Monday, October 18, 2010

Dressing appropriately, moderate conversation interview etiquette all captures


Ru Yuan took the interview is a necessary hurdle favorite jobs. Interview, in addition to showing their own ability and quality, the appropriateness of dress, moderate conversation, generous manner, but also man a lot of extra points. Of these, belonging to the scope of the interview protocol.

Before the interview

鈼?Fashion

Men must wear clean clothing, but do not dress up. Women should wear clean, bright and jingling jewelry accessories, too thick perfume, no straightening of the leg, had not been revised or fluffy hair and nails, etc., are sufficient to offset the cover letter to give the examiner a good impression.

The key is to choose clothing to see job requirements. Apply banks, government departments, the traditional formal dress favor; Apply public relations, fashion magazines, you can properly add some pop in the clothing elements. In addition to such candidates Entertainment Television advertising industry, the better not to select too unexpected wear. Graduates to allow some students dress up gas can wear casual suit. In addition, candidates should not wear too many accessories when it is easily distracted by the examiner's attention.

鈼?punctuality

Punctuality is the basic requirement of professional ethics, 10-15 minutes to get to your interview ahead of the best. More than half an hour before arrival will be seen as no sense of time, but in the interview late or hurried is fatal. No matter what your reason for being late will be considered as a lack of self-management and capacity constraints.

If you walk far, would rather leave early, but not immediately after entering the office early to be waiting in a nearby cafe.

Among the interview

鈼?body language

Eyes:

Exchange eyes are looking at each other, but must not look at someone died. If more than one person present, we must often look glance at other people, to show respect and equality.

Handshake:

When the interviewer's hand coming toward you stretch after holding it, should be a firm handshake, eyes to look directly at each other. Not too hard, not rattled; do not use two hands to shake hands in this way the company appears to be less professional in the West. Hands should be dry and warm. If you have just arrived at the scene interview with cold water rushing down hand, to keep themselves calm. If the palm of cool, the hot water and covering about.

Sitting:

It does not matter close to the back seat, not filled, the body after the Chamber to sit down and lean forward. Generally suitable for two-thirds filled with chairs. This not only allows you to easily free up energy to deal with the examiner's questions, nor to let you relax too much.

Little trick:

Small actions can not be done in interviews, such as origami, pencil, this will become very serious and distracts an opponent. Do not fumble hair, beard, ears, this may be interpreted as your personal hygiene before the interview did not do a good job. Speaking is a nervous hand Wuzui performance, should be avoided.

鈼?conversation

Language is the job of the second card, which objectively reflects the quality of one's culture and content of training. Interview on the issues raised should be fluent, just right, not rhetoric, exaggerated. Conversation should take the following points: first, to highlight the individual strengths and expertise, and have much credibility. Language to summarize, simple, powerful, not dragging its feet, upside down. Second, to show the personality and personal image making clear reference to someone's remarks can be appropriate, such as with teachers, friends, comments to support his description. Third, insist on facts and less empty word, interjection. Fourth, we should pay attention to the logic of language, presentation, structured and focused. Finally, try not to use short, dialect, dialect and the spoken language, so as not difficult to understand each other. When unable to answer a question should be truthfully tell each other, vague and quackish Luankan will lead to failure.

After Interview

鈼?Thanks

In order to deepen the impression of recruitment to increase the likelihood of successful job search, interview two or three days, job seekers the best recruiters write a letter to thank. Letter of thanks to simple, preferably not more than one page. The beginning of the letter should mention your name, simple as well as the interview time, and thank the staff recruitment. The middle part of the thank you letter to reiterate the company, candidates interested in positions. The end of the letter can be expressed confidence in their own, as well as the company's determination to contribute to development and growth.






