Tuesday, October 19, 2010

Intel, the training of new employees



intel's new employee training (ne employee orientation) basically does not involve technical aspects, at the beginning of the course may tell their salaries situation, intel company's basic situation, the process for a week, is a closed-end training, but also called the overall training new employees. Training courses, including the establishment of intel process, the whole structure of the company, Asia Pacific, China's architecture, it is most of the intel-speaking culture, 5-day course may be two days talking about intel culture, details of the direction of intel what strategy is.

intel returned to the staff arranged for an executive level esm (executive staff member) and employee dialogue, called the new hire forum, intel sent two from the Asia-Pacific vice president-level employees who come to China to meet with new dialogue. General This forum is for new workers in the intel work from 6 to 9 months later, the senior vice president to answer their questions.

intel management of new employees from the company managers will also get a set of information, this information is very clearly told the manager to teach new employees every month doing things, intel asked managers to new employees the first exchange of the content of what is one to one , followed by training in what are very clear. Manager of the new employees have the record of each person's situation, to ensure that each new employee receive the same treatment. Training is one manager for each major content management, behavior assessment, the manager, 30% see them in the management of employee performance.

After all, the manager of each company location is limited, not every employee can be manager, managers do not have opportunities for promotion. If there is no interest in a manager, can skills training to develop their own. After an employee found what direction of development, it can go on courses, training and work-related, development is related to future career development
intel never take the training as a way to reward employees, training is carried out according to the requirements of the work, not because they work well, send them to the United States for a week.

intel new employee training in a clear budget, and other training is largely based on need, no clear budget.

intel training for managers

intel general manager to go through three stages of training, these three stages, first the entry management training (managing in intel), this training introduces the managers of some intel work processes and systems to enable managers to manage layer to know more about things. The next major task is to manage the cycle of training (managing task circle-training), this training process is to tell managers how to manage, is a management business skills. Finally, the training of how to manage people (managing the people), which is very important intel training point, intel that the administrator of the manager must have good communication skills and develop the capacity of staff.

Managers on the management of personnel training cycle has five links, the first step is setting goals, the second step is to complete the project, the third step is how to help others solve problems together, the fourth step is for staff to implement management, 5th step is the performance of good employees will be how to strengthen and inspire. This is the manager of the training mode of managing people, everyone through this five steps, will become a high-quality management of personnel manager.

intel on the training of future leaders

intel addition to the general manager of the training, as well as training for senior managers. Further more advanced training, are mainly aimed at future leaders, and called the manager to accelerate the project (map, manager accelerate program). This is intel to cultivate China in the next generation of leaders of local employees special training programs, training more people are 6-8 excellent manager. intel senior positions who are the development managers to track, to see what level he is now, his future if a certain office, he may need what level, intel by training them how to bring this level. intel has many programs tailored for them, for example, to send them to read mba, let them go to work abroad (oversea assignment), specializes in senior management have more to do mentor (master) with the work of these successors to give them arrange some special dialogue, to train their leadership skills, there are some special items (special program), mainly for strategic management. The man received such training, if they do not have too much access, basically a China of the future.







Recommended links:



Crossroads 3G



VOB to Flash



Easy To Use Telnet Servers



brief Audio And Multimedia



The Best Forex Automated Software For Consistent



BI not fight either CHANGE or be abandoned Summary



Picked TELNET Servers



AVI to MPEG4



J2SE process of LEARNING the basic concepts 30



Telnet in RHEL 5 on the opening process



Glibc 2 HOWTO English Version - 1. Introduction



MPG to Flash



Easy to use Communications Tools



Holiday Promotion: How To Make The Cost May Change From Control



Teach you when the head: how to reduce your staff turnover rate?



UML: The Perfect Combination With The Zachman



Friday, October 8, 2010

Ruiz: Barcelona will help AMD out of the doldrums



According to foreign media reports, AMD CEO Ruiz Monday said the company expects the new chip, the four processing engines to help revive the fortunes AMD.

The release of AMD Barcelona chip, Ruiz of the reporters said: "The products will state clearly positive impact on corporate finance."

