Monday, January 3, 2011

Connect to remote computer using code ...

Connect to remote computer using code ...

PHOTOSHOP MATERIALS

If you are intersted in photoshop and want to be expert in it then in the link given below there are nice material collection with simple understandable procedure make use of it and learn...

http://webmaster-tutorials.net/2010/07/11/55-photoshop-beginner-tutorials/

EXCELLENT .NET 2010 WITH SCRREN SHOT AND PROGRAM MATERIAL

http://blogs.msdn.com/b/adonet/archive/2010/07/19/absolue-beginners-guide-to-entity-framework.aspx

In this above link nice .net new latest version 2010 screen and step by step approach was given follow and have a clear basic idea about hoe to open .net and how to do program in visual studio 2010.

MCA STUDENTS PLACEMENTS(JKC STUDENTS ALSO)

PATNI COMPUTERS
 
 
Patni Computers Consortium written test on 5th January 2011 will start at 8.30 a.m at Anna Auditorium.


Branches:

B.Tech (CSE, IT, ECE, EEE and EIE) and MCA

Eligibility Criteria:

 60 % in pursuing degree and no current arrears.

 60% and above in 10th, 12th, UG as applicable.

 Should not have any GAP in education (during his/her graduation)

 Readiness to work at any Patni Location: Mumbai/Pune/Chennai/Bangalore/Hyderabad/Noida/Gandhinagar

 Readiness to sign a Service Agreement of 2 years with Patni at the time of joining.

Website:               http://www.patni.com/

Compensation:      Rs.3 Lakhs per annum.

Please ask your students to carry the following:

1. Writing Pad for the written test
2. Resumes - 2 copies
3. All Certificates and mark lists
4. Passport Size Photos – 2 copies
5. Appear for the Test in formal dress.

Important Note:

Only registered students of VIT Placement consortium would be allowed to participate in the selection process.

Thursday, December 23, 2010

Infosys Recruitment Process for 2011 Passingout students through JKC (online assessment test)

Infosys Recruitment Process for 2011 Pass Outs

The students are informed to attend the online assessment test on 24/12/2010 at SITAMS. For details contact TPO.

Eligibility Criteria:

• Candidates of the institutions which are established in the year 2005 or before are eligible

• Candidate should have 60% or more in class 10th, 60% or more in Intermediate / Diploma and 68% or more in B. Tech / Degree (for MCAs they should have 68% or more in MCA)

• All the eligible candidates are supposed to appear for 2 online assessment tests by 10th January 2011 which would be conducted by JKC.

• Only the candidates who are eligible as per the mentioned eligibility criteria and who appear for the 2 online assessment tests are allowed to participate in the recruitment events

• A mail will be sent to all the JKC registered students with the instructions to take these online assessments soon



Recruitment Schedule:

• JKC is planning to schedule the Infosys recruitment events for 2011 pass outs from 3rd Week of January 2011, confirmed schedules would be communicated soon

• For each recruitment event the eligible candidates of that region would be mapped and hall tickets would be sent to their respective colleges as well to the candidates



Selection Process:

• Written Test (Aptitude and English)

• HR / Behavioral Interview



Instructions for eligible candidates:

• All the eligible candidates are here by instructed to appear for 2 online assessment tests

• Candidates are requested to prepare according to the recruitment pattern of Infosys

• Candidates are requested to prepare well on arithmetic, aptitude, verbal, reasoning and particularly the reading comprehension. It was observed that most of the candidates are disqualified in the written test due to their non performance in with English and reading comprehension.

• So the candidates are advised to more exercise on reading comprehensions

• Candidates are advised to assess their performance based on their scores in the online assessments conducted by JKC and work on their weak areas

HCL Technologies at VIT

HCL Technologies Online test is Scheduled on 30th December 2010 at VIT University, Vellore.

Thursday, December 16, 2010

Accenture Seating arrangement at VIT

Please find below the seating arrangements for the Acenture’s Consortium Interview on 18th December 2010 (Saturday).




Batch 2              Dr. Channa Reddy Auditorium                                10.00 a.m



The students has to carry the following:



1. Please bring writing pad to the test.

2. Appear for the Test in formal dress.

3. Carry 2 copy of your Resumes, 3 stamp size photographs, Photocopy of Photo ID Proof (College Photo ID Card), Pencil, Pen and Original & photo copies of the mark sheets from 10th standard onwards.



Important Note:

Only registered students of VIT Placement consortium would be allowed to participate in the selection process.

Wednesday, December 15, 2010

HCL Technologies at VIT on 4th January 2011

This is to inform to all the VIT placement registered students of B.Tech final year that there will be a placement drive by HCL through VIT Palcement Consortium, VIT University on 4th January 2011 at VIT university. The details are as follows.


