Amazon Deals

Follow by Email

Followers

Your Ad Here

Health & Fitness Tips...............


"He who has health has hope, and he who has hope has everything."


1. Move More
Make it a daily challenge to find ways to move your body. Climb stairs if given a choice between that and escalators or elevators. Walk your dog; chase your kids; toss balls with friends, mow the lawn. Anything that moves your limbs is not only a fitness tool, it's a stress buster. Think 'move' in small increments of time. It doesn't have to be an hour in the gym or a 45-minute aerobic dance class or tai chi or kickboxing. But that's great when you're up to it. Meanwhile, move more.
2.
Cut Fat
Avoid the obvious such as fried foods, burgers and other fatty meats (i.e. pork, bacon, ham, salami, ribs and sausage). Dairy products such as cheese, cottage cheese, milk and cream should be eaten in low fat versions. Nuts and sandwich meats, mayonnaise, margarine, butter and sauces should be eaten in limited amounts. Most are available in lower fat versions such as substitute butter, fat free cheeses and mayonnaise. Thought for the day: Lean, mean, fat-burning machine…. Then be one!

3.
Quit Smoking
The jury is definitely in on this verdict. Ever since 1960 when the Surgeon General announced that smoking was harmful to your health, Americans have been reducing their use of tobacco products that kill. Just recently, we've seen a surge in smoking in adolescents and teens. Could it be the Hollywood influence? It seems the stars in every movie of late smoke cigarettes. Beware. Warn your children of the false romance or 'tough guy' stance of Hollywood smokers. Thought for the day: Give up just one cigarette…. the next one.
4
. Reduce Stress
Easier said than done, stress busters come in many forms. Some techniques recommended by experts are to think positive thoughts. Spend 30 minutes a day doing something you like. (i.e.,Soak in a hot tub; walk on the beach or in a park; read a good book; visit a friend; play with your dog; listen to soothing music; watch a funny movie. Get a massage, a facial or a haircut. Meditate. Count to ten before losing your temper or getting aggravated. Avoid difficult people when possible. Thought for the day: When seeing red, think pink clouds….then float on them.

5
. Protect Yourself from Pollution
If you can't live in a smog-free environment, at least avoid smoke-filled rooms, high traffic areas, breathing in highway fumes and exercising near busy thoroughfares. Exercise outside when the smog rating is low. Exercise indoors in air conditioning when air quality is good. Plant lots of shrubbery in your yard. It's a good pollution and dirt from the street deterrent. Thought for the day: 'Smoke gets in your eyes'…and your mouth, and your nose and your lungs as do pollutants….hum the tune daily.

6.
Wear Your Seat Belt
Statistics show that seat belts add to longevity and help alleviate potential injuries in car crashes. Thought for the day: Buckle down and buckle up.

7.
Floss Your Teeth
Recent studies make a direct connection between longevity and teeth flossing. Nobody knows exactly why. Perhaps it's because people who floss tend to be more health conscious than people who don't? Thought for the day: Floss and be your body's boss.

8.
Avoid Excessive Drinking
While recent studies show a glass of wine or one drink a day (two for men) can help protect against heart disease, more than that can cause other health problems such as liver and kidney disease and cancer. Thought for the day: A jug of wine should last a long time.


9.
Keep a Positive Mental Outlook
There's a definitive connection between living well and healthfully and having a cheerful outlook on life. Thought for the day: You can't be unhappy when you're smiling or singing.

10.
Choose Your Parents Well
The link between genetics and health is a powerful one. But just because one or both of your parents died young in ill health doesn't mean you cannot counteract the genetic pool handed you. Thought for the day: Follow these basic tips for healthy living and you can better control your own destiny

Daily Exercise Suggestions

"To climb steep hills requires slow pace at first."


Walk 10 Minutes a Day and Increase Your Fitness Level Old thinking was to work out in a sweat-filled gym for hours a day. No pain, no gain. New studies show that even short bouts of activity can increase your fitness level, especially if you're new at working out.

Park and Walk
Whenever you have an errand, park your car as far away as you can handle and walk to the store. At the mall, park at the farthest end and walk the length of the mall. Use every opportunity to walk. At the end of the day, it all adds up to better fitness.

Crunch in Bed
Before you even get out of bed in the morning, do 10 stomach crunches while lying flat on your mattress. Increase daily by one until you get up to 100. Think you'll never get there? Try it. You may eventually have to set your clock to wake up 15 minutes earlier, a small price to pay for a flatter stomach.

DRINK WATER ON EMPTY STOMACH -RESEARCH BY CHINESE & JAPANESE

It is popular in Japan today to drink water immediately after waking up every morning. Furthermore, scientific tests have proven its value. We publish below a description of use of water for our readers. For old and serious diseases as well as modern illnesses the water treatment had been found successful by a Japanese medical society as a 100% cure for the following diseases:
Headache, body ache, heart system, arthritis, fast heart beat, epilepsy, excess fatness, bronchitis asthma, TB, meningitis, kidney and urine diseases, vomiting, gastritis, diarrhea, piles, diabetes, constipation, all eye diseases, womb, cancer and menstrual disorders, ear nose and throat diseases.


METHOD OF TREATMENT

1. As you wake up in the morning before brushing teeth, drink 4 x 160ml glasses of water
2. Brush and clean the mouth but do not eat or drink anything for 45 minute
3. After 45 minutes you may eat and drink as normal.
4. After 15 minutes of breakfast, lunch and dinner do not eat or drink anything for 2 hours
5. Those who are old or sick and are unable to drink 4 glasses of water at the beginning may commence by taking little water and gradually increase it to 4 glasses per day.
6. The above method of treatment will cure diseases of the sick and others can enjoy a healthy life.

The following list gives the number of days of treatment required to cure/control/ reduce main diseases:
1. High Blood Pressure (30 days)
2. Gastric (10 days)
3. Diabetes (30 days)
4. Constipation (10 days)
5. Cancer (180 days)
6. TB (90 days)
7. Arthritis patients should follow the above treatment only for 3 days in the 1st week, and from 2nd week onwards – daily.
This treatment method has no side effects, however at the commencement of treatment you may have to urinate a few times.

It is better if we continue this and make this procedure as a routine work in our life. Drink Water and Stay healthy and Active.

This makes sense .. The Chinese and Japanese drink hot tea with their meals ..not cold water. Maybe it is time we adopt their drinking habit while eating!!! Nothing to lose, everything to gain...

For those who like to drink cold water, this article is applicable to you.
It is nice to have a cup of cold drink after a meal. However, the cold water will solidify the oily stuff that you have just consumed. It will slow down the digestion.

