Documents at your Mail box Create Personal Docs Now Create Online Documents, Spread Sheets, Presentations in your Sify Mail Upload Files Upload files to Your Account and Edit them as you wish. We support formats such as Excel, PowerPoint, PDF, Word Documents and even HTML. Share File Use Documents to make your Resume and invite friends to view them across companies. Have an urgent meeting have to physically share updates regularly with colleagues, peers and friends. Just Share the Document with their email Ids. Supports Format You can also save the files as Excel sheet, Word and PDF Documents to the format you want to save using Sify Docs. Multiple Editing People can edit the same document dynamically at the same time making it easier for the teams to work and collaborate on the data together. |
To Do-it-yourself
|
Make the best you of the Facility and create Documents online and in real time |
Thursday, April 30, 2009
NOW CREATE DOCUMENTS ONLINE
Tuesday, April 28, 2009
EMAIL USER PRECAUTIONS
Don't share Personal Details |
Never share Password, Date of birth, Security question, Security answer, and personal financial details, with any Individual or Group claiming to be a part of Sify.com. Your Sify Mail account is your asset, protect it. |
Popular Email Scam Examples |
|
So how to Spot Signs of Email Fraud ? Here they are... |
|
Wednesday, April 22, 2009
GOOGLE STILL HIRING LOTS OF ENGINEERS (AND DAYCARE WORKERS TOO)
But Google is also still hiring in some support areas. For instance, it has two openings for its employee child-development program (one for a teacher and another for an operations manager). In the ad for the operations manager, Google says it is “expanding its employee child-development program by opening a high-quality center in the Mountain View area.” (The search giant is also looking for managers for its shuttle-bus system and food-services supply chain.)
But also interesting is what’s not listed—or barely listed. Product management/product marketing and user experience are significant areas for Google—but the company has a total of just six jobs available in those areas combined.
GOOGLE STILL HIRING LOTS OF ENGINEERS (AND DAYCARE WORKERS TOO)
GOOGLE HITS DOUBLE DIGITS
The Daily Number: 10
Google turns 10 on Sunday. In the corporate world, it's still just a baby--but the Internet king's meteoric rise makes this birthday a milestone.
Since going public, the company has used its Googlebucks to acquire a slew of innovative startups--ranging from photo-sharing service Picasa, video site YouTube and even the core of its Google Earth mapping service. It also has raised a bunch of homegrown consumer favorites, including e-mail service Gmail and social networking site, Orkut.
The number of searches it handles has grown astronomically. In 1998, Google reported that it handled 10,000 searches a day. That number leaped to 500,000 a day in 1999. Google doesn't share those numbers widely now, but research group comScore estimates that Google hosted 235 million searches a day in July of this year.
There's another way to gauge Google's growth. The first Google index in 1998 had 26 million Web pages. In July, a Google search engineer tallied up how many unique URLs the company searches to find content: the number was 1 trillion. At this rate, a "googol" worth of pages (or 1 followed by 100 zeros) can only be a few years away.
Now the Internet king is going after much more: It wants to be a worldwide data center that stores every piece of personal and corporate information. Google is pushing cloud computing to accomplish this--and challenging tech's old top dog Microsoft(nasdaq: MSFT - news - people ) to pick up the pace or go home. This week, Google unveiled Chrome, a Web browser aimed at toppling Microsoft's Internet Explorer.
Google's maverick corporate culture and slogans have also made headlines. Employees work inside a compound that mimics a college campus, get free organic meals and are allowed to work on a pet project one day a week. The company has said repeatedly that it wants to make the world a better place. Its defining slogan was "Don't be evil," but it has been officially modified to "You can make money without doing evil.Indeed, Google has become one of those companies that epitomizes an era, introducing literally transformative technology on the global stage.But Google's meteoric rise wasn't part of a calculated plan--initially. Back in 1998, Stanford grad students Larry Page and Sergey Brin just happened to take an interest in organizing information on the Web, and in true Silicon Valley fashion, they founded Google in a friend's Menlo Park, Calif., garage. Soon after, Google stumbled upon a way to make money from advertisements placed alongside online searches results and hired Eric Schmidt, who had headed value.But what goes up must come down, right? Probably. Wall Street used to count on Google for hitting or surpassing analysts' earnings targets, but the company had a few misses the past year due to hiring sprees and technical changes to its search algorithms. And there's the perennial question of whether Google needs to diversify its revenue stream in case businesses find better and cheaper ways to advertise. So far, the company hasn't found another way to make money--and it's not very concerned about it either. Google believes that if superior technology finds users, users will help it find a business plan. It's time to celebrate 10 years in business. But don't expect music, dancing and laughter at the Googleplex Sunday. Even though Google was incorporated on Sept. 7, the company says it has never partied on this day and doesn't plan to start now.
WHY GOOGLE IS THE NEW PIRATE BAY
On Friday, the trial of the Pirate Bay, the Web's highest-profile source of TV shows, movies and music, came to an end when a Swedish court found the administrators of the site guilty of copyright infringement, sentencing them to a year in prison and more than $3 million in fines.
The verdict comes as a surprise to many who assumed the site, which indexes the "tracker" files that allow users to share video and music, was beyond prosecution in its home country of Sweden. And though the sites' owners say they plan to appeal the decision, it may nonetheless lead to the takedown of the Web's most popular index of peer-to-peer downloads.
But even if the Pirate Bay sinks, putting an end to file-sharing isn't so simple. Waiting in the wings to absorb the site's audience are dozens of second-string bittorrent tracker and index sites that have avoided the Pirate Bay's level of notoriety, including Mininova, isoHunt and Demonoid. And according to Ben Edelman, a professor at Harvard's Business School focused on Internet regulation, that longer-tail assortment of piracy outlets means the starting point for finding pirated content has shifted to an even more resilient source: Google
"Google now can and does do what the Pirate Bay has always done," Edelman says. "And if they're prosecuted, they would have much more interesting arguments in their defense."
By searching for pirated music or video, Google users can easily scan a range of lesser-known pirate sites to dig up illicit content. Those looking for the upcoming film X-Men Origins: Wolverine, for instance, can search for "wolverine torrent." The first result is a link to file-sharing site isoHunt, with a torrent tracker file that allows the user to download the full film. In fact, searches for "wolverine torrent" on Google have more than quadrupled since the movie file was first leaked to peer-to-peer networks on April 5, according to Google Trends.
Google, for its part, says it is vigilant about removing illegal content. "We are committed to respecting copyrights and have a well-established process under the [Digital Millennium Copyright Act] for removing links to infringing content when they appear in our search results," a company spokesman wrote in an e-mail. Yahoo! did not respond immediately to requests seeking comment.
But Google and Yahoo! have always been a starting point for peer-to-peer piracy, says Eric Garland, chief executive of the bittorrent research firm Big Champagne. In focus groups, Garland says he's found that users begin their searches for pirated movies on search engines as often as any source, including the Pirate Bay. That means preventing a user from downloading copyrighted files would mean not simply shutting down the Pirate Bay, but every one of the lesser-traveled sites that Google or Yahoo! provide links to.
"I've argued for years that the real battle rights holders are fighting isn't with individual users or file-sharing sites, but with search," Garland says. "As long as there's robust search that allows people to find the titles they're seeking, you will have this problem, period."
Google, on the other hand, may be more legally defensible than any single torrent site. Any piracy-related activity by its users would be dwarfed by the search engine's massive number of legitimate users, says Big Champagne's Garland, and Google is careful to avoid any encouragement of copyright infringing activity.
"Google doesn't call itself 'The Pirate Google,'" Garland says. "If the number of queries looking for copyrighted works is massive, that's only because the number of searches on Google in general is massive."
Google's popularity as a resilient portal for piracy means that even if the media industry were to pursue torrent sites one by one, the search engine would always link to the newest site to host those tracking files, a potentially endless war on torrent sites.
Saturday, April 18, 2009
FOLDING LAPTOP FILMED!
HOW SECURE IS YOUR LAPTOP
One recent study estimated that as much as 80 per cent of the business data that a company owns — customer files, product specifications, proposals, e-mail history files, contracts and financial information — is stored on notebook/laptop PCs. If your laptop/notebook breaks down, is stolen or hacked into, your productivity may be affected for weeks, and your company could even face significant financial loss. Multiply that by every laptop user in your organisation, and it’s a strong motivation to seek products with a reputation for reliability and security.But the million dollar question is – Is your laptop really secure?
