A Little about WiMAX (Part-2)

  • What actually WiMAX can do?

As discussed in earlier post, WiMAX works with the same principal as WiFi works. Data receiving and sending takes place through radio signal. Like WiFi there can be encryption system or other enhanced security system which prevents unauthorized access. The maximum data transfer rate through WiFi can be up to 54 Mbps under optimal conditions. WiMAX will be able to provide 70Mbps and will support more users at a time. You may find the speed is not anything that much from what WiFi can support. It’s not the speed, its the distance that is the key point. A WiFi access point can allow a radio transmission within 100-1000 meters under optimal condition. On the other hand a WiMAX base station can cover an area having a radius of upto 50 Km. This range can vary depending upon terrain, weather and large buildings and other obstacles.

  • Cost Analysis for WiMAX

WiMAX is not going to be something cheap. It will require a good amount to deploy the system. Do you know you can do a networking among two or more pcs within a room using a bluetooth. This range of networking is Personal Area Network (PAN) and the range is too limited as well as the deployment cost. Then comes wifi. WiFi can cover the range of a Local Area Network. WiFi is infact the wireless version of LAN. Therefore it has a better coverage and the deployment is better too compared to PAN. A WiFi access point can cover a moderate sized neighborhood at most. Therefore you should be able to imagine a cost it would require to get a coverage of a Metropolitan City.

ISPs or other operators who ever wants to build their WiMAX network will have to bear the initial costing. Setting up base stations will be the major issue, from the users point of view, they will be requiring an adapter like WiFi (Wireless Lan). These adapters may initially cost more than $100 (around 7000 BDT). Laptop manufacturers have already started embedding WiMAX adapter into the upcoming Laptops. But the real hurdle will be to bring areas under WiMAX coverage.

Mobile phone operators in Bangladesh has done a great job so far ensuring greater coverage with their networks. Establishing such strong networks were also very expensive. They can be the potential deployer. But other companies like ISPs should get involved in this process since they have expertise and has a good future through WiMAX backbone. It will also ensure that WiMAX will not remain under a few companies thus restricting monopoly in this sector.

Although WiMAX license will be issued within this year, it will take a reasonable enough time to reach the fruit to the end users. In the meantime 3G can be a very good option for the mobile phone operators and other wireless fixed phone operators since they can really afford to integrate 3G to their existing network and since 3G license will also be issued within this year.

If you have any other information on the deployment cost of WiMAX and 3G, you are requested to please share it with us.

A Little about WIMAX (Part-1)

What are the possible ways of getting Internet connectivity? – The probable answer might be something like the following:

  • Dial up Connection
  • BroadBand Connection (LAN, DSL, CABLE MODEM, T-1, T-2, E-1)
  • Wireless Connections (WiFi, GPRS, EDGE, 1xRTT, EVDO, HSDPA etc)

Probably a few more mediums are there, but all of these do have some types of limitations. Limitations like – Bandwidth, Deployment Cost, Limited Network size, Area Coverage, protocol differences of different appliances, Security etc etc… Now let’s think of a newer way of getting connected and avoiding almost all (if not completely) the problems mentioned in the previous sentence. Think of a new technology that would provide us-

  • High Speed Broadband service
  • Wireless long range network which is less expensive to deploy yet creating a huge coverage area
  • Bigger Network size – More user with a single node
  • Secured and supports all types of Networking appliances.

Yes, I’m talking about WIMAX- Worldwide Interoperability for Microwave Access ( IEEE – 802.16)

Currently we are under some of great country wide network through which we can get connected – GPRS/EDGE/1xRTT, the data services by the wireless mobile phone and fixed phone operators. they are doing good but has a certain speed limitation. Through current GSM and CDMA technology (which are ultimately 2/2.5 G technology) we can get the network mobility through which we can move around with a live connection where ever we are under the network coverage. On the other hand, WiFi can deliver a good speed but limited to only few hot spots and we get disconnected even when we get into a new WiFi hot spot. There are some other medium like Line Of Sight (LOS), Non-Line of Sight (NLOS), Optical Fiber network and some other WAN technologies through which we can get Internet Connectivity. But WIMAX is the one which will integrate all the positive sides of all the mediums for us to get connected to the Information super Highway. WIMAX will be a painless connectivity like WiFi (Computer on – connected), will support network mobility as wireless phones’ data service, will support higher speed like Optical fiber, LOS and NLOS technologies. So it will be like all in one thing.


