Funniest read me file ever !!

Do you read the read me file before installing any software??
Well some read and some don’t. Read me files are usually make your life simple by giving you the install instructions and other details of the software.
But here is a readme file of gnome-cups-manager which you wouldn’t want to miss.
This will surely bring a smile on your face.

Once upon a time there was a printer who lived in the woods. He was a lonely printer, because nobody knew how to configure him. He hoped and hoped for someone to play with.

One day, the wind passed by the printer’s cottage. “Whoosh,” said the wind. The printer became excited. Maybe the wind would be his friend!

“Will you be my friend?” the printer asked.

“Whoosh,” said the wind.

“What does that mean?” asked the printer.

“Whoosh,” said the wind, and with that it was gone.

The printer was confused. He spent the rest of the day thinking and jamming paper (for that is what little printers do when they are confused).

The next day a storm came. The rain came pouring down, darkening the morning sky and destroying the printer’s garden. The little printer was upset. “Why are you being so mean to me?” he asked.

“Pitter Patter, Pitter Patter,” said the rain.

“Will you be my friend?” the printer asked shyly.

“Pitter Patter, Pitter Patter,” said the rain, and then it left and the sun came out.

The printer was sad. He spent the rest of the day inside, sobbing and blinking lights cryptically (for that is what little printers do when they are sad).

Then one day, a little girl stumbled into the printer’s clearing in the woods. The printer looked at this curious sight. He didn’t know what to think.

The little girl looked up at him. “Will you be my friend?” she asked.

“Yes,” said the printer.

“What is your name?” asked the little girl.

“HP 4100TN”, replied the printer.

“My name is gnome-cups-manager” said the little girl.

The printer was happy. He spent the rest of the day playing games and printing documents, for that is what little printers do when they are happy.

Top 10 Hackers in the world

The portrayal of hackers in the media has ranged from the high-tech super-spy, as in Mission Impossible where Ethan Hunt repels from the ceiling to hack the CIA computer system and steal the "NOC list," to the lonely anti-social teen who is simply looking for entertainment.

The reality, however, is that hackers are a very diverse bunch, a group simultaneously blamed with causing billions of dollars in damages as well as credited with the development of the World Wide Web and the founding of major tech companies. In this article, we test the theory that truth is better than fiction by introducing you to ten of the most famous hackers, both nefarious and heroic, to let you decide for yourself.

Black Hat Crackers

The Internet abounds with hackers, known as crackers or "black hats," who work to exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. In this section we profile five of the most famous and interesting "black hat" hackers.

1.Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off."

James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords.

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, "The code itself was crappy . . . certainly not worth $1.7 million like they claimed."

Given the extent of his intrusions, if James, also known as "c0mrade," had been an adult he likely would have served at least 10 years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he's learned his lesson and might start a computer security company.

2.Adrian Lamo: Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to do his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."

Lamo's intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it's legal. What Lamo did is not.

When he broke into The New York Times' intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times' LexisNexis account to research high-profile subject matter.

For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.

3.Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.

Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.

Mitnick's mischief got serious when he went on a two and a half year "coast-to-coast hacking spree." The CNN article, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system." He then hacked into computer expert and fellow hacker Tsutomu Shimomura's home computer, which led to his undoing.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

4.Kevin Poulsen: Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him "the Hannibal Lecter of computer crime."

Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.

His hacking specialty, however, revolved around telephones. Poulsen's most famous hack, KIIS-FM, was accomplished by taking over all of the station's phone lines. In a related feat, Poulsen also "reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency." Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.

Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.

5.Robert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.

Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years' probation, 400 hours of community service and a fined $10,500.

Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.

White Hat Hackers

Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff. In this section we profile five white hat hackers and the technologies they have developed.

1.Stephen Wozniak: "Woz" is famous for being the "other Steve" of Apple. Wozniak, along with current Apple CEO Steve Jobs, co-founded Apple Computer. He has been awarded with the National Medal of Technology as well as honorary doctorates from Kettering University and Nova Southeastern University. Additionally, Woz was inducted into the National Inventors Hall of Fame in September 2000.

Woz got his start in hacking making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. After reading an article about phone phreaking in Esquire, Wozniak called up his buddy Jobs. The pair did research on frequencies, then built and sold blue boxes to their classmates in college. Wozniak even used a blue box to call the Pope while pretending to be Henry Kissinger.