Ruiz said that the processing performance by providing faster and more efficient energy, Barcelona, AMD will strengthen the competitive advantage. The new processor also can conveniently make your computer run multiple operating system software, the so-called "virtualization" feature AMD Barcelona has been able to count on the competition with Intel to reverse the company's financial difficulties, so that their 40 billion in annual sales dollar to regain the market share of x86 processors. Over the past year, AMD shares fell 50%, while rival Intel shares were up 30%.

New York stock market closed Monday, AMD shares rose 2.6%, the stock rose to 12.94 U.S. dollars.

Ruiz also pointed out that the second half of this year, he forecast the market demand for personal computers will continue to remain strong because of the real estate industry to enhance consumers will not be affected by credit problems.







Recommended links:



Why Do We Need SAS?



World Rally 3 cheat



MII further notice irregularities SP will be Ordered to stop



TOD to WMV



ASP Test Two Simple Functions External To Submit



WMV to MPEG



Managed And Leased Operators Should Pay Attention To The Problems And Suggestions



Comparison of CMM and CMMI



Easy Tools And Editors



quot could not load file or assembly system



JSP Servlet automatically jump to the wrong instance of the page



Storage Online Gaming



Sober worm resurgence of rampant e-mail form



AVI to MOV



Tuesday, September 28, 2010

Stack Usage



Do not damage the stack!

Use BREW 鈩? running each program has a call stack and heap, and each room has a maximum limit. If you exceed the maximum stack space in the absence of their situation can not be extended, and another memory allocation attempt fails, the application should detect this situation and try to moderate handling. However, if the stack extend beyond the maximum amount of space (known as the "destruction of the stack"), the data will be overwritten. This can lead to seemingly random but often very strange phenomenon of defect or breakdown. Destruction of the stack is kind of hard to debug, because it may be related with the data, does not occur in the simulator and the code looks like no problem.

Be sure to keep your stack size of 500 bytes of the following.

To reduce the stack size, try to keep calls short depth (to avoid recursive function calls or embedded deep). Moreover, in addition to simple items (such as int, pointer, and other scalar types), were invited to consider the dynamic allocation of memory, rather than declare a variable on the stack. For example, to avoid the buffer within the function declaration, declare a pointer and dynamically allocate the buffer. To further reduce memory usage and object code size, preferably in multiple function use global buffers, rather than the local buffer.

Reduce the call depth approach is to manually unlock your code (from the other cases, the function will be called to extract the code and insert it in other circumstances would call its functions).

Another method is to use the INLINE function declaration specification. However, please note that the compiler may not perform INLINE command. For example, the time of writing this report that some people ignore the ARM C compiler INLINE. Can use ARM C + + compiler (even if you write the conventional C code). In addition, many compilers do not inline calls from outside the function declaration file function.








相关链接:



The world to those who have Access



Business Components 2



Knowledge of equality before the



YouTube to WMV



QuickTime to MPG



The second Mix CorelDRAW9



WMV to Zune



Tencent sued Staff: to protest the labor CONTRACT Tencent Overlord



FreeBSD SERIAL (35): serial port and modem



Overcome stage fright interview the 10 candidates RECRUITED nirvana



Picked Personal Finance



Firewall And Proxy Servers COMMENTS



Using warm and intimate SMALL music prompted the fish that you're familiar with the music fish



Thursday, September 16, 2010

Was brilliant: Ten-man weapon crack revealed inside story of classical



Factors affecting the development of shared software, many have been illegally sharing software crack can be said the number one enemy. Then the resulting difficulties in sharing software cracker who live in the end with those weapons? Today, so let me take you to see the mysterious ten categories of commonly used software cracker, which is shareware top ten killer!