The method, which cannot be carried out remotely, exploits a little-known vulnerability of the dynamic random access, or DRAM, chip. Those chips temporarily hold data, including the keys to modern data-scrambling algorithms. When the computer’s electrical power is shut off, the data, including the keys, is supposed to disappear. In a technical paper published on the Web site of Princeton’s Centre for Information Technology Policy, the group demonstrated that standard memory chips actually retain their data for seconds or even minutes after power is cut off.
This has proved that so-called Trusted Computing hardware, an industry standard approach heralded as significantly increasing the security of modern personal computers, does not appear to stop potential attacks.
Change location of keys during runtime:
This has no bearing on this issue since the DRAM is literally frozen at the time of the attack. Mounting this attack via a key search algorithm such as the one suggested by the Princeton researchers renders the location of the keys, and whether or not they are periodically moved, irrelevant.
Fragment keys into discontinuous pieces to increase obfuscation:
Similar to changing the location of the keys, this suggestion has no effect on key recovery. While in use, the encryption key must be unified, and careful study of the encryption software prior to the attack will remove any difficulty the attacker might face. The purpose of encryption is to ensure that obfuscation such as this is unnecessary. While this may delay an attack, it will not prevent it. It will also slow down decryption during regular system use. Use multiple keys for different parts of the disk:
This suggestion prevents the entire contents of the disk from being exposed at one time during a single attack. However, multiple encryption keys require additional authentication if they are to avoid exposure in the same attack instance. Although this suggestion is valid and is implemented in many Full Disk Encryption solutions, there is no reasonable presumption that the most sensitive data is not on the exposed partition.
Multiple keys used in sequence to decrypt the disk:
This might delay an attack by adding an additional layer of complexity, but the DRAM attack would ensure that all keys are available to the attacker. Since the search algorithms employed by the author do not rely on decrypting plaintext to check for key integrity, the attacker will simply have a variety of keys to check in order to decrypt the data correctly.
Use longer encryption keys:
As the contents of DRAM decay, more and more key data is lost. The more key data lost, the larger the searchable key space is and the less likely that an attacker can reconstruct the correct key required for decryption.
Utilising a longer decryption key means a larger searchable key space and makes it statistically more likely that a sufficient degradation of the key will take place during the same period of time that a shorter key might still be recoverable. Although it goes without saying that longer keys mean more security, this does not eliminate a potential DRAM attack since DRAM decay has a steep acceleration curve and most decay occurs in a relatively brief period of time. However, as a precaution, one can employ the largest available key lengths and use AES 256 algorithms for encrypting the Data Encryption and Key Encryption Key.
Erase dram free space periodically during system run:
This suggestion does not offer any real solution. The encryption keys must be available during normal use, and wiping DRAM does nothing if the keys are immediately replaced or moved to a location with similar vulnerabilities. There is also no guarantee that DRAM space happens to be wiped immediately prior to the theft and shutdown of the notebook.
This suggestion is valid in theory, but impractical in reality. Wiping out DRAM during standby is unfeasible because recovering from standby would be impossible.In the case of shutdown or hibernate mode, erasure of DRAM is advisable, but still does not eliminate the basic attack proposed by the Princeton authors. There is no guarantee that an attacker cannot completely cut power and prevent any erasure before it takes place.
Leave fake keys in dram which will erase the disk if implemented:
This suggestion is an inconvenience at best. An attacker using this attack method is not attempting to decrypt the contents of the drive via the Full Disk Encryption program. Therefore, there is no way for the computer to recognise and execute any command indicated by the fake key. At best, this suggestion is obfuscation again and will slightly delay the attacker by forcing him to attempt decryption with more than one key.
Take steps to make boot code disassembly difficult:
Aside from open-source implementations, all encryption software vendors take steps to ensure their software is difficult to disassemble in order to preserve their competitive advantage.
However, an attacker implementing this attack should be presumed to have the foresight and preparation time to obtain and sufficiently examine a copy of the drive owner’s software. The purpose of encryption is that data should be secure regardless of the amount of preparation or the length of time available for an attack.
The use of a TPM chip in conjunction with FDE does nothing to eliminate the possibility of a DRAM attack since the TPM chip does not perform the drive decryption and the key must be copied into memory in order for decryption to take place.
