Sunday, July 14, 2013

Free laptop scheme: UP govt owes HP Rs 900 crore

photo_1373736743_temp.jpg.pagespeed.ce.oIetnpdMIa[1] Four months after the Uttar Pradesh chief minister Akhilesh Yadav began distributing free laptops to students, it now turns out that Hewlett Packard, the supplier, has not been paid for more than 5 lakh laptops it has so far delivered. With a Rs 900-crore bill pending, HP has threatened to stop further supplies till dues are settled, government sources said.

In June 2012, the Samajwadi Party government had announced a budget of Rs 2,721.24 crore for distributing tablets and laptops tomeritorious students of classes X and XII. Of this, while Rs 400 crore was earmarked for tablets, the remaining was to be spent on laptops.

But funds got entangled in red tape and only Rs 312 crore was released into the accounts of district magistrates, who, in turn, are responsible for releasing funds to HP representatives in districts. Even this amount, though, has not been paid in full. "There is no clarity on why there is a in the release of funds. The government has already allocated the funds.that is needed is an order for its release," a senior government functionary said.

So far, UP has taken delivery of 5,19,600 laptops, running up a total bill of Rs 998.41 crore, according to senior government sources. According to the contract inked with HP, the government is liable to pay 90% of the total cost at the time the laptops are delivered. This amount touches Rs 900 crore.

In addition, while 5% will be paid after the company finishes conducting the training and demonstration to teachers and students at tehsil or school levels, the final 5%, the contract mandates, must be settled after a one-year maintenance period.

Of these, 79,491 have been distributed to beneficiaries. HP has also created an additional inventory of 1,41,866 laptops that can be made available to the state government immediately once a purchase order is issued. Though the complete distribution pattern of the computing gadgets had to follow a seven-month delivery schedule, HP has met the delivery targets of ahead of time.

In fact, with the rate of delivery far exceeding the rate at which the gadgets are being distributed, the company has also raised concerns about the availability of storage space for the laptops.

When contacted, HP officials confirmed delivery of more than 5 lakh laptops. They, however, refused to comment on pending payments.

Saturday, July 6, 2013

Your car may soon talk to your mobile

mobile CHENNAI: An entertainment and communication console that seamlessly connects the phone with the car? The mobile phone-enabled 'integrated' system is a given in many high-end luxury cars but after the Ford EcoSport, the trend is now finding converts in mass market cars as well. As the mobile becomes a one-stop entertainment-cum-communication device, car companies are looking at ways to extend that connectivity to the vehicle too.

Not a cheap technology, this has so far been the premise of high-end cars including the just-launched Mercedes-Benz A-Class. But after the Ford EcoSport's SYNC system, more volume car makers are starting to wonder if the technology can come to less pricey brands in India.

Said Kenichiro Yomura, president & CEO, Nissan Motor India: "We are studying that kind of possibility and will definitely try to introduce those sort of features in India. In Japan we have the 'CarWings' (vehicle telematics) system which allows you to communicate between the car and the service centre for example. We provide this option in many models in Japan because scale makes the technology affordable and we are studying to see if it will work for India as well."

Ford and Nissan aren't the only volume car brands that are looking at bluetooth and telematics as the ultimate bells and whistles for car buyers. General Motors India packs in bluetooth, USB port and an MP3 (though no telematics) player as part of its entertainment package for the Sail hatchback and notchback and the Cruze and Captiva. Vehicle telematics is already a favoured option in a number of high-end cars. The Honda CRV and Accord for instance come with bluetooth interface.

Ditto for the Mercedes-Benz A-Class on which the iPhone can be synced seamlessly offering music playback on the head unit, audio streaming and text messages are displayed in the CD display if the bluetooth message access profile (MAP) is supported by the mobile phone.

Said Mercedes-Benz MD & CEO Eberhard Kern: "The bluetooth and phone compatibility option is standard in the A Class and it allows you to play musicyour iPhone and use the contact list to make calls etc. It's a seamless integration of entertainment and communication between the phone and the car."

Car manufacturers have been tying up with software makers to integrate the mobile with the car, making the car an extension of the entertainment-cum- communication devise . Ford for instance is working with Microsoft globally which has powered its SYNC integrated communication and entertainment technology for the EcoSport. Apple reportedly announced at its developers' meet last month that it plans to link its iOS7 mobile operating system with the techentertainment systems of passenger cars.