Once this "sludge" reacts with the acid, it will break down and be absorbed by the intestine faster than the solid food. It will line the intestine.
Very soon, this will turn into fats and lead to cancer. It is best to drink hot soup or warm water after a meal.

A serious note about heart attacks:
· Women should know that not every heart attack symptom is going to be the left arm hurting,
· Be aware of intense pain in the jaw line.
· You may never have the first chest pain during the course of a heart attack.
· Nausea and intense sweating are also common symptoms.
· 60% of people who have a heart attack while they are asleep do not wake up.
· Pain in the jaw can wake you from a sound sleep. Let's be careful and be aware. The more we know, the better chance we could survive...

A cardiologist says if everyone who gets this mail sends it to everyone they know, you can be sure that we'll save at least one life.


Please be a true friend and send this article to all your friends you care about

Sir Osman Ali Khan Bahadur Fateh Jung - The Hyderabad King


Sir Osman Ali Khan Bahadur Fateh Jung, GCSI, GBE, (April 6, 1886February 24, 1967) , styled His Exalted Highness the Nizam of Hyderabad, also named Fath Jang Nawab Mir Osman Ali Khan Asaf Jah VII, was the last Nizam (or ruler) of the Princely State of Hyderabad. He ruled Hyderabad between 1911 and 1948, until Hyderabad was invaded and annexed by India.

During his days as Nizam, he was reputed to be the richest man in the world, even featuring on the cover of TIME magazine, portrayed as such.[1] He had a fortune estimated at $2 billion. [2]

Although he was one of the richest men in the world along with his brother Nawab Sakawath Jung Bahadur, the Nizam led a very simple life. His lifestyle was frugal, bordering on the miserly, and many legends about his parsimony have become apocryphal in Hyderabad. He would , paradoxically, use the 185-carat Jacob Diamond as a paperweight.

He also built the magnificent Hyderabad House for his Delhi visits. This is now used for diplomatic meetings by the Government of India.

Official name

His Exalted Highness Rustam-i-Dauran, Arustu-i-Zaman, Wal Mamaluk, Asaf Jah VII, Muzaffar-ul-Mulk-Wal-Mumilak, Nizam-ul-Mulk, Nizam ud Daula Nawab Mir Sir Osman Ali Khan Bahadur,Sipah Saula, Fateh Jung, Knight Grand Commander of the Star of India, Knight of the Grand Cross of the Order of the British Empire, Honorable Lieutenant General in the Army, Faithful Ally of the British Government.

His Exalted Highness was the honorary Colonel of the 20 Deccan Horse. In 1918, Nawab Mir Osman Ali Khan was elevated by King George V from His Highness to His Exalted Highness. In a letter dated 24th January, 1918, the title Faithful Ally of the British Government was conferred on him.[3]

Early life and education

Osman Ali was born on April 6, 1886 at Purani Haveli in Hyderabad state, the second son of Mir Mahboob Ali Khan,Asaf Jah VI, by his first wife Amat-uz-Zahrunnisa Begum. The death of his elder brother in 1887 rendered Osman Ali the heir apparent of Hyderabad.

Great attention was paid to his education, and eminent scholars were engaged to teach Osman Ali English, Urdu and Persian. He was also tutored in Islamic studies by Hafiz Anwarullah Faruqi of the Jami'ah Nizamiyyah of Hyderabad.

Mir Osman Ali Khan was a great scholar and wrote poetry in Urdu and Persian.

Marriage

On April 14, 1906, Osman Ali married Dulhan Pasha Begum, daughter of Nawab Jahangir Jung, at Eden Bagh at the age 21. She was the first of his seven wives and 42 concubines, and the mother of two eldest of his sons Azam Jah and Moazzam Jah.

Their eldest son, Azam Jah, was married to Durru Shehvar, daughter of Abdul Mejid II (the last Ottoman Caliph and cousin and heir of the last Sultan of the Ottoman Empire). Moazzam Jah married Princess Niloufer, a princess of the Ottoman empire.

It has been suggested that through this dynastic marriage Osman Ali hoped to acquire the Caliphate for his descendants.

Reign

A cover story by TIME
A cover story by Anil

On February 22, 1937, Time magazine called the Nizam the Richest man in the world. Osman Ali acceded as Nizam of Hyderabad upon the death of his father in 1911. The state of Hyderabad was the largest of the princely states in pre-independence India. With an area of 86,000 square miles (223,000 km²), it was roughly the size of present-day France. Its ruler, was the highest-ranking prince in India, was one of only five princes entitled to a 21-gun salute, held the unique title of "Nizam" and was created "His Exalted Highness" and "Faithful Ally of the British Crown" after World War One, in gratitude for his enormous financial contribution to the British Empire's war effort.

Osman Ali was the absolute ruler of this principality. In some accounts, he is held to have been a benevolent ruler who patronized education, science and development. Indeed, compared to his predecessors, Osman Ali's 37-year rule witnessed progress: electricity, railways, roads and airways were developed, the Nizamsagar lake in Hyderabad city was excavated and some irrigation projects on the Tungabhadra river were undertaken.

In 1941, Mir Osman Ali Khan started his own bank called as Hyderabad State Bank(now State Bank of Hyderabad) as the state's central bank, which managed the Osmania sikka, the currency of the Hyderabad state. It was the only state which had its own currency during the British rule.

Nearly all the major public buildings in Hyderabad city, such as the Osmania General Hospital, Andhra Pradesh High Court, Asafiya Library now called as State Central Library, Town Hall now called as Assembly Hall, Jubilee Hall, Hyderabad Museum now called as State Museum and many other monuments were built during his reign. Up to 11% of the Nizam's budget was spent on education, Osmania University was founded, schools and colleges and even a "Department for Translation were set up. Primary education was made compulsory and provided free for the poor. However, the Nizam (as also his predecessors) have been criticised for largely ignoring the native languages of the land ruled by them, and according primacy to Urdu, a language popularly associated with Muslim culture in India, as well as a language of prestige.

Osman Ali donated generously to many worthy institutions in India and abroad: recipients of his largesse included educational institutions such as the Jamia Nizamia, the Darul Uloom Deoband and the Banaras Hindu University.

Hyderabad was the only state in British India where the ruler was allowed to print the currency notes. A 100 rupee note was introduced in 1918.

He also paid for an Royal Australian Navy vessel, N-class destroyer, HMAS Nizam (G38) in 1940.

Osman Ali lived at King Kothi Palace all his life, since the age of 13, this palace was bought from a nobleman. He did not move to Chowmahalla Palace even after accession.

