Its is a new beginning and its gonna be exciting..
Well, this is my first blog.. Im still confused wat to post. The reason y i first got this idea cant b implemented right away, since i don kno wat ppl reaction wil be. So im open to eveythin. Any questions, personal, technical or whatever.. Except nonsense.. So, fire away.. :-)
Thursday, March 25, 2010
The ruthless and merciless killings of animals.. Its time we did something..
This is touching..
The humans are the most developed species on the earth. But sometimes how much ever developed and mature we are, we never act in that way. We have a very unique power to do a lot of things which we can put to use for a lot of things and into constructive use. But that happens very less. I am trying to put down so many feelings running in my mind but i'm not able to find the right words. But i will try my best.
Even tough we boast of being developed, matured, blah blah blah, we are never thinking of many other things that are going on without our knowledge. Most of us tend to not notice such things. Whenever we go to a zoo or an underwater aquarium, we adore the creatures over there. But once we return from there its a lost memory in no time. We want to be amazed or entertained by those creatures but 99% of us are not concerned of the well being of those creatures.
Instead of using our well developed technology and ultimate power of being the most developed species, we are behaving just like other animals. Killing one another. Not only our fellow ladies and gentlemen but also those very beautiful creatures which never meant any harm to us. I ask, what is the use of boasting of our accomplishments when we are defeating the very purpose of nature in all the aspects? We have taking away the basic right for survival from everyone. We are cutting down trees, killing animals, contaminating natural resources, etc, etc..
Wage a war with a country that you dont like, i dont care.. You may be having many issues with them but why do you kill and poach innocent creatures like Seals, dolphins, Whales, Tigers, Elephants, etc.. The list goes on and on.. What harm did they mean to us? They never killed us, they never destroyed our homes, nothing.. If at all they have killed humans then its only because we have provoked them. Isn't it the basic survival strategy for animals? But why do we kill them for no reason? We kill bears, foxes, dolphins(one of the most adorable creatures and friend of human beings), etc for our own luxury, pride and enjoyment?
Now in fashion industry fur is the latest cool trend. They boast of wearing the best fur coats to parties and all. Cant they understand that their fashion and pride of wearing those is at the cost an a living being? An innocent animal which as much right to survive as that particular person has? My blood boils whenever i see someone with fur and leather items. I want to show them what pain is and it feels when they go close to death. I want to make them feel the same thing what these animals feel but are not powerful enough to save themselves. Because the credit goes to our sophisticated weaponry which gives us the power to kill them like cowards from a long distance.
Cant those who go for killing those animals understand the simple fact that, even those animals feel pain? That they too have the right to survive as we do? I dont understand the mindset of such people. How can one KILL an innocent animal? HOW? What makes them? Dont they ever have MERCY? Did they never for a moment get a slightest flash of thought that, being humans its our job to protect those creatures that are inferior to us and cant protect themselves?
I cannot type anymore.. I am not able to control my anger.. I CANNOT.. I appeal to all of you out there.. All you kind people, the one's with kind hearts, do what you can to get your voice heard to protect the basic rights of these beautiful creatures. Let us not make them extinct. Lets give the chance even to our kids to see those amazing creatures and their beauty. I say, this would give us more joy, sense of happiness, achievement and pride in protecting the rights of these helpless animals than protecting the basic human rights. If humans can be so cruel then its not worth protecting their rights. At least few of them. PLEASE, motivate people around you so that we can preserve the beauty the nature has given us. To the parents with young kids, i would like to say this. Please motivate and teach your children in their young age itself, so that when they grow up they can become the protectors ("the protective") of these animals and the nature, rather than what we have become now, "the destructive".
Its better to be late than never. We have still the time and opportunity, join hands and raise your voice. Lets protect the nature and its harmony before its too late..
Please see these links to know and understand how the animals are being getting extinct due to the acts of cruel people:
Canadian Seal Hunt
Save Whales
Stop hunting tigers: Video from YouTube
Animal rights photography
Timesonline article on Elephant Killings for Ivory
Animal Trafficking, poaching and trade
Dog meat
Bull fighting
Animal Fighting
Cruelty to animals around the world
Fur
Take a few minutes and PLEASE Sign the petition to stop animal poaching and slaughtering
Thank You..
Sunday, February 21, 2010
Now we can feel safe and secure.. Thanks to HCL and its initiative to safeguard the country.. Afterall its an Indian Comapny...
