My First Post      My Facebook Profile      My MeOnShow Profile      W3LC Facebook Page      Learners Consortium Group      Job Portal      Shopping


Tuesday, May 18, 2010

Javascript - Validate Email Address

An email Address constitute of following:

--A combination of letters, numbers, periods, hyphens, plus signs, and/or underscores
--The at symbol @
--A combination of letters, numbers, hyphens, and/or periods. (Alphanumerics)
--A period
--The top level domain name (com, net, org, mobi, us, etc)

Some valid examples are:

Invalid Examples:
• - no characters before the @
•cumon& - invalid character &
• - underscores are not allowed in the domain name

For the purpose of email validation I employ regular expressions. The function validateEmailId would do the task for us, as follows:

function validateEmailId(element, alertMessage)
{/*Written by : Mohd Anwar Jamal Faiz 18 May 2008
Language : JavaScript

1. element is the Document element having email address , usually a textbox.
2. alertMessage would be the error message if email address is wrongly formed.

Note: Use of this function is free. But you must not remove the link to this blog.
var emailExp = /^[\w\-\.\+]+\@[a-zA-Z0-9\.\-]+\.[a-zA-z0-9]{2,4}$/;
return true;
return false;

You can use this function in conjugation with appropriate HTML code. For example there can be a webpage having a form as follows:

* Please note that I kept HTML in a remark tag. Or else, this page would have not contained code. Instead a real text box and button would have appeared. But this technique didnt work. So again I made a picture of the text and uploaded on blogger. There are many other ways which I will discuss, at some later time.

Till then, this was the tip of the day!!!

Friday, May 14, 2010

Media nearing Money effect

I came across a video of a news channel reporting on India's losing in T20. The voice articulation is so dramatic. The reporting style is so hillarious. I regard this as Media nearing Money Effect.

Check Video at:

Indian media has nowadays really gone crazy. How can you blame players so critically for losing in a either-win-or-lose game. These days there are so many 24x7 news channels, which are presenting news only for getting TRP rating. Many news channels are presenting orthodox, supersitious and astrological programmes only to create sensation. This news is just an illegitimate offspring of Media nearing Money. We have already witnessed disastrous outcome of this M and M relation. Someone, should give it a voice...

Traceability matrix and Baseline

Traceability : It is a tool to monitor the progress of Software Testing. It is used to check if some of the test cases are left out or not in Manual and automated testing.

Baseline : It is the point at which some deliverable produced during the software engineering process is put under formal change control

Baseline, in simple words is a software specification or functionality that is reviewed or accepted for development. Once the functionality is baseline, we can start developing of the functionality. A Traceability Matrix, on the other hand, lists all the functionality or features and the test cases for each feature. By using the traceability matrix we can measure, when to stop testing of the project or application.

A traceability matrix is a document, usually in the form of a table, that correlates any two baselined documents that require a many to many relationship to determine the completeness of the relationship. It is often used with high-level requirements (these often consist of marketing requirements) and detailed requirements of the software product to the matching parts of high-level design, detailed design, test plan, and test cases.

Generally Traceability Matrix contains:
1. UseCaseID(Functionality/Feature).
2. Description of the Feature.
3. Priority for the Feature.
4. TestCaseIDs for this Feature. (Once if the mapped testcases for each Feature meets Success criteria, then we can stop testing of the project)
5. In which phase is the Feature (Unit,Component,Integration,System)

A requirements traceability matrix may be used to check to see if the current project requirements are being met, and to help in the creation of a Request for Proposal, various deliverable documents, and project plan tasks.

Common usage is to take the identifier for each of the items of one document and place them in the left column. The identifiers for the other document are placed across the top row. When an item in the left column is related to an item across the top, a mark is placed in the intersecting cell. The number of relationships are added up for each row and each column. This value indicates the mapping of the two items. Zero values indicate that no relationship exists. It must be determined if one must be made. Large values imply that the relationship is too complex and should be simplified.

To ease the creation of traceability matrices, it is advisable to add the relationships to the source documents for both backward traceability and forward traceability. In other words, when an item is changed in one baselined document, it's easy to see what needs to be changed in the other.

