tech support15

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg
Showing posts with label Bayesian inference. Show all posts
Showing posts with label Bayesian inference. Show all posts

Sunday, 20 May 2012

Elliott Wave Principle Re-visited With Computer Trading

Posted on 20:46 by Unknown
I write software. I'm pretty good at it. My strength lies not in streamlined code, but in algorithms. Any code monkey can write code. Most coders today could NOT write an object sorter using recursion and recursion is kiddie scripting in some of the functions that I code.

The real aim of the game is to not to get paid for writing software, but to write software that makes money. A quant is exactly that:

quant

   [kwahnt]
noun
Business Slang . an expert in quantitative analysis.


So, one of the ways to write software to make money, is to develop trading software for stocks, bonds, derivatives and Forex. Everyone has their own proprietary technical analysis trading software but they all start with Weighted Moving Averages and all sorts of statistical charting and apparent correlations that you give signals when to buy and sell.

The great granddaddy of them all is the Elliott Wave Principle. If you don't know what the Elliott Wave Principle is, you can read about it HERE.

A typical Elliott Wave pattern stock price looks like this:


Elliott developed his ideas over 60 some years ago, and I idly wondered if Elliott Wave Patterns were still valid in this day and age of computer trading. Would computer trades at split seconds skew an Elliott Wave pattern if and when they occur? (The reason why I say "if" is that determining the milestones of the Elliott Wave pattern is a very subjective thing. Many technical analysts try to debunk the principle and its adherents swear by it.)

So the burning question is and was: Is there something to the Elliott Wave, and how has computerized trading changed the Elliott Wave, if at all?

To do that, I needed some data, and not just large time domain general data. I wanted data points demarcated by seconds, not days or hours. After all computers trade by the second. So I captured the real live second by second trading of Facebook on its opening IPO where volumes were shattered but the price remained flat.

Here is a sample of that data:


To prevent subjective interpretation, I wrote a computer object -- a model of the wave that was magnitude agnostic (meaning that I was just searching for the pattern and didn't care about the price). One of the biggest problems with the Elliott Wave is interpretation and where does one begin to count for the wave pattern. I let the computer do that for me. If the signal (serial stock price changes) didn't fit the pattern, I advanced to the next data point, and tried again. I have to say that the results were pretty dismal.

Then it struck me -- I needed an "ish" engine on this. I have previously discussed "ish" on this blog. It is a form of fuzzy logic that can ignore the odd outlier whilst still identifying the pattern. I used the ish engine to categorize wildly divergent answer schemes of health surveys in Nigeria. Once I incorporated the ish engine into my model, I started to get many more hits where I did identify the Elliott Wave pattern.

To answer the question of how computerized trading was affecting the analysis principle, I had to collect models of the deviation of the Elliot Wave. The first thing that the ish engine picked up, was that computerized trading injected many more outliers that were in fact intermediate steps in the pattern. From a macro perspective, the Elliott Wave still sort-of resembled the pattern, but on a micro level, the fractal pattern was different, and like fractals, this was carried over onto the larger pattern.

Here is a graphic illustration of the outliers where intermediate steps are introduced into the wave pattern:


Instead of going from 1 to 2, now there is a 1A step inserted into the pattern. This was when I tested for 1 deviation per step.

Then I allowed the computer to test for two deviations per step. Now one can see two outliers as the wave progresses from 2 to 2A to 2B to 3. This is so simple to do when you have a computer object that models the wave and allows for ish or deviation. One can run many many epochs (data sessions) over and over again and change the parameters each time.

If one thinks of the wave as a series of vectors, then one begins to see how a direction vector can be incorporated into the ish engine or fuzzy logic. Let's suppose that Talib is right (and I am sure that he is) and there is a lot more randomness than one suspects. My posit was that computerized trading is responsible for generating the randomness.

When I altered the wave model to accommodate a deviation in the direction of the vector component in the wave, the computer came up with a model that was topless:



So, I now had models that the computer had saved. The next step was to assign Bayesian Probabilities to each model. The first injection of Bayesian probability was for predictive effect. Based on where I was at the moment, what magnitude and direction of the price vector would happen next? Then I determine the probability of which overall model that it will fit. From there one can make larger price determinations. Incidentally, no-fit is also an outcome in this model, where there simply isn't a pattern.

What's the next step? The next step is to introduce artificial intelligence multi-layer perceptrons as a fall-through model to analyze the price signal in real time. Then the perceptrons keep correcting themselves based on real time outcomes.

Can this updated algorithm score alpha and make money on stocks, futures, derivatives and Forex? I don't know yet, but I am too busy earning a living to take this to the next step. Are there any fund managers out there willing to fund a research project with the updated Elliott Wave coupled to fuzzy logic, artificial intelligence and Bayesian Inference?

Read More
Posted in Artificial Intelligence, Bayesian inference, computer trading algorithm, Elliott Wave, Multi-Layer-Perceptrons, quant | No comments

Wednesday, 10 August 2011

The End of the Line for the Business Intelligence Cube?

Posted on 04:19 by Unknown
I was deep in conversation with a tech-savvy epidemiologist at a dinner party. He is a physician who is the head of an NGO (non-government organization) with offices in various countries on a few continents. He happened to mention that he had over a million record sets that needed data-mining in a very specific way.


His organization had ascertained that the easiest way to convey epidemic data to policy makers was via a 'weather map' where the geographic areas that were in the greatest danger would progress from green to yellow to red when a full blown epidemic developed. To that end they created a data-mining tool for reports. However there was one major flaw with the tool. It could only show results after the fact and didn't perform predictions. Predictions are important for epidemiologists.


I suggested that what his data mining gizmo needed was a Bayesian Inference Engine. Bayesian Inference principles are used for logical inference and prediction on imperfect data sets. A Bayesian operation takes historical data, and calculates the probabilities of a number of events of happening when their predecessor events have taken place. Bayesian inference is a tool in the arsenal of artificial intelligence. It is the perfect tool for running predictions on evolving data. In an epidemic situation, data evolves rapidly. One cannot wait until it is all said and done to run the analysis.


I described to my medical friend how one would make a real time inference engine. Before any row of data is inserted into a database, an inference factory instantiates an inference object. The inference object is used to either look up the probabilistic meta-data for the permutations and combinations of the columns in the row of data (it examines each data dimension) and recalculates the inferential probability with the input of the new data. The output is filtered and deposited into a results table.


Then the thought struck me, that if this function was built into the database engine, there wouldn't be a lot of need for business intelligence cubes that require vast amounts of ETL (Extract Transfer and Load) data dimensioning, data marts and obscure SQL statements the size of a novel.


All of the data would be digested in real time, and mined and refined in one shot. The inferential factory in the database engine would calculate in real time on every data insert, and various filters would be defined for reporting.


With the exabytes and exabytes of data that we are generating, this could be one way of handling the tsunami of data without being overwhelmed by it. And IBM would be awfully sorry that they bought Cognos Business Intelligence Cube software.


Read More
Posted in Bayesian inference, Business Intelligence Cubes, Handling large amounts of data | No comments

Tuesday, 21 June 2011

Who Was At The Computer -- Solving a Whodunnit

Posted on 05:22 by Unknown
I was idly watching some of the Casey Anthony murder trial being streamed on the Internet. She is charged with brutally disposing of her bothersome two-year-old child who was impinging on her party life.

One of the expert witnesses was an ex-police officer turned geek who wrote the program called "Cache Back". What the program does, is recover the browser cache of the web history after it has been deleted. He discovered that the browsing history contained terms like "chloroform" and how to kill people.

The defense lawyer stands up and tells the computer expert that there is no way that he could tell who was at the keyboard when the queries were made. The computer expert had to agree. Well, if they had geekazoids like me, there is away to state the probability of who was sitting at the computer.

Consider the following equation:



This equation is the basis of Bayesian inference. It is one of the keystones of data analysis and artificial intelligence. A quick explanation of the terms is as follows:

  • H represents a specific hypothesis, which may or may not be some null hypothesis.
  • E represents the evidence that has been observed.
  • P(H) is called the prior probability of H that was inferred before new evidence became available.
  • P(E | H) is called the conditional probability of seeing the evidence E if the hypothesis H happens to be true. It is also called a likelihood function when it is considered as a function of H for fixed E.
  • P(E) is called the marginal probability of E: the a priori probability of witnessing the new evidence E under all possible hypotheses.
The theory behind this concept is the idea of querencia. When people log onto a computer, they usually follow a core of usual, habitual persistent URLs. They check their email, Twitter and Facebook page, and then perhaps check the weather or news or such.

So in this methodology to determine who was sitting behind the computer for a particular history, one examines the whole history. One finds the sequences where there is no doubt of the supposed user in question. This could be determined by the URL of a Facebook page or email.

Then one assembles a statistical model of the URL web pages visited, and calculate the variance from the Venn set of URLs as well as the deviation from the usual pattern.

By calculating probabilities from the browsing model, one can then take an unidentified set and using Bayesian inference, determine whether that user had the probability of being the unidentified user.

This is by no means a smoking gun of proof, but it can add one more piece to a circumstantial change of evidence. It can answer the question of "Who was using the computer" with a degree of probability.

This would also be a useful system in a corporate environment to determine what users had breached company policy in visiting banned websites.
Read More
Posted in Bayesian inference, determining user behind browser history, who was at the computer | No comments
Older Posts Home
View mobile version
Subscribe to: Posts (Atom)

Popular Posts

  • C# .NET Textbox GotFocus Event
    When one Googles to find out sample code for a C# .Net textbox gotFocus() event, the first few search results are not that explicit.  So wit...
  • Mechanized Attack Detection Algorithms
    I was on a CNN sub site and they were talking about security and threat of attack. One of the types of attacks that they were profiling, wa...
  • More Reasons Why To Quit Facebook and LinkedIn
    Man, I am looking smarter and smarter every day for quitting Facebook and LinkedIn. Can you imagine that your credit rating will suffer for...
  • Exception in thread "Thread-0" org.eclipse.swt.SWTException: Invalid thread access
    So you are getting your feet wet with Java SWT and you are having trouble updating your UI while you are doing some heavy processing.  Perha...
  • Is Android Safer Than iOS for Mobile Banking?
    First of all, total disclosure:  I am a registered Apple, Android and Nokia developer.  I have no real preferences.  There are good and bad ...
  • Java Networking
    I have this issue where I need to know the IP address or some identifying part of a computer.  Using Java, I came across the class of java.n...
  • It's Time -- A New Plug-in Filter for Browsers Needed
    I am starting to get a little ticked off at how much data is being collected on me when I surf the internet. Websites often ask for authent...
  • Classmates.com -- Another MySpace in the Making?
    A few years ago, I signed up on Classmates.com. I did it out of pure curiosity to find out where my peers in high school ended up. I enrol...
  • IE Users are Stupid, and Microsoft Knows it.
    (Click on the pic to make it larger) I have several email accounts. One of them is Hotmail. When I sign out of Hotmail, I usually land in ...
  • Facebook -- Dead Man Walking
    A couple of years ago, it would have been heresy to say that MySpace was irrelevant. It is now a ghost of what it was, and it IS irrelevant....

Categories

  • .avi
  • .Net
  • .wmv
  • [ERROR] /usr/share/mysqld: Out of memory (Needed xxx bytes)
  • activity with webview
  • ad
  • ads
  • adsense
  • Advanced UX
  • advertising how-to
  • algorithms
  • amazon
  • amenities
  • analysis
  • analyzing emotions in speech
  • android simulator
  • Anonymous email
  • anti-terrorist in cyberspace
  • apache
  • app
  • Apple
  • Apple Developer Site Down
  • apps
  • apps listing
  • arraylist
  • arraylist of arraylists
  • Artificial Intelligence
  • Arvind Bhatia
  • assholes
  • Avira
  • Aviva Premiership
  • background color
  • Bahamas
  • baidu
  • bait and switch
  • bash
  • basics
  • Bayesian inference
  • best blogging software
  • best free mobile web template
  • best iso image burner
  • Best Practices
  • best remailer service
  • big brother
  • big data
  • binaries
  • black hole net
  • blackhat SEO
  • block ip addresses
  • blog comments
  • blog design
  • Blogger
  • blue screen
  • bogus
  • Bombing
  • book covers
  • bookmark
  • Boston Bombing
  • Boston Marathon
  • browser
  • browser plugins
  • browser wars
  • browsing history
  • buddhist of the binaries
  • bug
  • Build 7600
  • Business Intelligence Cubes
  • C Sharp
  • c#
  • C# .NET Textbox GotFocus Event
  • cable
  • call center software
  • Camden Hughes
  • Can not issue data manipulation statements with executeQuery()
  • can't see Android Device
  • cannot upload image
  • Carl Jung
  • Casey Anthony
  • Caylee Anthony
  • censorship
  • changing revenue paradigms
  • charging
  • check LinkedIn Password
  • China
  • chinese investments
  • Chinese Search Engine
  • Chrome
  • chrome extensions
  • classes folder empty
  • classmates.com
  • clear on focus
  • clearmeter.com
  • click and clear input
  • closure
  • CNN
  • combating terrorism
  • comm.jar
  • comm3.0_u1_linux
  • command line
  • compiled
  • computer trading algorithm
  • computer virus
  • conciousness
  • connection pool
  • connection pooling
  • conspiracy theories
  • consulting
  • content analysis
  • content management systems
  • convert avi to dvd
  • convert dvd to avi
  • convert Gregorian Calendar to DateTime using Timestamp
  • converting Twitter followers to web hits
  • cookie monster
  • coolutils.com
  • copyright dispute
  • corrupt data
  • crap software
  • crash
  • create iphone app
  • css
  • current datetime
  • cyberspace counter terrorism
  • dark knight
  • dark web
  • Data Cleansing
  • data mining
  • data privacy
  • Data Refinery
  • data storage
  • datamining
  • date
  • date time manipulation
  • day trader
  • day trading
  • daytrader
  • daytrading
  • dead batman
  • dead man walking
  • decline of desktop
  • declining membership
  • delete database duplicates
  • delete duplicate rows
  • derek medina wife photo
  • determining user behind browser history
  • develop iPhone apps
  • developer
  • Developer website
  • development
  • dialog
  • dialog won't open
  • dictionary of apps
  • difference
  • digital buddha
  • disconnect.me
  • discountApp browser hijack
  • divx codec
  • Divx codec pack
  • DNA and information storage
  • DNSChanger Malware
  • do not track plus
  • domain name
  • domain name works
  • double quote
  • Download jfaces jar
  • drop Image
  • dumb ass
  • Dummies Guide to UIX
  • dvd
  • Eclipse
  • eCommerce
  • editor
  • Effective ways of fighting SPAM
  • Elliott Wave
  • end application
  • ePublishing
  • ereader
  • error
  • escape ampersand
  • Escape Key
  • exam for software developer
  • example
  • excel
  • Excellent
  • Exception in thread "main" java.lang.NoClassDefFoundError:
  • EXP/CVE-2012-0507
  • exploit
  • extreme software techniques
  • extreme UX
  • Facebook
  • facebook fair valuation
  • Facebook fatigue
  • facebook ipo
  • Facebook stock
  • facebook true share price
  • facebook true stock price
  • fail
  • failing
  • failure
  • fake traffic hits
  • faking domains
  • fast forward button for browser
  • fault tolerance
  • file splitter
  • file too big for email
  • find apps
  • Firewall Rules
  • firmware embedded in DNA
  • fly-half
  • Form not visible in task bar
  • format telephone number
  • formula doesn't work
  • forums
  • free
  • free email
  • free file splitter
  • free iso burner
  • free template
  • freedom of speech
  • frozen
  • funny
  • fuzzy class
  • fuzzy logic
  • Galaxy
  • geek gossip
  • gerard depardieu
  • get date from timestamp
  • get minutes
  • get remaining minutes between two dates
  • get rid of characters in a number
  • get rid of unwanted characters
  • ghostery
  • gmail
  • good stuff
  • google
  • google ads
  • Google Chrome
  • Google Chrome Browser Blocker
  • Google Circles
  • Google Image Search
  • Google+
  • gramlets
  • great stuff
  • GSM modem
  • hacked
  • hacked LinkedIn Password
  • hackers
  • Handling large amounts of data
  • Hard disk corruption
  • hardware
  • hashtag
  • hot trends
  • how computer games will evolve in the future
  • how do copy a form
  • how google image search works
  • how to build an iphone app
  • how to deal with spammers
  • how to develop iphone app
  • how to duplicate a form
  • how to get a company website quickly
  • how to get rich by writing apps
  • how to get venture capital
  • how to give users an anonymous number
  • how to make an effective online ad
  • how to redirect
  • how to see directory
  • how to send mail with linux
  • how to validate
  • html
  • html input
  • html input tag
  • html tag
  • html tags
  • human garbage
  • hunting terrorists through technology
  • I/Choreographer (xxxxx): Skipped 60 frames! The application may be doing too much work on its main thread.
  • icefaces
  • IDE
  • IE users stupid
  • IE9
  • if browsers were guns
  • imperfect clues
  • In order to select an image from your online storage
  • increase maximum number of open files
  • increase mysql memory size
  • inexact computing
  • innovative uses
  • intelligence test
  • interest engine
  • interesting problem to solve
  • Internet
  • Internet explorer
  • Internet Explorer 10
  • Internet Explorer 8
  • Internet Privacy
  • invalid server's version String Tamirsharpssh
  • investing
  • Invoke or BeginInvoke cannot be called on a control until the window handle has been created
  • iOS
  • iOS 7.1 beta
  • iOX
  • IP addresses for Iran
  • iPad
  • iPhone
  • iphone app
  • iphone apps development
  • ipo
  • is facebook dying
  • is the google search engine concious
  • IT
  • it consulting
  • it jobs
  • java
  • java 8
  • java.lang.ClassNotFoundException:
  • java.lang.UnsupportedClassVersionError: Unsupported major.minor version 51.0
  • java.sql.SQLException: After end of result set
  • java.util.date
  • javascript
  • javax.servlet.ServletException: java.lang.UnsupportedClassVersionError Unsupported major.minor version 51.0
  • JdbcOdbcDriver.finalize() line: not available
  • JNDI
  • job test
  • join three tables
  • JSF
  • jsp
  • Julianne McCrery
  • Jungian view of the computer
  • keylistener
  • kill application
  • killer robot
  • kindle
  • Kyron Horman
  • lamda
  • laptop
  • launchrock.com
  • learn to program
  • Leicester Tigers
  • libmysqlclient.a
  • Linkedin
  • linking interests to content
  • linux
  • list directories
  • localhost
  • login
  • login before proceeding to page
  • looking for work
  • Mac
  • macbook Pro
  • mail
  • mailer
  • make iphone app
  • making money with photoshop
  • malware
  • malware protection
  • man on roof
  • Mandelbroatian math
  • mango
  • Mark Zuckerberg
  • massively parallel systems
  • Mathematical Modeling Regression
  • mechanized attack detection
  • Merry Christmas
  • meta tag
  • micro programs
  • microsoft
  • microsoft codec
  • microsoft codec doesn't work
  • microsoft is crap
  • microsoft spam tabloid national enquirer
  • Microsoft sucks
  • Minimum Viable Product
  • missing data
  • missing information
  • mistakes
  • mobifreaks.com
  • mobile
  • mobile web tags
  • moderator
  • monetization
  • monetize social media
  • monetizing social media
  • most popular Browser
  • most popular Operating System
  • mothers who kill
  • mouse
  • mouse is dead
  • movie files
  • Multi-Layer-Perceptrons
  • mute button for browser
  • myevent.com
  • myspace
  • mysql
  • mysql client
  • mysql error
  • navigate
  • needed. Structure Query Language
  • network interface
  • Neural Nets
  • new paradigm
  • new SQL functions
  • New Version of Xcode available
  • Nigerian Scam
  • no black screens
  • nokia
  • nokia developer
  • nokia website hacked
  • non-cloud cloud
  • non-compatible
  • nook
  • numbers game
  • OCR
  • offshore software development
  • old technology
  • online
  • open source
  • org.apache.catalina.loader.DevLoader
  • org.eclipse.swt
  • out of memory
  • pages unresponsive
  • parallel computing
  • parallel executables
  • parameter
  • partnership
  • pattern recognition
  • PDF to Word
  • pee on a plane
  • Perfect Web Page
  • performance analysis rugby
  • Perils of Python
  • phone
  • PhotoResize400.exe
  • photos
  • photoshop
  • PHP
  • picture
  • please sign in
  • plugin
  • predictions
  • predictive analysis