First, debugging tools for soft-ice class and trw2000

soft-ice is widely recognized as the best trace debug tools. Use soft-ice can easily keep track of a software or monitoring software debug errors generated, it has dos, window3.1, win95/98/nt/2000 / each platform version. This version is the software used for debugging, tracing, debugging tools, in the cracker into the hands of the most horrible cracking tool; trw2000 is the Chinese people write their own debugging software is fully compatible with soft-ice the instructions, because now Many software can detect soft-ice presence, while trw2000 testing have sent many, many cracker so now it became a favorite.

trw2000 solve specific software has been optimized to track the debugger in windows, tracking more powerful; can set various breakpoints, breakpoint types, and more; it can be as complete as some shelling tool to remove the shell of the encryption automatically generated exe file, so it's cracked stronger, in the hands of crack development of the shared software bigger threat. It also under the dos version, called tr.

Second, disassemble tool wdasm8.93 Gold Edition and hiew

often the soft-ice cracker and trw2000 compared Tulong Dao, will then be compared to Heavenly Sword wdasm8.93. wdasm8.93 can easily disassemble the program, the program flow static analysis can also be dynamic analysis program. General version of the original based on the number of crackers has developed wdasm8.93 Gold Edition, stepped up a string of Chinese extraction. On the threat of domestic sharing software also greater. For example, this is fun fun Landlords sharing software, with a gold version of its disassembly can see the registration code, common version can not, you do not it powerful? Hiew is a hex tool, in addition to its ordinary hex system function, it also a feature that can disassemble file, and can modify the program in assembly instructions, use it to modify the program, convenient! This is the cracker have used static disassembly tool.

Third, visual basic debugging tools smartcheck

This is specifically for visual basic program debugger, program execution because vb is interpreted in essence, they just call vbrunxxx.dll the function, so vb executable file is a pseudo code program in vbxxx.dll inside the implementation. If the track with the soft-ice debugger which can only be used in vbdll play around, see something of value, and code quality is not high, the structure is still very complicated.

Of course, as long as the understanding of their characteristics with a soft-ice can also break, but the emergence of smartcheck greatly facilitate the cracker. smartcheck is numega company exports a great interpretation of the implementation process of debugging tools, the latest version is v6.03. It is very easy to use, you even do not know assembly language can easily manage it. Vb program which can be recorded in the implementation of the action completely, so that those who break easily break most of the vb program.

4, hex editor ultraedit

Hex hex editor can edit the file, modify the contents of the file. Although hiew is a hex tool is, but it is dos interface, many were prepared to make a break under a windows tool, such tools are many, such as: ultraedit, winhex, hex workshop, among which more ultraedit a unique and easy to operate, more finished version is available, it is very good hex editor, we recommend that you also find a use with.

5, registry monitoring tools

There are regshot, regmon or regsnap so. Microsoft operating systems, many settings are stored in the registry, windows registry is the core database tables stored in a variety of parameters, the direct control of the windows startup, loading hardware drivers as well as some windows applications normal operation. In the application software installed, there may be some of the necessary information into them, such as installation time, frequency of use, registration code, etc..

regshot, regmon monitor registry changes or regsnap is a tool through which to understand, monitor the application of the action in the registry, crack dealers often use them to monitor application in the registry changes.

6, file monitoring tool filemon

Can monitor the system operating conditions specified in the file, such as which file to open the specified file, which closed file, the data on which files to read and so on. Through it, any files you specify to monitor any read, write, open the other file operations can be monitored over it and provide full reporting information. Crack often use filemon monitor file system in order to understand the program at startup, shut down or verify registration code what to do when the hands and feet, and thus decrypt accordingly.

7, shell tools procdump

Now a lot of software plus a shell, "shell" is a dedicated to the protection software is not illegal to modify or decompile the program. They are usually run before, to get control, and then complete their task of protecting software. After packers in the tracking software when you can not see the real hex code, so you can serve the purpose of protecting software.

procdump is a tool to deal with software packers in the shelling, which can be stripped of many types of shells, but also files really are, and then modify the contents of the documents so much easier. Because it allows users to write their own script files, so use it off the shell software version packers. It also is an excellent tool for pe format changes, is an indispensable tool for shelling!

8, detection of file type tool

Such tools are typ, gtw, fileinfo and shock-2000. They are used to detect the type of software is packers, which can easily shock of 2000 to find any shell entry point encryption, including encryption shell asprotect and Phantom can. Such software is generally used with procdump and debugging software, and use them to find the program packers type, with procdump or soft-ice, trw2000 shelling.