Adobe is firing back at Apple with love

I came across a beautiful article on latest Adobe Apple controversy. I got this from Yahoo. Readers can read this--

Adobe Systems Inc. is countering Apple Inc. CEO Steve Jobs' recent jab at Adobe's Flash technology for Web video and games. The company is running ads in newspapers and popular technology blogs saying "We Love Apple" — with a bright red heart in place of love.
Jobs had described Flash as outdated, unreliable and unfit for Apple's iPhone and iPad gadgets. In a detailed, 1,685-word offensive posted online two weeks ago. Jobs spelled out the reasons why Apple continues to ban Flash from its mobile devices, including "reliability, security and performance," and the fact that Flash was designed "for PCs using mice, not for touch screens using fingers."
But he said the most important reason is that Flash puts a third party between Apple and software developers. In other words, developers can take advantage of improvements from Apple only if Adobe upgrades its own software.
Adobe's ad — at 82 words — begins, "We love creativity," "We love innovation," "We love apps."
"What we don't love," it continues, "is anybody taking away your freedom to choose what you create, how you create it, and what you experience on the Web."
The full-page ads appeared Thursday in The Wall Street Journal, The New York Times and more than a dozen other newspapers. Online, they peppered tech blogs such as ArsTechnica, Engadget and TechCrunch, as well as and Wired.
Adobe co-founders Chuck Geschke and John Warnock, highly regarded in Silicon Valley, also posted a statement titled "Our thoughts on open markets" — 411 words — criticizing Apple.

"When markets are open, anyone with a great idea has a chance to drive innovation and find new customers," they wrote, adding that Apple's "opposite approach" could undermine a future in which mobile devices outnumber traditional computers on the Internet.
Adobe would not say how much it spent on the ad campaign. For comparison, a full-page black-and-white advertisement costs $223,000 in The Wall Street Journal, assuming no discounts were given for running it over several days.
David Wadhwani, head of Adobe's platform business, said it's something the company feels passionate about because it enables a discussion over who controls the Web. And he stressed Adobe's stance that Flash "is an open platform, with a vibrant ecosystem around it."
In a statement, Apple said that it, too, believed in openness. The company said that is why it favors the emerging HTML5 programming standard rather than Adobe's proprietary Flash product for Web video.

Solar energy in mobile towers

Solar energy in its raw form may be pollution-free, but manufacturing the devices that get the energy out of light and heat requires metal and other material, requiring mines and smelters, therein causing pollution. Maybe the most exciting thing about solar energy today is not only that the costs continue to drop and efficiencies continue to rise, but that clean solar energy is arriving at last. New technologies allow new methods of manufacturing which pollute much less, and often run on solar energy.
Solar heating and solar electric systems can now generate thermal and electric energy over their service life up to 100 times the energy input during their manufacture. This ratio; the energy it will produce in its lifetime, compared to the amount of energy input to manufacture and maintain an energy system, has doubled in the last 20 years for most solar technologies. The ratio of energy out vs. energy in for solar systems has become so favorable that the economic and ecological viability of solar power is now beyond question.
One reason solar energy still cannot compete financially vs. conventional energy is because the value of future energy output from a photovoltaic system is discounted when calculating, for example, an internal rate of return. These economic models that put a time-value on money, making long-term receipts not worth as much as near-term receipts cannot necessarily be applied to energy. Traditional models of economic analysis for an energy system lasting 50 years treat the free energy in years 11 through 50 as nearly worthless. The underlying assumption when discounting returns beyond 10 years is that BTUs are as fungible as currencies; something that is arguable but not certain. If a society as a whole desires energy independence, a solar energy system’s return on investment in year 50 is no less valuable than the return on investment in year one.

Our concern is - can this solar energy be used to meet power requirements of so many mobile towers. Currently diesel refilling is being done. How about establishing solar panels on mobile towers itself.
Still working on the idea.. Will write again.

Bug in InstallShield12. Error 1301 and 1304. Flexera Installshield Bug vulnerability

I noticed a bug in Installshield and have already reported on their website. I am making this available to my readers so that they dont get amazed if this happens to them. I am already tracking this on company's website. More information can be sought on give URL:
Click to Visit Flexera InstallShield official Website Bug

Click to Visit Flexera InstallShield Community Pages Archive for more Info

Let's say you have to make an MSI that would install an executable 'abc.exe' and a folder 'xyz' having few files (any files). You can very well make such an MSI.
Now, try to install using this MSI. Definitely, it installs.
Now after installation, go to install location and delete the 'abc.exe' and instead create a folder with name 'abc.exe'.