Practically, WiMAX would operate similar to WiFi but at higher speeds, over greater distances and for a greater number of users. WiMAX could potentially erase the suburban and rural blackout areas that currently have no broadband Internet access because phone and cable companies have not yet run the necessary wires or wireless network to those remote locations.

Generally a WiMAX system consists of two parts:

  • A WiMAX tower, similar in concept to a cell-phone tower – A single WiMAX tower can provide coverage to a very large area — as big as 3,000 square miles (~8,000 square km).
  • A WiMAX receiver – The receiver and antenna could be a small box or PCMCIA card, or they could be built into a laptop the way WiFi access is today.

A WiMAX base station can connect directly to the Internet using a high-bandwidth, wired connection (for example, a T3 line). It can also connect to another WiMAX tower using a line-of-sight, microwave link like the current GSM and CDMA system. This connection to a second tower, along with the ability of a single tower to cover up to 3,000 square miles, is what allows WiMAX to provide coverage to remote rural and even most remote areas.

WiMAX actually can provide two forms of wireless service:

  • There is the non-line-of-sight (NLOS), service like WiFi, where a small antenna on your computer connects to the tower. Here, WiMAX uses a lower frequency range — 2 GHz to 11 GHz (similar to WiFi). Lower-wavelength transmissions are not as easily disrupted by physical obstructions — they are better able to diffract, or bend, around obstacles.
  • There is line-of-sight (LOS) service, where a fixed dish antenna points straight at the WiMAX tower from a rooftop or pole. The line-of-sight connection is stronger and more stable, so it’s able to send a lot of data with fewer errors. Line-of-sight transmissions use higher frequencies, with ranges reaching a possible 66 GHz. At higher frequencies, there is less interference and higher bandwidth.

WiFi-style access will be limited to a 4-to-6 mile radius (perhaps 25 square miles or 65 square km of coverage, which is similar in range to a cell-phone zone). Through the stronger line-of-sight antennas, the WiMAX transmitting station would send data to WiMAX-enabled computers or routers set up within the transmitter’s 30-mile radius (2,800 square miles or 9,300 square km of coverage). This is what allows WiMAX to achieve its maximum range.

Information source: howstuffworks

Earn money from your non-professional websites

Commercial organizations tend to have their own websites as a part of their product’s marketing, cataloging, display or information sharing purposes. Some websites do provide web services and earn money from those services. But some sites are there which neither belong to any commercial organizations nor provide any web services. For example: Photo sharing site, personal websites, blogs, forums etc. Although the purpose is not anything commercial, still the author of the sites can earn some money if their sites are really popular and have some good traffic. I know many people don’t like the idea of having advertisements in their website for various reason. First of all the ads really disrupts the theme of the  site and secondly it is not easy to influence someone to put their advertisement in your site. Both the problems are solved now a days. Some third party advertisement agencies have solved these problems. They collect advertisements from the advertisers and puts those ads on your site. They just don’t put anything in your site, rather they have algorithms which selects random ads that matches the content ant theme of your site. For example, if your site specializes on photography, then the ads that will appear in your site will be something related to photography. The doubt that you might be having is something whether you’ll be paid or not and how… The third parties are some companies like google, yahoo, msn, adbrite which really do have some value with their name upon which you can rely on. Moreover, this advertising system is getting so popular now a days that you should really rely on the ad agencies.

Let’s consider some popular sites like facebook and HI5. Now let’s consider some E-mail address providers like GMAIL, HOTMAIL, YAHOO. I’ll not believe if you say that you are not part of these social networking sites or don’t use above mentioned free email addresses. Did you pay anything to these sites? or do they have any offer which requires you to pay to get those? No…. You don’t have to pay anything to get those services. Still those sites are growing in terms of their asset and revenue earning… Where do they earn from?  Yes, advertisements… Some other things are ofcourse there- like a big network of people and their information. But still their major portion of revenue do come from the advertisement they serve in their pages.

You might not earn that much, but you’ll definitely feel the urge to develop your site and enrich content of your site which will increase traffic or visitors to your site ultimately resulting more clicks on the advertisements that you’ll serve in your website. More visitor, more clicks, more earning- really interesting when you apply those to your site. Yahoo Publishers Network/ Adbrite  / Google adsense do have some easy and convenient way of payment which definitely gives you a chance add something to your wallet, and If you can ensure a great number of visitors, you can expect the amount to be a decent one.