9 resource Trainer exescope

exescope is a tool to modify software resources, and powerful. exescope in the absence of resource files to analyze, display different information, rewriting the executable file resources, including (exe, dll, ocx) and so on. It can be edited directly using vc + + and delphi compiled program resources, including menus, dialog boxes, string tables, etc., is a common tool in software localization. The hands of the crack, it is often used to modify the file resources in the menus, dialog boxes, string tables, etc., to solve the needs of the information displayed (such as changing the copyright information, etc.), modify the software in order to achieve the purpose.

10, api call query tool api spy

As the name suggests, this program is to detect what software is called api. windows api is called when the program executes a function, with the under dos int (interrupt) almost, windows provide many of these functions allow programmers to apply, the main purpose is to cut software development time, we develop software to facilitate.

api spy api call for such a monitoring software, which lets you view what the application calls the api, so as to arrive on the api call crackers useful information through these api calls to set the breakpoint to achieve the purpose of cracking software. It can work in windows95/98/nt/2000 platform.

Well, shareware top ten killers introduce you finished, how to deal with them is your things. Be noted is that the software mentioned above are all "legitimate" software, but in the hands of different users have played a different purpose. Would like a gun in the hands of the people's army is defending the homeland and the weapons, in all sorts of the wrong hands is a weapon, do not produce this software on to these stereotypes Oh!







Recommended links:



Youtube Video Format



South China Sea Hammer Properties Limited



Premier Religion



iphone rmvb



SCO, Sybase, SCO, Sybase,



avi to ps3



Premier Web Servers



Mod To Mpg



Bearing Co., Ltd. Yantai Ximeng Xi



Photoshop Production - wire and spark



Premier Audio Speech



Firewall And Proxy Servers comments



Using VMware, vowed to computer "cloned a technique"



Hong Kong PCCW Privatization Commission will vote by sealed-depth inquiry



Photoshop art of sun and moon shuttle - on the evening landscape change



Wednesday, July 28, 2010

Middle figure painting



I believe many like multimedia video overlay friends have tried, and today we another play, so the pictures in the video produced wonderful films in the "middle painting" landscape. The tools used Ulead's PhotoImpact 7 and VideoStudio 6, operation method is simple.

Produced no background photos

Start PhotoImpact 7, into the prepared portrait photos.

Press the left side of the main window, select Tools on the toolbar, according to the complexity of the background picture, choose to use the "magic wand" or "Bezier curve tool" to remove the photo background (Figure 1).






"Magic wand" in the background color for comparison a single photo, select the tool a large area in the background color of Office, click on the dotted line will form a constituency, press the [Del] key to delete the background. Can use the parameter settings in the main window select the sensitivity column set to ensure the integrity of the edge portraits. Remove the blank background after a one-time hits to all selected, then right-click the mouse to select "Reverse Selection" to select the background of the portrait removed.

"Bayesian curve" tool for the complex in the background picture, select the tool click the check along the edge portraits form a closed area after the double-click the cursor into a cross to complete. And then "reverse selection" background to remove, and then perform a "reverse selection" to select Portrait.

Upon completion, save the picture as the PSD format, save time attention to check the "Save the selected range" option (Figure 2).






Production of "painting mid-stream" video

Start VideoStudio 6, new items, press the main window to the right of the folder icon, the video clips into the prepared material library.

Open the main menu "story board" option selected in the material into the video library, video editing window and drag the "video track" in (Figure 3) as the background video. Paragraphs can import video clips and pictures with the back of the portrait. Video length after editing window activate any drag adjustments to meet the needs of the entire movie clip.






Open the main menu "cover" option, activate the video editing window "covering tracks" to open the main window of the upper right corner of the "material type of" show volume bar, select "Picture" material library, the main window, right click the folder icon , will be prepared no background portrait picture into picture material library, pull it to "cover tracks", the activation by the former method to adjust playback length of the tractor, the length of their agreement with the background video. In this instance we used two video and two no background portrait, its length corresponding respectively.

