twitter
    The place where CEO's meet !

Friday, July 24, 2009

Horoscope

How to learn any subject?

Know the platform (hardware/software) and the applications 

Acquire various study resources of the subject: 

  •     Internet resources
  •     Books
  •     Product help or documentation 

Study the need and history of the subject 

Identify the category of the subject among the below: 

  • Theory
  • Concept
  • Technology
  • Methodology 

Any subject contains one or more blocks of knowledge:

Block = Knowledge burst + Understanding + Implementation + Exploring/Experimenting 

Theory and concept may have single block of knowledge whereas, the rest may have multiple knowledge blocks. 

While learning a block, there may be few tough parts that one cannot understand immediately. They are called holes. As we are proceeding to study, holes increased. 

Without implementing one knowledge block, if you go to next block, you will find too many holes in it, which finally results to poor understanding on the subject. 

Take gaps between the blocks but not in between one block; other wise it leads to ambiguity of concepts. 

For every three to four months, once we have to recall the subject for not loosing it permanently.

System programming: The inside story

From the day of evolution, computing had been adopting new trends led by the corporate strategies and the industry demands. The birth of desktop computers, rapid growth of the Internet users, vertical down-fall of computer prices and development of many emerging technologies, all these reasons contributed to promote the use of computer technologies in almost every area of application. Few new trends soon harbored at the individual solutions for specific systems and manual solutions. Finally, two broad programming trends were formed namely system programming and application programming. As a result, the industry is divided into two major classifications: System software based and Application software based. However, both use some common software for their basic requirements; but these groups differ in their objectives for which, they are using computer technologies. 

Exactly, what is 'system' programming? a trend of computing used to develop software for the needs of system vendors, designers and system requirements is referred to as system programming. Contrarily, a trend of computing used to develop applications for the end-use, is known as application programming. 

As a career objective, application programming has a wide scope of opportunities and job opening s compared to system programming. But still, for the system programmers with enough depth of knowledge and hardworking nature, many bright openings and handsome positions from good MNC's are available. The common strategy for the people who choose system programming is: "If you dig, dig a gold mine!" System programming is not only an area of common interest, but a single rope mania too. Without having a perfect conception, one can't proceed in system programming much. In-fact, this is a very reason, why everybody can't become proficient in this field. 

According to many people, system programming simply refers to design of some compilers, language processors or any operating system internals. However, there exits some overwhelm about system programming scope. There are many areas of computing in the field of system programming, out of which commonly many are unseen by enthusiasts. These areas can be broadly grouped into two major fields:


Operating systems Design and Implementation :


  • Startup BIOS Routines
  • Hardware Detection Routines
  • Generic Device Driver Implementation
  • Specific Device Driver Implementation
  • System Registry and Software Configuration
  • System Tools such as Check Disk, Format, Partition Software, Administration tools.
  • CPU and process schedulers
  • File system Design and Implementation
  • Memory management, Virtual memory
  • Language processors design(Assemblers, Compilers, Linkers, Loaders and Interpreters) 
    System API Design
  • Operating System Kernel Design
  • Operating System Shell Design
  • System-calls and Internals of O/S 
    Interrupt Requests
  • Microprocessor Simulation Tools in O/S
  • Other areas of system programming: 

  • Network Programming(Socket Programming)
  • RPC (Remote Procedure Calls)
  • Graphics Programming
  • Text and Graphics editing tools
  • Data Compression
  • Cryptography and Security Systems
  • Embedded programming, RTOS
  • Programming for Programmable Peripheral Interfaces
  • Programming for industrial PLC's (Programmable Logic Controllers)
  • Network Communication Utilities Design
  • Network Protocol Design and Implementation
  • Database Systems Design and Implementation
  • Database drivers, protocols design
  • Installers, Self-Extractors and auto-run utilities
  • Wizard programming
  • IDE Design (Integrated Development Environment) 

    As you have seen, programming is having numerous areas of application for it. Though it is vast in nature, mastering few areas is not difficult provided you are having a strong determination and a perfect guidance.

How to master programming?

 Learning Computer Programming is a common need for people today. You may need C, C++ or VB Programming for your academic or you may be studying any independent Computer course for your future. Even after attending classes, if you are not able to master the programming, this material really helps you. The readers of this material are assumed as beginners in Programming. 

  1. Every program contains four basic parts: 
  • Declarations, definitions 
  • Input, initialization
  • Logic/Process
  • Output, Result

Too small programs can be written only with main() without needing to define any external functions. 

Medium and large Programs can be written into multiple Functions 

If you write the Programs using Functions 

  • Isolate input/output from logic or process
  • Logic must be written few dedicated functions
  • Input/Output can be done in higher-order functions like main 


To design the functions, remember the below principles: 

  • Every Function should perform an independent process or task that can be reused in main program. 
  • The inputs of that process are taken as arguments 
  • The Outputs of that process can be the return value of the function or arguments. 
  • Try to isolate Function only for Logic apart of I/O 

Solving a Problem through programming requires these steps: 

  • Solve the inputs 
  • Solve the Logic 
  • Solve the output

These three aspects are explained below 
Inputs of a program can be taken from one of the below things, sometimes it can be few of below or all: 


  • The problem statement 
  • Case study, Assumed inputs 
  • User inputs 
  • Calculated inputs 
  • Constant values 

Before making the logic of the program, you must recall the set of language constructs and libraries that may be useful in the program. 

Output may be displayed immediately or at the end or written to any secondary media such as file. 

 


API: the inside story

 API is a popular keyword in programming. API stands for Application Programming Interface. It is commonly used for implementing any programming technology such as file handling, network socket programming or database connectivity. Though many programming languages offer API's, a generalized understanding about the API would be technologies and smooth migration between programming platforms. 

API seems to be very much similar to the built-in libraries of programming languages, comprising in-built functions to perform certain operations. However, an API differs from an ordinary library in below aspects: 

  • An API interfaces programs with any system concepts, resource or hardware programmatically whereas a programming library simply offers data manipulation through some built-in functions. 
  • The functions defined in as API commonly resemble certain operations on some resource. Hence, one must call those functions as per the order given in its life-cycle specification. In contrast, a commonly a library function may be called irrespective of order. 
  • For practicing an API in programs, one must learn the operation of its backend resource. However, for using a library, one must know the prototype specification and data type of the functions of the library. 
  • Most commonly, the implementation of an API is kept hidden by allowing concrete data types and factory functions to be used by the programmers rather than accessing the data members of those data types directly. Factory functions are useful for hiding the resource data type implementation. For example, due to a factory function fopen(), you will never know that FILE is a predefined structure. You believe that it is a natural data type. 
  • API's are commonly designed by the vender of the resource whereas libraries are shipped with programming language tools. 

An API can be characterized with below features: 

Life Cycle - since the primary interest of an API is to interface with a resource or system concept; accordingly a life-cycle specification is provided. For example, for file-I/O, we must follow the order of opening buffers, performing I/O and closing them. One cannot perform I/O without opening the buffers. Thus, programmer is restricted to follow a predefined order for the usage of API functions. 

Data types - If an API is meant for the interaction with a system resource or hardware, there must be a data type defined in that API to resemble that resource or hardware. For example, file-I/O API contains FILE data types may be C structures, Unions or C++ classes, which depends on the programming language for which API is written. 

Handles - Although resource data types are given, their variables cannot be directly used to process the resource. One solution is to use the same data type pointers as handles. For example, to send a file can be used. Sometimes, the underlying resources may not any memory or attributes to be explicitly maintained. For such resources, handles can be simple integers comprising their identification details, rather than its data type pointers. For example to handle sockets, we use an integer called socket descriptor. 

Factory Functions – A Function that creates a certain user-defined type variable’s instance and returns its handle is known as a factory function. The primary use of these factory functions is to avoid the code overheads for initializing the attributes of the data type. The handle returned by the factory functions can be captured into a program variable. For example, fopen is a factory function that returns a FILE pointer. 

Life Cycle Functions – For changing the state of the resource and to make certain standard operations on the resource, few life-cycle functions are defined in API. For example, to close the file buffer fclose(), to rewind the pointer to update or clear the buffer fflush(), etc. the Life-cycle functions may not be used for data transfer with respect to the resource, rather they may not be used to control the resource. 

Resource-I/O functions – With few resources such as files, network sockets we may need to make data transfers. API provides few resource-I/O functions for this purpose. For example, fprintf() and fscanf() are used to make file-I/O. 

