Sunday, May 31, 2009

Indirect Selling:

A sale of goods by a manufacturer to a service merchandiser or other wholesaler, who in turn sells the products to chain store companies or independent stores.

Thursday, May 28, 2009

Interesting Facts about Google:

1. Google started in January, 1996 as a research project at Stanford University, by Ph.D. candidates Larry Page and Sergey Brin when they were 24 years old and 23 years old respectively.

2. The prime reason the Google home page is so bare is due to the fact that the founders didn’t know HTML and just wanted a quick interface. In fact it was noted that the submit button was a long time coming and hitting the RETURN key was the only way to burst Google into life.

3. Google is a mathematical term 1 followed by one hundred zeroes. The term was coined by Milton Sirotta, nephew of American mathematician Edward Kasne.

4. Interesting thing about Gmail is that it was used internally for nearly 2 years prior to launch to the public. They discovered there was approximately 6 types of email users, and Gmail has been designed to accommodate these 6.

5. It consisted of over 450,000 servers, racked up in clusters located in data centers around the world.

6. The Google search engine receives an amazing one billion search requests per day.

7. Google’s index of web pages is the largest in the world, comprising of 8 billion web pages. Google searches this immense collection of web pages often in less than half a second.

8. Google has a funny tradition of creating April Fool's Day jokes - such as Google MentalPlex, which allegedly featured the use of mental power to search the web. Some thought the announcement of Gmail in 2004 around April Fool's Day was a joke.

9. Google receives daily search requests from all over the world that includes the lonely Antarctica as well.

10. Users can restrict their searches for content in 35 non-English languages. To date, no requests have been received from beyond the earth's orbit, but Google has a Klingon interface just in case.

11. Google has a world-class staff of more than 15000 full-time employees - Googlers. The company headquarters is called the Googleplex located at Mountain View at 1600 Amphitheatre Parkway.

12. Google translates billions of HTML web pages into a display format for WAP and i-mode phones and wireless handheld devices.

13. Another funny fact is that the "I feel lucky" is nearly never used. It was a comfort button which actually takes to the first web page returned by the search results.

14. Google use the unique 20%/5% rules. That is ,if at least 20% of people use a feature, then it will be included. At least 5% of people need to use a particular search preference before it will make it into the 'Advanced Preferences'.

15. Employees in Google are encouraged to use 20% of their time working on their own projects. That's why we have such amazing products like GMail, Google News and Orkut now.

16. Google Groups comprises more than 845 million Usenet messages, which is the world's largest collection of messages or the equivalent of more than a terabyte of human conversation.

17. The basis of Google's search technology is called PageRank, and assigns an "importance" value to each page on the web and gives it a rank to determine how useful it is. However, that's not why it's called PageRank. It's actually named after Google co-founder Larry Page.

18. Googlers are people from different background. One operations manager, who keeps the Google network in good health, is a former neurosurgeon. One software engineer is a former rocket scientist. And the company's chef formerly prepared meals for members of The Grateful Dead and funkmeister George Clinton.

19. Google’s Orkut is most popular in Brazil and India. It was the brainchild of a Google engineer who was given free reign to run with it.

20. In a 2006 report of the world's richest people, Forbes reported that Sergey Brin was #26 with a net worth of $12.9 billion, and Larry Page was #27 with a net worth of $12.8 billion

Arrow Diagram:

Also called: activity network diagram, network diagram, activity chart, node diagram, CPM (critical path method) chart
Description:
The arrow diagram shows the required order of tasks in a project or process, the best schedule for the entire project, and potential scheduling and resource problems and their solutions. The arrow diagram lets you calculate the “critical path” of the project. This is the flow of critical steps where delays will affect the timing of the entire project and where addition of resources can speed up the project.
When to use Arrow Diagram
• When scheduling and monitoring tasks within a complex project or process with interrelated tasks and resources.
• When you know the steps of the project or process, their sequence and how long each step takes, and.
• When project schedule is critical, with serious consequences for completing the project late or significant advantage to completing the project early.

Tuesday, May 26, 2009

Top 60 Soft Skills:

Soft skills play a vital role for professional success; they help one to excel in the workplace and their importance cannot be denied in this age of information and knowledge. Good soft skills -- which are in fact scarce -- in the highly competitive corporate world, will help you stand out in a milieu of routine job seekers with mediocre skills and talent.
The Workforce Profile defined about 60 "soft skills", which employers seek. They are applicable to any field of work, according to the study, and are the "personal traits and skills that employers state are the most important when selecting employees for jobs of any type."

1. Math.
2. Safety.
3. Courtesy.
4. Honesty.
5. Grammar.
6. Reliability.
7. Flexibility.
8. Team skills.
9. Eye contact.
10. Cooperation.
11. Adaptability.
12. Follow rules.
13. Self-directed.
14 Good attitude.
15. Writing skills.
16. Driver's license.
17. Dependability.
18. Advanced math.
19. Self-supervising.
20. Good references.
21. Being drug free.
22. Good attendance.
23. Personal energy.
24. Work experience.
25. Ability to measure.
26. Personal integrity.
27. Good work history.
28. Positive work ethic.
29. Interpersonal skills.
30. Motivational skills.
31. Valuing education.
32. Personal chemistry.
33. Willingness to learn.
34. Common sense.
35. Critical thinking skills.
36. Knowledge of fractions.
37. Reporting to work on time.
38. Use of rulers and calculators.
39. Good personal appearance.
40. Wanting to do a good job.
41. Basic spelling and grammar.
42. Reading and comprehension.
43. Ability to follow regulations.
44. Willingness to be accountable.
45. Ability to fill out a job application.
46. Ability to make production quotas.
47. Basic manufacturing skills training.
48. Awareness of how business works.
49. Staying on the job until it is finished.
50. Ability to read and follow instructions.
51. Willingness to work second and third shifts.
52. Caring about seeing the company succeed.
53. Understanding what the world is all about.
54. Ability to listen and document what you have heard.
55. Commitment to continued training and learning.
56. Willingness to take instruction and responsibility.
57. Ability to relate to coworkers in a close environment.
58. Not expecting to become a supervisor in the first six months.
59. Willingness to be a good worker and go beyond the traditional eight-hour day.
60. Communication skills with public, fellow employees, supervisors, and customers.
How many soft skills do you possess?

Sunday, May 24, 2009

Viewing an Attached File:

One of the features about Notes is the built in attachment viewers. After selecting an attachment either use the Notes menu option "Attachment - View", or right click on the attachment and select "View", or use the Properties Box and click the "View" button. Any of these methods will cause a new window to open displaying the attachment. This works for numerous file types including pictures, video, spreadsheets, presentation files, and even Zip files. In the screenshot below we have viewed a zip file, and Notes shows the files contained in the zip. When we select one of the files, its displayed at the bottom of the screen:



Now the goodness does not end there. In addition to viewing files, we can even select the file(s), right click and choose "Extract" and Notes will prompt you for the location where we wish to unzip the file to.

There's more. You can even magnify (25% to 400%) and rotate (in 90 degree increments) files that you are viewing. They save a lot of time vs. detaching files to desktop, opening them with another program, and then deleting them.

Thursday, May 21, 2009

How Access Card Works:

Access Card or Security passcards are often used to gain entry into areas and buildings with restricted access. The security passcard may be for general access, meaning that the passcard does not provide data about the person using it, or it may be individually encoded, containing specific information about the cardholder.
Typically, the data on an encoded security passcard includes:
Name
ID # (social security number or other unique number)
Access level (where you're allowed to go)
An individually-encoded passcard looks a lot like a credit card. The stripe on the back of the security passcard is a magnetic stripe, often called a magstripe. The magstripe is made up of tiny, iron-based magnetic particles in a plastic-like film. Each particle is really a very tiny bar magnet, about 20 millionths of an inch long. The magstripe on the back of the card is very similar to a piece of cassette tape.
The magstripe can be "written" because the tiny bar magnets can be magnetized in either a north- or south-pole direction. When the polarity of the bars aligns in the same direction, the card is blank. Writing the data requires the use of an encoder. A change in strength can reverse the polarity of the tiny magnetic bars in the magstripe if they are positioned in the gap of the encoding solenoid. By reversing polarities in a certain sequence, the encoder writes data to the card.
A card reader can understand the information on the magstripe. A reader detects the changes in its magnetic field caused by the flux reversals on the passcard's magstripe. Most readers use one of three methods for reading the card:
Swipe reader - You swipe the card through a long, narrow slot that is open at each end.
Insert reader - You insert the card into a small receptacle that is just large enough to accommodate the card.
Proximity reader - You hold the card in front of the blank face of the reader.