Portrait import needs further adjustment, to achieve our desired results. Activation "cover track" in the portrait photo, press the top left corner of the main window of the "Animation" set the button to set the parameters (Figure 4).






Note: "Movement Type" and just set the portrait position are closely related, if the portrait from the right of the slide, we need to set the screen to portrait position of the left, and vice versa, setting out best to portrait position about half of the screen, resulting in skidded off the screen effect.

Press the main window is set up in the 顧?preview 顧?button to see the results good, for icing on the cake, then this movie for the title text with activities, make it more vivid. The main menu select the "title" option to activate a text editor title line, in the Preview window select the text you are rendering a satisfactory manner, it will drag the editor window in the "title track" parameter field set up in the upper left corner text font, color, shadow and animation methods. Last Drag "title track" in the title text to adjust the length of play, to match the background of movies with the same length.

VideoStudio has added audio features, and friends can be added according to preferences set on their own, are not discussed here.

Save or export the movie

We work all OK up! See in the preview window with the background video player, portrait slowly slide into the screen, then slowly slide out, slide in. Then the next portrait, appears on the screen is also a corresponding the colorful animated title text, a seamless integration into the new video! following the work we put saved.

Select the main window "to complete" option, where it can be stored as a custom video files, or burn directly to create a VCD, DVD, SVCD formats such as CD-ROM.

Save your movie, you can also press the [Export] button to make this movie into a rather innovative e-cards, with a good greeting card page, adjust the video size and position, generate a self-executing EXE file, you can pass it on to friends to share your happy.







相关链接:



Chunlan: I do TOM Online in transition



Mp4 To Avi



2010 Breakthrough into a 2D game or turning point



Gallery And Cataloging Tools Brief



Shanda also mindless



Easy Flash Tools



"Cottage" toxic



Communication: four stories, four walls!



FMCG Distributors And How The Difficulties Faced By Self-improvement



CONVERTING .mov to .wmv



Swf To Flv



PMP EXAM Questions



Maxthon financial pages and information on-line grand



Site Administration Specialist



mts to mpg



Sunday, July 25, 2010

"Mom" to Baidu was "angry"



Eve has been listed Baidu "raid" C2C (personal e-commerce) market, Alibaba also intended to use the "cross fire" in the online marketing market leader in the Baidu to be hit back. Yesterday, Alibaba Group, announced its sixth subsidiary - online advertising trading platform established Ali Mama, which means its "Hui Ge," into a web-based online marketing advertising market.

Targeting small and medium site

"Ali Mama tens of millions of Chinese small and medium enterprises and small and medium website provides a very realistic business model and revenue model!" Alibaba Group, said spokesman Kim Hang built. In accordance with Alibaba's planning and vision, Ali Mama is a small site for an open and transparent ad exchange market and the service platform, SMEs can face the advertising media, selection of content and choose the time, while understanding of time effects based on results and feedback to adjust the advertising program. Small sites can skip the middlemen, directly facing the end of the advertisers and generate revenue.

Jin Jian Hang quoted Alibaba Group Chairman of the Board Ma as saying that Ali Mama's mission is to grow up to make a valuable site for honest webmasters to get rich. Jian Hang Jin also revealed that a subsidiary of Alibaba Group, will be unified in many advertising platform put up Ali Mama procurement.

Competition implies Baidu

Speaking of Ali of attention the relationship between mother and Baidu, Kim said the construction of Hangzhou, the search engine is like a dictionary, users now see from the dictionary all the first few lines of advertising, lost the key search results just sex, "the online advertising medium and small Web search engine should be better than operating service model, which is founded by Ali Mama ad trading platform model." 杩欑暘 statement no doubt that Alibaba launched the "Mother Ali" directly after the competition goals PPC search mode by means of "big sale" of Baidu.

August 10 this year, online advertising platform, Ali mother has put into trial operation. According to data released by Alibaba, now Ali, a collection of more than 150,000 mothers small Web sites and more than 135,000 personal blog site, more than 380,000 advertising, more than one million registered members, covering small and medium site's total traffic more than 1 billion page hits volume / day, "Ali mother every day now nearly 4,000 new small and medium sites, 1 and 2 thousand million individual blog advertising."