See, what makes your Android phone vulnerable to hackers

LONDON: A 'master key' has been reportedly discovered by a security research firm which could potentially give cyber attackers access to almost every Android phone.

According to BBC, security research firm BlueBox has discovered the loophole which is present in every version of the Android operating system released since 2009.

The bug emerges as a result of the way Android handles cryptographic verification of the programs installed on the phone

The report said that Android uses the cryptographic signature as a way to check that an app or program is legitimate and to ensure it has not been tampered with.

Jeff ForristalBlueBox and his colleagues have found a method of tricking the way Android checks these signatures so that malicious changes to the apps go unnoticed.

Forristal said that the implications of this discovery could be 'huge' as it can take over the normal functioning of the phone and control any function thereof.

Security expert Dan Wallach said that in order to catch Android users, malicious hackers would have to get their booby-trapped version of a legitimate application on to the Google Play store.

According to the report, BlueBox had reported finding the bug to Google in February.

Google denied commenting on BlueBox discovery, the report added.

Friday, March 15, 2013

Google planning to kill passwords

httpjmdcomputerindia Web giant Google is researching to build a more secure hardware device which in future can be used to login to a computer or an online account, thus eliminating the need for a password.

Designed in the shape of rings which can be worn on fingers, these hardware devices will aid in logging in to a computer or online account.

The search engine first revealed its plans to put an end to passwords in an academic paper published online in January.

The effort focused on having people plug a small USB key that provides their credentials into a computer.

The possibility of using special jewelry in a similar manner was mentioned in that paper.

According to Google's principal engineer, who specializes in security, Mayank Upadhyay at the RSA security conference in San Francisco last week, "Using personal hardware to log in would remove the dangers of people reusing passwords or writing them down."

"Everyone is familiar with an ATM. What if you could use the same experience with a computer?" Upadhyay said, adding that Google's trial was focused on a slim USB key that performs a cryptographic transaction with an online service to prove the key's validity when it's plugged into a computer.

The key also has a contactless chip inside so that it can be used to log in via mobile devices. Tokens like the ones Google is testing do not contain a static password that could be copied.

The cryptographic key unique to the device is stored inside and is never transmitted.

When the key is plugged in, it proves its validity by correctly responding to a mathematical challenge posed by the online service it is being used to log into, in a way that doesn't produce any information that could be used to log in again.

Google is already talking with other companies to lay the groundwork for using the technology to access different services and websites.

"It's extremely early stages, and we're trying to get more partners," said Upadhyay.

Sunday, March 10, 2013

Earn upto Rs. 9,000 pm with Paisa Live.com!

Hi ,

I have something interesting for you - you can easily earn regular income online via PaisaLive.com!

It’s really amazing! You get paid to open & read the contents of PaisaLive mails. You also receive special discount coupons, promotions and free passes to various events in your city.

  

Join now and get Rs. 99 instantly, just for joining. What more, as a special bonus you get paid for inviting your friends also!

Create your PaisaLive Account & refer your friends to earn launch referral bonus on every new registration.

http://www.PaisaLive.com/register.asp?5684136-3675938

PaisaLive - Get Paid to read emails

 

Sanket Barot

JMD Computer India.com

Wednesday, February 27, 2013

Goa students to get tablets, notebooks for Rs 25

JMDC Students in Goa can now get a tablet PC or a notebook for just Rs 25.

The digital largesse is a part of the Goa government education department's initiative to familiarise Class V and VII students with computers in order to "prepare them for the life ahead and get them curious about the e-systems", according to additional director education Anil Powar.

"General category students will have to pay only Rs.25 while SC and ST students will have to pay Rs.10 to register for the scheme," Powar told reporters here Tuesday.

The official said that the state government was making arrangements for purchasing nearly 50,000 notebooks and tablet PCs for distribution.

"All the computers will have a special e-learning packages. After a day in class, the students will now be able to revise their tutions at home over the tablets," Powar said, adding that a provision of Rs.95 crore had already been made for the purchase of the computers in the last budget presented by Chief Minister Manohar Parrikar.

All the systems will have inbuilt security systems installed to ensure that the computers are not misused for pornographic purposes and other controversial web applications, but the education department will also take an undertaking from the student's parents before handing over the computers.

"It is a no objection certificate saying they are OK with us giving them the computers. The parents should also be in a position to both goad the students to logging onto the right websites," he said.

