1 "TAKE NO AS A QUESTION "

Friday, 30 August 2013

5 ways to effectively achieve your goals

5 ways to effectively achieve your goals

5 ways to effectively achieve your goals
ET finds out five ways to achieve one’s goals.

To succeed in any profession or life it is very important to have an itinerary, which starts with goal setting, charting out a plan of action and staying motivated to achieve the goal within a stipulated timeframe.
1. Goal setting
The first step towards achieving a goal is to identify a clear goal on the basis of one’s strengths, interests and priorities in life and setting a timeframe to achieve the final outcome.
“Primary thing is about defining outcome with complete clarity and articulating your goal, whether it is career goal, financial goal or anything else,” says Ramesh Mitragotri, chief people officer, Aditya Birla Retail.
2. Develop workable strategy
Once the goal is set, the next step is to develop a clear strategy and initiate action.
“The strategy should be workable where you should neither over-estimate nor underestimate your capability and opportunities,” says Daisy Chauhan, associate professor, Organizational Behaviour at MDI, Gurgaon.
Also, the first step to set the plan of action rolling is very important.
3. Identify possible roadblocks
Achieving a goal becomes easier and faster when you are able to identify the impediments.
“It is generally seen that we only find impediments in the way to goal achievement in factors external to us. But some of the major impediments in the way of our progress are our own self-limiting beliefs about our self and our potential,” says Chauhan.
4. Review progress and stay focused
Once action has been initiated one must review the progress periodically in terms of quality, quantity and timeliness.
“Time to time review of the progress is important,” says Mitragotri.
Also, despite having a sound plan of action a goal could fall through the cracks if there is lack of focus and commitment.
“You got to commit to yourself and you will succeed,” says Sandeep Batra, AVP-HR, Fujifilm India.
5. Accept failures and move ahead
One should be open enough that mistakes could happen and should not get bogged down by failures but instead learn from those mistakes and forge ahead to the planned outcome.
“Learn from your mistakes and be flexible to change course if needed,” says Mitragotri.
Chauhan suggests that it is important to draw up a back-up plan to avert a crisis or set back in the process of goal achievement.
Source: The Economic Times
- See more at: http://content.timesjobs.com/?p=8465&fromsite=toi&utm_source=toi&utm_medium=referral&utm_campaign=toi-tj-whitelabel#sthash.PtqG4d8K.dpuf



Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


‘Entry level candidates need to develop skills around mobile computing and analytics’

Interview of the day: ‘Entry level candidates need to develop skills around mobile computing and analytics’

Interview of the day: ‘Entry level candidates need to develop skills around mobile computing and analytics’
Sumit Sood, vice president, Middle East and Asia, Virtusa Corporation

Basics of tech talent strategy
Attitude: Since our industry has gone through a boom time over the last decade and a half, there has been a sense of complacency or in other words dos and don’ts have seeped in from the workforce perspective.
Aptitude: It becomes important because technology is changing at such a rapid pace that each one of us has to unlearn the past and learn something new constantly. For example: technology professionals learn something completely new in every 18-24 months, the moment the old ones become redundant.
Innovation: Being able to help clients innovate better or optimise their operations better. The whole idea is how to apply the current technologies for the betterment of any business.
Required skills
Entry level: Baseline skills like JAVA J2EE, mainframe technologies, .NET. What’s becoming more and more important is to develop additional skills such as mobile computing, analytics and intelligence, cloud computing technologies, etc.
Mid-level: A lot of mid level managers are not well equipped with emotional quotient (EQ). They might be great project managers or expert in communicating with their clients, but often their EQ is lacking. These managers are the ones who manage the employees on a daily basis, so without adequate EQ it becomes a challenge.
Senior-level: The ability to partner with clients – not someone who’s delivering what he has been asked to, but someone who is also assessing what’s happening in the client’s business. The more one develops a relationship with the client, the more they understand the specificity of their business and as a result offer solutions for any given problem.
-          Expertise in the client’s business domain
-          Know about the emerging technologies
-          Avenues that are getting created for the application of the latest technologies
-          Strong communication and ability to build bridges
Ways to retain tech talent
Entry level: Career mapping is the key thing here. Focusing on the freshers to map out their careers is very crucial to retain right talent. Industries should stop treating freshers are commodities; help create leaders within the company.
Mid-level: Giving proper recognition, recognising potential, giving them opportunity to start on things where they have potential and not what they are already doing.
Senior level: Making these employees realise their net worth towards value creation and company’s growth; helping them to identify their impact on the company’s overall development; giving them increasing opportunities to get recognised outside the firm.
Recruitment challenges
Technical foundations that are laid down by educational institutions are very good. But it takes some effort to convert that foundation into business readiness. Key challenge is to bridge that gap in colleges.
There aren’t too many graduates who are rolled out of colleges with right soft skills. Given the globalisation of the industry, they are expected to visit clients in public forums or on other occasions and these graduates are not ready to do the necessary talking.
It’s absolutely crucial to understanding work culture, writing effective emails, work around building appropriate communication skills, business etiquettes, etc.
Importance of training & development to retain top tech talent
Providing relevant training (project management, time management); creating an avenue for self-learning time.
- See more at: http://content.timesjobs.com/?p=8474&fromsite=toi&utm_source=toi&utm_medium=referral&utm_campaign=toi-tj-whitelabel#sthash.k1W5IpAM.dpuf



Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Drinking too much water can be risky


Drinking too much water can be risky


Drinking too much water can be risky
Drinking too much water can be risky (Thinkstock photos/Getty Images)

Excessive water in your system can dilute your body fluids so much that the sodium levels become life-threateningly low
.

Water may be the elixir of life, but it sure can send your health into a tailspin, even endanger your life, if you drink too much of it. While packaged water, juice and cola companies hard-sell their thirst-quenchers to you through TV and print advertisements, the truth is that drinking too much water can do you more harm than good.

Due to excessive water consumption, people have died of over-hydration, which goes by the name of Exercise-Associated Hyponatraemia (EAH). In simple terms, it means that you have drank too much water and the excess has diluted your body fluids so much that the sodium levels have become life-threateningly low, causing cells to swell. That includes brain cells leading to loss of consciousness, seizures and even coma and death. For long-distance runners, this can be a particular hazard. With half-marathons and marathons being all the rage, runners while practicing must resist the temptation to tank themselves up with too much water.

Water intoxication is always on the cards if you believe you have to 'stay ahead of thirst' by drinking excessive quantities of fluids. To do so is entirely un-physiological. Drinking more water than you need increases your total blood volume and also pressures you kidneys into working overtime so as to filter excess water out of your circulatory system. It is, however, incredibly rare for someone to die of dehydration in a temperate climate, not even sportsmen who sweat a great deal.

The right way to drink water is on your TV screen. When Tennis legends Roger Federer or Rafael Nadal play five gruelling sets of tennis in the baking sun, sweating profusely, how do they drink? They sip. They may sip at every end change, but they certainly don't gulp. While exercising, you should balance how much water you drink to how much you are sweating out.

All runners should know that over-consumption of fluids, whether it's water or sports drinks, can be fatal. EAH due to excessive hydration has caused at least a dozen deaths worldwide and there have been more than 1,600 documented cases of it around the globe.

The International Marathon Medical Directors Association advocates 'drinking to thirst' and no more. That means 0.03 litres per kilogram. So, for a 100 kg person that's a maximum of three litres. The average man is around 70 kgs. Work out the math. Five reasons to kick the cola

1. You will flash a prettier smile. The sugar and acid in soft drinks dissolves tooth enamel while the colouring in darker fizzy drinks leaves dark stains on teeth.

2. You will reduce your risk of heart disease. The high fructose corn syrup (HFCS) in many soft drinks increases the risk of developing heart disease and diabetes.

3. You will reduce your risk of osteoporosis. The phosphoric acid found in soft drinks can loosen a tight bolt, eat away metal, and leach calcium from the bones.

4. You will reduce your risk of diabetes. The connection between excess sugar consumption and type 2 diabetes is well-known.

5. You will stabilise blood sugar and energy levels. Simple sugars, the most harmful of which are HFCS, are carbs that cause a rapid energy spike followed by a sudden plummet. Adding caffeine, a cola essential, intensifies this roller-coaster effect.


