Sunday, December 13, 2009

Retail Display Allowance:

RDA is the monies paid by a manufacturer to have their products on display, usually in a certain location.
It can also be defined as the decrease in the amount paid by a retailer to a manufacturer in exchange for a more prominent display of the product in the store or on the shelf.

Thursday, December 10, 2009

Percent Chart:

It is a control chart for evaluating the stability of a process in terms of the percentage of the total number of units in a sample in which an event of a given classification occurs. It is also referred to as a proportion chart.

Monday, December 7, 2009

Counting the number of values between upper and lower limit:

Problem:

Finding the number of values in List1 (Column A) that are larger than 20 and smaller than 50.

Solution:

Use the COUNTIF function as shown in the following formula:
=COUNTIF(A2:A7,"">20"")-COUNTIF(A2:A7,"">=50"")
Or use the SUMPRODUCT function as shown in the following formula:
=SUMPRODUCT((A2:A7>20)*(A2:A7<50))

Sunday, December 6, 2009

Push Items:

Push items are the products that receive maximum marketing and merchandising attention to increase their sales volume.

Wednesday, December 2, 2009

Use Copywriting principles for your presentations:

If you create presentations to sell or to persuade, deciding what you want to say, and in what order, is obviously extremely important. Copywriting is the best way to do so. Copywriting is usually defined as the art and science of writing to sell. From this process, copywriters have derived tried and true principles for effective selling and persuading.
The most common structure is called AIDA:
• Attention: Get attention.
• Interest: Keep interest
• Desire: Create desire
• Action: Spur action
Get attention
In traditional copywriting, you use the heading to get attention. In a presentation, the first words out of your mouth should get your audience's attention.
• Say or do something to get attention.
• Ask the audience a challenging question
• Display a striking, full-slide photo.
• Put a thought-provoking quote on a slide.
• Tell a meaningful story
Keep interest
You hold people's interest by:
• Making sure the content is relevant to your audience
• Providing information they don't know
• Using the Tell 'n' Show (SM) method to communicate visually
• Interacting with the audience, including eye contact, answering questions, and asking questions
Create desire
Create desire by showing the audience how they can benefit and what your points mean to them. Highly sensorial images also help. If you have customer testimonials, use them.
Spur action
At the end of your presentation, summarize what you've said and state your conclusion. Invite comments so that you have a chance to respond to any concerns. Finish by asking for the next step, whether it is signing a contract, approving a project, or setting up another meeting. Have the necessary materials (the contract, approval form, your calendar) so you can accomplish your goal.

Tuesday, December 1, 2009

Drag and Drop Calendar Rescheduling:

We don't have to open/edit a calendar entry in order to reschedule it. From a calendar view, you can drag and drop the entry to either a completely new date/time, or you can drag the start or end time to make the meeting longer or shorter.

Monday, November 30, 2009

Muda:

Muda is a Japanese word for waste; any activity that consumes resources but creates no value for the customer.

The following seven wastes identify and classify resources which are commonly wasted.
1. Overproduction
2. Unnecessary transportation
3. Inventory
4. Motion
5. Defects
6. Over-Processing
7. Waiting

Thursday, November 26, 2009

Package Pilferage:

Pilferage is the theft of part of the contents of a package. It may also include theft of the contents but leaving the package, perhaps resealed with bogus contents. Small packages can be pilfered from a larger package such as a shipping container. Broader aspects of theft may include taking the entire package, pallet load, truck load, shoplifting, etc.

Tuesday, November 24, 2009

Zombie Computer:

A zombie computer (often shortened as zombie) is a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies.
Zombies have been used extensively to send e-mail spam; as of 2005, an estimated 50–80% of all spam worldwide was sent by zombie computers. This allows spammers to avoid detection and presumably reduces their bandwidth costs, since the owners of zombies pay for their own bandwidth. This spam also greatly furthers the spread of Trojan horses; as Trojans, they are not self-replicating. They rely on the movement of e-mails or spam to grow, whereas worms can spread by other means.

Monday, November 23, 2009

Jumping to a specific worksheet:

If you have a huge number of worksheets in a workbook, you may be looking for a way to jump to a specific sheet rather easily.
If you know the name of the worksheet you want to jump to, you can also use the Go To capabilities of Excel. Follow these steps:
1. Press F5. Excel displays the Go To dialog box.
2. In the Reference box, enter Sheet83!A1. (Replace "Sheet83" with the name of the worksheet you want to jump to.)
3. Click OK.

Thursday, November 19, 2009

Maintainability:

The probability that a given maintenance action for an item under given usage conditions can be performed within a stated time interval when the maintenance is performed under stated conditions using stated procedures and resources.
Maintainability has two categories: serviceability (the ease of conducting scheduled inspections and servicing) and repairability (the ease of restoring service after a failure).

Wednesday, November 18, 2009

Physical Inventory:

Physical inventory is a process where a business physically counts its entire inventory. A physical inventory may be mandated by financial accounting rules or the tax regulations to place an accurate value on the inventory, or the business may need to count inventory so component parts or raw materials can be restocked. Businesses may use several different tactics to minimize the disruption caused by physical inventory.
• Inventory services provide labor and automation to quickly count inventory and minimize shutdown time.
• Inventory control system software can speed the physical inventory process.
• A perpetual inventory system tracks the receipt and use of inventory, and calculates the quantity on hand.
• Cycle counting, an alternative to physical inventory, may be less disruptive.

Tuesday, November 17, 2009

Send Email Notification for Calendar Entries:

On the top right corner of a calendar entry, select Notify me, or click on the Alarm icon.


This brings up the Alarm Notification Options dialog. At the bottom you can click "Send mail notification" and enter the email address for your phone. (Mobile@serviceprovider.com)


In order for this to work, the Notes client must be running.

Monday, November 16, 2009

Compress Bitmaps in PowerPoint to reduce the size:

After creating a huge presentation because of many large bitmap images, you can try compressing the images with PowerPoint's own tool. Select Save As, and then in the dialog look in the Tools menu for the Compress Pictures command. If that doesn't give you what you want, you might consider trying a third-party utility called NXPowelite. It is designed for precisely this purpose.

Sunday, November 15, 2009

Parity Price:

The term "parity" refers to equality. Thus, parity price is a price for an asset that is directly linked to another price. Examples of parity price are:

1. Convertibles - the price at which a convertible security equals the value of the underlying stock.
2. Options - when an option is trading at its intrinsic value ("trading at parity").
3. International parity - official rates for a currency in terms of other pegged currencies, typically the U.S. dollar.
4. Commodities - a commodity's price dependent on a composite of prices during a period of time, usually the most recent 10-year period.
5. Listed parity - situation when all parties involved are of equal standing and priority.

Thursday, November 12, 2009

Saving the frequently used formula:

For example, let us add a formula for calculating the value of the
previous year: = YEAR(TODAY())-1

To define a Name that returns the result of a formula:

1. Press Ctrl+F3 for the Define Name dialog box.

2. In the Names in workbook box, type LastYear.

3. Type the formula =YEAR(TODAY())-1 in the Refers to box, and then click OK.


To enter the formula into a cell:

1. Type the = sign, and then press F3 for the Paste Name dialog box.

2. Select the Name LastYear, and then click OK.

Wednesday, November 11, 2009

Lost Customer Analysis:

A research method used to determine the reasons an individual customer or a class of customers has withdrawn its business, whether by switching to a competing firm or by ceasing to use a given product or service entirely. Such analysis usually includes surveys of "lost" customers, and is used to improve performance by identifying and neutralizing sources of potential or actual customer dissatisfaction.

Calendar Navigation:

From any calendar view, place your mouse over an empty spot and right click. This will present you menu items including "Go To Today" or "Go To Date..."



"Go To Date..." allows you to quickly jump to any date you enter.

Monday, November 9, 2009

Tips to improve interpersonal skills:

Interpersonal Skills is one of the elements how you are perceived by your manager and coworkers, which play a large role in things as minor as your day-to-day happiness at the office and as major as the future of your career.
No matter how hard you work or how many brilliant ideas you may have, if you can’t connect with the people who work around you, your professional life will suffer.
Here are some tips, on how to improve our Interpersonal Skills.
• Smile. Few people want to be around someone who is always down in the dumps. Do your best to be friendly and upbeat with your coworkers. Maintain a positive, cheerful attitude about work and about life. Smile often. The positive energy you radiate will draw others to you.
• Be appreciative. Find one positive thing about everyone you work with and let them hear it. Be generous with praise and kind words of encouragement. Say thank you when someone helps you. Make colleagues feel welcome when they call or stop by your office. If you let others know that they are appreciated, they’ll want to give you their best.
• Pay attention to others. Observe what’s going on in other people’s lives. Acknowledge their happy milestones, and express concern and sympathy for difficult situations such as an illness or death. Make eye contact and address people by their first names. Ask others for their opinions.
• Practice active listening. To actively listen is to demonstrate that you intend to hear and understand another’s point of view. It means restating, in your own words, what the other person has said. In this way, you know that you understood their meaning and they know that your responses are more than lip service. Your coworkers will appreciate knowing that you really do listen to what they have to say.
• Bring people together. Create an environment that encourages others to work together. Treat everyone equally, and don't play favorites. Avoid talking about others behind their backs. Follow up on other people's suggestions or requests. When you make a statement or announcement, check to see that you have been understood. If folks see you as someone solid and fair, they will grow to trust you.
• Resolve conflicts. Take a step beyond simply bringing people together, and become someone who resolves conflicts when they arise. Learn how to be an effective mediator. If coworkers bicker over personal or professional disagreements, arrange to sit down with both parties and help sort out their differences. By taking on such a leadership role, you will garner respect and admiration from those around you.
• Communicate clearly. Pay close attention to both what you say and how you say it. A clear and effective communicator avoids misunderstandings with coworkers, colleagues, and associates. Verbal eloquence projects an image of intelligence and maturity, no matter what your age. If you tend to blurt out anything that comes to mind, people won’t put much weight on your words or opinions.
• Humor them. Don’t be afraid to be funny or clever. Most people are drawn to a person that can make them laugh. Use your sense of humor as an effective tool to lower barriers and gain people’s affection.
• See it from their side. Empathy means being able to put yourself in someone else’s shoes and understand how they feel. Try to view situations and responses from another person’s perspective. This can be accomplished through staying in touch with your own emotions; those who are cut off from their own feelings are often unable to empathize with others.
• Don't complain. There is nothing worse than a chronic complainer or whiner. If you simply have to vent about something, save it for your diary. If you must verbalize your grievances, vent to your personal friends and family, and keep it short. Spare those around you, or else you’ll get a bad reputation.