Clear memory at boot time:
Some computers can be configured to require that RAM be cleared at startup before loading any operating system. This would prevent an attacker from using the stolen laptop to perform the DRAM attack, but an attacker could still move the DRAM to a separate computer. Configuring laptops to clear RAM at power up, regardless, is recommended.
Block accessible ports:
Eliminating the possibility of booting from separable media eliminates the possibility of using the stolen laptop to perform the DRAM attack (as above), but suffers from the same weakness. The DRAM can be moved to a separate computer or the hard drive can be entirely replaced during the DRAM attack.
Although the likelihood of an attacker being able to successfully steal a laptop and implement an attack before the DRAM decays is low at best, software-based FDE is theoretically vulnerable to this attack. Potential fixes by software vendors cannot eliminate the possibility entirely. However, for those extremely security conscious individuals or enterprises, newer hardware encryption technology exists that eliminates many of the difficulties posed by this attack.
Recently, hard drive vendors such as Hitachi and Seagate released products that implement hardware-based Full Disk Encryption in their hard disk drives. Intel has also announced the implementation of a Trusted Platform Module (TPM) as well as Full Disk Encryption in its new chip set to be released in the third quarter of 2008. These newer technologies share a distinct advantage over software-based encryption in terms of DRAM attacks — the data encryption keys never enter into computer memory and are thus not vulnerable to this sort of attack.
Friday, April 17, 2009
SAVE YOURSELF FROM INTERNET FRAUD
Simple tips
Last year, one out of 13 people lost money due to internet fraud and identity theft, says a recent report. However, you can insure your password and data by following these easy-to-follow tips.
Don't use personal information
Always keep the cyber thieves guessing. Never use personal information to create a username, login or password. It could be the name of your pets, relatives, nicknames, dates of birth, etc.
Identity theft experts have become savvy at ferreting out these details. Hence, it is crucial to choose usernames and passwords that have nothing to do with your personal history.
Don't use same login and password
Avoid using the same login and password across multiple sites and/or cards and accounts. If a thief gains access to one, it will be like a house of cards, allowing them to quickly wreak havoc across your entire financial portfolio.
Studies have consistently shown that a large fraction of all user-chosen passwords are readily guessed automatically. Shorter passwords are more susceptible to commercially available password recovery tools.
Tips to choose passwords
Such software is capable of testing 200,000 passwords per second. To improve the cipher strength of your password, longer passwords are better. Include a minimum of 8 characters - using both upper and lower case letters and a mix of letters, numerals and symbols. Do not use words found in the English dictionary.
Put yourself into a thief's shoes - don't even think about using an overly simplified password such as '12345678,' '222222,' 'abcdefg.'
Make your password secure
Avoid sequential passwords or using passwords derived from the use of adjacent letters on your keyboard; this will not make your password secure. Also, avoid using only look-alike substitutions of numbers or symbols.
Criminals and other malicious users who know enough to try and crack your password will not be fooled by common look-alike replacements, such as replacing an 'i' with a '1' or an 'a' with '@' as in 'L@rgeSoftw@re' or 'P@ssw0rd.'
Strengthen your password
But these substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case, to improve the strength of your password.
There are many decent applications on the market that will digitally safeguard your various passwords. Avoid using the free ones 'built-in' to browsers as these have been widely exposed for their security flaws.
Password Manager
Consider software like Password Manager that memorises and securely stores each username and password that you enter on a website.
Whenever you return to that site, Password Manager being offered by largesoftware.com will automatically complete your login information and click the submit button, making your login a snap, said a release of www.largesoftware.com
VANISHING E-MAIL ADDRESS
Protect your e-mail ID
Our e-mail addresses are our identity, as it were, and we would like to keep them away from spammers' eyes.
But sometimes, if you want to download data or graphics from a Web site, you are required to fill out a sign-up form, go for Web site subscriptions, which may open the door to unsolicited spam.
Temporary e-mails
How can we avoid such risks and protect our main e-mail IDs?
www.10minutemail.com could be the answer - this will give you a temporary e-mail address valid for just 10 minutes.
Click over to the site. You will instantly be given a temporary e-mail address that vanishes after 10 minutes.
10 mins e-mail
More importantly, there is no registration or verification here. Any e-mails sent to that address would show up automatically on the Web page. Keep the Web page open for 10 minutes.