Wozniak dropped out of college and came up with the computer that eventually made him famous. Jobs had the bright idea to sell the computer as a fully assembled PC board. The Steves sold Wozniak's cherished scientific calculator and Jobs' VW van for capital and got to work assembling prototypes in Jobs' garage. Wozniak designed the hardware and most of the software. In the Letters section of Woz.org, he recalls doing "what Ed Roberts and Bill Gates and Paul Allen did and tons more, with no help." Wozniak and Jobs sold the first 100 of the Apple I to a local dealer for $666.66 each.

Woz no longer works full time for Apple, focusing primarily on philanthropy instead. Most notable is his function as fairy godfather to the Los Gatos, Calif. School District. "Wozniak 'adopted' the Los Gatos School District, providing students and teachers with hands-on teaching and donations of state-of-the-art technology equipment."

2.Tim Berners-Lee: Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and files on the Internet. He has received numerous recognitions, most notably the Millennium Technology Prize.

While a student at Oxford University, Berners-Lee was caught hacking access with a friend and subsequently banned from University computers. w3.org reports, "Whilst [at Oxford], he built his first computer with a soldering iron, TTL gates, an M6800 processor and an old television." Technological innovation seems to have run in his genes, as Berners-Lee's parents were mathematicians who worked on the Manchester Mark1, one of the earliest electronic computers.

While working with CERN, a European nuclear research organization, Berners-Lee created a hypertext prototype system that helped researchers share and update information easily. He later realized that hypertext could be joined with the Internet. Berners-Lee recounts how he put them together: "I just had to take the hypertext idea and connect it to the TCP and DNS ideas and – ta-da! – the World Wide Web."

Since his creation of the World Wide Web, Berners-Lee founded the World Wide Web Consortium at MIT. The W3C describes itself as "an international consortium where Member organizations, a full-time staff and the public work together to develop Web standards." Berners-Lee's World Wide Web idea, as well as standards from the W3C, is distributed freely with no patent or royalties due.

3.Linus Torvalds: Torvalds fathered Linux, the very popular Unix-based operating system. He calls himself "an engineer," and has said that his aspirations are simple, "I just want to have fun making the best damn operating system I can."

Torvalds got his start in computers with a Commodore VIC-20, an 8-bit home computer. He then moved on to a Sinclair QL. Wikipedia reports that he modified the Sinclair "extensively, especially its operating system." Specifically, Torvalds hacks included "an assembler and a text editor…as well as a few games."

Torvalds created the Linux kernel in 1991, using the Minix operating system as inspiration. He started with a task switcher in Intel 80386 assembly and a terminal driver. After that, he put out a call for others to contribute code, which they did. Currently, only about 2 percent of the current Linux kernel is written by Torvalds himself. The success of this public invitation to contribute code for Linux is touted as one of the most prominent examples of free/open source software.

Currently, Torvalds serves as the Linux ringleader, coordinating the code that volunteer programmers contribute to the kernel. He has had an asteroid named after him and received honorary doctorates from Stockholm University and University of Helsinki. He was also featured in Time Magazine's "60 Years of Heroes."

4.Richard Stallman: Stallman's fame derives from the GNU Project, which he founded to develop a free operating system. For this, he's known as the father of free software. His "Serious Bio" asserts, "Non-free software keeps users divided and helpless, forbidden to share it and unable to change it. A free operating system is essential for people to be able to use computers in freedom."

Stallman, who prefers to be called rms, got his start hacking at MIT. He worked as a "staff hacker" on the Emacs project and others. He was a critic of restricted computer access in the lab. When a password system was installed, Stallman broke it down, resetting passwords to null strings, then sent users messages informing them of the removal of the password system.

Stallman's crusade for free software started with a printer. At the MIT lab, he and other hackers were allowed to modify code on printers so that they sent convenient alert messages. However, a new printer came along – one that they were not allowed to modify. It was located away from the lab and the absence of the alerts presented an inconvenience. It was at this point that he was "convinced…of the ethical need to require free software."

With this inspiration, he began work on GNU. Stallman wrote an essay, "The GNU Project," in which he recalls choosing to work on an operating system because it's a foundation, "the crucial software to use a computer." At this time, the GNU/Linux version of the operating system uses the Linux kernel started by Torvalds. GNU is distributed under "copyleft," a method that employs copyright law to allow users to use, modify, copy and distribute the software.