The Goa government was the first state government in the country to give out free laptops to students over a decade ago.

Friday, February 22, 2013

More top universities to offer free online courses

JMDC More top universities outside the United States are joining the rush to offer "massive open online courses" that are broadening access to higher education.

Coursera and edX, two leading providers of so-called MOOCs, announced major expansions that will roughly double the number of university partners offering free online classes through their websites.

Mountain View, California-based Coursera said it will add 29 institutions, including 16 outside the US Over the next several months, they will offer about 90 new courses, including some taught in French, Spanish, Italian and Chinese.

"Having courses taught in other languages will enable more students to take our classes," said Andrew Ng, a Stanford University professor who co-founded Coursera.

Coursera currently offers 220 courses from 33 institutions and has nearly 2.8 million registered users who have signed up for nearly 10 million courses, Ng said.

The new partners include Chinese University of Hong Kong, Technical University of Denmark, Universidad Nacional Autonoma de Mexico as well as the universities of Copenhagen, Geneva and Toyko.

Cambridge, Massachusetts-based edX said it's adding six new institutions, including five outside the US, which will provide at least 25 courses.

EdX, which was launched in May by Harvard University and the Massachusetts Institute of Technology, currently offers 25 courses from six universities and has 700,000 registered students.

The new partners are Australian National University, Delft University of Technology, Ecole Polytechnique Federale de Lausanne, McGill University, Rice University and the University of Toronto.

Delft University in the Netherlands will be the first edX partner to provide courses as "open content," which means other universities are free to incorporate the materials into their classes, said edX President Anant Agarwal.

"People can reuse it and remix it," Agarwal said. "It enables courses to get better and better over time by allowing people to share content."

Thursday, February 21, 2013

Internet rates may go up

JMDC Industry body ISPAI said that rates of internet and broadband services may go up under new licenses framework due to high entry fee proposed by Department of Telecommunications (DoT).

DoT has proposed to charge one-time entry of Rs 15 crore for a national level Unified Licence compared to Rs 30 lakh which companies pay for internet services at present.

"DoT has not done anything new as per the proposed format for Unified Licence regime. They are going ahead with option to continue the old licence format along with a new national level Unified Licence (UL) that will cost Rs 15 crore.

"If internet service providers opt for UL, then cost of internet and broadband services will go up," Internet Service Provider Association of India's (ISPAI) President Rajesh Charia told PTI.

In the new licencing regime, DoT should allow internet telephony which would lead to low cost call service that would benefit even rural area the country where illiteracy is very high.

"VoIP is widely accepted application. Foreign companies who are not registered with DoT are providing voice calling service both between Computer to Computer and Computer to landlines.

"They don't even have licences. We pay annual charges to DoT and should be allowed to provide voice services across networks," he said.

A DoT internal committee has recommended to allow ISPs with wireless broadband spectrum (BWA) to provide voice telephony service using these airwaves. In 2010, six private players including Reliance Jio Infocom, formerly Infotel Broadband, Tikona Digital and Augere had won BWA spectrum.

The committee has left it for higher authorities to decide if players who won BWA spectrum in 2010 should be asked to make additional payment of Rs 1,658 crore which was charged from telecom players till 2008 for providing mobile telephony.

The licence issued to mobile telephony operators for Rs 1,658 crore had 4.4 Mhz spectrum bundled with it but government has announced to provide no spectrum with UL.

Sunday, February 17, 2013

Facebook says it was hacked

fb Facebook said on Friday it had been the target of an unidentified hacker group, but it found no evidence that user data was compromised.

"Last month, Facebook security discovered that our systems had been targeted in a sophisticated attack," the company said in a blog post posted on Friday afternoon, just before the three-day Presidents Day weekend. "The attack occurred when a handful of employees visited a mobile developer website that was compromised."

The social network, which says it has more than one billion active users worldwide, also said: "Facebook was not alone in this attack. It is clear that others were attacked and infiltrated recently as well."

Facebook declined to comment on the motive or origin of the attack.

A security expert at another company with knowledge of the matter said he was told the Facebook attack appeared to have originated in China.

The FBI declined to comment, while the Department of Homeland Security did not immediately return a call seeking comment.

Facebook's announcement follows recent cyber attacks on other prominent websites. Twitter, the micro blogging social network, said earlier this month it had been hacked and that about 250,000 user accounts were potentially compromised, with attackers gaining access to information, including user names and email addresses.

