Saturday, May 31, 2008

mgmt studio is AIO tool SSMS - ent manager + query analyzer SSIS replaces DTS. Editions -
  • Express Edition 32bit

  • Workgroup Edition 32bit

  • Developer Edition

  • Standard Edition

  • Enterprise Edition

  • Mobile Edition

At least 1GHZ, 512MB RAM for sql to run minimum. windows xp can install express, workgroup, standard, and developer versions of sql. You can run more than one type of sql server on the same pc without problems. The exam primarily focuses on the high-end Enterprise Edition SQL SERVER INSTALLATION From SQL Server Management Studio, you can connect to any SQL server in the enterprise. Named pipes is used for communications on local area networks (LANs) as an alternative to TCP/IP. By default, SQL Server uses port 1433, a 5-drive array is best. Questions 1-50 testking: What is a stored procedure ? What are linked servers ? Create views Create assembly TCP endpoint db mirroring webmethod Daily transaction log shipping or snapshot replication UPDATE STATISTICS D. CREATE STATISTICS DBCC command, DBCC OPENTRAN bcp command, CREATE CONTRACT contract Tracer token clustered index CREATE ENDPOINT COLLATE service broker XSINIL sql server profiler activity monitor ssms kill process. Use SQL Server Profiler to identify the cause of a deadlock. partitioning scheme create a view and specify the SCHEMABINDING option, The sys.dm_db_index_usage_stats dynamic management view database snapshot SQLServer:Buffer Manager full-text catalog. LTRIM and RTRIM built-in functions. two types of triggers in SQL Serer 2005: data manipulation language (DML) triggers and data definition language (DDL) triggers. CREATE LOGIN http://www.google.co.uk/search?hl=en&q=microsoft%3A+webcast+sql&meta= http://technet.microsoft.com/en-us/sqlserver/default.aspx -------------------------------------------------------------------------------------------------------------------------------------------------------------
Skills measured by FROM MICROSOFT.COM :-
Installing and Configuring SQL Server 2005

Install SQL Server 2005.

Verify prerequisites.

Upgrade from an earlier version of SQL Server.

Create an instance.

Configure SQL Server 2005 instances and databases.

Configure log files and data files.

Configure the SQL Server DatabaseMail subsystem for an instance.

Choose a recovery model for the database.

Configure SQL Server security.

Configure server security principals.

Configure database securables.

Configure encryption.

Configure linked servers by using SQL Server Management Studio (SSMS).

Identify the external data source.

Identify the characteristics of the data source.

Identify the security model of the data source.

Implementing High Availability and Disaster Recovery

Implement database mirroring.

Prepare databases for database mirroring.

Create endpoints.

Specify database partners.

Specify a witness server.

Configure an operating mode.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Implement log shipping.

Initialize a secondary database.

Configure log shipping options.

Configure a log shipping mode.

Configure monitoring.

Manage database snapshots.

Create a snapshot.

Revert a database from a snapshot.

Supporting Data Consumers

Retrieve data to support ad hoc and recurring queries.

Construct SQL queries to return data.

Format the results of SQL queries.

Identify collation details.

Manipulate relational data.

Insert, update, and delete data.

Handle exceptions and errors.

Manage transactions.

Manage XML data.

Identify the specific structure needed by a consumer.

Retrieve XML data.

Modify XML data.

Convert between XML data and relational data.

Create an XML index.

Load an XML schema.

Implement an HTTP endpoint.

Create an HTTP endpoint.

Secure an HTTP endpoint.

Implement Service Broker components.

Create services.

Create queues.

Create contracts.

Create conversations.

Create message types.

Send messages to a service.

Route a message to a service.

Receive messages from a service.

Import and export data from a file.

Set a database to the bulk-logged recovery model to avoid inflating the transaction log.

Run the bcp utility.

Perform a Bulk Insert task.

Import bulk XML data by using the OPENROWSET function.

Copy data from one table to another by using the SQL Server 2005 Integration Services (SSIS) Import and Export Wizard.

Manage replication.

Distinguish between replication types.

Configure a publisher, a distributor, and a subscriber.

Configure replication security.

Configure conflict resolution settings for merge replication.

Monitor replication.

Improve replication performance.

Plan for, stop, and restart recovery procedures.

The course includes material to prepare you for this task.
Maintaining Databases

Implement and maintain SQL Server Agent jobs.

Set a job owner.

Create a job schedule.

Create job steps.

Configure job steps.

Disable a job.

Create a maintenance job.

Set up alerts.

