Experience WorldWide Telescope.

Immerse yourself in a seamless beautiful environment.

WorldWide Telescope (WWT) is a Web 2.0 visualization software environment that enables your computer to function as a virtual telescope, bringing together imagery from the best ground and space-based telescopes in the world. Experience narrated guided tours from astronomers and educators featuring interesting places in the sky.

WorldWide Telescope is created with the Microsoft® high performance Visual Experience Engine™ and allows seamless panning and zooming around the night sky, planets, and image environments. View the sky from multiple wavelengths: See the x-ray view of the sky and zoom into bright radiation clouds, and then crossfade into the visible light view and discover the cloud remnants of a supernova explosion from a thousand years ago. Switch to the Hydrogen Alpha view to see the distribution and illumination of massive primordial hydrogen cloud structures lit up by the high energy radiation coming from nearby stars in the Milky Way. These are just two of many different ways to reveal the hidden structures in the universe with the WorldWide Telescope.

WWT is a single rich application portal that blends terabytes of images, information, and stories from multiple sources over the Internet into a seamless, immersive, rich media experience. Kids of all ages will feel empowered to explore and understand the universe with its simple and powerful user interface.

Microsoft Research is dedicating WorldWide Telescope to the memory of Jim Gray and is releasing WWT as a free resource to the astronomy and education communities with the hope that it will inspire and empower people to explore and understand the universe like never before.

Do visit to know more about it and experience the Universe.

Bon Voyage !

Microsoft unveils the pre-beta release of Windows7

Windows7 (formerly codenamed Blackcomb and Vienna) is the next version of Microsoft Windows and the successor to Windows Vista.

Microsoft has stated that it is "scoping Windows7 development to a three-year timeframe", and that "the specific release date will ultimately be determined by meeting the quality bar."
According to Mike Nash, Microsoft’s vice-president of Windows product management, “The decision to use the name Windows7 is about simplicity. Simply put, this is the seventh release of Windows, so therefore Windows7 just makes sense.”

There have been far more than 7 releases of Windows. In saying "this is the seventh release of Windows"; it is the versions built on the NT kernel being counted.

Current Trends : CD >> DVD >> BD ( BLUE RAY DISK)

Blu-ray Disc is a next-generation, optical disc format that enables the ultimate high-def entertainment experience. The name Blu-ray Disc is derived from the blue-violet laser used to read and write this type of disc. Because of its shorter wavelength (405 nm), substantially more data can be stored on a Blu-ray Disc than on the DVD format, which uses a red (650 nm) laser. Blu-ray Disc offers up to 5X the capacity of today’s DVDs.

Blu-ray Disc provides these key features and advantages:

• Largest capacity available anywhere (25 GB single layer/50 GB dual layer).
• Maximum picture resolution. Blu-ray Disc delivers full 1080p* video resolution to provide pristine picture quality.
• Best audio possible. Blu-ray Disc provides as many as 7.1 channels of native, uncompressed surround sound for crystal-clear audio entertainment.
• Enhanced interactivity. Enjoy such capabilities as seamless menu navigation, exciting, new bonus features, and network/Internet connectivity.
• Backward compatibility**. Blu-ray Disc players enable you to continue to view and enjoy your existing DVD libraries.
• Disc robustness. Breakthroughs in hard-coating technologies enable Blu-ray Disc to offer the strongest resistance to scratches and fingerprints.


Phishing is a common form of Internet piracy.

The term is a variant of fishing, and alludes to baits used to "catch" financial information and passwords.

It is used to steal the personal and confidential information like bank account numbers, net banking passwords, credit or debit card numbers, personal identity details etc of customers. Later, the fraudsters may use the information for debiting money from the victim's account or use the victims debit/credit cards to make high value purchases resulting in huge bills or even worse, one could also become the victim of identity theft.

Phone Phishing (Vishing)

Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

Do's and Don'ts:

● NEVER verify your account information/Login or Transaction Passwords/ Debit or Credit Card details through an e-mail.
● ALWAYS CHECK if the URL of the login page starts with the text ‘https://’ and is not ‘http:// ‘ The 's' stands for 'secured' & its presence is very important indicating that the Web Page uses secured encryption
● Login with your User ID and Login Password only after verifying the above security details
● You may provide personal details over phone/Internet only if you have initiated a call or session and only after you have duly verified and authenticated the other party.

What to do if you have accidentally revealed password/PIN/TIN etc:

If you feel that you have been phished or you have provided your personal information at a place you should not have, please carry out following immediately as a damage mitigation measure:
● Change your password immediately
● Check your account statement and ensure that it is correct in every respect
● Report any erroneous entries to Bank.