  • preventing hack attacks from the Middle East
  • privacy
  • privacy concerns
  • privacy policy
  • problems
  • problems with Microsoft
  • product review
  • programlets
  • programmers in paradise
  • protect yourself
  • punch clock
  • python programming language
  • quant
  • quit facebook
  • quit linkedin
  • Randi Zuckerberg
  • RapidShare
  • RapidShare.com
  • readability
  • real life
  • real UIX
  • reddit
  • redirect
  • refresh
  • remailer
  • rename
  • resize
  • rest in pieces
  • revenge
  • review
  • rise of mobile
  • risks
  • rocketmail
  • roller
  • rough order of magnitude
  • round number to nearest 100
  • row_count()
  • rugby
  • rugby analysis
  • rugby performance
  • RugbyMetrics
  • rules engine
  • running PHP on Tomcat
  • sabermetrics
  • sabremetrics
  • sample
  • Samsung
  • samsung galaxy usb device not recognized
  • satellite
  • scam
  • scan
  • schedule
  • scouting
  • scouting tools
  • script
  • scum of the earth
  • scumbag
  • Search Engine
  • security
  • Seed
  • select results into a file
  • select tag
  • semantic web
  • send email anonymously
  • send sms
  • sendmail
  • SEO
  • serial port
  • server hangup
  • set select
  • set the select of a combo box
  • sharp
  • sharpssh
  • shell
  • shift in consulting
  • show line numbers
  • silicon
  • SIM car
  • single quote
  • skype
  • skype crashes xp
  • skype is crap
  • skype virus
  • sms
  • sms spam
  • social media
  • soft censorship
  • software
  • software algorithm required
  • software bug
  • software emotionally aware
  • software in bugs
  • software job
  • software to capture emotion
  • Solve a tricky problem
  • sony
  • source code
  • spam
  • spammers
  • split a .war file
  • split war file
  • spreadsheet
  • spying on the internet
  • spywal
  • SQL
  • sql tip
  • ssh
  • SSL connection error
  • standard
  • start process at specific time
  • start-up web presence
  • startup
  • startups
  • statistic problem
  • statistics
  • stock manipulation
  • stock price
  • story
  • string
  • string error
  • strip out characters from a number
  • subtract dates
  • sucks
  • sunset
  • Surface
  • SWT
  • Tablet
  • tech support
  • technical test
  • technical trading
  • technology
  • template
  • ten things to get venture capital
  • Terri Horman
  • text spam
  • The best anti-virus
  • The Fastest And Slowest Emails among the big free providers
  • The feature you requested is currently unavailable. Please try again later.
  • the first noble truth
  • The Future of Online Games
  • the ish function
  • the menu supervisor
  • The most effective way to generate hits
  • the next big thing
  • the next big thing in computing
  • The Real Social Network
  • the zen of software development
  • thin slicing
  • This Copy of Windows is not genuine
  • thread
  • Thread: java.net.SocketException: Too many open files
  • thumb-driven menus
  • time comparison
  • Timestamp
  • tip
  • to front
  • toby flood
  • today comparison
  • today() function
  • tomcat
  • tomcat won't start
  • too old for IT job
  • top secrets of the admasters
  • toshiba
  • Toshiba Laptop Mouse Won't Work
  • total privacy
  • totally distributed software
  • tracking cookies
  • traffic faker
  • trends
  • true stock price
  • true value of facebook stock
  • Turing Test
  • twitpic
  • Twitter
  • twitter follow back
  • ubuntu
  • UIThread
  • UIX
  • UIX for Dummies
  • ulimit Hn Sn
  • Ultimate Web Page Design
  • Ultra data privacy
  • unavailable
  • Uncaught ReferenceError: $ is not defined?
  • Uncaught SyntaxError: Unexpected token ILLEGAL
  • unemployed
  • unmoderated
  • update
  • update UI
  • Upgrading SQL
  • url
  • usability
  • usb
  • usb modem
  • User Experience
  • User Interface Experience
  • validating data
  • valuation
  • variable
  • vi
  • video
  • viewing
  • vim
  • vimeo
  • virus
  • Virus domain
  • visual comparison
  • Visual studio
  • vpn connection
  • Walmart
  • war file
  • warning
  • Warren Buffett
  • web page development tip
  • web-based email
  • website doesn't work
  • website errors
  • website traffic
  • Webview
  • Western Digital SmartWare Review
  • what the chinese are searching for
  • where facebook stock will end up
  • who was at the computer
  • Windows 7
  • Windows 8
  • Windows Tablet
  • won't build
  • won't turn off
  • won't turn on
  • word filtering
  • www doesn't work
  • xcode tutorials
  • xhtml
  • Yahoo
  • yahoo copies gmail
  • yahoo mail
  • You have logged out from another location. Do you want to log in again
  • youtube
  • амперсанд