Configure operators.

Modify a job.

Delete a job.

Manage a job.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Manage databases by using Transact-SQL.

Manage index fragmentation.

Manage statistics.

Shrink files.

Perform database integrity checks by using DBCC CHECKDB.

Back up a database.

Perform a full backup.

Perform a differential backup.

Perform a transaction log backup.

Initialize a media set by using the FORMAT option.

Append or overwrite an existing media set.

Create a backup device.

Back up filegroups.

Restore a database.

Identify which files are needed from the backup strategy.

Restore a database from a single file and from multiple files.

Choose an appropriate restore method.

Move a database between servers.

Choose an appropriate method for moving a database.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.
Monitoring and Troubleshooting SQL Server Performance

Gather performance and optimization data by using the SQL Server Profiler.

Start a new trace.

Save the trace logs.

Configure SQL Server Profiler trace properties.

Configure a System Monitor counter log.

Correlate a SQL Server Profiler trace with System Monitor log data.

The course includes material to prepare you for this task.

Gather performance and optimization data by using the Database Engine Tuning Advisor.

Build a workload file by using the SQL Server Profiler.

Tune a workload file by using the Database Engine Tuning Advisor.

Save recommended indexes.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Monitor and resolve blocks and deadlocks.

Identify the cause of a block by using the sys.dm_exec_requests system view.

Terminate an errant process.

Configure SQL Server Profiler trace properties.

Identify transaction blocks.

The course includes material to prepare you for this task.

Diagnose and resolve database server errors.

Connect to a non-responsive server by using the dedicated administrator connection (DAC).

Review SQL Server startup logs.

Review error messages in event logs.

The course includes material to prepare you for this task.

Monitor SQL Server Agent job history.

Identify the cause of a failure.

Identify outcome details.

Find out when a job last ran.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Gather performance and optimization data by using DMVs.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.
Creating and Implementing Database Objects

Implement a table.

Specify column details.

Specify the filegroup.

Assign permissions to a role for tables.

Specify a partition scheme when creating a table.

Specify a transaction.

Implement a view.

Create an indexed view.

Create an updateable view.

Assign permissions to a role or schema for a view.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Implement triggers.

Create a trigger.

Create DDL triggers for responding to database structure changes.

Identify recursive triggers.

Identify nested triggers.

Identify transaction triggers.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Implement functions.

Create a function.

Identify deterministic versus nondeterministic functions.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Implement stored procedures.

Create a stored procedure.

Recompile a stored procedure.

Assign permissions to a role for a stored procedure.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Implement constraints.

Specify the scope of a constraint.

Create a new constraint.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Implement indexes.

Specify the filegroup.

Specify the index type.

Specify relational index options.

Specify columns.

Specify a partition scheme when creating an index.

Disable an index.

Create an online index by using an ONLINE argument.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Create user-defined types.

Create a Transact-SQL user-defined type.

Specify details of the data type.

Create a CLR user-defined type.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Implement a full-text search.

Create a catalog.

Create an index.

Specify a full-text population method.

The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Implement partitions.

Thursday, May 22, 2008

Could not show files even though uploaded :
check that the folder is an application root in IIS !!

When changes not talking effect be sure to press the refresh button on the browser AND press F5 !!!


Database Connection Strings
cs = string.Format(cs, Server.MapPath("\_database\ASPNETDB.mdb"));
The server.mappath function returns a full physical path e:webdevttcom001htdocsetc to the database with the relative path provided

For ASPdatasource control, the path will be :
DataFile="/_database/ASPNetDB.mdb"

Another way is :
string d = System.Web.HttpContext.Current.Server.MapPath("/_database/ASPnetDB.mdb");

The location of the page that calls the path is irrelevant, since we are pathing from the root /

Wednesday, May 14, 2008

jobs.joelonsoftware.com

jobs.joelonsoftware.com: "Technical Requirements:
• BS degree in Computer Science or equivalent
• At least 2+ years experience in developing complex web applications using the .NET Framework 2.0, ASP.NET, C#, AJAX, IIS 6, and best of breed tools & technologies.
• Intimate knowledge of Javascript, CSS, HTML, XML and other basic building blocks of web development
• At least 2+ years experience in working with Relational Databases, SQL, T-SQL specifically Microsoft SQL Server 2000 and/or 20005
• Experience with Classic ASP, VB/VBScript a strong plus
• Experience with Web Services, XML and Service Oriented Architectures (SOAs) is a plus
• Experience with the full life cycle of web application development.
• Excellent testing skills: unit testing, browser testing and client side debugging
• Ability to develop efficient, well-documented, formatted and clean code

