Tag Archives: Internet

Rakshabandhan in 2020: How it is going to be different…

“There’s no other love like the love for a brother. There’s no other love like the love from a brother.” –Astrid Alauda

Rakshabandhan is popular, traditionally Hindu, annual rite, or ceremony, which is central to a festival of the same name, celebrated in India, Nepal, and other parts of the Indian subcontinent, and among people around the world influenced by Hindu culture. The festival is a festival of love, care, and happiness. It symbolizes the existing love between brother and sister. On this day, sisters of all ages tie a talisman, or amulet, called the rakhi, around the wrists of their brothers, symbolically protecting them, receiving a gift in return, and traditionally investing the brothers with a share of the responsibility of their potential care.

Despite being a part of Hindu culture, due to its moral values, the festival is celebrated by other cultures as well. Among women and men who are not blood relatives, there is also a transformed tradition of voluntary kin relations, achieved through the tying of rakhi amulets, which have cut across caste and class lines, and Hindu and Muslim divisions. In some communities or contexts, other figures, such as a matriarch, or a person in authority, can be included in the ceremony in ritual acknowledgment of their benefaction.

Every year, this festival has been awaited by all of us. It gives a chance for the celebration of a selfless and beautiful relation. For some families, this is the occasion where sisters get a chance (out of their busy schedule) to finally visit their brother and celebrate their love. The occasion begins from the previous day itself, with sisters buying beautiful rakhis and sweets for their brothers and applying Mehendi on their hands. Next early morning, both sisters and brothers dress up in new clothes. The sister ties Rakhi on brother’s hand offers him sweet and sings love songs for him depicting brother-sister relation. The brother then gives her sister a gift and along with that a promise of “protection against any problem in her life.”

Every year, this is the time when families travel to each others’ houses to celebrate the festival. But this time, the festival falls amid these harsh times when the whole world is standing against a pandemic, COVID-19. Rakshabandhan is the first major festival of Hindus after the beginning of the pandemic. Therefore, it is a challenge for all of us to get along with the charm of the festival by taking all the precautions and by maintaining social distancing. This year, it is difficult for sisters to visit their brothers if they live in a different city or state. Each year, we can easily have a get-together and celebrate the festival. But, every year, we have our soldiers, policemen, doctors, workers who are away from their home, on their duty even during festivals for the service of their country. This time, we have got a very golden chance to serve our country and fight against the pandemic by staying at our homes. We can spread happiness and celebrate the festival with our police brothers, doctors, and nurses who are truly working as our safeguard for our protection. We can tie Rakhi out of respect to them, making them realize that they are true heroes and fulfilling the responsibilities of a brother. 

Apart from this, in this time of the internet, even though we are staying far, we are always connected through the internet. We are never apart. We can celebrate the festival over a video call. It will a new experience and it will be great fun. One more thing we need to remember that though some sisters are not able to go to their brother, due to pandemic, colleges and schools are closed. This brings young brothers and sisters together who usually don’t get holidays on Rakshabandhan when colleges run regularly. They must be together after a long time and enjoying the togetherness.

“As we grew up, my brothers acted like they didn’t care, but I always knew they looked out for me and were there!” – Catherine Pulsifer

Last day of Internship

So, finally, today is the last day of my internship. This is not related to any news, article or any kind of research, this is just a simple message and a little experience which I want to share. In this period of a month, I learnt a plethora of skills such as content writing, Blogging and more than that I enjoyed to being a publisher with eduindex. I haven’t traditionally good at writing but now I think I did my best even I can do more better. In today’s world, everyone should learn these skills and knowledge as well and we are blessed as we have such a good platform Internshala through that we can use this knowledge or skill even learns from them in such a convenient way. Hopefully, my little experience will be helpful to have the curiosity in young ones.

online classes AMID Pandemic

COVID-19 began in the month of December in 2019 and soon it grew into a pandemic, leading to several losses of lives and locking down of many cities. Social distancing became the key to escape out of this problem. But, with this solution came other problems. We are able to follow social distancing by keeping us locked in our houses but this stopped students’ education too. But we can’t just stop everything due to this COVID thing. We need to find an effective solution to continue the education of students. We need to continue the functioning of schools and colleges.