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Nokia 515 feature phone with aluminium body launched


Nokia 515 feature phone with aluminium body launched


Nokia 515 feature phone with aluminium body launched
Nokia's feature phone portfolio has got a new addition, Nokia 515. The all-new Nokia 515 has been built from a single piece of anodized, sandblasted aluminium. Source: press.nokia.com

NEW DELHI: Nokia's feature phone portfolio has got a new addition, Nokia 515. The all-new Nokia 515 has been built from a single piece of anodized, sandblasted aluminium.

The feature phone features a 2.4-inch QVGA display with 240x320 pixels and boasts a pixel density of 166ppi while also possessing the scratch resistant Corning Gorilla Glass 2 for protection. It measures 114x48x11mm and weighs 101.1gm for single SIM and 102.7 gm for dual-SIM variant. The phone comes with 64MB RAM and an internal memory of 256 MB which can be expanded up to 32 GB via microSD card.

Nokia 515 has a 5MP rear camera with LED flash. The phone also offers some smart features like voice-guided self-portrait for taking self-shots with the rear camera, Sequential shots and Panorama.

In terms of connectivity options, the Nokia 515 offers Bluetooth, EDGE, GPRS, Micro-USB and 3G, but no WiFi. It supports Micro-SIM instead of the regular SIM. The phone supports 3.5G HSDPA internet and also comes with some pre-loaded apps like Facebook, Twitter, Nimbuzz and Mail for Exchange that allows users people to check work email and sync their calendars and contacts.

The phone is slated to be available in two versions of single and Easy Swap dual-SIM.

The Nokia 515 would be rolling out globally in September into markets like Russia, Germany, Switzerland and Poland. It will have a suggested retail price of $149 before taxes and subsidies.

In India, the dual version of the phone is expected to hit the market as it has been listed on the company's India website. There is, however, no confirmation of the phone's price and availability
.


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Twitter introduces 'report abuse' button


Twitter introduces 'report abuse' button


Twitter introduces 'report abuse' button
Twitter has introduced a 'report tweet' option for users who are targeted with threatening and abusive messages on the popular social networking site.

NEW DELHI: Twitter has introduced a 'report tweet' option for users who are targeted with threatening and abusive messages on the popular social networking site.

The report button had already been introduced for mobile phone users, but is now available across all platforms, including desktop websites, The Independent reported.

The move has been hailed by the hundreds of thousands of campaigners who had called for the social network sites to take action against threatening and abusive users.

Classicist and television historian Professor Mary Beard, Guardian columnist Hadley Freeman, Independent columnist Grace Dent and Europe editor of Time magazine Catherine Mayer had been targeted along with a number of other women on the social media site.

They received bomb threats, while two of them were warned they would be raped by users of the site.The threats led to a public outcry for action from the microblogging site to introduce measures that would protect users.

The feature of report abuse has already been available in the iOS app and now these features would be made available on the other platforms as well.

Twitter has introduced another significant feature called 'Blue Line' to highlight conversations in the timeline.

Twitter's desktop, iOS and Android versions would now have 'conversations' between the people who follow each other, linked with a thin blue line. The line will appear at the bottom of profile pics.

Twitter made the announcement in an official blog post on Wednesday while stating that "Tweets that are part of a conversation are shown in chronological order so it's easier for you to follow along. You'll see up to three Tweets in sequence in your home timeline; if you want to see more, you can tap a Tweet to see all the replies, including those from people you don't follow."

Twitter has also improved the app for entry-level Android smartphones with limited storage, such as the Samsung Galaxy Y, HTC Explorer, Micromax Bolt, etc. For these devices, the Twitter app has now been made less than half the previous size, making it much faster to download and easier to install
.


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Tough economic situation for India: PM

Tough economic situation for India: PM




NEW DELHI: Under sustained opposition attack in Parliament over rupee's free fall, Prime Minster Manmohan Singh on Thursday conceded that the country was facing a "difficult" economic situation and had to reckon with the uncertainties triggered by global factors, including US monetary stance.

He will come out with his elaborate response on the 'difficult economic situation' in both Houses on Friday. "It cannot be denied that the country is faced with a difficult economic situation. There are several causes. I do not deny that there are some domestic factors but there are also international factors arising out of the changes in US monetary stance," Singh said in Rajya Sabha.

Responding to members' demand seeking his statement on the issue, the PM said, "There are also problems created by the new tensions that are on the horizon in Syria and they have inevitable consequences for oil prices. So, we have to reckon with all those uncertainties. I need some time to reflect on what I have to say, but I would be quite happy to make the statement tomorrow."



Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Thursday, 29 August 2013

How to recover your lost or stolen phones, tablets, and other devices



How to recover your lost or stolen phones, tablets, and other devices

Technology is increasingly the target of crimes, but it can also be used to fight back against the perpetrators.


Your camera is stolen. Drag an image you shot with the device into a Web page and a free service searches popular photo sites for other images taken with the camera. If the thief posted a picture taken with the camera to his or her personal account, he or she is busted.
Your laptop, smartphone, or tablet is stolen. Sign into your Dropbox or Gmail account and look for the most recent IP address used when accessing the account. If the service is set to log in to the account on startup, or if the thief tries to access your Dropbox or Gmail account, his or her IP address will appear there. Take the information along with the police report of the theft to the police and the robber's ISP will identify the crook.
These are just two examples of tools available to the victims of crimes that can assist them in retrieving their stolen items. In some cases, the devices were merely lost and the finders may need some help (or encouragement) to return the products to their rightful owners.
There's plenty you can do before, during, and after you lose a Web-connected device to increase the chances the gizmo will find its way back to you.
Before it goes missing, capture the model and serial numbers
The key to recovering lost or stolen electronics is to know their pertinent digits -- in this case, their model and serial numbers. If you file a police report for stolen equipment, the form will ask for this information, and having the serial number makes it much easier to reclaim your property.
If you have a homeowners or renters insurance policy, you've probably been instructed to photograph your valuable personal property. When snapping shots of your computers and other electronics equipment, you're better off capturing the bottom or back of the device -- wherever the model and serial numbers are located -- than the top or front.
If your stuff goes missing before you've had a chance to grab any ID numbers, all is not lost (or stolen). My wife chides me for holding onto the boxes for the electronics I purchase. I tell her it's because I may have to return the device if it turns out to be defective, but the box also has the product's model and serial number printed on it. Even if you don't need to keep your receipts for tax purposes, the sales slips also have the products' model and serial numbers.
Put your contact info in a prominent location
Make it easy for someone finding your phone, tablet, or laptop to return it by placing a contact e-mail address or telephone number on the product's lock screen. You do use a lock screen for all your portable devices, right? Losing your hardware is tough enough. You don't want to make matters worse by giving thieves or less-than-honest finders access to your personal data. The few seconds a day it takes to enter passcodes is time well-spent.
One of the tips in my post from last September titled "How to lock down and find Android and Windows phones" explained how to add contact info on an Android phone's lock screen. The post "How to prevent phone and tablet theft" described the process of using an image with your contact info as your lock-screen wallpaper.
If you haven't already, make sure you install a find-my-device app for your phone or tablet. My post from August 2011 titled "Keep your iPad data safe" covered the free Find My Phone app for iPhones and iPads. Last September's post on locking and finding Android and Windows phone described the remote-find feature built into Windows phones, which is tied to your Windows Live account. One of the products I reviewed earlier this month in "Essential free productivity apps for Android tablets" Is Lookout Mobile Security, which lets you locate a lost Android device. Google recently released the Android Device Manager that helps you track down missing Android phones and tablets.
An open-source alternative for tracking laptops, phones, and tablets is the free Prey program, which is available for Windows, Mac OS, iOS, Linux, and Android devices. After you download the app to your computer or device, it stays hidden in the background. The program uses the device's GPS or the nearest Wi-Fi hotspots to determine its location.