Look at the right side bar in my blog, and there are numbers of advertisements there. If you click there, I’ll get about 4 cent per click. These are advertisements from Adbrite network. Adbrite’s advertisements do have something interesting like- If you want to provide a portion of our site for advertisement you can have ad from advertisers for continuous display of which for a fixed time you can earn a fix money regardless of if someone is clicking on the ad or not. Moreover you can your own bid as well as allow advertisers to put their bid and you get the power to choose whose ads to approve. I’ll write an individual post on Adbrite’s advertisement policy. Till then try these advertisement system in your site, and if you don’t have a website  but would like to have one at very low cost, you may try offers by BDWEBTECH .

Microsoft Again Delays Windows XP SP3 Release

Microsoft is holding up the software update’s release, this time after finding a compatibility issue with an electronic checkout system for retailers.
J. Nicholas Hoover
April 29, 2008

Tuesday was supposed to be the coming out party for WindowsXP Service Pack 3, but alas, it was not to be. Microsoft (NSDQ: MSFT) delayed the Web release of the software after finding a compatibility issue. In the last few days, Microsoft found a compatibility problem between Microsoft Dynamics Retail Management System, an electronic checkout system for small- and mid-sized retailers, and both Windows XP SP3 and Vista SP1.
Though that issue would affect a relatively small number of customers, and though many point-of-sale systems use Windows XP Embedded rather than the full version, the company has delayed releasing Windows XP SP3 at all via Windows Update or Microsoft Download Center until a filter is in place to prevent customers who have the Retail Management System from downloading the service pack. It’s unclear how long it will take for Microsoft to institute a fix.

Though this delay will likely be short, it’s the latest in a series of postponements to Windows XP SP3, which was delayed in early 2006 until 2007 and then again until this year.

According to a post on Microsoft’s Windows XP SP3 forum by Chris Keroack, release manager for Windows serviceability, the delay is in place to “make sure customers have the best possible experience.”

Though Windows XP SP3 isn’t available for automatic download via Windows Update, the files remain available on the Windows Update servers for download for those willing to look. The update has already been released to manufacturers.

Windows XP SP3 is a roll-up of all of the updates to Windows XP since SP2 was released four years ago and includes a number of other new features. For example, network access protection — which is included as part of Windows Vista — can make sure systems are patched before they can access a network. Several of the other new features are also security-oriented.

GPRS / EDGE / 1xRTT – Access to Internet in Bangladesh using mobile technology

Previous Relevant article: EDGE / GPRS / EVDO

My previous post on this issue was written in 9th August 2007. Since then there has been some changes in the service type and tariff of the Edge / GPRS / 1xRTT (Citycell Zoom) services by the operators. Also some new competitors have emerged in the market. But those are not Mobile phone Operators, They are Fixed phone Operators, although it doesn’t require any cable connection and these phone service is almost like mobile phones.

eg, Dhaka Phone, National Phone, Ranks Telecom etc.

They work using same technology as mobile phones ( 1xRTT in most of the cases) but the difference is that they can’t support network mobility. I know the term is not clear enough. Let me clarify what I wanted to mean by network mobility. Like mobile phones You can talk using a wireless set (rather bigger set like old bttb land phones) with these operators, but you can not move from one BTS (nearest base station) to another BTS while talking. In cases of mobile phone, when you move from one place to another, you connection automatically connects to the nearest BTS without interrupting your call. But this is not possible in the cases of Dhaka phone , National Phone or other operators like these.

One of the benefit of these operators is that the handset they provide to the customers have a built in modem in most of the cases using which the customers can also connect to the internet as well as talking. And these operators are using sophisticated technology like CDMA-1xRTT in most of the cases. This is the technology used by Citycell. Therefore they can also provide high speed internet in Bangladeshi context (153 Kbps). There offers are also interesting and competitive enough.

