Thursday, October 13, 2011

How to Succeed Professionally When All Jobs are Temporary

In today’s world, everyone is a temporary worker.
Even if you’re an executive at a well-established company, your job could be temporary. Working for yourself? There’s no telling how long your business might last.
Particularly in a down economy and a tight job market, it’s important to keep this in mind. Companies downsize. People get fired or laid off. The market changes. And while you might find another job in your field, your career is likely less stable than the careers your grandparents had years ago.
You may be tempted to get comfortable in your job because it doesn’t seem threatened at the moment. But as recent news goes to show, the multitude of jobs that seemed like they would be around forever are disappearing. Several cases in point: Bank of America laying off 30,000 workers, Borders bookstore closing, and even the U.S. Postal Service closing offices across the country.

How can you prepare for these inevitable changes in your career? Here are a few ways to safeguard your income:

Create a strong personal brand. Although your current job and career play a part in your professional brand, your personal brand is something that stays with you throughout your entire career, no matter where you end up working. Get active online, share and create relevant content, and give people a reason to remember – and hire – you.
Continually build upon your skills and education. Stay on top of news and trends within your industry. If your company won’t pay for professional development, figure out other ways to make it a priority. Learn new skills by attending webinars, conferences and training sessions, and gain skills that will help you regardless of whether you decide to move up in your current career or transition into a related field.
Build a professional portfolio. Keep track of your accomplishments, work pieces, recommendations and referrals in one place. Consider securing your own domain name ( to house your professional portfolio. That way, when it comes time for a new job search, you’ll have everything you need all in one place.
Have a back-up career. When I was laid off from my job in public relations a few years ago, I realized the importance of starting my own side business to ensure I always had a job. Now, my back-up career is my full-time one. You never know how things will pan out, and you can no longer count on a company to keep you employed. So think outside the box about how you can grow your own side gig that can serve as a back-up plan. Thanks to the Internet and social networking, it’s easier to start your own business than ever before.
Maintain your professional network. Networking is still one of the top ways to land a new job. By keeping in contact with your professional connections, you’re more likely to learn about new job opportunities, gain referrals and make additional connections. And if you do lose your job, you’ll have a network to turn to for help.

Τοπική Αυτοδιοίκηση Απεργία

Πολεμούμε να συντηρήσουμε τα κεκτημένα δηλαδή να πληρωνόμαστε χωρίς να εργαζόμαστε (να πηγαίνουμε Σουπερ Μάρκετ στις ώρες εργασίες και να ταλαιπωρούμε τον κόσμο που μας πληρώνει τους μισθούς) .

Ξέρεις τι είναι να κερδίζεις μια θέση στο Δήμο γλύφοντας και έρποντας και ύστερα να σε υποχρεώνουνε να δουλεύεις ; ΟΧΙ, αν δεν συντηρήσουμε το δικαίωμα στην πληρωμένη τεμπελιά, θα σύρουμε την χώρα, μαζί μας, στα Τάρταρα..

Tuesday, October 11, 2011

RIM needs a New Strategy

The industry lost an icon in Steve Jobs, but as we mourn and celebrate the life of the late chairman and former CEO of Apple Inc. (Nasdaq: AAPL), we also must face the other realities confronting everyone in the electronics industry. Even Apple itself cannot afford to be so deeply immersed in mourning that the company's product offering, technology strategy, and growth trajectory begin to suffer. That's why I suggested in a recent blog that the entire industry needs to turn the page on Jobs's "greatness" and his achievements and legacy. It's time to build something new. (See: Steve Jobs Is Gone; Turn the Page.)
Will the industry remain on Apple-watch or begin innovating beyond Apple, the bellwether? Will a new, dynamic, and groundbreaking product come from a company other than Apple, or will companies like Research in Motion, Motorola Mobility, Samsung, and Sony-Ericsson continue to wait for the next market-leading offering from Cupertino, Calif.? It's time to stop chasing Apple's skirt. In order to do this, however, RIM must first ask tough questions about its current strategy. (See: RIM Needs to Dump the PlayBook.)
Another report says an investor has repeated its request for RIM to explore options that would improve its market value. It's not clear what the options would be, but I expect these could include a sale of assets or a merger with another company. Do you agree?
There are other issues facing the industry and the wider economy. As Michael Wood insists in his blog, the unemployment situation in the United States and financial pressures elsewhere point to a double-dip recession. Is he correct? Personally, I think Wood is onto something here. You don't have to be a genius to know chip sales are slowing, for instance. Manufacturers are already announcing that sales might be lower in the third quarter. (See: It's a Double-Dip Recession.)