Additional Skills:
• Strong communication and written skills; must be able to write technical and functional specifications for features and products
• Strong attention to detail is required. Dedication to completing work on time-sensitive projects, strong project management skills a plus.
• Experience with agile development processes in addition to traditional software development methodologies and processes.
• Must be able to work in a fast-paced, res"

Gmail - RE: OSS alternatives to MS Office Sharepoint Server (MOSS)? - anand.narine@gmail.com

Gmail - RE: OSS alternatives to MS Office Sharepoint Server (MOSS)? - anand.narine@gmail.com: "Peter Wimbourne to computing

show details May 13 (1 day ago)


Reply


- Show quoted text -
********************************************************************
Computing - General Discussion on Computing in Trinidad and Tobago ********************************************************************
Anyone know of any?

http://www.microsoft.com/sharepoint/prodinfo/what.mspx




regards

- peter wimbourne

--

Spam-Free mailboxes and Modus Anti-Spam Server blockades
McAfee anti-virus and network Security licensing and support.


--------------------------------------------------------------
To RECEIVE: send email to: computing-request@opus.co.tt
with the word JOIN in the message body.

To DISCONTINUE: send email to computing-request@opus.co.tt
with the word LEAVE in the message body.
--------------------------------------------------------------
------------------------------------------------------------
Help develop Computing in Trinidad and Tobago....
forward *THIS* copy to your colleagues and tell them to join!
------------------------------------------------------------
Reply

Forward"

Gmail - [ttcs] Digest Number 2531 - anand.narine@gmail.com

Logparser 2.2 is the tool for analysing IIS logs - asked in a TTCS question

http://www.iis.net/downloads/default.aspx?tabid=34&g=6&i=1287

Alternatively you can log to SQL Server and use SQL Reporting Services"

Tuesday, May 13, 2008

The Official Microsoft ASP.NET Site

The Official Microsoft ASP.NET Site: "New Podcasts Have Been Added
New Podcasts Have Been Added
Visit the Podcasts page to learn from well-known .NET developers in the community. Listen to hours of radio shows from .NET Rocks!, Hanselminutes, Polymorphic Podcast, ASP.NET Podcast, and more."

easy

yes it is

Microsoft Content Management Server: Home

Microsoft Content Management Server: Home: "The Future of Content Management Server 2002

Based on extensive customer feedback, we have integrated the Web content management capabilities of CMS 2002 into the new Microsoft Office SharePoint Server 2007 and added new functionality for enterprise content management, business intelligence, and search. If you're looking for Web content management functionality from Microsoft, check out Office SharePoint Server 2007."

Don't develop new cms, one already exists from microsoft in the name of sharepoint server 2007 !

BACK IN ORDER !

UML passpaper question 2008

Case - loan process - request loan -> request form, check credit status, draw contract, set interest rate,

Problems - what are the classes ? These are the things which we will store info about in the database - contract, request form, customer, pricing, etc.

Architecture describes the organizational structure, relationships, reversable into components, interactions .....
What makes a good architecture ? 20 marks

Draw DFD, FEM, then now the owner wants to make the system available as a web service. what changes to the
design ? - Object orientation ?

Difficulties in the exam - draw boxes and arrows free hand no time for ruler at all.



BPI vs, BPA vs BPR - give examples

--------------------------------------------------------------------------------------------------------

Why UML
big projects

All the UML diagrams model requirements and design of the system but
each diagram looks at the problem in a different way - functional, static or dynamic view.
They provide a complete and overlapping picture of the objects being modeled.
They can assess the complexity of a system eg, activity diagram

A fundamental concept of the Unified Modeling Language (UML) is that you use different diagrams for different purposes. Class diagrams are used to model the static nature of your system, sequence diagrams are used to model sequential logic, and state machine diagrams are used to model the behavior of complex classes.
This gives different perspectives which would have otherwise produced systems not meeting the requirements of stakeholders

Functional view -
The Use case diagram and the Activity diagram model how the system is supposed to work
They define the functions that the system must provide.

Use case diagram - describes the features that users expect the system to provide
Activity diagram - describes processes, including sequential tasks, conditional logic and concurrency.




Static view
Provides a snapshot or blueprint of the elements of a system but does not tell how the elements will behave.
The resources of the system are defined.
eg Class diagram -

Dynamic view -
Includes diagrams that reveal how objects interact with one another, in response to the environment.
eg. sequence and collaboration and state diagrams
STD - describe how and why an object changes over time.