Abdication

After Indian independence in 1947, the country was partitioned on communal lines and Pakistan was carved out as a Muslim nation. The princely states were left free to make whatever arrangement they wished with either India or Pakistan. The Nizam ruled over a cosmopolitan population of over 16 million people, and over lands extending to 82,698 sq.miles of homogeneous territory. These advantages persuaded the Nizam to attempt an independent existence, when the British withdrew from the sub-continent in 1947. He refused to join either India or Pakistan, preferring to form a separate kingdom within the British Commonwealth of nations.

The proposal for independent state was rejected unambiguously by the British government. The Nizam then resolved upon exploring the possibility of independence. Towards this end, he kept up open negotiations with the Government of India regarding the modalities of a future relationship while opening covert negotiations with Pakistan on a similar vein. He also concurrently encouraged the activities of the Razakars, a militant Muslim organization under the leadership of Qasim Razvi that vehemently opposed any union with the Government of India. The Razakars were active in violently intimidating the local Hindu population and pledged to maintain the Muslim supremacy in Deccan and Hyderabad State. At the same time, thousands of Muslims flooded into Hyderabad, refugees of Hindu violence[citation needed]. An attempt by some Hindu nationalists to assassinate the Nizam did not help either[citation needed]. The Nizam repeatedly cited the Razakars as evidence that the people of the state were opposed to any agreement with India. This was held by the Government of India to be untenable and disingenuous, and in any case were most eager for Hyderabad to effect a merger with India.

Meanwhile, many peasants of the Hyderabad state revolted against the Nizam under the leadership of Communist Party of India. The Telangana peasant armed struggle was successful in driving out local landlords called Zamindars, and distributing their land to the landless. However, Nizam was able to suppress the armed struggle. It was a dark period in Hyderabad history.

However, majority of his subjects were Hindus and his territory was surrounded on all sides by Indian territory. The resulting violence and exodus of people outside of Hyderabad state prompted the new Indian government to invade and annex Hyderabad by police action in 1948. The violence fomented by Indian police action greatly exceeded that of the Razakars, resulting in the deaths of tens of thousands. Although the Nizam then acceded to the Dominion of India, power simply slipped from his grasp. He received the ceremonial post of Rajpramukh in 1950, but resigned from this office when the states were re-organised in 1956. Hyderabad was then split and dismembered along linguistic lines.

Later life

Mir Osman Ali Khan, the last Nizam, died on Friday, February 24, 1967. It was the end of a princely era. His funeral procession was one of the largest in Indian history, a testimony to his popularity. His Exalted Highness had willed that he be buried in the Judi Mosque that faced his fabulous residence, that is, the King Kothi Palace is his final resting place.

Iris Portal, sister of the British politician Rab Butler, described him as "...as mad as a coot and his chief wife was raving," who "spent money like water."

Celebration Means........

Celebration means...

Four friends.

raining outside.

Four glasses of Tea.

Celebration means...

Hundred bucks of petrol.

A rusty old bike.

And an open road.

Celebration means...

A hostel Tea.

A hostel room.

12 a.m.

Celebration means...

3 old friends.

3 separate cities.

3 coffee mugs.

1 internet messenger.

Celebration means...

Rain on a hot tin roof.

Pakodas deep-frying.

Neighbours dropping in.

A party.

Celebration means...

You and mom.

A summer night.

A bottle of coconut oil.

A head massage.

You can spend

Hundreds on birthdays,

Thousands on festivals,

Lakhs on weddings,

but to celebrate

all you have to do is spend your Time with your loved ones.

Keep in touch with those who care for you.....

Can Any One Beat This Resume

EDUCATION /Qualification:

1950 : Stood first in BA (Hons), Economics, Punjab University , Chandigarh ,
1952 : Stood first in MA (Economics), Punjab University , Chandigarh ,
1954 : Wright's Prize for distinguished performance at St John's
College , Cambridge ,
1955 - 57 : Wrenbury scholar, University of Cambridge ,
1957 : DPhil ( Oxford ), DLitt (Honoris Causa); PhD thesis on India
's export competitiveness

OCCUPATION /Teaching Experience:


Professor (Senior lecturer, Economics, 1957-59;
Reader, Economics, 1959-63;
Professor, Economics, Punjab University , Chandigarh , 1963-65;

Professor, Inter national Trade, Delhi School of Economics , University of Delhi , 1969-71;

Honorary professor, Jawaharlal Nehru University , New Delhi , 1976

and Delhi School of Economics, University of Delhi ,1996 and Civil Servant



Working Experience/ POSITIONS:


1971-72: Economic advisor, ministry of foreign trade
1972-76: Chief economic advisor, ministry of finance
1976-80: Director, Reserve Bank of India ; Director, Industrial Development Bank of India ;
Alternate governor for India , Board of governors, Asian Development Bank;
Alternate governor for India , Board of governors, IBRD
November 1976 - April 1980: Secretary, ministry of finance (Department of economic affairs);
Member, finance, Atomic Energy Commission; Member, finance, Space Commission
April 1980 - September 15, 1982: Member- Secretary, Planning Commission
1980-83: Chairman , India Committee of the Indo-Japan joint study committee September 16, 1982 - January 14, 1985 : Governor, Reserve Bank of India ....
1982-85: Alternate Governor for India , Board of governors, International Monetary Fund
1983-84: Member, economic advisory council to the Prime Minister
1985: President, Indian Economic Association
January 15, 1985 - July 31, 1987 : Deputy Chairman, Planning Commission
August 1, 1987 - November 10, 1990: Secretary-general and commissioner, south commission, Geneva
December 10, 1990 - March 14, 1991 : Advisor to the Prime Minister on economic affairs
March 15, 1991 - June 20, 1991 : Chairman, UGC
June 21, 1991 - May 15, 1996: Union finance minister
October 1991: Elected to Rajya Sabha from Assam on Congress ticket
June 1995: Re-elected to Rajya Sabha
1996 onwards: Member, Consultative Committee for the ministry of finance
August 1, 1996 - December 4, 1997: Chairman, Parliamentary standing committee on commerce
March 21, 1998 onwards: Leader of the Opposition, Rajya Sabha
June 5, 1998 onwards: Member, committee on finance
August 13, 1998 onwards: Member, committee on rules
Aug 1998-2001: Member, committee of privileges 2000 onwards: Member, executive committee, Indian parliamentary group
June 2001: Re-elected to Rajya Sabha
Aug 2001 onwards: Member, general purposes committee

BOOKS:

India 's Export Trends and Prospects for Self-Sustained Growth -Clarendon
Press, Oxford University , 1964; also published a large number of articles in various economic journals.