Transformation functions – sometimes one particular resource may be represented with multiple data types with different formats. In such case, conversion or transformation between them is possible through transformation function. For example on UNIX/LINUX Platforms time is represented by using two data types: time_t represents long format time and struct tm represents formatted time. The function localtime() converts time_t type time into the other type. 

Constants – To represent certain predefined, fixed or constrained values, few constants such as macros are defined in API's. Eg: SEEK_OFFSET, SEEK_BEG, SEEK_SET.

To make a set of specification and designs primitives for writing API's and when to take a factory function and when to take an initialization function. 

From the API user's point of view, how do you exploit the various features of an API, and use its constructs for your level best. 

  

 

 

 

 

 

 

 

 

 

 

25 points about c++ constructors

For many students including engineering and any bachelor degree in computers, C++ is an academic subject for their studies. Few people may need to attend for job interviews on C++ platforms. For all the above people this material would help to get comprehensive knowledge about C++ classes. Though I used to provide this material to my C++ students since past five years, I have decided to keep it in a global location, which is main intention behind keeping it here. 

  • Constructor is a member function of a class having its name as class name. 
  • Constructor can initialize the object (its member), and may build memory for the object members if required. 
  • Constructor is a special member function, and hence it can’t be defined with any return type. Not even void or int is allowed. 
  • Constructors can be defined with or without arguments.
  • Constructors can not be overridden.
  • Commonly constructors are defined as public or protected members.
  • In case if no constructor is explicitly defined for a class, then compiler supplies a constructor with no arguments and no code. It is commonly referred to as default constructor or implicit constructor.
  • In case if no constructor is explicitly defined for a class, then compiler supplies a constructor with no arguments and no code. It is commonly referred to as default constructor or implicit constructor.
  • Constructor acts like-cycle function for every object.
  • Constructor is automatically invoked during the creation of each object of its class. Constructors can be defined with default argument values. Such constructors are known as default argument constructors. 
    The class, whose objects are serialized or managed in object pool, must contain one constructor without any arguments. 
  • Constructors are classified into three types: • Default constructor • Copy constructor • Parameterized constructor.
  • A default constructor is either implicit or explicit constructor defined with no parameters(arguments)
  • Having a default constructor, a class can be instantiated (object can be created) implicitly or explicitly.
  • A copy constructor takes an object reference of same class type as arguments and copies the content of the passed object into created object.
  • Creating an object-clone with copy constructor differs from object assignment in one issue : Suppose the class contains one or few pointer members , and those are allocated with memory in the object that has to be copied into a new object .Assignment done as ‘new-object=old-object’ simply copies the address of those pointers from the old object to new object, without allocating memory and then performing content copy. In contrast we define a copy constructor to perform a copy after memory allocation to those pointers. 
  • Parameterized constructors are defined with one or few parameters (arguments) of any data types. There can be many parameterized constructors exist for a class, where prototypes and arguments differ.
  • A parameterized constructor defined with a single argument behaves like a type conversion routine to convert from any basic type to class type. It is automatically invoked during the assignment or explicit typecast from any type to this class.
  • Unlike ordinary member functions, constructors can not invoked directly without creating objects.
  • For the life-time of an object , its constructor is called only once i.e., when the object is created
  • Constructor can be written with code for initializing object members to their natural default values need not be mandatory with zeros.
  • If a base class contains one or few parameterized constructor without any default constructor ,then all its derived classes must define explicit constructors that call any one of its base class parameterized constructor with below syntax : 

     
     class BaseClass  
     { 
      public : 
      BaseClass(base args ......) {....} 
      // Base Class Constructor 
      ....... 
      } 
      class DerivedClass : public BaseClass  
      { 
      public : 
      DerivedClass(derived and base class .....) 
      : BaseClass(base args ......) 
      {
      ..... 
      }  
      ..... 
      }  
     

     
    Every derived class constructor implicitly or explicitly calls its base class constructor since, creating base class object is vital operation while creating derived class object. If explicitly no call is made to the base class constructor, its default constructor is called. 

     

Strategies of Leaders


I have i made a beautiful presentation about the strategies of TOP known company...i just writing here in brief..if any body wants i can give ppt with good images..too...