Now try to Reinstall in repair mode. We get following message-
Error 1301: "Cannot create file abc.exe because a folder with same name exists. Try to Install on different location." This seems pretty OK

But on this screen we have an option of Ignore. Clicking on Ignore gives an error that is weird--
Error 1304: "Error while writing file \xyz\. Verify that you have access to that directory."

This is a bug. Either Ignore should not be there, or the Error 1304 should not come.

Someone from Flexera to comment!!!!!

Mohd Anwar Jamal Faiz

Nokia Secret Codes

Hi All

On request of my Bhabhi, Dr. Seema, I am writing a post on secret codes of Nokia.
Please Note that this has been collected from internet, and I do not own any responsibility of any damage caused to your mobile devices.

This post would of help to many of my friends especially Janu, Mohsin, Sarvesh and Sisters Sam and cousins. Since blog is open for the entire world, anyone can take the benefits. ;) smile please !!

The tricks are pretty simple, with information/description sideways.

To check the IMEI (International Mobile Equipment Identity) Type-
Information you get from the IMEI-

• TAC = Type approval code
• FAC = Final assembly code
• SNR = Serial number
• SP = Spare
To check the phones Software revision type-
Information you get from the Software revision-
V 05.31
• 1ST Line = Software revision
• 2ND Line = The date of the software release
• 3RD Line = Phone type
To enter the service menu type-
*#92702689# (*#WAR0ANTY#)

To activate EFR (Enhanced Full Rate) Enter the code-
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-

These Nokia codes will work on most Nokia mobile phones
This Nokia code activates Enhanced Full Rate Codec (EFR) – Your Nokia cell phone uses the best sound quality but talk time is reduced my approx. 5%#3370#
Deactivate Enhanced Full Rate Codec (EFR)*#4720#

On the main screen type in:
*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display(operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
#pw+1234567890+1# Shows if sim have restrictions.
*#92702689# - takes you to a secret menu where you may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)
*#3370# - Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.
*#3370* - (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.
*#4720# - Half Rate Codec activation.
*#4720* - Half Rate Codec deactivation. The phone will automatically restart
If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345
Press *#3925538# to delete the contents and code of wallet.
Unlock service provider: Insert sim, turn phone on and press vol up(arrow keys) for 3 seconds, should say pin code. Press C,then press * message should flash, press * again and 04*pin*pin*pin# \
*#7328748263373738# resets security code.
Default security code is 12345
Change closed caller group (settings >security settings>user groups) to 00000 and ure phone will sound the message tone when you are near a radar speed trap. Setting it to 500 will cause your phone 2 set off security alarms at shop exits, gr8 for practical jokes! (works with some of the Nokia phones.) Press and hold "0" on the main screen to open wap browser.
*#147# This lets you know who called you last (Only vodofone)
*#1471# Last call (Only vodofone)
*#21# This phone code allows you to check the number that "All Calls" are diverted to
*#2640# Displays phone security code in use
*#30# Lets you see the private number
*#43# Allows you to check the "Call Waiting" status of your cell phone.
*#61# Allows you to check the number that "On No Reply" calls are diverted to
*#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to
*#67# Allows you to check the number that "On Busy Calls" are diverted to

Veracode as new WhiteBox Testing Tool

Veracode has launched a Software Security Ratings Service, introducing its new system for use in testing the security of applications. Veracode claims to have unveiled the world's first standards-based system for rating the overall security of software programs before they are put into production mode. Again, from usability point of view, Learnin to use VeraCode needs a little more effort than writing 20 lines on Cow!