相关链接:



Compare FTP Clients



failure and Recovery of western digital hard disk



M2TS To MOV



Wealth Life - INTERVIEW with Dr. Xin Rong Record



GOOD Web Development



Simple four-strokes, cool music box my office you scouring millions of songs



Leaders Must Be Good To Know People



HR Staged Star Wars



WMV To MPEG



MKV To MP4



[Other] Project2000 thematic knowledge (4)



Easy File And Disk Management



7 Steps to escort your USB device



Session of the value of the share in the JSP and ASP.NET



Saturday, October 9, 2010

Intel Strikes started


There is no doubt that 2006 will be Intel a new beginning.
Having experienced several years of twists and turns of the highway can also return to peak, which is Intel, but Intel's processors have not been so looking forward to a long time; as the industry's first mobile dual-core processors and platforms Core (formerly code-named Yonah) and Intel Napa will shoulder the important task of counter AMD.
Have news that the second half of 2006, Intel's desktop processors will gradually adopt mobile processor architecture. Although not completely copied, but the Intel mobile processors get the experience no doubt is to be brought to the desktop processor sharing, and therefore the success of Core mobile processor is not just so simple, it should take too more.
Now appears, can not say that a substantial move up the Pentium 4 processor architecture design frequency of no value, but should be recognized that Intel's engineers too much emphasis on this point, while ignoring other more valuable use of technology: upgrade of nuclear inter-communication rate and should be more urgent to reduce some of the memory latency, processor core performance, after all, has far exceeded its system memory and peripheral devices with communication bandwidth between the actual growth.
Northwood remember it? Then comes to the GHz Intel ambitious high-frequency impact of "Great Leap Forward" era, a time designated for the processor to upgrade the tone - to enhance frequency, increasing the cache front-side bus frequency - the tone has been the years vary. And Prescott's more of a process improvement, from 130nm to 90nm technology, reducing production costs. Pentium 4 processor from birth to more than 5 years now, Intel's performance desktop processor by pulled up on the main frequency to increase, while the increase in frequency means higher energy consumption, this looks like a dead loop to bring a heavy burden on Intel, both research and development, or business.
Inertia of the past experience of success is too big, Intel will too, but the 64-bit on the lack of it seems like the right to speak to the chip giant's head with a brick, Intel has already begun to wake up.
Core progress
Core uses a 65nm process. Should thank the technology advances, Duo's Die size and the previous generation Centrino single-core processor Dothan went so far as the L2 cache is 2MB, but has been around for desktop dual-core Pentium D processors, not divided into two separate 1MB of cache, but for the two nuclear sharing. Which Core is not the simple sum of the two Dothan.
Intel released Core in the internal structure map, there are between two nuclear "Bus" connected, which means that Core 2 kernel without going through the data exchange between nuclear FSB, but rather to core same speed (GHz frequency volume level) to run, thereby reducing the delay, but "smart caching" is a word most frequently mentioned Intel, the so-called intelligence, is both the kernel cache can dynamically adjust the load assigned to each core size, the benefits are improve the cache utilization efficiency with reduced power consumption,'s sense.
A mobile platform with Intel than Sonoma, Napa platform processor FSB from 533MHz to upgrade to 667MHz, supports DDR2-533 memory from upgrading to DDR2-667, of course, and also more perfect with the bus.
Look perfect is not realistic. Compared with the Pentium 4 processor, Pentium M processor, the disadvantage is its video decompression, 3D multimedia performance floating-point operations (SIMD FP and FP performance) aspects. Therefore, follow-Core mobile processor wants even on the Pentium 4 "class to seize power grab", we must solve this problem.
This regard, there are some improvements Core. Now all three Core decoder can decode the SSE instruction; SSE/SSE2 operation can be called Core "Micro Ops Fusion" engine implementation, this is a bit like "multimedia co-processor inside the processor"; again Like the Core Prescott Pentium 4 supports SSE3 instructions as a. These are Intel so-called "Digital Media Boost" technology as part of, although there is not clear all of its features, but will no doubt enhance its future mobile processor, multimedia performance, thereby narrowing the distance with the NetBurst architecture.

Performance oriented
Dual-core for laptops mean? Means higher energy consumption. Thus, while paying attention to its performance, its power performance should be the most worthy of attention.
Whether future processor server, desktop or notebook computer, performance will be the first to be considered a problem.
Napa platform processor, chipset and wireless component modules have lower power consumption. Inside the processor in the Core, Intel uses advanced thermal management techniques. Each Core has a specific number of nuclear heat sensors that can more accurately control the temperature of the kernel, especially when the two nuclear alternation of the situation.
If everything goes smoothly, in the second half Merom (Yonah of the next version to support 64-bit technology) processor was born, we will see a more powerful mobile platform.