HCL Technologies Consortium Interview on 4th January 2011 (Tuesday) will start at 8.30 a.m at Anna Auditorium.

Branches : B.Tech (CSE, IT, ECE, EEE and EIE)

Eligibility Criteria: 60 % in pursuing degree and no current arrears.

The students have to carry the following:

1. Writing Pad for the written test

2. Resumes - 2 copies

3. All Certificates and mark lists

4. Passport Size Photos – 2 copies

5. Appear for the Test in formal dress.

Important Note:

Only registered students of VIT Placement consortium would be allowed to participate in the selection process.

Accenture through VIT on 18th December 2010

This is to inform to all the VIT placement registered students of B.Tech and MCA final year that there will be a placement drive by ACCENTURE through VIT Palcement Consortium, VIT University on 18th December 2010 at VIT university. The details are as follows.


Accenture’s Consortium Interview on 18th December 2010 (Saturday) will start at 8.00 a.m at Anna Auditorium.



Branches: B.Tech (CSE, IT, ECE, EEE and EIE), MCA



Eligibility Criteria: 60 % in pursuing degree and no current arrears.



CTC: 3 Lakhs per annum



Students have to carry the following:

1. Please bring writing pad to the test.

2. Appear for the Test in formal dress.

3. Carry 2 copy of your Resumes, 3 stamp size photographs, Photocopy of Photo ID Proof (College Photo ID Card), Pencil, Pen and Original & photo copies of the mark sheets from 10th standard onwards.

NEW MCA TOPICS DEC 2010

1. Tracking and Positioning of Mobiles in Telecommunication
2. Palmprint Authentication Application
3. Security in Mobile Database Systems
4. Multicasting in Ad Hoc Networks
5. Brain Finger Printing
6. Future of the internet
7. Computer vision
8. Raising Technologies
9. Open-Rar
10. Intrusion Detection System
11. Taxonomy of S/w Testing Tools
12. Power of Grid Computing
13. HomeRF- localized wireless technology optimized forthe home environment
14. Wireless Application Protocol
15. Computational Methods for Bankruptcy Prediction
16. Honey Pots
17. Next Generation Protocol (IPv6)
18. Peer 2 Peer Web Services
19. Embedded Auditors for Intrusion Detection
20. Recognition of VoIP Speech
21. Assisted GPS
22. Multiterabit Networks
23. Bio-metrics
24. Radio Network Controller for 3G mobile and wireless network devices
25. Software model checking
26. Fiber Optic technology
27. Algorithms and Computation Theories
28. Graphic processing Unit
29. Domotics
30. Cell Phones beyond Call & Sms
31. C Sharp (C#)
32. Image Water Marking
33. Intrution Detection System
34. Real-time Transport Protocol (RTP)
35. Digital photography & music
36. Fusion Memory
37. M – Commerce
38. Wireless Technologies (bluetooth, 802.11x, IRDA)
39. Mobile Commerce
40. Load Balancing in Internet
41. Intel MMX Technology
42. VPN Server
43. Earth Simulator- Fastest Supercomputer
44. DNA Based computer
45. Expert Systems and decision making
46. S/w Testing Tools
47. Recent Trends in Cryptography
48. Technologies and successful applications for direct and multihop ad hoc networks
49. Zornbie Computers
50. Wireless Network Devices and digital convergence
51. Aspect-oriented programming (Aop)
52. Real Time Speech Translation
53. New Age Graphics
54. New Dimension of Data Security using Neural Networks and Numerical Functions
55. Diskless Network storage Controller
56. 4G- Wireless
57. Routing In Mobile Ad Hoc Networks
58. ATM Virtual connections
59. Voice Portals
60. NVSRAM- Non Volatile Static RAM
61. High Altitude Aeronautical Platforms
62. Artificial Intelligence and Neural Networks
63. Printed Memory Technology
64. Advanced Mobile Presence Technology
65. Future Programming Techniques and Concepts
66. 3D Internet
67. DART
68. Magnetic Random Access Memory
69. High Capacity Flash Chips
70. IRIS Recognization
71. Load Balancing in Parallel Computers
72. Agent Based Systems and Applications
73. Embedded web server for remote access
74. Mobile Tele Communication
75. Biometrics Authentication systems
76. Embedded web server for remote access
77. Adhoc Networks
78. Advanced Processors
79. Probabilistic I/o Automata
80. Mobile ad hoc network (MANET)
81. Near Filed Communication (NFC)
82. Rising Technology GIES
83. VQ In Converging Telephony And Ip Networks
84. Privacy Preserving Data Mining
85. Pocket Doctor
86. Java Card
87. News Groups
88. Fuzzified Computer-Automated Crane Control System
89. Infini band
90. UMA (Unlicensed Mobile Access)
91. Mind Reading Phones
92. Auto-pilot for IT systems
93. Blade Servers
94. Botnet Security Threats
95. Proactive computing
96. Information Extraction modes & techniques
97. The SAT (SIM Application Toolkit)
98. WBM(Web based mobile)
99. Nonvolatile Flash Memory
100. Self Healing Computers
101. GSM Security And Encryption
102. Embedded systems
103. Signal Integrity Fundamentals for Digital Design
104. i – Planet
105. Digital Watermarking Applications and Advantages
106. HCI (Human Computer Interaction ) in software applications
107. Information or Data Visualizing Techniques