I have a sadly neglected account at redbubble.
It is a little less sad now!
Do you have an iPhone?  You do?  Did you know that you always wanted a really cool iPhone cover with a cute Space Girl on it? No? Well, you do!

Starting today I have three (three!) cool iPhone case designs on redbubble!
If you scroll towards the bottom of the page you will see where you can click on links for the other 2

Hot Minissha Lamba Pictures images,Pics,Stills in Bikini ,Minisha wearing sexy saree

Hot Minissha Lamba Pictures images,Pics,Stills 
in Bikini ,Minisha wearing sexy saree, Cleavage


Salman Khan with Great Khali Pictures of Salman Khan with Great Khali, Great Khalis' Pictures

Salman Khan with Great Khali
Pictures of Salman Khan with Great Khali,  Great Khalis' Pictures

Rihanna Loses it for Esquire

And by it, I mean her hygiene. Some may consider these pics sexy and daring (yeah, the girl has a killer body) but to me it looks like she may have dirt in places where there shouldn't be dirt. A full body exfoliation is sometimes quite nice, but not if you've been buried alive and then fought your way out of the muck, and in the process lost some clothing. Poor thing. I hope she wasn't too traumatized by the experience.

[Image via Esquire Magazine]

What in the CRAP is this?!?!??!

I am almost at a loss for words. Almost. Apparently Lance Bass started a new boy band group, Heart2Heart (seriously), and their first single "Facebook Official" hit the web last week. At first I thought it was a parody, then I thought it was a joke, and then I realized that it might be legit. Omg, it's sooooooooooooo bad! The hair, the make-up, the excessive winking. I feel dirty. It's so bad it makes me uncomfortable. You know the world is ending when someone actually writes a song about Facebook. Damn you again Mark Zuckerberg!

Cisco Investor Ralph Nader Asks Company to Issue and Increase Divident

Ralph Nader, who is mostly known as a consumer advocate and presidential candidate, has asked John Chambers, Cisco's (Nasdaq: CSCO) CEO, to put together a special dividend and raise the current one.
Ralph Nader
Nader (Source: Wikipedia)
"My sense is that you really do not resonate with your shareholders who trusted you and relied on you," Nader said in a statement. "Give them the dividend respect their continuity with you deserves."
Nader wants Chambers to take part of the company's $38.9 million in cash and short-term investments to double its 24 cents a year dividend and issue a one-time $1 a share dividend.
Although Chambers has been taking drastic measures to realign the company, including wide-scale layoffs, investors remain apprehensive about the company's long-term revenue forecast of 5 to 7 percent, down from its previous 12-17 percent forecast.
"We engage with our shareholders consistently and value their input," said Karen Tillman, a spokeswoman for San Jose, Calif.-based Cisco. "We have moved aggressively and decisively with our action plan to deliver profitable growth and we continue to evaluate optimal use of capital, with a clear focus on providing consistent, meaningful return to shareholders."
Nader said that if Cisco does not make the one-time dividend and increase by the end of October, he said he will ask other shareholders to put aside a penny for each share they own so they can hire a "watchdog" to oversee the vendor's actions. Potential candidates for the watchdog role could be either a public interest lawyer or an "out-of-work investigative journalist."

