Posts

Last Journey

Image
  I am sitting inside the Duaripara cemetery. It's about three o'clock at night. There are two dead bodies in front of me. One is a Hindu dead body, the other is Muslim. I wish I could smoke in this extreme cold. As I am inside the graveyard, that’s why I am sitting quietly thinking that it should not be right.  

May all Labonno be happy

Image
  All friends are busy on their own. Almost everyone is employee somewhere in any office, so it is difficult to get together. Even on Friday, everyone has different household chores. But today we, some old folks, suddenly met. We started gossiping and chatting at the tea shop next to the Pallabi bus stand. Two friends have brought their wives. One of my friends is carrying his second son on his lap. I am the only one unmarried.

Rahul’s Interview

Image
(1) “Mr. Rahul, You impressed us. We like you” - Thank you, sir. “You studied in a poor government funded university, not from any elite private university. Your academic results, though fairly standard, but your out-knowledge is outstanding.” - Okay, sir. “Tell us, how much salary do you want?” The age of this man of interview board may be ten years older than me. Soft smell of chewing gum is coming out from his mouth. - Ten thousand dollars sir.

Big fish eat small fish

Image
In the fictional country Wadiya, Mr. "A" keeps a stylish haircut. Then using "Administrative Power", local Police Chief or local Government official Mr. "B" gave him a Military haircut like his own. After some days, mad minister Mr. "C" enters office, and as he is bald - that's why using "Ministerial Power" he shaved everyone's head. After some days of this incident, Military seized power by a coup. Then Military Chief and self declared clean-shaven President Mr. "D" shaved all Sunnah beard, Che Guevara beard, and Devdas beard using "Military Power".   Short Story: "Big fish eat small fish"  Author: Tawhidur Rahman Dear   রূপকথার দেশ ওয়াদিয়া-য়   জনাব "ক" স্টাইল করে চুল রাখল। তখন "প্রশাসনিক ক্ষমতাবলে" এলাকার ওসি বা ইউ.এন.ও জনাব "খ" সেই চুল কেটে নিজের মত আর্মিছাট দিয়ে দিল। কিছুদিন পর পাগলা মন্ত্রী জনাব "গ" ক্ষমতায় আসল , এবং উনার নিজের মাথায়

Plants that repel snakes, dog, mouse, mosquito, fly and other insects

Image
There are some common plants everywhere surrounding us which can repel snakes, dog, mouse, mosquito, louse, bed bug, fly and other insects. This article will help you to know about these types of 20 plants.

Most popular and well-known plants for healthier environment

Image
Everyone needs fresh air to live a healthy life, but maximum areas are cursed with poisonous gases from factories, cars, coal & gas based power plants, brick-making industries etc. According to the World Health Organization (WHO), 4.6 million people lose their lives to air pollution-related diseases each year.

How to learn English easily?

English is now global language. ​ You like it, or dislike it – you can’t escape from it. If you don’t know English beside your mother language, you won’t be able to walk in a parallel way with others.

Rebuilding of Ram Temple

Babur conquered India few hundred years ago, and started to rule as Mughal Emperor.   He was a Muslim by faith. Babur demolished Hindu shrine “Ram Temple”, and constructed a mosque in its place which became known as “Babri Mosque”. Although there was enough land to build mosque in whole India. Even there was enough space surrounding that Hindu shrine. So, definitely the decision to destroy shrine was only communal. 

Blood Relative

W hy are we not using the power of internet to find fresh blood at the moment of crisis? We have some databases of more the one billion people. We will just integrate these with apps. 

New Search Technique

Although major Search Engines have been trying to improve algorithm. But many times Search Engines are showing irrelevant results. Black Hat SEO specialists are responsible for this. They are using tricks like Keyword Stuffing, Hidden Text, Doorway Pages, Scraper Site, Article Spinning, Link-building Software, Link Farms, Hidden Links, Sybil Attack, Spam Blogs, Page Hijacking, Buying Expired Domains, Cookie Stuffing, Forum Spam, Cloaking etc. So, alternative methods are proposed here, which should be available beside conventional Search Engine. 

Jerusalem is not the holy place for Muslims

The main reason of Israel vs Palestine conflict is the interest to occupy the whole 'Temple Mount' which is the holiest place of Jewish. Temple mount is situated in Jewish controlled Jerusalem where caliph Umar built so called Al-Aqsa Mosque violating the order of Allah, but the mosque is now under the control of a Muslim Waqf. Another part of Muslims believe that 'Great Mosque of Kufa' located in Iraq is the real 'Al-Aqsa Mosque'. 