Official website of Dhaka Phone: http://www.dhakaphone.com

Official website of Ranks Telecom: http://www.rankstel.com

Official website of National Phone: http://www.nationalphone.net

However the mobile phone operators are not sitting and watching others crossing them!! Grameen phone was the pioneer in introducing Edge service. Now they have increased there edge network vastly throughout the country and still holding the number 1 position in providing such services. I still use the unlimited package and the speed is very good (26-27 Kilo Bytes per second in most of the time). GP unlimited internet costs 1000 taka per month (1150 including VAT). Grameen phone introduced a new package titled “P3” for its users. According to this package the subscriber of this package will be able to use unlimited internet from 12 am (night) to 7 Am spending 300 Taka (+VAT) only. The package was available for both prepaid and postpaid, eventually which is only available for the post paid users at the moment. GP has also offered the famous “P2” unlimited usage per month for the prepaid users with the same tariff as the postpaid. http://www.grameenphone.com/index.php?id=134

Citycell was not far behind and Citycell’s zoom really attracted people because of its vast publicity and better service as well. But the Data transfer limit is still the disadvantage for anyone who is using citycell zoom although they provide a good data rate. A recent introduction of the Zoom service through prepaid and postpaid has got the attention of the people although I couldn’t be that impressed with the offer. It is some thing like how we used dial up internet. The cost is something like 80 paisa/minute during the peak, 60 p/min during the off peak and 25p/min during the super off peak. To me, the per minute price is very high compared to other facilities of the internet. http://www.citycell.com

Warid is claiming that they have introduced EDGE service throughout the Dhaka city along with some other cities. But the speed is very poor ( I have checked it). Besides there claim is not true as I found EDGE network of WARID only covers only Gulshan, Banani and parts of Uttara although the speed is nothing better than normal GPRS speed ( never more than 5-6 KB). However, Warid has introduced unlimited internet for a monthly payment of 1000 taka (1150 including VAT) for its postpaid customers. Prepaid customer still don’t have anyother option rather than 2p/1KB that is 20 taka per mega byte data transfer. http://www.waridtel.com.bd/portal/page?_pageid=133,249890&_dad=portal&_schema=PORTAL

Aktel is also testing its Edge network and many people saw Edge network through their mobile phone (Some mobile set can differentiate between EDGE (E) and GPRS (G) netrwork). And some of them said they got good speed using Aktel’s internet service. If Aktel can provide EDGE it will be a very good tariff for mobile phone unlimited internet users because Aktel only charges 750 taka (without VAT) per month for unlimited usage. http://www.aktel.com/?module=32

Banglalink is still far behind in this race offering unlimited internet for the enterprise solution users (for 600 Taka) and 2p/KB for prepaid users. What positioned them behind is that they haven’t started EDGE network yet not even in a single area. http://www.banglalinkgsm.com/html1/gprs.php
I almost forgot about Teletalk, the only nation owned mobile phone operator. For quite a long time teletalk is not in the frame. I don’t know how is it doing but I don’t think they are at any sort of good condition. They are still carrying the tarrif for their Customers. Ofcourse Teletalk is the first operator to introduce unlimited internet facility for any prepaid users. Their tariff is still same as before which they started with (800 taka + VAT). http://www.teletalk.com.bd/services/gprs.html

Dhaka Phone has a flat rate offer of 30 paisa per minute. I have used the internet and the speed was pretty good (around 12-16 kilobytes per second).

National Phone provides unlimited internet usage for 1200 taka per month. They provide quite good data transfer rate (12-16 kilo bytes per second). They have some other time band packages too as well as 25 paisa per minute flat rate.

Ranks Telecom offers various packages for both its post paid and prepaid users.

Package 1 (Prepaid Only)
Search 10am – 5pm Tk. 0.75/ min
5pm -10pm Tk. 0.50/ min
10pm – 10am Tk. 0.25/ min
Window No Use No Pay Tk. 1/ MB
Package 2 (Post Paid Only)
Pointer(Super) 3 GB Unlimited Tk 1/ MB 1000 /-
Pointer 1 GB Unlimited Tk. 1/ MB 800/-
Messenger 500 MB Unlimited Tk. 1/ MB 350/-
Download Unlimited 10 pm-8 am Tk. 1/ MB 400/-
Window Unlimited N/A N/A Tk. 1/ MB

3G and WiMaX technology will soon emerge in Bangladesh, and therefore we can predict a boost in the data service by the telecom operators. Let’s wait for the golden days………..

