Thursday, September 2, 2010

Wednesday, August 11, 2010

Google's Gmail under phishing attack

phishing1.jpg
NEW DELHI: India's 71 million internet and close to 10 million broadband users are increasingly becoming the victims of vicious phishing attacks that can result in identity theft, danger to life and even crippling financial fraud.

On Wednesday, users of Google's email services received a legal notice from the gmail team asking them to update their account details for security reasons.

"Gmail Team is working on total security on all accounts in order to make Gmail better as ever and as a result of this security upgrade we require all Gmail members to verify their account with Google. To prevent your account from disability you will have to update your account by clicking the reply button and filling the space below," the mail read.

The legal notice from Gmail wanted users to refurbish their account name, password, occupation, birth date and country of residence. It also carried a threat that users who did not update their details within 7 days of receiving the warning would lose their account permanently.

However, when contacted, a Googlespokesperson said, "Some spammers send fraudulent mass-messages designed to collect personal information, called 'spoofing' or 'password phishing' . We always advise our users to be wary of any message that asks for your personal information, or messages that refer you to a webpage asking for personal information. Google or Gmail does not send unsolicited mass messages asking for passwords or personal information; even if the message asking for it claims to be from us, please don't believe it."

This information is publicly available in the Gmail support center at http://mail.google.com/support/bin/answer.py?hl=en&answer=8253

According to Rakshit Tandon, consultant safe surfing with the Internet & Mobile Association of India (IAMAI ), "Phishing activity has been on the rise across India since December. The biggest targets for cyber criminals are banking sites followed by free email sites like Gmail and Yahoo and social networking sites like Facebook and Orkut," he said.

The IAMAI runs cyber safety programmes and has already worked with 3,50,000 students in 185 schools across 43 cities and 13 states.

"A schoolteacher in Mumbai lost close to Rs 10 lakh after phishers got into her netbanking account. Internet penetration is going up which is inviting more criminal attacks as awareness levels are very low," adds Tandon.

His advise is to be investigative and use logic (BIUL) when using the Net in order to improve your personal Internet security levels.

Thursday, July 29, 2010

How to build battery-powered USB charger

You might have noticed by now that whenever you really need your iPod, it is always out of juice. A computer or a wall charger may not be around either, especially if you are travelling. Why not build your own portable battery powered USB charger? It’s easy.



Components required: An Altoids tin or any other metal container of the same size. A 9-volt battery. A voltage regulator (available at any electrical/hardware shop). A female USB port (available at any local computer shop).



Make a hole on one end of the tin using a cutter and fit the USB port into it. Use tape to hold them together. Place the battery in the tin. Solder its wires to the regulator and the USB port using the following diagram. Be careful. Use double-sided tape and make sure the battery and the regulator are secured in the tin. Connect one end of your USB cord to the female USB port and the other end to your iPod and you are done. This charger can be used with any USB enabled device.

How hackers snoop on private web browsing

LONDON: Experts have identified how their web browser's 'private mode' setting is also vulnerable to hackers.

Most web browsers offer a private mode, intended to leave no trace of surfing history on the computer.

But Collin Jackson at Carnegie Mellon University in Pittsburgh, Pennsylvania, and colleagues, have found ways to detect which sites were visited with the mode enabled.

Even if private browsing is enabled, details relating to the key remain stored on the computer's hard drive, allowing a hacker to establish that a particular site had been visited.

A hacker could "guess what sites you've been to based on traces left behind," New Scientist quoted Jackson as saying.

These attacks on privacy "do not require a great deal of technical sophistication and could easily be built into forensics tools," he added.

However, Rik Ferguson -- a UK-based security researcher at Trend Micro of Tokyo, Japan -- says that any attacker with the knowledge to exploit the weaknesses would probably look to other attacks first, which may yield more detailed information.

"If someone is capable of tracking your browsing habits in this way, then they are probably also tech-savvy enough to know about commercial spyware which could much more effectively track your computer use," says Ferguson.

Sunday, July 11, 2010

'Facebook users do more searches on Google'


facebook.jpg
Google CEO says Facebook popularity boosts Google searches
IDAHO: Google Inc Chief Executive Eric Schmidt rejected any notion that Apple Inc or Facebook presented a threat to the web search leader's business.


Most people "assume that these are zero-sum games, which are battles to the death," said Schmidt, who spoke with reporters in a one-hour briefing at Sun Valley alongside Google co-founders Larry Page and Sergey Brin.


"The indications that we have show that when Internet users become Facebook users they actually do significantly more searches on Google," Brin noted.


The executives declined to confirm media reports that Google is developing a new service called Google Me to compete with Facebook, which has grown to nearly 500 million users in its six-year history.


The trio addressed a variety of issues that have weighed on Google during a tumultuous year in which the company has emerged from the recession to face a shifting competitive landscape, increasing regulatory scrutiny, and major changes to its strategy in China.


Schmidt and Google's two co-founders spoke to the reporters on the third day of the Allen & Co conference, the annual confab of media and technology executives at the scenic Sun Valley resort. Apple chief executive Steve Jobs was also invited, although he did not attend the event.


The relationship between Apple and Google, two one-time allies, has become increasingly tense as the companies face-off in markets such as smartphones and mobile advertising. Last year, Schmidt stepped down from Apple's board of directors because of the overlap between the two companies businesses.


Apple's Jobs recently told a conference that Google was responsible for the change in the relationship between the two companies because Google elected to compete with Apple's iPhone by developing the Android smartphone software.


On Thursday, Google's Page suggested that Jobs' assessment was "a little bit of rewriting history."


"We had been working on Android a very long time, with the notion of producing phones that are Internet enabled and have good browsers and all that because that did not exist in the marketplace," Page said. "I think that characterisation of us entering after is not really reasonable."


But Schmidt noted that Google and Apple still have important partnerships in various businesses, and stressed that the market was big enough for both Google's Android and Apple's iPhone to be successful.


Google, which generated nearly $24 billion in revenue last year, reports second-quarter results on July 15.


While Schmidt did not provide any details on the company's recent business trends, he offered a cautious outlook for the broader economy, noting that both the US and Europe will have a "relatively long recovery, with ups and downs."


Google said its forthcoming Chrome PC operating system was on track for release later this year. While the initial focus of the Chrome software is for netbook PCs, Schmidt said he expects there would also be tablet PCs based on Chrome OS, something that could help Google compete with Apple's popular iPad.








Friday, July 9, 2010

E-Litmus pH Test Exam

Hiring Potential Test (pH Test)


In March 2008, a Fortune 500 IT services company used eLitmus pH test as a benchmark to recruit entry-level professionals. At the end of the three-month training program, there was zero involuntary attrition among people hired through pH. In contrast, the average percentage of new hires let go at the end of training period was over 5.2% when recruited through alternate channels. This resulted in a saving to the company of Rs 1.8 million for every hundred hires.

Companies ranging from start-ups to global giants across a gamut of industries like IT security, IT products, R&D, software services, physical infrastructure and KPO have benefitted immensely from using pH Test as a benchmark.

Modern day business schools are also finding pH Test extremely relevant as an admissions test. The evolution of focused MBA institutes that offer super-specialization which require potential students to have corresponding strengths. pH Test can very effectively identify these traits. Additionally, students who undergo excessive coaching at one of the training institutes (which teach students strategies to “crack the test”, not concepts) get no undue advantage on the pH test. Lastly, the pH Test uses highly researched methodologies to create a gradient in the top quartile of talent pool.



pH Test demystified

pH Test uses on-the-job performance feedback provided by select customers, and theoretical psychometric methodologies and standards to continuously improve the test validity. Our cross-functional research team comprises domain experts, industry practitioners and statisticians. We have been able to demonstrate a thought leadership of 10 to 34 months over other leading standardized tests, with path-breaking innovations like handicap-based negative marking.

Information for test takers

The pH Test is conducted every few weeks across the country. The schedule of upcoming tests is regularly published on www.elitmus.com. The test has been designed to measure the natural ability of test takers rather than your ability to learn by rote. To this end, all necessary formulae are provided in the question paper. Those who focus on building fundamentals and broad skills, rather than on learning “tricks” to solve specific topics perform better on this test.



Pitfalls in Evaluations

For a test that has a large enough number of test takers, the marks distribution will be a normal curve as shown below.

img

Tests fail when:



1. The methodology used to identify the right candidates is misplaced

A real story: When Sunitha’s parents were visiting her in Bangalore, she wanted a driver who could show them around the ciry. She hired one after asking him these questions: “Do you know the route to MG Road , Lalbagh and Forum?” and “Do you have a valid driver's license?” Both of which criteria, of course, the driver satisfied. The second day on the job, he met with a road accident injuring both parents. A classic example of evaluation gone wrong; it tested the stated objective but was not completely relevant. Most tests created “in-house” are ad-hoc. The creator of the test tries is usually always looking to come up with 'clever' or 'difficult' questions rather than trying to identify the skills that need to be tested by a question.



1. 'Unsuitable' and 'Border-line' candidates are able to make it to the 'Right' candidates region

A typical campus written test of 1 hour has 40 multiple-choice questions with a cut-off around 18 marks. Now, consider a candidate who knows the answers to 11 questions and gets another 7 right through sheer guess work. At the interview stage, questions from any given panel tend to repeat across interviews. If this candidate is interviewed towards the end of the line-up, s/he could clear this process because of access to historical information.



1. Conventional linear negative marking approach is used

To prevent guess work, typical tests (including CAT) penalise a test taker with negative marks for wrong attempts. Negative marks are awarded for each wrong attempt and are a fraction of the marks awarded for the right answers. This system is inherently flawed. To begin with, no attempt is made to differentiate between a student who actually solves the question and gets a wrong answer and a guess maker. Seconly, the resources (ex:time) used by a test-taker are not taken into consideration. For example, a test-taker who attempts 20 questions and gets 4 wrong and a test-taker who attempts 40 questions to get 4 wrong are penalised equally, whereas the first test taker had the luxury of more time per question compared to the second one. pH Test uses a handicap based negative marking approach to address such issues. Read more about pH test's pioneering methodologies.



1. High preparedness of the candidates

Typically, the test format or question types are extremely predictable for a company. A candidate could prepare for such an exam over a long period of time utilizing historic data and clear the evaluation. In an endorsement of the phenomenon, the IITs recently identified prolonged preparation by candidates as a reason for the falling quality of intake.

Thursday, July 8, 2010

Download seminar Topics more then 100, Seminar Presentations

SEMINAR TOPIC ON Artificial Intelligence (AI)
http://www.ziddu.com/download/10622475/ai.doc.html

SEMINAR TOPIC ON ATM
http://www.ziddu.com/download/10622630/ATM.DOC.html

SEMINAR TOPIC ON BLUETOOTH
http://www.ziddu.com/download/10622697/BLUETOOTH.doc.html

SEMINAR TOPIC ON BLUETOOTH1
http://www.ziddu.com/download/10622743/BLUETOOTH1.doc.html

SEMINAR TOPIC ON CELL
http://www.ziddu.com/download/10622773/cell.doc.html

SEMINAR TOPIC ON CYBERCRIMES
http://www.ziddu.com/download/10622799/CYBERCRIMES.doc.html

SEMINAR TOPIC ON Digital_Signal_Processor
http://www.ziddu.com/download/10622834/Digital_Signal_Processor.doc.html

SEMINAR TOPIC ON EDI1
http://www.ziddu.com/download/10622870/EDI1.DOC.html

SEMINAR TOPIC ON FIREWALL
http://www.ziddu.com/download/10622899/FIREWALL.RTF.html

SEMINAR TOPIC ON internetsecurity
 http://www.ziddu.com/download/10622927/internetsecurity.doc.html

SEMINAR TOPIC ON internetsecurity
http://www.ziddu.com/download/10622942/networking.doc.html

SEMINAR TOPIC ON SILICON
http://www.ziddu.com/download/10623041/SILICON.DOC.html

SEMINAR TOPIC ON searchengines1
http://www.ziddu.com/download/10623042/searchengines1.doc.html

SEMINAR TOPIC ON searchengines1
http://www.ziddu.com/download/10623043/searchengines1.doc.html

SEMINAR TOPIC ON VIRUSES
http://www.ziddu.com/download/10623044/VIRUSES.DOC.html

SEMINAR TOPIC ON SYSTEMDESIGN
http://www.ziddu.com/download/10623045/SYSTEMDESIGN.doc.html

SEMINAR TOPIC ON VIDEO CONFERENCE
http://www.ziddu.com/download/10623046/videoconference.doc.html

SEMINAR TOPIC ON ROBOT
http://www.ziddu.com/download/10623048/ROBOT.DOC.html

SEMINAR TOPIC ON VIRTUAL PRIVATE NETWORK
http://www.ziddu.com/download/10623049/virtualprivatenetwork.doc.html

SEMINAR TOPIC ON VIJPREST
http://www.ziddu.com/download/10623050/VIJPREST.ppt.html

SEMINAR TOPIC ON REMOTE LAN
http://www.ziddu.com/download/10623051/RemoteLan.doc.html

SEMINAR TOPIC ON WEBOS
http://www.ziddu.com/download/10623147/webos.doc.html

SEMINAR TOPIC ON WEBCACHE
http://www.ziddu.com/download/10623148/WebCache.doc.html

SEMINAR TOPIC ON WEBHOSTING 1
http://www.ziddu.com/download/10623149/Webhosting1.doc.html

SEMINAR TOPIC ON VRML
http://www.ziddu.com/download/10623150/VRML.DOC.html

SEMINAR TOPIC ON WAP
http://www.ziddu.com/download/10623151/WAP.DOC.html

SEMINAR TOPIC ON VLSI2
http://www.ziddu.com/download/10623152/VLSI2.PPT.html

SEMINAR TOPIC ON WEBHOSTING
http://www.ziddu.com/download/10623153/Webhosting.doc.html

SEMINAR TOPIC ON WAP
http://www.ziddu.com/download/10623154/Wap.zip.html

Wednesday, July 7, 2010

JNTU 3-1 ECE TextBooks Free Download

JNTU 3-1 ECE TextBooks Free Download
6 Subjects of  : JNTUK| JNTUH| JNTUA
Free Download of JNTU 3-1 TextBooks
Electronics & Communication Engg.



Managerial Economics and Financial Analysis (MEFA)           DOWNLOAD HERE

Computer Organisation (CO)                                                     DOWNLOAD HERE

Antennas & Wave Propogation (AWP)                              DOWNLOAD HERE


Linear IC Applications (LICA)                                                DOWNLOAD HERE


Digital IC Applications (DICA)                                             DOWNLOAD HERE

Tuesday, July 6, 2010

Muralitharan to retire after first Test against India

Muralitharan announces international retirement
NEW DELHI: Sri Lanka's legendary spinner Muttiah Muralitharan, the highest wicket-taker in Tests and ODIs, will retire from international cricket after the first Test against India in Galle starting July 18.

Profile: Muttiah Muralitharan
Muralitharan, who currently leads the wicket tally in Tests and ODIs, will not play any international cricket but said he would be available for the 2011 World Cup if Sri Lanka need him.

Muralitharan, who has a 18-year long career span, has taken 792 wickets in 132 Tests and 515 wickets in 337 ODIs since making his debut way back in 1992-93 season.

Facebook goes free for Airtel users

facebook.jpg
Bharti Airtel has made access to Facebook free for two months
NEW DELHI: Leading telecom operator Bharti Airtel has made access to online social networking site Facebook free for its over 130 million subscribers, the company said.

The offer will, however, be available only for two months till August 31.

The Facebook site will be available in English, Hindi and five more Indian languages -- Punjabi, Bengali, Telugu, Tamil, and Malayalam.

"For the two-month period, the partnership enables Airtel customers to access Facebook’s full mobile site faster and at no data cost from their Airtel mobiles via m.facebook.com," said an Airtel statement.

Customers, accessing mobile Internet for the first time need to SMS ‘FACEBOOK’ to 54321 to take advantage of this offer.

Beware of emails offering money

hackers1.jpg
In its new ad campaign RBI advises people not to remit or deposit money towards fictitious offers.
NEW DELHI: Recently, a woman in a small town of Tamil Nadu recieved an email from an agency based in UK, congratulating her for an award of around 200,000 pound (Rs 1.5 crore).

But for availing this awarded sum, she was supposed to deposit around Rs 10,000 as fees. Interestingly, she also received letters and documents, which corroborated that the agency was part of the UK government and the amount she had been asked for was mandated by the RBI. The entire episode looked so fool-proof that the lady decided to pay the amount. A few days later, she again received a letter asking for around Rs 50,000, a sum claimed to be required for paying tax to government of India.

Again, the demand was backed by a document, which gave an impression that some legal authority has asked for it. The entire thing was so enticing that the woman decided to pay again. But, the buck did not stop here. After this, she was asked for a bigger sum as conversion charge. Now, she was trapped.
To recover her earlier payments, she paid the amount once again, only to receive another correspondence with a same kind of demand.

Now, she had enough and decided to reach out to roots of the matter. But to her utter dismay, when she contacted RBI, she was told that entire thing was fictitious and she was duped by some trickster. She is not alone, instead, she is one of innumerous victims.

In order to educate such gullible people, RBI, on its part, “has decided to run a campaign against these kinds of fictitious offers, which come in the form of lottery and other cheap funds,” central bank’s executive director H R Khan said.

RBI’s ad campaign advises people not to remit or deposit money towards such fictitious offers. It also asks people to inform local police about such offers immediately, so that culprits can be booked at the earliest.
Khan said, prima facie, it seems that these mails originate from abroad, but investigations have revealed that these mails have originated from within the country. “In fact, in many cases, it has been found that the account numbers given by these tricksters to deposit the money also belong to some gullible persons who allowed to use their accounts for some minuscule sum. When the authorities approached them, they expressed complete ignorance about these trickster . As their roles are proven, they are booked.”

Nasscom to sell outsourcing in US

BPO3.jpg
A Nasscom contingent and representatives from Indian IT majors have decided to participate in Global Services Summit in the US to make a fresh pitch for keeping the outsourcing engine chugging.
KOLKATA: Their hopes aroused by US President Barack Obama's latest speech on comprehensive immigration reforms at the American University School of International Service last week, an Indian IT industry delegation will travel to Washington in September to lobby the issue afresh at a forum representing the interests of the US services economy.

A Nasscom contingent — comprising its president Som Mittal, vice-president Ameet Nivsarkar and representatives from some of the biggest guns of the tech world such as TCS and Infosys — has decided to participate in the Coalition of Service Industries’ (CSI)-organised Global Services Summit to be held in Washington on September 22 so that it can use the platform to make a fresh pitch for keeping the outsourcing engine chugging.

The possible presence of United States Trade Representative Ron Kirk at the event has made the attendance appear more beneficial to Nasscom. Incidentally, Union commerce and industry minister Anand Sharma, too, is expected to be there at the CSI programme. Last year, Sharma was a speaker at a similar CSI function.

As per its website, the CSI “represents the interests of the dynamic American service economy, which employs 80% of the workforce and generates 3/4 of national economic output.” Its members include companies engaged in banking, insurance, telecommunications, IT, express delivery, audio-visual, energy services, and other service industries . CSI constituents conduct business in all 50 US states and in over 100 countries.

Speaking to TOI on Monday, Nasscom vice-president Ameet Nivsarkar said the software industry body is likely to use the visit to also catch up with influential Congressmen and Senators or their aides to gauge their minds on the possible shape that immigration reforms may take.

The US is the No. 1 destination for Indian IT and accounts for about 60% of this country’s software exports. Although the industry has been trying to reduce this reliance, there is unanimity that America would always remain the topmost market.

On July 1, Obama had said: “I believe we can put politics aside and finally have an immigration system that’s accountable. I believe we can appeal not to people’s fears but to their hopes, to their highest ideals, because that’s who we are as Americans.”

Music time on Google, Microsoft Bing


googleNew.jpg
Tech behemoths like Microsoft and Google increasingly are turning to their search engines to help drive their entertainment content strategies.
DENVER: Internet search engines pride themselves as being neutral providers of information. But as competition mounts to own the connection between fans and online content, tech behemoths like Microsoft and Google increasingly are turning to their search engines to help drive their entertainment content strategies.


In June, Microsoft launched a new entertainment vertical to its Bing search engine, which among other things aggregates full-track streaming from Zune, details on upcoming tours and buy links within the results for any artist, album or song search.


Google put together a similar package last year and is now building a music download service of its own that would be tied to its search engine and Android mobile operating system.


Given the high volume of entertainment-related queries that the search engines handle, it was only a matter of time before they took bold steps into the space. According to Microsoft, 10 percent of all Internet search queries are entertainment-related, with music lyrics alone accounting for 70 percent of those searches.


With the Bing upgrades, Microsoft is trying to position itself as a better entertainment discovery tool than Google. While both Google and Bing have links to stream full songs found in search results, Bing has the more complete package with additional details on tour dates, lyrics and buy links.


However, all that may change once Google gets its music act together. Sources confirm that later this year Google will launch a music download service that's tied to its search engine. Currently, music searches on Google link to full-song streams provided by MySpace Music, as well as Twitter feeds and other information, which it launched late last year.


Exactly what Google has planned is unclear, but a hint was given during a developers conference for the company's Android mobile platform in May. At the event, Google announced the acquisition of Simplify Media, a content-synching technology that the company demonstrated can be used to automatically synch and stream music purchased online to any Android phone containing the technology.


Whether this is an interim step toward an eventual streaming subscription service is unclear, and Billboard hasn't confirmed any additional details on this point.


Potentially interfering with both plans is an increasingly aggressive effort by the recording industry to have search engines remove links to infringing material. BPI, the trade group representing U.K. record labels, raised the stakes in June by issuing a takedown notice to Google, demanding it remove links to 17 songs from third-party websites it deems infringing, such as RapidShare and MegaUpload. Google hasn't yet responded, but its next steps will be telling.


Should Google comply, it would set a precedent that will almost certainly result in a flood of additional takedown notices from every music label and publisher eager to eliminate pirate links on the world's most popular search engine. If it refuses, there could be another court fight coming as big if not bigger than the $1 billion lawsuit Viacom brought against YouTube -- which itself is heading to appeal after Google recently won a summary judgment to dismiss the case.


As for Bing, Microsoft senior VP of online services Yusuf Mehdi assures the music industry that it will comply with any takedown requests, but has no plans to alter the search algorithm that determines search results. "We're pretty true to the algorithmic ranking in the Web results," Mehdi says. "We're obviously not going to surface that kind of stuff in the Bing box, but the algorithm that determines relevancy of search results we'll stick with."


While Bing's moves are interesting, it's Google that has the market-moving leverage. According to the most recent data from information services firm Experian Hitwise, Google's search engine in May led the pack with 72 percent U.S. market share, with Yahoo second (14.4 percent) and Bing third (9.2 percent).


But when it comes to music, all of them stand in the shadow of Apple, which still commands 70 percent of digital music download sales in the United States, according to NPD Group. While Apple has no presence in online search (yet), both Microsoft and Google are competing with Apple on the rapidly growing mobile platform -- Google with Android and Microsoft with the new Windows Series 7.


Successfully tying together a cloud-based music service with an online search and discovery system and a path to mobile phones -- not to mention advertising around it all -- is the digital content battlefield of the immediate future.

Monday, July 5, 2010

Sakshi Education Website providing free Eamcet, Icet Mock Counselling

akshieducation.com also providing Eamcet2010 rank estimator...
Eamcet2010 rank estimator
*http://www.sakshieducation.com/rank.aspx
Eamcet2010 Mock Counselling
*
http://www.sakshieducation.com/main.aspx
Icet2010 Mock Counselling
*http://www.sakshieducation.com/i_main.aspx
Sakshi Education providing Eamcet2010 rank estimator and category wise information on propable colleges for students who are planning to appearing web based counselling for Eamcet 2010 and Icet 2010 Admissions. Sakshi Education providing to student chapter wise mock and online tests which will help their performance in EAMCET, ICET. Sakshi Education providing information regarding education and career in India. The ranks displayed are approximate based on 2009 EAMCET Ranks. Seats availability is also based on 2009 database.
http://www.sakshieducation.com/

Sunday, July 4, 2010

Bebo, Bips bound by yoga


Kareena Kapoor, who partied with Bipasha Basu in Colombo recently, shares a common trait with her.

Both actresses insist on travelling to outdoor locations with their yoga instructors. Incidentally, Kareena’s yoga instructor is a sweet girl who actually wants to be a full fledged pilot someday.

But since she is still very young... she is happy making Bebo bend to her tunes.

Six Sigma Certification

Six Sigma Resources

Six Sigma Competency Maturity Model. (.pdf) Size-660 KB.
World Congress Dubai 2003.

Six SIgma strategies, Methodology and Tools. (.pdf) Size-171 KB. IoD World Congress Bangalore 2004.
Posted by NVAnil at 3:05 AM 0 comments Links to this post
Labels: SixSigma Certification
Reactions:
Six Sigma Certification
There is a great pressure on improving performance at individual and organizational levels. Individuals are devoting substantial time, effort and money to acquire new competencies. Six Sigma Competencies – Green Belt, Black Belt and Master Black Belt – are in high demand.

Six Sigma Competencies helps an individual work more efficiently and deliver better and faster results. Six Sigma Certified Green Belts and Six Sigma Certified Black Belts can accelerate their carrier growth. Six Sigma certification is for individuals working in any organization, as better and faster results are appreciated in any organization, not only six sigma organizations. In six sigma field there is no certification for the organization, unlike other quality approaches, such as ISO-9000, COPC, CMMI and TS-16949. Six sigma certification is available for individuals based on their competencies and these certificates are like university degrees.

Furthermore, Six Sigma certification has also attracted the attention of business leaders since Six Sigma is more of a business initiative rather than a quality initiative. It has come to the point that Six Sigma certification is now discussed in business reviews routinely. None of the earlier quality initiatives enjoyed this kind of support from business leaders.

Another interesting aspect of Six Sigma certification is that it is universally applicable. Six Sigma certification is being coveted by industries such as manufacturing, services, software, call centers, BPO etc.

Individuals trained in ISO-9000:2000, SEI-CMMI, COPC, PMP etc can add Six Sigma certification for better carrier growth, as Six Sigma certification best fits into continuous improvement approaches, one of the requirement in all theses quality related approaches.

ISL have trained large number of Black Belts and Green Belts in traditional class room training. Large number of individuals very keen on attending our six sigma certification programs, but could not attend in the past due to several reasons. To address all these concerns, ISL has embarked on an ambitious project of developing next generation distance courses; with improve the effectiveness of learning beyond the traditional class room approach.

ISL new generation distance learning courses come with many unique features:

Flexibility
o Start the course any day (online registration only)
o Learn at your own pace (complete it in 3 – 12 months)
o Pay fee through Credit Card, Net Banking, Cheque or DD.
o Take the IQF, USA computerized exam any day any place
o Get the Exam results instantly from IQF website
· Learner Centered Course Material
o Specially written course books
o Multimedia CBT with audio lectures
· Web-based Automated Learning Tools
o e-Quiz
o e-Case Study
· Web-based Support
o e-Dialogue
o e-Facilitator

E-Litmus pH Test Exam

Hiring Potential Test (pH Test)

In March 2008, a Fortune 500 IT services company used eLitmus pH test as a benchmark to recruit entry-level professionals. At the end of the three-month training program, there was zero involuntary attrition among people hired through pH. In contrast, the average percentage of new hires let go at the end of training period was over 5.2% when recruited through alternate channels. This resulted in a saving to the company of Rs 1.8 million for every hundred hires.
Companies ranging from start-ups to global giants across a gamut of industries like IT security, IT products, R&D, software services, physical infrastructure and KPO have benefitted immensely from using pH Test as a benchmark.
Modern day business schools are also finding pH Test extremely relevant as an admissions test. The evolution of focused MBA institutes that offer super-specialization which require potential students to have corresponding strengths. pH Test can very effectively identify these traits. Additionally, students who undergo excessive coaching at one of the training institutes (which teach students strategies to “crack the test”, not concepts) get no undue advantage on the pH test. Lastly, the pH Test uses highly researched methodologies to create a gradient in the top quartile of talent pool.

pH Test demystified
pH Test uses on-the-job performance feedback provided by select customers, and theoretical psychometric methodologies and standards to continuously improve the test validity. Our cross-functional research team comprises domain experts, industry practitioners and statisticians. We have been able to demonstrate a thought leadership of 10 to 34 months over other leading standardized tests, with path-breaking innovations like handicap-based negative marking. 
Information for test takers
The pH Test is conducted every few weeks across the country. The schedule of upcoming tests is regularly published on www.elitmus.com. The test has been designed to measure the natural ability of test takers rather than your ability to learn by rote. To this end, all necessary formulae are provided in the question paper. Those who focus on building fundamentals and broad skills, rather than on learning “tricks” to solve specific topics perform better on this test.

Pitfalls in Evaluations

For a test that has a large enough number of test takers, the marks distribution will be a normal curve as shown below. img
Tests fail when:
  1. The methodology used to identify the right candidates is misplaced



    A real story: When Sunitha’s parents were visiting her in Bangalore, she wanted a driver who could show them around the ciry. She hired one after asking him these questions: “Do you know the route to MG Road , Lalbagh and Forum?” and “Do you have a valid driver's license?” Both of which criteria, of course, the driver satisfied. The second day on the job, he met with a road accident injuring both parents. A classic example of evaluation gone wrong; it tested the stated objective but was not completely relevant. Most tests created “in-house” are ad-hoc. The creator of the test tries is usually always looking to come up with 'clever' or 'difficult' questions rather than trying to identify the skills that need to be tested by a question.

  1. 'Unsuitable' and 'Border-line' candidates are able to make it to the 'Right' candidates region



    A typical campus written test of 1 hour has 40 multiple-choice questions with a cut-off around 18 marks. Now, consider a candidate who knows the answers to 11 questions and gets another 7 right through sheer guess work. At the interview stage, questions from any given panel tend to repeat across interviews. If this candidate is interviewed towards the end of the line-up, s/he could clear this process because of access to historical information.

  1. Conventional linear negative marking approach is used



    To prevent guess work, typical tests (including CAT) penalise a test taker with negative marks for wrong attempts. Negative marks are awarded for each wrong attempt and are a fraction of the marks awarded for the right answers. This system is inherently flawed. To begin with, no attempt is made to differentiate between a student who actually solves the question and gets a wrong answer and a guess maker. Seconly, the resources (ex:time) used by a test-taker are not taken into consideration. For example, a test-taker who attempts 20 questions and gets 4 wrong and a test-taker who attempts 40 questions to get 4 wrong are penalised equally, whereas the first test taker had the luxury of more time per question compared to the second one. pH Test uses a handicap based negative marking approach to address such issues. Read more about pH test's pioneering methodologies.

High preparedness of the candidates
Typically, the test format or question types are extremely predictable for a company. A candidate could prepare for such an exam over a long period of time utilizing historic data and clear the evaluation. In an endorsement of the phenomenon, the IITs recently identified prolonged preparation by candidates as a reason for the falling quality of intake.

JNTU-KAKINADA : I B.Tech [R07] Regular/Supplementary Examination Results May-2010

Check ur Results from below links

I B.Tech [R07] Regular/Supplementary Examination Results May-2010

Saturday, July 3, 2010

Managing cyber attacks a challenge












compVirus-big.jpg
Cyber threat
NEWDELHI:From getting a birth certificate to filing a police complaint to getting a passport, driving license, or depositing taxes, the government plans to make every service go online in the next five years.

As communications & IT secretary, R Chandrashekhar is playing a key role in the rollout of the $6-billion national e-governance plan. But his job becomes more challenging as departments become computerised.

He talks about measures to thwart cyber attacks from countries such as China, e-governance and the government’s plans to maintain India’s competitiveness in the global IT market.

What is the government doing to thwart cyber attacks on it’s IT infrastructure emanating from countries like China? Are we prepared for a large-scale cyber attack?
Yes, we are taking several steps. A crisis management plan has already been communicated to all government departments and private organisations. Secondly, we have framed some strict guidelines on security standards and practices that need to be adopted by governments, when they implement egovernance IT contracts.

Thirdly, we have also prescribed some elaborate measures in respect of critical organisations, both in private and public sector. There is a base level security which is advised by the CERT-IN (Computer Emergency Response Team-India ) to all. The government, under the IT Act, is also going to form a separate agency to protect critical information infrastructure.

But the agency will not be under DIT (department of IT), because there are larger security considerations. It is yet to be formally framed. Of course, CERT-IN, which is a part of DIT, will continue to provide guidance to all.

What is the government doing to put the IT industry back into traction after a slowdown last year?
For the first time in history, the Indian IT industry witnessed a slow growth of 6% last year. We have been accustomed to 36% growth rates. But the slowdown was triggered by the global slowdown . Now, we’ve bounced back into action. The growth is happening because India remains competitive.

Government’s effort is to continue that growth momentum. Still there are challenges. Many countries are trying to catch up in the IT space, especially the south east Asian economies.

Then there are bigger challenges from countries such as China. The country is putting a lot of emphasis on English language training. So, India can’t afford to become complacent.

What are the steps that the government is taking to ensure that India does not become incompetitive in coming years?
We are doing a couple of things. We want to spread the growth to tier-II and tier-III towns where the costs are lower. The higher-end activities in the office chain may continue to remain in tier-I towns.

The routine operations such as call center outsourcing and back office operations can move to smaller towns. It will benefit the companies. It will put less stress on the infrastructure of bigger cities. It will also boost development in small towns.

Nokia says no to Google Android


HELSINKI: Nokia is committed to get back the No.1 position in smartphones and plans to use no other software than Symbian and Linux MeeGo, head of its mobile solutions unit said.

"It's my aim to ensure Nokia stays as the market and intellectual leader in creating the digital world," Anssi Vanjoki wrote in a blog on Nokia's website.

"Symbian and MeeGo are the best software for our smartest devices. As such, we have no plans to use any other software," he said, adding "there are no plans to introduce an Android device from Nokia".

He added, "There is no denying, that as a challenger now, we have a fight on our hands. The first battle is to bring you products and services you will want to own and use."

The world's top cellphone maker warned in mid-June second-quarter sales and profits at its key phones unit would be weaker than expected as it struggles to compete against Apple's iPhone. Nokia also said 2010 profit margin at the phone business would be weaker.

Vanjoki noted it would be a tough task to make Nokia the leader in smartphones again, but added the company has all the assets "to produce killer smartphones and market-changing mobile computers".

"Symbian and MeeGo are the best software for our smartest devices. As such, we have no plans to use any other software," he said, adding "there are no plans to introduce an Android device from Nokia.”

Friday, July 2, 2010

Salman skips Raavan!

Salman Khan
Salman Khan More Pics
On Saturday evening after pack-up a part of Salman’s Ready crew in Sri Lanka took off to see Mani Ratnam’s Raavan. Salman was also asked to accompany the excited group of actors and technicians.

Says a source, “Initially Salman did show interest in the film. But then when it was time to accompany the rest of the Ready unit Salman opted out because of the controversial nature of the subject and also the fact that he has earned the wrath of the Tamilians by embracing endorsing and visiting Sri Lanka twice in a month.”

More importantly Raavan is worshipped by certain sections of the Sri Lankan people and the film did raise hackles when released in Sri Lanka. Understandably, Salman was advised against accompanying his friends for Raavan.

Mahesh Manjrekar who’s shooting with Salman in Sri Lanka confirms the fact that Salman did not accompany him and the others who saw Raavan on Saturday. “I went with my friends. But it went very peacefully. I had also heard that the Sri Lankans were offended by the way Raavan was depicted. But there were 500 people in the theatre and they watched in rapt attention.”
Since the movie theatres in Sri Lanka do not allow edibles Manjrekar and his friends had taken their own snacks. “We had a good time. Wish Salman accompanied us.”

IBM to employees: Use Firefox

ibm.jpg
IBM has asked its employees to use open-source Firefox as their browser
SAN FRANCISCO: Technology giant IBM wants its workers around the world to use free, open-source Mozilla Firefox as their window into the Internet.

"Any employee who is not now using Firefox will be strongly encouraged to use it as their default browser," IBM executive Bob Sutor said yesterday in a blog post at his sutor.com website.

"While other browsers have come and gone, Firefox is now the gold standard for what an open, secure, and standards-compliant browser should be."

Making Firefox the default browser means that workers' computers will automatically use that software to access the Internet unless commanded to do differently.

All new computers for IBM employees will have Firefox installed and the global company "will continue to strongly encourage our vendors who have browser-based software to fully support Firefox," according to Sutor.

New York State-based IBM, known by the nickname "Big Blue," has a corporate history dating back a century and now reportedly has nearly 400,000 workers.

"Today we already have thousands of employees using it on Linux, Mac, and Windows laptops and desktops, but we're going to be adding thousands more users to the rolls," Sutor said.

Sutor is the vice president of open source and Linux at IBM, which launched an Open Source Initiative in 1998.
Open-source software is essentially treated as public property, with improvements made by any shared with all. Firefox is the second most popular Web browser in an increasingly competitive market dominated by Internet Explorer software by Microsoft.

Google Chrome has been steadily gaining market share, last week replacing Apple Safari as the third most popular Web browser in the United States.

"We'll continue to see this or that browser be faster or introduce new features, but then another will come along and be better still, including Firefox," Sutor said.

"I think it was Firefox and its growth that reinvigorated the browser market as well as the web. That is, Firefox forced competitors to respond."

Barack Obama ranked 15th Best U.S. President, So much time to climb Top

Barack Obama ranked 15th best U.S. President in the Siena Collegsuper obamae poll...
Barack Obama has been ranked as the 15th best U.S. President in a new poll of leading presidential scholars. Siena College poll, which surveyed 238 presidential scholars at U.S. colleges and universities. Franklin D. Roosevelt again earned the top spot, as he has every time since the poll was first conducted in 1982. Teddy Roosevelt, Abraham Lincoln, George Washington and Thomas Jefferson — have consistently been the top 5 Presidents in the poll’s findings.
Barack Obama ranked high on traits like imagination (6th), communication ability (7th) and intelligence (8th), Obama rated poorly ratings on background (32nd), which was composed of traits like family, education and experience.
Mr. Clinton moved up five places, from No. 18 in 2002 to No. 13 today; John F. Kennedy also moved up, from No. 14 to No. 11. Mr. Carter, Reagan and Nixon all dropped in the rankings this year — Mr. Carter dropped seven spots, from No. 25 in 2002 to No. 32 now; Reagan dropped two spots, from No. 16 to No. 18; and Nixon fell four spots, from No. 26 to No. 30. (IANS)

Software can sense ‘depression’ in blogs

Software-can-sense-'depressResearchers have developed a software programme that can detect depression in blogs and online texts. The software is capable of identifying language that can indicate a writer’s psychological state, which could serve as a screening tool.
Developed by a team headed by Yair Neuman, associate professor of education at Ben-Gurion University (BGU) of the Negev, Israel, the software was used to scan more than 300,000 english language blogs posted on mental health websites.
The programme identified what it perceived to be the 100 “most depressed” and 100 “least depressed” bloggers.
A panel of four clinical psychologists reviewed the samples and concluded that there was a 78 percent correlation between the computer’s and the panel’s findings.
“The software programme was designed to find depressive content hidden in language that did not mention the obvious terms like depression or suicide,” Neuman said.
“A psychologist knows how to spot various emotional states through intuition. Here, we have a programme that does this methodically through the innovative use of ‘web intelligence’.”
For example, the programme spots words that express various emotions, like colours that the writer employs to metaphorically describe certain situations.
Words like “black” combined with other terms that describe symptoms of depression, such as sleep deprivation or loneliness, will be recognized by the software as “depressive” texts.
Originally conducted for academic purposes, the findings could potentially be used to screen for would-be suicides.
The software provides a screening process that raises an individual’s awareness of his or her condition, enables mental health workers to identify individuals in need of treatment and can recommend they seek professional help.
“Because, no one can actually replace excellent human judgement,” Neuman added.
In the US, there is a big problem of undiagnosed people suffering from depression. The usual screening process is an online questionnaire, which is a self-selective process.
If a person is completing a survey, he already suspects a problem. With this software, it is possible to analyse proactively. If the blogger agrees, he will know whether or not he needs to seek professional counselling, said a university release.
Neuman will be presenting his work at the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agency Technology in Toronto, Canada, from Aug 31 to Sep 3, later this year.

You may just need to walk to charge your mobile phone

knee-brace-power-generatorNow you can potentially charge your cellphone battery just by walking with a new charger which can be fitted with the sole of your shoes and produce power when you walk.
Mobile phone company European Telco Orange has developed a charging prototype – a set of thermoelectric gumboots or Wellington boots with a ‘power generating sole’ that converts heat from the wearer’s feet into electrical power.
The boot was designed by Dave Pain, managing director at GotWind, an energy firm.
Pain said the boot uses the Seebeck effect, named after physicist Thomas Johann Seebeck, in which a circuit made of two dissimilar metals conducts electricity if the two places where they connect are held at different temperatures, reported TVNZ.
“In the sole of the Wellington boot there’s a thermocouple and if you apply heat to one side of the thermocouple and cold to the other side it generates an electrical charge,” Pain said.
“That electrical charge we then pass through to a battery which you’ll find in the heel of the boot for storage of the electrical power for later use to charge your mobile phone.”
These thermocouples are connected electrically, forming an array of multiple thermocouples. They are then sandwiched between two thin ceramic wafers.
When the heat from the foot is applied on the top side of the ceramic wafer and cold is applied on the opposite side, from the cold of the ground, electricity is generated.
But the power boots have one drawback. You need to walk for 12 hours to generate one hour’s worth of charge.
Pain, however, said his company was working on improving the technology, which could then also be used in other forms of clothing.
“The technology’s not just limited to footwear, or indeed boots, but you could for example make clothing out of it, you know, a headband, for example,” he said.

Thursday, July 1, 2010

Keep Your Passwords Safe on a Piece of Paper

Watch Our Data Mining Demo to Gain Valuable Performance Insights.

Important Passwords on Paper If you use the same password on multiple websites, your may be in for some trouble.
Say your password for website badwebsite.com is the same as the password for goodwebsite.com. Now if the website badwebsite.com gets compromised (or the owner is malign to start with), they’ll know your password. Chances are that your username is the same (email address) for both websites so the badwebsite.com people can can easily log in to your goodwebsite.com account and impersonate you.
Yeah, there are quite a few reliable Password Managers that serve as a strong room for your complex passwords but that they require you to install specific software on the computer. What do you do when you want to check your web email on a different computer where you do not have your security tools installed and you do not remember your secure, random, email password?
In addition, I doubt you can memorize all your passwords for each and every website, if they are secure from brute-forcing and unique, that is.

Write your passwords down on a paper

What I am trying to solve is to give users a simple way of generating strong passwords unique to every website they visit using just a piece of paper, credit card-sized, that you can carry in your wallet.
password_card
What you need is just a piece that has a unique (per card) combination of secret letters to help you create a unique password for each website. You may use the RAND() function in an Excel spreadsheet to generate unique password cards.
To create a password, take each letter of the website you want to create a password for and then take the corresponding code from the table. For example, if you want to create a password for www.amazon.com, it would be:
1st letter is a –> a (Column 2, Row 1)
2nd letter is m –> jv (Column 7, Row 2)
3rd letter is a -> AN6
4th letter is z -> xs7
5th letter is o –> enb
So the password for your Amazon website becomes ajvAN6xs7enb.
You can optionally (make sure you do this with all your passwords) intertwine the generated password with a memorized password – it could the city name where you were born, your childhood hero, name of your favorite author or anything memorable.
For instance, if you were born in Philadelphia, the password for Amazon.com would be ajvAN6xs7enb intertwined with Philadelphia: PahjviAN6lxs7aenbdelphia. This would ensure that your identity consists of something you know (Philadelphia) and something you have (the paper password card).
Even if a malicious administrator of website badwebsite.com retrieves your password for that website, they cannot impersonate you on say PayPal or Amazon because you aren’t reusing passwords anymore.
It is a bit cumbersome to use if you had to use it to type in passwords each time, but when used in conjunction with your everyday “remember password” feature found in every browser, you get extra security at the cost of just tiny real state in your wallet.
Security involves trade-offs, in this case is between usability, portability and robustness against collusion or more sophisticated attacks. Arguably though, for a vast majority of people, this is more realistic than carrying an electronic password generator.