Sunday, November 8, 2009

Pick Ticket:

Pick Ticket is a small label that warehouse selectors use to select items to be shipped.

Thursday, November 5, 2009

Three essential skills for an effective Presentation:

These are the three essential pieces of information that can make your presentation fly.
- Use visual aids where you can
- Rehearse, rehearse, and rehearse
- The audience will only remember three messages
Use Visual Aids:

Professor Albert Mehrabian did a lot of research into how we take in information during a presentation. He concluded that 55% of the information we take in is visual and only 7% is text.
There are some important conclusions that we can take in from this information
1. Use visuals (pictures, graphs, tables, props) whenever you can
2. In a speech you are only using 38% of the communication medium
3. Ditch the bullet points
In a Study at the Wharton Research Centre they showed that using visual slides had a dramatic effect on message retention. The effect of using visuals is truly staggering!

Rehearse your presentation
"If you fail to prepare, you are prepared to fail"
Rehearsing could make the difference between a good and an average presentation.
Plan to rehearse your presentation out loud at least 4 times. Make sure that one of your rehearsals is in front of a really scary audience - family, friends, partners, colleagues; children. They will tell you quite plainly where you are going wrong - as well as providing you with the support that you need.
Rehearse against the clock. If you have to give a presentation in a short period of time then try to practice your presentation against the clock. This is particularly true with something like the five minute job presentation.
Audience will remember only three things
People tend to remember lists of three things. Structure your presentation around threes and it will become more memorable.
The audience is likely to remember only three things from your presentation - plan in advance what these will be. In Presentations "Less is More".

Wednesday, November 4, 2009

Understanding Access Levels

Access to the information inside a Lotus Notes database is not simply a matter of "yes you can", or "no you can't". There is a very robust security model in place which controls which documents people can and can not see, edit, and delete. In this tip I'll provide a basic introduction to the various degrees of access, which are referred to in Lotus Notes as Access Control Levels.

No Access: You can not open the Notes database at all. When you try, you will receive the following message:



Depositor: You can create a new document (fill in a form), but once you have saved and closed it, you can no longer update it, nor even see it again. Actually depositors can't see any documents in the database at all. Not those they have created themselves, nor those others have created. A good analogy is filling out a suggestion form in a restaurant or hotel and dropping it off in a little sealed box. Once you've "deposited" it into the box, you can no longer see it, update it, or see the other forms people have deposited. Other examples include voting applications, or raffle/ballot box type contests. You get to create a new ballot, but once you deposit it, you no longer have any access, and you can't see what others have done either.

Reader: You can open a database, and read the documents which you are authorized to see. You can not create new documents, update any existing documents, nor delete any documents. A good example might be a Policies and Procedures database. Information you need to read, but not necessarily update yourself.

Author: You can create new documents. You can also edit (update) the documents you created. Additionally, you may have access to delete the documents you created, but this is not always the case. It is up to the owner or Manager, of the database. This is good for a Discussion type database, where you need to share information and respond to others, but you should not be allowed to change what anyone else writes.

Editor: Similar to Author, but extends the abilities to documents created by anyone, not just the documents you created. A typical scenario for editor access is when you are working with a team of people, and you are sharing work that anyone can update at any time.

These five levels represent the "basics" of access to Lotus Notes data.

Tuesday, November 3, 2009

Key Performance Indicator (KPI)

A performance indicator or key performance indicator (KPI) is a measure of performance. Such measures are commonly used to help an organization define and evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals.

KPIs may be monitored using Business Intelligence techniques to assess the present state of the business and to assist in prescribing a course of action. The act of monitoring KPIs in real-time is known as business activity monitoring (BAM). KPIs are frequently used to "value" difficult to measure activities such as the benefits of leadership development, engagement, service, and satisfaction. KPIs are typically tied to an organization's strategy using concepts or techniques such as the Balanced Scorecard.
The KPIs differ depending on the nature of the organization and the organization's strategy. They help to evaluate the progress of an organization towards its vision and long-term goals, especially toward difficult to quantify knowledge-based goals.

Monday, November 2, 2009

Changing the Layout of Charts from Rows to Columns and Vice versa:

When you create a chart, Excel checks the number of rows and columns.

In the example below, there are six rows (in Column A, Zone) and three columns (years).

In a chart created automatically by pressing F11, rows from the data table are created on the category axis.

To switch from rows to columns in the category axis, select the chart, and from the Chart menu, select Source Data. In Series in, select Columns.

Sunday, November 1, 2009

Rain Check:

Rain Check is a chit that stores give customers for sales items that are sold out. It allows the customer to return at a later date and purchase the item at the sale price.

Wednesday, October 28, 2009

Push/Pull Marketing:

A marketing concept in which product is "pushed" by a manufacturer with a special promotion (advertising, merchandising) and "pulled" out of the store through customers' demand created by the promotion.

Tuesday, October 27, 2009

Fast Copying and Pasting in Adjacent Cells:

1. Select cell B1.
2. Place the mouse on the handle in the bottom right-hand corner of the cell.
3. Double-click when the mouse pointer changes into a plus symbol. Excel copies the constants or formulas in the cell down the length of column B.

Monday, October 26, 2009

Just In Time Training:

The provision of training only when it is needed to all but eliminate the loss of knowledge and skill caused by a lag between training and use is called Just in Time Training.
The advantage to implementing JIT is the shortened time between learning and application. The most basic version of this kind of training is a software, that you can download or purchase as a library. When an employee needs to learn a new function or task, all they have to do is log in to the system and start learning.
JITT (Just in time training) is a way to streamline educating the workforce. Among the benefits of this kind of employee development is that you don't need to engage a teacher to teach the class, you don't need to schedule a class or classroom. The cost benefits of JITT are tremendous, in addition to the ability to train employees in a near automated fashion.
The key to these autonomous learning systems is the ability to train groups of employees in multiple areas on a fully automated basis. Because grading the tests is automated as well, a manager can simply assign a new employee the lessons they need to learn and have the test scores emailed as soon as the test is finished. JITT learning systems are but one of the many innovative methods for training the workforce.

Thursday, October 22, 2009

Rack Robber:

A wholesaler or vendor that orders and delivers product and services a non-food department in a food store on a contract basis, e.g., health and beauty care (HBC).

Wednesday, October 21, 2009

Enter Extended Characters:

When entering text, Lotus Notes allows you to enter what is called "extended characters". There are things like accented characters (â, ä, á, å), symbols (®, ™, ©), fractions (½, ¼, ¾), and more. There are two ways to enter these extended characters.

The first is to press ALT+F1, then press the appropriate "Compose sequence". For example:
™ is created by pressing ALT+F1, then t, then m.
® is created by pressed ALT+F1, then r, then o.
Note: The "compose sequences" are different for Windows and Macintosh.
The second way to create extended characters is a little more complex, but is consistent across Windows and Macintosh. You can press ALT+F1, then ALT+F1 again, then the appropriate "Extended compose sequence". For example:
® is created by pressing ALT+F1, then ALT+F1, then 0-169.
© is created by pressing ALT+F1, then ALT+F1, then 0-184.
For your reference, the list of extended characters available is easily found in your Lotus Notes Help database in the document "Special characters listed by extended compose sequence". Alternatively, you can access the list on web via Special characters listed alphabetically by name of character , or Special characters listed by extended compose sequence.

Tuesday, October 20, 2009

Jidohka:

Jidohka is Stopping a line automatically when a defective part is detected. Any necessary improvements can then be made by directing attention to the stopped equipment and the worker who stopped the operation. The jidohka system puts faith in the worker as a thinker and allows all workers the right to stop the line on which they are working.

Save Filter Criteria:

1. Select a cell from the column containing the criteria you want to filter with.
2. Click the AutoFilter icon
3. Type any text criteria you want into the Custom Views box and click twice to save.
4. Repeat the previous step and save as many filtering criteria as needed from any sheet within the workbook.

Sunday, October 18, 2009

Over & Under:

A management standard for cash-register receipts and for inventory discrepancies, e.g., breakage, price adjustments.

Wednesday, October 14, 2009

Instant Pudding:

A term used to illustrate an obstacle to achieving quality or the supposition that quality and productivity improvement are achieved quickly through an affirmation of faith rather than through sufficient effort and education. W. Edwards Deming used this term, which was coined by James Bakken of Ford Motor Co., in his book Out of the Crisis.

Monday, October 12, 2009

Counting Unique numeric values or unique data in a List:

Solution1:

To count the number of unique values use the SUM, IF, and FREQUENCY functions as shown in the following formula:

= SUM(IF(FREQUENCY(A2:A13,A2:A13)>0,1))


Solution 2:

To count the number of unique data use the SUMPRODUCT and COUNTIF functions as shown the following formula:

=SUMPRODUCT((A2:A13<>"")/COUNTIF(A2:A13,A2:A13&""))

Sunday, October 11, 2009

Product Sampling:

A consumer promotion in which small sizes of products, usually new, are sold at a low price to encourage consumers to try them is called Product Sampling. Free tastings or demonstrations to introduce consumers to a new item also come under this category.

Thursday, October 8, 2009

Highly Accelerated Life test (HALT):

A process for uncovering design defects and weaknesses in electronic and mechanical assemblies using a vibration system combined with rapid high and low temperature changes. The purpose of HALT is to optimize product reliability by identifying the functional and destructive limits of a product at an early stage in product development.