Hasibul Islam

The article is also available at-    http://community.nsuers.com/showthread.php?t=3346

Search Engine Optimization ( Part-3)

As the Internet dependency for getting information trend is widening everyday, optimizing your site is also becoming important. It’s obvious that you would like to see your site’s link in top position for your site’s relevant searches in the Search Engines like Google, Yahoo or others. Most search engines employ methods to rank the results to provide the “best” results first. Because, Search Engine users like to go through only first few links in the result page. Therefore, it is also important to know some techniques used by the search engines and tweaking your site as per search engines techniques.

The White Hat SEO are the methods which are according to how search engines allow you to optimize. White hat advice is generally summed up as creating content for users, not for search engines, and then making that content easily accessible to the spiders, rather than attempting to trick the algorithm from its intended purpose. White hat SEO is in many ways similar to web development that promotes accessibility.

On the other hand, Black Hat SEO are methods which might bring you some desired improved result but are not approved methods by the search engines. Search engines may penalize sites they discover using black hat methods, either by reducing their rankings or eliminating their listings from their databases altogether. Such penalties can be applied either automatically by the search engines’ algorithms, or by a manual site review.

Greyhat SEO tactics are those which have some genuine use however are subject to abuse by unethical SEOs and webmasters. Again there is a chance that search engines may penalize for implementing some of grey hat SEO tactics.

However, the following are some of the tactics of White Hat, Black Hat and Grey Hat SEO:

Black Hat SEO Tactics:

  • Keyword Stuffing

This is probably one of the most commonly abused forms of search engine spam. Essentially this is when a webmaster or SEO places a large number of instances of the targeted keyword phrase in hopes that the search engine will read this as relevant. In order to offset the fact that this text generally reads horribly it will often be placed at the bottom of a page and in a very small font size. An additional tactic that is often associated with this practice is hidden text which is commented on below.

  • Hidden Text

Hidden text is text that is set at the same color as the background or very close to it. While the major search engines can easily detect text set to the same color as a background some webmasters will try to get around it by creating an image file the same color as the text and setting the image file as the background. While undetectable at this time to the search engines this is blatant spam and websites using this tactic are usually quickly reported by competitors and the site blacklisted.

  • Doorway Pages

Doorway pages are pages added to a website solely to target a specific keyword phrase or phrases and provide little in the way of value to a visitor. Generally the content on these pages provide no information and the page is only there to promote a phrase in hopes that once a visitor lands there, that they will go to the homepage and continue on from there. Often to save time these pages are generated by software and added to a site automatically. This is a very dangerous practice. Not only are many of the methods of injecting doorway pages banned by the search engines but a quick report to the search engine of this practice and your website will simply disappear along with all the legitimate ranks you have attained with your genuine content pages.

  • Redirects

Redirecting, when used as a black-hat tactic, is most commonly brought in as a compliment to doorway pages. Because doorway pages generally have little or no substantial content, redirects are sometime applied to automatically move a visitor to a page with actual content such as the homepage of the site. As quickly as the search engines find ways of detecting such redirects, the spammers are uncovering ways around detection. That said, the search engines figure them out eventually and your site will be penalized. That or you’ll be reported by a competitor or a disgruntled searcher.

  • Duplicate Sites

A throwback tactic that rarely works these days. When affiliate programs became popular many webmasters would simply create a copy of the site they were promoting, tweak it a bit, and put it online in hopes that it would outrank the site it was promoting and capture their sales. As the search engines would ideally like to see unique content across all of their results this tactic was quickly banned and the search engines have methods for detecting and removing duplicate sites from their index. If the site is changed just enough to avoid automatic detection with hidden text or the such, you can once again be reported to the search engines and be banned that way.

  • Interlinking

As incoming links became more important for search engine positioning the practice of building multiple websites and linking them together to build the overall link popularity of them all became a common practice. This tactic is more difficult to detect than others when done “correctly” (we cannot give the method for “correct” interlinking here as it’s still undetectable at the time of this writing and we don’t want to provide a means to spam engines). This tactic is difficult to detect from a user standpoint unless you end up with multiple sites in the top positions on the search engines in which case it is likely that you will be reported.

Grey-Hat SEO Tactics:
The following tactics fall in the grey area between legitimate tactics and search engine spam. They include tactics such as cloaking, paid links, duplicate content and a number of others. Unless you are on the correct side of this equation these tactics are not recommended. Remember: even if the search engines cannot detect these tactics when they are used as spam, your competitors will undoubtedly be on the lookout and report your site to the engines in order to eliminate you from the competition.
It is definitely worth noting that, while it may be tempting to enlist grey-hat and black-hat SEO tactics in order to rank well, doing so stands a very good chance of getting your website penalized. There are legitimate methods for ranking a website well on the search engines. It is highly recommended that webmasters and SEO’s put in the extra time and effort to properly rank a website well, insuring that the site will not be penalized down the road or even banned from the search engines entirely.