Ten computer viruses that changed the world

Brain virus
It's almost 25 years since the first PC computer virus left users looking at corrupted floppies, lost work and perplexing messages. In that time, the state of the art in automated malfeasance has progressed to the point that it's part of the armoury of international geopolitics. Stuxnet, while still mysterious, left nobody in any doubt that viruses and worms can be used in the highest-stake game there is.
Along the way, hundreds of millions of infections have taken place, billions of dollars have been lost in productivity and broken systems, and the anti-malware industry has grown to become a significant player in the IT market. It's not over yet: perhaps it never will be, but the history of malware is a fascinating insight into the technology and culture of the digital world.
1. Brain (1986)
It sounded like science fiction, but it was all too real. Basit and Amjad Farooq Alvi, a pair of software programmers from Pakistan, became annoyed at people duplicating their products and created what was supposed to be a kill switch for illicit copies. But the design was flawed; the anti-copy software could duplicate itself — and did.
The first worldwide PC virus, Brain worked by changing the boot sector of a floppy. When an infected floppy was put into a computer, it installed Brain in the computer's memory, from where it infected new floppies as they were inserted.
The brothers included their names, address and phone numbers in the virus, ostensibly to offer their services to decontaminate infected computers. They subsequently regretted this.
Christmas Tree
2. Christmas Tree (1987)
A single design flaw can turn a harmless joke into a weapon. The Christmas Tree Exec was a script that ran under the Rexx language and did two simple things: it drew a Christmas tree, using text for graphics, and then sent a copy of itself to everyone in the target's email contacts list.
The original started on Earn, the European Academic Research Network, and spread quickly to the US equivalent, Bitnet. The infection then hopped over to IBM's internal VNET, where it took advantage of the IBM habit of having really large address books.
As the worm depended on running in an IBM mainframe environment, it didn't spread beyond those networks. It lasted six days on Bitnet and only four on VNET, where it was finally removed by shutting down the entire network.
Robert Morris
3. Morris worm (1988)
The first malware to be propagated widely via the internet, the Morris Worm or Great Worm hit around 6,000 of the 60,000 computers on the network in 1988.
Robert Morris (pictured), then a student at Cornell University, maintains that his worm wasn't malicious, but was designed to measure the size of the internet. Others took a different view, as the worm used a batch of security flaws in Unix and was launched surreptitiously.
It was certainly unwelcome, as it was far more aggressive at making copies of itself than it needed to be, often infecting machines multiple times, turning what might have been an easily contained annoyance into a powerful denial-of-service attack. Morris became the first person to be convicted under the 1986 US Computer Fraud and Abuse Act, and the incident led to the formation of the first Computer Emergency Response Team Coordination Center, CERT/CC.
Melissa virus
4. Melissa (1999)
Named after a lapdancer and released in a document posted to the Usenet newsgroup, Melissa had a salacious start in life. Users who opened the document, eager to read the 80 passwords to porn sites promised within, found that the document immediately forwarded itself to the first 50 people in their address book. Which could take a whole lot of 'splainin.
The virus created so much email that many companies had to turn off their internet gateway to regain control of their systems. As a result, the writer — a 30-year-old man called David Smith — got a 20-month prison sentence, despite helping the FBI track down and nab other virus writers.
5. ILOVEYOU (2000)
The ILOVEYOU worm was a devastatingly fast-spreading and effective combo of social engineering and Windows design flaw exploitation. The cost of clean-up and lost work due to the worm, also known as the Love Bug, is thought to total between $5bn and $10bn.
The worm was the work of two Filipino students who were caught, but the case was dropped because there was no applicable law at the time. ILOVEYOU used Microsoft's Visual Basic Scripting (VBS) to forward itself to the contents of the host's Outlook address book. It also overwrote files with copies of itself and tweaked the Windows registry.
It spread around 15 times faster than Melissa, according to the US Army. With at least 50 million computers infected and many large organisations having to shut off internet access, ILOVEYOU highlighted the vulnerabilities within Windows and sparked off large amounts of criticism and me-too infections.
Santy worm
6. Santy (2004)
A specialised worm that demonstrated quite how subtle attack vectors could be, Santy used search engines — Google at first, then Yahoo and AOL — to find vulnerable sites running phpBB bulletin board software, which it then attacked. It spread worldwide in less than three hours.
The most unusual aspect of the worm was that someone then produced an anti-Santy worm that used the same techniques to find and infect phpBB installations, but then patched the problem and inoculated the sites against further attack.
Conficker worm
7. Conficker (2008)
This Windows worm, also known as Downadup, hit up to 15 million Microsoft servers, causing operational problems for the British, German and French military among many others. Its use of encryption and stealth code hiding made it very difficult to eradicate, as have its constant revisions: it went through five major updates in six months.
Those revisions have demonstrated that the Conficker writers are closely observing and reacting to industry efforts to eradicate the malware. In response, Microsoft convened a working group of companies across the internet and security markets, and put up a $250,000 bounty for information leading to the conviction of the miscreants.
8. Stuxnet (2010)
The most sophisticated malware observed, this is a uniquely targeted worm that propagates via Windows and attacks industrial controller hardware — but only of a certain configuration (such as the Siemens S7-300 controller, above).
It is thought to have been designed to damage the Iranian nuclear programme, and may well have succeeded. When it finds its target system, it reprograms high-frequency motor controllers to operate in an intermittently out-of-specification way. It thereby upsets industrial processes in a manner that's hard to identify.
Although the authors of Stuxnet aren't known, reports earlier this year said that the malware was claimed as a success of the Israeli Defence Force, in a video shown at the retirement party of the force's chief of general staff, Lieutenant General Gabi Ashkenaz.
When Harlie Was One
9. When HARLIE Was One by David Gerrold (1972)
The first fictional computer virus was written by an errant, intelligent, eponymous computer that wanted to gather information about its creator for blackmail purposes. Although the propagation method described in When HARLIE Was One was unusual, it was apt for a time before the internet took off:
"You have a computer with an auto-dial phone link. You put the VIRUS program in it and it starts dialling phone numbers at random until it connects to another computer with an auto-dial. The VIRUS program then injects itself into the new computer."
The Shockwave Rider
10. The Shockwave Rider by John Brunner (1975)
If HARLIE lived in a world without computer networking, The Shockwave Rider saw the network as the most important part of new technology and one that could massively affect human society — and thus qualifies as a genuinely visionary pre-internet SF novel.
In the novel, worms and counter-worms are sent into the network to do battle by proxy on behalf of their writers; this often involves deception and identity theft. The nature of online identity, the role of online groups in shaping society, and the symbiosis between human and networks are all themes that bear examination more than 30 years on.