USE CASE
Use cases are features of the system
Use cases show a functional view
Associations _____ indicate which actors will access which features of the system

Dependency - describes the nature of the relationships between use cases.
Includes <<include>> A -------> B A use case will always need help or call use case B
Extends <<extend>> A <-------B A use case may need help from B

Generalization One use case or actor inherits all the properties of another use case / actor ( arrow with a triangle at the end)




CLASS DIAGRAM
Class Diagrams show a logical view (static)
Like an ERD, shows cardinality (multiplicity), and attributes
Classes are depicted as boxes with three sections, the top one indicates the name of the class, the middle one lists the attributes of the class, and the third one lists the methods
associative class - like a relationship between example person rents dvd - rental is an associative class that removes the many to many relationship
between person and dvd. It will have attributes as date due. and date borrowed.





INheritance : Very often two or more classes will share the same attributes and/or the same methods.




.




DYNAMIC MODELS

Dynamic model diagrams show how runtime objects act out a use case by sending messages to each other. There are two sorts of dynamic-model diagrams: Sequence Diagrams and Collaboration Diagrams.vThey describe how objects collaborate. (collaboration, sequence diagrams)
Collaboration diagram -
show how the behavior of several objects collaborating together to fulfill a common purpose
show the message flow between objects in an OO application and also imply the basic associations (relationships) between classes.
State, Sequence (time focus), Collaboration (space focus), Activity (work focus), diagrams are used to express the behaviour of a system


COLLABORATION DIAGRAM

In O-O systems functionality is produced by objects working together
•Each object provides only a small element of functionality
•Objects work together (collaborate) by passing messages (labelled arrow)

Purpose:
To deliver functionality to a use case
To deliver functionality to an operation
To show how messages are passed between objects
To model different scenarios
To identify the classes that participate in a use case (early stages of project)

A message is an operation call that an object makes on another object


SEQUENCE DIAGRAM
A sequence diagram shows the interaction between objects during a certain period of time
Each sequence diagram shows only the interactions pertinent to a specific use case
Shows the same interaction as in collaboration diagrams but emphasise the order of the messages over time


Simple Restaurant Sequence Diagram

Simple Restaurant Sequence Diagram




DIFFERENCES
The main difference between communication diagrams and sequence diagrams is that sequence diagrams are good at showing sequential logic but not that good at giving you a “big picture view” whereas communication diagrams are the exact opposite.

They Model the same aspects of the system
Can be converted into one another
Collaboration diagrams do not show information about timing constraints
Sequence diagrams do not show the links between objects



http://www.agilemodeling.com/artifacts/communicationDiagram.htm

Sequence diagrams model the sequential logic of a use case.


OO approach to system development - shows things like inheritance, aggregation, encapsulation and association)
same notation of diagrams eg. in sequence and collaboration diagrams - consistency of the UML.

UML notation can be useful during the requirements gathering stage. For instance, use case diagrams will show the users what they must do, as well as what the system will do for them.

Introducing the UML (Unified Modeling Language)

As the world becomes more complex, the computer-based systems that inhabit the world also must increase in complexity. They often involve multiple pieces of hardware and software, networked across great distances, linked to databases that contain mountains of information. If you want to make systems that deal with this, how do you get your hands around the complexity?

The key is to organize the design process in a way that clients, analysts, programmers and other involved in system development can understand and agree on. The UML provides the organization.

Consider this: Would you tell a building contractor that you want a 4 bedroom, 3 bath home, about 2000 square feet - Start building it! We'll hammer out the details as we go along? We all know this is ludicrous. But sadly, this method of development is all too common in the software industry. Just as you would work with an architect to design a blueprint that would diagram exactly how the house is to be built, you will work with us on an UML diagram that will document exactly how your custom software system will be built.

The UML was released in 1997 as a method to diagram software design. It was designed by a consortium of the best minds in object oriented analysis and design. It is by far the most exciting thing to happen to the software industry in recent years. Every other engineering discipline has a standard method of documentation. Electronic engineers have schematic diagrams, architects and mechanical engineers have blueprints and mechanical diagrams. The software industry now has UML.