Prey can establish a connection to the nearest open Wi-Fi access point if it can't find an Internet connection. You may be able to take a picture of the thief with the device's camera or capture a screenshot of the active session to grab the crook's Facebook or e-mail sign-in. (Note that I haven't tested the product; this information is from the developer's site.)
During a robbery, make like Chili Palmer
If you find yourself in the unfortunate circumstance of being robbed, the consensus of law enforcement is to do as the robber asks. No iPhone is worth risking serious injury over. You can help the police by noting any distinguishing characteristics of the thief.
According to a profane Craigslist post by a New York City police officer, the things to note are sex, clothing, color, clothing type, headware, and direction of flight. The officer emphasizes that you should call the police as quickly as possible. Considering that you probably just had your phone stolen, this may not be so easy. I can't remember the last time I saw a functioning payphone, let alone used one. Look for a restaurant, grocery store, or bar nearby, or ask a bystander if you can use his or her phone to make the call.
Be as precise as possible when you give the 911 operator your location, but keep in mind it will probably take several minutes for the police to arrive. Once they do, channel Sgt. Joe Friday of the LAPD (showing my age) and stick with the facts. Resist the temptation to whine or complain. Provide as much accurate information as you can for the police report. Don't even think about not filing a police report if you have even a glimmer of hope of retrieving your lost items or collecting on an insurance claim.
Should you ever discover that your home or business has been robbed, first make sure you don't surprise the burglars. Some experts advise that you exit immediately and call the police, and don't enter at all if you see a door or window has obviously been forced open. In any event, don't start tidying up or otherwise disturb the scene any more than safety dictates. You may wipe out some useful clues for investigators.
Tools and techniques for getting your stolen stuff back
On the other hand, the police are pretty busy and may not have time or resources available for much -- or any -- investigating. In addition to using a locator app, you can register your electronic devices and other valuables with the free Immobilize national product registry and its companion services, the CheckMEND and Trace databases of items reported stolen.
The Trace database of stolen items
After you register your electronics and other valuables at the free Immobilize site, they'll be added to the Trace database of stolen items to prevent their resale and help police find and return them.
(Credit: Screenshot by Dennis O'Reilly/CNET)
Start by creating an inventory of your property at Immobilize (which is also available in the UK asImmobilise). If you're the victim of a robbery, report the crime to the police and your insurance company. Immobilize issues a "certificate of ownership" intended to facilitate filing a claim or identifying your property when it's recovered.
Next, report the stolen items to the Trace and CheckMEND services that police, second-hand sellers, and the public use to identify products reported as lost or stolen. Should one of their checks turn up an item of yours, it will be easy for them to contact you, and you'll have the information you need to reclaim it.
Another option for reporting lost and stolen items is the Stolen Register, a worldwide database of misplaced property. Stolen Register lets you enter a serial number, model number, or other identifying information in a search box and retrieve matching items from its product database.
Stolen Register product search
Before you purchase a second-hand item, enter its serial number or other ID in the Stolen Register to make sure the product hasn't been reported lost or stolen.
(Credit: Screenshot by Dennis O'Reilly/CNET)
You can search for items by type, whether reported lost or stolen, by time, and by location, including proximity to your current location (within 10 miles or 50 miles). Stolen Register uses your Facebook name and e-mail address to identify you; when you sign up, Facebook indicates that the service is also asking for access to your friends list and profile, but Stolen Register claims this is due to Facebook's sharing procedure.
When you report a lost or stolen item on Stolen Register, you can provide a description along with its serial number and other identifying information. The service lets you upload a photo of the product and plot where it was lost on a Google Map. After you register your property you can view a list of the items you've reported lost.
A popular outlet for thieves selling stolen goods is Craigslist. To facilitate searching the site for someone selling your lost or stolen property, enter the product info in Stolen911.com's Craigslist searcher. Enter a make and model in the service's custom Google search box and it scans the Craigslist for-sale listings for matching items. A benefit of Stolen911.com's custom search is that it scans ads in all geographic locations, not just in your vicinity.