Germany accused of using Trojan to spy on citizens

The German authorities have been accused of putting out malware that is designed to spy on citizens, and has security flaws which could let third parties monitor people's computer usage or even plant false evidence.
Chaos Computer Club logo
The Chaos Computer Club has accused German authorities of putting out malware intended to spy on citizens. Image credit: Chaos Computer Club
The Chaos Computer Club (CCC), one of the world's pre-eminent 'white hat' hacker groups, said on Saturday evening that someone had anonymously sent it a copy of the malware, which it is calling 'Bundestrojaner light'. The group reverse-engineered and analysed the software, and found it could "not only siphon away intimate data but also offers a remote control or backdoor functionality for uploading and executing arbitrary other programs".
"Significant design and implementation flaws make all of the functionality available to anyone on the internet," the CCC said in a statement. The group accused the German authorities of being behind the malware, but did not provide evidence to back this up.
Privacy and data protection are taken very seriously in Germany, which previously saw massive surveillance operations by the Nazis and the Stasi. The country was the first to pass data-protection laws, and now has some of the strictest privacy safeguards in the world.
In 2008, the German constitutional court banned the use of state malware, dubbed 'Bundestrojaner' or 'federal Trojan', to spy on citizens' computer usage, beyond straight internet telephony interception. The government responded by saying it was introducing Quellen-TKÜ lawful interception software, which is only supposed to be used for VoIP wiretapping.

'Bundestrojaner light'

However, the CCC seems convinced that the malware it has just analysed is related to the original malware, and is therefore referring to it as 'Bundestrojaner light'.
It is even conceivable that the law enforcement agencies' IT infrastructure could be attacked through this channel.
– Chaos Computer Club
The fact that the Trojan can receive uploads of "arbitrary programs" from the internet and execute them remotely means "an 'upgrade path' from Quellen-TKÜ to the full Bundestrojaner's functionality is built-in right from the start", the CCC said.
The group claims the malware can activate a user's microphone and webcam for "room surveillance" purposes, while capturing screenshots of the user's web browser.
In addition, it said the Trojan is tearing "serious security holes" into infected systems, as the commands from the control software to the Trojan are completely unencrypted, and the screenshots and audio files it sends back are "encrypted in an incompetent way".
"Not only can unauthorised third parties assume control of the infected system, but even attackers of mediocre skill level can connect to the authorities, claim to be a specific instance of the Trojan, and upload fake data," the CCC said.
"It is even conceivable that the law enforcement agencies' IT infrastructure could be attacked through this channel. The CCC has not yet performed a penetration test on the server side of the Trojan infrastructure," it added.
 Although the CCC has published the binaries of the malware, it has not explicitly offered evidence that the software has an official government source. On Monday, Germany's Federal Criminal Police Office (Bundeskriminalamt, or BKA) told ZDNet UK it "has never used this kind of software".
Federal justice minister Sabine Leutheusser-Schnarrenberger issued a statement on Sunday saying her party, junior coalition partner the FDP, has "always warned against the dangers of government snooping software". The use of such software is a risk to public confidence in the powers of the constitutional court, she added.
The Pirate Party, a tech-focused party that entered mainstream German politics when it won 15 seats in the Berlin state parliament, said it would refrain from commenting on the situation until the source of the malware is proven

