Updates from February, 2010 Toggle Comment Threads | Keyboard Shortcuts

  • Harshad Joshi 9:03 am on February 25, 2010 Permalink | Reply  

    Tendulkar! 

    Yesterday was a magical day..!

    The first man to reach 200 in ODI #cricket history..crackers bursting..!! Sachin Tendulkar made history..!! #india

    I is speechless and my keyboard is typeless..! 😉

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 9:28 am on February 17, 2010 Permalink | Reply  

    13/02/2010 – Black Saturday in Pune 

    bird flew 

    leaves shuffled 
    settled down..

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 10:49 am on February 16, 2010 Permalink | Reply
    Tags:   

    हायकू 

    झाडीमागचा हिरवाकंच पोपट,
    लालचुटुक चोच
    जणू विड्याने रंगलेले ओठ..!

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 10:36 am on February 8, 2010 Permalink | Reply  

    Who robbed my name? 

    It was mid 2004 when I got a gmail invite from a close friend. Like all good things, I wanted to register my gmail id as 'harshadjoshi', but sadely the name was taken already. I said in my mind, WTF is this guy taking away my name?? Arrrgh…

    Almost 6 years later..ie today.

    I got a google alert regarding 'Harshad Joshi' in which I got following information.

    1. The email id – harshadjoshi@gmail.com belongs to an IIM, Calcutta alumni.
    2. That guy got out of IIMC in 1978, more then 5 years before I was born.
    3. His picture and other details – http://picasaweb.google.com/maharishikedia/YearBook?fgl=true&pli=1#5420478777616710226

    All this information is courtesy of Google..withing few clicks so much information was availalable which was otherwise impossible..

    I wonder if someone can use it for spying on people too..?

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 7:18 am on February 6, 2010 Permalink | Reply  

    Nine words that a woman uses to terrify men 

    These are the nine words that a Woman would use often and the inherent meaning of all of these.

    1. Fine : This is the word women use to end an argument when they are right and you need to shut up

    2. Five Minutes : If she is getting dressed, this means a half an hour. Five minutes is only five minutes if you have just been given five more minutes to watch the game before helping around the house.

    3. Nothing : This is the calm before the storm. This means something, and you should be on your toes. Arguments that begin with nothing usually end in fine.

    4. Go Ahead : This is a dare, not permission. Don’t Do It!

    5. Loud Sigh : This is actually a word, but is a non-verbal statement often misunderstood by men. A loud sigh means she thinks you are an idiot and wonders why she is wasting her time standing here and arguing with you about nothing. (Refer back to #3 for the meaning of nothing.)

    6. That’s Okay : This is one of the most dangerous statements a women can make to a man.. That’s okay means she wants to think long and hard before deciding how and when you will pay for your mistake.

    7. Thanks : A woman is thanking you, do not question, or Faint. Just say you’re welcome.

    8. Whatever : Is a women’s way of saying Get Lost you Idiot!

    9. Don’t worry about it, I got it: Another dangerous statement, meaning this is something that a woman has told a man to do several times, but is now doing it herself. This will later result in a man asking ‘What’s wrong?’ For the woman’s response refer to #3.

    Stolen from – I dont know, use Google.

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 6:00 am on February 5, 2010 Permalink | Reply
    Tags: Nokia, Symbian   

    Hello World using Python on Symbian OS 

    # import the app user interface framework module
    import appuifw
     
    # create a single-field dialog (text input field): appuifw.query(label, type)
    data = appuifw.query(u"Type your name", "text")
     
    # create an information note: appuifw.note(label, type)
    appuifw.note(u"Hello "+str(data)+", welcome to Python World", "info")

    Bang…how many lines for a hello world? Baah, I doubt if people like symbian app development.

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 11:59 am on February 4, 2010 Permalink | Reply  

    Haiku 

    drizzle drys up
    parched birds fly
    a new tree waits…

    Dedicated to the outgoing SUN CEO – Jonathan Schwartz who resigned from his post today ie 4/2/10. Good Bye SUN. Welcome Oracle.

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 8:32 am on February 4, 2010 Permalink | Reply  

    Pseudo Random Number Generators 

    A Pseudo Random Number Generator (PRNG) provides applications with a stream of numbers which have certain important properties for system security:

    • It should be impossible for an outsider to predict the output of the random number generator even with knowledge of previous output.
    • The generated numbers should not have repeating patterns which means the PRNG should have a very long cycle length.

    A PRNG is normally just an algorithm where the same initial starting values will yield the same sequence of outputs. On a multiuser operating system there are many sources which allow seeding the PRNG with random data. The OpenBSD kernel uses the mouse interrupt timing, network data interrupt latency, inter-keypress timing and disk IO information to fill an entropy pool. Random numbers are available for kernel routines and are exported via devices to userland programs. So far random numbers are used in the following places:

    • Dynamic sin_port allocation in bind(2).
    • PIDs of processes.
    • IP datagram IDs.
    • RPC transaction IDs (XID).
    • NFS RPC transaction IDs (XID).
    • DNS Query-IDs.
    • Inode generation numbers, see getfh(2) and fsirand(8).
    • Timing perturbance in traceroute(8).
    • Stronger temporary names for mktemp(3) and mkstemp(3)
    • Randomness added to the TCP ISS value for protection against spoofing attacks.
    • random padding in IPsec esp_old packets.
    • To generate salts for the various password algorithms.
    • For generating fake S/Key challenges.
    • In isakmpd(8) to provide liveness proof of key exchanges.

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 12:15 pm on February 1, 2010 Permalink | Reply  

    Key for stress free life 

    Key for stress free life – leave everything and go away. Do nothing.

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 12:03 pm on February 1, 2010 Permalink | Reply  

    Kookaburra to make Afridi proof cricket balls 

    New Kookaburra ball specs : Hand stitched, 4 piece, Waxed & finished, steer hide cover with fine linen stitching, Afridi proof

    Concept – from Twitter. Use #afridibites 😉

    Posted via email from [root@localhost /root]#

     
  • Harshad Joshi 11:43 am on February 1, 2010 Permalink | Reply  

    Haiku 

    i say a word
    but this autumn
    makes it deep…

    Posted via email from [root@localhost /root]#

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel