• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Archives for Abhishek Ghosh

Articles by Dr. Abhishek Ghosh

Here is something about Dr. Abhishek Ghosh

Dr. Abhishek Ghosh is a businessman, surgeon, author, blogger. You can contact him by using this form.

Dr. Abhishek Ghosh
Dr. Abhishek Ghosh is a surgeon, editor of The Customize Windows. You can contact him via the email address admin@thecustomizewindows.com or may be you can text/Whatsapp him on his cell phone +919831836673 or send postal letter to the below address.
F-04/502, Peerless Nagar, 29F B.T. Road, Panihati, City - Kolkata, State - West Bengal, PIN700114,India.
And this website, The Customize Windows
can be found on Google Maps as The Customize Windows which is located at 22.572646, 88.363895 precisely.
Here is the usual author box of his profile followed by the list of articles with excerpt written by Dr. Abhishek Ghosh within this website.

By Abhishek Ghosh December 21, 2012 11:19 pm Updated on August 28, 2014

Post Processing in Digital Photography : Photoshop and Mac

Post Processing in Digital Photography is equivalent to tuning a captured image in Mac version of Adobe Photoshop. Let us see how Mac and Photoshop plays the role. It is very important to understand that - It™s The Camera and Computer Not The Photographer That Matters in Digital Photography. The photographer's creativity, optimized tools that includes a state of art computer with calibrated … [Read more...]

By Abhishek Ghosh December 21, 2012 7:41 pm Updated on December 21, 2012

Whitelist and Whitelisting

Whitelist or positive list in the information technology referred to a tool that allows people, companies or programs to be listed as being trustworthy. Whitelist, mainly discussed by the common consumers, such as the webmasters with the relation to Internet Protocol address or I.P. address. Often the provider gives the disclaimer that the I.P. they assigned are in Whitelist or in short - … [Read more...]

By Abhishek Ghosh December 21, 2012 1:41 pm Updated on December 21, 2012

Safer Business with Cloud Computing

Safer Business with Cloud Computing can increase the security with cloud services significantly. The basis is always a well-planned cloud computing strategy. As our straightforward quotation is - Cloud Computing is More About Business Than Technology. It can happen that, you are among the board of directors of a big automobile company, from practical life you know very well that, a safer Business … [Read more...]

By Abhishek Ghosh December 21, 2012 8:22 am Updated on December 21, 2012

Cloud Computing Open Standards and Interfaces

Cloud Computing Open Standards and Interfaces promises more flexibility in the cloud. The article explains the benefits of open standards and interfaces. Three articles are quite related to the current topic, Cloud Computing Open Standards and Interfaces; these are - Cloud Computing, Open Source and Developers, Cloud Computing Security Means Opting For Open Source and Open Source Private Cloud … [Read more...]

By Abhishek Ghosh December 21, 2012 12:10 am Updated on December 21, 2012

Is Moving to Cloud is Needed ? If Yes, Which Service Provider ?

Is Moving to Cloud is Needed ? Probably this is one of the most asked question. The next probably is which Cloud Service Provider is the better option ? Focus on a useful methodology to achieve your desired result in a cost effective way. This guide focuses on two parts - Is Moving to Cloud is Needed and if it is granted, Which Service Provider you will choose.   Is Moving to Cloud is Needed … [Read more...]

By Abhishek Ghosh December 20, 2012 8:31 pm Updated on December 20, 2012

Secure Cloud Computing Guide

Secure Cloud Computing Guide focuses on the risks of cloud infrastructure for data, points what to look for your own website or business to be on secure Cloud. The number of cloud services is growing, users can now obtain a countless services on the Internet. Private cloud services are open to only a specific group of users, such as members of the same company and public cloud solutions is that, … [Read more...]

By Abhishek Ghosh December 20, 2012 2:55 pm Updated on December 20, 2012

Using Twitter From Command Line Interface

Using Twitter From Command Line Interface not only has the advantage of minimalistic text only mode but also a clutter free way to smooth the workflow. Before reading this guide for using Twitter From Command Line Interface, please vide the needed setup for your command line tool; either Mac, Linux or Windows from this article Using Facebook From Command Line Interface. Using Twitter From Command … [Read more...]

By Abhishek Ghosh December 20, 2012 8:19 am Updated on December 20, 2012

Using Virtual Appliance on VMware Fusion or VirtualBox to Test CMS

Using Virtual Appliance on VMware Fusion or VirtualBox is a great way to test any Framework, Database, CMS including WordPress just like using localhost. Previously we wrote how Virtual Appliances actually works and this article on Using Virtual Appliance on VMware Fusion or VirtualBox, we will show the practical method of using this still not so popular in the consumer market. After understanding … [Read more...]

By Abhishek Ghosh December 20, 2012 2:16 am Updated on December 20, 2012

Using Facebook From Command Line Interface

Using Facebook From Command Line Interface adds the advantage to minimalistic text only mode with faster loading mode. You can test it on your computer too. We will show this guide for Using Facebook From Command Line Interface with OS X 10.8, it will definitely work for Linux and with GNU packages on Windows PC.   Using Facebook From Command Line Interface : Initial Setup For Command … [Read more...]

By Abhishek Ghosh December 19, 2012 10:20 pm Updated on December 19, 2012

Own Cloud Based Proxy for Memcached and Redis Protocol with twemproxy

Own Cloud Based Proxy for Memcached and Redis Protocol with twemproxy is waiting for you to be deployed on your Cloud Server as it is Free and Open Source. Previously we published how to use your Rackspace Cloud Server as Proxy. This article on Own Cloud Based Proxy for Memcached and Redis Protocol with twemproxy is not a step by step guide.     Own Cloud Based Proxy for Memcached and … [Read more...]

By Abhishek Ghosh December 19, 2012 2:36 pm Updated on December 19, 2012

Desktop and Laptop Buyer's Guide

Desktop and Laptop Buyer's Guide is for the whole consumer who either needs a computer for the first time or needs upgrade or needs another as second computer. As usually, our Desktop and Laptop Buyer's Guide is not biased, not filled with links to some other seller, it is fully for an user based cost effective calculation to get the best possible solution.   Desktop and Laptop Buyer's … [Read more...]

  • « Previous Page
  • 1
  • …
  • 504
  • 505
  • 506
  • 507
  • 508
  • …
  • 786
  • Next Page »

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy