[Freshers] TCS recruiting 2009 and 2010 Engineering, MCA and MSC students  

Posted by 3dotventure in

TCS is hiring 2009 and 2010 BTECH/BE/MCA and MSC Students !!

Disciplines/Branches:

  CS, IT, Information Science, S/W 
  Electronics Engineering, EEE, ECE, Instrumentation Engineering, Electrical   Engineering, Communication Engineering, Digital Engineering
  Mechanical Engineering, Civil Engineering, Chemical Engineering
  MCA: with BSc/ BCA/ BCom / BA (with Math/Statistics Background)
  MSc: IT, CS, S/W


ELIGIBILITY CRITERIA:


Consistent 60% aggregate from 10th onwards -Only Full Time courses will be considered-Not more than 2 years gap is allowed

Eligible Students must register in
http://www.careers.tcs.com  > Entry level – Direct Applicants > Engineering Graduates & Post Graduates and get the unique DT reference id.

Eligible Students will receive mail communication on the Drive details in August 2nd week

YouTube FLV Downloader  

Posted by 3dotventure in

YouTube FLV Downloader is a Free tool designed for you to download and arrange web videos (*.flv, *.f4v) from YouTube, Google Video, Fox and other more video-sharing websites.

It is more than a FLV downloader; it is also a powerful web video library. With it, you can download any web videos (*.flv, *.f4v) from YouTube, Google Video, Fox and other more video-sharing websites; backup and arrange the downloaded videos to the FLV library, create your preferred FLV playlists and playback them with independent FLV player.

Moreover, if you like, upgrade the YouTube FLV Downloader to the Pro version, you can convert any FLV to other formats like MP4, 3GP, AVI, MOV, MPG, MKV, FLV, MP3, MKA, WAV, AC3, M4A, etc., so that you can playback them on your iPhone, iPod, Blackberry, PSP, Zune, 3G mobile phones, or any other portable devices.
Version: V3.1
Supported OS: Windows XP/Vista
YouTube FLV Downloader
Free Download YouTube FLV Downloader

[Freshers] Value Labs walk-in on Aug 01 for Freshers  

Posted by 3dotventure in

Hello Friends,

We have an immediate requirement for entry level engineers. Your family members, friends and acquaintances that are interested in these positions may please register for the selection process, details are given below.


Eligibility Criteria (a must):

  • Qualification: MCA /B.E/ B.Tech (any branch) from 2010 batch only
  • Percentage : 70% and above
Day & DateSunday, August 1st, 2010

VenueValueLabs Campus.

Guidelines and process for registration:
  1. Eligible candidates should register their name for attending the selection process.
  2. Please logon to http://valuelabs.com/walkins.php for registrations.
  3. Every one who registers would get a system generated unique registration code.
  4. The last date for registration is July 29th, 2010 (Thursday) till 2:00 PM.
  5. The details will be screened and the short-list is prepared based on merit and first come first serve basis.
  6. The call letter along with the unique registration code will be sent to the shortlsited candidates as an email on Thursday (Jul 29th, 2010) evening.
  7. He / she is required to produce the hardcopy of the call letter at the entrance and this will be treated as an entry pass for the selection process.
  8. Candidates who have attended the selection process in last 6 months need not apply.  

Thanks & regards
Team HR

[Freshers] DnBTransUnion recruiting 2009 & 2010 freshers  

Posted by 3dotventure in

Hi Friends,

DBTrans Union recruiting 2009 & 2010 freshers.

Interested candidates please see the following image for more details.

[Freshers] Progressive recruiting freshers  

Posted by 3dotventure in

Core Eng Jobs for Freshers at Progressive
Experience: 0 Years
Location: Hyderabad / Secunderabad
Compensation: Rupees 90,000 - 1,00,000Free Accommodation facility, Subsidised Food
Education: UG - B.Tech/B.E. - Mechanical PG - Post Graduation Not Required
Industry Type: Construction/ Engineering/Cement/Metals
Role: Trainee
Functional Area: Site Engg., Project Management
Posted Date: 20 Jul

Desired Candidate Profile

1. Must be a Graduate in Mechanical Engineering (B.Tech / BE)
2. should be willing to relocate.
3. Should have zeal to learn.

Job Description

1.Assisting Mechanical Engineer / Mechanical Manager in day to day Site activities.
2. Supervising the assignments of Mechanic.
3. Will be posted in tone of he sites allover india.
Keywords: Mechanical Trainee, Mechanical Engineer, Jr.Engineer Mechanical

Company Profile

Progressive constructions Ltd is a 40 Years old construction company with an annual turnover of 1000 Crores. It is one of the leading infrastructure company based in Hyderabad with more than 20 sites all over india and Abroad
Contact Details
Company Name: Progressive Constructions Ltd
Executive Name: HR
Address:Progressive Constructions Ltd
7th Floor, North Block,
Ragavaratna Towers,
Chirag Ali Lane,
Abids,
Hyderabad. 040-23204684 / 85
HYDERABAD,
Andhra Pradesh,
India 500033
Telephone: +91-40-23204684
Reference ID: GET - Mech

[Freshers] Wipro recruiting graduates for IT-Support @ Pune  

Posted by 3dotventure in

Freshers IT Job Opening at Wipro Infotech
Experience: 0 Years
Location: Pune
Compensation: Rupees 1,00,000 - 1,75,000
Education:UG - Any Graduate - Any Specialization PG - Any PG Course - Any Specialization,Post Graduation Not Required
Industry Type: IT-Hardware & Networking
Role: Fresher
Functional Area: IT-Support, Telecom, Hardware

Desired Candidate Profile

Service desk Profile requiring following skill set, 
  1. Excellent communication skills (verbal) as the client are from UK 
  2. Basic understnding in Networking (good to have) 
  3. Quick Learner 
  4. Tr acking of incidents and timely closure of tickets

Job Description

  • Receiving and making calls / Monitor queues in Fast Service/ Monitor SHDS mailbox and Customer Liaison mailbox/
  • Provide support to Service Centers and Suppliers / Chase and Escalate issues with Service Centers and Suppliers 
  • Action prioritized Incidents as per defined metrics and service level requirements. 
  • Update and Monitor incident details as per the defined norms and service level requirements. 
  • Make an initial assessment of Incidents, attempting to escalate/refer them to someone who can, based on defined metric and agreed service levels, action them
  • Keep Service Centers and Suppliers informed on incident status and progress as per defined norm or service level requirements. 
  • Contributing to problem identification by Identify repeating problems and escalating it to appropriate teams.
  • Keep oneself updated on and implement latest process updates 
  • Identify Process Gaps and highlight the same to the Delivery Lead. Manage the quality of updates on Tools and also follow the right communication verbiage on calls.
Keywords: Fresher, Voice, Networking

Company Profile

Wipro Infotech is the IT Services, Solutions & Products division of the Wipro Limited. For the year ended March 31, 2008, Wipro Infotech recorded Revenues of Rs 37.46 billion, representing a growth of 51% YoY. PBIT grew by 46% YoY to Rs 3.12 billion. Services business contributed 33 % to total Revenues and grew by 47% YoY.With over two decades of experience, Wipro has stamped its presence on the Indian market and leads the Indian IT industry. Headquartered at Bangalore, our business spans India, Asia Pacific and the Middle East. By collaborating with Wipro, organizations garner the power of tried and tested frameworks, strong domain knowledge, a large pool of certified technology specialists and best of breed alliances. We bring to market tailor-made, industry specific solutions that help meet your business challenges while increasing operational efficiency. We have leveraged our two-decade old expertise and experience in meeting the IT needs of enterprises that enables us to offer comprehensive IT solutions that encompass best-of-breed products, best-practice IT services and best-in-class enterprise solutions. We help architect, implement and manage the entire IT lifecycle of our customers through a complete portfolio of IT Services. Our services are backed by over two decades of experience handling complex integration projects in India and abroad. Multi-platform expertise, extensive reach and tested delivery mechanisms help us deliver reliable, high-quality, cost-effective IT services. Our IT services are crowned by in-depth Consulting Skills that are reinforced by a keen understanding of the key role that technology plays in enabling business. The Consulting portfolio includes Strategic Consulting Services, IT Governance & Optimization Consulting, Process Consulting, Business Continuity and Risk management Consulting.At Wipro, we offer you a work environment that quenches your thirst for knowledge while helping you nurture your career ambitions. You get to traverse a path that is strewn with values, performance, learning, innovation, quality, camaraderie, career growth - all those facets of work life that you cherish the most.Please visit www.wipro.co.in for more details on the company
Contact Details
Company Name: Wipro Infotech
Executive Name: Prakruthi Vishwanath
Address:
Wipro Infotech
Wipro Infotech; No 5; Papanna Street St Mark's
Road; Bangalore - 01
BANGALORE,Karnataka,India 560001

[Freshers] CTS walk-in on July 29 - 30 for B.SC and B.CA graduates @ Chennai  

Posted by 3dotventure in

Freshers IT Job Opening at Cognizant
About Cognizant Technology Solutions
Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting and business process outsourcing services. Cognizant�s single-minded passion is to dedicate our global technology and innovation know-how, our industry expertise and worldwide resources to working together with clients to make their businesses stronger. With more than 35 global delivery centers and over 50,000 employees, we combine a unique onsite/offshore delivery model infused by a distinct culture of customer satisfaction. A member of the NASDAQ-100 Index and S&P 500 Index, Cognizant is a Forbes Global 2000 company and is ranked among the top information technology companies in BusinessWeek�s Info Tech 100, Hot Growth and Top 50 Performers listings. Visit us online at www.cognizant.com.
Designation: 
Walk In - Cognizant IT freshers Recruitment for 2010 pass outs

Job Description: 
Eligibility criteria:
-2010 pass outs of B.Sc (Computer Science / IT / CT) and BCA only. No Master’s degree
-Consistent academic record of over 60% in X, XII and UG   Dates: 29 July & 30 July 2010 Slots:

29 July & 30 July 2010 29 July (Written Aptitude Test) 


Batch 1 : 09:30 am
Batch 2: 11:30 am
Batch 3: 02:30 pm

30 July (Written Aptitude Test)

Batch 1 : 09:30 am
Batch 2: 11:30 am
Batch 3: 02:30 pm
31 July (Written Aptitude Test)
9.30 AM

  Venue: Bishop Heber College, Trichy

Desired Profile: 
Eligibility criteria:

-2010 pass outs of B.Sc (Computer Science / IT / CT) and BCA only. No Master’s degree
-Consistent academic record of over 60% in X, XII and UG

Dates: 29 July & 30 July 2010

Slots: 29 July (Written Aptitude Test)

Batch 1 : 09:30 am
Batch 2: 11:30 am
Batch 3: 02:30 pm

 30 July (Written Aptitude Test)

Batch 1 : 09:30 am
Batch 2: 11:30 am
Batch 3: 02:30 pm
31 July (Written Aptitude Test)9.30 AM Venue: Bishop Heber College, Trichy 

Experience: 0 Years
Industry Type: IT-Software/ Software Services
Functional Area: Application Programming, Maintenance
Education: UG - B.Sc - Computers,BCA - Computers
PG - Post Graduation Not Required
Location: Chennai, Coimbatore

Contact: 
Techno Complex 5/535, 
Old Mahabalipuram Road,
Okkiyam, 
Thoraipakkam,
CHENNAI,
Tamilnadu,
India 600096

Telephone: 91-44-42096000
Website: https://www.cognizant.com

Job opening for call center in Madurai.  

Posted by 3dotventure in


Interview date -  02-08-2010 To 06-08-2010
Time - 10.00 AM to 1.00 PM
Eligibility - ANY UG Degree/PG Degree
Desired skills - English communication
Salary - Based on your performance
Company Name - 3DOTVENTURE
Web link -http://www.3dotventure.com/
Position Type - 9.00Pm - 6.00Am [Night shift Only]
Desired Experience - 0 Years
Role - Searching Client through (US) voice call and Mailing concept
Contact Number - +91-9788729328
Phone Number - +91-452-4367361
Forward your resume to - lakshmanan@3dotventure.com

Address - 2 Raman Street, Thirunager,Madurai-6
Bus stop - 2nd Stop Thirunager

Job opening for call center in Madurai.  

Posted by 3dotventure in

PART TIME JOBS
Experienced Job Vacancies

Eligibility - ANY UG Degree/PG Degree
Desired skills - English communication
Salary - Based on your performance
Company Name - 3DOTVENTURE
Web link -http://www.3dotventure.com/
Position Type - 9.00Pm - 6.00Am [Night shift Only]
Desired Experience - 0 Years
Role - Searching Client through voice call and Mailing concept
Contact Number - +91-9788729328
Phone Number - +91-452-4367361
Forward your resume to - lakshmanan@3dotventure.com

YouTube Downloader 5.0  

Posted by 3dotventure in

youtube downloader 5.0    You can quickly Download all YouTube video files to Your PC.

License: Freeware Updated Time: 2010-01-14 08:30:48

Size:1.1MB
71598
Total Download
2272
Last Week Download
Download Now


Download Now for FREE! Find registry errors
Thank you for downloading
Free Download
YouTube Downloader 5.0

You can quickly Download all YouTube video files to Your PC.



  • Server 1   Official Download  Click to Download




  • Server 2   Brothersoft(US mirror)       Click to Download




  • Server 3   Brothersoft(CDN for Global)  Click to Download



  • Youtube Downloader 3.03  

    Posted by 3dotventure in

    youtube downloader 3.03    Download and convert videos from the web. YouTube, Hulu, Dailymotion MetaCafe...

    License: Freeware Updated Time: 2010-06-25 01:36:12

    Size:401KB
    16649
    Total Download
    478
    Last Week Download
    Download Now

    Download Now for FREE! Find registry errors
    Thank you for downloading
    Free Download
    Youtube Downloader 3.03

    Download and convert videos from the web. YouTube, Hulu, Dailymotion MetaCafe...



  • Server 1   Official Download  Click to Download




  • VLC Media Player 1.1.1  

    Posted by 3dotventure in

    Download Now for FREE! Find registry errors
    Thank you for downloading
    Free Download
    VLC Media Player 1.1.1

    A free cross-platform media player, bundel brothersoft toolbar



  • Server 1   Brothersoft(US mirror)       Click to Download




  • Server 2   Brothersoft(CDN for Global)  Click to Download






  • ALLPlayer 4.4.6.9  

    Posted by 3dotventure in

    Thank you for downloadingFree Download
    ALLPlayer 4.4.6.9

    Next generation of ALLPlayer brings free video converters.



  • Server 1   Brothersoft(US mirror)       Click to Download




  • Server 2   Brothersoft(CDN for Global)  Click to Download



  • GOM Player 2.1.26.5021  

    Posted by 3dotventure in

    Download Now for FREE! Find registry errors
    Thank you for downloading
    Free Download
    GOM Player 2.1.26.5021

    Play back video files in most of popular video formats-the world's best player



  • Server 1   Brothersoft(US mirror)       Click to Download




  • Server 2   Brothersoft(CDN for Global)  Click to Download



  • Light and Shadow free download  

    Posted by 3dotventure in

      Download (8KB ) Before you download, clean your pc from Errors!

        * Last Updated: 2010-07-22
        * License: Freeware Free
        * OS: Windows ,Mac OS

        * Requirements: No special requirements
        * Publisher: TheCanadian
        * Homepage: http://www.ffiles.com/members/profiles/thecanadian_1026.html
        * Total Downloads From 2010-07-22: 0
        * Downloads of Last week: 0

    Light and Shadow
      Bookmark

        FavoritesFavorites
        Del.icio.usDel.icio.us
        LiveLive
        StumbleUponStumbleUpon
        GoogleGoogle
        MyspaceMyspace
        FacebookFacebook
        RedditReddit


    Light and Shadow
      Description

    "This script is just some filters used to give the effect of light."
    EditByBSEditor: This script is just some filters used to give the effect of light. you can free download Light and Shadow now.

    Thank you for downloading
    Free Download

    Light and Shadow

    This script is just some filters used to give the effect of light.


  •  Server 1   Brothersoft(US mirror)       Click to Download




  •  Server 2   Brothersoft(CDN for Global)  Click to Download



  • Quick Translator 0.4.5 Free download  

    Posted by 3dotventure in

        Download (70KB)
     Before you download, clean your pc from Errors!

        * Download Quick Translator for windows 7

        * Last Updated: 2010-07-22
        * License: Shareware
          Free
        * OS: Windows 7, Vista, 2003, XP, 2000, 98

        * Requirements: For Firefox 3.0 or higher
        * Publisher: igor
        * Homepage: http://addons.mozilla.org/en-US/firefox/user/1207978
        * Total Downloads From 2010-07-22: 0
        * Downloads of Last week: 0

    Quick Translator 0.4.5
      Bookmark

        FavoritesFavorites
        Del.icio.usDel.icio.us
        LiveLive
        StumbleUponStumbleUpon
        GoogleGoogle
        MyspaceMyspace
        FacebookFacebook
        RedditReddit

    Quick Translator 0.4.5
      Description

    "Translate between more than 50 languages with a hot key or click of a mouse."
    Brothersoft Editor: Quick Translator allows you to translate Between more than 50 languages with a hot key or click of a mouse.

    Translates selected text on:

    * Hot key (Ctrl + Alt + T by default)
    * Floating button next to selected text (enabled by default)
    * Mouse selection (disabled by default)
    * Context menu option (can be disabled)

    Features:

    * Supports translation in any combination of more than 50 languages
    * Automatic detection of the language of translated text
    * No additional JavaScript files loaded on each page request - save your bandwidth (as some other translation add-ons)
    * Easily configurable to your own preference
    * Support translation of manually inputted text
    * Can be shown in any combination of a toolbar, status bar, or context menu.
    * Translation by a hot key, with a mouse selection, context menu or floating button.
    * Based on Google Language API

    Important notice
    New version was released today (May 27th).
    After update, in case of any problems or bugs still present from previous release, please contact me by email.


    Known issues:

    * Selected text in textareas cannot be translated (should be fixed in the next version)
    * In some cases translator popup can go beyond screen and will not be seen partially on in full (should be fixed in the next version)

    Next releases:

    * One of the popular feature requests is translation of the full page. I'm working on it, and it should be available in one of the future releases you can free download Quick Translator 0.4.5 now.

    Thank you for downloading
    Free Download

    Quick Translator 0.4.5


    Translate between more than 50 languages with a hot key or click of a mouse.


  •  Server 1   3 DOT VENTURE       Click to Download




  •  Server 2   3 DOT VENTURE       Click to Download



  • Banner Design Free Software.  

    Posted by 3dotventure in

        *  Last Updated: 2010-07-23
        * License: Freeware Free
        * OS: Windows

        * Requirements: No special requirements
        * Publisher: chriz450
        * Homepage: http://www.chriz450.com
        * Total Downloads From 2010-07-22: 0
        * Downloads of Last week: 0

    banner 1st
      Description

    "This script creates a nice banner you can use for your website."
    This script creates a nice banner you can use for your website. you can free download banner 1st now.

    Thank you for downloading
    Free Download

    Free Download

    banner 1st

    This script creates a nice banner you can use for your website.

     Server 1   3DOTVENTURE      Click to Download

            Server 2   3DOTVENTURE  Click to Download


    Free FLV to Walkman Converter 4.0.07  

    Posted by 3dotventure in

    Thank you for downloading

    Free Download

    Free FLV to Walkman Converter 4.0.07


    It can convert FLV and SWF Video to Walkman AAC-LC, MP3, WMA Audio.


    # Server 1   Official Download  Click to Download

    Software to steer clear of: Acronis Drive Monitor  

    Posted by 3dotventure in

    acronisdrivemonitor
    Acronis is a fairly trusted name in the world of system utilities. Such trust is not easily gained, and should not be abused. This is all the more reason why I am so disappointed with Acronis Drive Monitor.
    I downloaded it, hoping for an easy utility to tell me whether or not my drive was failing. Before letting me download this "free" tool, Acronis wanted my full name, country and email address. Okay, no problem.
    Since I like Acronis so much, I decided to install it on my real system and not on a virtual machine like I usually do. So I then stepped through their own weird installer, which completed installing the program and then bounced back to the first screen, asking me again whether or not I'd like to install it or "unzip the installation files". Okay, but this was just the download and installation. Maybe the program is still good?
    Keeping my hopes up, I launched it. The first thing it tells me is that "I have no backup software installed". Oh, really? I happen to have Oops!Backup, which frankly blows anything Acronis has to offer out of the water. But no, if I don't have Acronis backup, that means "I don't have backup". And the program alerts about it in the most confusing manner, just like it would alert a drive malfunction. This might really cause some novice users to worry.
    Then I notice a temperature warning for a disk. The summary doesn't say which disk, and doesn't say what temperature. You have to click through to see (even though it's just four characters of information!). So I click and get a list of my physical drives. No drive has an alert symbol next to it, and they all have 100% health (so why show me an alert, Acronis? Just for fun?). So I have to go through each drive to figure out which one is overheating. After a moment I find it, and see the disk temperature is 118F.
    Okay, maybe it's just set to American defaults, right? Surely there's some way to set it to Celsius. Right? Wrong! Fahrenheit it is, and if you don't like it, that's too bad.
    I could go on and on, but the bottom line is that this tool is a shoddy vessel for promoting other Acronis products, and is, quite frankly, an insult to their users' intelligence. If I had to summarize the product in a single word, I would say crap.

    System Nucleus is a powerful Windows diagnostic, backup, and reporting tool  

    Posted by 3dotventure in

    When I first glanced at System Nucleus, I thought it might wind up being just another system reporting tool, spilling details about my system to a text file for posterity. In fact, that's barely the tip of the iceberg -- System Nucleus features a number of useful tools for Windows troubleshooting, tweaking, and maintenance.

    One of my favorite components is the backup & recovery tool, which can process registry hives, event logs, and drivers. There's also an installed programs applet which can perform bulk actions like mass uninstalls (it's reminiscent of Safarp). Other handy items include a volume (as in drives) manager with space analyzer, startup programs and services managers, a system editor with loads of tweaking options, and quick access to virtually every Windows administration and maintenance tool via System Nucleus' tools menu.

    For those who might not be quite as familiar with some of the information presented by System Nucleus, the online features are incredibly useful. They allow everything from finding out what a particular file association is all about to updating your ATI or NVIDIA drivers to running online security scans.

    .Net 3.5 is required, and you can either install System Nucleus or download and extract a portable version -- both 32 and 64-bit varieties are available.

    Passmark DiskCheckup is a free, simple SMART monitoring tool  

    Posted by 3dotventure in

    Erez might have been less than thrilled with Acronis Drive Monitor the other day, but I have a feeling he'll like Passmark's DiskCheckup a lot more. They're the same people who produce the awesome app BurnInTest -- one of my all-time favorite technician tools.

    It's a simple little tool which keeps an eye on the SMART status of your hard drives. In addition to displaying an exhaustive amount of information about your drives (everything from its model and serial number to standards compliance and feature support), DiskCheckup can also park itself in your system tray and keeps a watchful eye on HDD temperatures. And yes, Erez, you can choose between Celsius and Fahrenheit...

    Once your threshold has been crossed, DiskCheckup can either display a notification or send you an email notification.

    One tweak I'd like to see added is for DiskCheckup to display drive temperatures when hovering over the system tray icon. It's not critical, however, because I'm far more interested in being notified when something is wrong -- but it's still nice to have the option.

    WizMouse lets you scroll inactive windows with your mouse wheel  

    Posted by 3dotventure in

    One of those "I can't believe it's not there" features Windows lacks is the option to scroll an application window which isn't currently active. I can see it being somewhat confusing for less adept users, but many of us find the extra mouse click required to bring focus and enable scrolling to be a tiny, annoying speedbump.