Coming soon! A smart PC that watches all your moves
Original Article by Jaimon JosephFriday , February 05, 2010 at 10 : 02
Two of India's biggest airports, some of our busiest sea ports and a few of our most famous religious shrines are now being watched. With technology even more advanced than London's security system in 2005. The company behind it, HCL Security Ltd., a 100% subsidiary of HCL Infosystems Ltd. I'd always thought HCL was full of software geeks who punch out dollars from their keyboards. But apparently, their software can now command everything from NSG paratroopers, to the fire brigade.
Imagine this. A man walks into a crowded market. Loiters around a bench, then walks away, leaving his bomb-laden bag nestled underneath. No one notices. Except the hidden cameras. If the bag's unattended for more than a couple of minutes, a silent alarm automatically goes off in the control room. Other cameras track the man as he crosses lobbies and corridors.
If the man suddenly remembers his bag and goes back, the alarms shut down. If he keeps walking, the computer automatically calls the cops. If one doesn't pick up, it instantly calls ten others, on their cells. Security officers start closing in on the unwary terrorist. Floor supervisors get a map on their phones, to get to the abandoned object and remove it. The fire station's alerted, hospital wardens put on standby.
Of course, this is a simplistic description - these responses are carefully calibrated. You don't want an expensive computer crying wolf every hour and numbing people's reflexes completely. But I saw a live demonstration of all this, just a couple of weeks back in HCL Security's sprawling Noida office. And what I've told you, is just half the story.
This is a smart computer. With a thousand eyes. It records every second of every day. It remembers. And it thinks. Stray incidents that seem completely innocent. Random actions that don't look threatening at all. The same man visiting a tourist hotspot repeatedly, a couple of days apart. A new van in the locality, parked outside a gate for hours without moving. Unusually heavy truck movements, at random times during the day. You and I might not make much of these. But the computer's constantly sniffing for patterns. And asking security officers to investigate.
How did HCL Security suddenly become a pro at all this? After all, American, South African and Israeli security companies spent billions of dollars over many decades, to get where they are today. HCL isn't re-inventing the wheel. What it's doing is making the products these companies make, work together. The X-Ray scanner at the airport check in line, the telephone switching systems that keep employees connected, the ultra small cameras that can be hidden in every nook - they're all made by different companies for different purposes. HCL Security gathered them all together into one streamlined whole, designed to weed out the enemy. For a price I'm betting, that's lower than more established players.
The Commonwealth Games a few months from now, could be the ultimate test of such systems. Networks that let the police, paratroopers, hospitals, transport departments all work in tandem. That eliminate the sort of confusion Mumbai faced during 26/11. Coming out of the HCL Security Office, all this seemed a lot like sci-fi. A bit like Tom Cruise's Minority Report. But the technology exists. And it's coming soon, to a colony near you.I am really proud to have become a part of this company.. I hope if i cannot get into army(god forbid), then i can take care of my country at least in this way..
Naveen Kumar K
Thursday, February 4, 2010
Article on The tale of Steve Jobs ofApple... By Jason Hiner.. Its for my friend Madhuri, who gave this great idea, when i asked her a suggestion on to what should post in my blog..
I hope all of us got to learn something from his ups and downs....... This article is dedicated to Madhuri since its was her who gave this idea.. Of all the CEOs we can see in the industry, its his life thats very different and from whom we can learn a lot........ I hope you all enjoyed this article.....
Thanks a lot.......
How many of you format your PC or laptop because of virus or malware... then this should give you some relief....
Five rules for protecting Windows with antivirus software
Good antivirus software is a critical part of any Microsoft Windows system that communicates with other computers, particularly if it is connected to the Internet and deals with browser, email, or instant messenger traffic. It seems like everybody has his or her favorite antivirus solution and it is different from everyone else’s. For personal desktop systems, however, there are some rules of thumb that seem to be fairly universal among security experts:
- Install your AV software before connecting to the Internet. Any MS Windows computer should have antivirus software installed before connecting to the Internet. I have seen malware insinuate itself onto a computer in less time than it took to download antivirus software to use on the computer. If you have not seen that, and you use that as evidence you do not need to worry about antivirus until after you have opened a browser and navigated to a Website where you can download AV software, you are just playing Russian roulette with your computer’s security.
- Don’t use default AV software. Norton and McAfee, once among the most trusted brands for home antivirus, have taken significant damage to their reputations. These days, most home desktop security experts recommend that any computer that comes with either of these brands of antivirus software get something else installed instead, as quickly as possible. Regardless of what you think of Trend Micro’s enterprise antivirus offerings, the free AV software from Trend Micro that comes with some new computers has never been regarded by many as good enough on its own. In general, the “free” antivirus software you get with your computer will come from a big-name vendor that has more money for marketing than any of the others, and is not the best option for your purposes.
- Get AV with a real-time scanner. You need an on-access, real-time scanner to ensure that some of the most common infection vectors for viruses and worms are checked “live”, to prevent an infection from spreading when your computer first encounters the virus or worm. Real-time scanning can be a real burden on system performance, and there may be times when you will want to turn it off to get your performance back, but be very careful about that. Browsing the Web and checking email are not the times to turn off your antivirus real-time scanner for extra performance.
- Perform regular full-system scans. A real-time scanner is not enough. You should also make sure you perform full-system scans often, and automate the process with a scheduled nightly scan if possible. Real-time scanners only detect an incoming virus before it infects your system if it happens to pass through a point of access that the scanner can effectively protect, and even then sometimes something might get through before there is a virus signature available for your AV software.
- Don’t use two AV programs. Using two antivirus programs at the same time is just asking for trouble. Whether it is because their real-time scanners fight over access and between the two of them can slow your computer to a crawl, or because one might misidentify virus signature files maintained by the other as actual virus infections, many problems can crop up that make using two desktop antivirus applications effectively incompatible with each other.
- Get any installers downloaded from an already protected computer, and burn them to a CD.
- Make sure the MS Windows computer is not yet connected to the network.
- Remove any antivirus software that may have come with it.
- Install AVG Free or Avast, configure it to my liking, and make sure real-time scanning is turned on. Run a complete system scan, just to be safe.
- Install ClamWin, and configure it to run a complete system scan at a scheduled time once a day or once a week (depending on my expected usage habits with this computer) at a time when I’m unlikely to need to use the computer.
But if you try to use ClamWin and Avast together then its gonna create a problem.. People with huge RAM can try it out but if you're haiving lesser RAM capacity then go for AVG or els any one program.. Avast itself takes a lot of memory since it runs many features like network shield, email scanner and many more... So, there are lot of chances that it'lll not give enough chance to the other antivirus that you've installed, to do its work.. It'll just result in hanging of your system or it getting too slow... Avast has got one more feature that according to me as well as this author is very important, its the real-time scanner.. I've seen avast blocking many attacks very regularly on my laptop... Moreover most vendors provide an PC scanner seperately and Internet security scanner seperately.. But avast has both in it... Its kind of a All-in-one program.. But remember, if you wanna use it, then you better have patience..... It scans very very slowly....
Because no antivirus software is perfect, the fact there are two AV applications that can be used to provide simultaneous coverage is a significant advantage in the battle against infection.
Of course, part of the reason they play well together is the lack of real-time canning provided by ClamWin, which is the well-known ClamAV software used for virus scanning on many Linux and Unix-based mail servers. As the ClamWin site explains it:
Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware.I (the author) use AVG for its real-time scanner, and delegate periodic scanning to ClamWin. Every now and then, I’ll run a full system scan using AVG as well, when I know the computer is not going to be busy for a while and the ClamWin scan is not scheduled to run at the same time.
Other factors can play a role in protecting against virus infection, of course. A good firewall; good user practices when browsing the Web, checking email, or downloading files; and even MS Windows User Account Control can help sometimes — though the dubious benefits of UAC may be more trouble than they are worth.
Do not let all the hype about improving security in Microsoft Windows lull you into a false sense of security, in any case. Microsoft still neglects virus and worm exploitable vulnerabilities, default settings are still not what they could be, the fundamental architecture of MS Windows is still far from well armored against infection, and the behavior of the user is still one of the most important factors in determining how likely the system is to get infected.
I hope it was useful........... Any questions related to anti-virus softwares or how to deal with any viruses are welcome.... It happens to be my favorite area... And i have an anti-virus of my own,,,, Well, its under development actually... Currently halted due to reasons i dont wanna explain....... Anyway....... Fire away your doubts if you have any..........