Stallman's life continues to revolve around the promotion of free software. He works against movements like Digital Rights Management (or as he prefers, Digital Restrictions Management) through organizations like Free Software Foundation and League for Programming Freedom. He has received extensive recognition for his work, including awards, fellowships and four honorary doctorates.

5.Tsutomu Shimomura: Shimomura reached fame in an unfortunate manner: he was hacked by Kevin Mitnick. Following this personal attack, he made it his cause to help the FBI capture him.

Shimomura's work to catch Mitnick is commendable, but he is not without his own dark side. Author Bruce Sterling recalls: "He pulls out this AT&T cellphone, pulls it out of the shrinkwrap, finger-hacks it, and starts monitoring phone calls going up and down Capitol Hill while an FBI agent is standing at his shoulder, listening to him."

Shimomura out-hacked Mitnick to bring him down. Shortly after finding out about the intrusion, he rallied a team and got to work finding Mitnick. Using Mitnick's cell phone, they tracked him near Raleigh-Durham International Airport. The article, "SDSC Computer Experts Help FBI Capture Computer Terrorist" recounts how Shimomura pinpointed Mitnick's location. Armed with a technician from the phone company, Shimomura "used a cellular frequency direction-finding antenna hooked up to a laptop to narrow the search to an apartment complex." Mitnick was arrested shortly thereafter. Following the pursuit, Shimomura wrote a book about the incident with journalist John Markoff, which was later turned into a movie.

Create your multiple identities!

Peter Bregman speaks, writes, and consults about how to lead and how to live. He is the CEO of Bregman Partners, Inc., a global management consulting firm, and advises CEOs and their leadership teams. He is the author of Point B: A Short Guide To Leading a Big Change.

Below is an interesting thought he offers through Harvard Business Publishing:

Recently, a woman working for France Telecom sent an email to her father. Then she walked over to the window on the fourth floor of her office building, opened it, stepped through, and jumped to her death.

The email read: "I have decided to kill myself tonight...I can't take the new reorganization."

If this were an aberration, one depressed woman's inability to handle change, we could dismiss it. But, so far, 24 France Telecom employees have killed themselves since last year. And more than that have tried. One man stabbed himself in the middle of a meeting.

When confronted with this high rate of suicides, management at France Telecom claimed that, because of its size, 24 suicides isn't that surprising. But there is something unusual happening, and not just at France Telecom. According to America's Bureau of Labor Statistics, work-related suicides increased 28% between 2007 and 2008.

It's tempting to blame the companies. A good article in The Economist pointed to a variety of things — the drive for measurement and maximizing productivity, recession driven layoffs, poor management communication — that contribute to a disheartening, depressing work environment. The article concludes that "companies need to do more than pay lip service to the human side of management." I agree. For sure there are things leaders can and must do to handle employees with more care, compassion, and respect.

But the problem is deeper and more complicated than a callous management team that cares about nothing except profits.

The problem is also in us.

It's in how we see and define ourselves, in our identities.

The first question we ask when we meet people is "what do you do?" We have become our work, our professions. Connected 24/7 via blackberry, obsessively checking email and voice mails, we have left no space for other parts of ourselves.

If we spend all our time working, traveling to work, planning to work, thinking about work, or communicating about work, then we will see ourselves as workers and nothing more. As long as work is going well, we can survive that way.

But when we lose our jobs or our jobs are threatened — and whose isn't these days? — then our very existence is put in question. "Establishing your identity through work alone can restrict your sense of self, and make you vulnerable to depression, loss of self-worth, and loss of purpose when the work is threatened," Dr. Paul Rosenfield, Assistant Clinical Professor of Psychiatry at Columbia University, told me in a recent conversation.

Who am I if you take away my work? That's a question to which we'd better have a solid answer. Fortunately, once we realize this we can do something about it.

We can diversify.

I don't mean diversifying your money, though that's a good idea too. I mean diversifying yourself. So that when one identity fails, the other ones keep you alive. If you lose your job but you identify passionately as a mother or a father, you'll be fine. If you have a strong religious identity or a view of yourself as an artist, you'll be fine. If you see yourself as an athlete, or even simply as a good, loyal friend, you'll be fine.