Online Classes

In the times of the internet, the one and the only solution are online classes. The online way to share knowledge and information now is the internet. It has proved to be a real miracle these days, connecting millions and making information access fast and easy. Be it school, college, tuition, or coaching classes, knowledge is now being delivered to students who are sitting at their home and can learn things sitting there only. Students now need a mobile or desktop and fast internet connection to attend their online classes and learn things. It is not possible for a pandemic to stop students from learning.

How it is a different experience?

This way of learning is totally new to everyone, be it students, be it teachers or be it parents. We were already involved in some small ways of e-learning but a complete shift towards this type of mode is  something new and challenging to everyone. Teachers are continuously involved in finding new ways to make e-learning more interactive and interesting for students. They are continuously evolving their way of teaching and trying to give them a class-type of feeling. Teachers are also learning to adapt with new softwares and explore things. Students are learning how to deal with online homework submissions, doubt-sessions and examinations. But, the problem is that the medium of interaction is always an electronic device. Hence, students are subjected to fatigue and mental stress. They seem irritated and develop body pain sitting still at a particular position holding their phones or laptops. Students are also developing stress on eyes. It is quite difficult for them to adjust with all of these. It seems that this way of teaching costs their health, both mental and physical. Besides this, internet is not available to all the areas of the country and to all the students. Poor students can’t afford high speed data. This method of teaching, is thus, a barrier between poor students and education. It is a harsh truth that they are left behind. We need to work together towards this to make education available to these students also.

Internet & teens: The growing problem

How many hours do you stay connected with your favorite device, maybe the phone or your PC from which you are currently reading this post? A rough average can be not less than three hours up to nine hours or even more than that if you’re a social enthusiast or a gamer, these limits can go beyond that. Don’t you feel something is wrong? Also though time passes by, these little things go unnoticed, and we enjoy our life chatting and sharing photos, videos with them. But not everyone is capable of doing so, or their life is on the verge of destruction due to technology. Cyberbullying and harassing are prevalent, and also this pandemic has made every one of us spend more time on our devices. The transactions we do can be unsafe, and recently we see bans taken up the Government of India to highlight the nation’s potential security threat to steal user’s data and use them for their benefit.

A user accessing images on the tablet.

According to the new research done on around 2800 teens aged 8 to 11 from 17 different high schools in Australia, keeping two points in consideration about the internet and emotions, are they interconnected? Although web access is easily reachable to them, their parents do need to need to monitor their activities. But this isn’t easy for them; also, any wrong intention by an attacker can persuade the mind of the small children quickly through audios and visuals. The effect is minor though keeping them engaged in good education is also a must.

You may remember the case of Cambridge Analytica, where ads were shown to American users from 50 million user datasets of Facebook without any user permission. Eventually, GDPR for EU citizens made their online presence safer, and now users can know what data they are giving to them. You may notice now that most of the websites ask the consent for cookies of the site you are visiting when you go through them.

Some of the regular social messaging apps we use regularly.

A group of students from the University of Indonesia, after three months of effort, finally came up with a device known as Nettox, which can measure the levels of oxygen in your body along with the variation of heart rate factor or the HRV. The device will notify if the levels substantially dropdown beyond the regular rate due to prolonged usage on the devices. They are on the way to patent their creation.

If one is self-reliant, we don’t even require such devices. One should develop good habits, spend quality time with family and relatives or roam inside the room instead of being stuck to the display. The virtual age is growing and spanning everywhere if the uses are proper; it’ll help more in the future. There is so much news around the world, some are positive by using the technology appropriately, or else it can be dangerous too by getting addicted to it. One can inhibit the actual values of self-love and explore the hidden talents within you; you can polish them and outshine for a decisive lead in society.

The world of code can save your life or turn into a holocaust.