Its time for me to sleep guys.................. Im sleepy...... Cant wait to come back again..........
Bubyeeeeeeeeeee till thennnnnnnnnnnnnnnn........... :-)
Hey have a look at this cool stuff.. This one's for all those tech freaks who likes to toy with their computers........ :-) Here it goes.....
10 cool things you can do with TweakUI
- Author: Scott Lowe
1: Control panel control
The Control Panel Extensions element in TweakUI allows you to selectively enable and disable the display of individual Control Panel applets. This is useful when you want to allow users to retain relatively significant control over their desktops but want to limit some of the damage they can do on their own. Disabling Control Panel applets in this way only turns off the display of those applets. They are still available through other means, but not through the Control Panel itself. Figure A shows this tool in action. Figure B shows the results of disabling Control Panel access to the Main Control Panel applet, which allows access to the mouse and keyboard control items.Figure A
The Control Panel Extensions TweakUI tool
Figure B
The Mouse and Keyboard aren’t shown.
2: Autologon
TweakUI’s popular Autologon tool (Figure C) lets you log on to the desktop as any user. This capability is useful for standalone, task-specific workstations, such as e-mail kiosks or computers connected to public information displays. In most cases, you want these services to automatically recover after incidents such as power outages or even simple reboots, and Autologon helps make that possible. Of course, inappropriate use of Autologon can also be a huge security issue, so do be careful with it.Figure C
The Autologon configuration screen
3: Taskbar and Start Menu options
For me, few things are more annoying than the constant barrage of balloon tips that clutter the bottom of my desktop. Worse, each one demands attention, thus taking me away from the task at hand. Luckily, TweakUI can eliminate the interruptions through the use of the tool’s Taskbar and Start Menu configuration options (Figure D). They enable you to disable balloon tips and taskbar notification icons. Expanding the selection adds more options, including a feature that allows the customized grouping of taskbar application buttons. The Start Menu item provides options for allowing or disallowing specific applications on the More Frequently Used Programs section of the Start menu.Figure D
Taskbar and Start Menu options
4: Preventing apps from stealing focus
I really dislike it when I’m working on a project and another application decides to come between me and my work by stealing focus for itself. I’d much rather just receive notification that another application wants my attention and be able to address the notification when it’s convenient for me. As you might have guessed, Tweak UI has an app for that. The TweakUI General | Focus option (Figure E) lets you keep your focus where you want it. By default, this option will force Windows to flash the would-be thief’s taskbar icon three times to notify you that the app wants something.Figure E
Keep the application focus where you want it.
5: Alt + Tab application selection
I tend to work with many applications simultaneously and often have many windows open for each one — so it’s possible that I have dozens of windows open at the same time. The Alt + Tab window can sometimes be limiting, since it shows only a few windows before requiring me to scroll. With monitors today larger than ever, there’s no reason why the Alt + Tab window can’t be expanded to show more rows and columns. On the General | Alt+Tab page (Figure F), you can choose the number of rows and columns you want to display when you browse through the open applications list.Figure F
Decide how large you want the application selection window.
6: Windows Explorer customizations
Pretty much every aspect of my desktop is customized in some way. From specific items on the Start menu to customized icons in my system tray, I like things to be easily accessible… for me. I doubt that I’m unusual in my desire to customize my computing environment to suit my tastes, and it looks like the creators of TweakUI understood this desire and built some customization features into the tool. These features can also be used by corporate IT to lock down the desktop computing environment.As you can see in Figure G, TweakUI offers quite a few options that can be used to simplify and customize various aspects of the desktop. For instance, you can decide exactly what will appear on the Start menu, how thumbnails will appear (with or without a little arrow), and a whole lot more.
Figure G
Customize Windows Explorer.
7: Centralized Autoplay options
Depending on the system, Autoplay can sometimes be a problem. Or you may just want to control what happens when, such as when you or one of your users inserts a music CD. With TweakUI, you can, from a central location on each system, decide on which drives Autoplay should be allowed (Figure H) and what actions should be taken for each specific Autoplay handler, such as copying music from a CD or playing a DVD (Figure I).Figure H
On which drives should Autoplay be enabled?
Figure I
Configure how specific Autoplay actions take place.