According to Dr. Rosenfield this is an issue of mental health, even for the mentally ill. "People with mental illness often feel their identity is reduced to being mentally ill. Part of their recovery involves reclaiming other parts of their identity — being a friend, a volunteer, an artist, a dog lover, a student, a worker. It takes an active and bold effort to broaden and overcome the diminished sense of identity that results from dealing with mental illness, hospitalizations, medications, ones doctors saying 'you need to accept being mentally ill' without also saying 'but I believe you are more than your illness and you still have potential to do so many things in the world.'"

Here's the thing though: it's not enough to see yourself in a certain way, you need to act on it. It won't help if you identify as a father but rarely spend time with your children. Or if religion is a big part of your identity and yet you rarely engage in religious activities.

One obstacle is money. For many people, an obsession with work is really about the concern of having enough money to support themselves or their family. How can we work less and still survive?

Perhaps it's the only way to not only survive but thrive. As I wrote about in an earlier post, stepping away from your work might just be the key to increasing your productivity.

And having multiple identities will help you perform better in each one. Because you learn things as an athlete or a parent or a poet that will make you a better employee or leader or friend. So the more you invest yourself in multiple identities, the less likely you'll lose any one of them.

Of course, if you do lose one, you'll be okay because you've got the others.

If you still believe that doing nothing but work is a necessity to support your lifestyle, then it's worth looking at ways to reduce your lifestyle, so you don't kill yourself trying to maintain it.

Walk away from the email and have dinner with your family. Leave work at a decent hour and play tennis with a friend. Choose rituals that have meaning to you and do them religiously. Most importantly, be consistent — doing the same thing repeatedly over time solidifies your identity.

A good friend of mine lost her job about a year ago and I called at the time to see if I could do anything. My intention was to help her find a new job as soon as possible; I knew money was tight.

I was pleasantly surprised though. She told me she had decided to postpone her job search for a few months. She was pregnant and wanted to focus on that for a while. Once she felt ready, she would look for work. She was too busy creating an identity as a mother to get caught up in her identity as a worker.

Recently I received an email from her telling me she was back at work. "I love the job," she told me. "It's a great balance to motherhood."

Something about Maths!!!

Stupid Math Tricks

Paul Erdos (1913-1996) was one of the greatest mathematicians of all times, working with number theory. He has been called the mathematician of mathematicians and the oddball of oddballs. He lived for mathematics. He had no life, no home, no possessions, no interests other than mathematics and only spoke to people who loved mathematics. Everyone else, to use his description, was “dead”. He slept for 3 hours a day and spent the rest on mathematics. He ate very little (no time) and traveled widely with all his belongings in a plastic bag, looking for fellow mathematicians to live with for a few days (he really never had a home, but lived with whoever he could find). His hosts have said that he had no idea how to cut an apple or how to wash his underwear.

Mathematicians pride themselves as being the pursuers of the purest science of all sciences. So pure and so sublime is the purest form of mathematics, that it is blasphemy to ask “what is the use of this”. Practical applications are impure. But if course, mathematics shape out lives everyday. From buildings to toilets, from the cheap Chinese toys to supersonic aircraft, everything is crafted by mathematics.

An old joke is quite relevant. A man flying a hot air balloon got lost. So he descended and asked a woman walking in a field “Where am I?” She thought for some time and then replied. “In a hot-air balloon”. Immediately the balloonist realized she was a mathematician, for three reasons (1) She thought before replying (2) What she said was absolutely correct and (3) Her reply was totally useless.

However, much to the chagrin of real mathematicians, there is fun in mathematics. Paul Erdos would of course turn over in his grave if he heard that.

Marriage by Mathematics

People meet people, people marry people. When and how should someone decide to marry? Every time, John meets a suitable lady, he must make an important decision – to attempt to marry her or to move on to find a better mate. The problem is how does he know he will ever meet a better mate?

Lets do this mathematically. Suppose someone had 100 cards with 100 random numbers on them. He shows them to you one by one and you have to guess when you have seen the highest number in the whole pack (analogous to the best lady). The goal is to do it as soon as possible. You could wait till you have seen them all, then you will really find the largest number (in case of ladies, John has to wait his entire life to decide), but the sooner you make your move the better it is for you. Mathematicians have worked this out, and the best compromise is to pick the highest number after looking at 37 cards. That is about one third of your way into the game. Actually its not one third, but 1/e, where e is about 2.71828.