NEW MCA TOPICS DEC 2010

1. Tracking and Positioning of Mobiles in Telecommunication
2. Palmprint Authentication Application
3. Security in Mobile Database Systems
4. Multicasting in Ad Hoc Networks
5. Brain Finger Printing
6. Future of the internet
7. Computer vision
8. Raising Technologies
9. Open-Rar
10. Intrusion Detection System
11. Taxonomy of S/w Testing Tools
12. Power of Grid Computing
13. HomeRF- localized wireless technology optimized forthe home environment
14. Wireless Application Protocol
15. Computational Methods for Bankruptcy Prediction
16. Honey Pots
17. Next Generation Protocol (IPv6)
18. Peer 2 Peer Web Services
19. Embedded Auditors for Intrusion Detection
20. Recognition of VoIP Speech
21. Assisted GPS
22. Multiterabit Networks
23. Bio-metrics
24. Radio Network Controller for 3G mobile and wireless network devices
25. Software model checking
26. Fiber Optic technology
27. Algorithms and Computation Theories
28. Graphic processing Unit
29. Domotics
30. Cell Phones beyond Call & Sms
31. C Sharp (C#)
32. Image Water Marking
33. Intrution Detection System
34. Real-time Transport Protocol (RTP)
35. Digital photography & music
36. Fusion Memory
37. M – Commerce
38. Wireless Technologies (bluetooth, 802.11x, IRDA)
39. Mobile Commerce
40. Load Balancing in Internet
41. Intel MMX Technology
42. VPN Server
43. Earth Simulator- Fastest Supercomputer
44. DNA Based computer
45. Expert Systems and decision making
46. S/w Testing Tools
47. Recent Trends in Cryptography
48. Technologies and successful applications for direct and multihop ad hoc networks
49. Zornbie Computers
50. Wireless Network Devices and digital convergence
51. Aspect-oriented programming (Aop)
52. Real Time Speech Translation
53. New Age Graphics
54. New Dimension of Data Security using Neural Networks and Numerical Functions
55. Diskless Network storage Controller
56. 4G- Wireless
57. Routing In Mobile Ad Hoc Networks
58. ATM Virtual connections
59. Voice Portals
60. NVSRAM- Non Volatile Static RAM
61. High Altitude Aeronautical Platforms
62. Artificial Intelligence and Neural Networks
63. Printed Memory Technology
64. Advanced Mobile Presence Technology
65. Future Programming Techniques and Concepts
66. 3D Internet
67. DART
68. Magnetic Random Access Memory
69. High Capacity Flash Chips
70. IRIS Recognization
71. Load Balancing in Parallel Computers
72. Agent Based Systems and Applications
73. Embedded web server for remote access
74. Mobile Tele Communication
75. Biometrics Authentication systems
76. Embedded web server for remote access
77. Adhoc Networks
78. Advanced Processors
79. Probabilistic I/o Automata
80. Mobile ad hoc network (MANET)
81. Near Filed Communication (NFC)
82. Rising Technology GIES
83. VQ In Converging Telephony And Ip Networks
84. Privacy Preserving Data Mining
85. Pocket Doctor
86. Java Card
87. News Groups
88. Fuzzified Computer-Automated Crane Control System
89. Infini band
90. UMA (Unlicensed Mobile Access)
91. Mind Reading Phones
92. Auto-pilot for IT systems
93. Blade Servers
94. Botnet Security Threats
95. Proactive computing
96. Information Extraction modes & techniques
97. The SAT (SIM Application Toolkit)
98. WBM(Web based mobile)
99. Nonvolatile Flash Memory
100. Self Healing Computers
101. GSM Security And Encryption
102. Embedded systems
103. Signal Integrity Fundamentals for Digital Design
104. i – Planet
105. Digital Watermarking Applications and Advantages
106. HCI (Human Computer Interaction ) in software applications
107. Information or Data Visualizing Techniques