BT, Everything Everywhere kick off Cornwall LTE trial

Everything Everywhere and BT have begun a live trial of LTE in Cornwall, to see how the '4G' technology copes with real-world fixed and mobile usage.
Everything Everywhere
Everything Everywhere and BT have begun a trial of LTE in Cornwall. Photo credit: Karen Friar
The companies announced the start of the super-fast mobile broadband trial on Friday, having trailed it in May. As with other LTE trials that have taken place in Cornwall and Wales, the new test is partly aimed at showing how 4G wireless technology can be used to fill in rural broadband notspots — gaps that the government is trying to fill with £530m in subsidies.
"BT is committed to working with the government and using technology innovation to find ways of addressing the remaining challenges within the UK where there are still broadband notspots," BT Wholesale chief executive Nigel Stagg said in a statement. "The final 10 percent of the country is exceedingly difficult to reach with the available standard fixed-line solutions."
The trial is taking place in St Newlyn East and the surrounding area of South Newquay, with around 200 participants. According to Everything Everywhere and BT, residents of the 25 sq km area have little to no broadband access.
Prior to this real-world test, which uses 10MHz of 800MHz spectrum, the companies carried out an eight-week laboratory trial. However, the lab test was unable to show how issues such as distance to the mast, building density and geographical terrain affect data speeds.
Two chunks of UK spectrum, around 800MHz and 2.6GHz, will go up for auction at the end of 2012, after a further delay was announced by Ofcom on Friday. Although the 2.6GHz spectrum allows for greater speeds — LTE can theoretically peak at a download speed of 300Mbps — mobile broadband services using the 800MHz spectrum can travel further. As this means fewer base stations need to be installed, it is better suited to rural rollouts.
While the UK continues to test LTE, much of the rest of the world is already deploying it. The first commercial LTE services appeared in Scandinavia in late 2009, and at least 14 countries are now in the process of upgrading from 3G to 4G.
A study last week claimed that the UK's four-year delay in holding the 4G spectrum auctions is costing the country's businesses at least £732m a year in lost productivity, even without taking into account the competitive disadvantage compared with other countries.

BlackBerry data services suffer massive outage

Blackberry users across Europe, the Middle East and Africa have been hit by a data outage that cut off access to email, the internet and instant messaging, among other services.
BlackBerry handset
A serious outage has hit users of RIM's BlackBerry phones across Europe, Africa and the Middle East. Photo credit: Ben Woods
The outage began on Monday at around 10:20am BST and is still continuing, according to posts to Twitter by BlackBerry owners and service providers. Carriers in the UK are blaming Research In Motion for the problem, and the Canadian company confirmed the downtime in a short statement on Monday.
"We are working to resolve an issue currently impacting some BlackBerry subscribers in Europe, Middle East and Africa," RIM said. "We're investigating, and we apologise to our customers for any inconvenience caused whilst this is resolved."
Reports in the Telegraph and elsewhere have suggested that a RIM datacentre in Slough delivers data services in that region, but the company declined to give any further details about the cause of the outage. RIM has other network operations centres in EMEA apart from Slough.
The Blackberry Internet Service (BIS) — comprising Blackberry Messenger (BBM), email and web services — was affected, according to customers posting to Twitter and in the official BlackBerry forum. The outage potentially affects millions, given that Research In Motion's declared subscriber base worldwide is 70 million. Du, a telecoms operator in the United Arab Emirates, estimated as many as 50 percent of BlackBerry customers in EMEA could be affected.
RIM did not say whether corporate customers on BlackBerry Enterprise Services had been hit. 
Kenyan services provider, Vodafone Egypt and T-Mobile UK were among the carriers noting that there was a problem with BlackBerry service. Du in UAE said "degradation is ongoing".
However, some customers started reporting on Twitter that their service had begun to come back at around 4:45pm on Monday.
RIM estimates that service will be restored by about 8pm, according to Kuwaiti service provider Wataniya Telecom

Monday, October 10, 2011

London Apple Store hit in moped smash-and-grab

Police are appealing for witnesses after robbers struck the Covent Garden Apple Store in the early hours of Monday morning.