STRATEGY OF RATAN TATA: 

"dares to contrarily create and nurture a space that others overlooked or even rejected"

STRATEGY OF RELAINCE INDUSTRIES:

“THINK BIG,THINK FAST,THINK HEAD,IDEAS ARE NO ONES MONOPOLY”

MANAGEMENT MANTRAS OF DHIRU BHAI AMBANI:

Growth has no limit – keep revising your vision
Nurture and motivate the youth
Build competencies
Break out of your orbit
Reject incremental thinking
Be humble
Achievement is history. Look ahead

STRATEGY OF PROACTOR & GAMBLE:

“Connect + Develop”

STRATEGY OF GOOGLE:

"riginal thinking & unconcentional IT strategy"

"nformation without barriers"

STRATEGY OF WALT DISNEY:

“For turning dreams into reality “

The Dreamer The Realistic The Critic
The Dream:
Step 1. Go into Dreaming Mode
Step 2. Go into Realist Mode
Step 3. Go into Critic Mode
Step 4. Back into the Dreaming Space
Step 5. Back into the Realist's Space
Step 6. Back into the Critic's Space
Step 7. Getting Your Act Together

Walt Disney's Quotations:

"When you're curious, you find lots of interesting things to do. And one thing it takes to accomplish something is courage.“

"We allow no geniuses around our Studio.“

"I never called my work an 'art' It's part of show business, the business of building entertainment."

STRATEGY OF NOKIA:

"Connecting People"

"Advertising strategy is to focus on human rather than technology."


Tuesday, July 21, 2009

Neuromarketing: Science of Shooping!


“90% of the new product launches fail”
“50% of the advertising expenditure is wasted, but we do not know which 50%” 
“Main cause of marketing failure is the inability to understand the consumer behavior”
What did exactly cause sale….?
Ads. Failure- A Big Dent 
Why?
   
It is like being unscientific and today's scientific milieu…Resources are canalized without being assured that they target the desired group in expected way.It leads to Wastage to human energy… not only this..it also leads companies marketers in a wrong directions…take an example..an ad has been prepared…if for assumption it does not give desired customer response…marketers start searching flaws in the ad….though some time it may be because of some other factor.. This nothing but searching something which does not exist.
Traditional research, are biased by self-reporting biases, people’s ability to articulate of the difference between conscious and unconscious thought.
   
Marketing is like Astrology ! It is a quasi science !
Many new developments occured in the field of neurology, sociology, anthropology, psychology, etc. But very little of that has permeated into the world of marketing and advertising. 
  
  
What is Neuro marketing?The Science of Shopping…!! 
Is It The Key To Unlocking Your Customer's Brain? 
   
Neuromarketing uses functional Magnetic Resonance Imaging (fMRI) -- a medical technology -- to scan the brains of test subjects as they look at various products and advertisements. The idea behind neuromarketing is to discover what kinds of elements trigger positive neural responses. The information gleaned from neuromarketing research is intended to provide deeper insight into the human brain for purposes such as more effective advertising and brand loyalty campaigns.
   
How Does it Works?
   
Practitioners claims. 
Develop a test.
Participant shown a particular stimulus.
Brain monitored with MRI. 
Image produced by the machine. 
Indicates brain activity.
Activity is mapped. 
Researcher interprets the brain patterns. 

Benefit?
   
“Information about the Consumer Preferences”

“Channelisation of Resources-Making Cost effective Decisions”

“Reaping benefits of hard core research”

“Links with product development”

“Gives Objective information”

What i think....

  
It equips Marketing Professional in their valuable attempts to build Positive and constructive Relations between Producers and Consumers.

Neuromarketing helps to turn the art of marketing into a Science which makes marketing handy and Constructive Profession….

However…every thing has its own weaknesses and man can not predict his own future course of action and innovations.










All about VAT !

What is VAT?

It is a multi-point sales tax with set off for the tax paid on purchases.

Under single-point system of tax levy, the manufacturer or importer of goods into a State is liable to sales tax. There is no sales tax on the further distribution channel. But in VAT tax is levied on each of the entities in the supply chain . Only the value addition in the hands of each of the entities is subject to tax. 

Value Added Tax (VAT) came into existence from April 01, 2005.Most of the Indian States have replaced Sales tax with a new Value Added Tax (VAT) from April 01, 2005. 

Features of VAT

VAT is levied on the sale of movable goods .