相关链接:



Create fireworks animation Fireworks



Mov to avi



mp4 to Mjpeg



Fu Chong: The General Trend Of Those Who Know Great Things



Call ChooseColor function in PowerBuilder



Learning regular expressions entirely Manual: Getting STARTED guide rookie



Screen Capture Comparison



Infomation Cartoons - Screen Savers



Flash video playback controls Reversed



Convert 3gp to wmv



CONVERT flv to wmv



UFC Wins Platinum authorized agent UGS



Lei Jun served its purpose, SOUL shine Jinshan



Fireworks produced CD CIRCULAR picture effect



Evaluate Games Action



Wednesday, July 21, 2010

IP address errors caused by routing anomalies located



We all know to configure routers and three switches must be careful when routing, IP address and subnet mask are not a little mistake. Recently, I discovered during debugging a network IP settings of the machine will result in improper routing anomalies.

Fault Description

I always like to network unit debugging, the company recently launched a Web site requires the external debug access connectivity. I use the laptop in the company's server farm to do a debug and modify the IP address of 211.153.80.29, is to visit the site IP address is 211.153.80.1, the domain name "www.ftedu.gov.cn". After commissioning, the unit where you can normally access the site. After returning home I try to ADSL access. Because ADSL uses PPPoE dial-up IP address changes without prior access can be normal, so I did not modify the settings in the company's notebook PC dial-up IP address on a hasty visit, SOHU, SINA no problem, QQ and MSN can also be normal login, 211.153.80.1 alone can not access the server company, there's a message that "page can not be displayed", the author used the domain name visit, fault still exists.

Troubleshooting

In order to find the source of the problem, I immediately called to colleagues at home through ADSL access test site, the results either by IP address or domain name, he can be a normal visit. Therefore, I will locate the root cause of failures in the local computer, and started investigation.

The first step: As the company uses a firewall, so Ping IP is unable to obtain feedback, so I use TRACERT command. At the command prompt type "tracert 211.153.80.1" and found immediately on the emergence of "Request timed out". This shows that the packets sent to 211.153.80.1 not reach the first routing device.

The second step: to check whether the DNS problems, on the command line mode, enter "nslookup", then enter "www.ftedu.gov.cn" and hit return, found that DNS server can correctly resolve the IP address "211.153.80.1 "illustrate the problem has nothing to do with DNS.

Step Three: Try the IP address of the neighboring track, that is, the command line mode, enter "tracert 211.153.81.1", the results can be found in the packet routing information through the five routing equipment.

Step Four: Enter the IPCONFIG command, I found the local computer's IP address is still set in the company's 211.153.80.29, subnet mask of 255.255.255.0. I suspect that is the cause of the failure to set production, once the IP address chosen automatically. After the failure to re-dial-up solution can be a normal visit to the home server unit.

Failure Analysis

Computer's IP address I will re-set to 211.153.80.29, the fault occurs again. In the command line mode, enter "route print" check this machine route, only to find the root cause of failure (see Figure). Originally set the local computer IP address 211.153.80.29, so visit 211.153.80.0 this segment, the system will direct the data packets sent to 211.153.80.29, and not sent to the default gateway address 61.51.199.192, which led to can not find the correct routing information.






Summary

With this failure, we get such an experience that should pay attention to the local IP settings, if the IP address of the local routing anomalies caused by improper settings, there will be access to certain segments can not normal phenomenon. We proposed such a failure in the event of cancellation of the unwanted use of IP.







Recommended links:



"Sacred 2 Fallen Angel" Mission Concert Details



BEST Install And Setup



mkv file Converter



SuperAVConverter



Flv format



SP Selling? Experience!



A-one Video to AVI Converter



Best Trace And Ping Tools



WELLSOFT DVD to iPhone Video Suite



mpeg4 to Avi



Guide Helpdesk And Remote PC



Mkv files



Audio To Music Plus



Vertical Market Apps COMMENTS



Youtube FLV to PS3 Top Rated



Lohan AVI To FLV