8: Desktop icons
A few default icons can be placed on the desktop: Internet Explorer, My Computer, My Documents, My Network Places, and the Recycle Bin. TweakUI lets you decide which, if any, of these icons should be displayed there (Figure J). You can also decide which icon — My Documents or My Computer — should appear first in order on a particular desktop.Figure J
Decide which icons should appear on the desktop.
9: Command prompt customization
No matter how good the GUI gets, the command prompt is, and probably always will be, a key component for most Windows administrators. From time to time, even users may need to use the command prompt. TweakUI includes a number of command prompt customization options, such as defining which keys to use for filename and directory completion. Figure K shows TweakUI’s command prompt customization options.Figure K
Configure command prompt completion options.
10: Centralized control of local access control options
Many IT departments opt to use Group Policy to control certain rights at the client level, but TweakUI also provides significant capability in this area. By configuring TweakUI’s Access Control options (Figure L), you can control such items as which users are allowed to manage file shares and printer shares and who can connect to administrative shares and access performance counters. When you choose one of these items in TweakUI’s Access Control window, you can use the Change button to select which user accounts can perform the selected action.Figure L
Manage access control options.
As im caught up with my own work right now, i couldn find time to use this tool myself to tell you my own experiences...... But soon i'll be able to post my own experiences and opinions........
Till then enjoy with this................... This is the knowledge that'll help you in future when you do ur projects guys..... Textbook's not gonna put more research content into your brains...... So change yourself that way from now onwards..........
This is for all those book worms out there.... Since its time that we're gonna start our careers, we should go for books other than novels and textbooks.. Or as ?Barney would say "textvels"... :-)
10 books every IT pro should read
Note: This article is also available as a PDF download.
1: Does IT Matter?
Information Technology and the Corrosion of Competitive Advantageby Nicholas Carr
Every institution on the planet relies on information technology in some shape or form. It is the lifeblood of business and it provides most TechRepublic readers with a solid way to make a living. But does it really make a difference? In this thought-provoking look at the IT industry, the author challenges us to examine the role IT plays in the overall success of business. I highly recommend that everyone in IT pick up this book, no matter what your job is. Everyone from the support specialist to the CIO will find it worth their time to read Carr’s analyses.
2: The Road Ahead
by Bill GatesSoon after Windows 95 radically changed computerdom as we knew it back then, Bill Gates released The Road Ahead, in which he examined the personal computing revolution and how it was to play out in a future being paved by the information superhighway of the Internet. There are two editions of this book. The first was published in December 1995 and the second was published in October 1996. The second edition was put together so soon because Gates realized that the Internet was changing the world faster than he had originally theorized in the first edition, and he wanted the book to be as accurate as it was innovative.
While companion CDs are pretty common these days, The Road Ahead was one of the first books I remember purchasing that came with one. Not only does the CD contain the text of the book and supplemental information, but it also includes a couple of video shorts - mini-dramas that provide a look into how the technology discussed in the book would play out in the future. For example, a mother and son take advantage of home-based technology, such as information appliances and interactive TV. In another, a pair of Seattle police detectives uses video conferencing, mobile communications, and electronic wallets. When the boy from the earlier video goes to school, we see all sorts of electronic gadgets being used in education, such as tablet PCs and digital whiteboards.
Even though this book is relatively old, it is still a good read. It offers an interesting perspective of the man who, back then, recognized the path technology was on and steered Microsoft in that direction.
3: Showstopper!:
The Breakneck Race to Create Windows NT and the Next Generation at Microsoftby G. Pascal Zachary
If you’ve been in IT for a while, you remember when Windows NT 3.1 was released in July 1993 and how, as the first fully 32-bit version of Windows, it began to change the world of IT professionals. At the time, this operating system was revolutionary for a number of reasons, including the fact that it was processor-independent, provided a full preemptive multitasking kernel, featured a new file system called NTFS, and possessed many other innovative technological advances.
To create a new version of Windows from the ground up, Microsoft hired Dave Cutler, from Digital Equipment Corporation (DEC), and tasked the creator of the VMS operating system for the VAX superminicomputer with picking up the pieces of what was being developed as OS/2 3.0 and transform it into what would become the foundation for today’s Windows 7.
In this fascinating story, you get a rare and detailed look at the day-to-day machinations that went on inside the walls of Microsoft as the powerful and intelligent Cutler orchestrated the development of the most complex OS ever created for the PC.