  • Cloaking

There are times when cloaking is considered a legitimate tactic by users and search engines alike. Basically, if there is a logical reason why you should be allowed to present different information to the search engines than the visitor (if you have content behind a “members only” area for example) you are relatively safe. Even so, this tactic is very risky and it is recommended that you contact each search engine, present your reasoning, and allow them the opportunity to approve it’s use.
Arguably, another example of a site legitimately using cloaking, is when the site is mainly image-based such as an art site. In this event, provided that the text used to represent the page accurately defines the page and image(s) on it, this could be considered a legitimate use of cloaking. As cloaking has often been abused, if other methods such as adding visible text to the page is possible it is recommended. If there are no other alternatives it is recommended that you contact the search engine prior to adding this tactic and explain your argument.
There is more information on cloaking on our black-hat SEO tactics page.

  • Paid Links

The practice of purchasing link on websites solely for the increase in link-popularity that it can mean has grown steadily over the last year-or-so with link auction sites such as LinkAdage making this practice easier. (You can read more about LinkAdage on our SEO resources page.
When links are purchased as pure advertising the practice is considered legitimate, while the practice of purchasing links only for the increase in link-popularity is considered an abuse and efforts will be made to either discount the links or penalize the site (usually the sellers though not always).
As a general rule, if you are purchasing links you should do so for the traffic that they will yield and consider any increase in link-popularity to be an “added bonus”.

  • Duplicate Content

Due primarily to the increase in popularity of affiliate programs, duplicate content on the web has become an increasingly significant problem for both search engines and search engine users alike with the same or similar sites dominating the top positions in the search engine results pages.
To address this problem many search engines have added filters that seek out pages with the same or very similar content and eliminate the duplicate. Even at times when the duplicate content is not detected by the search engines it is often reported by competitors and the site’s rankings penalized.
There are times when duplicate content is considered legitimate by both search engines and visitors and that is on resource sites. A site that consists primarily as an index of articles on a specific subject-matter will not be penalized by posting articles that occur elsewhere on the net, though the weight it may be given as additional content will likely not be as high as a page of unique content.
White-Hat SEO Tactics:

  • Internal Linking

By far one of the easiest ways to stop your website from ranking well on the search engines is to make it difficult for search engines to find their way through it. Many sites use some form of script to enable fancy drop-down navigation, etc. Many of these scripts cannot be crawled by the search engines resulting in unindexed pages.
While many of these effects add visual appeal to a website, if you are using scripts or some other form of navigation that will hinder the spidering of your website it is important to add text links to the bottom of at least your homepage linking to all you main internal pages including a sitemap to your internal pages.

  • Reciprocal Linking

Exchanging links with other webmasters is a good way (not the best, but good) of attaining additional incoming links to your site. While the value of reciprocal links has declined a bit over the past year they certainly still do have their place.
A VERY important note is that if you do plan on building reciprocal links it is important to make sure that you do so intelligently. Random reciprocal link building in which you exchange links with any and virtually all sites that you can will not help you over the long run. Link only to sites that are related to yours and who’s content your visitors will be interested in and preferably which contain the keywords that you want to target. Building relevancy through association is never a bad thing unless you’re linking to bad neighborhoods (penalized industries and/or websites).
If you are planning or currently do undertake reciprocal link building you know how time consuming this process can be. An useful tool that can speed up the process is PRProwler. Essentially this tool allows you to find related sites with high PageRank, weeding out many of the sites that would simply be a waste of time to even visit. You can read more about PRProwler on our search engine positioning tools page.

  • Content Creation

Don’t confuse “content creation” with doorway pages and the such. When we recommend content creation we are discussing creating quality, unique content that will be of interest to your visitors and which will add value to your site.
The more content-rich your site is the more valuable it will appear to the search engines, your human visitors, and to other webmasters who will be far more likely to link to your website if they find you to be a solid resource on their subject.
Creating good content can be very time-consuming, however it will be well worth the effort in the long run. As an additional bonus, these new pages can be used to target additional keywords related to the topic of the page.