Monday, October 5, 2009

Remote Login:

Until recently, virtual private networks (VPN) were the only way to remotely access work files from home. But VPN access isn't the same as accessing the hard drive of your work computer. VPN gives you access to the local area network (LAN) at your office. With VPN, you're only able to access your PowerPoint presentation files if you've saved them on the network, not just on your computer's hard drive.
Remote login, however, uses simple desktop sharing software to give you a "remote control" for accessing your computer -- and all of its software and hard drive files -- from any Internet-connected device anywhere in the world.
Remote login works exactly the same way as desktop sharing. In desktop sharing, there are two separate parties: the host computer and the remote user. To share a desktop, the host computer allows a remote user to view the contents of the host computer's desktop over the Internet. The host computer can also hand over keyboard and mouse controls to the remote user. With remote log-in, your home or work computer is the host and you (in this case) are the remote user.
Remote login requires three basic components:
• Software download
• Internet connection
• Secure desktop sharing network

For remote login to work, both the host computer and all remote users have to download and install the same desktop sharing software. Desktop sharing software typically includes two distinct programs:
• The desktop sharing client that runs on the host computer
• A viewer program that allows the remote user to view the contents of the host computer's desktop in a resizable window

Remote login will only work if the host computer is powered on, connected to the Internet and running the desktop sharing software. Each time you open and run the desktop sharing software on the host computer, the software starts a new session. Each session has a particular ID and/or password that's required to remotely log in to the host computer. Once the session has been established, most desktop sharing software quietly runs in the background of the host computer until a remote login request is made.¬
To log in to the host computer from home (or while traveling), you'll need to run your version of the same desktop sharing software and enter in the correct session ID or password. Or some services allow you to log in through a Web site. Once you're logged in, both computers will communicate with each other over a secure desktop sharing network. Access to this network can be free or subscription-based, depending on the service. While connected, you'll have access to keyboard controls, mouse controls, all software and all files on the host machine.
For security purposes, all packets of information that are sent over the network are typically encrypted on each end with secure shell (SSH) or 128-bit advanced encryption standard (AES) encoding. For added security, no session IDs or passwords are stored on desktop sharing servers; they're automatically generated by the host machine.

Mail Highlighter:

This works similar to how you'd use a highlighter in real life. First you need to enable the highlighter. You do this by choosing Text - Highlighter - and then selecting which color you want. You will see your mouse cursor change into the highlighter icon.



Next position the highlighter at the start of the text you wish to call attention to, then press (and don't release) the left mouse button, then drag your mouse from left to right over the text you want highlighted, releasing the button when you want to stop.



Unlike a real highlighter, in Notes you can "un-highlight" by moving over the text from right to left. The text will turn "grey" while you are moving over it, but when you release the mouse button it will be back to normal.

Wednesday, September 30, 2009

Indent text in Cells:

To indent text in cells, for example, for a list of expenses under each department:

1. Select the list of expenses below each division, for example, select cells A2:A6 (a group of expenses for Department 1).

2. Click the Increase Indent icon on the Formatting toolbar several times, until you reach the desired indentation.

Tuesday, September 29, 2009

Groupthink:

Groupthink is a type of thought exhibited by group members who try to minimize conflict and reach consensus without critically testing, analyzing, and evaluating ideas. Individual creativity, uniqueness, and independent thinking are lost in the pursuit of group cohesiveness, as are the advantages of reasonable balance in choice and thought that might normally be obtained by making decisions as a group. During groupthink, members of the group avoid promoting viewpoints outside the comfort zone of consensus thinking. A variety of motives for this may exist such as a desire to avoid being seen as foolish, or a desire to avoid embarrassing or angering other members of the group. Groupthink may cause groups to make hasty, irrational decisions, where individual doubts are set aside, for fear of upsetting the group’s balance. The term is frequently used pejoratively, with hindsight.

Product Liability:

A legal term in tort law that means consumers can sue manufacturers, distributors or retailers for defective or unsafe products.

Wednesday, September 16, 2009

Perpetual Inventory:

A system that maintains an expected inventory level within a store that reflects all physical product movement sales, deliveries, credits, etc. is called Perpetual Inventory.
In business and accounting/accountancy, perpetual inventory or continuous inventory describes systems of inventory where information on inventory quantity and availability is updated on a continuous basis as a function of doing business. Generally this is accomplished by connecting the inventory system with order entry and in retail the point of sale system. In this case, book inventory would be exactly the same as, or almost the same, as the real inventory.
In earlier periods, non-continuous or periodic inventory systems were more prevalent. Starting in the 1970's digital computers made possible the ability to implement a perpetual inventory system. This has been facilitated by bar coding and lately radio frequency identification (RFID) labeling which allows computer systems to quickly read and process inventory information as part of transaction processing.

Tuesday, September 15, 2009

Failure Mode Analysis (FMA):

A procedure to determine which malfunction symptoms appear immediately before or after a failure of a critical parameter in a system is called Failure Mode analysis. After all possible causes are listed for each symptom; the product is designed to eliminate the problems.

Monday, September 14, 2009

Create a Pivot Table:

1. Select any cell in the source data, and press Ctrl+Shift+* (in Excel 2003, press this or Ctrl+A).
2. Press Ctrl+F3, and then type the defined Name for the source data.
3. From the Data menu, select PivotTable and PivotChart Report.
4. In Step 1 of 3, select Microsoft Excel list or database, and then click Next. In Step 2 of 3, in the Range box, press F3 to open the Paste Name dialog box, and paste the Name of the source data as defined in step 2.
5. Click Next.
6. In Step 3 of 3, click Layout (in Excel 97, go to step 8).
7. In Excel 2002 and Excel 2003, you can skip this step. Instead, click Finish in Step 2 of 3 and then create the PivotTable report by dragging the fields from the Pivot Table Field List dialog box to the PivotTable report.
8. In the Layout dialog box, drag the Data Fields to the white Data area, and drag all other fields to the white Page area (except fields that are not going to be used in the PivotTable report), and then click OK.
9. In Step 3 of 3, click Finish. The PivotTable report is created.
10. Drag Data (in cell A5 in the screenshot) to the right of the PivotTable report to change the layout from horizontal to vertical.
11. The PivotTable report is now ready to be used. For more details on how to use the PivotTable report properly, see the other tips in this category.

Thursday, September 10, 2009

Operating Statement:

An accounting statement that itemizes revenues, expenses and profits of a department, store, division, company or other business unit is called Operating Statement. It is also referred to as a P&L statement or income statement.

Wednesday, September 9, 2009

Difference between College and University:

One of the first meanings of college was 'a society of scholars incorporated within, or in connection with, a university, or otherwise formed for purposes of study or instruction'. That definition shows that historically college was subordinate to university. From the fact that in some universities only a single college was founded or has survived, in which case the university and college became co-extensive, the name has come, as in Scotland and the United States, to be interchangeable with university as 'a college with university functions'. In the US, college has been the general term, and is still usually applied to a small university or degree-granting educational institution having a single curriculum of study. The name university is given mainly to larger institutions which are divided into various faculties and which more resemble the universities of Europe.

Monday, September 7, 2009

Moving Folders:

Say you have Folder 1, Folder 2, and Folder 3. You want to move Folder 3 into Folder 2 (making it a sub-folder), but when you right-click on Folder 3 you notice there are commands for Remove, Rename, and Designer, but not Move.



Here is what you do...

With Folder 3 open, you can choose Actions - Folder Options - Move... from the Notes menus



Which then brings up a dialog box allowing you to choose where to move the folder.



Now of course this could just be done using drag and drop if you would like.

Sunday, September 6, 2009

Eight Wastes:

Taiichi Ohno originally enumerated seven wastes (muda) and later added underutilized people as the eighth waste commonly found in physical production.
The eight are:
1. Overproduction ahead of demand;
2. Waiting for the next process, worker, material or equipment;
3. Unnecessary transport of materials (for example, between functional areas of facilities, or to or from a stockroom or warehouse);
4. Over-processing of parts due to poor tool and product design;
5. Inventories more than the absolute minimum;
6. Unnecessary movement by employees during the course of their work (such as to look for parts, tools, prints or help);
7. Production of defective parts;
8. Under-utilization of employees’ brainpower, skills, experience and talents.

Tuesday, September 1, 2009

Methods and Types of Electronic Payments:

An electronic payment is any kind of non-cash payment that doesn't involve a paper check. Methods of electronic payments include credit cards, debit cards and the ACH (Automated Clearing House) network. The ACH system comprises direct deposit, direct debit and electronic checks (e-checks).

For all these methods of electronic payment, there are three main types of transactions:
• A one-time customer-to-vendor payment is commonly used when you shop online at an e-commmerce site, such as Amazon. You click on the shopping cart icon, type in your credit card information and click on the checkout button. The site processes your credit card information and sends you an e-mail notifiying you that your payment was received. On some Web sites, you can use an e-check instead of a credit card. To pay by e-check, you type in your account number and your bank's routing number. The vendor authorizes payment through the customer's bank, which then either initiates an electronic funds transfer (EFT) or prints a check and mails it to the vendor.
• You make a recurring customer-to-vendor payment when you pay a bill through a regularly scheduled direct debit from your checking account or an automatic charge to your credit card. This type of payment plan is commonly offered by car insurance companies, phone companies and loan management companies. Some long-term contracts (like those at gyms or fitness centers) require this type of automated payment schedule.
• To use automatic bank-to-vendor payment, your bank must offer a service called online bill pay. You log on to your bank's Web site, enter the vendor's information and authorize your bank to electronically transfer money from your account to pay your bill. In most cases, you can choose whether to do this manually for each billing cycle or have your bills automatically paid on the same day each month.

Monday, August 31, 2009

Patronage Dividend:

A wholesaler's refund to a member retailer to distribute profits is called Patronage dividend. It is determined by totaling purchases for a given time period or of specified items.

Grouping/Ungrouping Sheets:

Grouping sheets has the following advantages:

• Allows setting the print options for a number of sheets at once.
• Allows changing an item from the View tab in the Options dialog box (Tools menu).
• Allows applying formats to many sheets.
• Allows unhiding of rows and/or columns simultaneously.
• Allows typing/inserting text or formulas for the same cell address in all grouped sheets.