OTHER ACCOMPLISHMENTS:

Adam Smith Prize, University of Cambridge , 1956
Padma Vibhushan, 1987
Euro money Award, Finance Minister of the Year, 1993;
Asia money Award, Finance Minister of the Year for Asia , 1993 and 1994

INTERNATIONAL ASSIGNMENTS:


1966: Economic Affairs Officer
1966-69: Chief, financing for trade section, UNCTAD
1972-74: Deputy for India in IMF Committee of Twenty on International Monetary Reform
1977-79: Indian delegation to Aid-India Consortium Meetings
1980-82: Indo-Soviet joint planning group meeting
1982: Indo-Soviet monitoring group meeting
1993: Commonwealth Heads of Government Meeting Cyprus 1993: Human Rights World Conference, Vienna

RECREATION

Gymkhana Club, New Delhi ; Life Member , India International Centre, New Delhi

PERSONAL PROFILE

Name : Dr. Manmohan Singh
DOB : September 26, 1932
Place of Birth : Gah (West Punjab)
Father : S. Gurmukh Singh
Mother : Mrs. Amrit Kaur
Married on : September 14, 1958
Wife : Mrs. Gursharan Kaur
Children : Three daughters


Our Prime Minister is possibly the most qualified PM all over the world.


Pass this to every INDIAN.... and be PROUD to be an INDIAN
...

Proud to have such an Educated Prime Minister....

MEN AND WOMEN

Men:

All men are extermely busy

* Although they are so busy, they still have time for women.
* Although they have time for women, they don t really care for them.
* Although they don t really care for them, they always have one Around.
* Although they always have one around them, they always try their Luck with others.
* Although they try their luck with others, they get really pissed off If the women leaves them.
* Although the women leaves them they still don t learn from their Mistakes and still try their luck with
others.


Women:

The most important thing for a woman is financial security.

* Although this is so important, they still go out and buy expensive Clothes.
* Although they always buy expensive clothes, they never have something To wear.
* Although they never have something to wear, they always dress Beautifully.
* Although they always dress beautifully, their clothes are always just An old rag .
* Although their clothes are always just an old rag , they still Expect you to compliment them.
* Although they expect you to compliment them, when you do, they don t Believe you.

Mobile Phones Secret Codes

Sharp Secret Codes
*01763*8371# (*01763*VER0#) — Firmware Version.
*01763*3641# (*01763*ENG1#) — Enable Engineer Mode hold pwr key to leave then disable.
*01763*3640# (*01763*ENG0#) — Disable Engineer Mode.
*01763*8781# (*01763*TST1#) — Test #1 (test early wdt looping to dump, need to remove battery from phone)
*01763*8782# (*01763*TST2#) — Test #2 (test irq dis looping to switch, resets itself)

BenQ-Siemens Secret Codes
Software version:
*#06#
to see more info, press softkey again
English menu:
*#0001#
Deutsch menu:
*#0049#

LG Secret Codes
LG all models test mode: Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI (ALL): *#06#
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#

Samsung Secret Codes

Software version: *#9999#
IMEI number: *#06#
Serial number: *#0001#
Battery status- Memory capacity : *#9998*246#
Debug screen: *#9998*324# - *#8999*324#
LCD kontrast: *#9998*523#

Motorola Secret Codes

IMEI number:
*#06#
Code to lock keys. Press together *7
Note: [] (pause) means the * key held in until box appears.
Select phone line - (use this to write things below the provider name):
[] [] [] 0 0 8 [] 1 []
Add phonebook to main menu:
[] [] [] 1 0 5 [] 1 []
Add messages to main menu:
[] […]

Sony Ericsson Secret Codes

Sony Ericsson Secret Menu: -> * <- <- * <- *
(-> means press joystick, arrow keys or jogdial to the right and <- means left.)
You’ll see phone model, software info, IMEI, configuration info, sim lock status, REAL time clock, total call time and text labels.
You can also test your phones services and hardware from this […]

Nokia Secret Codes
On the main screen type
*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display(operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
*#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that supports WLAN […]

General Nokia 8810 Secrets Codes
IMEI number
*#06#
Software Version
*#0000#

LIFE........LIVE IT !!!

LIFE!! Life is beautiful. it should be lived at all costs! we find happiness, laughter, sorrows, tears, heartaches, deep blows, jilts,BETRAYAL, despite all that i find that LIFE is still beautiful..... yes i repeat IT IS BEAUTIFUL..... I accept that at some turns of our life we find it difficult to cope with some kind of a situation, and sometimes get so much depressed with life that we say we wish to end this life, whats the use of being alive....... but after some time we regret having said so and we once again start enjoying this life the way it is!!!.......we then realise that pains and heartaches are for short durations be it tough and killing at the moment it hurts, despite that life is to be lived and enjoyed each minutes, say each second, every lapse of a moment is precious and should be LIVED..... ASK IT WITH THE PERSON WHO IS SICK AND IS TO BREATH OUT HIS LAST BREATH...... HE IS THE BETTER PLACED TO SAY HOW WONDERFUL IS THIS LIFE WE ARE LIVING.... AND THAT DYING PERSON HOW FAR IS LONGING TO BE BACK TO LIFE TO LIVE IT ONCE MORE......

So friends enjoy life with all that it gives, tears or laughter, accept all and you will find life more beautiful to live it..................­.........

We human beings have only one life to live; then why not celebrate and enjoy it? All of us are born with valuable gifts to make our lives happy; but we hardly make use of their full potential. If only we realise this, all of us can enjoy life.

Our domain is the present. Let us not allow ourselves to drift into the past, nor should we avoid the realities of the moment by thinking about the future.We know we cannot change the past, but we can ruin the present if we are not careful. So let us not squander the precious little lifetime given to us by feeling sorry for the past that NEVER returns, or worrying about the future that is UNCERTAIN. Let us try to optimise joy in our lives by focusing on the here and now.

WILL U BE VALENTINE


Valentine's Day is a day of love
Where love is as bright as the sun
We share kisses, and even a hug
With people we call our loved ones
Unrequited love is oh! so harsh
When the one you love doesn't love you
You feel you're left standing in the dark
Wishing this reality were untrue
Well that's why Valentine's Day is so great
It encourages you to show you care
It makes you just wanna say
I love you and will always be there
I once loved someone in this way
And I was encouraged on Valentine's
I went up to him, just to say
I would like you to be mine

Staying Safe in Cybercafes

The Internet is a great communications and research tool as well as a source of entertainment for millions of people around the world. It is also a security risk. Malicious computer programs have been used to attack computer systems hooked up to the worldwide Internet, damaging computer programs and gaining access to confidential information. News reports of these attacks have brought to the world new meanings for old words such as "virus," "worm," "infection," and "crash" - part of a frightening vocabulary that can intimidate those just beginning to use this new technology. What does it all mean and how can those less experienced Internet travelers navigate the hazards more safely?

