Tuesday 23 August 2016

who is KFC man??????????


who is KFC man


5 سال کی عمر میں اس کے والد کا انتقال ہوگیا . 16 سال کی عمر میں اس نے اسکول چھوڑ دیا. 17 سال کی عمر تک اس نے چار ملازمتیں کھو دیں . 18 سال کی عمر میں اس نے شادی کرلی. 18سے 22 سال کی عمر کے درمیان، وہ ایک ریلوے کنڈیکٹر رہا لیکن ناکام رہا... 19 سال کی عمر میں وہ باپ بن گیا. 20 سال کی عمر میں اس کی بیوی نے اسے چھوڑ دیا اور بیٹی کو لے گئی وہ فوج میں شامل ہوا لیکن نکال دیا گیا. اس نےقانون کی پڑھائی کے لئے درخواست دی لیکن اسے مسترد کردیاگیا. وہ ایک انشورنس سیلز مین بن گیا لیکن ایک بار پھر ناکام ہوا.. وہ ایک چھوٹے سے کیفے میں ایک باورچی اور بیرہ بن گیا. اس نے اپنی بیٹی کو اغوا کرنے کی ناکام کوشش کی، لیکن آخر کار وہ اپنی بیوی اور بیٹی کو گھر واپس لانے میں کامیاب ہو گیا. 65 سال کی عمر میں اس کی سبکدوشی کے موقع پر حکومت کی طرف سے اسے صرف 105 ڈالر کا ایک چیک ملا. اسے لگا حکومت اس چیک کے ذریعے اسے ایک نا اہل انسان ثابت کرنا چاہتی ہے... اس نےخود کشی کرنے کا فیصلہ کیا کیونکہ وہ اتنی بارناکام ہوا تھا کہ اب وہ مزید زندگی گزارنے کے قابل نہیں تھا؛ وہ اپنی وصیت لکھنے ایک درخت کے نیچے بیٹھ گیا، لیکن وصیت لکھنے کی بجائے، اس نے یہ لکھا کہ زندگی میں اس نے کس کام میں مہارت حاصل کی. اس نے لکھا کہ وہ صرف ایک کام دوسروں کے مقابلے میں بہتر کر سکتا ہے اور وہ ہے کھانا پکانا... تو اس نے اپنے چیک کے عوض87 ڈالر ادھار لئے اور کچھ چکن خریدا. ایک خاص مصالحہ استعمال کر کے اس نے چکن کو تل لیا اور کینٹکی میں اپنے پڑوسیوں کو فروخت کرنے کیلئے گھر سے نکل پڑا... یاد رکھیں 65 سال کی عمر میں وہ خود کشی کے لئے تیار تھا. لیکن 88 سال کی عمر میں وہ یعنی کرنل سینڈرز، کینٹکی فرائیڈ چکن (KFC) سلطنت کا بانی اور ایک ارب پتی بزنس مین تھا.

Tuesday 9 August 2016

VERY USEFUL FORMS FORMS

VERY USEFUL FORMS FORMS

1.) GOOGLE : Global Organization Of
Oriented Group Language Of Earth .
2.) YAHOO : Yet Another Hierarchical
Officious Oracle .
3.) WINDOW : Wide Interactive
Network Development for Office
work Solution
4.) COMPUTER : Common Oriented
Machine Particularly United and used
under Technical and Educational
Research.
5.) VIRUS : Vital Information
Resources Under Siege .
6.) UMTS : Universal Mobile
Telecommunications System .
7.) AMOLED : Active-matrix organic
light-
emitting diode
8.) OLED : Organic light-emitting
diode
9.) IMEI: International Mobile
Equipment
Identity .
10.) ESN: Electronic Serial Number .
11.) UPS: uninterruptible power
supply .
12. HDMI: High-Definition Multimedia
Interface
13.) VPN: virtual private network
14.)APN: Access Point Name
15.) SIM: Subscriber Identity Module
16.) LED: Light emitting diode.
17.) DLNA: Digital Living Network
Alliance
18.) RAM: Random access memory.
19.) ROM: Read only memory.
20.) VGA: Video Graphics Array
21.) QVGA: Quarter Video Graphics
Array
22.) WVGA: Wide video graphics
array.
23.) WXGA: Widescreen Extended
Graphics
Array
24.)USB: Universal serial Bus
25.) WLAN: Wireless Local Area
Network
26.) PPI: Pixels Per Inch
27.) LCD: Liquid Crystal Display.
28.) HSDPA: High speed down-link
packet
access.
29.) HSUPA: High-Speed Uplink
Packet Access
30.) HSPA: High Speed Packet Access
31.) GPRS: General Packet Radio
Service
32.) EDGE: Enhanced Data Rates for
Global
Evolution
33.)NFC: Near field communication
34.) OTG: on-the-go
35.) S-LCD: Super Liquid Crystal
Display
36.) O.S: Operating system.
37.) SNS: Social network service
38.) H.S: HOTSPOT
39.) P.O.I: point of interest
40.)GPS: Global Positioning System
41.)DVD: Digital Video Disk
42.)DTP: Desk top publishing.
43.) DNSE: Digital natural sound
engine .
44.) OVI: Ohio Video Intranet
45.)CDMA: Code Division Multiple
Access
46.) WCDMA: Wide-band Code
Division Multiple
Access
47.)GSM: Global System for Mobile
Communications
48.)WI-FI: Wireless Fidelity
49.) DIVX: Digital internet video
access.
50.) .APK: authenticated public key.
51.) J2ME: java 2 micro edition
52.) SIS: installation source.
53.) DELL: Digital electronic link
library.
54.)ACER: Acquisition Collaboration
Experimentation Reflection
55.)RSS: Really simple syndication
56.) TFT: thin film transistor
57.) AMR: Adaptive Multi-Rate
58.) MPEG: moving pictures experts
group
59.)IVRS: Interactive Voice Response
System
60.) HP: Hewlett Packard