Recommended links:



Anti-Virus Tools Catalogs



Reflector Decompilation tools



Simple Accounting And Finance



Fireworks Frequently Asked Questions (1)



AVI to FLV



Do not let your Single into a disturbance with



Operators to remind: strange sounds for calls do not hang back on



Planning red boiler out of the Discrete uniform



China's largest single-Rush Biggest names in the computer upset falling by the wayside



AVI To MOV



reviews Covert Surveillance



The Economic OBSERVER: Why choose Hong Kong-listed Alibaba



exe crash kernel32 dll repair it in seconds



P2P problem is the Contradiction between closed and open



Listen to the voice of chaos



Casino And Gambling SHOP



DIVX to Zune



Thursday, September 23, 2010

Observation: Dell Direct Model "short circuit" a crossroads


"Growth down," "personnel changes", "customer satisfaction down", creating a brilliant performance after 20 years, Dell's direct sales model in the first 21 years of the third quarter was an unprecedented challenge.

From 1984 to 1000 U.S. dollars grassroots Michael Dell started the company, Dell sold directly to consumers on PC, rather than as competitors like HP and IBM through a multi-level retailers. This direct sales approach, providing support services to consumers is relatively limited, but effectively reduced PC prices. So, while Dell PC sold less than its competitors, but still won the high rate of return.

This mode achievements of the past 20 years, sustained high growth in the myth of Dell, Dell CEO Kevin Rollins has to change until the political situation has also reiterated two or three months before such a dream - Dell's business in 2008 income to exceed 80 billion U.S. dollars, per cent more than the current number of nearly 300 billion dollars.

However, Rollins's voice down, IDC latest data on the display: third quarter 2005, Dell in addition to market share in Asia outside of Japan fell 1.8 percentage points, down 7.8%. This sudden decline in growth, with Asia accounting for more than 80% of the China Business incompetent directly related to the subsequent October 25, Dell Foo Piau Phang sudden departure.

Earlier, Dell's market saturation in the United States and European markets fell, once want to see China and India emerging markets. Dell Chairman Michael Dell in April this year, an analyst at the reception, said: "China's market demand for Dell products and services is very great, but 99% of China's economic strength is reflected in large cities." Appears in the Dell, Direct Marketing is a done deal, and does not need to make any changes.

Objectively speaking, Dell entered China since the results have been achieved since it is not easy today, just a few years, turnover has increased by 300%, and entered the Chinese computer industry's top four list, which is the Foo can Chinese companies in the Dell "ruling" the reason for four years. "However, China's market is very complex, some cities are not less developed markets in Europe and America, in China's vast internal market, there have been from big cities to small towns gradient metastasis, Dell is not able to adapt to these changes. "analyst who asked not to be named to the PC," Business Week "of Dell's Chinese process, that the slowdown in growth Dell is saying too much emphasis on long-term major cities, large customers and large procurement, the actual situation in China is the first tier cities become saturated, hundreds of small cities and small towns in the PC business is booming.

Dell has been continuing concern, "Business Week" October 28th is also the author pointed out that Dell wants to continue in the Chinese PC market place, it must be pursued by the current direct sales model to adjust, at least in the short term it should be. Dell journal criticized the targeted only to sales in large enterprise and government customers, and that Dell's competitors in growing these large customers, after eating, in the "retail" and the small town market's performance is overshadowed.

China's small urban users, their spending habits is often required before the purchase can be seen the product in kind. Dell implemented the "Direct" mode can not meet the basic needs. In contrast, local manufacturers such as Lenovo and Founder way through the retail sales were achieved good results. HP executive vice president of 瀹夊埄寮楄帿灏?is to ask themselves these questions: "you can imagine, in the economically underdeveloped areas, how could be effective direct model it?"

Analysts believe that the long term, Dell's direct model may also be successful in the Asian market, but users have to wait until the second purchase boom in Asia. Judging from the recent interest, Dell may need to adjust the current market strategy. Compared with commercial users, ordinary consumers, the current emphasis on Dell's efforts not enough.