Computer security has its similarities to the precautions most people take to secure their home, family, property, and person in an uncertain and sometimes dangerous world. Locking the doors at night, avoiding dangerous neighborhoods, and keeping an eye on one's wallet have their corollaries in sensible computer use.

The Threats

Your home computer is a popular target for intruders, because they want what you may have stored there: credit card numbers, bank account information, personal background information, and anything else they can find. With such information, intruders can take your money, even steal your identity. But it is not just money-related information they may be after. Intruders also want your computer's resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement investigators to figure out where the attack is coming from. If intruders can't be found, they can't be stopped, and they can't be prosecuted.

Intruders go after home computers because typically they are easy targets. When connected to high-speed Internet connections that are always turned on, these computers are all the more easy for intruders to find and attack.

How do intruders break into your computer? In some cases, they send you e-mail with a virus. Reading that e-mail activates the virus, creating an opening that lets intruders see what is inside your computer. In other cases, they take advantage of a flaw or weakness in one of your computer's programs -- a vulnerability -- to gain access. Once inside, they often install new programs that let them continue to use your computer -- even after you have plugged the holes they used to get into your computer in the first place. These so-called backdoors are usually cleverly disguised to blend in with the other programs running on your computer.

So, think of your computer as you would your house or your apartment. For example, you know that if you have a loud conversation, someone next door can probably hear you. You probably routinely lock the doors and close the windows when you leave, and you don't give the keys to just anyone. If a stranger shows up at the door, you don't invite him inside until you have made some discriminating judgments about his intentions. If you're approached by a salesperson, you don't start handing him money until you've decided whether he's legitimate and his product or service is reliable and desirable. These are the same kinds of judgments that you must make when browsing the World Wide Web on the Internet and deciding whether the information you encounter and the messages you receive are helpful or harmful.

E-mail Security

Electronic mail - e-mail for short - is one of the biggest threats to your home computer. By understanding how e-mail works, and by taking precautions in how you go about reading and writing messages, you can reduce this security threat. When you exchange e-mail with someone, the messages sent between you and that person pass through several computers before they reach their destinations. Think of this conversation as taking place in an Internet "room," a very, very big room. Anyone, or, more accurately, any program, along the conversation path can probably understand what is being said, because most Internet conversations are not concealed or hidden in any way. Consequently, others may be listening in, capturing what you send, and using it for their own benefit.

E-mail-borne viruses and worms often arrive in attractive, enticing packages, much like the printed advertisements we receive via traditional mail designed to sell us something. By all appearances, an infected e-mail message appears to be something we want to read from someone we know, not a malicious virus or worm poised to destroy our data, exploit our hard drive, and hijack our computer's processing power.

There are steps you can take to help you decide what to do with every e-mail message with an attachment that you receive. You should only read a message that passes all of these tests:

  1. The Know test: Is the e-mail from someone that you know?
  2. The Received test: Have you received e-mail from this sender before?
  3. The Expect test: Were you expecting e-mail with an attachment from this sender?
  4. The Sense test: Do the subject line describing the contents of the e-mail message and the name of the attachment both make sense? For example, would you expect the sender -- let's say your mother -- to send you an e-mail message with the curious, possibly mystifying subject line "Here you have, ;o)" that contains a message with an attachment -- let's say "AnnaKournikova.jpg.vbs?" A message like that probably wouldn't make sense. You know your mother doesn't follow world tennis, and probably doesn't know who Kournikova is. In fact, it could be an instance of the so-called Anna Kournikova worm that began infecting computers around the world with malicious code in February 2001, and reading it would damage your system.
  5. The Virus test: Is this e-mail infected? To determine this, you need to install and run an anti-virus program.

Preventing Viruses

It's helpful to think about viruses in the same way that you think about that stranger who has come knocking at the door. It is your responsibility to profile or evaluate anyone who enters your living space. Anti-virus programs do much the same thing. These programs look at the contents of each file, searching for specific patterns that match a profile -- called a virus signature -- of something known to be harmful. For each file that matches a signature, the anti-virus program typically provides several options on how to respond, such as removing the offending patterns or destroying the file.

Viruses can reach your computer in many ways -- through floppy disks, CD-ROMs, e-mail, Web sites, and downloaded files. All need to be checked for viruses each time you use them. In other words, when you insert a floppy disk into the drive, check it for viruses. When you receive e-mail, check it for viruses using the tests described above. When you download a file from the Internet, check it for viruses before using it. Your anti-virus program may let you specify all of these as sources to check each time you encounter or use them. Your anti-virus program may also do this automatically.

You often have the chance to react to viruses when they've been discovered on your home computer. Depending upon the specific characteristics of the virus, you might be able to clean the infected file. Or you might be forced to destroy the file and load a new copy from your backups or original distribution media. Your options depend upon your choice of anti-virus program and the virus that's been detected.

Patching

Sometimes a would-be intruder may attempt to enter your home through a broken window. Software programs that you run on your computer can also have "broken windows," and cyberspace intruders are constantly searching to exploit such openings.

Just as you would repair the broken window to secure your home, you must fix the vulnerabilities in programs running on your computer. Most vendors provide patches, sometimes free of charge on their Web sites, for this purpose. When you purchase programs, it's a good idea to see if and how the vendor supplies patches. Just as appliance vendors often sell extended warranties for their products, some software vendors may also sell support for theirs. Vendors send notices to product owners when a safety-related problem has been discovered. Registering your purchase through the warranty card or online gives the vendor the information they need to contact you if there is a recall or a software fix.

Program vendors also provide a service allowing you to receive patch notices via e-mail. Through this type of service, you can learn about problems with your computer before intruders have the chance to exploit them. Consult the vendor's Web site to see how to get e-mail notices about patches. Some programs include features that automatically contact the vendor's Web sites to look for patches. These automatic updates tell you when patches are available, and they download and even install them.

While the patching process is getting easier, even to the point of automation, it is not yet foolproof. In some cases, installing a patch can cause another seemingly unrelated program to break. The challenge is to do as much homework as you can to learn what a patch is supposed to do and what problems it might cause once you've installed it.