Tuesday 26 July 2016

How to Check Remaining Minutes, SMS in Ufone Super Card:

How to Check Remaining Minutes, SMS in Ufone Super Card












If you are think very tough method is available for free minutes and SMS or internet usages inquiry then not Ufone is always introduced those system that is user friendly so follow below all method and get you query answer.
Type *706# keys on dial box and press dial green button through this method you can get idea how many minutes, SMS and mobile MBs is remaining.
Ufone super card term and condition:
  • This offer is only for prepaid customers.
  • The price of the card is inclusive of all taxes and additional charges.
  • This offer can also be availed through ULoad.
  • Validity of Minutes, SMS and Mobile Internet is 30 days.
  • To find out remaining minutes, SMS and Mobile Internet MBs, dial *706#.
After How To Check Remaining Minutes, SMS In Ufone Super Card  details if you want details about Ufone other offers then visit this website main home page.

Check Telenor Call History Records Online

Check Telenor Call History Records Online


 
Subscribers of Telenor can now check their call history and other records via online WSS Portal of Telenor. The process is very simple. SIM holder of Telenor are require to Login with their mobile number.
WSS Portal of Telenor is a personalized secure, and hassle-free service that gives you complete control over your connection. All you have to do is create your login, after which you will be able to manage and customize your Telenor connection according to your needs.
WSS Portal gives you full control over your cell phone account and caters to all your needs to view and manage your account online. Moreover, you can subscribe or unsubscribe services, choose among different packages, get details of tariff plans and so much more.

 