Starlink: Connecting People to Faster Data

Among the 4.57 billion internet users and growing, you are also a part of it, currently reading this post. Half of the total users are in Asia, where the youth is consuming most of the data. Most of them are creating an online presence by spending almost 6.5 hours a day on average. You might even think to ask a question to yourself, who owns the internet? The answer is no one. You are also a part of the internet, and you own it on your devices. You watch videos on YouTube, Netflix, chat with your friends, share posts on Instagram, share your opinion on Reddit, etc. It all started in the 1960s with the project known as ARPANET, originally started being a four-node network.

Internet: Where all the ideas originate.

The average internet speed around the globe is around 33 Mbps on Mobile, where South Korea tops the chart with a whopping 100 Mbps. On the other hand, fixed connections have a much higher number at 76 Mbps, with Singapore on the top of the list with 205 Mbps. You may not be experiencing the speed. In most cases, surfing the web, listening to songs like other users, is a priority. But the time has ended up to be a power user. Several opportunities are helping people to connect to the internet for the first time. Facebook, in 2013 launched a service known as Free Basics powered by Internet.org, which was a massive success, but some problems do arise. China banned Facebook since 2009, so no opportunities for them, India refused the offer due to net neutrality. Google’s initiative Project Loon, the balloons in the stratosphere, helped to connect around 200 thousand people in 2017 during Hurricane Maria that emerged in Puerto Rico.

A bunch of cubicles where the company connects to its employees through the network.

Now, a visionary man with fulfilling all his dreams is all geared up with the project called the Starlink. Elon Musk, the owner of SpaceX in 2015, presented his idea to the world how satellite communication can help us to get stable and faster internet connections. Five hundred forty satellites launched in orbit as of June 13, 2020. There are more launches in the future to make it the largest constellation consisting of 12 thousand satellites. The Russian Sputnik I was the first satellite to make its journey to space. Currently, there are more than 8 thousand satellites, out of which only 2, 218 are functional.

A switch used to connect several devices to a network

The problem is that the future can have issues like a traffic jam in orbit, yes, along with the space debris of non-functional parts of the older satellite. An incident on September 2, 2019, where ESA changed Earth observatory satellite from its usual path as Musk refused to change the same for Starlink. So this created some disagreement with the organizations. Six satellites have failed to add up to 20 thousand space debris, which is currently under strict observance.

A space rocket launch

A positive fact about the project is that to reach internet connectivity to the remotest area in the world. Do you know that the world fastest internet speed recorded recently peaked at 44.2 terabytes, which can download a thousand high definition movies just in a second? Starlink is aiming to provide speed in gigabits with low latency, and now it is inviting you to test the network. You can be a part of this.

INTERNET OF THINGS

What is Internet of Things (IoT)?

The Internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

The definition of the Internet of things has evolved due to the convergence of multiple technologies, real-time analytics, machine learning, commodity sensors, and embedded systems. Traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), and others all contribute to enabling the Internet of things. In the consumer market, IoT technology is most synonymous with products pertaining to the concept of the “smart home”, covering devices and appliances (such as lighting fixtures, thermostats, home security systems and cameras, and other home appliances) that support one or more common ecosystems, and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers.

History of IoT

The idea of adding sensors and intelligence to basic objects was discussed throughout the 1980s and 1990s (and there are arguably some much earlier ancestors), but apart from some early projects – including an internet-connected vending machine – progress was slow simply because the technology wasn’t ready. Chips were too big and bulky and there was no way for objects to communicate effectively.

Processors that were cheap and power-frugal enough to be all but disposable were needed before it finally became cost-effective to connect up billions of devices. The adoption of RFID tags – low-power chips that can communicate wirelessly – solved some of this issue, along with the increasing availability of broadband internet and cellular and wireless networking. The adoption of IPv6 – which, among other things, should provide enough IP addresses for every device the world is ever likely to need – was also a necessary step for the IoT to scale.

Kevin Ashton coined the phrase ‘Internet of Things’ in 1999, although it took at least another decade for the technology to catch up with the vision.