Windows XP Tips & Tricks


1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.

9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. The next release of Windows XP, codenamed Longhorn, is due out late next year or early 2003 and won't be much to write home about. The next big release is codenamed Blackcomb and will be out in 2003/2004.

Windows XP Tips & Tricks to make ur System Fast


1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.

9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. The next release of Windows XP, codenamed Longhorn, is due out late next year or early 2003 and won't be much to write home about. The next big release is codenamed Blackcomb and will be out in 2003/2004.

Companys How They Named

Accenture- Accent on the Future. Greater-than ‘accent’ over the logo’s t points forward towards the future. The

Amazon.com - Founder Jeff Bezos renamed the company to Amazon (from the earlier name of Cadabra.com) after the world’s most voluminous river, the Amazon. He saw the potential for a larger volume of sales in an online bookstore as opposed to the then prevalent bookstores. (Alternative: It is said that Jeff Bezos named his book store Amazon simply to cash in on the popularity of Yahoo at the time. Yahoo listed entries alphabetically, and thus Amazon would always appear above its competitors in the relevant categories it was listed in.)

AMD- Advanced Micro Devices.

Apache- The name was chosen from respect for the Native American Indian tribe of Apache (Indé), well-known for their superior skills in warfare strategy and their inexhaustible endurance. Secondarily, and more popularly (though incorrectly) accepted, it’s considered a cute name that stuck: its founders got started by applying patches to code written for NCSA’s httpd daemon. The result was ‘a patchy’ server — thus the name Apache.

Apple- for the favourite fruit of co-founder Steve Jobs and/or for the time he worked at an apple orchard. He was three months late in filing a name for the business, and he threatened to call his company Apple Computer if his colleagues didn’t suggest a better name by 5 p.m. Apple’s Macintosh is named after a popular variety of apple sold in the US. Apple also wanted to distance itself from the cold, unapproachable, complicated imagery created by the other computer companies at the time had names like IBM, NEC, DEC, ADPAC, Cincom, Dylakor, Input, Integral Systems, SAP, PSDI, Syncsort and Tesseract. The new company sought to reverse the entrenched view of computers in order to get people to use them at home. They looked for a name that was unlike the names of traditional computer companies, a name that also supported a brand positioning strategy that was to be perceived as simple, warm, human, approachable and different. Note: Apple had to get approval from the Beatle’s Apple Corps to use the name ‘Apple’ and paid a one-time royalty of $100,000 to McIntosh Laboratory, Inc., a maker of high-end audio equipment, to use the derivative name ‘Macintosh’, known now as just ‘Mac’.

AT&T- American Telephone and Telegraph Corporation officially changed its name to AT&T in the 1990s.

Bauknecht- Founded as an electrotechnical workshop in 1919 by Gottlob Bauknecht .

BBC- Stands for British Broadcasting Corporation.

BenQ - Bringing ENjoyment and Quality to life

Blaupunkt- Blaupunkt (Blue dot) was founded in 1923 under the name Ideal. Their core business was the manufacturing of headphones. If the headphones came through quality tests, the company would give the headphones a blue dot. The headphones quickly became known as the blue dots or blaue Punkte. The quality symbol would become a trademark, and the trademark would become the company name in 1938.

BMW- abbreviation of Bayerische Motoren Werke (Bavarian Motor Factories)

Borealis - The Northern Lights or Aurora Borealis, is the celestial phenomenon that features bursts of light in colourful patterns dancing across the night skies of the north. Borealis, inspired from the shining brilliance of the Northern Lights, was formed in 1994 out of the merger between two northern oil companies, Norway’s Statoil and Finland’s Neste.

BP - formerly British Petroleum, now “BP” (The slogan “Beyond Petroleum” has incorrectly been taken to refer to the company’s new name following its rebranding effort in 2000).

BRAC- abbreviation for Bangladesh Rural Advancement Committee, world’s largest NGO (non governmental organization). It works in development programs around the world.

Bridgestone- named after founder Shojiro Ishibashi. The surname Ishibashi (??) means “stone bridge”, i.e. “bridge of stone”.

Bull- Compagnie des machines Bull was founded in Paristo exploit the patents for punched card machines taken out by a Norwegian engineer, Fredrik Rosing Bull.

Cadillac- Cadillac was named after the 18th century French explorer Antoine Laumet de La Mothe , sieur de Cadillac, founder of Detroit, Michigan. Cadillac is a small town in the South of France.

Canon- Originally (1933) Precision Optical Instruments Laboratory the new name (1935) derived from the name of the company’s first camera, the Kwannon, in turn named after the Japanese name of the Buddhist bodhisattva of mercy.

CGI- from the first letter of Information Management Consultant in french (Conseiller en Gestion et Informatique).

Cisco- short for San Francisco . It has also been suggested that it was “CIS-co” — Computer Information Services was the department at StanfordUniversitythat the founders worked in.

COBRA- Computadores Brasileiros, “Brazilian Computers”, electronics and services company, was the first state-owned designer and producer of computers in the 1970s, later acquired by the Banco do Brasil.

Coca-Cola- Coca-Cola’s name is derived from the coca leaves and kola nuts used as flavoring. Coca-Cola creator John S. Pemberton changed the ‘K’ of kola to ‘C’ for the name to look better.

Colgate-Palmolive- formed from a merger of soap manufacturers Colgate & Company and Palmolive-Peet. Peet was dropped in 1953. Colgate was named after William Colgate, an English immigrant, who set up a starch, soap and candle business in New York Cityin 1806. Palmolive was named for the two oils (Palm and Olive) used in its manufacture.

Compaq- from “comp” for computer, and “pack” to denote a small integral object; or: Compatibility And Quality; or: from the company’s first product, the very compact Compaq Portable.

Comsat - an American digital telecommunications and satellite company, founded during the President Kennedy era to develop the technology. Contraction of Communications Satellites.

Daewoo- the company founder Kim Woo Chong called it Daewoo which means “Great Universe” in Korean.

Dell- named after its founder, Michael Dell. The company changed its name from Dell Computer in 2003.

DHL- the company was founded by Adrian Dalsey, Larry Hillblom , and Robert Lynn , whose last initials form the company’s moniker.

eBay- Pierre Omidyar, who had created the Auction Web trading website, had formed a web consulting concern called Echo Bay Technology Group. ” EchoBay” didn’t refer to the town in Nevada, the nature area close to Lake Mead, or any real place. “It just sounded cool,” Omidyar reportedly said. When he tried to register EchoBay.com, though, he found that Echo Bay Mines, a gold mining company, had gotten it first. So, Omidyar registered what (at the time) he thought was the second best name: eBay.com.

Epson - Epson Seiko Corporation, the Japanese printer and peripheral manufacturer, was named from “Son of Electronic Printer”

Fanta- was originally invented by Max Keith in Germanyin 1940 when World War II made it difficult to get the Coca-Cola syrup to Nazi Germany. Fanta was originally made from byproducts of cheese and jam production. The name comes from the German word for imagination (Fantasie or Phantasie), because the inventors thought that imagination was needed to taste oranges from the strange mix.

Fazer - named after its founder, Karl Fazer.

Fiat- acronym of Fabbrica Italiana Automobili Torino (Italian Factory of Cars of Turin).

Fuji- from the highest Japanese mountain Mount Fuji.

Google- the name is an intentional misspelling of the word googol, reflecting the company’s mission to organize the immense amount of information available online.

Haier- Chinese ? “sea” and ? (a transliteration character; also means “you” in Literary Chinese)
HP- Bill Hewlett and Dave Packard tossed a coin to decide whether the company they founded would be called Hewlett-Packard or Packard-Hewlett.

Hitachi- old place name, literally “sunrise”

Honda- from the name of its founder, Soichiro Honda

Honeywell- from the name of Mark Honeywell founder of Honeywell Heating Specialty Co. It later merged with Minneapolis Heat Regulator Company and was finally called Honeywell Inc. in 1963.

Hotmail- Founder Jack Smith got the idea of accessing e-mail via the web from a computer anywhere in the world. When Sabeer Bhatia came up with the business plan for the mail service, he tried all kinds of names ending in ‘mail’ and finally settled for Hotmail as it included the letters “HTML” - the markup language used to write web pages. It was initially referred to as HoTMaiL with selective upper casing. (If you click on Hotmail’s ‘mail’ tab, you will still find “HoTMaiL” in the URL.)

HSBC- The Hongkong and Shanghai Banking Corporation.

Hyundai- connotes the sense of “the present age” or “modernity” in Korean.

IBM- named by Tom Watson, an ex-employee of National Cash Register. To one-up them in all respects, he called his company International Business Machines.

ICL- abbreviation for International Computers Ltd, once the UK’s largest computer company, but now a service arm of Fujitsu, of Japan.

IKON - copier company name derived from I Know One Name.

Intel- Bob Noyce and Gordon Moore initially incorporated their company as N M Electronics. Someone suggested Moore Noyce Electronics but it sounded too close to “more noise” — not a good choice for an electronics company! Later, Integrated Electronics was proposed but it had been taken by somebody else. Then, using initial syllables from INTegrated ELectronics, Noyce and Moore came up with Intel. To avoid potential conflicts with other companies of similar names, Intel purchased the name rights for $15,000 from a company called Intelco. (Source: Intel 15 Years Corporate Anniversary Brochure)

Interland - a web hosting provider formally known as Micron Computer, Inc. which was named either after InternetLandor the combination of the largest acqusition it performed, Interliant with the word Land.

Kawasaki- from the name of its founder, Shozo Kawasaki

Kodak - Both the Kodak camera and the name were the invention of founder George Eastman . The letter “K” was a favourite with Eastman; he felt it a strong and incisive letter. He tried out various combinations of words starting and ending with “K”. He saw three advantages in the name. It had the merits of a trademark word, would not be mis-pronounced and the name did not resemble anything in the art. There is a misconception that the name was chosen because of its similarity to the sound produced by the shutter of the camera.

Konica- it was earlier known as Konishiroku Kogaku. Konishiroku in turn is the short for Konishiya Rokubeiten which was the first name of the company established by Rokusaburo Sugiura in the 1850s.

Korg - Formed from the surnames of the founders, Tsutomu Katoh and Tadashi Osanai, combined with the letters “rg” from the word organ.

LG - combination of two popular Korean brands Lucky and Goldstar. (In Mexicopublicists explained the name change to the public as an abbreviation to Línea Goldstar Spanish for Goldstar Line)

L’Oréal- In 1907, Eugène Schueller, a young French chemist, developed an innovative hair-color formula. He called his improved hair dye Auréole.

Lotus Software - Mitch Kapor got the name for his company from ‘The Lotus Position’ or ‘Padmasana’. Kapor used to be a teacher of Transcendental Meditation technique as taught by Maharishi Mahesh Yogi.

Lucent Technologies - a spin-off from AT&T, it was named Lucent (meaning “luminous” or “glowing with light”) because “light as a metaphor for visionary thinking reflected the company’s operating and guiding business philosophy,” according to the Landor Associates staff who chose the name. Source: Design Management Journal 8:1 (Winter 1997).

Lycos- from Lycosidae, the family of wolf spiders.

Mazda Motor- from the company’s first president, Jujiro Matsuda . In Japanese, no syllables are ever stressed and some inner syllables are virtually skipped. Thus, Matsuda is pronounced “Matsda”. To make the name fly better outside of Japan, the spelling was changed to Mazda.

McDonald’s- from the name of the brothers Dick McDonald and Mac McDonald, who founded the first McDonald ’s restaurant in 1940.

Mercedes- This is the first name of the daughter of Emil Jellinek, who worked for the early Daimler company around 1900.

MGM- Metro-Goldwyn-Mayer was formed by the merger of three picture houses Metro Picture Corporation, Goldwyn Pictures Corporation and Louis B. Mayer Pictures. Goldwyn Picture Corporation in turn was named after the last names of Samuel Goldfish and Edgar and Archibald Selwyn.

Micron - computer memory producer named after the microscopic parts of its products. The official name was Micron Computer, Inc. Since, the company has become Interland, a web hosting provider, after selling/spinning off its RAM division and closing down its computer division, licensing the name. The company is now headquartered in Atlanta.

Microsoft- coined by Bill Gates to represent the company that was devoted to MICROcomputer SOFTware. Originally christened Micro-Soft, the ‘-’ was removed later on.

midPhase- the post-dotcom era gave using the .com in a companies official name untrendy. A new dotcom company may be named traditionally, in midPhase’s case it was named midPhase Services, Inc., the midPhase stands for Middle Phase, or middle of the road.

Mitsubishi - The name Mitsubishi (??) has two parts: mitsu means three and hishi (changing to bishi in the middle of the word) means water chestnut, and from here rhombus, which is reflected in the company’s logo.

Motorola - Founder Paul Galvin came up with this name when his company (at the time, Galvin Manufacturing Company) started manufacturing radios for cars. Many audio equipment makers of the era used the ” ola” ending for their products, most famously the “Victrola” phonograph made by the Victor Talking Machine Company. The name was meant to convey the idea of “sound” and “motion”. The name became so recognized that the company later adopted it as the company name.