After you register with the free site, you can list the items you've lost to have them added to Google search results. (The service appears to be preparing a premium version that promises more prominent placement in search engines and the ability to add more attention-getting elements to your listings.)
Long before there was Craigslist or any other second-hand online emporium, there were pawn shops. Pawn-shop operators are usually adept at spotting stolen merchandise someone tries to pawn by using stolen-property tracking services such as those described above.
There's still a chance your misplaced valuables could wind up hocked by the thief or finder. Pawn shops generally don't display items right away and instead wait a certain period before offering them for sale. After all, the products are technically on loan and redeemable by repaying the "loan."
If you make the rounds of local pawn shops and spot what may be one of your possessions, it may not be a good idea to stake your claim to the item right away. On the InfoBarrel site, Harold J. Forbes recommends that you act interested in the property, ask the shop to hold it for you, and then contact the police -- with your police report in hand -- to ask for their assistance in retrieving the merchandise.
According to Forbes, the item will then be impounded by the police as evidence. You'll have to prove you own it in a court property hearing, and only then will you be able to claim it from the police impound.
ID thieves who upload images they took with your lost or stolen camera
The metadata attached to many digital images includes serial number data stored in Exchangeable Image Format (EXIF) tags. The CameraTrace service scans images that have been uploaded to popular photo-sharing sites and matches them to its camera database, which the service claims has more than 11 million cameras, and counting.
CameraTrace promises to work with local law enforcement agencies to help you retrieve your lost or stolen camera. It can also be used to enforce image copyrights. Note that the service works only with cameras that embed their serial numbers in the EXIF tags. It offers one free scan and charges $10 per camera thereafter.
Locating a lost or stolen camera with the free StolenCameraFinder open-source service is a drag-and-drop affair: drag a photo you've taken with the camera into your browser and drop it in a box on the site's home page. You can also select an image in Windows Explorer or Finder.
StolenCameraFinder's drag-and-drop image-tracing service
Find a lost or stolen camera by tracing it based on its image fingerprint to other photos the theft/finder has posted on the Web.
(Credit: Screenshot by Dennis O'Reilly/CNET)
If you don't have a photo taken by the camera, search for its posted images by entering the camera's serial number. StolenCameraFinder doesn't support images taken with iPhones or other smartphones. The service works only with JPEGs, ideally ones that haven't been edited or downloaded from the Web, both of which can alter the image's EXIF data. Also, Facebook strips out the EXIF data from images uploaded to the site, according to StolenCameraFinder.
Here's looking up your old IP address
If your lost or stolen computer, tablet, or phone is set to sign into your Dropbox or Gmail account automatically, or if the thief or finder signs into the account, you can identify the person by logging into either service and accessing the IP address of the most recent access.
As Ben Popken reported in the Consumerist back in March 2011, a Dropbox user signed into his account from another computer after his laptop was stolen and realized the thief's IP address was captured by the service when the crook powered up the laptop. The victim provided the police with the IP address, which can be used to identify the perpetrator through his or her Internet service provider.
Dropbox most-recent-activity popup
Find the IP address used the last time your Dropbox account was accessed via the account's security settings.
(Credit: Screenshot by Dennis O'Reilly/CNET)
To access your recently used IP addresses in Dropbox, sign into the account at Dropbox.com, choose the account name in the top-right corner, and click Settings. Select the Security tab and look for "Most recent activity" in the "Web sessions" section. Hover over the entry to have the date, time, and IP address appear in a popup window.
The same goes for Gmail: if the person who absconded with your computer or device signs into your Gmail account or it's set to start with the computer, you can view the IP address used to log in by opening your Gmail account from another computer or device, scrolling to the bottom of the page, and choosing Details under "Last account activity" in the bottom-right corner.
Gmail account access activity log
Find a log of your Gmail account accesses by clicking Details under "Last account activity" at the bottom of the main window.
(Credit: Screenshot by Dennis O'Reilly/CNET)
The Gmail activity log shows the browser or device used, the location and IP address, and the date and time. The log also indicates whether there are other active sessions for the account and provides a button for signing out of all other sessions.
Take the IP address and your police report to your local police station and ask for their help in retrieving your property.
In a future post, I'll look at ways to use Facebook, Twitter, and other social media to respond to a theft and to help combat other crimes. Until then, keep making note of those serial numbers!










































































































































































































































































































Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


HTML Comment Box is loading comments...
MARUTHU Copyright@2014. Powered by Blogger.