    Fortunately, WizMouse bolts on that functionality for free. Download the app from Antibody Software, and you'll be able to scroll background windows (including those opened with Administrator permissions). As a bonus, you can also use WizMouse to brute force scroll wheel support into applications which don't offer it.

    You can also optionally focus the window you scroll -- which I like much better than the click first, scroll later scenario.

    Win Themer brings KDE's Oxygen icons to your Windows desktop  

    Posted by 3dotventure in

    If you've used Kubuntu (or any other Linux distro which features KDE), you may have found yourself wishing you could easily install the default Oxygen icon theme on your Windows machine. Well, you can -- using Win Themer!

    Download Win Themer and run it (you may need to right-click and run as administrator on Vista or Windows 7), and the Windows defaults will be swapped out for their Oxygen equivalents. A total of 22 icons are included, and they cover pretty well all the basics -- like computer, folders, drives, text files, empty and full recycle bin, and .ZIP archives.

    Sure, you can go the manual route and browse for a new icon on each one you want to change, but Win Themer is a lot less work...

    Dropbox Shell Tools lets you copy files quickly to your Dropbox  

    Posted by 3dotventure in

    dropboxshelltools
    Let me start off by saying I am not a huge fan of the Windows file context menu. On my system it contains twenty eight separate entries, just on the main menu (not counting sub-menus). It's an abominable UI pattern, and I wish it would be replaced by a simple command-entry interface, like Microsoft did with the Start menu. I mean, how many people actually use the "menu" part of the Start menu in Windows 7? I bet the vast majority of users just use the Quick Search box.
    Now that I have this out of my system, you can probably understand why the screenshot of Dropbox Shell Tools is not from my own system; the last thing I need it another context menu entry.
    However, the tool itself does seem very useful. It's originally German, and the English version was created in response to interest from GadgetHubs. That means documentation is a bit on the thin side (read: "does not exist"). But the menu entries seem rather self-explanatory. You can click on any file on your system, and immediately transport it onto your Dropbox public folder, or onto a specific subfolder within your Dropbox. If you use Explorer (rather than Total Commander) that should save you a few clicks.
    Know of a quicker way to put stuff in your Dropbox

    Intel declares 'best quarter ever,' after 34% annual jump in revenue  

    Posted by 3dotventure in

    By Tim Conneally | Published July 19, 2010, 10:39 AM


    Chipmaker Intel Corp. has posted its earnings for the second quarter of 2010, and with revenue of $10.8 billion and a net income of $2.9 billion, declared it to have been the company's best quarter ever.
    Strong demand from corporate customers for our most advanced microprocessors helped Intel achieve the best quarter in the company's 42-year history," said Paul Otellini, Intel president and CEO. "Our process technology lead plus compelling architectural designs increasingly differentiate Intel-based products in the marketplace. The PC and server segments are healthy and the demand for leading-edge technology will continue to increase for the foreseeable future."
    Intel's Atom line of low-profile, low power chipsets was up 16% over last quarter, reaching revenue of $413 million, and with a slightly higher average selling price for processors, the company had record high revenues in both its mobile processor and server microprocessor categories.

    Securing Software in an Outsourced World by Rudolph Araujo  

    Posted by 3dotventure in

    Security Feature (July 2010)

