Boloji.com - Computing SignUp
Boloji.com

Channels

In Focus

 
Analysis
Cartoons
Education
Environment
Opinion
Photo Essays
 
 

Columns

 
A Bystander's Diary
Business
Random Thoughts
 
 

Our Heritage

 
Architecture
Astrology
Ayurveda
Buddhism
Cinema
Culture
Festivals
Hinduism
History
People
Places
Sikhism
Spirituality
 
 

Society & Lifestyle

 
Health
Parenting
Perspective
Recipes
Society
Teens
Women
 
 

Creative Writings

 
Book Reviews
Computing
Ghalib's Corner
Humor
Individuality
Literary Shelf
Love Letters
Memoirs
Quotes
Stories
Travelogues
Workshop
 
 
Computing


Meet Sophia: The First Walking Talking Machine by Sujata C   

Tech and Society - I by Subhajit Ghosh   

How do We Feed Intelligence into a Machine? by Subhajit Ghosh   

How is AI programming Different from Traditional Programming? by Subhajit Ghosh   

What is Intelligence? by Subhajit Ghosh   

Girls by Dipankar Dasgupta   

Three More Flash Fictions by Dipankar Dasgupta   

Three Flash Fictions by Dipankar Dasgupta   

Faux Pas by Dipankar Dasgupta   

I’ll Wear My Smartglasses Today by Sujata C   

Computer Games Can Make a Child Attentive by Sujata C   

The World in a Grain of Sand by Sujata C   

The Digital Industrial Age is Here by Sujata C   

Man vs Machine – The Uneasy Link by Sujata C   

Nightmarish Frontier of Computer Hacking Ahead by Dr.Ratan Bhattacharjee   

Technological Enhanced Knowledge by Ananya S Guha   

Home Automation! Is it really moving from concept to execution? by Kalakad Ganapathy   