To group all sheets in the workbook:

Select the first sheet in the workbook, hold the Shift key and click the last sheet tab in the workbook.
OR
From a sheet tab shortcut menu, select Select All Sheets.

To group continuous sheets:

Hold the Shift key and click a different sheet tab.

To group non-continuous sheets:

Hold the Ctrl key, click a different sheet tab and add it to the group.

To ungroup sheets:

Hold the Shift key and click the active sheet tab.

Thursday, August 27, 2009

How to avoid Pictures Turning into Big Red ‘X’:

This is a serious problem that many people are running into. It is due to a file size bug; when PowerPoint doesn't have enough memory to deal with the size of your file, the graphics get forever replaced with big red X images. If you can insert the pictures directly from PowerPoint (using Insert/Picture) as opposed to using copy/paste, the file size sometimes turns out to be much smaller (some applications create links and other exciting remnants when doing a paste operation). When saving and reopening these files, people find fewer problems. As for opening files which already have red crosses, Microsoft suggests closing the file WITHOUT saving (as saving would also save the red crosses), close all other programs to free up as much memory as possible, restart your computer, and finally reopen your file. This has been tested and it seems to work; problem is that almost everybody closes the file and saves it. In this case, you must manually reinsert the picture from its original source.

Wednesday, August 26, 2009

Jump to Top or Bottom of a View:

Rather than hitting page up or page down multiple times, or using the vertical scroll bar on the side of the view, if you want to move to the top (first document) or bottom (last document) of a view, just press CTRL+HOME or CTRL+END.

This is extremely useful in views sorted either alphabetically or by date.

Tuesday, August 25, 2009

Diagnostic journey and remedial journey:

A two-phase investigation used by teams to solve chronic quality problems. In the first phase, the diagnostic journey, the team journeys from the symptom of a chronic problem to its cause. In the second phase, the remedial journey, the team journeys from the cause to its remedy.

Monday, August 24, 2009

Change Gridline color:

The gridlines help you track information on the screen easier and to locate cells quickly. Normally the gridlines are shown in black, but you may want to make them some other stylish color. If you want to change the gridline color, follow these steps:
1. Choose Options from the Tools menu. You will see the Options dialog box.
2. Click on the View tab.
3. Use the Color drop-down palette to select a color for your gridlines.
4. Make sure the Gridlines check box is selected.
5. Click on OK.
You can specify different gridline colors for each worksheet in a workbook.

Thursday, August 20, 2009

How Google gets its revenue:

Unlike some Internet companies, Google has multiple ways of generating revenue beyond private investment or selling shares of its stock. Google uses three methods to partner with merchants and advertisers: Google Checkout, Google AdWords and Google AdSense.
Google Checkout is a service designed to make online purchases easier for both the consumer and the retailer. On the consumer end, users create a free Google Checkout account. Part of the account creation process includes entering a credit or debit card number, which Google stores in a secure database. When the user visits a retailer that subscribes to Google Checkout, he or she can click on the checkout option and Google facilitates the transaction. This means that the user doesn't have to enter a card number every time he or she makes a purchase.
Retailers can set up Google Checkout accounts for free, but as of August 2008, Google charges a 2 percent plus 20-cent fee per transaction. For example, if a customer buys a $10 item from a merchant, Google will charge that merchant 40 cents for that transaction.
Another way Google generates revenue is through a pair of Web advertising services called AdWords and AdSense. With AdWords, advertisers can submit ads to Google that include a list of keywords relating to the product, service or business. When a Google user searches the Web using one or more of those keywords, the ad appears on the SERP in a sidebar. The advertiser pays Google every time a user clicks on the ad.
AdSense is similar, except that instead of displaying ads on a Google SERP, a webmaster can choose to integrate ads into his or her own site. Google's spiders crawl the site and analyze the content. Then, Google selects ads that contain keywords relevant to the webmaster's site. The webmaster can customize the location and color of the sidebar containing the ads. Every time someone clicks on an ad on the webmaster's site, the webmaster receives a portion of the ad revenue (Google gets the rest).
With both AdWords and AdSense, Google's strategy is to provide targeted advertising to users. Google believes that by providing advertising relevant to the information for which the user is already searching, the chances of someone following the ad are greatly increased.

Wednesday, August 19, 2009

Pricing Strategy:

There are numerous price strategies used by businesses to take advantage of customer pricing psychology. Three of the more common are listed below.
Multiple Unit Pricing
Simply put, this is a strategy where the customer perceives quantity buying as involving greater savings. An example is an item that normally sells for 49 cents. Multiple pricing would change this situation to a two for 89 cents or perhaps three for $1.39 price. In general, multiple unit pricing is usually effective in increasing immediate sales. However, this pricing technique may not increase the rate of consumption of the product. People will buy extra units of the product and use them as needed.
Several factors ought to be considered when using multiple unit pricing. First, the multiple-unit price has to be easy to understand. Eight for 79 cents is usually less effective than simple multiples of two for 19 cents. Second, the bargain concept of multiple pricing is not usually effective over the $10 range. It is, however, very effective for items within the $1 range.
Odd Number Pricing
Odd number pricing refers to setting a price just below the psychological breaks in the dollar, such as a price is set at 49 cents or 99 cents rather than 50 cents or $1. Prices may be set at 19 cents or 49 cents or $19.95. This gives the psychological impression to the customer that the price is not 20 cents or 50 cents or $20, but less. Odd number pricing is often avoided in prestige stores or with higher priced items. An expensive dress could be priced at $150, not $149.95.
Prestige Pricing
Prestige pricing refers to high markups and/or pricing above the market. Many consumers are willing to pay more for a product or service because it is felt the product or service is of higher quality or possesses brand or manufacturer prestige. Usually above-market pricing can be done only when the product is unique or distinctive, or when the seller or manufacturer has acquired prestige in the field.

Tuesday, August 18, 2009

Nudging Objects:

You can use the arrow keys to move objects very small distances. This is a big win for those laptop users who no longer have mice. Select the object, and then use your arrow keys. Each press of the key will move the object on "grid unit" (1/12th of an inch, don't ask why); if you hold down the Ctrl key while nudging, or if you have the grid turned off, you can move the objects one pixel at a time.

Monday, August 17, 2009

Cellular Manufacturing:

An arrangement of people, machines, materials and equipment in which the processing steps are placed next to each other in sequential order and through which parts are processed in a continuous flow is called Cell. The most common cell layout is a U shape.

Arranging machines in the correct process sequence, with operators remaining within the cell and materials presented to them from outside are called Cellular Manufacturing.

Spyware

Spyware is software that resides on a computer and sends information to its creator. That information may include surfing habits, system details or, in its most dangerous form, passwords and login information for critical applications such as online banking. Many spyware programs are more annoying than dangerous, serving up pop-up ads or gathering e-mail addresses for use in spam campaigns. Even those programs, however, can cost you valuable time and computing resources.
In addition to spyware, there are other kinds of invasive programs that can make your computing life miserable, so it's worth it to take a moment to define a few terms:
Malware: Short for malicious software, malware is a catch-all phrase used to define any program that runs on a computer without the user's knowledge and performs predetermined functions that cause harm. In that sense, spyware can also be malware.
Adware: Similar to spyware and malware, in that it resides on a computer without the user's knowledge, adware specifically refers to programs that display pop-up advertisements. The subject matter of the ads is often based on surfing habits, but may also be tied to a specific advertiser.
Virus: As the name implies, a virus is a program that is designed to spread itself among files on a single computer or computers on a network -- usually the Internet. Often, crackers (hackers with malicious intent) create these programs just to see how far they will spread. Unfortunately, even a supposedly harmless virus can have a serious effect on processing and network operations.
Worm: Similar to a virus, a worm spreads itself around a network. Worms, however, do so by making copies of themselves as they spread. They also may be capable of changing their profile to avoid detection.
Trojan: Like the infamous horse of Greek mythology, the computer version takes on the appearance of something benign, such as an update or add-on to an actual program. Once on your computer, it may perform harmful functions such as erasing your hard disk or deleting all your image files. Like spyware, a Trojan may also gather information and send it to the developer.
Cookie: While cookies aren't really malware, they can be used in similar ways. Cookies are small data files used by Web sites to store information on your computer. For example, a shopping site may want to identify items you've looked at, but not purchased, or store data on current purchases until you head for the checkout. A less scrupulous site, however, may decide to look through your cookies for personal information, such as recent sites you have visited.

Thursday, August 13, 2009

Finding and Replacing Error Values:

Sometimes we often have huge worksheets with hundreds of rows of calculated values. Inevitably there will be scattered cells with the #N/A error that we would like to all be 0 (or some other value) so that we can use the cells in other formulas. Removing these values from the calculation is usually impossible, and it's very tedious to remove them by hand. It would be easy if there is any way to do the equivalent of a "find and replace" on those error values.
Simply follow these steps:
1. Press F5. Excel displays the Go To dialog box.
2. Click Special. Excel displays the Go To Special dialog box.
3. Make sure the Formulas radio button is selected.
4. The only check box that should be selected under Formulas is Errors.
5. Click OK. Excel selects all cells where the formula returned an error value.
6. Type 0 or whatever value you want.
7. Press Ctrl+Enter.
Note that this approach results in any error values being replaced, not just those with the #N/A error.

Wednesday, August 12, 2009

Perseids:

The Perseids are a prolific meteor shower associated with the comet Swift-Tuttle. The Perseids are so called because the point they appear to come from, called the radiant, lies in the constellation Perseus. Meteor showers occur when Earth moves through a meteor stream. The stream in this case is called the Perseid cloud and it stretches along the orbit of the Comet Swift-Tuttle. The cloud consists of particles ejected by the comet as it passed by the Sun. Most of the dust in the cloud today is approximately a thousand years old. However, there is also a relatively young filament of dust in the stream that was pulled off the comet in 1862. The rate of meteors originating from this filament is much higher than for the older part of the stream.
The Perseid meteor shower has been observed for about 2000 years, with the first known information on this meteor shower coming from the Far East. In early medieval Europe, the Perseids came to be known as the "tears of St. Lawrence."
The shower is visible from mid-July each year, with the greatest activity between August 8 and 14, peaking about August 12. During the peak, the rate of meteors reaches 60 or more per hour. They can be seen all across the sky, but because of the path of Swift-Tuttle's orbit, Perseids are primarily visible in the northern hemisphere.