Newspaper websites, including those of The New York Times (NYT.N), The Washington Post and The Wall Street Journal, have also been infiltrated. Those attacks were attributed by the news organizations to Chinese hackers targeting coverage of China.

While Facebook said no user data was compromised, the incident could raise consumer concerns about privacy and the vulnerability of personal information stored within the social network.

Facebook has made several privacy missteps over the years because of the way it handled user data and it settled a privacy investigation with federal regulators in 2011.

Facebook said it spotted a suspicious file and traced it back to an employee's laptop. After conducting a forensic examination of the laptop, Facebook said it identified a malicious file, then searched company-wide and identified "several other compromised employee laptops."

Another person briefed on the matter said the first Facebook employee had been infected via a website where coding strategies were discussed.

The company also said it identified a previously unseen attempt to bypass its built-in cyber defenses and that new protections were added on February 1.

Because the attack used a third-party website, it might have been an early-stage attempt to penetrate as many companies as possible.

If they followed established patterns, the attackers would learn about the people and computer networks at all the infected companies. They could then use that data in more targeted attacks to steal source code and other intellectual property.

In its statement, Facebook said the attack was launched using a "zero-day," or previously unknown flaw in its software that exploited its Java built-in protections.

"Zero-day" attacks are rarely discovered and even more rarely disclosed. They are costly to launch and often suggest government sponsorship.

In January 2010, Google reported it had been penetrated via a "zero-day" flaw in an older version of the Internet Explorer Web browser. The attackers were seeking source code and were also interested in Chinese dissidents, and Google reduced its operations in the country as a result.

Attention to cyber security has ratcheted up since then and this week President Barack Obama issued an executive order seeking higher safety standards for critical infrastructure.

Other companies stand to benefit more from comprehensive legislation, which has stalled in Congress. Republicans have opposed additional regulations that would come with mandatory security standards.

Tuesday, February 12, 2013

Now, charge your phone with coffee and beer

charge your phone jmd computer

A new device that can charge your mobile phone with a hot cup of coffee or a cold beer mug has been developed by a US company.

The company claims that the two-sided Epiphany onE Puck converts the warmth of your hot cocoa or iced beverage into power for your phone. The lightweight device is portable enough to store in your purse or day bag for emergencies.

The device uses a Stirling engine powered solely by heat disparities to generate the electricity to keep your phone up and running, Gizmag reported.

Stirling engines were actually invented in 1816 as a rival to the steam engine, but its use was limited to low-power applications for a long time.

Epiphany Labs is using modern materials to use the technology in a rather different way. The most obvious evolution comes in terms of size.

The working prototype of the Epiphany onE Puck is not much larger than the bottom of a cup, so it's small enough to carry around easily.

The device has two sides - a blue side for cold drinks and a red side for hot drinks. According to its creators, a hot drink is the optimal way to charge a device.

It comes with a USB port that can charge any device that draws 1000mA or less. This means it can charge iPhones, Androids, iPods and other USB-based devices.

Epiphany Labs claims that, in ideal circumstances, the device would be able to charge your phone at the same speed you would see plugging it in directly to a wall.

It will also work in less-than-ideal conditions, but if you are not placing a fresh hot drink on the Puck, you will have to wait a little longer for your device to receive a full charge.

The team from Epiphany Labs has a working prototype, and is turning to Kickstarter to get the funding needed for production.

7 tips avoid Facebook hack

Facebook jmd computer

People who do have little or no time to maintain Facebook profiles, can do seven things to at least minimize the damage when their account gets hacked, a report has said.

Firstly, change your name. If you tweak your name just a little, or use a nickname, it will be easier for you after the inevitable hack.

Opening more than one account can also help. It violates Facebook's terms of service, but 80 million accounts already do it, says privacy expert John Sileo.

Secondly, stop geotagging your photos. Geotagging includes the latitude and longitude where a picture was taken, the Huff Post reports.

Thirdly, lie about your age as it is a key piece of information needed to steal your identity.

The fourth and one of the most important rules is that do not store your credit card information on the site, the report said.

According to the report, another important step is to 'have some boundaries'. Foe example when Facebook asks you where your photo was taken, keep it to yourself.

Don't brag about new cars, especially if your photos show where you keep the keys in your kitchen, the report said.