Mozilla Foundation - from the name of the web-browser that preceded Netscape Navigator. When Marc Andreesen , founder of Netscape, created a browser to replace the Mosaic browser, it was internally named Mozilla (Mosaic-Killer, Godzilla) by Jamie Zawinski.

MRF- Madras Rubber Factory, founded by K M Mammen Mappillai in 1946. He started with a toy balloon-manufacturing unit at Tiruvottiyur, Chennai (then called Madras). In 1952, he began manufacturing tread-rubber, and in 1961, tyres.

Nero - Nero Burning ROM named after Nero burning Rome.

Netscape- named by first marketing employee Greg Sands, in a panic when the Universityof Illinoisthreatened to sue the new company for its original name, Mosaic. Netscape then paid Landor $50,000 to design a logo.

Nike - named for the Greek goddess of victory.

Nikon - the original name was Nippon Kogaku, meaning “Japanese Optical”.

Nissan- the company was earlier known by the name Nippon Sangyo which means “Japanese industry”.

Nokia- started as a wood-pulp mill, the company expanded into producing rubber products in the Finnish city of Nokia. The company later adopted the city’s name.

Nortel - The Nortel Networks name came from Nortel (Northern Telecom) and Bay Networks. The company was originally spun off from the Bell Telephone Company of Canada Ltd in 1895 as Northern Electric and Manufacturing, and traded as Northern Electric from 1914 to 1976.

Novartis- after the Latin expression “novae artes” which means something like “new skills”.

Oracle - Larry Ellison, Ed Oates and Bob Miner were working on a consulting project for the CIA (Central Intelligence Agency). The code name for the project was Oracle (the CIA saw this as the system to give answers to all questions or some such). The project was designed to help use the newly written SQL database language from IBM. The project eventually was terminated but they decided to finish what they started and bring it to the world. They kept the name Oracle and created the RDBMS engine. Later they changed the name of the company, Relational Technology Inc, to the name of the product.

Pepsi - Pepsi derives its name from (treatment of) dyspepsia, an intestinal ailment.

Philips - Royal Philips Electronics was founded in 1891, by brothers Gerard (the engineer) and Anton (the entrepreneur) Philips .

Qantas- From its original name, Queensland And Northern Territory Aerial Services.

Red Hat- Company founder Marc Ewing was given the Cornell lacrosse team cap (with red and white stripes) while at college by his grandfather. People would turn to him to solve their problems, and he was referred to as ‘that guy in the red hat’. He lost the cap and had to search for it desperately. The manual of the beta version of Red Hat Linux had an appeal to readers to return his Red Hat if found by anyone.

Reebok- another spelling of rhebok (Pelea capreolus), an African antelope.

SAAB- founded in 1937 in Swedenas “Svenska Aeroplan aktiebolaget” (Swedish Aeroplane Company) abbreviated SAAB.

Samsonite- Samsonite was launched as a brand in 1941, receiving its name from the Biblical character Samson, renowned for his strength.

Samsung- meaning three stars in Korean.

Sanyo- The Japanese translation is disputed, although the Chinese name is “??” (literally, “Three Oceans”)

SAP- “Systems, Applications, Products in Data Processing”, formerly “SystemAnalyse und Programmentwicklung” (German for “System analysis and program development”), formed by 4 ex- IBM employees who used to work in the ‘Systems/Applications/Projects’ group of IBM.

SEGA - “Service Games of Japan” (SeGa) Founded by Marty Bromley (an American) to import pinball games to Japanfor use on American military bases.

Sharp - Japanese consumer electronics company named from its first product, an ever-sharp pencil.

Shell - Royal Dutch Shell was established in 1907, when the Royal Netherlands Petrol Society Plc. and the Shell Transport and Trading Company Ltd. merged. The Shell Transport and Trading Company Ltd. had been established at the end of the 19th century, by commercial firm Samuel & Co (founded in 1830). Samuel & Co were already successfully importing Japanese shells when they set up an oil company, so the oil company was named after the shells Samuel & Co were importing.

Siemens - founded in 1847 by Werner von Siemens and Johann Georg Halske: the company was originally called Telegraphen-Bau-Anstalt von Siemens & Halske.

Sprint- from its parent company, Southern Pacific Railroad INTernal Communications. Back in the day, pipelines and railroad tracks were the cheapest place to lay communications lines, as the right-of-way was already leased or owned.

Sun Microsystems - its founders designed their first workstation in their dorm at StanfordUniversity, and chose the name Stanford University Network for their product, hoping to sell it to the college. They didn’t.

Suzuki - from the name of its founder, Michio Suzuki

Tesco - Founder Jack Cohen, who from 1919 sold groceries in the markets of the London East End, acquired a large shipment of tea from T. E. Stockwell and made new labels by using the first three letters of the supplier’s name and the first two letters of his surname forming the word “TESCO”.

Toshiba- was founded by the merger of consumer goods company Tokyo Denki (Tokyo Electric Co) and electrical firm Shibaura Seisaku-sho (Shibaura Engineering Works).

Toyota- from the founder’s name Sakichi Toyoda. Initially called Toyeda, it was changed after a contest for a better-sounding name. The new name was written in katakana with eight strokes, a number that is considered lucky in Japan.

Unisys - made-up name for the company that resulted from the combination of two old mainframe computer companies, Burroughs and Sperry [Sperry Univac/Sperry Rand]. It “united” two incompatible ranges. Unisys was briefly the world’s second-largest computer company, after IBM.

Verizon- A portmanteau of veritas (Latin for truth) and horizon.

Vodafone- is a multinational mobile phone operator with headquarters in the United Kingdom. Its name is made up of VOice, DAta, TeleFONE. Vodafone made the UK’s first mobile call at a few minutes past midnight on the 1 January 1985.

Volvo- From the Latin word “volvo”, which means “I roll”. It was originally a name for a ball bearing being developed by SKF.

Xerox - The inventor, Chestor Carlson, named his product trying to say `dry’ (as it was dry copying, markedly different from the then prevailing wet copying). The Greek root `xer’ means dry.

Yahoo! - a “backronym” for Yet Another Hierarchical Officious Oracle. The word Yahoo was invented by Jonathan Swift and used in his book Gulliver’s Travels. It represents a person who is repulsive in appearance action and is barely human. Yahoo! founders David Filo and Jerry Yang selected the name because they jokingly considered themselves yahoos

Loading...