Tuesday, August 11, 2009

Stylish Paragraph:

Paragraph Styles allows defining a group of settings for font typeface, size, color, line spacing, bullets, etc, and we can then apply all of those settings at once to the paragraphs selected.

The first thing we need to do is create the new style(s) that we want to use. Begin by typing out a few sentences and then apply the formatting choices (font, spacing, color, etc) that we want to use in the future. Once we have things looking the way we want, select the text and press ALT+ENTER to bring up the Text Properties Box.

Click on the last tab, and click Create Style, then enter the name to use.





Now any time we want to apply the new style we can do so from either
a) The menu "Text - Apply Style",
b) The Styles tab of the Properties Box (shown above), or
c) By pressing F11 to cycle through the available styles.



This will be very helpful to apply our style after we copy and paste information from the web into Notes documents or from other mails.

Monday, August 10, 2009

Blackle:

Instead of Google we can use www.blackle.com. It’s powered by Google.
Blackle is a search engine like Google.
Blackle saves energy because the screen is predominantly black.
There is value in the concept because even if the energy savings are small, they all add up. Every time we load our web browser reminds us that we need to keep taking small steps to save energy.

I would like to encourage you to set Blackle as your home page. This way, every time you load your Internet browser you will save a little bit of energy. It’s an energy saving initiative.

Sunday, August 9, 2009

Preview Slide Show Effects:

While editing a presentation, hold down the CTRL key while clicking the slide show view button; this will open a tiny preview window showing that slide in slide show mode.

Thursday, August 6, 2009

How Negotiation works:

Open the newspaper and you'll find the latest conflict among world leaders, celebrity divorce or local labor union dispute. You may also hear a shout from the other side of the breakfast table that tells you it's not your turn to read the paper, but rather to take the dog for a walk. Conflict seems to be everywhere. It's one thing that's been with us throughout history. So, how do we get anything done without resorting to violence?
Whether it has to do with buying a car, divvying up errands or spreading world peace, negotiation is usually the best way to accomplish anything fairly. In general, negotiation is the process of resolving a dispute or settling a business deal.
The principled negotiation has four components:
Separate the people from the problem: Try to account for others' emotions and cool your own. Communicate honestly and show that you actively and attentively listen to the other side.
Focus on interests, not positions: Although the outright demands (positions) of either side might prove incompatible at first, getting to the root of the demands (the underlying interests that motivated them) allows the parties to rethink and adjust demands to make them compatible.
Invent options for mutual gain: This part involves using the integrative approach of enlarging the pie we discussed on the previous page. Inventing new ideas could necessitate brainstorming and thinking of as many options as possible -- both ones you can offer the other side or the other side can offer you. Afterward, decide which ideas sound best to bring to the negotiating table.
Insist on using objective criteria: As a preventative method of keeping emotions at bay, try whenever possible to use objective criteria. Beforehand, make sure the parties agree on what is "objective," be it legal precedent or scientific studies.

Wednesday, August 5, 2009

Autonomation:

A form of automation in which machinery automatically inspects each item after producing it and ceases production and notifies humans if a defect is detected.. Toyota expanded the meaning of jidohka to include the responsibility of all workers to function similarly—to check every item produced and, if a defect is detected, make no more until the cause of the defect has been identified and corrected.

Tuesday, August 4, 2009

Delete Empty rows between data:

1. Select all columns containing data.
2. Click the Sort icon (either Ascending or Descending).

Alternatively, we can use auto filter and delete the rows if we don’t want to sort.

Monday, August 3, 2009

In Pack, On-Pack and Near-Pack Premium:

In-pack, on-pack, and near-pack premium promotions are potent marketing tools. Though they require front-end work and attention to detail, they're a sure way to create consumer enthusiasm for the brand. In-pack, on-pack, and near-pack premium promotions offer the consumer a compelling reason to pick a brand. Summed up in four words, they're value-added instant gratification.

In-pack—a premium item enclosed in a products packaging; a variation of this is the container pack, where a receptacle (the premium) holds or displays the brand.
On-pack—a premium attached to, or made part of, the exterior of a product's packaging.
Near-pack—a premium offered free or for a discounted price with the retail purchase of another product, positioned near (but not touching) the product at point-of-sale (POS).

Out of Office Exceptions:

When you enable OOO (Tools - Out of Office)



You are presented with the dialog box below. Click on the 4th tab, label Exceptions, and you will see several options.



The first is "Do not automatically reply to mail from internet addresses". This is a great option if you simply want to turn off all external notifications telling people that you are away. Don't worry, the people in your company will still be notified.

The second choice is "Do not automatically reply to mail from these people or groups". This provides a great way to eliminate sending responses to any of the mailing lists you belong to, or any other type of email that does not accept replies. For example, if you subscribe to daily newsletters, you don't want to be sending responses to these.

The third option, "Do not automatically reply to mail which is addressed to these groups", is similar to the option above. This is very useful if you belong to something like Yahoo or Google groups, or any type of listserv mailing list. Enter the name of the group email, and OOO will not send notifications.

The final option "Do not automatically reply if the subject contains these phrases" allows you to define at a very granular level which emails to not respond to.

When you are done, click Enable.

I hope this helps you get a little more out of the Out of Office Agent.

Sunday, July 12, 2009

Ten Components of Effective Team Problem Solving:

When problems arise in your organization they need to be dealt with immediately and with a collectively developed problem solving process. Those affected by both the problem and its solution need to be a part of the team that goes through the process and develops solutions to resolve the underlying issues that cause it. The following are ten components of any such problem solving process that, if observed, will lead to effective and lasting solutions to the problems you face.
1. Team members readily contribute from their experience and listen to the contributions of others.
2. Disagreements arising from different points of view are considered helpful; they are seen as the crucible out of which unambiguous and honest solutions can flow.
3. Team members challenge suggestions they believe are unsupported by facts or logic but avoid arguing just to have their way or to be noticed for their own individual input.
4. Poor solutions are not supported just for the sake of harmony or agreement.
5. Differences of opinion are discussed and resolved. Coin tossing, averaging, straw-drawing, majority vote and similar cop-outs are avoided when making a decision.
6. Every team member strives to make the problem solving process efficient and is careful to facilitate rather than hinder discussion; each member strives to encourage and applaud individual efforts to contribute as well as the contributions themselves.
7. Team members encourage and support co-workers who are reluctant to offer ideas or to offer differing views from those already expressed.
8. Team members understand the value of time and work to eliminate extraneous and/or repetitious discussion.
9. Team decisions are not arbitrarily overruled by the leader simply because he/she doesn’t agree with them; each member is committed to respecting each other’s views and to honoring the sources of these views as being legitimate and sincere.
10. The team understands that the leader will make the best decision he or she can if a satisfactory team solution is not forthcoming; they each agree to support and promote the decision that results from the problem solving process whether it is made collectively by the team or individually by the leader of the team.

Thursday, July 9, 2009

Barcodes:

A barcode (also bar code) is an optical machine-readable representation of data. Originally, bar codes represented data in the widths (lines) and the spacings of parallel lines, and may be referred to as linear or 1D (1 dimensional) barcodes or symbologies. They also come in patterns of squares, dots, hexagons and other geometric patterns within images termed 2D (2 dimensional) matrix codes or symbologies. Although 2D systems use symbols other than bars, they are generally referred to as barcodes as well.
The first use of barcodes was to label railroad cars, but they were not commercially successful until they were used to automate supermarket checkout systems, a task in which they have become almost universal. Their use has spread to many other roles as well, tasks that are generically referred to as Auto ID Data Capture (AIDC). It costs about US$0.005 to implement a barcode compared to passive RFID which still costs about US$0.07 to US$0.30 per tag.
Barcodes can be read by optical scanners called barcode readers, or scanned from an image by special software. In Japan, most mobile phones have built-in scanning software for 2D codes, and similar software is becoming available on smartphone platforms.
In point-of-sale management, the use of barcodes can provide very detailed up-to-date information on key aspects of the business, enabling decisions to be made much more quickly and with more confidence. For example:
• Fast-selling items can be identified quickly and automatically reordered to meet consumer demand,
• Slow-selling items can be identified, preventing a build-up of unwanted stock,
• The effects of repositioning a given product within a store can be monitored, allowing fast-moving more profitable items to occupy the best space,
• Historical data can be used to predict seasonal fluctuations very accurately.
• Items may be repriced on the shelf to reflect both sale prices and price increases.
Besides sales and inventory tracking, barcodes are very useful in shipping/receiving/tracking.
• When a manufacturer packs a box with any given item, a Unique Identifying Number (UID) can be assigned to the box.
• A relational database can be created to relate the UID to relevant information about the box; such as order number, items packed, qty packed, final destination, etc…
• The information can be transmitted through a communication system such as Electronic Data Interchange (EDI) so the retailer has the information about a shipment before it arrives.
• Tracking results when shipments are sent to a Distribution Center (DC) before being forwarded to the final destination.
• When the shipment gets to the final destination, the UID gets scanned, and the store knows where the order came from, what's inside the box, and how much to pay the manufacturer.
The reason bar codes are business-friendly is that bar code scanners are relatively low cost and extremely accurate compared to key-entry– only about 1 substitution error in 15,000 to 36 trillion characters entered.