But the question is, if Dell's emphasis on consumers, then we must face the challenges direct sales model, which seems to be a paradox, because the closer to the manufacturers and consumers from the Dell model was born with such a flaw - the lack of the traditional sales model services of many channels.

In fact, Dell's experience in China and Asia are synchronized with the world. First, China's 24 provinces in the user group complaints and Dell salesman forged orders outstanding residual sound the occasion of the event, August 17, the U.S. ranked institutions ACSI customer satisfaction survey released by Dell customer satisfaction has been decreased.

Oct. 31, Dell released in the United States, "revised third-quarter earnings expectations," the announcement said the company will optimize profitability at the same time, continue to focus on higher value products and services. This was the second consecutive quarter Dell's lower earnings expectations. Wall Street's reaction was allowed to share in July this year the highest price of 42 U.S. dollars per share fell to the current 32 U.S. dollars less.

Dell is now faced with three choices: First, continue to uphold the direct sales model, waiting for China, India and other emerging markets is technically mature; second, like IBM, like Dell PC business to a third party; third, in the future within a few years in developing countries to build more retail stores to reach consumers. However, the more people that, at least in China, Dell's top priority is to make your computer more in retail stores.






相关链接:



Embedded Option: the incentive for interest rate risk



Longhorn can be run on some old computer



China has announced measures in the United States blocked WAPI appeal to the international organizat



AVI to IPOD



3 major cornerstone of the CKM



3GP To MPEG



MKV to VOB



Enhance the core competitiveness of enterprises



PRD employment "upward", "Labor Shortage" MOVED to the Mainland



My favorite Wizards And Components



Rongcheng School Link



Articles about Text Or Document Editors



Adjust the animation in the size of AUTHORWARE



Thursday, September 16, 2010

Using Photoshop make Windows logo


Mainstream desktop operating system has been dominated by Microsoft, its advertising is overwhelming, the image window signs everywhere. Now we set the font to use Photoshop 7.0 features a three-dimensional effect making the window signs.



Production steps:

1. Start Photoshop 7.0, a new length and width of 1000 pixels, respectively, a resolution of 150 pixels / inch (if the poor PC performance can be lowered, such as taking the default of 72 pixels / inch);

2. Production of four plane deformation of the cube effect:
I first filled with a further distorted graphics, but difficult to use the distorted wave filter distortion effects of graphics, making very satisfactory results. Photoshop has thought about the font distortion effect, distortion effects just the right one banner to create the deformation. Using the font tool, type in the new layer and arranged in four 鈻?field shape, the font size set to 450pt, in the character panel to set the appropriate parameters



3. Select the font and then open the Text dialog box deformation.
In the drop-down list, select the banner of the bending deformation is set to +20;



4. Again after deformation font fill color.
Followed by the filling color value # FF6E0E, # A8DE40, # 9E0AFB, # FBF812. Figure 3 results obtained;



5. Create lighting effects:
Select one of the plates with Mobanggongju, for color fill. We use the mask to make gradual visual effects, real-time preview so that we can adjust the effect, click the adjustment layer button on the panel, choose the gradient shown in Figure 4



6. We need to adjust the color gradation is shown in Figure 5;



7. Gradients in Figure 6 after the final results;



8. To sign a three-dimensional graphics effects:
Put together all the layers (in the source file before flattening to do a copy for future amendments). Then we can see graphics obvious jagged edges, we can be feathered edge graphics, smooth the edges so soft. Feather taking value of 1 pixel, and then free transform on the graphics, the graphics rotation angle, and to a certain degree of tension. Open the Layers panel, double-click the layer in the Layer Styles dialog box that pops up set the slope and relief, projection, etc., were carried out on layers Figures 7 and 8 set;





9. The final result after layer effects shown in Figure 9;



10. Production Background Picture:
There are signs of light would be too monotonous, the whole lot of graphics can be modified. New layer of a layer as the background color value of # 26CEC8. Select the menu: Filter -> variegated -> Add variegated: the number of 5%, choose Gaussian distribution, the monochrome Gouxuan. Then layer for motion blur: angle of 30 degrees, a distance of 20 pixels, obtained the required texture. This step can also be set according to personal preference. Then add some text effects, the final results shown in Figure 10:








相关链接:



StartEx: Let the desktop shortcuts And start menu after class!



Reduce carbon emissions, EASTFAX paperless fax you the more green the more resounding



Blackberry video formats



Thief 3 of original experiences



Converting Dvd To Wmv



Dealers said the switch to the sale of genuine OEM version of Win7 low profits



Lists People - Screen Savers



Family BACKGROUND to influence the fourth factors of Female Students



Bearing Co., Ltd. Yantai Ximeng Xi



Compilation of various source - DEV



Directory Desktop



My Favorite Anti-Spam And Anti-Spy Tools



Mts to mkv



Convert wmv to m4v



Thursday, August 5, 2010

Teach you to quickly identify "Sasser"


May 1 Jing Xian Internet "Sasser (Worm.Sasser)" menacing viruses, the virus is through Microsoft's latest high-risk vulnerability-LSASS vulnerability (MS04-011 bulletin Microsoft) spread, the danger of great current WINDOWS 2000/XP/Server 2003 operating system users such as the existence of the vulnerability, users of these operating systems as long as an Internet, there may be the virus attacks. Teach users how to quickly identify the following "Sasser (Worm.Sasser)" virus.

If the user's computer is one of the following phenomena, then that has been poisoned, they should take immediate measures to eliminate the virus.

First, a system error dialog box appears

Attack of the user, if a virus attack fails, the user's computer will appear LSA Shell service exceptions box, and then restart the computer after a minute there the "System Shutdown" box.



Second, a corresponding record in the system log

If the user can not determine whether there had their own computer box above exception or system reboot prompt, you can also view the system log of the way to ascertain whether the poisoning. Method is to run the Event Viewer program, see which system log, if logging as shown below, the proof has been poisoned.



Third, the system resources are a large number of occupation

Virus A successful attack will take up a lot of system resources, so that 100% CPU utilization, appears the phenomenon of the computer running unusually slow.

Fourth, there is named in memory of the process avserve

Virus A successful attack will generate in memory process called avserve.exe, users can use Ctrl + Shift + Esc approach called "Task Manager" and then see if there is a memory in the process of the virus.

5, appears in the system directory file named avserve.exe virus

Virus if the attack is successful, the system installation directory (default is C: WINNT) generated under a virus file named avserve.exe.

6, the virus appears in the registry key

Virus A successful attack would create a registry entry HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun virus key: "avserve.exe" = "% WINDOWS% avserve.exe".






Recommended links:



Convert Flv To Avi



FTP Site Preferences



ps3 FORMAT



Premier XML Or CSS Tools



Yunjie: Mr. Chen in The "correction"?



Audio CD Players REPORT



Popped into the home appliance industry with high black horse



Comment Shell Tools



Convert Dvd To Wmv



Easy to change Driving



C + + Programmers To Easily Commit The Error Of 10 C #



CMM KPA and KP in the distribution of statistics



QUICKTIME to avi



Spring Independent WAP wait policy



China's Largest Drilling Company Defectors Brush Out Of Legal Counsel, The Credit Risk Of Specul



Thursday, July 22, 2010

Alert: New worm Jing Xian, suppose you code the deal is off


This is a new worm attack, the worm attacks the system NT/2000 platform port 445 by way of exhaustive detection of an administrator password, and cloned into a backdoor program makes the security of the machine down to 0. Remind you, must give their super user to set a safe, strong passwords.

The following is a preliminary analysis of the virus:

Virus Name: Worm.DvLdr

Virus type: PE worm

Mode of transmission: 445 port to connect an exhaustive exploration crack passwords

About the virus: the virus in the body, including a number of executable files. The main program for DvLdr32.exe, prepared for the VC + +6 and using aspack compressed. Virus comes with two command-line tool, respectively psexesvc and Remote process launcher, both the normal web publishing tools sysinternals. Accompanied with an installation package, is responsible for the attack succeeds, the host machine to install VNC remote control tool.