Wednesday, May 20, 2009

Impulse Purchase:

An impulse purchase or impulse buy is an unplanned or otherwise spontaneous purchase. One who tends to make such purchases is referred to as an impulse purchaser or impulse buyer.
Marketers and retailers tend to exploit these impulses which are tied to the basic want for instant gratification. For example, a shopper in a supermarket might not specifically be shopping for confectionary. However, candy, gum, mints and chocolate are prominently displayed at the checkout aisles to trigger impulse buyers to buy what they might not have otherwise considered. Alternatively, impulse buying can occur when a potential consumer spots something related to a product that stirs a particular passion in them, such as seeing a certain country's flag on the cover of a certain DVD. Sale items are displayed in much the same fashion.
Impulse buying can also extend to so-called "big ticket" items such as automobiles and home appliances. Automobiles in particular are as much an emotional purchase as a rational one. This in turn leads auto dealers all over the world to market their products in a rapid-fire, almost carnival-like manner designed to appeal to emotion over reason.
Impulse buying disrupts the normal decision making models in consumers' brains. The logical sequence of the consumers' actions is replaced with an irrational moment of self gratification. Impulse items appeal to the emotional side of consumers. Some items bought on impulse are not considered functional or necessary in the consumers' lives. Preventing impulse buying involves techniques such as setting budgets before shopping and taking time out before the purchase is made.

Tuesday, May 19, 2009

Copy Selected as Table:

The screen capture below is of a Document Library. If I want to forward Document Links to several of these documents, I don't have to manually copy and paste each link one at a time. Instead, I select the documents I want:



and then either:

a) from the Notes menus choose "Edit - Copy Selected as Table"


b) right click in the view and choose "Copy Selected as Table"


c) click on the "Copy Selected as Table" toolbar icon. (this is my favourite way)


Next, go into the document where you want to place the links, and "Paste" using either a) the Notes menu "Edit - Paste", b) the Right Click menu "Paste", c) the CTRL+V keyboard shortcut, d) the "Paste" toolbar icon. This will create a "table" of links to the documents you selected.

Monday, May 18, 2009

Americanization:

U don't open a telephone conversation with a HELLO but with a "Hi"
The telephone is never "engaged", it's always "busy".
U don't "disconnect" a phone, U simply "hang-up".
U never "mess-up" things, U only "screw them up".
U never have a "residence" tel. no., U have a "home" no.
U don't stop at the "signals", but halt at the "lights".
U don't "accelerate", U "step on the gas".
Your tire never "punctures", U may have a "flat".
The trains have "coaches" or "boggies' no more but "carriages" or "boxes".
There R no "petrol pumps", but "gas stations".
"I don't know nothing", 2 negatives don't make a positive here.
U no longer meet a "wonderful" person, U meet a "cool" guy
U don't pull the switch down to light a bulb,rather flick it up.
There's no "Business Area" only "business districts", and no "districts" but
"counties".
No one stays "a stone's throw away", might"a few blocks away".
There's no "Town Side", it's "Down Town".
In hotel U no longer ask for "bill" and pay by "cheque", rather ask for "check" and
pay with (Dollar) "bill"s.
There R no "soft drinks", only "sodas".
Life's no longer "miserable" it "stinks".
U don't have a "great" time, U have a "ball".
U don't "sweat it out", U "work U'r butt off".
Never "post" a letter, always "mail" it and "glue" the stamps, don't "stick" them.
U no longer live in "flats" or "blocks", find an "apartment".
U don't stand in a "queue", you are in a "line".
U no longer "like" something, U "appreciate" it.
"#" is not "hash", it's "pound".
U R not "deaf", U have "impaired hearing".
U R not "lunatic", U are just "mentally challenged".
U R not "disgusting" U R "sick".
U can't get "surprised" U get "zapped".
U don't "schedule" a meeting, U "skejule" it.
U never "joke", U just "kid".
U never "increase" the pressure, U always "crank" it up.
U never ask for a pencil "rubber" U ask for an eraser. a rubber is a condom
U don't try to find a lift U find an elevator.
U no more ask for a route but for a "RAUT"
U don't ask somebody "How r u ?", U say "What's up dude?"
U never go to see a game U go to watch a game.
If U see "World" champions(or Series),read "USA"champions(or Series).
There's no "zero" but "o", no "Z" but "zee".
There's no FULL STOP after a statement, there's a PERIOD.
If someone gets angry at U, U get "flamed".
You don't say "How do you do", you say "How you doin"
In short U don't speak English, U speak American.
Well u dont' say life is boring u say LIFE SUCKS !!