Wednesday, July 8, 2009

Facts about Indian Railways:

First Passenger Train Ran On: 16th April 1853 (between Bombay to Thane)
First Railway Bridge: Dapoorie Viaduct on the Mumbai-Thane route
First Rail Tunnel: Parsik Tunnel
First Ghats Covered by the Rail lines: Thal and Bhore Ghats
First Underground Railway: Calcutta METRO
First Computerized Reservation System started in: New Delhi (1986)
First Electric Train ran on: 3rd Feb' 1925 (between Bombay VT and Kurla)
Toilets on Trains were introduced in: 1891 (1st Class) & 1907 (lower classes)
Shortest Station Name: Ib (Orissa)
Longest Station Name: Sri Venkatanarasimharajuvariapeta (Tamil Nadu)
Busiest Railway Station: Lucknow (64 trains everyday)
Longest Run (Time): Himsagar Express (3751 km in 74 hrs and 55 min)
Shortest Run: Route between Nagpur to Ajni (3km)
Longest Run for Daily Train: Kerala Express (3054 km in 42.5 hrs)
Longest Non-Stop Run (Distance): Trivandrum Rajdhani (528 km in 6.5 hrs)
Longest Railway Platform in the World: Kharagpur (2,733 ft in length)
Longest Railway Bridge: Nehru Setu on Sone River (10044ft in length)
Longest Tunnel: On Konkan Railway between Monkey hill & Khandala (6.5 km)
Oldest Preserved Locomotive: Fairy Queen (1855), still in working order
Gauges of Track: 4 Gauges; BG (5'6"), MG (1 metre), NG (2)
IR Daily Runs: About 14,000 trains
IR Daily Carries: More than 11 million passengers & 1 million tonnes of freight
IR's only line with Rack & Pinion system: From Mettupalayam to Conoor
IR's Fastest Train: Bhopal-Shatabdi (runs at a speed up to 140 Km/ph)
Railway Station with all the Three Gauges: Siliguri Railway Station
Route Kilometers of Track: More than 62,000 kms
People Employed in IR: About 1.6 million people
Train with Maximum Number of Halts: Howrah-Amritsar Express (115 halts)
Trains without Commercial Halts: Sampoorna Kranti Express, Howrah Rajdhani, Bombay Rajdhani, Pragati Express and Pune Shatabdi
Stations across State Lines: Navapur (Maharashtra and Gujarat), Bhawani Mandi (Madhya Pradesh and Rajasthan)
Classes of travel on Indian Railway: Ist AC, 2nd AC, 3rd AC, AC Chair Car IInd sleeper & IInd ordinary

Tuesday, July 7, 2009

Continuous Data Protection:

Continuous data protection (CDP), also called continuous backup or real-time backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
CDP is a service that captures changes to data to a separate storage location. There are multiple methods for capturing the continuous changes involving different technologies that serve different needs. CDP-based solutions can provide fine granularities of restorable objects ranging from crash-consistent images to logical objects such as files, mail boxes, messages, and database files and logs.
Continuous data protection is different from traditional backup in that you don't have to specify the point in time to which you would like to recover until you are ready to perform a restore. Traditional backups can only restore data to the point at which the backup was taken. With continuous data protection, there are no backup schedules. When data is written to disk, it is also asynchronously written to a second location, usually another computer over the network. This introduces some overhead to disk-write operations but eliminates the need for scheduled backups.
In some situations, continuous data protection will require less space on backup media (usually disk) than traditional backup. Most continuous data protection solutions save byte or block-level differences rather than file-level differences. This means that if you change one byte of a 100 GB file, only the changed byte or block is backed up. Traditional incremental and differential backups make copies of entire files.

Monday, July 6, 2009

Electric Cars:

A car can be a wonderful thing. It can take you where you want, when you want -- even when those places aren't served by public transportation. In fact, much of modern life would be impossible without cars. They help us get to our jobs, schools, grocery stores or even just to the local shopping mall. Unfortunately, as wonderful as cars are, they also have some serious drawbacks. Two of these drawbacks are that they often cost a lot of money to maintain and they pollute the atmosphere with noxious gases. Air pollution has become a serious problem in many urban areas, and with gasoline prices at record highs, the internal combustion engine may soon be a luxury that society simply can't afford.
Few people would advocate giving up cars altogether, but is there a way we can have the power and convenience of an automobile without the pollution and expense caused by burning gasoline? Fortunately, there is. Many people think that the cars of the not-so-distant future will be powered not by gasoline, but by electricity. In fact, these electric cars -- also known as EVs or electric vehicles -- aren't futuristic at all. Electric vehicles have been around since the first half of the 19th century; however, even now in the 21st century, internal combustion engines still rule.
The heart of an electric car is its battery. Unlike the batteries in most cars, which primarily serve to start the engine and run accessories like the radio or air conditioner, the battery in an electric car runs everything. Most importantly, it runs the electric motor -- or, more precisely, it runs a controller which in turn runs the electric motor -- so it needs to be powerful and long-lasting enough to take drivers where they need to go with a minimum of recharging. Until recently, no reliable, mass-producible batteries have been manufactured that could make electric cars competitive with gas-powered cars. However, that's beginning to change. Electric cars have not only become feasible, but they're now expected to start rolling off the assembly lines of major automobile manufacturers.
Perhaps the greatest problem associated with electric car batteries is recharging them. The best solution to the recharging problem is to take the car home in the evening and plug it in, similar to the way you might plug in a laptop computer or digital music player, so that it can recharge overnight. EVs will come with charging systems that allow them to recharge from a standard electric socket so that the next morning you'll be ready to hit the road again. Although at least one company claims to be developing systems that can recharge an electric car in 10 minutes, existing rechargers take between 3 and 10 hours to bring an electric car battery up to full strength using normal home electricity.
Once an EV has been recharged, how far will it go before it needs to be recharged again? This depends on a number of factors, including the type of battery in the vehicle. EVs using lead-acid batteries have the shortest range -- around 80 miles (128.7 km) on a single charge. NiMH batteries turn in a better performance, with a range of about 120 miles (193.1 km) per charge. This is where lithium-ion batteries excel, with a range of more than 220 miles (354.1 km) per charge -- using the Tesla Roadster as an example. If driving distance is the most important consideration, lithium-ion batteries are the ones to choose.

The range of an EV can be extended even further with a technology known as regenerative braking, which uses the kinetic energy of the car's brakes to recharge the battery on the fly. Under optimum driving conditions, regenerative braking can extend the car's range up to 50 percent, though in most situations the gain in driving range will be smaller.
EVs will be best suited for commuting to work or school and for local travel and shopping trips. The most obvious advantage of electric car batteries is that they don't produce the pollution associated with internal combustion engines. Another important advantage of battery-powered motors over gas-powered engines is the lower cost of the fuel -- that is, electricity for EVs and gas for the internal combustion engines. The United States Department of Energy has calculated that a typical EV can run for 43 miles on a dollar's worth of electricity. Yet another advantage of these rechargeable batteries is that they recycle well. Almost 100 percent of these batteries can be recycled, which keeps old batteries from becoming a disposal problem.

Sunday, July 5, 2009

Work on two Excel Worksheets at once:

When you have two workbooks open at the same time, select Window, Compare Side by Side With. After you select this command, a floating Compare Side by Side toolbar will open in Excel.

Tuesday, June 30, 2009

Doctor’s Day:

National Doctor’s Day is a time for people to show appreciation and say thanks to the doctors who care for them. Doctors perform vital diagnosis and treatment. They care and cure their patients to keep them well. Doctors are the life saviors who work relentlessly to cure the ailments of the patients. When you are sick, there is no other person more important to you, than a doctor.
Doctor’s Day is celebrated in India on July 1st every year. Doctor’s Day celebrations started in 1991 when the Government of India recognised July 1, the birth anniversary as well as the date of demise of famous physician, Dr. Bidhan Chandra Roy (BC Roy).
Doctor’s Day is celebrated in the US and other western countries on March 30 - the day when Dr. Crawford W. Long first used ether anaesthesia in surgery.

Monday, June 29, 2009

Niche Market:

A niche market is the subset of the market on which a specific product is focusing on; Therefore the market niche defines the specific product features aimed at satisfying specific market needs, as well as the price range, production quality and the demographics that is intended to impact.
Every single product that is on sale can be defined by its niche market. As of special note, the products aimed at a wide demographics audience, with the resulting low price (due to Price elasticity of demand), are said to belong to the Mainstream niche, in practice referred only as Mainstream or of high demand. Narrowed demographics though lead to elevated price because of the same principles.
In practice, product vendors and trade businesses are commonly referred as mainstream providers or narrow demographics niche market providers (colloquially shortened to just niche market providers). Small capital providers usually opt for a niche market with narrow demographics as a measure of increasing their gain margins.
Nevertheless, the final product quality (low or high) is not dependant on the price elasticity of demand though, it is more associated with the specific needs that the product is aimed at satisfy and in some cases with brand recognition which the vendor wants to be associated with (i.e Prestige, Practicability, Money saving, Expensiveness, Planet environment conscience, Power, etc)

Sunday, June 28, 2009

Open Notes directly to your email:

1. Right click on the Mail icon on the bookmark bar on the left side of the screen.
2. Choose "Set Bookmark as Home Page".
3. Rejoice in how easy it is to customize Notes to do almost anything!



By the way, you can do this for any bookmark, not just Mail.

Thursday, June 25, 2009

Poka yoke:

Poka-yoke is a Japanese term that means "fail-safing" or "mistake-proofing". A poka-yoke is any mechanism in a Lean manufacturing process that helps an equipment operator avoid (yokeru) mistakes (poka). Its purpose is to eliminate product defects by preventing, correcting, or drawing attention to human errors as they occur. The concept was formalised, and the term adopted, by Shigeo Shingo as part of the Toyota Production System. It was originally described as baka-yoke, but as this means "fool-proofing" (or "idiot-proofing") the name was changed to the milder poka-yoke.
Examples of poka-yoke in consumer products include:
• Automatic transmissions: the inability to remove a car key from the ignition switch of an automobile if the automatic transmission is not first put in the "Park" position, so that the driver cannot leave the car in an unsafe parking condition where the wheels are not locked against movement.
• 3.5" floppy disks: the top-right corner is shaped in a certain way so that the disk cannot be inserted upside-down.
• UK 13 amp electric plugs: it is impossible to wrongly insert the plug into the socket, due to its arrangement of three rectangular pins.
• Microwave ovens: a door switch automatically disconnects the activation button when the door of the oven is opened. As a result, it is impossible to cook anything in a microwave oven unless the door (which contains a Faraday cage to block microwaves) is fully closed. If it were possible to activate an oven with the door open, this would allow dangerous leakage of high intensity microwave radiation, which would be very harmful to any living creatures in the immediate area.
• SIM (Subscriber Identity Module) cards: The SIM card used in cellular phones has its upper left corner trimmed diagonally to guide the card correctly into position.