Adding RFID tags to expensive pieces of equipment to help track their location was one of the first IoT applications. But since then, the cost of adding sensors and an internet connection to objects has continued to fall, and experts predict that this basic functionality could one day cost as little as 10 cents, making it possible to connect nearly everything to the internet.

The IoT was initially most interesting to business and manufacturing, where its application is sometimes known as machine-to-machine (M2M), but the emphasis is now on filling our homes and offices with smart devices, transforming it into something that’s relevant to almost everyone. Early suggestions for internet-connected devices included ‘blogjects’ (objects that blog and record data about themselves to the internet), ubiquitous computing (or ‘ubicomp’), invisible computing, and pervasive computing. However, it was Internet of Things and IoT that stuck.

Intelligence

Ambient intelligence and autonomous control are not part of the original concept of the Internet of things. Ambient intelligence and autonomous control do not necessarily require Internet structures, either. However, there is a shift in research (by companies such as Intel) to integrate the concepts of the IoT and autonomous control, with initial outcomes towards this direction considering objects as the driving force for autonomous IoT. A promising approach in this context is deep reinforcement learning where most of IoT systems provide a dynamic and interactive environment. Training an agent (i.e., IoT device) to behave smartly in such an environment cannot be addressed by conventional machine learning algorithms such as supervised learning. By reinforcement learning approach, a learning agent can sense the environment’s state (e.g., sensing home temperature), perform actions (e.g., turn HVAC on or off) and learn through the maximizing accumulated rewards it receives in long term.

IoT intelligence can be offered at three levels: IoT devices, Edge/Fog nodes, and Cloud computing. The need for intelligent control and decision at each level depends on the time sensitiveness of the IoT application. For example, an autonomous vehicle’s camera needs to make real-time obstacle detection to avoid an accident. This fast decision making would not be possible through transferring data from the vehicle to cloud instances and return the predictions back to the vehicle. Instead, all the operation should be performed locally in the vehicle. Integrating advanced machine learning algorithms including deep learning into IoT devices is an active research area to make smart objects closer to reality. Moreover, it is possible to get the most value out of IoT deployments through analyzing IoT data, extracting hidden information, and predicting control decisions. A wide variety of machine learning techniques have been used in IoT domain ranging from traditional methods such as regression, support vector machine, and random forest to advanced ones such as convolutional neural networks, LSTM, and variational autoencoder.

In the future, the Internet of Things may be a non-deterministic and open network in which auto-organized or intelligent entities (web services, SOA components) and virtual objects (avatars) will be interoperable and able to act independently (pursuing their own objectives or shared ones) depending on the context, circumstances or environments. Autonomous behavior through the collection and reasoning of context information as well as the object’s ability to detect changes in the environment (faults affecting sensors) and introduce suitable mitigation measures constitutes a major research trend, clearly needed to provide credibility to the IoT technology. Modern IoT products and solutions in the marketplace use a variety of different technologies to support such context-aware automation, but more sophisticated forms of intelligence are requested to permit sensor units and intelligent cyber-physical systems to be deployed in real environments

CYBER SECURITY

What is Cyber Security?

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of “smart” devices, including smartphones, televisions, and the various devices that constitute the “Internet of Things”. Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.

Importance of Cyber Security

In today’s connected world, everyone benefits from advanced cyber-defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.

Everyone also benefits from the work of cyber-threat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open source tools. Their work makes the Internet safer for everyone.

Types of Cyber Security threats

  1. Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails.
  2. Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.
  3. Malware is a type of software designed to gain unauthorized access or to cause damage to a computer. 
  4. Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.
  5. SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database. Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a database via a malicious SQL statement. This gives them access to the sensitive information contained in the database.

Recent Cyber Threats

Dridex malware: In December 2019, the U.S. Department of Justice (DoJ) charged the leader of an organized cyber-criminal group for their part in a global Dridex malware attack. This malicious campaign affected the public, government, infrastructure and business worldwide.

Affecting victims since 2014, it infects computers though phishing emails or existing malware. Capable of stealing passwords, banking details and personal data which can be used in fraudulent transactions, it has caused massive financial losses amounting to hundreds of millions.