Suppose we assume the range of marriageable ages for women is about 18 to 40 and for men is about 20 to 45. Then a woman has 22 years to look for a mate, and a man has 25 years, but if a person waits too long, all the good ones will all be taken. Using the above strategy, the 1/e point for women is age 26.1 and for men is at age 29.1. Hence, this is the best time to take the plunge. The same theory, with a twist, can be used for arranged marriages. If you have gathered n prospects, make contact with the first random n/e prospects and then pick the best.

This technique is of course, quite useful in a variety of optimization problems.

The Birthday paradox

We are at a party. There are lots of people in a room. How many people must there be such that there are two people in the room with the same birthday (ignoring leap years). Of course, even if there are just 2 people, it is possible, though unlikely, that they will have the same birthday.

If there are 366 people then you are guaranteed to find at least 2 people sharing the same birthday. This is called the Pigeon Hole Principle, which states “If you stuff n pigeons into n-1 holes, then there must be a hole with more than one pigeon”.

However, there is an even more interesting situation. If there are just 23 people in a room, the probability of two people having the same birthday is more than half. This means, that quite often, in a gathering of over 23 people, there are people sharing the same birthday. In fact, if there are 40 people in a room, the probability of two people sharing a birthday is over 90%. Quite difficult to believe, but its true. This is called the Birthday Paradox.

Apart from the fun factor, the birthday paradox happens to be an important principle that is used to determine the difficulty of cracking certain encryption codes. That is, a code that looks difficult to crack, can be shown to be quite weak, using the Birthday Paradox.

Measuring a Wall

Watch Jim measure a wall. Jim is a Mathematician. He has this wall in his backyard, about 30 feet long, that he needs to measure. If he was an Engineer, he would get a foot-ruler and then use it repeatedly until he found the length of the wall. Since he is a Mathematician, he does not posses a foot-ruler.

So Jim goes to his neighbor and borrows a foot ruler, and places it against one end of the wall. Now, Jim realizes, one foot-ruler would not be enough, a lot of wall still remains to be measured. So he goes to another neighbor to get another foot-ruler. He places this ruler, after the first one, and realizes he needs more. By the time he finishes measuring the wall, he has borrowed 30 foot-rulers, from 30 neighbors.

Very pleased with himself, for having successfully performed an engineering feat, Jim goes out to return all the rules he has borrowed, but then he realizes he has no idea which ruler belongs to who. Being a good mathematician, he randomizes them (mathematical term for shuffling them), and returns them to random neighbors.

Now, here is the question. What is the chance that some neighbor gets his own ruler back? Probably pretty small. So lets ask the opposite question. “What is the chance that not a single neighbor got his own foot-ruler back?”. The probability of this happening should be quite high. And it should get higher the more neighbors there are—that is if he borrowed 100 rulers the chances of everyone getting wrong rulers would be even higher.

Actually it is not. The chance of no one getting the right ruler is quite low. It is about 37%, Which means, it is very likely (63%) at least one (or more) got the correct ruler. And this probability does not change even if the number of neighbors increase—in fact the larger the number of neighbors, the closer the probability is to 36.79%. Strange but true. Where did the 36.79% come from? It came from the very famous number, the number e. The probability for everyone getting the wrong ruler is 1/e, which is about 0.3679.

Six Degrees of Separation

Legend has it that any two people is separated by a small degree, typically about 6. That is if we take John in New York, and Rajiv in Delhi, it is very likely, we can find a six other people forming a chain of acquaintances from John to Rajiv. This story is also called the Small World Paradox. This surprising (almost) fact cannot be mathematically proven, as it obviously not totally true. For example, there is probably no connection between a Russian village dweller and an isolated tribal in the Amazon forest.

Statistical studies have shown that the small number of connections is indeed almost always true. The degree of separation amongst most people tends to be about six, and in some rare cases rises to 10. Another study involving web pages show that most web pages are also related by a small degree—that is to go from one web page to another needs a small number of click (on hyperlinks).

Movie actors talk of the Kevin Bacon game, where each actor tried to find the separation between him or her, and Kevin Bacon (Kevin Bacon is a not too well known actor). Of course, it is not quite surprising that every actor is a few steps away from Kevin Bacon, given the huge number of collaborators each person in the acting business has.