Wednesday, June 24, 2009

Open Dating:

A date stamped or printed on the label of perishable items to indicate a pull date (a date by which the item must be sold or removed from the shelf) or pack date (the date the item was packaged).

Tuesday, June 23, 2009

Inkless Pen:

Grand Illusions makes what it calls a "metal pen." Instead of ink, the pen writes with a metal alloy. The pen writes on most paper, and its writing looks similar to pencil. The company claims that, unlike pencil markings, the pen's metal alloy doesn't smudge and smear.

Monday, June 22, 2009

Convert Time to Decimal:

Use the HOUR and MINUTE formulas to extract the hour and minute numbers from the time.

Sunday, June 21, 2009

Father’s Day:

Father's Day is a day honoring fathers, celebrated on the third Sunday of June in 52 of the world's countries and on other days elsewhere. It complements Mother's Day, the celebration honoring mothers.
Father's Day is a celebration inaugurated in the early twentieth century to complement Mother's Day in celebrating fatherhood and male parenting, and to honor and commemorate fathers and forefathers. Father's Day is celebrated on a variety of dates worldwide and typically involves gift-giving, special dinners to fathers, and family-oriented activities.

Thursday, June 18, 2009

Smart Meeting Picker:

In Lotus Notes when creating a calendar entry, Notes can intelligently assist you in choosing the most convenient date/time and room for a meeting.

In addition to the graphical "free/busy time bars" display that most people use


you can choose to show the Scheduler in "Summary" mode. Below you can see that for the selected date the only free time available is 10-11am.


but by simply adjusting the two drop down boxes you can choose a different range of days to search, as well as adjust who is required to attend.

For example, how about searching for date/times when 50% of invitees can make a meeting in the next 7 days


The picture below shows how this search results in several more dates/time to choose from.

Wednesday, June 17, 2009

Assignable cause:

A name for the source of variation in a process that is not due to chance and therefore can be identified and eliminated. Also called “special cause.”

Tuesday, June 16, 2009

Margin Blending:

Margin is the difference between the cost and the retail selling price of goods.

Margin Blending is a combination of higher- and lower-margin products to achieve an overall margin figure.

Print Comments:

If your worksheet contains comments, you can print them as they appear on the sheet or at the end of the sheet.
1. Click the worksheet that contains the comments that you want to print.
2. To print the comments in place on the worksheet, display them by doing one of the following:
 To display an individual comment, click the cell that contains the comment, and then on the Review tab, in the Comments group, click Show/Hide Comment.
TIP You can also right-click the cell and then click Show/Hide Comments on the shortcut menu.
 To display all comments, on the Review tab, in the Comments group, click Show All Comments.

TIP You can move and resize any overlapping comments.
How to move or resize comments
1. Click the border of the comment box so that handles appear:

2. Do one or both of the following:
 To move the comment, drag the border of the comment box.
 To change the size, drag the handles on the sides and corners of the comment box.
3. On the Page Layout tab, in the Page Setup group, click the dialog box launcher next to Page Setup.

4. On the Sheet tab, in the Comments box, click As displayed on sheet or At end of sheet.
5. Click Print.
TIP To see how comments are printed, you can click Print Preview before you click Print.

Sunday, June 14, 2009

Flag Day:

A flag day is a flag-related holiday—either a day designated for flying a certain flag (such as a national flag), or a day set aside to celebrate a historical event such as a nation's adoption of its flag.
Flag days are usually codified in national statutes, however, in some countries a decree by the head of state can also order a flag day. The statute or decree may specify locations where flags are flown and how are they flown (for example, at full- or half-staff); alternatively, custom may prevail.
In the United States, Flag Day is celebrated on June 14. It commemorates the adoption of the flag of the United States, which happened that day by resolution of the Second Continental Congress in 1777. The largest Flag Day parade is held annually in Troy, New York, which bases its parade on the Quincy parade and typically draws 50,000 spectators.

The Armed Forces Flag Day or the Flag Day of India is a special day dedicated towards collection of funds from people of India, for the welfare of the armed forces personnel in India. It is observed on December 7, every year in India, from 1949. Funds are collected from the general public for the welfare of the Indian Armed Forces personnel. Over the years, it has become a tradition to commemorate this day as an honor to the brave soldiers, airmen and sailors of India.

Thursday, June 11, 2009

Voice of Customer (VOC):

The "voice of the customer" is a process used to capture the requirements/feedback from the customer (internal or external) to provide the customers with the best in class service/product quality. This process is all about being proactive and constantly innovative to capture the changing requirements of the customers with time.

The "voice of the customer" is the term used to describe the stated and unstated needs or requirements of the customer. The voice of the customer can be captured in a variety of ways: Direct discussion or interviews, surveys, focus groups, customer specifications, observation, warranty data, field reports, complaint logs, etc.

This data is used to identify the quality attributes needed for a supplied component or material to incorporate in the process or product.

Wednesday, June 10, 2009

Labor Scheduling Software:

A computer software program that creates weekly work schedules for employees and departments. The software program inputs company parameters such as vacation, holidays, work availability, hours of operation, peak sales periods, etc.

Tuesday, June 9, 2009

Find Duplicate items in combine columns:

--------------------------------------------
Dates in column A Text in Column B
--------------------------------------------
03/10/2003 | AAA
03/15/2003 | BBB
03/20/2003 | CCC
03/25/2003 | AAA
03/30/2003 | BBB
04/04/2003 | CCC
03/25/2003 | AAA
03/30/2003 | BBB
04/04/2003 | CCC
03/25/2003 | AAA
03/30/2003 | BBB
04/04/2003 | CCC


Enter the formula: =A1&B1 to cell C1 and copy / paste the formula to cells C2:C12

Enter the formula: =IF(COUNTIF($C$1:C1,C1)>1,"Duplicate","Unique")
to cell E1 and copy / paste the formula to cells E2:E12

Monday, June 8, 2009

The Net takes Flight:

The computer most people use comes with a standard 56K modem, which means that in an ideal situation your computer would downstream at a rate of 56 kilobits per second (Kbps). That speed is far too slow to handle the huge streaming-video and music files that more consumers are demanding today. That's where the need for bigger bandwidth -- broadband -- comes in, allowing a greater amount of data to flow to and from your computer. Land-based lines are limited physically in how much data they can deliver because of the diameter of the cable or phone line. In an airborne Internet, there is no such physical limitation, enabling a broader capacity.
Several companies have already shown that satellite Internet access can work. The airborne Internet will function much like satellite-based Internet access, but without the time delay. Bandwidth of satellite and airborne Internet access are typically the same, but it will take less time for the airborne Internet to relay data because it is not as high up. Satellites orbit at several hundreds of miles above Earth. The airborne-Internet aircraft will circle overhead at an altitude of 52,000 to 69,000 feet (15,849 to 21,031 meters). At this altitude, the aircraft will be undisturbed by inclement weather and flying well above commercial air traffic.
Networks using high-altitude aircraft will also have a cost advantage over satellites because the aircraft can be deployed easily -- they don't have to be launched into space. However, the airborne Internet will actually be used to compliment the satellite and ground-based networks, not replace them. These airborne networks will overcome the last-mile barriers facing conventional Internet access options. The "last mile" refers to the fact that access to high-speed cables still depends on physical proximity, and that for this reason, not everyone who wants access can have it. It would take a lot of time to provide universal access using cable or phone lines, just because of the time it takes to install the wires. An airborne network will immediately overcome the last mile as soon as the aircraft takes off.
The airborne Internet won't be completely wireless. There will be ground-based components to any type of airborne Internet network. The consumers will have to install an antenna on their home or business in order to receive signals from the network hub overhead. The networks will also work with established Internet Service Providers (ISPs), who will provide their high-capacity terminals for use by the network. These ISPs have a fiber point of presence -- their fiber optics are already set up. What the airborne Internet will do is provide an infrastructure that can reach areas that don't have broadband cables and wires.

Sunday, June 7, 2009

Negotiation:

Negotiation is something that we do all the time and is not only used for business purposes. For example, we use it in our social lives perhaps for deciding a time to meet, or where to go on a rainy day.

Negotiation is usually considered as a compromise to settle an argument or issue to benefit ourselves as much as possible.

Communication is always the link that will be used to negotiate the issue/argument whether it is face-to-face, on the telephone or in writing. Remember, negotiation is not always between two people: it can involve several members from two parties.

There are many reasons why you may want to negotiate and there are several ways to approach it. The following is a few things that you may want to consider.
Why Negotiate?
If your reason for negotiation is seen as 'beating' the opposition, it is known as 'Distributive negotiation'. This way, you must be prepared to use persuasive tactics and you may not end up with maximum benefit. This is because your agreement is not being directed to a certain compromise and both parties are looking for a different outcome.

Should you feel your negotiation is much more 'friendly' with both parties aiming to reach agreement, it is known as 'Integrative negotiation'. This way usually brings an outcome where you will both benefit highly.

Negotiation, in a business context, can be used for selling, purchasing, staff (e.g. contracts), borrowing (e.g. loans) and transactions, along with anything else that you feel are applicable for your business.

Pre-Negotiation

Before you decide to negotiate, it is a good idea to prepare. What is it exactly that you want to negotiate? Set out your objectives (e.g. I want more time to pay off the loan). You have to take into account how it will benefit the other party by offering some sort of reward or incentive (explained later).