The sixth important step is to go through your timeline and remove posts that provide personally identifiable information.

Lastly, deactivate your account. You can't get hacked if you don't have an account, the report said.

And the most important 'bonus Pro Tip' according to the report is: 'Don't use your Facebook password anywhere else. That's making it way too easy for the bad guys.

Monday, January 21, 2013

Instagram boasts 90 million monthly active users, 40 million photos per day

instagram_owned-jmdcomputer Instagram might have gotten some crazy backlash from its policy changes back in December, for which they pulled an about face and returned it back to normal. However, a lot users were done with the service at that point, and vowed to switch to an alternative. Then again, that doesn’t seem to be scaring Instagram too much, as the company has reported 90 million monthly active users, as well as 40 million photos being posted per day.

AllThingsD notes that the service’s monthly active user base is actually up 10% from last month, so it seems that the privacy policy debacle wasn’t a huge deal for its users after all. Instagram’s Kevin System says that the company “continues to see very strong growth around the world.”

Along with those 40 million photos being posted every day, Instagram says that its users are liking photos at a rate of 8,500 per second and are posting 1,000 comments per second as well. This actually marks the first time that Instagram has posted statistics on its user base, but detailed numbers are still scarce.

According to AppData, Instagram use on iOS and Android actually rose quite a bit late last month, but with use on Facebook falling by 25%. Furthermore, according to AppStats, Instagram apparently saw their active user numbers cut in half to 40 million, but according to Instagram’s own numbers, that’s clearly not true.

Story Timeline
  • SlashGear 101: Does Instagram own my photos?
  • How to Ditch Instagram
  • Five Instagram Alternatives you're going to love
  • Instagram co-founder responds to user outrage
  • Amid Instagram Madness, What Terms of Use Should Take for Granted
  • Instagram updates its terms of service after massive backlash
  • Instagram took the lazy, sneaky way out
  • Instagram iOS and Android update adds new filter, support for 25 languages
  • Instagram Privacy Policy prodded with Class-Action lawsuit
  • Foursquare makes Privacy tweaks, wary of Instagram-style backlash

Instagram boasts 90 million monthly active users, 40 million photos per day is written by Craig Lloyd & originally posted on SlashGear.
© 2005 - 2012, SlashGear. All right reserved.

Facebook‘s annual hacker competition opens for registration

jmdcomputer Social networking giant Facebook has opened registration for its third annual Hacker Cup, set to begin from January 25.

The top prize will be $ 10,000 (approx. Rs 5.5 lakh) as against $ 5,000 (Rs 2.75 lakh) last year and as many 25 of the best hackers will be taken to Facebook's headquarter in USA, a statement said.

The Facebook Hacker Cup is an annual worldwide programming competition where hackers compete against each other for fame, fortune, glory and a shot at the coveted Hacker Cup.

"The competition will be held in two rounds starting with an online qualification, out of which 25 of the best hackers are then flown by Facebook to their headquarters inMenlo Park, CA," Facebook said.

"The preliminary round will be held between January 25 and February 16 while the onsite final round is scheduled for March 22-23, 2013.

Contestants will be judged on accuracy and speed as they race to solve algorithmic problems to advance through up to five rounds of programming challenges," it added.

Last year, the Hacker Cup attracted 8,000 participants from 150 countries, with the winner- Roman Andreev, hailing from Russia, Facebook said.

"Hacking is core to how we build at Facebook. Whether we're building a prototype for a major product like Timeline at a Hackathon, creating a smarter search algorithm, or tearing down walls at our new headquarters, we're always hacking to find better ways to solve problems," Facebook said in its Hacker's Cup page.

Facebook said that those who registered for a previous year are automatically registered for the competition year, however, they still need to check their information is up-to-date.

Sunday, January 13, 2013

How To Turn Your Boring Old Laptop Into A Cool Touch Screen Machine

Touch 8 close Sure, Windows 8 - Microsoft's new touch screen operating system - will run just fine on PCs designed for Windows 7. But you won't be able to take advantage of the new touch capabilities the OS enables unless you scrap your existing PC and upgrade to a new computer.

Or maybe not.

At the Consumer Electronics Show (CES) in Las Vegas, a company out of China demonstrated a peripheral that combines a stylus and either a USB or wireless receiver to touch-enable a non-touch screen LCD monitor or laptop screen.