You can read and forward the messages sent to your e-mail address and even reply to the messages. The e-mail address will self-destruct after 10 minutes.
Spam-free
If you want to retain the e-mail address (given by the Web site) for some more time, you can also reset the timer by clicking on ''Give me 10 more minutes.''
For safer surfing, use this (temporary) e-mail address for any forum sign-ups and keep your inbox spam-free.
SNOOZY MOUSE!
Keyboard shortcuts
Do you really want to reduce the strain on your hand and wrist? Then give some rest to your overworked mouse and start using keyboard shortcuts.
Keyboard shortcuts are a big time saver not only for people who work all day on the same program but also for those working with different applications or programs.
For various applications
But where do we get the various keyboard shortcuts listed in one destination?
Try www.keyxl.com, which provides a list of keyboard shortcuts for various platforms/applications.
This provides an online database of keyboard shortcuts for popular software programs, browser-based applications and operating systems.
'Quick search'
Users can search the keyboard shortcuts by program, software category and also by platforms. The supported platforms are Windows, Mac, Linux and Web applications.
You can also do a 'quick search' for Microsoft applications, Adobe applications, Google Apps, Web Browsers, E-mail programs, Photo/Imaging, MP3, and HTML Editors.
Extensive list
For instance, if you are looking for keyboard shortcuts in Internet Explorer, just enter 'Internet Explorer' in the search field. It will list out the various versions of Internet Explorer and their shortcuts in an orderly manner.
The extensive list of keyboard shortcuts displayed on the Web site is more printer-friendly.
This Web site is a must for people passionate about keyboard shortcuts.
Saturday, April 11, 2009
INTERNET SHORTCUT
Internet Shortcut:
CTRL+A - Select all items on the current page
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the http://www. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help
WINDOWS SHORTCUT KEYS
Windows Shortcut Easy move through PowerPoint
Apply subscript formatting - CTRL+EQUAL SIGN (=)
Apply superscript formatting - CTRL+PLUS SIGN (+)
Bold - CTRL+B
Capitalize - SHIFT+F3
Copy - CTRL+C
Delete a word - CTRL+BACKSPACE
Demote a paragraph - ALT+SHIFT+RIGHT ARROW
Find - CTRL+F
Insert a hyperlink - CTRL+K
Insert a new slide - CTRL+M
Italicize - CTRL+I
Make a duplicate of the current slide - CTRL+D
Open - CTRL+O
Open the Font dialog box - CTRL+T
Paste - CTRL+V
Print - CTRL+P
Promote a paragraph - ALT+SHIFT+LEFT ARROW
Repeat your last action - F4 or CTRL+Y
Save - CTRL+S
Select all - CTRL+A
Start a slide show - F5
Switch to the next pane (clockwise) - F6
Switch to the previous pane - SHIFT+F6
Undo - CTRL+Z
View guides - CTRL+G
EXCEL SHORTCUT KEY
Excel Time saving Shortcuts
Bold toggle for selection - Ctrl + B
Italic toggle for selection - Ctrl + I
Underline toggle for selection - Ctrl + U
Strikethrough for selection - Ctrl + 5
Change the font - Ctrl + Shift + F
Change the font size - Ctrl + Shift + P
Apply outline borders - Ctrl + Shift + 7
Remove all borders - Ctrl + Shift + Underline
Wrap text in same cell - Alt + Enter
Format cells - Ctrl + 1
Select font - Ctrl + Shift + F
Select point size - Ctrl + Shift + P
Format as currency - Ctrl + Shift + 4
Format as general - Ctrl + Shift + # (hash sign)
Format as percentage - Ctrl + Shift + 5
Format as number - Ctrl + Shift + 1
Autosum a range of cells - Alt + Equals Sign
Insert the date - Ctrl + ; (semi-colon)
Insert the time - Ctrl + Shift + ; (semi-colon)