What is involved (money, sales, time, conditions, discounts, terms, etc)? Know your extremes: how much extra can you afford to give to settle an agreement? Although you are not aiming to give out the maximum, it is worth knowing so that you will not go out of your limits.

Know what your opposition is trying to achieve by their negotiation. This is useful information that could be used to your benefit and may well be used to reach a final agreement.

Consider what is valuable to your business, not the costs. You may end up losing something in the negotiation that is more valuable to your business than money. It could be a reliable client or your company reputation.

Negotiating

It is important that you approach the other party directly to make an appointment to negotiate should it be in person, writing or by phone (not through a phone operator, receptionist, assistant etc) as this will allow you to set the agenda in advance, and improve the prospects of the other party preparing sufficiently enough to make a decision on the day. Try to be fairly open about your reason for contact or they may lose interest instantly and not follow up on the appointment. Save all your comments for the actual appointment- don't give away anything that will give them a chance to prepare too thoroughly: it's not war, but it is business!
So, it's time to negotiate and you've prepared well. What else must you have? Two things: confidence and power. Your power will come from your ability to influence.
It is always important that you keep the negotiation in your control: this can mean within your price range, your delivery time or your profit margin. If you fail to do so, you will end up on the wrong side of the agreement, and with nothing more out of the deal other than maintaining trading relationships.

When negotiating, aim as high as you feel necessary in order to gain the best deal for yourself. The other party may bring this down but it is a good tactic, as it is always easier to play down than to gain.

Make sure that you remain flexible throughout the negotiation in case the opposition decides to change the direction of the agreement (they may want different incentives or even change their objectives). This is where your preparation comes to good use: knowing your limits and the other party's needs. If you're a quick thinker then you've got an advantage. You'll need to turn it around quickly if things start to go against you without putting your objectives at risk.

Confidence comes from knowing your business, your product, what its worth, and being able to communicate this well to the other party: these people are almost impossible to get the better of, as some of you will know only too well.

Coming to an Agreement

Once you have come to a final agreement, it is important that you have it down in writing along with both parties' signature: this is not always possible or practical. Before it is signed, or formally ordered, it is wise not to say anything about the terms agreed because your next sentence could break the agreement: the best sales-people never over sell - well, not until they have to!

Summary

We use negotiation in everything we do but you have to be sure that it is done in the best way possible to achieve maximum benefit. The most important part is planning: preparing well will give you an advantage when negotiating.

Only use the knowledge and experience you need to achieve your objective. Have confidence and be sure that you can keep control at all times. Aim highly, but don't underestimate the opposition. They too may have just read the same advice. If you're selling something, be persuasive and offer some incentive to keep the customer interested.

Don't close an agreement until you are happy. This could be difficult if you have been put in a 'corner' but this would perhaps be an effect of poor preparation.

Friday, June 5, 2009

World Environment Day:

World Environment Day (WED) was established by the United Nations General Assembly in 1972. WED is hosted every year by a different city and commemorated with an international exposition through the week of June 5. The United Nations Environment Programme (UNEP), also created in 1972, uses WED to stimulate awareness of the environment and enhance political attention and public action.
The theme for WED 2009 is 'Your Planet Needs You - UNite to Combat Climate Change'. It reflects the urgency for nations to agree on a new deal at the crucial climate convention meeting in Copenhagen some 180 days later in the year, and the links with overcoming poverty and improved management of forests.
WED 2009’s host is Mexico which reflects the growing role of the Latin American country in the fight against climate change, including its growing participation in the carbon markets.
Mexico is also a leading partner in UNEP's Billion Tree Campaign. The country, with the support of its President and people, has spearheaded the pledging and planting of some 25 per cent of the trees under the campaign. Accounting for around 1.5 per cent of global greenhouse gas emissions, the country is demonstrating its commitment to climate change on several fronts.

Wednesday, June 3, 2009

To Replaces Zeros with dashes:

Press Ctrl+1 to open the Format Cells dialog box.
2. Select the Number tab, and from Category, select Custom.
3. In the Type box, enter the following Custom Formatting syntax:
#,##0 ;[Red](#,##0);- ;

Note:
The number formatting syntax is:
Positive; Negative; 0; Text

Tuesday, June 2, 2009

U Chart:

A u-chart is an attributes control chart used with data collected in subgroups of varying sizes. U-charts show how the process measured by the number of nonconformities per item or group of items changes over time. Nonconformities are defects or occurrences found in the sampled subgroup. They can be described as any characteristic that is present but should not be, or any characteristic that is not present but should be. For example, a scratch, dent, bubble, blemish, missing button, and a tear are all nonconformities. U-charts are used to determine if the process is stable and predictable, as well as to monitor the effects of process improvement theories. U-charts can be created using software programs like SQCpack and CHARTrunner.

Protect Slide Content:

When the corporate marketing department creates slides depicting performance of investments, it is very important for legal reasons that no changes get made when the slides are presented. If changes are made that misrepresent the facts, the organization can be subject to severe penalties and lawsuits.
One approach to protecting content is to restrict the access to the file in PowerPoint 2003 if you have installed the Information Rights Management module. In many cases this is a burden and there is an easier way to get almost all of the same benefits. It uses the ability of PowerPoint to save a slide as a graphic. Here are the instructions for this technique.
Step 1 – Create Your Slides
Create your slides in PowerPoint as you normally would, with all the graphics and text you need. Proofread and review your slides to make sure they are finalized.
Step 2 – Save the slides as Graphic Files
In PowerPoint, click File à Save As to display the Save As dialog box. Drop down the Save as type drop down box at the bottom of the dialog box and scroll down to the graphics formats as shown below.

Select the PNG Portable Network Graphics Format (Other formats such as GIF, JPG and TIF offer no better quality and result in larger files). Enter a file name for the graphic files in the File Name entry box. When you click on the Save button, it will ask you if you want to save all of the slides in the presentation or just the current slide. Select the appropriate choice for your situation. Your slides are now saved as images on your computer.
Step 3 – Create a New Presentation of Images
Start a new presentation. Click Insert à Picture à From File. Find your saved image files from Step 2. Select the image you want for this slide and click the OK button. If needed, size the image so it fills the screen. Repeat this procedure for other slides. These slides are now images and cannot be changed by others. Save this presentation with a new name so you don’t overwrite your original file.
You can use this process to make all of the slides unchangeable or you can use it just for selected slides. You may leave some of the text slides as regular slides and only protect the graphs or tables of data that should not be changed. If you use builds on your slides, where text or graphics are displayed as you advance through the slide, making the slide an image removes those builds, so think about what portions of the slide your need to protect. You can protect an underlying graph, then add text boxes on top of the image to retain the ability to build ideas on a slide.
Using this technique will allow you to give presenters the flexibility they need to customize each presentation, while protecting important data that needs to be in compliance with regulations. Make only the file with the images available to presenters on a corporate network so that the original data and graphs remain protected.

Sunday, May 31, 2009

Indirect Selling:

A sale of goods by a manufacturer to a service merchandiser or other wholesaler, who in turn sells the products to chain store companies or independent stores.

Thursday, May 28, 2009

Interesting Facts about Google:

1. Google started in January, 1996 as a research project at Stanford University, by Ph.D. candidates Larry Page and Sergey Brin when they were 24 years old and 23 years old respectively.

2. The prime reason the Google home page is so bare is due to the fact that the founders didn’t know HTML and just wanted a quick interface. In fact it was noted that the submit button was a long time coming and hitting the RETURN key was the only way to burst Google into life.

3. Google is a mathematical term 1 followed by one hundred zeroes. The term was coined by Milton Sirotta, nephew of American mathematician Edward Kasne.

4. Interesting thing about Gmail is that it was used internally for nearly 2 years prior to launch to the public. They discovered there was approximately 6 types of email users, and Gmail has been designed to accommodate these 6.

5. It consisted of over 450,000 servers, racked up in clusters located in data centers around the world.

6. The Google search engine receives an amazing one billion search requests per day.

7. Google’s index of web pages is the largest in the world, comprising of 8 billion web pages. Google searches this immense collection of web pages often in less than half a second.

8. Google has a funny tradition of creating April Fool's Day jokes - such as Google MentalPlex, which allegedly featured the use of mental power to search the web. Some thought the announcement of Gmail in 2004 around April Fool's Day was a joke.

9. Google receives daily search requests from all over the world that includes the lonely Antarctica as well.

10. Users can restrict their searches for content in 35 non-English languages. To date, no requests have been received from beyond the earth's orbit, but Google has a Klingon interface just in case.

11. Google has a world-class staff of more than 15000 full-time employees - Googlers. The company headquarters is called the Googleplex located at Mountain View at 1600 Amphitheatre Parkway.

12. Google translates billions of HTML web pages into a display format for WAP and i-mode phones and wireless handheld devices.

13. Another funny fact is that the "I feel lucky" is nearly never used. It was a comfort button which actually takes to the first web page returned by the search results.

14. Google use the unique 20%/5% rules. That is ,if at least 20% of people use a feature, then it will be included. At least 5% of people need to use a particular search preference before it will make it into the 'Advanced Preferences'.

15. Employees in Google are encouraged to use 20% of their time working on their own projects. That's why we have such amazing products like GMail, Google News and Orkut now.

16. Google Groups comprises more than 845 million Usenet messages, which is the world's largest collection of messages or the equivalent of more than a terabyte of human conversation.

17. The basis of Google's search technology is called PageRank, and assigns an "importance" value to each page on the web and gives it a rank to determine how useful it is. However, that's not why it's called PageRank. It's actually named after Google co-founder Larry Page.

18. Googlers are people from different background. One operations manager, who keeps the Google network in good health, is a former neurosurgeon. One software engineer is a former rocket scientist. And the company's chef formerly prepared meals for members of The Grateful Dead and funkmeister George Clinton.

19. Google’s Orkut is most popular in Brazil and India. It was the brainchild of a Google engineer who was given free reign to run with it.

20. In a 2006 report of the world's richest people, Forbes reported that Sergey Brin was #26 with a net worth of $12.9 billion, and Larry Page was #27 with a net worth of $12.8 billion