The worm runs, randomly select two IP segment, connect the other 445 port, the port for the Samba and NT systems as file sharing and open ports. If the worm successfully connect to this port, use a dictionary with their exhaustive probe each other's administrator user password, once the successful detection of the other super-user password, then copy itself into the system. Registration registry HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun

Add three keys: "TaskMan" = "% 1Fontsrundll32.exe"; "Explorer" = "% 1Fontsexplorer.exe"; "messnger" = "% 1system32Dvldr32.exe". Where% 1 is being attacked machine WinNT directory. Explorer.exe for the VNC own management tools. And cloned into the VNC remote control tool to attack the system, also modified the VNC registry configuration, making VNC server icon does not appear in the system tray.

Treatment: From the above process, the system will be attacked by infection depends largely on whether the worm Aministrator password dictionary list. If the worm does not get super user's password, then the follow-up actions are impossible to carry out a series of infections, so to remind the general manager of the Administrator must set a strong password.

銆??濡傛灉涓嶅垢宸茬粡琚爼铏劅鏌擄紝閭d箞闄や簡鍙婃椂鏇存敼瀵嗙爜锛岃繕闇?缁撴潫鎺夋锠曡櫕鐨勮繘绋嬶紝娓呴櫎瀹冩墍鍋氱殑涓?郴鍒椾慨鏀癸細

銆??棣栧厛浣跨敤杩涚▼绠$悊鍣ㄧ粨鏉熸帀dvldr32.exe杩涚▼銆傞噸鏂板惎鍔ㄧ郴缁燂紝纭娌℃湁drldr32.exe杩欎釜杩涚▼锛岀劧鍚庡垹闄ゆ枃浠讹細
銆??锛匴indir锛匜ontsrundll32.exe
銆??%WINDIR锛匜ontsexplorer.exe
銆??%WINDIR锛匜ontsomnithread_rt.dll
銆??%WINDIR锛匜ontsVNCHooks.dll
銆??%SYSTEMDIR%dvldr32.exe
銆??锛匰YSTEMDIR%cygwin1.dll
銆??%STARTMENU%ProgramsStartupINST.exe

銆??娓呴櫎娉ㄥ唽琛ㄩ」鐩細

銆??鍒犻櫎涓婚敭锛欻KEY_CURRENT_USERSoftwareORL

銆??鍒犻櫎HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun涓嬬殑涓夐」閿?锛?br />
銆??"TaskMan"="锛?Fontsrundll32.exe"
銆??"Explorer"="锛?Fontsexplorer.exe"
銆??"messnger"="锛?system32Dvldr32.exe"






相关链接:



Video format for ps3



Online video convergence can watch movies without having to download



Lists System Maintenance



Helpdesk And Remote PC Shop



avi to MP4 converter free download



mp3 to m4a CONVERTER free



Vacations MP4 Converter



321 DVD To IPod PSP Ripper



Top Geography Education



reviews Firewall And Proxy Servers



Mr. Chen will be back in the more TERRIBLE



Photoshop effect of manufacturing flames SOAR



Converter Mp4 To Avi



e-cology in the pan of a micro-series



Value DVD to Zune Converter



Step by step with ME to learn X-Spaces personal space template changes



MP3 M3U To ID3



Thursday, July 8, 2010

Vacations DVD to Pocket PC

Vacations DVD to Pocket PC is a professional video converter to convert DVD to Pocket PC, and convert almost all popular video/movie formats to Pocket PC MP4 format. The output iPhone MP4 video files can be played on your Pocket PC. All popular video/movie formats are supported, including AVI, MPEG/MPG/DAT, WMV, ASF, MP4, M4V, 3GP, 3G2, H264, MPEG4, AVC, MOV, QT, DivX, XviD, VOB, FLV, etc. The amazing output quality with super fast conversion speed is brough you by the built-in power MPEG4 encoder. All the output iPhone MP4 videos fit your Pocket PC.



Recommand Link:



PICKED Audio Speech



Avi converter



convert avi to wav



Avi to 3gp converter free download



Youtube Movie to WMV Application



Ever M4P MP3 to MPC Backup



CD-R WAVE to Midi



Picked XML Or CSS Tools



X-Cloner DVD To 3GP



Review Automation Tools



Digital CD M3U RM To AAC Recorder



Professional WMV to DVD FLV



Daniusoft Video to BlackBerry Converter



OJOsoft MP4 To MP3 Converter



Mpg to dat



AllRipper DVD Editor



Youtube Movie to Wii Tools