Veracode SecurityReview delivers benefits to every enterprise:

Exceptional accuracy—The SecurityReview subscription service is supported by a team of world-class experts who constantly review and refine testing methods to deliver the industry's most accurate software security review.
Faster production—SecurityReview accelerates secure application development by providing an application security review that can fit into any development cycle. Because Veracode's solution can handle large volumes of code and return actionable results within 24 to 72 hours, development teams can more easily manage schedules and meet deadlines while ensuring higher security for the enterprise.
Reduced expense—With secure software testing available on an as-needed basis, companies pay only for the services they require.
Complete review—Veracode testing includes tests for malicious code as well as lack of security functionality. It can test both internally and externally developed applications, and can perform dynamic as well as static application security testing. It is simply the most comprehensive software review available.

While many software product have begun using source code analysis tools to look for potential vulnerabilities in their applications, Veracode aims to take the process one step further by offering businesses and ISVs the ability to scan binary code of their programs for problems.

Undoubtedly, there are some constraints on type of build you post to VeraCode for scanning and analysis. There are 5-6 checks as told by VeraCode guideline document. But the, the pre-Scan of VeraCode also helps you a lot if in case you missout something, or forget some symbol files (.pdb files)

Testing binary code allows developers to scan an entire application before it is taken into production, thus increasing their likelihood of finding errors they might have missed along the way, and eliminating the need to pursue code that ends up getting cut from a program before it approaches its final state, Veracode officials said.

The approach also benefits efforts to develop software using the increasingly popular SOA approach by allowing workers to test code being drawn from multiple programs in their final, integrated state, the company maintains. With its great UI, using VeraCode is easy and so helpful!

Running applications with elevated rights in Win-Vista

There is a property of Win-Vista to automatically lower the administrative rights of users that belong to local administrators group. This forces them to run applications and commands like they were normal users like guest with no admin rights.

But fortunately there is a simple and secret shortcut to run any application or any command in windows vista with elevated administrative privileges.

Shortcut is: “ctrl+shift+enter”

This means taht select an application to run using your mouse.
Then Click on three buttons each pressed: ctrl+shift+Enter.

As soon as enter is pressed the application is launched, but this time with elevated rights. This looks like supercool shorcut.

But how many of you really use Win-Vista ;)

Flex, Flash, AIR-- what is the affair!!!!

In one of my team meetings in Adobe, I raised a question on what is the difference between Flex and Flash. This was the time when I was completely unaware of what actually Flex is. Flash, ofcourse, everyone would know because of so many flashy website born everyday.

Going simple, Flex is another language, written as mxml document, which becomes Actionscript 3, and finally converted in .swf binaries. So flex to me is really a suite of tools and an environment to build bigger, more reliable more complex Flash applications. You can do anything in flash you can do in Flex, but it is often harder.

Flex provides the ability to create a SWF file (flash player files) that run on the Adobe Flash Player in any web browser. Just like the Flash was created to enable animators and illustrators to provide visually appealing experiences on the web, Flex was design for the same purpose, but Flex is Flash’s “big brother”, it’s the same “technology” but the way applications are built is different and allow much more complicated applications to be built by software engineers instead of animators

My cousin, Mohsin, and friends Servesh and Azeem were much confused when I told them these things. And then, an intelligent question was raised by my soul-partner *SO*, on how many platforms any Flex application can run on. It must be noted that there are 3 platforms that Flex can run in. Flash, Flash Lite, and Air. But story never ends without objection from my cute lil sis, Samreen. Being more into Law books, it was unpexted to see her asking that what about Flex over Mac, and over phones!

So, I clarified, "Flash is for the browser. Flash Lite is for the phone. and AIR is for the desktop". This was enough for all of them say unanimously "Anwar Rocks!!"

Remember, Flex can be used to create any of these applications. However, Flash lite doesn't allow the use of ActionScript which is essential for creating complex apps.

The difference is also the libraries that you have access to. AIR provides additional libraries so that you can talk to the OS and get things like file listings.

Noted difference between Flex and Flash is that, Flex was not built for animators, writers, accountants; it was written for software developers and the paradigm matches the development methodologies they already know. If one knows Java, C, C++, C#, Delphi, VB, PHP, ColdFusion, Python, Javascript or any other number of programming languages and environments, then he/she can learn Flex with little effort. Flex has classes, components, a compiler, a debugger, class libraries, and uses XML (MXML) for declarative markup of components. This makes it a complete OOP Language.

