 TB.

5. Fibre Channel, SAS, and SATA changed everything

data storage fibre channel
Fibre Channel director with SFP+ module. Source: Scottkipp/Wikimedia Commons
Fibre Channel, SAS, and SATA were other revolutionary developments in data storage and transfer. Fibre Channel, in particular, evolved from the development of SCSI interfaces that developed into serial links allowing for better data transfer across the industry.
According to sites like Wikipedia, Fibre Channels are "a high-speed data transfer protocol (commonly running at 1, 2, 4, 8, 16, 32, and 128 gigabits per second rates) providing in-order, lossless delivery of raw block data, primarily used to connect computer data storage to servers."
Today it is widely used in storage area networks (SAN) and other commercial data centers.
To transfer 1 TB of data using Fibre Channel, it would take (at 128 GB/s) about 7.8 seconds.

6. Solid-State Drives are all the rage

Solid-State Drives, or SSD, literally changed the data storage industry forever. By the mid-2000s companies like SanDisk, Samsung, and etc. had developed market flash SSDs that were drop-in replacements for older hard-drives.
SSDs were faster and smaller than their contemporaries. They are the de facto standard today for many portable devices and computers. Compared to older hard-drives, SSDs provide better storage capacity, better performance, and they are more energy-efficient and are more appropriate for miniaturization.
Many devices nowadays have enormous storage capacities. Sizes like 1 TB + a piece are becoming commonplace today.

7. Cloud Storage and the future

data storage dropbox
Source: Dropbox
Cloud Storage (more on this later) has been one of the most significant developments in data storage in computing history. By changing traditional thinking of storing data locally, it is taking the data storage industry by storm.
It is actually a lot older than you might think. Some early versions were developed in the early 1980s, by Compuserve, and may even have its origin in the 1960s with tech like ARPANET.
Hosting companies, like Dropbox, have cashed in on this development and today have millions of users the world over.
Tech experts are confident that it will become one of, if not the main method of data storage in the future.

What is Cloud Storage?

According to Techopedia, "cloud storage is a cloud computing model in which data is stored on remote servers accessed from the internet or "cloud." It is maintained, operated, and managed by a cloud storage service provider on storage servers that are built on virtualization techniques. Cloud storage is also known as utility storage – a term subject to differentiation based on actual implementation and service delivery."
Storage of data usually takes the form of physical storage over multiple servers which are often in multiple locations around the world. Access to this form of storage is usually owned and managed by a hosting company (like Dropbox).
These providers are responsible for maintaining and running said servers. They are also responsible for access to and security of clients' data. Users effectively rent some of the hosting companies’ data storage capacity and require some form of internet access and application programming interface to access, store, and retrieve their data.

How much is 1 TB?

How much is 1 TB? Basically a lot.
1 TB of data is 1,000,000,000,000 bytes or 1012 bytes or 1000 gigabytes. It is, in this sense, a large multiple of the basic unit "byte" used for quantifying digital information.
Its prefix, Tera, represents the 4th power of 1000 and means 10 to the power of 12 in the International System of Units. It is, therefore 1 Trillion bytes.
To put that into perspective, it would be about 8 smartphones each with a 128 GB capacity.
That amount of memory would be enough to store (courtesy of Dropbox):
  • 250,000 photos taken with a 12MP camera;
  • 250 films or 500 hours of HD video; or
  • 6.5 million document pages, commonly stored as Office files, PDFs and presentations. It’s also equal to 1,300 physical filing cabinets of paper!
  • One of the first Terabyte drives to ever be produced was by Hitachi in 2007.

ಆರ್ಯ ಮತ್ತು ದ್ರಾವಿಡ ನಡುವಿನ ವ್ಯತ್ಯಾಸವೇನು?

  ಮೊದಲಿಗೆ ಈ ಪದಗಳ ಪರಿಚಯ ನೋಡೋಣ. ಆರ್ಯ  ಅನ್ನೋದು ಉತ್ತಮ/ದೊಡ್ಡವರು ಎಂಬ ಅರ್ಥ ನೀಡುತ್ತದೆ  ಅಷ್ಟೇ.  ಉತ್ತಮ ಕುಲದಲ್ಲಿ ಹುಟ್ಟಿದವನು, ಯಜಮಾನ, ಹಿಡಿದ ಕೆಲಸವನ್ನು ಬಿಡ...