In response to the Dridex attacks, the U.K.’s National Cyber Security Centre advises the public to “ensure devices are patched, anti-virus is turned on and up to date and files are backed up”.

Romance scams: In February 2020, the FBI warned U.S. citizens to be aware of confidence fraud that cybercriminals commit using dating sites, chat rooms and apps. Perpetrators take advantage of people seeking new partners, duping victims into giving away personal data. The FBI reports that romance cyber threats affected 114 victims in New Mexico in 2019, with financial losses amounting to $1.6 million.

Emotet malware: In late 2019, The Australian Cyber Security Centre warned national organizations about a widespread global cyber threat from Emotet malware. Emotet is a sophisticated trojan that can steal data and also load other malware. Emotet thrives on unsophisticated password: a reminder of the importance of creating a secure password to guard against cyber threats.

End-User Protection

End-user protection or endpoint security is a crucial aspect of cyber security. After all, it is often an individual (the end-user) who accidentally uploads malware or another form of cyber threat to their desktop, laptop or mobile device.

So, how do cyber-security measures protect end users and systems? First, cyber-security relies on cryptographic protocols to encrypt emails, files, and other critical data. This not only protects information in transit, but also guards against loss or theft.

In addition, end-user security software scans computers for pieces of malicious code, quarantines this code, and then removes it from the machine. Security programs can even detect and remove malicious code hidden in Master Boot Record (MBR) and are designed to encrypt or wipe data from computer’s hard drive.

Electronic security protocols also focus on real-time malware detection. Many use heuristic and behavioral analysis to monitor the behavior of a program and its code to defend against viruses or trojans that change their shape with each execution (polymorphic and metamorphic malware). Security programs can confine potentially malicious programs to a virtual bubble separate from a user’s network to analyze their behavior and learn how to better detect new infections.

Security programs continue to evolve new defenses as cyber-security professionals identify new threats and new ways to combat them. To make the most of end-user security software, employees need to be educated about how to use it. Crucially, keeping it running and updating it frequently ensures that it can protect users against the latest cyber threats.

Security Measures

A state of computer “security” is the conceptual ideal, attained by the use of the three processes: threat prevention, detection, and response. These processes are based on various policies and system components, which include the following:

  • User account access controls and cryptography can protect systems files and data, respectively.
  • Firewalls are by far the most common prevention systems from a network security perspective as they can (if properly configured) shield access to internal network services, and block certain kinds of attacks through packet filtering. Firewalls can be both hardware- or software-based.
  • Intrusion Detection System (IDS) products are designed to detect network attacks in-progress and assist in post-attack forensics, while audit trails and logs serve a similar function for individual systems.
  • “Response” is necessarily defined by the assessed security requirements of an individual system and may cover the range from simple upgrade of protections to notification of legal authorities, counter-attacks, and the like. In some special cases, complete destruction of the compromised system is favored, as it may happen that not all the compromised resources are detected.

Today, computer security comprises mainly “preventive” measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network stack (or, in the case of most UNIX-based operating systems such as Linux, built into the operating system kernel) to provide real-time filtering and blocking. Another implementation is a so-called “physical firewall”, which consists of a separate machine filtering network traffic. Firewalls are common amongst machines that are permanently connected to the Internet.

Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.

However, relatively few organizations maintain computer systems with effective detection systems, and fewer still have organized response mechanisms in place. The primary obstacle to effective eradication of cybercrime could be traced to excessive reliance on firewalls and other automated “detection” systems. Yet it is basic evidence gathering by using packet capture appliances that puts criminals behind bars.


In order to ensure adequate security, the confidentiality, integrity and availability of a network, better known as the CIA triad, must be protected and is considered the foundation to information security. To achieve those objectives, administrative, physical and technical security measures should be employed. The amount of security afforded to an asset can only be determined when its value is known.

Instagram Envy

Today’s world is full of influencers. What you eat, what you wear, where you go on holiday, and even what you speak is heavily influenced by social media. Although people today are smart enough to realize that it is not okay to compare yourself to other people, social media still provides you numerous opportunities to do just that.