VAT is imposed on goods only and not services and it has replaced sales tax. 

VAT is an indirect tax .

VAT is a centrally-administered tax with a revenue-sharing mechanism 
Collected in installments at each transaction in the production-distribution cycle.
Does not have cascading (tax on tax) effect due to the system of deduction or credit mechanism.

Necessity of VAT

It prevents businessmen to evade paying taxes. They will also be compelled to keep proper records of their sales and purchases.

Elimination of Cascading of taxes : Lower cost

Uniform and Simple Tax Law

Transparent System : Improved Tax Compliance

Increased Revenue Collections

Foster the Indian Common Market

Computation Methods

THE SUBTRACTION METHOD:- The tax rate is applied to the difference between the value of output and the cost of input. 

THE ADDITION METHOD: The value added is computed by adding all the payments that is payable to the factors of production (viz., wages, salaries, interest payments etc). 

TAX CREDIT METHOD: This entails set-off of the tax paid on inputs from tax collected on sales 

Value Addition

PURCHASES = 200
Tax charged = 10% of 200
from you =20

SALES = 250
Tax charged = 10% of 250
From customer = 25

Out of Rs. 25 charged from the customer, you will pocket 
Rs. 20 (tax paid at the time of purchase) and pay balance 
Rs. 5 to the department.

VAT Slabs

550 items covered 

270 items of basic needs, like medicine, drugs, agro & industrial inputs, capital & declared goods 4% VAT 

Rest 12.5% VAT. 

Gold & silver jewellery - 1% 

VAT Limitations

VAT is regressive 

VAT is too difficult to operate from the position of both the administration and business 

VAT is inflationary 

VAT favours the capital intensive firm 

VAT sparkle varies State by state

What i think....

VAT Tax rates should be made uniform in all states.

Government should run awareness programs to help know end consumer and business men VAT benefits.

Persons maintaining their accounts on computer must ensure that proper back up record is maintained.

Abolition of CST

Full tax credit for inputs as well as capital goods, in the period of purchase



BASEL II Primer: New Capital Adequacy Framework for Banks


Risk means the possibility that both expected and unexpected events can have an adverse impact on a bank’s capital and earnings. While the expected losses are taken care of through suitable pricing mechanism, the unexpected losses are to be borne by the bank itself with the help of requisite capital, which is reflected in Capital Adequacy Ratio.

The size of this regulatory capital was determined by Based Accord (Basel I) earlier and now by Basel II Framework. Basel Committee on Banking Supervision (BCBS) is responsible to frame these rules; the committee has members from various (13) countries that are represented by their respective central banks or equivalent authority.

The objective of Basel II is to introduce a more risk-sensitive capital framework with incentives for good risk management practices. For inculcating such practices a multipronged approach would be required to meet the challenges of maintaining capital at the regulator-mandated level in the face of recognizing risk factors in the banking sector. Banks are exposed to severe competition compelling them to encounter financial and non-financial risks. Business grows mainly by taking risks – and hence the entity must strike a trade off between the two as risk and uncertainty form an integral part of banking operation.

Basel II will impact the entire spectrum of banking, including corporate finance, retail banking, asset management, payments and settlements, commercial banking, trading and sales, retail brokerage and agency and custody services. 


Need of Basel Accord

Banking industry is the backbone of any country's economy; the sounder it is, the better the performance of the financial markets and the economy as a whole. Just like any other industry, banking industry is susceptible to various types of risks which might occasionally occur in losses, and at times they tend to be so severe that they take entire  firm down with them. To hedge against such risks, banks keep a minimum buffer of equity and provisions (regulatory capital), given a certain amount of various kinds of risks. 


Objectives of Basel Accord

• Ensuring that capital allocation is more risk sensitive;
• Separating operational risk from credit risk, and quantifying both;
• Attempting to align economic and regulatory capital more closely to reduce the scope for regulatory arbitrage.

Basel II Framework

Basically, the Basel II Framework is known as having a "three mutually reinforcing pillar" approach, and these three pillars are: -

• Minimum Capital Requirements 

• Supervisory Review of Capital Adequacy 

• Market Discipline 

The first pillar deals with maintenance of regulatory capital calculated for three major components of risk that a bank faces: credit risk, operational risk and market risk. 