Sunday, May 17, 2009

How WiFi Works:

A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens:
1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna.
2. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection.

The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter.
The radios used for WiFi communication are very similar to the radios used for walkie-talkies, cell phones and other devices. They can transmit and receive radio waves, and they can convert 1s and 0s into radio waves and convert the radio waves back into 1s and 0s. But WiFi radios have a few notable differences from other radios:
They transmit at frequencies of 2.4 GHz or 5 GHz. This frequency is considerably higher than the frequencies used for cell phones, walkie-talkies and televisions. The higher frequency allows the signal to carry more data.
They use 802.11 IEEE networking standards

If you want to take advantage of public WiFi hotspots or start a wireless network in your home, the first thing you'll need to do is make sure your computer has the right gear. Most new laptops and many new desktop computers come with built-in wireless transmitters. If your laptop doesn't, you can buy a wireless adapter that plugs into the PC card slot or USB port. Desktop computers can use USB adapters, or you can buy an adapter that plugs into the PCI slot inside the computer's case.

Once you've installed your wireless adapter and the drivers that allow it to operate, your computer should be able to automatically discover existing networks. This means that when you turn your computer on in a WiFi hotspot, the computer will inform you that the network exists and ask whether you want to connect to it. If you have an older computer, you may need to use a software program to detect and connect to a wireless network.
Being able to connect to the Internet in public hotspots is extremely convenient. Wireless home networks are convenient as well. They allow you to easily connect multiple computers and to move them from place to place without disconnecting and reconnecting wires.

Thursday, May 14, 2009

Change the case of the Text:

Select the text you want to change and press SHIFT+F3. Each time you press the F3 key, the text case switches between Title Case, UPPERCASE, and lowercase.

Wednesday, May 13, 2009

New Line in the current cell:

When you're typing text into a cell, by default hitting Enter takes you to the next cell. However, to wrap your text in the current cell as you type? Hit up Alt-Enter.

You can also use the Alt+Enter keyboard shortcut while entering information in order to force your data onto multiple lines in a single cell.

Tuesday, May 12, 2009

Handbill:

A hand-delivered advertisement or promotional piece distributed to consumers in a trading area. It is also called flyer. Flyers are typically used by individuals or businesses to promote their products or services. They are a form of mass marketing or small scale, community communication.

Monday, May 11, 2009

Making Slides Print Correctly:

PowerPoint has certain defaults to determine how it prints each object on the page. You can see over-ride these defaults. Go to View/Black and White; this will show you a gray-scale preview of how your slide will print. To change the print settings for any given object, right-click on it, then click "Black and White", and then choose the appropriate print option for that object. Master objects can be selected by going to the Master page View.

Sunday, May 10, 2009

Setting up Calendar Delegation:

The first step in configuring the Calendar Delegation feature is to set the access rights for the Lotus Notes calendar that will be managed by another user. The executive who delegates access to his calendar needs to specify who has access to it and what level of access the delegate will have before the delegate can perform calendar and mail tasks on his behalf.
Follow these steps to specify, to delegate, and to set up access rights to a user's mail and calendar data:
1. In the Lotus Notes client, open the executive's mail file. From the Calendar view, click the Tools action bar button, and then select Preferences to display the Preferences screen. Click the Access & Delegation tab to display the "Access to Your Mail & Calendar" tab (see figure 1).