The World at your Finger Tip: Bane or Boon? by G Swaminathan   

Face-lift? Try Facebook :) by Nikhil Sharda   

Safety Tip for Networking Socially - Free Advise by Nikhil Sharda   

How to Post your Blog on Twitter and Facebook by Priyanka Bhowmick   

How to Make your Blog Look Stunning by Priyanka Bhowmick   

Downloading the Rupee Symbol by Priyanka Bhowmick   

Handling of Character Strings - 2 by Sachin Mehta   

Handling of Character Strings by Sachin Mehta   

User Defined Functions by Sachin Mehta   

User Defined Functions ... continued by Sachin Mehta   

Handling of Functions by Sachin Mehta   

Arrays by Sachin Mehta   

Increase your Computer's Heartbeat: Add RAM to it by Ruchi Gupta   



A New Beginning by Ashwin Acharya   

Actions by Ankur Kamthe   

All The Music, Half the Cables: Laptops as Stereo Sets by Verena Wolff   

An Introduction to Computer Networking by Deepak Chandrasekaran   

Are you Safe on Network? by Ruchi Gupta   

Arrays by Sachin Mehta   

Arrays and Overloading in Java by Deepak Chandrasekaran   

Arrays Multi-Dimensional by Sachin Mehta   

Backing Up Your E-mail: Don't Make it Optional by News    

Before you Install Red Hat Linux 6.1 by Ashwin Acharya   

Bluetooth by Ruchi Gupta   

C/C ++ by Sachin Mehta   

Changing Technologies by Ruchi Gupta   

Cluster Computers by Subhajit Ghosh   

Common Misconceptions About Java by Neeraj Mathur   

Computer Games Can Make a Child Attentive by Sujata C   

Computer Network – Basics by Deepak Chandrasekaran   

Conferencing Era by Najma Khan   

Configuring X-Windows - 1 by Ashwin Acharya   

Configuring X-Windows - 2 by Ashwin Acharya   

Core Wars or the Journey from Single to Multi-core Processors by News    

Creating Buttons by Ankur Kamthe   

Data Backup to Avoid Disasters by Ruchi Gupta   

Decision Making And Branching by Sachin Mehta   

Decision Making and Branching (if statement) by Sachin Mehta   

Decision Making And Looping by Sachin Mehta   

Downloading the Rupee Symbol by Priyanka Bhowmick   

Emerging Technologies for Parents by Ruchi Gupta   

Environmental Impact of IT by Subhajit Ghosh   

Face-lift? Try Facebook :) by Nikhil Sharda   

Faux Pas by Dipankar Dasgupta   

Fills And Gradients by Ankur Kamthe   

First Java Application by Deepak Chandrasekaran   

Flash and Flaunt it !!! by Ankur Kamthe   

Flash Interface Part 1 by Ankur Kamthe   

Flash Interface Part 2 by Ankur Kamthe   

Girls by Dipankar Dasgupta   

Glossary of TCP/IP Terms by Mayur Kamat   

Goodbye Netscape, and Thanks for All the Fish by Soumya Sarkar   

GPS : Tension Free Driving by Ruchi Gupta   

Hacking by Mayur Kamat   

Handling of Character Strings by Sachin Mehta   

Handling of Character Strings - 2 by Sachin Mehta   

Handling of Functions by Sachin Mehta   

Hard Disk Partitioning by Ashwin Acharya   

Home Automation! Is it really moving from concept to execution?by Kalakad Ganapathy   