Blog Archive

  • ▼  2013 (82)
    • ▼  November (8)
      • Blogger -- Image Upload Headaches with Google Chrome
      • Nigerian Spammers Now Using RapidShare
      • Tech Support Story
      • Are You Too Old For IT? Repost From Information Week
      • For all of you Apple Developers out there
      • Using the Android Simulator Webview, with Localhos...
      • New XCode Seed Available for Apple Developers
      • Another Google Software Bug on Blogger
    • ►  October (18)
    • ►  September (10)
    • ►  August (10)
    • ►  July (11)
    • ►  June (9)
    • ►  May (2)
    • ►  April (6)
    • ►  March (6)
    • ►  January (2)
  • ►  2012 (115)
    • ►  December (9)
    • ►  November (4)
    • ►  October (15)
    • ►  September (8)
    • ►  August (14)
    • ►  July (12)
    • ►  June (14)
    • ►  May (19)
    • ►  April (12)
    • ►  March (4)
    • ►  February (2)
    • ►  January (2)
  • ►  2011 (59)
    • ►  December (2)
    • ►  October (1)
    • ►  September (8)
    • ►  August (6)
    • ►  July (8)
    • ►  June (10)
    • ►  May (13)
    • ►  April (11)
Powered by Blogger.

About Me

Unknown
View my complete profile