  • Writing For Others

You know more about your business that those around you so why not let everyone know? Whether it be in the form of articles, forum posts, or a spotlight piece on someone else’s website, creating content that other people will want to read and post on their sites is one of the best ways to build links to your website that don’t require a reciprocal link back.

  • Site Optimization

The manipulation of your content, wording, and site structure for the purpose of attaining high search engine positioning is the backbone of SEO and the search engine positioning industry. Everything from creating solid title and meta tags to tweaking the content to maximize it’s search engine effectiveness is key to any successful optimization effort.
That said, it is of primary importance that the optimization of a website not detract from the message and quality of content contained within the site. There’s no point in driving traffic to a site that is so poorly worded that it cannot possibly convey the desired message and which thus, cannot sell. Site optimization must always take into account the maintenance of the scalability and solid message of the site while maximizing it’s exposure on the search engines.

Difference between Dual Core (Core Duo) and Core 2 Duo processors

Intel’s convention of naming its processor series is quite interesting. The first processor of the x86 series was the 8086 processor, then 80186 and then shortened to 286, 386, 486. After 486, Intel rather changed the series name to PENTIUM instead of 586. The march kept continuing with Pentium series like Pentium , Pentium 2 , Intel Pentium 3  and up to Pentium 4. The differences were quite clear. Then Intel introduced The Pentium D is simply two Pentium 4 Prescott cpus inefficiently paired together and ran as dual core.

Core Duo

The Core Duo (generic name for this type is Dual Core) is Intel’s first generation dual core processor based upon the Pentium M (a Pentium III-4 hybrid) made mostly for laptops (though a few motherboard manufacturers have released desktop boards supporting the Core Duo CPU), and is much more efficiently than Pentium D.

Core 2 Duo
The Core 2 Duo is Intel’s second generation processor made for desktops and laptops designed from the ground up to be fast while not consuming nearly as much power as previous CPUs.

There is another great difference between Core Duo and Core 2 Duo. Core Duo operates in 32 – bit where as Core 2 Duo is a 64 – bit Processor.

According to an Intel expert the difference is as follows :

A dual core processor is a CPU with two separate cores on the same die, each with its own cache. It’s the equivalent of getting two microprocessors in one.
Dual core technology refers to two individual microprocessors on a single die cast chip. This is essentially two computer processing units (CPUs) in one. The advantage of a dual core chip is that tasks can be carried out in parallel streams, decreasing processing time. This is referred to as thread-level parallelism (TLP).
TLP is also possible on motherboards that can accommodate two separate CPU dies. When TLP is accomplished in a single CPU through dual core technology, it is called chip-level multiprocessing (CLM).
In dual core CPUs, each microprocessor generally has its own on-board cache, known as Level 1 (L1) cache. L1 cache significantly improves system performance, because it is much faster to access on-chip cache than to use random access memory (RAM). L1 cache is accessed at microprocessor speeds.

The Intel® Core™2 Duo desktop processor delivers revolutionary dual-core performance and breakthrough processor energy efficiency.
Based on the revolutionary Intel® Core™ Microarchitecture, the Intel Core 2 Duo processor has been developed for an increasingly multimedia-centered, high-definition world, and is designed to do more in less time.
Intel Core 2 Duo processors operate at lower frequencies while producing higher performance compared to today’s higher frequency processors, thus enabling quieter and smaller desktop PCs.

Therefore we can conclude like this:

Core Duo vs Core 2 Duo

2 Core in a Single chip 2 Core in a single Chip

32 – bit 64 – bit

Consume more power Comparatively less

2 MB L2 Cache 4 MB L2 Cache

First Generation 2nd Generation

I am sure there are more differences, and if you know any of them I request you to share it with us.

Web Analytics – An important section of Web development

Now a days, most of the commercial institutions have their own website which are used in several ways. Some of the commercial websites perform the role of product featuring, order placement and share company information and other details with potential customers. On the other hand some companies run on commercial websites by providing different services to the customers through their websites (eg. yahoo, msn, bdjobs etc). Even personal sites can be a source of revenue earning for individuals ( implementation of google adsense, yahoo publishers, msn AdCenter). Therefore it is very important for any website publisher to understand the usability, visitor characteristics and effectiveness of different sections of their websites.