Recall that heavy feeling in your heart when you see your friends and celebrities posting photos doing exciting things like going on long drives, attending glamorous parties, and visiting rare places. This sinking feeling is known as Instagram Envy.

Instagram is all about unadulterated voyeurism. You will not find Facebook’s messiness or Twitter’s relatable content in the posts here. Instagram is almost a photo site with built-in vintage filters idealizing your every moment. It encourages its users to create these perfect layouts of their lives, almost as if everyone is living their fairy tale.

Why Instagram Envy Happens

There is an unspoken rule adopted by the users worldwide to avoid populating the feeds with any mediocre or unedited pictures. Now you might feel that it is all about showing off to your followers, but that is not the case here. It is trying to level with everyone else posting one amazing picture after another; it is trying to feel good about yourself that you are in no way less than any of your friends. Owing to this rule, people often end up spending hours in hopes of composing an image of food as simple as a glass of coke over a dish of pizza worthy enough for their Instagram feed.

envy

The followers, on the other hand, are expected to indulge in the ethics of impress rather than confess, all the while being swept away from the sumptuous photos and chipping in with beautiful comments. Even the likes are shaped like little hearts, reinforcing in the minds of the viewers, the idea that each shot is a performance worthy of applause. Every last image is an advertisement for the self.

In a society focused on physical appearance, this is perhaps no surprise that there is an element of narcissism to Insta-bragging. People with a higher level of narcissism post more self-presented photos and update their profile picture often.

Dealing with Instagram Envy

One approach to counteract Instagram envy is to showcase love, not luxury. People who generate Instagram envy can also use the same platform to demonstrate that they understand and embrace the value of citizens of all social and economic strata by posting about them. They will gain more followers than foes by showcasing love.

instagram

Another aspect you need to understand is that living through the lens is not all bad. Social media has made us all social, without a doubt. You catch up with long lost friends in no time because you already have an idea of what is going on in their lives. But you need to accept social media for what it is – it is social and it is, after all, media. You really shouldn’t blindly believe everything you see. You learn through experience that it is better to know how to post than to boast.

Image Courtesy: Google

Creative E-MAIL WRITING: 5 Sample drafts for cart abandonment mails.



● IS YOUR INTERNET CONNECTIVITY ALRIGHT?
We got a bit concerned when you were browsing through this amazing xyz product and chose to just leave it there in the cart itself. Given the stupefying list of its features, you wouldn’t surely want to miss out on bringing this home. No we aren’t exaggerating but working towards your best interest. Check out some reviews here and decide for yourself. Thankyou and Good Luck shopping.

● DID YOU JUST LEAVE YOUR SHOPPING CART AT THE STORE?
Oops! Seems like you spent decent hours browsing through the right products, discussing their specifications and prices and then finally shortlisting it, you added them to the cart. But you haven’t made the purchases yet, all of your items are waiting to be delivered to you. Go, proceed with the payments and say yes to a new, more lavish lifestyle.
Thankyou and Good Luck Shopping.

● YOU WERE SO CLOSE!
Yes, you heard it right! You were SO close to trying the amazing goodies and services available at the xyz shopping platform. You would surely not want to miss out on the products that you shortlisted yourself. So here we are again, sliding into your emails to remind you about making your purchases and bringing the items home that have overstayed in your cart. Check out some customer reviews which might tempt you to place the order. Here’s to effective and affordable shopping.

● WE MISS YOU! GET US HOME SOON!
Well yes, that’s the *cries* of the abandoned superbly functional items that you shortlisted yourself while browsing through the xyz website. Seems like you liked them but somehow weren’t still convinced to bring them home yet. Here, check out some reviews which might trigger a change of mind. Thankyou and Good Luck Shopping.

● YOUR CART MIGHT JUST OVERFLOW!
Hi! A friendly reminder that your shopping cart is full right now and needs to be emptied before you can continue shopping again at your most favourite shopping portal. So don’t waste any more time, h ead straight to the xyz website, make the payments and go grab your favourite products. Thankyou and Good Luck Shopping.