The “Erdos Number” was invented in honor of Paul Eros. Erdos has the Erdos number 0. Any person who has coauthored a paper with Erdos has an Erdos number 1, there are 507 of them (shows the prolific collaboration Paul Erdos was known for). Coauthors of people who coauthored with these people have Erdos number 2, and there are estimated to be about 6,000 of them. The largest number of people, who have Erdos numbers, have the number 5 (should have been 6). As the number increases, the population drops off. In the year 2000 there was only 1 person, known to have an Erdos number 15. Of course, this will change as time progresses.

Yours truly, has an Erdos number of 3.

The Number e

Marrying and measuring led us to the inverse of e. What is this e? In mathematics, e is a very famous number, much more famous than the ubiquitous pi or p. p is used by engineers, mathematicians prefer e.

It is hard to characterize e as a real life number. One of the best examples compares simple interest with compound interest. Let us say, you keep Rs. 100 in a bank account earning x% simple interest (that is, the interest does not earn interest). The money doubles in y years. If however, you were earning compound interest, in y years, the money would grow e times. Of course, we know e is 2.7182. And, surprisingly, the above result is independent of Rs. 100 or x or y

My Maths Tricks!

*****************************************************************
Find Day for any Date!

Month code:- 

Jan:- 2 for non-leap year & 1 for leap year.
Feb:- 5 for non-leap year & 4 for leap year.
Mar:-5
Apr:-1
May:-3
Jun:-6
Jul:-1
Aug:-4
Sep:-0
Oct:-2
Nov:-5
Dec:-0

Remember these month codes.

Now start with trick :- 

Step1:- Take last 2 digit of year number. e.g. If year is 1827, then take 27.
Step2:- Multiply these 2 digit number with 1.25. Or add 1/4 of this number to itself.
                Take only integer of answer. e.g. 27*1.25 = 33.75. Then take only 33 as ans.
Step3:- Find out & add month code from above chart to ste2's answer.
Step4:- Add date to Step3's answer.
Step5:- Take first 2 digits of year number. Add this to Step4's answer.
Step6:-  Divide Step5's answer by 7. Final answer is remainder of this operation.

0-Sunday,1-Monday,2-Tuesday,3-Wednesday,4-Thursday,5-Friday,6-Sat

*****************************************************************

Examples :- 

Date :- 21-01-1985

Step1:- 85
Step2:- 85+21.25 = 106.25 So take 106.
Step3:- 106+2=108
Step4:- 108+21=129
Step5:- 129+19 = 148
Step6:- 148/7 .... Remainder is 1.

So Day is Monday!!!

Likewise:- 

15-08-1947

Step1:- 47
Step2:- 47+11 = 58
Step3:- 58+4 = 62
Step4:- 62+15=77
Step5:- 77+19 = 96
Step6:- 96%7 = 5

Day is Friday!!!

*****************************************************************


वेळ आली होती पण काळ आला नव्हता !!!

मी दर वर्षी तिरुपतीला जातो. मला दक्षिण भारत खुप छान वाटतो. तिकडे गेल्यानंतर मन प्रसन्न वाटत. अन देवाच्या सानिध्यात काही वेळ घालवण मला नेहमीच आवडत. मागच्या वर्षी जुलै मध्ये मी मीत्रांसमवेत तिकडे गेलो होतो. तिरुपतिवरून येताना आम्ही कोल्हापुरला देवीच्या दर्शनासाठी जायचे ठरवले. कोल्हापुरला दर्शन घेतले व येताना गणपती पुळे मार्गे यायचे ठरले.आम्ही तिथे रात्री २ च्या सुमारास पोहोचलो. रात्री २ वाजता खोली भाड्याने मिळणे तस अशक्यच काम होत. तेव्हा आम्ही गाडीतच झोप घ्यायचे ठरविले. गाडी समुद्राच्या अगदी जवळ लावली अन त्यातच झोपलो. गाडीत काही नित झोप येत नव्हती. अन त्यात त्या शांततेत समुद्राच्या लाटांचा भयान अवाज येत होता.पहाटे ५:३० पर्यंत कसे तरी एक झोप घेतली अन मग उठलो. गाडीबाहेर आलो अन समोर अथांग असा समुद्र पाहिला. जरी सूर्योदय तिथे पहायला मीळणार नसला तरी पहाटेच्या कोवळया कीरणांमध्ये समुद्राचे रूप काही औरच दिसत होते. अगदी नीरव शांतता होती अन फ़क्त लाटांचा आवाज येत होता. मी बराच वेळ समुद्रापाशी बसून त्याचे ते लोभसवाने रूप न्याहाळत होतो. तिथे फ़क्त मी, अन तो अथांग पसरलेला सागर अन नुकताच उगवलेला सूर्य आम्ही तिघेच जागे असल्याचा भास मला होत होता. मध्येच कुठेतरी कुजबुज करीत पक्षी त्यांचीही उपस्थिती जाणवून देत होते.
थोड्याच वेळात माझा एक मित्र गाडीतून बाहेर आला. मग मला राहवेना, मला त्या तुदुम्ब भरलेल्या सागरात पोह्न्याची खुप इच्छा झाली. मी व मित्र , आम्ही दोघे अगदी क्षणात त्या सागराच्या लाटांना तोंड देण्यास समर्थ झालो. क्षणही न दवडता आम्ही त्या सागराच्या पाण्यात तुदुम्ब भिजलो. उगाचच आनंदाने ओरडत , त्या लाटांना तोंड देत त्यांचा आवाज आपल्या आवाजाने क्षीण करण्याचा प्रयत्न करू लागलो.आमचा गोंधळ पाहून बाकीचे मीत्रही जागे झाले. ज्याना पोहता येत होत ते थेट आमच्यात येउन सामील झाले तर ज्याना पोहता येत नव्हत त्यानी सुरक्षा म्हणुन अगदी २ फुट पाण्यातच उभे राहाणे पसंत केले. आम्ही मग त्याना हिणवत कधी खुप आत जात तर कधी लाटांच्या पाण्यावर तरंगत अगदी त्यांच्या पाशी येत. खुप आनंद वाटत होता. अन मीत्रांच्या ग्रुप मध्ये असे एन्जॉय म्हणजे एक पर्वणीच असते. आम्ही खुप वेळ त्या पाण्यात होतो. अगदी न थांबता, न थकता आम्ही त्या लाटांमध्ये खेळत होतो. भूक तर शब्दशा हरवलीच होती. दुपारचे शाधारण १२ वाजले होते. लाटांची तीव्रता काही वाढली होती. पण आनंदाच्या नादात आम्हाला त्याची जाणीवही नव्हती अन फिकीरही नव्हती.