4: iWoz: Computer Geek to Cult Icon:
How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing Itby Steve Wozniak
Everyone knows that Steve Jobs is now the leading force at Apple, but he didn’t get there by himself. Back in 1976, Jobs and his business partner, Steve Wozniak, formed Apple Computer and began work on the Apple I, which when released was essentially a circuit board containing about 30 chips. To this circuit board, end users had to connect a power supply, keyboard, and a standard television to get a working system. Using a keyboard for input and a television for output made the Apple I stand out from the competition. For example, the Altair 8800 used toggle switches for input and colored indicator lights for output.
In this book, Wozniak presents the story of his early years and his fascination with emerging computer technology and how he teamed up with Steve Jobs and created the first modern computer. Not only does the book provide an interesting, yet quirky, historical perspective on the beginnings of Apple, but it is filled with wonderful techy anecdotes, old photos, and even a glossary of computer terms.
Even if you’re not an Apple fan, this book is a fun read.
5: The Cuckoo’s Egg:
Tracking a Spy through the Maze of Computer Espionageby Cliff Stoll
Back in 1986, an astronomer named Cliff Stoll took a job as a computer operator at the Lawrence Berkeley Laboratories when his grant money ran out. He stumbled upon and began tracking an unauthorized user through a maze of networks that included hacking into computers at universities, defense contractors, and military bases. Stoll eventually uncovered an international spy ring that was hacking into these computers, seeking out U.S. intelligence, and selling it to the KGB.
As a methodical scientist, Stoll began keeping a daily log book in which he documented the hacker’s movements and methods. To add credibility to what he was witnessing, he set up traps, such as making sure that the hacker had access to the Lawrence Berkeley network where a teletype printer recorded everything the hacker typed and setting up a honeypot in the guise of a fake Strategic Defense Initiative account filled with fake documents that would keep the hacker involved long enough to backtrack the connection to its origin. The investigation lasted close to a year and involved a multitude of federal agencies, including the the FBI, CIA, NSA, and Air Force OSI.
Based on his experiences and vividly recounted with the aid of his detailed logs, this book documents an incredible true story of international computer espionage that is both educational and entertaining.
6: Gödel, Escher, Bach:
An Eternal Golden Braidby Doug Hofstadter
A deep exploration of the workings of the human mind, using as examples the works of logician Kurt Gödel, artist M. C. Escher, and composer Johann Sebastian Bach, this book provides a philosophical outlook on how life, thoughts, and technology are all linked together. There are so many different and fascinating ideas presented in this book, along with wonderful illustrations, charts, diagrams, and complex formulas, that reading it is like exploring a foreign yet familiar land.
It is a captivating book, but because of its heavy subject matter, I found it best read it in small chunks over time.
7: The Google Story
by David Vise and Mark MalseedOver the years, we’ve all picked up bits and pieces of the history behind Google’s rise and its brilliant cofounders, Larry Page and Sergey Brin. But in this book, which was updated for Google’s 10th birthday, we get the real inside story, because the authors were allowed seemingly unfettered access to historical documents and people at Google — including Page and Brin.
They present a unique perspective on the people behind the scenes as you learn about the company’s milestone events, such as the arrival of the first investor, the development of the Googleplex campus, the origins of keyword-targeted Web ads, the IPO, new product developments, and much more. Along the way, you’ll learn a lot about how the search business works and much more about Google’s plans for expansion of its searchable database.
8: Wikinomics:
How Mass Collaboration Changes Everythingby Don Tapscott and Anthony D. Williams
By now, everyone is familiar with Wikipedia — the massive collaborative effort aimed at providing the world with an encyclopedic source of information about everything. Thousands of people contribute to Wikipedia on a regular basis and it has become a terrific example of what can be accomplished when people use the world wide access of the Internet to work on a common goal.
This book explores how many companies have and can use mass collaboration and wikis to grow quickly and successfully. In fact, the book begins with the story of how Goldcorp CEO Rob McEwan learned of the success of the Linux open source initiative, realized that the closely guarded company secrets of mining for gold were no longer yielding viable results, and decided to share the company’s geological data on the Web along with the offer of $575,000 in prizes to those who could come up with the best way to find and extract gold on the company’s 55,000 acre mining facility. Suggestions based on the data poured in and out of the 55 new targets that were identified, 80% hit pay dirt.