    Ensuring that your organization's applications are securely developed involves some tradeoffs, especially with regard to cost and time to market; a detailed contract is a good place to start
    With so much software being developed by outsourcing providers and contractors that are sometimes halfway across the world, organizations must have a well-thought-out strategy to ensure that the software that is developed for them is free from security vulnerabilities and in line with their desired level of security assurance. As with most initiatives, this set of activities must have as low an impact on costs and schedules as possible.
    In my last article, I discussed what it takes to build a software security program.1 The guidance in that article will serve you well throughout the product lifecycle as your organization designs, develops, and deploys software. However, many organizations these days develop their software by making heavy use of outsourcing and contractors. The cost benefits of doing this have made it an especially popular option given the recent economic climate.
    However, outsourcing can have a significant impact on the security of applications developed by your organization. Hence, one of the most common questions we at Foundstone field when working with large organizations goes something like this: "Seventy percent of our software development at this point is outsourced. How do we ensure that our outsourced partner/contractor performs the appropriate levels of due diligence for security?" With the volume of software being developed by contractors, the answer to this question, as one would imagine, can very often be the difference between secure software and software that is inundated with vulnerabilities, backdoors, and other security policy violations. Indeed, the rising popularity of the cloud computing paradigm in general and Software as a Service (SaaS) in particular has only added to the trend. These models not only outsource the development of business-critical applications but also host these applications - and perhaps most importantly, the data within the applications, which is often of great value to your organization.
    It is therefore vital to establish a process for ensuring that the applications within your organization are securely developed irrespective of who is developing them - whether a full-time employee, a contractor, or an outsourcing vendor. Based on our experience, we offer solutions that, while not entirely painless, can significantly improve the security quality of your applications and yet not result in large cost or timeline overruns or a troubled relationship with your vendors.
    Vendor Management
    A number of compliance regulations and best practice standards, such as the PCI-DSS2 and ISO, require the creation of a vendor management program. Such a program is meant to ensure that appropriate levels of attention are paid to third parties that can heavily influence the security of your systems. We recommend extending that approach to software development relationships as well.
    Essentially, if a vendor is involved in development, deployment, or hosting of your applications, that vendor should be covered within such a program. The most common examples of such vendors are your outsourced providers, but it is also important to consider developers of third-party components, such as user interface grids or API developers that provide access to data on mainframes. Similarly, it is important to consider contractors who work within your own environment just like your full-time employees, as well as hosting and SaaS providers.
    Once you have a list of who must be covered by a Software Security Vendor Management Program, the next task is to apply a standard process to them to ensure that your organization can achieve the level of security assurance it needs, even when engaging contractors. It helps if you think of this process as part of a three-pronged framework. The focus of this framework is to associate key software security aspects with the nature and stage of the relationship that exists between the contractor and your organization. The three key areas that must be considered are:
    • Contracts
    • Validation
    • Operations
    Let us examine contracts in detail. (We'll cover validation and operations in a future article.) Before we dive too deep, however, it is important to state, as always, that organizations are best served by taking a risk-based approach to this framework and enforcing it. This means that while this article describes a large number of activities and proposals, not all of them may be appropriate to your organization or to the specific project you are currently working on.
    In some cases, for example, if the vendor is developing software that will store patient information or personally identifiable information (PII), the framework might be significantly more stringent than in cases in which the application being developed has little or no security significance. In fact, the ability to adapt has to be a key design criterion of any such framework, since a one-size-fits-all solution is likely to be no solution at all.
    Before we delve into specific details, let's examine one other order of business: the disclaimer. The information provided within this article represents guidance and experience from the author. It should not be construed as legal advice, and I strongly recommend that your organization consult either the internal legal group or qualified outside counsel before using any of the thoughts and ideas that follow.
    Contracts
    Contracts are often the first place in which an organization can establish standards for software security with its vendors. That's because it's also where the organization has the most leverage with contractors as they strive to win its business. Unfortunately, more often than not, we find that organizations are lax in defining any requirements or metrics around software security and thus miss out on the opportunity to influence the relationship. This often happens because the individuals tasked with software security within an organization are rarely involved in the contracting process; the procurement and legal personnel involved in this process rarely have the background necessary to mandate security.
    As a solution to this issue, it is therefore necessary that very early in the contracting workflow - e.g., as part of the RFI (Request for Information) or RFP (Request for Proposal) process - security requirements at a process level must be defined and included within the larger requirements specification shared with the vendor. Given the increase in regulatory oversight, this is no longer just a nice-to-have; it's required as part of your organization's compliance objectives.
    The most common approach organizations have taken with including security language in contracts is to include an annex or appendix that lists concrete requirements and standards that need to be met.
    Training Personnel
    One of the key aspects to cover within your contracts is the quality of personnel assigned to your project. Approaches to this could range from detailed background checks on all vendor staff involved in the project to assessments of individual skills. It is common to require certain basic qualifications in the form of certifications, formal educational degrees or diplomas, or often - in the case of software security - completion of a specific training curriculum.
    Some companies have taken a different approach and have trained selected vendor staff themselves. While this is an excellent strategy, it does have one major drawback that a number of organizations complain about: they often find that once they have invested in training contractors, those contractors end up moving on to other projects and other customers as their value increases and other opportunities come their way.
    It can be extremely frustrating for an organization to spend both time and money teaching an individual the fundamental principles of software security - only to find that when the project eventually begins, the individual in question has been replaced by someone who is untrained in such matters. This means that the organization will have to go through the same cycle all over again.
    Obviously, this is not a very scalable model, and therefore organizations are often better served by mandating such training as a requirement for vendors and their staff before they are even assigned to a project. In this way, the responsibility for providing the training falls on the shoulders of the vendor and, hence, risk is transferred.
    Another approach is to develop customized computer-based training that focuses on specific areas within software security that are relevant to your organization. Some organizations have even gone to the extent of testing assigned staff as part of this process. In a sense, this is not much different from the onboard training that is often provided to new employees. The idea is to make them aware of your policies and expectations.
    Auditing
    Another issue that must be covered during the contracting process is your organization's right to audit - a right that vendors may be hesitant to accept, but again, one that is best tackled during the contracting process. Auditing is extremely difficult to do without the cooperation of the vendor.
    In some cases, vendors may worry that intellectual property may be leaked to your organization. This is especially true when the vendor is selling shrink-wrapped software or SaaS. In these cases, typically, your organization only gets usage rights to the application and cannot view the source code, or oftentimes even test the application, without violating copyright laws. In such situations, especially, the vendor must agree and cooperate with testing procedures. Of course, this implies that we must define testing itself.
    Depending on the perceived risk of the application and the posture of the organization, testing might range from a simple questionnaire-based risk assessment to a physical security assessment, especially when the application is being hosted by a third party. In addition, from an application security perspective, organizations might mandate some combination of threat models, code reviews, and application penetration tests.
    Finally, there is also a need to document the frequency of testing, especially when this is intended to be a long-term relationship that spans multiple years and multiple versions of the application in question.
    One issue that your organization might run into when negotiating the right to audit is that the vendor might have already completed an audit on its own. It is important, therefore, to mandate that such an audit must be completed by a reputed firm3 against a well-defined and accepted methodology, such as the OWASP Testing Guide4 or the OWASP Application Security Verification Standard.5 It is also possible that the vendor has been assessed as part of its own compliance needs with standards such as PCI-DSS. In these cases, it is common for organizations to require that an executive summary of the testing be provided to them.
    Of course, performing testing is only one piece of the puzzle. It is also vital that the vendor actually fix the issues uncovered. It is therefore important to mandate the types of issues that must be fixed before going to production and those whose risk is acceptable. Again, your compliance objectives can help guide this decision. For instance, the PCI-DSS uses a five-point scale, in which issues marked as levels 3 through 5 must be corrected to stay in compliance. Your organization could employ a similar approach - quantitative risk models, such as CVSS,6 can be extremely helpful, since they attempt to remove subjectivity from the issue.
    Organizations with a more stringent policy, or those dealing with particularly sensitive applications, might take the approach that every identified vulnerability needs to be fixed, and that once that is done, a retest may need to be performed and a clean report provided. Others may only require that a plan be in place for medium- or low-risk issues. Again, these are decisions that your organization will need to make based on the specifics of your risk profile.
    One contentious issue when it comes to fixes to security defects is that a number of outsourcing vendors treat them as change requests and hence will charge your organization for fixing them. To use a real-world analogy, this is the equivalent of selling you a car with faulty seat belts and then charging you to replace or repair them. It is vital, therefore, that this issue be tackled within the contracting process as well. In this way, surprises can be avoided once delivery begins.
    Another aspect of testing goes beyond the application itself to focus on the processes the vendor follows as well as the underlying infrastructure. Organizations might need to perform due diligence, for instance, to ensure that the data center within which the application will be hosted has appropriate levels of physical security as well as disaster controls.
    Additionally, the client firm might need to require an assessment of the security of infrastructure components, such as source code control systems or management networks. This is especially true when the vendor works with a wide variety of customers, some of which might be your competitors. The vendor's policies for performing security activities, such as patching or incident response, might also be of interest based on the criticality of the application.
    In short, as you define assessment requirements within the contract, it is important to consider all the different forms of testing that are necessary from your organization's security assurance perspective.
    Setting Expectations
    The contract is also an opportunity for your organization to set very clear expectations around the security bar that the vendor will be expected to meet. This is best done by including specific policies and procedures that the vendor must follow at all times. For instance, if the application being developed is going to handle PII from your customers and these customers share that information with you based on your privacy policy, it is critical that this policy be shared with the vendor and that the vendor read and acknowledge the same. Similarly, if your organization has a data classification policy that governs how different types of data are to be handled in storage and transit, then it is imperative that this policy be provided to the vendor if any of these data elements will be shared with them during the course of the project.
    From a software security perspective, it is important to document specific coding standards that developers at the vendor are expected to follow. These must be prescriptive and provide detailed technical requirements. For instance, it is not sufficient to say strong encryption must be used. Rather, a standard must specify the algorithm, key length, and other such parameters. This leaves less to opinion and subjective analysis and is also easier to audit.
    In some organizations that have mature software security programs, it is not uncommon to see these standards expand to include actual code snippets, or even to include libraries and APIs that the vendor is required to use for specific purposes, such as cryptography and data validation.
    One final issue to cover within the contract is warranties. These are intended not to provide the money-back guarantee we might be used to in the real world, but rather to transfer liability. For instance, vendors are often required to warrant that the application developed or provided to your organization is free from intentional malicious code or backdoors; penalties or consequences should be spelled out if this is later found not to be the case.
    Additionally, vendors are often required to provide detailed documentation. From a security perspective, we would want this documentation to include (as appropriate) artifacts such as hardening guides as well as application-specific security information. Examples of this include risk-mitigation steps that might be taken as well as information on the authorization model and how it is enforced.
    To conclude, we would be remiss without referring to some of the best work done in this area that is available in the public domain - the OWASP Legal Project.7 This project includes sample contract language as well as other reference information on the topic that will serve you well as you attempt to implement some of the advice provided here.
    Rudolph Araujo serves as a principal software security consultant and trainer at Foundstone Professional Services, a division of McAfee.
    1 www.softwaremag.com/L.cfm?Doc=1224-9/2009
    2 www.pcisecuritystandards.org/index.shtml
    3 Understandably the term "reputed firm" is subjective. Unlike many other industries, there aren't always analyst reports that rank security consulting organizations. Hence, our recommendation is to go by the organization's reputation, presence across the country or globe, publications (books, articles, and whitepapers), and participation in major conferences. Remember that the key objective is to ensure that the firm employed by your vendor is likely to do a thorough job of testing the security of its application(s).
    4 www.owasp.org/index.php/Category:OWASP_Testing_Project#OWASP_Testing_Guide_v3
    5 www.owasp.org/index.php/ASVS
    6 www.first.org/cvss/
    7 www.owasp.org/index.php/OWASP_Legal_Project