Monday 25 July 2016

How IAM Helps In Securing IT Infrastructure

How IAM Helps In Securing IT Infrastructure
Lately there has been significant interest within enterprises with regards to Identity and Access Management (IAM) solutions. With its ability to address critical challenges that IT departments around the world are facing today, IAM solutions have been able to effectively help secure and govern access to enterprise applications in an increasingly complex IT infrastructure that involves on premise and cloud services, SaaS and mobile devices.
IAM and its Potential in Securing your IT Infrastructure
When one thinks about an IAM solution, security, efficiency, simplicity, productivity and compliance are the clear advantages associated with its implementation. Yet, there are a number of enterprises that choose to overlook these benefits purely on the foundation of the cost and complexity in the implementation of these solutions.
However, enterprises that are able to take a step back and consider the cost of a potential security breach involved with manual provisioning and de-provisioning of access, the key advantage of an IAM solution to your IT infrastructure is rather clear.
Moving on from Traditional Security Perimeters
With traditional security perimeters shrinking, enterprises relying on IAM solutions now must consider scenarios such as an increased mobile workforce along with an extremely distributed and complicated network of applications. The right IAM solution helps secure on premise, cloud as well as mobile IT infrastructure by streamlining provisioning and de-provisioning, reducing demands on IT and easing management pains among many other things.
On Premise and Cloud IAM
While a growing number of enterprises are choosing to move on to cloud platforms over managing on premise applications and IT infrastructure, ensuring effective identity management for the later continues to be the need of the hour. Whether one is looking for a on premise or cloud based IAM solution, they both entail critical functions such as identity provisioning and de-provisioning, authentication and authorisation. In simple words, it defines who access what information or application, from where and when.
Security for Multiple Device Access
With the use of multiple devices including mobile becoming more and more common, organizations are able to rely on IAM to overcome the risks of password fatigue, lack of authentication, manual provisioning and multiple user directories among other things. In addition to this, IAM helps reduce security risks by managing, securing and integrating access to corporate information.
With secure federation, enterprises are able to authenticate and exchange user attributes between service providers. This can be achieved on premise as well as on cloud by establishing a common user identity across all deployments. IAM also helps provide secure remote access to browser based applications on the basis of user identities. This is regardless of where the user is located and what device he or she is on.
Furthermore, multi-factor authentication via IAM also helps secure off-network users with the help of second factor authentication controls. This can be delivered through a number of mobile channels including instant messaging, email and SMS.
Meeting the Challenges of BYOD Environments
Contractors, partners, employees and other stakeholders are relying on personal devices to connect with the corporate network for professional as well as personal reasons. The challenge here has little to do with external devices being brought into the enterprise network and more to do with the capability of an IT infrastructure to protect the business assets of an enterprise without impacting productivity while also offering the freedom to choose.
While every company today has a BYOD policy in place that enables users to access secure resources from personal devices. However, more often than not, accessing internal and SaaS applications on mobile devices is harder work that simply doing so from a networked desktop workstation or laptop. IAM helps in setting up a secure, easy and quick way to grant as well as revoke access to corporate applications on employee or corporate owned devices based on the guidelines set. With technology evolving at the rate that it is, trends such as Internet of Things, IAM helps IT teams in deploying solutions that efficiently meet new demands on the corporate network.
Security and Privileged IAM
Database administrators, CEOs, CIOs and other such super user accounts tend to be governed very loosely. Some of the best security policies tend to leave these account entirely uncontrolled while also allowing advanced privileges on the corporate network. Furthermore, most owners of these accounts come with little to no formal training on how to securely manage them.
It is often seen that the motivation to implement a robust privileged identity management solution commences with an immediate need to address an unforeseen security breach. With the right privileged IAM solution in tow, it is possible to bring about significant administrative accountability, effective and secure release controls; stronger inter-application authentication; efficient monitoring of privileged activities and enforcement of privileged activity policies. Furthermore, it also brings about some consistency in password change policies, mitigation of hacker and malware and higher technical staff efficiency.
In Conclusion...
IAM solutions help enterprises ensure security by deploying solutions with robust multifactor authentication while also getting rid of any user frustrations by offering seamless access. IAM helps create policies based on contextual, granular information and helps make decisions based on user identity, device and location to deliver quick and secure access to relevant partners, contractors, employees and guests.

Thursday 21 July 2016

14اگست 1947ء آزادی کا سفر جب پاکستان بن رہا تھا۔ ، اُردو پوائنٹ قومی


Who is the 'King of the Jungle?'


Who is the 'King of the Jungle?'

What about a hyena? A hyena is vicious, and its jaws are twice as powerful than that of a lion. According to a source, a hyena can beat a lion in a fight again and again because of its powerful jaws. Hyenas are said to be scavengers, eating the leftovers of the lion and other animals. But, lions and hyenas both hunt and scavenge at about the same rate. Hyenas get about 75% of there food from there own kills. I think hyenas have been getting a bad reputation because they're not as appealing to the eyes as the lion. Maybe everyone has ben watching to The Lion King too much. If a lion is outnumbered, a lion will even give its food up for the hyenas. But, lions are known to take kills from groups of hyenas. Even though hyenas have beat lions in fights, they lack the intelligence and bravery to do that to the lion. So I guess I'll give the edge to the lion in this debate.
We're not done yet, the tiger is still a ferocious beast! An average tiger weighs approximately 440 pounds, while the average lion weighs about 400 pounds. In terms of strength, tigers are said to be up to 10% stronger. Based on my research, a fight between a lion and a tiger is a 50/50 toss up. They are both very aggressive, and it solely depends on who lands the first blow. Tigers hunt more than lions. Lions are known to show up in a pride to take away a kill. So, if a pride of lions came up to a tiger who was feeding on its kill, then the tiger would obviously back away because of the numbers. One slight advantage that the lion is that when you look it it head on, it seems much bigger than it actually is. The mane doesn't serve much protection, but it can fool an opponent (the mane is just hair,with a full fledged bite the mane wouldn't make a difference). Based on my research, the lion seems to me to be more of a coward, because it always steals kills. Tigers fend for themselves which I respect more. As far as surviving in the wild, both animals eat well and do not struggle to survive. Advantage....? I say neither.
The next animal I will talk about is the porcupine. Now I know what your thinking. How could a porcupine be considered to be king of the jungle. First of all, it depends on your definition of king. In our society, a king is complete power, and is usually pretty lazy and fat. They live easy. I think the porcupine fits that description pretty well. Who is in more control than the porcupine? No one is messing with those spikes and quills. They are razor sharp and 
Watch that video its awesome^
Basically, the king of the wild/jungle/savannah/whatever, is solely opinion. It depends on your definition of a king, and it depends on what you think is the most important. It could be hunting, defense, bravery, intelligence, and the truth is no animal dominates all of those traits. I would love to hear feedback on what other animals you think may be considered king. I only named a few of the many animals out there, so lets hear it!