Citing Goldcorp’s success as an example of Wikinomics, the authors go on to provide examples of other companies and describe in detail how these companies employed and harnessed collaborative efforts, or Wikinomics, to grow and be even more successful.
9: Microserfs
by Douglas CouplandThis is a thoroughly amusing story about a group of fictional characters working at Microsoft who feel that life at the company is like being in a feudalistic society, with Bill Gates as the lord and the employees as the serfs. As the story progresses, you learn more about each of the characters and how their lives are intertwined with each other, their products, and Microsoft.
Later, the group leaves Microsoft and Seattle and moves to the San Francisco where they start a new company. Living in California is different from Seattle, and you see the characters shed their Microserf skin and evolve in different ways.
10: The Soul of a New Machine
by Tracy KidderWe all know what a cutthroat business the PC industry is and that the extreme competition that exists between rival companies can also exist inside a company as employees vie for resources and power. This type of competition is more widely publicized nowadays, but it wasn’t invented by those in the PC industry. In The Soul of a New Machine, Kidder documents the internal turmoil that embroils two groups of Data General Corporation engineers tasked with developing a new a minicomputer that will go head-to-head with a new VAX computer from archrival Digital Equipment Corporation.
Along the way, we learn more about the lives of the engineers, most notably a fellow by the name of Tom West, and how he and his team beat out the other group and then have to prove themselves worthy as they grapple with such challenges as making sure that the new system is backward compatible with earlier systems, using new and untested technology, and relying on young team members fresh out of college.
Published in 1981 (incidentally the same year that the IBM PC made its debut), this book won a Pulitzer Prize.
What is your favorite IT-related book?
Of course, this list isn’t comprehensive, as there are hundreds of IT-related books out there. What’s missing from this collection? Tell me about your favorite IT-related book....... :-)Which book are you gonna choose huhhhh????????????
Here's another article from Toni Bowers.... Thanks to her.. This article helps all those, including me, who are still confused as to what technology is in boom right now... Chech it out..
IT career: What's hot (cloud computing) and what's not (tech certs)
The Hackett Group is advising companies to not hire back U.S. and European IT workers who have been laid off; instead they recommend filling any needs overseas. (The IT positions they are referring to are those that such as support and systems administration.)
On the good news side, a Goldman Sachs study predicts a 4 percent rise in IT spending in larger companies, which indicates some positive momentum. Surveys by IDC and Gartner also predict slight upticks in IT spending in 2010.
So the question is where is the spending going to concentrate in terms of hiring? Experts at tech placement firms are saying the demand for cloud-oriented tech experts is way up. And they are projecting a strong demand for network administrators, security managers, and systems engineers. Other promising areas are:
- Software architects
- Java and .NET/C++ developers
- Quality assurance pros
- Agile-capable developers
- SAP consultants
The outlook on certifications
The vast majority of tech certification categories show a decline in value (Web development certifications, in particular, plummeted last year), with the exception of two types:Security certs which usually are required for work in banking, financial services, and other regulated industries. Specific security skills in demand include security auditing, e-discovery, vulnerability assessment, Cisco-CCNP, and Cisco Certified VoIP Professional certifications, given VoIP’s growing adoption in the midmarket.
The certifications that show the biggest gains in value are those that involve project and process management, such as certs from credentialed IT-business programs (e.g., IT for financial services, IT for heath care, etc.). Certifications that command some of the highest pay have ties to revenue, like the ITIL v3 Master and PMI certifications.
The top five certifications in terms of pay growth, according to Foote Partners, are:
- IT Certified Architect (ITCA/OPenGroup)
- Certified Information Security Manager (CISM)
- InfoSys Security Architecture Professional (ISSAP/CISSP)
- Microsoft Certified Systems Administrator: Messaging (MCSA)
- Cisco Certified Network Professional (CCNP)
Did you alll like it... Once again lets thank Toni Bowers for such a great article.... Come on guys,, No matter how many HR managers or Developers working at companies we ask.. None of then gives us a proper answer.. I would say that this article came as a ray of hope or solution to most of our doubts, if not all.. Its always very helpful to kick start our plans and career with a credible information... N this is just the source im sure everyone's been waiting for......... So, enjoyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy :-)
Come in people.... You have to comment and let me know whether you liked it or not.. Not only this but al the things im posting.. Only then i can make this place still better........ Hope you will......
See you all soonnnnnnnnn.................