    Defining a Work Breakdown Structure by Kim Pries and Jon Quigley  

    Posted by 3dotventure in

    Application Development
    Feature (July 2010)
    A detailed work breakdown structure is the secret ingredient in effective project management and can keep projects on task and budget, accounting for everything that must be done for a project's success
    One often-overlooked but key activity in project management is the work breakdown structure (WBS). To be able to deliver the goals or objectives of a project, it is imperative to have knowledge of what it takes to meet those goals. That's what the WBS does. Insufficient time spent performing this activity - or omission of it altogether - can doom a project.
    Any project whose end game includes "last-minute activities" is a project in which the WBS has likely been ignored or not completed. These forgotten items will probably result in cost overruns as well as late deliveries and poor quality, because without a well-constructed WBS, tracking the project's duration, costs, and actual progress becomes a guessing game.
    The WBS is sometimes confused with a Bill of Materials (BOM). The BOM describes the raw materials, subassemblies, components, and so on that are required to complete a project. Like a WBS, a BOM is hierarchical, with upper levels (systems) decomposing into subsystems and components. But that is where the similarities stop. A WBS is a hierarchical list of the activities involved as well as the deliverables that need to be produced in order to deliver a project to successful fruition.
    A WBS can further be defined as the following:
    • A product-oriented hierarchy composed of hardware, software, services, data, and facilities.
       
    • A description of the product, or products, to be developed and/or produced; in so doing, it relates the elements of work to one another and to the end product.
       