Figure 1. "Access to Your Mail & Calendar" tab displayed

2. Click the "Add Person or Group" button to display the Add People/Groups dialog box (see figure 2).

Figure 2. Add People/Groups dialog box

3. Select the "Enter or choose a user/group" option and then click the scroll bar in the text box under section 1 to display the Select Name dialog box.
4. Select the person who will manage this user's calendar and then click the OK button. You'll be returned to the Add People/Groups dialog box, with the selected user's name displayed in the text box below section 1.
5. After you have selected your calendar manager, you must specify how much access he'll have. If you select the "Only Calendar and To Do" option under section 2 and then click the scroll bar under section 3, two options will display in the drop-down list: "Read any Calendar Entry or To Do" and "Read, create, edit, and delete any Calendar Entry or To Do."
6. If, however, you select the "All Mail, Calendar and To Do" option under section 2, then click the scroll bar under section 3, five levels of access will display:
o Read any document
o Read and create any document, send mail on your behalf
o Read, edit and create any document, send mail on your behalf
o Read, edit, create and delete any document, send mail on your behalf
o Read and create any document, delete any document they created, send mail on your behalf
7. Select which type and level of access to grant the mail file delegate. Under section 4 you can specify whether notices related to your calendar entries will be forwarded to the delegate. Click the scroll bar under section 4 to display the forwarding options:
o Do not forward
o Forward without private details
o Forward with full details
8. Select the desired forwarding option, and then click OK to return to the "Access to Your Mail & Calendar" tab. The designated calendar manager and his access rights will display (see figure 3).

Figure 3. Access rights displayed for designated calendar manager

Thursday, May 7, 2009

Fiscal Year:

A fiscal year (or financial year, or sometimes budget year) is a period used for calculating annual ("yearly") financial statements in businesses and other organizations. In many jurisdictions, regulatory laws regarding accounting and taxation require such reports once per twelve months, but do not require that the period reported on constitutes a calendar year (i.e., January through December). Fiscal years vary between businesses and countries.
In addition, many companies find that it is convenient for purposes of comparison and for accurate stock taking to always end their fiscal year on the same day of the week, where local legislation permits. Thus some fiscal years will have 52 weeks and others 53.

Wednesday, May 6, 2009

History of Firefox:

A Web browser is sort of like the tires on your car. You don't really give them much daily thought, but without them, you're not going anywhere. The second something goes wrong, you definitely notice.

The origins of Firefox can be traced directly to Netscape, a compan¬y whose Web browser, Netscape Navigator, was the dominant browser before Microsoft developed Internet Explorer. The internal company name for the browser was Mozilla. Eventually, Netscape released the source code for Navigator under an open source license, meaning anyone could see and use the code. A non-profit group was set up to direct the development of browsers using this code. This group became the Mozilla Foundation in 2003.

However, Firefox is not the browser the Mozilla group would have released if everything had gone as planned. Like Netscape Navigator before it, the Mozilla software was becoming bigger and bigger as more features were added in -- a problem in software development known as "feature creep" or "bloat." Enter Blake Ross, a computer enthusiast who first started helping out the Mozilla project as a hobby when he was 14. Instead of accepting feature creep, Ross decided to start developing his own Mozilla-based browser, focusing on a streamlined and simple version. Software developer Dave Hyatt also played a major role. Ross was joined by Ben Goodger in 2003, and development progressed rapidly from that point.
At first, the browser that would be known as Firefox was known as Phoenix. There were trademark problems, however, so the name was changed to Firebird. Another software company had a project known as Firebird, so the name was again changed. Firefox was chosen because it was distinctive, and no one else was using it.

When Firefox was still in the beta stage (when a program hasn't been publicly released, but people can download and use it to help find and fix problems), it was already generating a healthy buzz among tech-savvy Web surfers. In just four months after the official release on Nov. 9, 2004, an estimated 23 million people downloaded Firefox. Web tracker OneStat.com reported on Nov. 22, 2004, that Internet Explorer's share of Web browser use had dropped five percent since May of that year. Firefox had a user percentage of 4.5 percent. Current estimates (as of August 2008) have Firefox's market share at nearly 20 percent.

Tuesday, May 5, 2009

Tree Diagram:

A decision tree (or tree diagram) is a decision support tool that uses a tree-like graph or model of decisions and their possible consequences, including chance event outcomes, resource costs, and utility. Decision trees are commonly used in operations research, specifically in decision analysis, to help identify a strategy most likely to reach a goal. Another use of description trees is as a descriptive means for calculating conditional probabilities.
A decision Tree consists of 3 types of nodes:-

1. Decision nodes - commonly represented by squares

2. Chance nodes - represented by circles

3. End nodes - represented by triangles


Amongst decision support tools, decision trees (and influence diagrams) have several advantages:
• Are simple to understand and interpret. People are able to understand decision tree models after a brief explanation.
• Have value even with little hard data. Important insights can be generated based on experts describing a situation (its alternatives, probabilities, and costs) and their preferences for outcomes.
• Use a white box model. If a given result is provided by a model, the explanation for the result is easily replicated by simple math.
• Can be combined with other decision techniques.