Insert columns/rows - Ctrl + Shift + + (plus sign)
Insert a new worksheet - Shift + F11
Read Monitor Cell One - Alt + Shift + 1
Read Monitor Cell Two - Alt + Shift + 2
Read Monitor Cell Three - Alt + Shift + 3
Read Monitor Cell Four - Alt + Shift + 4
List Visible Cells With Data - Ctrl + Shift + D
Lists Data In Current Column - Ctrl + Shift + C
List Data In Current Row - Ctrl + Shift + R
Select Hyperlink - Ctrl + Shift + H
Move To Worksheet Listbox - Ctrl + Shift + S
Move To Monitor Cell - Ctrl + Shift + M
Select Worksheet Objects - Ctrl + Shift + O
List Cells At Page Breaks - Ctrl + Shift + B
Options Listbox - Insert + V
MICROSOFT OFFICE WORD SHORTCUT KEY
Microsoft Office Keyboard Shortcut Keys :Important Word Shortcuts
Annotation - ALT+CTRL+M
Auto Format - ALT+CTRL+K
Auto Text - F3 or ALT+CTRL+V
Bold - CTRL+B or CTRL+SHIFT+B
Bookmark - CTRL+SHIFT+F5
Copy - CTRL+C or CTRL+INSERT
Copy Format - CTRL+SHIFT+C
Copy Text - SHIFT+F2
Create Auto Text - ALT+F3
Date Field - ALT+SHIFT+D
Delete Back Word - CTRL+BACKSPACE
Delete Word - CTRL+DELETE
Dictionary - ALT+SHIFT+F7
Do Field Click - ALT+SHIFT+F9
Doc Maximize - CTRL+F10
Doc Move - CTRL+F7
Doc Restore - CTRL+F5
Doc Size - CTRL+F8
Grow Font - CTRL+SHIFT+.
Grow Font One Point - CTRL+]Hanging Indent - CTRL+T
Header Footer Link - ALT+SHIFT+R
Help - F1
Hidden - CTRL+SHIFT+H
Hyperlink - CTRL+K
Indent - CTRL+M
Italic - CTRL+I or CTRL+SHIFT+I
Justify Para - CTRL+J
Left Para - CTRL+L
Line Up Extend - SHIFT+UP
List Num Field - ALT+CTRL+L
Outline - ALT+CTRL+O
Outline Collapse - ALT+SHIFT+- or ALT+SHIFT+NUM -
Outline Demote - ALT+SHIFT+RIGHT
Outline Expand - ALT+SHIFT+=
Outline Expand - ALT+SHIFT+NUM +
Outline Move Down - ALT+SHIFT+DOWN
Outline Move Up - ALT+SHIFT+UP
Outline Promote - ALT+SHIFT+LEFT
Outline Show First Line - ALT+SHIFT+L
Lock Fields - CTRL+3 or CTRL+F11
Web Go Back - ALT+LEFT
Web Go Forward - ALT+RIGHT
Word Left - CTRL+LEFT
Word Left Extend - CTRL+SHIFT+LEFT
Word Right - CTRL+RIGHT
Tuesday, April 7, 2009
DOWNLOAD OF GOOGLE CHROME FOR WINDOWS VISTA/XP SP2
DOWNLOAD OF MOZILLA FIREFOX
FREE DOWNLOAD OF INTERNET EXPLORER 8
DOWNLOAD SITE OF ADOBE ACROBATE
Saturday, April 4, 2009
NOW,GMAIL IN FIVE INDIAN LANGUAGES
If you couldn’t send an email to your grandmother because of the language barrier, now there’s reason to cheer. Google has come up with transliteration engine in the “Compose” box of its free email service that converts English text into phonetic-based script in vernacular languages.
It means that you can simply type in English and the mail will be converted into the desired language. Users can enable the feature in their Gmail ‘settings’.
At Present, the service is available in five Indian languages — Hindi, Tamil, Kannada, Telugu and Malayalam — but Google plans to add more. “A small set of population is online at present and we want more people to be online.Once the market develops, monetisation will follow,” Rahul Roy Chowdhury, product manager at Google India told HT.
“We built this new feature using Google’s transliteration technology, which is also available on Google India Labs, Orkut, Blogger and iGoogle. I hope you find this feature useful to communicate with those of your friends and family who prefer to write in their native language, and it will be available soon to businesses and schools using Google Apps,” Chandramouli Mahadevan, software engineer, wrote on the Official Google Blog.
Google, under its innovative Labs initiative, was already offering web-based transliteration for its services like Blogger, but that involved cutting and pasting regional language text from the site to the e-mail box.