My write up would not be complete without mentioning that Flex Applications Run on the Desktop too! Adobe AIR, a new runtime, by Adobe Systems, enables the developer to write desktop software that runs on 3 operating systems ( Mac, Windows, Linux ) with the same file. This allows your applications to run as true desktop applications rather than just a website and allows you to do much more than the web provides today. The look and feel remains same. This minimizes your lot of effort making your applications set on various platforms. Once done, it is done on all!

So, 3 cheers for Adobe.
And one cheer for me too! ( For posting this blog)

Rough Set Theory : Brief Notes

Wikipedia says:
A rough set, first described by Zdzisław I. Pawlak, is a formal approximation of a crisp set (i.e., conventional set) in terms of a pair of sets which give the lower and the upper approximation of the original set. In the standard version of rough set theory (Pawlak 1991), the lower- and upper-approximation sets are crisp sets, but in other variations, the approximating sets may be fuzzy sets.

I am providing you with some info on where this theory can be applied. For more details and fundamentals of rough set theory wait for my posts in near future.

Rough set methods can be applied as a component of hybrid solutions in machine learning and data mining. They have been found to be particularly useful for rule induction and feature selection (semantics-preserving dimensionality reduction). Rough set-based data analysis methods have been successfully applied in bioinformatics, economics and finance, medicine, multimedia, web and text mining, signal and image processing, software engineering, robotics, and engineering (e.g. power systems and control engineering). Recently, rough set principles have been also used in the open source database software by Infobright.
Applications of rough sets theory to knowledge discovery involve collecting empirical data and building classification models from the data [1–3]. The main distinction in this approach is it's primarily concerned with the acquisition of decision tables from data followed by their analysis and simplification by identifying attribute dependencies, minimal nonredundant subsets of attributes, most important attributes, and minimized rules. The technology of rough sets has been applied to practical knowledge discovery problems since late 1980s. The first commercial software tool for rough set-based knowledge discovery application development was sold in the early 1990s by Reduct Systems, Inc. [4]. It was called Datalogic. Here, I briefly discuss some representative applications of this technology using Datalogic and other tools (See [5, 6] for more indepth details). Most of these apps fall into categories such as market research, medicine, control, drug and new material design research, stock market, pattern recognition, and environmental engineering.

This is awesome theory that can be used in making spam less meta search egine also. The anti-spamming nature can be exploited to make spam-less mail systems. :)

Keep waiting for more info;) (or write to me)

Random picture movement on webpage

Open any webpage having some picture:
Copy and paste following code in Address bar.(single line)
Press ENTER or Go.
See the fun

javascript:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(5,100,500);,60,150)}setInterval('R++;B(R%DIL)',15);void(0)

Keep checking for good discussions and great tricks ;)

***Orkut - Friend's Scrabbook flooding

This script is used to flood your frnd's scrap-book.

[For informational purpose only. Use at your own Risk. May be illegal! ]

Edit the script and give it a hit in adress bar


javascript:var i=0;function drm(){i=i+1;document.forms[0].elements[2].value=""+""+i+"";document.getElementsByTagName('input').item(3).click();}; void(setInterval(drm,600));

You can very well change these scripts and modify them according to your needs.

***Orkut-- Self scrapbook flooding

This script is used to flood your own scrap-book.

[For informational purpose only. Use at your own Risk. May be illegal! ]

Write a scrap in text box and then paste it into adress-bar and then hit ENTER


javascript:function deatheater(){document.getElementsByTagName('input').item(3).click();}; void(setInterval(deatheater,500));

It should be noted to set the interval according to your internet speed.

Time of any location using Google

Hey, sometimes our system clocks go wrong. Or there is sudden need of finding exact time. Many of us might be probably working for client which are based at different locations. And communication has to be carried out.

Google comes to rescue..

With Google at your hands we don’t have to install any software. It would be just simple to use a query for finding the current time such as,

time delhi
time paris

One thing for caution. It does not works for all nooks and corners. Eg. Time Balochistan would not yield anything.

Find Meaning of any word...


This post might feel a lighter one, yet it is of much use for a person unaware of this. I will tell you a way to find meanings of words using Google.

We do not need to carry a dictionary or install any software for the purpose of finding out a meaning of a word. With the enormous information in Google’s hands, its a piece of cake to find out the meaning of the word. Just use the define: keyword. The meaning would of course be displayed but also a set of other links which might have an alternative definition are also given out with the link to read more about it. Its simple. Try...