    • An expression of an "organic" hierarchy down to any level of concern.
    The Department of Defense recommends three levels for this hierarchical decomposition; we recommend significantly more detail, because the result of our effort allows day-to-day management of our various products and development deliverables. Additionally, breaking down to a detail level facilitates the identification of risks associated with the project deliverables and task dependencies. (See Table 1.)
    As a template, MIL-HDBK-881 is not exact for our purposes (we might, for example, add simulation activities that our organization or customer may deem necessary to ensure product quality), but it is a good place to begin. It gives us a running start and provides a checklist that will make it easier to remember all of the essential cost centers. Recognizing cost centers facilitates the identification and tracking of work not directly within the project manager's control - such as outsourced work packages.
    Direct Reflection of Requirements
    The WBS approach installs the voice of the customer as the driving mechanism for the scope of the work, which, in turn, drives the requirements. It does not matter if the requirements come from external sources or if they are internally derived. When requirements change, the WBS must also change, because of its nature as a functional decomposition of top-level deliverable elements. Once we have a structure that is visible, updating, re-planning, re-estimating costs, and task duration are simplified, because all of the elements are visible as well.
    The WBS is important to project management styles and line management because the cost centers are derived from deliverable elements of the project (so much so that it is easy to develop templates for the WBS). The WBS concept works because products are composed of systems, which in turn are composed of subsystems and then components and so on. If we start with a top-level assembly as the first or second level, we can easily break the product down into "atomic"-level tasks.
    The same approach will apply if we are dealing with other deliverables, such as internal specifications, models, failure mode and effects analyses, and the whole round of documents required by any formal quality system.
    Tracking updates to the project scope or changing deliverables to meet requirements is where many projects go astray. Lack of change management or incompetent configuration control makes it difficult to compare what we have with what we expected or needed. With scrum, we derive the product backlog directly from the WBS. And the WBS is not simply an action item list; it's a formal document designed to support cost and schedule reporting as part of a contract. From the WBS, we can derive our action item lists, schedule, and budgets.
    How Deep the WBS Should Go
    The WBS will deconstruct as far as we need to go, so that we can put items into our planning documents - formal project management tool, spreadsheets, or action item lists. If we have an especially short planning horizon, as is used in scrum project management, then we have to have tasks that can be accomplished during that period. We call this highly detailed analysis "atomic" decomposition, because we are decomposing the higher-level tasks until further decomposition no longer adds value. When we complete this task, we will have a list of "atoms" that become part of our other planning documents.
    In some cases, the "atoms" will be small enough that we can complete them within minutes. In our experience with a production testing group, this approach removed the excuse that "we didn't have time to do this work." By putting these small tasks into a management-supported list, we can drive some level of accomplishment through their completion.
    Task Decomposition to "Atomic" Level
    As we have indicated, "atomic" decomposition occurs when we take a WBS down to the level where task completion becomes binary - either it is done or it isn't done, eliminating the estimation of "percent complete." If we are really astute, we may even break our tasks down to the point where they have roughly equivalent durations, which allows for easy planning. The reasons for doing this are manifold:
    • We provide immediate gratification, and thus reinforcement to our project team.
       
    • We can roll up completed tasks into a standard project management program and get a "percentage complete" result, suitable for passing on to management.
       
    • For agile project management methods, we can easily insert these low-level tasks into even the shortest sprint backlog.
    We use this approach to WBS decomposition to ensure completion of all tasks. The cost center decomposition ensures that we identify dependencies and include them in our planning documents. Our goal is to remain flexible and lightweight, rather than burdening ourselves with a lumbering, uninspired approach to our task list.
    Activity Sequencing
    Each of the building blocks may have interactions and dependencies; for example, we must design hardware before we build hardware. The WBS provides enough information to define all required tasks - the project manager will still use a network diagram to represent task dependencies. The WBS does not put the dependencies together for you as part of the work.
    However, breaking down the tasks to a sufficient level makes it possible for you to work through the dependencies more efficiently - since all of the tasks are identified in the WBS. This manipulation of the tasks happens after the WBS is produced and the activities are sequenced.
    This approach has the advantage of eliminating the use of percentages to represent completion status, a technique that our experience shows to be overly optimistic. The small-element approach also makes for easier deployment of estimating techniques, such as Program Evaluation and Review Technique (PERT) and Monte Carlo simulation.
    Time-Phased Budget
    The time-phased budget will include the schedule and cost (usually in hours). This approach is necessary for Earned Value Management (EVM), which includes the following metrics:
    Schedule performance index Cost performance index Cost variance Schedule variance Estimated budget to complete Estimates at completion
    The WBS elements make up the accumulated project budget. (See Fig. 1.) When the time is beyond the WBS element, then the project is in duration overrun. The smaller the task, the quicker it is to identify when the project is in this overrun condition.
    When a project has been deconstructed to a sufficient level of detail, and allows for early detection of schedule and budget slipping, it results in the cumulative project expenditure via WBS with a very high resolution. (See Fig. 2.)
    WBS Does/Doesn't
    There are some things a WBS does not do. For example, it doesn't:
    • Clearly identify task dependencies
    • Substitute for project follow-through
    • Identify the project organization
    The WBS does:
    • Support scope identification/clarification
    • Serve as a baseline for schedule generation
    • Facilitate duration estimation
    • Allow EVM techniques
    • Facilitate responsibility and accountabilities
    WBS and Recyclability
    Organizations often deliver a series of similar projects (embedded, software, and so on), and they can reuse WBSs from previous projects as a starting point for the new project. On the downside, there is a risk of recycling earlier problems and not accounting for changes since the last use of the WBS. If the organization has conducted a good post-mortem on previous WBS documents, then it should have captured the major issues already and recorded permanent corrective actions.
    A project conducted without task details runs the risk of basing its success largely on luck (the use of the "hope" method of project management). A WBS prevents these details from falling through the cracks by accounting for everything that must be done. Our next article will detail how a WBS can be used in scrum project management.
    MIL-HDBK-881 recommends the following items for a WBS:
    • Integration, assembly, test, and checkout efforts
    • Systems engineering and program management
    • Training:
      • Equipment
      • Services
      • Facilities
    • Data:
      • Technical publications
      • Engineering data
      • Management data
      • Support data
      • Data depository
    • System test and evaluation:
      • Development test and evaluation
      • Operational test and evaluation
      • Mockups
      • Test and evaluation support
      • Test facilities
    • Peculiar support equipment (items not currently in inventory that must be developed):
      • Test and measurement equipment
      • Support and handling equipment
    • Common support equipment (items currently in inventory):
      • Test and measurement equipment
      • Support and handling equipment
    • Operational and site activation:
      • System assembly, installation, and activation
      • Checkout on site
      • Contractor technical support
      • Site construction
      • Site/ship/vehicle conversion (obviously military and defined as what must be done to accommodate the product; on the civilian side, we would look for opportunities for reuse)
    • Industrial facilities:
      • Construction/conversion/expansion
      • Equipment acquisition or modernization
      • Maintenance (industrial facilities)
    • Initial spares and repair parts



    Kim Pries and Jon Quigley are principals with Value Transformation, LLC, a product development training and cost improvement firm. They have written two books for Taylor and Francis (www.taylorandfrancis.com) to be published in 2010 - one on scrum project management and the other on product testing. Contact them at kim.pries@valuetransform.com and jon.quigley@valuetransform.com, respectively.