According to a statement from the Metropolitan Police, around seven moped riders or motorcyclists were involved in the robbery, which netted iPads "and other similar devices" after a shop window was broken. Most if not all of the riders had pillion passengers.

After the Covent Garden shop was robbed, police pursued but failed to stop a moped that may have been involved. A moped was then found abandoned near a block of flats, where two men were arrested. A 16-year-old and a 21-year-old are now in custody.

"Although two men are in custody on suspicion of burglary, the inquiry continues and other persons are sought," detective sergeant Nathan Tozer of Westminster CID said in a statement. "It is essential that anyone who saw the smash-and-grab, or the suspects making off, contact us as soon as possible."

Thursday, October 6, 2011

Hot Vampire Girls & Women Photos, pictures, Images Vampire pics, Bites, Kill Vampire Girl

Hot Vampire Girls & Women Photos, pictures, Images
Vampire pics, Bites, Kill Vampire Girl

Vampire Bites

 A still from the Vem Helsing

Vampire Girl Costume

Steve Jobs, Cartoons after his Death I-phone i-pad maker steve jobs Animations, Carton Images, Pictures

Tribute to Steve Jobs, Cartoons after his Death
I phone i pad  maker steve jobs Animations, Carton Images, Pictures

Steve Jobs Death Cartoon


Beauty and the Beastby Jaimes Alsop
1. The Beast
Knowing how you loved the birdsI fixed them to the treesso they wouldn't fly away.So you would stay.
And you remained silentand never questioned my bloody palms
or reproached me the birds
because they didn't sing.

It couldn't last, of course.
No new birds came and those crucified
were taken by small animals or simply

Uk police chase down stolen JCB digger

Greece : Riot Squad Smashes Female Reporter

The cop below I guess does to this female reporter from newpaper (BHMA) what his wife does to him every night. Macho Macho Man, I wanna be, a Macho Man

Wednesday, October 5, 2011

Steve Jobs RIP

Everyone is a Vampire!

I find this so incredibly awesome that I can't even stand it.  You guys have surely heard about this already, but word on the internets is that photographic proof has been found that Nicolas Cage is a vampire from the Civil War era.  I mean, we can't argue with photographic proof, people!  Just look at that picture.  It's totally Nic Cage as a vampire pretending to be a highly respectful (um, bow tie says it all) and educated thespian from the late 1800s.  Totally. 

And now we can add John Travolta to that vampire list.  MORE photographic proof has been uncovered that John Travolta was also a Civil War gentleman turned vamper!  Eeeek!  I'm going to be totally pissed if, in a couple of months, these two announce that they're doing a Civil War vamper flick together and that these damn photos were leaked by an intern (named Nicolas Travolta) to create buzz. 

So, who's next?  Um, how about Sean Young?  Or Richard Grieco?  Oh oh oh!  Gary Busey!  He can already unhinge his jaw, so yeah, he's definitely a vampire.

James Bond In Movie Bond 23, Bond 23 release date and Next Bond girl for Bond 23 James Bond Pictures, Wallpapers, images

James Bond In Movie Bond 23,
Bond 23 release date and Next Bond girl for Bond 23
James Bond Pictures, Wallpapers, images

James bond 23 Bod girl

MI6HQ broke the news (which we received via Coming Soon) that Bond producers Michael G. Wilson and Barbara Broccoli have met with Ertugrul Günay, the Turkish Culture and Tourism Minister, about shooting their latest film in Istanbul ."

Amongst the locations to be used are the historical Sultanahmet Square, but Günay reports that "There are, however, a number of locations, including the waterside and shores of the Bosporus, in consideration for the 10-15 minutes of the movie that is to be filmed in Turkey."

Bond is no stranger to Turkey, and in fact both From Russia with Love and The World is Not Enough filmed there. 
James bond 23 Bod girl

James bond 23 Bod girl

James bond 23 Bod girl