In Google's Search Box, just type:


Even if words are not available in some dictionaries, but Google search is nearly without any bounds. Suppose you want to know what SOA (Service Oriented Architecture) is then you would have no choice. Google Search comes to your rescue in this case,

Abbreviations - define: SOA
Jargons - define: captcha
SMS language - define: LOL

So, it comes out that since Google search is not dependent on any dictionary. rather it is based on enormous wealth available all over web. So, we are likely to find a more contemporary and relevant meaning each time.

Cool Trick with website images!!!

Mathematics in itself is a fun and sheer joy if you are able to see through its beauty.

I feel that as you keep on realizing the application of mathematics and its ideas in different branches of science, philosophy and technology, you will start enjoying every aspects of it. Especially, I find the number science and the effects of simple functions on the ranges that a domain of inputs can bring as amazing. 

Let me show a simple trick using Javascript. It will use a great mathematical trick. Please feel free to dive into it if you want.

Remember that JavaScript is a popular scripting language. It powers the most popular Web 2.0 applications with a combination of web development technique called AJAX.
However, Javascript can and is very well employed to create stunning effects in Web pages.

In addition it can also be copied and pasted in the address bar of a web browser. This will run the javascript code in the address bar over the webpage/document already loaded in the browser.

Lets stop gambling with words. Some men (women too!) really need action. So, here it goes...

1. Open a web page with some pictures/images
You may even try with this webpage itself (so no need to open new)
or, You may also open and search for whatever you like eg. cartoon.
2. Copy and paste the following code in the address bar of your internet browser.

javascript:R=0; it_discussions=5;x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function mohdajf(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.mkssddddddddddd=Math.sin(R*x1+i*x2+x3)*x4+x5;*y1+i*y2+y3)*y4+y5}R++}setInterval('mohdajf()',it_discussions); void(0);

Voila!! The pictures have started dancing!
This is a single manifest of the power of Mathematics used with Javascript!

It is evident that there can be much of fun with this one line of code.

In case, you modify the code to create yet another stunning cool image motions, please share it on IT-Discussions Blog.

Why this New IT Discussions blog? And, what is W3LC *

The reason for starting a blog can vary depending on the individual. Some people may start a blog as a way to share their thoughts, ideas, and experiences with a wider audience, while others may use a blog as a platform to promote their business or personal brand. Some possible reasons for starting a blog include:

  • Sharing a particular interest or passion
  • Building a personal brand or reputation
  • Offering insights or advice on a specific topic
  • Connecting with like-minded individuals or building a community
  • Building a platform for a business or product
  • providing a creative outlet for writing or photography
  • Sharing your journey and progress to a particular goal
  • Documenting and keeping a record of your personal growth and development
  • Making money through advertising and affiliate marketing

Earlier I started Due to me migration to a permanent Gmail account, Google was not able to provide me access to my previous blog. (Already reported this bug). Btw, the reason of starting this and previous blog is (already posted in previous blog) - The world lacked a good blog on seriously good IT discussions.

The proves are...

1) You are reading this.

2) The Domain name was available! 

3) I was not into writing blogs prior to this!!

So, here comes an attempt to fill up this void... IT-Discussions!! 
Looking forward to seeing you read, enjoy, and comment. Learning would, of course, be a side-effect.

Later the blog was renamed to W3LC or the World Wide Web Learner's Consortium. A learners' consortium is a group of individuals or organizations that come together to share resources, knowledge, and expertise in order to support learning and professional development. The purpose of a learners' consortium is to provide opportunities for individuals to learn and grow in a collaborative and supportive environment. Consortium members may include schools, universities, businesses, non-profits, and government agencies. They typically work together to create and deliver educational programs, share best practices, and develop new technologies and approaches to learning. Consortiums can be focused on a specific subject area or industry, and they can be local, regional, national or international in scope. They are a great way to provide learners with access to a wide range of resources and support that they may not otherwise have access to.

Warm wishes,
New-IT-Discussions Team
(Earlier, IT-Discussions Team)
Mow - W3LC - World Wide Web Learner's Consortium

We make you feel geek.