The technology has made its way to the United States via Shenzhen Yifang Digital Technology Co. Ltd., mercifully shortened to Yifang Digital, whose E Fun brand markets the APEN Touch8 system in the United States. Got that?

Discovering the Touch8 digitizer was a happy coincidence. Wandering though CES' maze of booths, you never quite know what you'll find. In the rear of the South Hall, for example, Trojan was handing out thousands of vibrators. So there's that.

Yifang was showing off several versions of the Touch8, including a USB-powered model and one that used wireless technology. According to Eric Ju, an account development manager with the digital pen business unit within Yifang, the company is attempting to license or has already licensed the technology to accessory vendor Targus, which is marketing a very similar device known as the Touch Pen. The Targus Touch Pen costs $99.99 and will be available during the second quarter; the Touch8 will be available this quarter for $79.99. Targus representatives, who were likely flying home from Las Vegas, could not be reached for comment.

The Touch8 system, and presumably the Touch Pen as well, both use a receiver that mounts to one side of your screen. A combination of ultrasonic and infrared beams detects the stylus' soft, fuzzy tip, orienting it on the screen. Ju told me that a brief period of 'training' the system is required, so the Touch8 learns the boundaries of the available touchscreen real estate. The stylus itself requires power, but it can be used for 500 hours (about 62 days of 8-hour workdays) without replacing the small, watch-sized batteries that power it.

I was able to play around with the Touch8 for several minutes. According to Ju, the system accommodates up to 15.6-inch displays, making the Touch8 suitable for a notebook or a small desktop monitor. The peripheral is magnetically clipped to the side of the notebook, and must be removed and recalibrated every time the notebook is closed. In other words, you'll have to suffer through some inconveniences to eliminate others.

To its credit, the Touch8 works well at what it does: Enabling 'touch.' Swiping works fine, and single-touch gestures seemed to work as advertised. True touch hardware, however, is multitouch, and I'm not even sure if holding two stylii together, chopsticks style, would even work. Right now, the Touch8 works best for drawing, swiping and other single-mode uses.

Should you buy one?

Yes, but only if:

  • You're desperate for Windows 8 and touch interaction
  • You're running a small monitor
  • You leave your laptop on your desk
  • You don't mind the absence of multitouch
  • You're willing to spend $100 but not willing to buy a brand new machine

That's a pretty limited use case. But if you really want to use Windows 8 properly, you have to do something. I've used a mouse and keyboard with Windows 8, and while it's navigable, it's also sort of a pain; scrolling 'up' to slide your Windows 8 Start screen sideways simply feels awkward.

Pictures by Mark Hachman. Posted by JMD Computer

Saturday, January 5, 2013

Prepare These Questions For Job Interview Success: Answer of "Why did you leave your last job?" is very Important For Interviewer

The decision to hire or not usually comes down to how you perform with the  general interview questions that are sure to be asked. Some of these standard interview questions for the job are:

  1. Why did you leave your last job?
  2. Why have you had so many jobs in the past few years?
  3. Can you explain this gap in your working history?
  4. What are your long term career goals?
  5. What do when dealing with people you dislike?

Once a collection of these type of questions start, you are really past the friendly chit chat stage that failed to put you at your ease. You can feel the temperature of the room increase to boiling point and your palms start to sweat.InterviewSkills_Handshake

Even though you thought up good answers when you were at home, under the pressure of the interviewer you mind most likely will go blank. You open your dry mouth and start to mumble answers that fail to make much sense to you and even less to your inquisitor.

In panic you begin to talk even faster, churning out half baked answers and you can feel the sweat start to trickle down you back. Your heart pounds in your chest and you long for it to be over. It's a vain hope, like wishing the dentist would finally put away that drill but they enjoy the torture too much and more questions follow. Your answers fail to impress.

After what seems like hours they finally jot down some notes, peer over their glasses and thank you for your time. Drained and exhausted you un-stick your dehydrated body from the soaked chair, forget to wipe your sweating palm and press it into their outstretched hand.

You can almost feel the steam rising from your collar as you unhurriedly rush for the door and freedom. You glimpse the interviewer holding his head in is hands as you leave without the prospect of a new job.

Interview is Gateway to Your Desired Job & Career, But Still You Have to Face the Competition, so You Must be Prepared Before Time.

 
Design and Bloggerized by JMD Computer