Home Genie by Sudeepa Nair   

Hot Tips for Keeping Your PC Cool in Summer by News    

How do We Feed Intelligence into a Machine? by Subhajit Ghosh   

How is AI programming Different from Traditional Programming?by Subhajit Ghosh   

How to Avoid E-mail Threats by Jay Dougherty   

How to Make your Blog Look Stunning by Priyanka Bhowmick   

How to Post your Blog on Twitter and Facebookby Priyanka Bhowmick   

How to Tame Windows Vista by News    

Important Terms & Terminologies by Ashwin Acharya   

Increase your Computer's Heartbeat: Add RAM to it by Ruchi Gupta   

Indian Railway Engineering by Sudeepa Nair   

Indian Space Program by Subhajit Ghosh   

Installing Red Hat Linux 6.1 - 1 by Ashwin Acharya   

Installing Red Hat Linux 6.1 - 2 by Ashwin Acharya   

Installing Red Hat Linux 6.1 - 3 by Ashwin Acharya   

Internet Warfare by Mayur Kamat   

Introduction to HTTP Cookies by Ruchi Gupta   

Introduction to Layers by Ankur Kamthe   

IT : Indian Scenario and the Road Ahead by Subhajit Ghosh   

IT and its usefulness to the Common Man by Subhajit Ghosh   

I’ll Wear My Smartglasses Today by Sujata C   

Java Virtual Machine by Ruchi Gupta   

Java – Man, Not Again by Neeraj Mathur   

JAVA: A Beginner's Guide by Deepak Chandrasekaran   

Kak Worm - An Internet Virus by Mayur Kamat   

Layer One of OSI ModelPhysical Layer by Deepak Chandrasekaran   

Lilo by Ashwin Acharya   

Linux – Let's Be Different by Ashwin Acharya   

Man vs Machine – The Uneasy Link by Sujata C   

Managing Input-Output Operations by Sachin Mehta   

Managing Output Operations by Sachin Mehta   

Meet Sophia: The First Walking Talking Machine by Sujata C   

Melissa by Mayur Kamat   

Molecular Computers by Subhajit Ghosh   

Motion Guides by Ankur Kamthe   

Nightmarish Frontier of Computer Hacking Ahead by Dr. Ratan Bhattacharjee   

Now Laptops with Flash Memory May Signal End of Hard Disk Drives by News    

Objects and Classes by Deepak Chandrasekaran   

Online Backups: Easier, Faster, Safer by News    

Oops… I did it Again! by Deepak Chandrasekaran   

Optical Interconnects – System on a Chip by Saurabh Kumar   

OSI Model and TCP/IP Model by Deepak Chandrasekaran   

Penguin at the Window: Linux as an Alternative to Vista by News    

Port Scanners by Mayur Kamat   

RATS by Mayur Kamat   

Recovery Tools: Emergency Helpers for Data Crashes by News    

Remote Admin Tools by Mayur Kamat   

Restarting your PC by Jay Dougherty   

Robots in Human Life by Ruchi Gupta   

Router: An Introduction by Ruchi Gupta   

Safety Tip for Networking Socially - Free Adviseby Nikhil Sharda   

Search Engines Technology Behind Searching by Ruchi Gupta   

Secure Socket Layer Online Data Security by Ruchi Gupta   

Security: A Futile Endeavor! by Mayur Kamat   

Should You Build Your Own PC? by News    

Smart Wi-Fi by Ruchi Gupta   

Software Testing by Ruchi Gupta   

Statements & Expressions by Deepak Chandrasekaran   

Subseven – Beware of this one! by Mayur Kamat   

Symbols by Ankur Kamthe   

Symptoms of Virus Infection by Mayur Kamat   

Talking Computers by Subhajit Ghosh   

TCP/IP – The Entire Net Runs On A Set of Rules by Mayur Kamat   

Tech and Society - I by Subhajit Ghosh   

Techies' Wish List for 2007 by Jay Dougherty   

Technological Enhanced Knowledge by Ananya S Guha   

Technologies that Don't Disappoint by Jay Dougherty   

Telnet by Mayur Kamat   

The Anatomy of A Computer Virus by Mayur Kamat   

The Computer Helper: Mastering My Documents by News    

The Computer Helper: Signs of Spyware by News    

The Computer Helper: Taming Your Pesky PC by News    

The Digital Industrial Age is Here by Sujata C   

The DO Statement by Sachin Mehta   

The Drawing Toolbar by Ankur Kamthe   

The Right Technology for India by Sudeepa Nair   

The Steps for clicking e-Commerce by Dwarika Prasad Uniyal   

The World at your Finger Tip: Bane or Boon? by G Swaminathan   

The World in a Grain of Sand by Sujata C   

The Worms of the Net by Mayur Kamat   

There are Ways to Recover Damaged Data by Jay Dougherty   

Three Flash Fictions by Dipankar Dasgupta   

Three More Flash Fictions by Dipankar Dasgupta   

Tomorrow's Mobile Phone Will Act as Personal Computer by Jean Baptiste Piggin   

Trojans: The Method of Infection by Mayur Kamat   

Tweening by Ankur Kamthe   

Type of RATS by Mayur Kamat   

Underwater Photography by Subhajit Ghosh   

User Defined Functions by Sachin Mehta   

User Defined Functions ... continued by Sachin Mehta   

Variable Type and Declarations by Deepak Chandrasekaran   

Variables and Strings by Deepak Chandrasekaran   

Version Control System by Ruchi Gupta   

Virtualization by Ruchi Gupta   

Virus Alert & Computer Security by Rajender Krishan   

Viruses – Types and Examples by Mayur Kamat   

VoIP Technology to Cut Phone Bills by Ruchi Gupta   

VPN : An Introduction by Ruchi Gupta   

W95.MTX by Mayur Kamat   

What is Hacking? by Anup Gaurav   

What is Intelligence? by Subhajit Ghosh   

What You Must Do Before You Abandon Your PC by Jay Dougherty   

What You Need to Know about Chrome by News    

Why does Windows get Slower Over Time? by Jay Dougherty   

Wireless Technologies: Voice and Messaging by Ruchi Gupta   

X-Windows by Ashwin Acharya   

Your First Java Applet by Deepak Chandrasekaran   


Top




 
 
 
 
 
 
 
2018 All Rights Reserved
 
No part of this Internet site may be reproduced without prior written permission of the copyright holder
.