Tuesday, August 14, 2012

Gimpse of Drukpath in The Land of Gnh Slideshow Slideshow

Gimpse of Drukpath in The Land of Gnh Slideshow Slideshow: TripAdvisor™ TripWow ★ Gimpse of Drukpath in The Land of Gnh Slideshow Slideshow ★ to Thimphu and Bhutan. Stunning free travel slideshows on TripAdvisor

Sunday, August 5, 2012

Times of Bhutan

<!-Local Time Clock widget - HTML code - localtimes.info -->
<!-end of code--> <!-Local Time Clock widget - HTML code - localtimes.info -->
<!-end of code--> <!-Local Time Clock widget - HTML code - localtimes.info -->
<!-end of code-->

Monday, June 11, 2012

Trekking through the Himalayas...

The scope for trekking in Bhutan is immense - from short walks to arduous treks. The very moment you step off the road to start your trek you will be totally de-linked from the stressful sights and sounds of urban life. Instead, you will enjoy views of snowcapped peaks, dense forested hillsides and river valleys, and the sounds of birds and gushing streams, flowing down to the temperate river valleys from the melting snows of the mighty Himalayan peaks. Trekking provides an excellent opportunity to experience the real heart of Bhutan and gain insight into the rural culture of the kingdom.
In general, trekking in Bhutan is physically demanding due to frequent and abrupt changes in elevation necessitated by the terrain. Some trekking days can involve a strenuous walk along a rocky and muddy path, keeping on the move for 7-9 hours with few rests along the way, so as to reach the designated campsite before dark. A trek in Bhutan can be anything from a three day leisurely walk around a valley, to the arduous 25 day Snowman trek, taking one well above the snowline into Bhutan’s most remote high altitude settled region, Lunana. Most people take a trek which lasts around one week
The most important consideration is weather: the winter snows and summer rains effectively limit most treks to autumn and spring, Bhutan’s most popular trekking seasons. If you want to see alpine flowers you need to come during summer (July and August), but you should be prepared to encounter rain (and possibly leeches!). During the autumn, nights are cold but the days are clear, so you will enjoy spectacular views presenting great photo opportunities. Late spring is warmer, and the blooming season for endemic varieties of the Himalayan rhododendron, but there is a higher possibility of rain or snow. In winter, trekkers can enjoy several pleasant and not too taxing low altitude walks in the hills around the Punakha/Wangduephodrang valleys. Weather is very settled at this time of the year, with clear, sunny days and deep blue skies.
On your trek you will be accompanied by a small and efficient trekking team, who will guide you, prepare the meals, and look after all the camping arrangements. We provide two-person tents with foam mattresses, eating utensils, dining & toilet tents. Everything is transported by pack animals: horses in the low lands and yaks at higher elevations. There are no tea houses or lodges along the trekking routes.



Wednesday, January 25, 2012

Code of Ethics for IT Professionals:



A professional member of the computer Society of India (CSI) shall:

.     Organize the resources available to him and optimize these in attending the objectives of his organization,

.  Use the code of practice conveyed by the CSI from time to time in carrying out his task,

.  not misuse his authority or office for personal gains.

.  Comply with the Indian lawyer relating to the management of his organization particularly with regard to privacy and piracy, and operate within the spirit of these laws.

.  Conduct his affairs so as to uphold project and further the image and reputation of the CSI.

.  Maintain integrity in research and publication.

Codes of Practice

As regard ORGANIZATION an IT professional should:

. Act with integrity in carrying out the lawful policy and instructions of his organization and uphold its image and reputation,

. Plan, establish and review objectives and tasks for himself and his subordinates which are compatible with the code of practice of other
Practice of other professionals in enterprise, and direct all available effort towards the success of the enterprises rather than of him,

. Fully respect the confidentiality of information which comes to him in the course of his duities, and not use confidential information for personal
Information for personal gain or in a manner which may be detrimental to his organization or his clients,

. not snoop around in other people's computer files,

. in his contacts and dealings with other people, demonstrate his personal integrity and humanity and when called to give an opinion in his professional
Capacity, shall, to the best of his ability, give an opinion that is objective and reliable.

As regards the EMPLOYEES, an IT professional should:

.set an example to his subordinates through his own work and performance, through his leadership and by taking account of the needs and problems of his subordinates.

. develop people under him to become qualified for higher duties,

. pay proper regard to the safety and well-being of the personal for whom he is responsible,

. share his experience with fellow professionals.

As regards the CLIENTS, an IT professional should:

. ensure that the terms of all contracts and terms of business be stated clearly and ambiguously and honored,

. in no circumstance supply inherently unsafe goods or services,

. not use the computer to harm other people or to bear false witness,

. be objective and impartial when giving independent advice.

As regards COMMUNITY, an IT professional should:

. make a most effective us of all natural resources employed,

. be ready to give professional assistance in community affairs,

. not appropriate other people's intellectual output,

. always use a computer in ways that insure consideration and respect for fellow humans.



Source: Computer Society of India(C.S.I)

Thursday, January 19, 2012

Computer Hacking!!!!!!!

The term " Computer Hacking" traditionally describes the penetration of sabotage or espionage but for the pleasure of the overcoming the technical security measures.In practice.this kind offense can be frequently found.As far as the damage of these cases is concerned, a differentiation is essential:In numerous cases,the penetrated computer user is not actually harmed,but only endangered.However, in these case,too,the " formal sphere of secrecy" or the integrity of the concerned computer systems is violated.Contrary to this,considerable damages occur in other cases especially in other cases especially when the perpetrators later use their knowledge for committing espionage,sabotage or fraud.


Due to recent developments in the field of telephone and telecommunications technology( such as ISDN hacking does not only affects classic computer system but also increasing telephone lines, answer phones and voices-mail-system."Telephone hackers " dial themselves in to the telephone companies local phone exchanges and are thus able to eavesdrop on the digitally led conversations in a respective part of town.In US,besides other confidential information,especially the numbers of telephone access cards (calling cards) are eavesdropped on,which are then resold.