The second pillar deals with the regulatory response to the first pillar, giving regulators much improved 'tools' over those available to them under Basel I. It also provides a framework for dealing with all the other risks a bank may face, such as systemic risk, pension risk, concentration risk, strategic risk, reputation risk, liquidity risk and legal risk, which the accord combines under the title of residual risk.

The third pillar greatly increases the disclosures that the bank must make. This is designed to allow the market to have a better picture of the overall risk position of the bank and to allow the counterparties of the bank to price and deal appropriately.

What I thinks......

The New Accord’s risk management requirements are likely to prompt significant changes in the core business of an individual bank as well as in its organizational structure. Under Basel II, the “outputs” of better management of credit and operational risk will be the “inputs” of an economic capital model by which banks can allocate capital to various functions and transactions depending on risk. This new focus on risk will likely have broad implications for institutions not obliged to comply with Basel II as well as customers and the capital markets.

Aside from new or altered methods that must be employed, the new capital requirements will also drive change in resource needs, processes, and IT system architecture. These changes could ultimately pose broad challenges for a bank’s board of directors and its senior management, who are charged with new risk management and reporting responsibilities under the New Accord. These senior leaders will need to consider how Basel II compliance could (or should) integrate with other efforts they are making to improve corporate governance.


Making IT Green!


Walldrof is well aware about its responsibilities towards environment. We are making strides to conserve energy and better our environment. We work differently and we use our resources sustainably. Our ways have enabled us to save energy along with generating awareness among others. We have been clear about our role in generating awareness not only among our partners and Industry co-players, but also in society.

“Waste paper reuse and recycling not only saves environment but also reduces costs”

India has emerged as the fastest growing paper market in the world showing a 10 per cent growth in per capita paper consumption. From 7.5 kg per capita consumption in 2007-08, the figure has gone up to 8.3 kg.

India produces around 15 million tones of waste paper every year and the recovery of waste paper in India is low at 26% compared as compare to Germany (80%), Sweden (69%),Japan (60%),USA (49%),Thailand (45% ) and China at 38%. Low recovery is on account of alternate use of paper in wrapping, packing, etc. Lack of source segregation results in waste paper getting contaminated and becoming unusable!

Obviously, there are significant opportunities hidden for paper recovery and recycling.

As per projected demand for paper in India, country would need around 15 MT of paper by 2015. Waste Paper recycling is a great option for our country as it helps us to meet our global environmental commitments as well as reduces costs significantly. If we were to reach China’s current level of recovery, then we should be recovering 5.7 million tones of waste paper for reuse by then. 

Walldrof has launched its Waste Management Program with aim to recover around 0.1MT during 2009.Company has also decided to plant one lakh trees during July –August 2009.

Friday, June 5, 2009

welcome to my blog

hi

I Havecreated this blog for all those who want to get touch with ceo of various company.

Thursday, January 1, 2009

Become an Author

Ceolivetalk is looking for writers/bloggers/journalists who are experts and can regularly cover topics related to computer software, management,web applications, consumer gadgets and new media.

If you have great ideas and want to make regular contributions, you can join Ceolivetalk as a guest author and submit articles at your own convenience for publication on the main blog. 

As a guest writer, you won’t be paid for your contributions but it can help get more exposure for your blog or your brand on the Internet. All guest articles will include a brief bio of the author and a link to his or her web site for some extra publicity but before you start writing a guest post, please do send me a brief outline of the same.

Some quick guidelines before your apply:

1. If you are planning to cover news that is already well known on the Internet, add thoughtful analysis to your story or explore it from an angle that other publications may have missed.

2. Avoid using complex jargon and, as far as possible, write evergreen content. 

3. It’s always nice to have some screenshot images and/or screencast videos in articles that are about how-to’s and software reviews .

4. While there’s no minimum word limit, your contributions should have at least three or more paragraphs of text. 

5. If you quote some text from another source, always give full credit with an hyperlink. Never attempt to rehash someone else’s content or idea.

How to Apply:

Ceolivetalk can be a great place to share ideas and opinions on technology related topics with the world.

To apply, just send an email to
sweta_10_mehta@yahoo.co.in with some writing samples or include links to any of your previously published work on the Internet. Also write a little bit about your background, a list of topics that you want to cover and how often can you contribute to the site.

Thanks.