तेवढ्यात आमच्यातल्याच एकाच्या सुपिक डोक्यात एक कल्पना आली. एकमेकांचे हात धरून लाटांना सामोरे जायच. जेवढ्या लाटा तोड़ता येतील तेवढे चांगल. आम्हीही काहीतरी वेगळ म्हणुन ते मान्य केल. २ लाटांना आम्ही सक्षमपने सामोरे गेलो. पण पुढच्या लाटेची तीव्रता काही औरच होती. त्या लाटेत आमचे हात सुटले अन ग्रुप सुटला. एक ग्रुप असल्याने आम्ही समुद्राच्या बरेचसे आत गेलो होतो. पण आता आम्ही सर्वजन एकेकटे होतो. समोर सगळे दिसत होते पण कोणाचा हात पकड़ता येत नव्हता. पाण्याला वेगही भरपूर होता. शेवटी मनाने आपोआपच बाहेर जाण्याचा निर्णय घेतला. एव्हाना किमान ५ ते ६ तास खेळत असल्याने आणी नुकतेच 3-४ लाटांना सामोरे गेल्याने सर्वच जन पुरेसे दमले होते. तेव्हा बाहेर जायला निघालो. पण दैव....
ज्या लाटांना आम्ही ग्रुपने सामोरे गेलो होतो त्या आता किनारयाला धडकून परतीच्या मार्गावर होत्या. अन त्यांचा वेग कदाचीत ओहोटी असल्याने कीवा कोण जाने कोणत्या कारणाने , खुपच वाढला होता. त्यांचा वेग आता एवढा वाढला होता की समुद्रातून बाहेर येनारया लाटा, ज्या आम्हाला त्या क्षणी आत्यांतीक गरजेच्या होत्या, त्या क्षीण पडत होत्या. आम्ही कीनार्याकडे तोंड करून बाहेर निघण्याच्या प्रयत्नात असताना समुद्रातून लाटा बाहेर येतच नव्हत्या. फ़क्त आमच्या समोरून लाटा आत समुद्रात जात होत्या. लाटांची दीशाही अशी जीवघेणी झाली होती की लाटा बाहेर येताना आमच्यापासुन काही दूरपासून जात होत्या अन परत फिरताना मात्र आमच्यासमोर येत होत्या. त्या वेळी नक्की वाटत होते की वेळ आली आहे. त्याच भयाण वातावरणात सगळे एकमेकांकडे मदतीच्या आशळ्भुत नजरेने पाहत होते. काही वेळापुर्वी ज्या डोळ्यांमध्ये आनंद ओसंडून वाहत होता , त्याची जागा आता भीती अन हताशपणाने घेतली होती. काय करावे कोणालाच सुचत नव्हते. काहीसा शिल्लक असलेला अंगातील त्राणही आता त्याची संपल्याची साक्ष देत होता.  कीनारा समोर दिसत होता, पण लाटांना तोडून तिथे पोहोचण केवळ अशक्य वाटू लागल होत. एक पाउल पुढे टाकाव तर पुढचीच लाट पायाखालील मातीसह ४ पाउले मागे नेट होती. जस समुद्र बोल्वाताच होता जणू. आता सहनशीलताही संपू लागली होती. जगण्याच्या ओढीपेक्षा हताशपणाच पारड कुठेतरी जड़ झाल्याच वाटू लागल होत. हा निसर्गाचा अनोखा वीक्राळ खेळ किमान घड़याळी २ मीनीटे चालला होता. आता आशा होती ती फ़क्त समुद्राच्या कृपेची. त्या काही लाटांची ज्या समुद्रातून बाहेर येताना आम्हाला बाहेर काढणार होत्या.
 बस !!! अखेर २ मिनिटाच्या त्या अभूतपूर्व संघर्षानंतर अखेर ती लाट आली. अन अशी आली की ती थेट आम्हाला ६-७ फुट बाहेर घेउन आली. त्यानंतर तिच्या मागील छोट्या लाटेने आम्हाला बाहेर पोहोच्वान्याच काम केल. बस काहीही वेळ न दवड़ता, जस सकाळी समुद्रात अगदी क्षणात आत गेलो होतो , अगदी तसाच किंवा त्याही पेक्षा वेगाने समुद्राच्या बाहेर आलो.  जाताना जो आनंद होता त्याही पेक्षा किंचीत जास्त भय घेउन सर्व जण बाहेर पोहोचलो. आधी नजर सर्वाना शोधू लागली. सर्व जण आले तर आहेत ना याची खात्री मनोमन करू लागली. तोंडातून शब्दही फुटेना अन समुद्राकडे नजरही करवेना. अगदी सुन्न झालो सगळे. त्या लाटांचा आवाज काही वेळ काहीच ऐकु येइना. सकाळी जाणवलेली नीरव शांतता आता भयाण शुकशुकाटात बदलली होती.



वीहीरीत कींवा नदीत पोहायला तसे मी व माझे २-३ मित्र अगदी निष्णात, पण समुद्राच्या त्या भयाण ताकतीपुढे आमचा नीभावच लागत नव्हता. त्यातच पावसाळ्याचे दिवस असल्याने समुद्र खुपच खवळला होता. काही वेळ बाजूला बसून शांत झाल्यानंतर समुद्राकडे पाहीले. त्याचे ते रौद्र रूप आम्हाला जणू भीती घालत होते. प्रत्येक लाट वाघाच्या डरकाळीप्रमाणे आ वासूण उभी रहात होती. त्याचे कड़े पहावतही नव्हते. एवढ्या जवळून मरण मी कधीच पाहीले नव्हते. आम्ही तिथून तडक मंदिरात गेलो. देवाचे दर्शन घेतले व या प्रसंगातून बचावल्याबद्दल त्याचे मनोमन आभार मानले. लगेचच गाडीत बसलो व परतीच्या वाटेला लागलो. काहीसे अन्तर कापल्यानंतर आम्ही एक उंच ठीकाणी पोहोचलो , मी खिड़कीची काच उघडली अन समुद्राकडे एक नजर टाकली. एवढे भयाण अन रौद्र रूप मी कधीच पाहीले नव्हते, त्याचे ते रूप मनात खोलपर्यंत साठले गेले.  मनात एक विचार घर करून गेला... खरच "आज वेळ आली होती पण काळ आला नव्हता"!!!

Sac...