Web Analytics is the study of the usability or effectiveness of a website. It actually deals with the data collected from a website to determine which aspects of the website work towards the business objectives. Data collected almost always includes web traffic reports. It may also include e-mail response rates, direct mail campaign data, sales and lead information, user performance data such as click heat mapping, or other custom metrics as needed.

There are two main ways in which web analytics data can be collected:

  • Log file analysis
  • Page Tagging

Log File Analysis:

The web servers has some application software where information for the hosted websites are stored. For example, linux servers have cPanel and windows servers have Plesk control panels where there are tools for analyzing website traffic, bandwidth transfer, landing pages, referral pages, requested files and etc etc. This reports can be collected in daily basis or even monthly basis to analyze the visitors, most viewed sections/files/forlders/sub domains, emails, unique visitors, visitor’s IP addresses, geographical location of the visitors and even errors occurred during browsing.

Page Tagging:

This method uses JavaScript on each page to notify a third-party server when a page is rendered by a web server. Concerns about the accuracy of logfile analysis in the presence of caching, and the desire to be able to perform web analytics as an outsourced service, led to this data collection method. The web analytics service also manages the process of assigning a cookie to the user, which can uniquely identify them during their visit and in subsequent visits. With the increasing popularity of Ajax-based solutions, an alternative to the use of an invisible image, is to implement a call back to the server from the rendered page. In this case, when the page is rendered on the web browser, a piece of Ajax code would call back to the server and pass information about the client that can then be aggregated by a web analytics company. This is in some ways flawed by browser restrictions on the servers which can be contacted with XmlHttpRequest objects.

There are advantages and disadvantages of both the methods but both are equally important and are used in different web analytics processes depending upon necessity. Even there are some web analytics program which implements both the methods together as a hybrid method. There is another method which are not widely used now a days which integrates the web analytics program into the web server, and collecting data by sniffing the network traffic passing between the web server and the outside world.

Web Analytics are often necessary for internet advertising and promotion which involves Search Engine Marketing ( SEM ) and Search Engine Optimization ( SEO ). I hope to write more on the advantages and disadvantages of the Web Analytics methods and try to share something regarding SEO and SEM also.

This article is also available at : http://community.nsuers.com/showthread.php?p=102627#post102627

Search Engine Optimization ( SEO – Part2)

I remember I wrote an article in this blog on the same topic. I tried to illustrate the importance of Search Engine Optimization ( SEO ). The knowledge and information is spreading through Internet several times quicker than any other mean. And people are getting more and more dependent on information search using Internet. Internet is infact making a bridge between the information seeker and publishers. This is why it is equally important to know how to reach the information seeker as well as to know how to get desired information. If any one wants to draw more and more attention to his/her site he/she should provide the relevant information with adequacy and also make a proper plan to reach the right people. Therefore, I believe that the most important thing for a successful website is to be rich in terms of content or information. It really doesn’t matter that much if your site is on top of the search result, unless there are plenty of things which will attract people to get back to your site at a later time. The more the contents (the more the keywords) the more it is likely to be searched and viewed by the people. So I will conclude here saying that increase the amount with diversified information, the search engines are waiting to link those to the people.

BTTB will become a Govt. owned Public Limited Company- BTCL

Bangladesh’s council of advisors has agreed in principle to approve draft legislation to convert state-run national PTO Bangladesh Telegraph and Telephone Board into a public limited company, nearly four years after the process was initiated. The Ministry of Posts and Telecommunications must resubmit the proposal to the advisory council for final approval by 30 April after completing further formalities and vetting by the law ministry. Under the draft bill, the state-owned BTTB will become a government-owned public limited company named Bangladesh Telecom Company Ltd (BTCL). Its wholly owned mobile subsidiary, Teletalk Bangladesh Ltd, will remain a subordinate company under separate management. The proposed company will have a nine-member board with the telecoms secretary as its chairman and the company’s managing director as member-secretary.

In April 2004 former Prime Minister Khaleda Zia approved proposals to turn BTTB into a public limited company with financial autonomy under the Companies Act of 1994. In September 2005 the government appointed German firm DeTeCon International as consultant for restructuring BTTB, but the project remains unfinished. DeTeCon prepared marketing and business plans for the new company but was unable to complete the crucial task of evaluating its assets and liabilities.

Source : http://www.telegeog raphy.com/ cu/article. php?article_ id=22020&email=html