Before we move on next lesson consider some of the benefits of UML:

1 Your software system is professionally designed and documented before it is coded. You will know exactly what you are getting, in advance.
2 Since system design comes first, reusable code is easily spotted and coded with the highest efficiency. You will have lower development costs.
3 Logic 'holes' can be spotted in the design drawings. Your software will behave as you expect it to. There are fewer surprises.
4 The overall system design will dictate the way the software is developed. The right decisions are made before you are married to poorly written code. Again, your overall costs will be less.
5 UML lets us see the big picture. We can develop more memory and processor efficient systems.
6 When we come back to make modifications to your system, it is much easier to work on a system that has UML documentation. Much less 'relearning' takes place. Your system maintenance costs will be lower.
7 If you should find the need to work with another developer, the UML diagrams will allow them to get up to speed quickly in your custom system. Think of it as a schematic to a radio. How could a tech fix it without it?
8 If we need to communicate with outside contractors or even your own programmers, it is much more efficient.
Uml2.gif (2126 bytes)Using The Unified Modeling Language will result in lower overall costs, more reliable and efficient software, and a better relationship with all parties involved. Software documented with UML can be modified much more efficiently. Your software will have a future.

















Editorial

The average DBA has to perform many routine checks on his or her servers. There will be daily checks, weekly checks and, probably, monthly checks. A short while ago, we were having quite a debate about what items would be on the DBA Daily checklist. Because we all like lists with ten items in them, we compiled a list that goes something like this:

  1. Connectivity: Make sure each database is available and accessible both by logging in via user applications, as well as running test scripts.
  2. Backups: Check database and log backups, archiving and offsite storage.
  3. Events: check all database logs, application logs and system logs, Agent history, device logs, NIC logs etc. Investigate any job failures
  4. Processes: Check that all required processes on the server are running, including Replication
  5. Integrity: Perform all database and server integrity checks; look for objects that break rules
  6. Indexes: Check on indexes to see if they are being used, need re-creating, or if any are missing
  7. Volumetrics: Check resources on the server such as files sizes and disk space, and monitor growth
  8. Performance: Check application performance, and performance statistics, using the Perfmon tool; research and resolve any issues.
  9. Procedures: Check all Disaster Recovery Plans
  10. Security: Look for security policy violations


Selecting the database recovery model to ensure proper backups

Written By: Edgewood Solutions Engineers -- 5/13/2008 Join our mailing list! Problem
One of the first things that should be done when managing SQL Server is to setup an appropriate backup plan in order to minimize any data loss in the event of a failure. Along with setting up a backup plan there are certain database configurations that need to be setup to ensure you are able to backup databases correctly. In this tip we will look at the different recovery models that SQL Server offers and how to choose a recovery model for your database.

Solution
For SQL Server 2000 and 2005, Microsoft offers three different recovery models for your databases. Each database on your server can be setup differently and you also have the ability to change the recovery model as needed, so this choice is not permanent.

The three recovery models are:

Simple
The simple recovery model does what it implies, it gives you a simple backup that can be used to replace your entire database in the event of a failure or if you have the need to restore your database to another server. With this recovery model you have the ability to do complete backups (an entire copy) or differential backups (any changes since the last complete backup). With this recovery model you are exposed to any failures since the last backup completed. Here are some reasons why you may choose this recovery model:

  • Your data is not critical and can easily be recreated
  • The database is only used for test or development
  • Data is static and does not change
  • Losing any or all transactions since the last backup is not a problem
  • Data is derived and can easily be recreated

Type of backups you can run:

  • Complete backups
  • Differential backups
  • File and/or Filegroup backups
  • Partial backups
  • Copy-Only backups

Bulk_Logged
The bulk logged recovery sort of does what it implies. With this model there are certain bulk operations such as BULK INSERT, CREATE INDEX, SELECT INTO, etc... that are not fully logged in the transaction log and therefore do not take as much space in the transaction log. The advantage of using this recovery model is that your transaction logs will not get that large if you are doing bulk operations and you have the ability to do point in time recovery as long as your last transaction log backup does not include a bulk operation as mentioned above. If no bulk operations are run this recovery model works the same as the Full recovery model. One thing to note is that if you use this recovery model you also need to issue transaction log backups otherwise your database transaction log will continue to grow. Here are some reasons why you may choose this recovery model:

  • Data is critical, but you do not want to log large bulk operations
  • Bulk operations are done at different times versus normal processing.
  • You still want to be able to recover to a point in time

Type of backups you can run:

  • Complete backups
  • Differential backups
  • File and/or Filegroup backups
  • Partial backups
  • Copy-Only backups
  • Transaction log backups

Full
The full recovery model is the most complete recovery model and allows you to recover all of your data to any point in time as long as all backup files are useable. With this model all operations are fully logged which means that you can recover your database to any point. In addition, if the database is set to the full recovery model you need to also issue transaction log backups otherwise your database transaction log will continue to grow forever. Here are some reasons why you may choose this recovery model:

  • Data is critical and data can not be lost.
  • You always need the ability to do a point-in-time recovery.
  • You are using database mirroring

Type of backups you can run:

  • Complete backups
  • Differential backups
  • File and/or Filegroup backups
  • Partial backups
  • Copy-Only backups
  • Transaction log backups

Changing Recovery Models

The recovery model can be changed as needed, so if your database is in the Full recovery model and you want to issue some bulk operations that you want to minimally log you can change the recovery model to Bulk_Logged complete your operations and then change your database model again. The one thing to note is that since there will be a bulk operation in your transaction log backup that you can not do a point in time recovery using this transaction log backup file that contains this bulk operation, but any subsequent transaction log backup can be used to do a point in time recovery.

Also, if your database is in the Simple recovery model and you change to the Full recovery model you will want to issue a full backup immediately, so you can then begin to also do transaction log backups. Until you issue a full backup you will not be able to take transaction log backups.

To change the recovery model you can use either SQL Server Management Studio or T-SQL as follows:

Management Studio

  • Right click on the database name, select Properties, select the Options tab and select recovery model from the drop-down list and select OK to save.

T-SQL

-- set to Full recovery
ALTER DATABASE AdventureWorks SET RECOVERY FULL
GO

-- set to Bulk Logged recovery
ALTER DATABASE AdventureWorks SET RECOVERY BULK_LOGGED
GO

-- set to Simple recovery
ALTER DATABASE AdventureWorks SET RECOVERY SIMPLE
GO

Next Steps

  • Now that you know what recovery models exist, take the time to check your databases and setup the appropriate model and backup plan
  • As mentioned you can change the model as needed, so use this to your advantage if you need to run some large bulk operations such as a bulk insert or a lot of index rebuilds
Forum Posts


Despite China’s Rapid Growth, India Is Still Outsourcing Leader

IDC last summer came out with a prediction that China would overtake India as the globe’s favored site for outsourcing by 2011.

While there’s no doubt China’s outsourcing industry is experiencing rapid growth, it has much ground to cover to catch India. According to a Reuters story, China exported an estimated $1.8 billion in software and services in all of 2006, vs. India’s estimated $41 billion in such revenues in 2008’s first quarter.

Its limited exposure to the U.S. recession is currently working in China’s favor. U.S. companies account for three-quarters of India’s outsourcing business, leading Indian companies like Infosys and Wipro to expand their presence in other parts of the world as slowing economic conditions cause some U.S. clients to delay major IT projects.

China’s crowded outsourcing industry has yet to produce dominant giants like India’s Tata, Infosys and Wipro. One of the leaders, according to Reuters, is VanceInfo Technologies, with clients IBM and Microsoft accounting for 40 percent of its net revenue in 2006. It has logged an astonishing 80 percent annual revenue growth over the last three years.

Yet VanceInfo’s CFO, Sidney Huang, says it will take “years, if not decades” for Chinese companies to match their Indian competitors. Most Chinese companies do not yet have the scale or sophistication to snag contracts like the multi-million dollar deal to modernize the China Foreign Exchange Trade System’s trading system, won by India’s Tata last year.

Tata, Infosys, Wipro and Satyam Computer Services have all established operations in China over the last three years, according to Reuters. Among their challenges are intellectual property issues and difficulties recruiting local workers.

Multi-national companies like EDS are also making major stakes in China. As I wrote in November, EDS expects to increase its Chinese staff more than five times over by 2010, with a goal of employing 5,000 workers.


testing

new post may 13 2008

Sunday, April 23, 2006

Boost Wireless Signal

Any device can be setup to broadcast a wireless signal. This includes access points and
wireless pci/usb cards. All that is required is to go into the advanced wireless properties
and enter a ssid (wireless network name), set the authentication (if any) and that's it.
Other devices when searching for wireless networks in range will find yours.
I am looking for any hardware that will boost the signal of this network. A search on
the internet reveals there are antennas/amplifiers that can do the job.
1 mile antennas can be connected to replace the antenna on your access point.

Sunday, March 05, 2006

cbts

dowloading all cbts possible
trainsignal learnkey testout nuggets lynda vtc

Saturday, February 04, 2006

Downloading SQL server 2005 dvd edition, many parts should be finished by weekend.
This weekend: To edit excel Report, and Setup cisco Remote access vpn. This requires the basics
such as call setup, and key exchange etc.