Standard dimension for monitor and photo

We are using monitor for different purposes: mobile screen, computer, television etc. But there is no fixed dimension or ratio. Simply think about a mobile phone monitor. Sometimes it is too large or sometimes it is too small. As the manufacturers failed to reach agreement, we are being harassed for this. Both users and website/applications developers are being disturbed. Here a standard dimension for monitor is proposed. Remember, it is the dimension of screen, not of device. And all screens must be of 3:2 ratios.  All video recordings, TV channel broadcast, movie making etc. will follow 3:2 ratio.

OpenID's advantages, disadvantages, solution and up-gradation plan

To use fingerprint as password is the final solution against security threat on Internet. Before making it possible 'mobile phone code verification' system and 'OpenID login' are the alternatives. OpenID provides the opportunity to enter a website with the help of another website without ID & password. For example, you are logged in to Google, now go to www.mail.yahoo.com and click on 'Sign in with Google' icon; you will be able to log in to Yahoo without id/password. To make it possible, you will have to connect one Google account to one Yahoo account only for one time.

New Method for Online Registration

When a website admin tries to get an email account or social networking page matched to his or her domain (or person’s name or business’s name) but fails as someone else has chosen that username already. If any person or organization named ‘xyz’ want to get a specific username blank in every email service and social network for branding, then radical reform is required for current registration process. There are more problems here. A lot of people have the name of more than two, three or four words. For example, Colombian pop star Shakira’s official nick name is ‘Shakira’ and official full name is ‘Shakira Isabel Mebarak Ripoll’. Former Secretary of State of USA Hillary’s full name is ‘Hillary Rodham Clinton’. Everyone does not have the name of two words only that they will use the method of ‘First name- Last name’ at the time of registration. Sometimes organizations are signing up registration forms; they do not have first name or last name. Even, they do not have birth date but esta

Best way to avoid Spam Call and Email

Often we receive disturbing calls or sometime we do not like to get call from unknown caller. Some telecom corporations and specially some Chinese mobile set manufacturer provide the option of 'call block service', which blocks incoming calls from some specific numbers. Users need to list the numbers in blacklist. But how many numbers we can list there? It does not fulfill our demand. Only if they provide 'Call Filter' service, then it will be a more effective solution. 

State of the Art Technology for Twitter, GoDaddy, Paypal, LinkedIn, oDesk, Wikipedia, Everyone, Alexa with Google and Facebook

Who has started the option of Google’s 2-step verification & Facebook’s Login Approval knows that the sms containing verification code of Google delivers instantly but Facebook’s Security code delivers too late (for max 12 hours) at least for 5 to 6 days in a month. If you contact with Telecom company, they will say “Facebook did not pass that to our server” AND if you contact with Facebook, they will say “We have already sent the code to Telecom’s server”. Google has two alternative methods: If sms delivery fails, anyone can collect code by receiving phone call. Beside that they provide Ten “One Time Use – Backup Code”. If Facebook starts these two alternatives like Google then we can log in to Facebook easily.

Construction technique of The Great Pyramid is discovered

The Great Pyramid of Giza (also known as the Pyramid of Khufu) is the oldest and largest of the three pyramids in the Giza Necropolis bordering what is now El Giza, Egypt. It is the oldest of the Seven Wonders of the Ancient World, and the only one to remain largely intact. The Great Pyramid was built over a 10 to 20-year period concluding around 2560 BCE. Initially at 146.5 meters (481 feet), the Great Pyramid was the tallest man-made structure in the world for over 3,800 years. Initially at 146.5 meters (481 feet), the Great Pyramid was the tallest man-made structure in the world for over 3,800 years. There have been varying scientific and alternative theories about the Great Pyramid's construction techniques. The mass of the pyramid is estimated at 5.9 million tonnes. The Great Pyramid  consists of an estimated 2.3 million blocks to have been transported from nearby quarreies carried by boat either up or down the Nile River to the pyramid – believed by most people. The block us

Computer for All

At 21st century, everyone should know how to use computer. Not for a job, not to earn money; it is important to color our life. Everyone does not need to be an expert bur all should know the basic. Now what is the basic for all ? 

Blood Data Bank

[Hello, hope you are well. Here you will get an alternative solution to ensure germ-free blood. If local organizations or clubs, local branches of political organizations, campus organizations, libraries, non-profit organizations implement this idea, then millions of people will be benefited. If you agree with this idea, then hope you will take necessary step to save humanity. Two sample forms are enclosed here with the main article “Blood Data Bank” to help you. If you print the main article back to each form(s) can be used as ‘Form-1/Leaflet’ and ‘Form-2/Policy’ at a time. Thank you, Tawhidur Rahman Dear]