Tuesday, February 8, 2011

The Hidden Risks of Social Media

Social media has forever changed the rules in the job marketplace. The amazing amount of information that is so quickly accessible provides a tempting opportunity to be a fly on the wall of an applicant's personal life. Recruiters need to exercise caution and tread carefully. There are a plethora of social network sites such as Facebook, MySpace, Twitter and LinkedIn that provide instant and often personal information about a candidate.
There are risks associated with social media and if employers are not careful, they can open a Pandoras box of litigation possibilities. Social network profiles reveal private information such as age, race, political affiliation, gender, disability and religious affiliation. This type of information is usually interspersed throughout a candidate's personal profile.
There are a few disturbing scenarios that can occur when an employer does a social network web search on a potential candidate. Consider the following: a recruiter does an internet search and finds the candidates picture and religious and political affiliation and uses this information to weed out that particular candidate, or an internet search reveals a candidate in full regalia at a gay pride festival. What does the recruiter do with such personal information that would have never revealed itself in a traditional resume?
Using online information skates a thin line between invasion of privacy and an employer learning as much as possible about a potential employee. Employers must decide if the benefits of researching candidates on social networking sites outweigh the risks. It is critical that employers utilize legal counsel and develop written policies to determine the best protocol for using social media in recruiting efforts.
The policy must clearly define the types of position that would warrant utilizing social media and specific guidelines for the type of information the employer hopes to find by using social network sites. A comprehensive written policy will go a long way in helping to mitigate risks that arise from social media searches.
Working closely with legal counsel can go a long way in protecting a company from the potential of a case of disparate treatment and its cousin disparate impact, which can occur unintentionally when using social media for recruiting. Human Resources experts argue that using social network sites can open the door to disparate treatment (an intent to discriminate) or Disparate Impact, when using social media sites that do not reflect the demographics of the total population.
Social media is one of the best ways to recruit passive candidates and is an essential resource in engaging the best candidates in the marketplace. Social media will continue to evolve and recruiters must use common sense, stay compliant with EEO practices and maintain records to avoid being on the losing end of a discrimination lawsuit.

Software Digest for Beginners

What is the meaning of the term Software?
Generally, the term software is associated with computer software, which is an indispensable part of the computer system that stores and process all encoded information or computer instructions on PC. They have very vast scope in computer world.

Software is processed by computer systems, programs and other data. Being totally opposite to hardware, which is used to store or execute the software, software is connected with random access memory and then carry out the work in central processing unit. Usually, software is a coded machine language that is not easy to understand for the users.
Software & Use
Softwares convert tough machine language into simple usable language to make it really easy for users to understand. As softwares understand machine language that consists of several groups of binary values, which gives processor instructions and data. Generally, every operating system has its own software that requires an individual processor.

Secondly, software acts as a connector between electronic hardware and data that enables a user to operate the series of data instructions with the help of software. Further, software can use any kind of data such as output/input. Sometimes the output of software can be input for software. It also provides an interface between hardware, data and other software.
Types of Software
According to their usages, softwares are classified into three broad categories; system software, application software and programming software. With the help of system software, a user can run computer hardware and computer system including operating system, device drivers, diagnostic tools, servers, windowing systems and some more.

Whereas, application software helps users to perform one or more tasks simultaneously. Application software also enables users to perform all applications like office suites, business software, databases and games. Programming software carries some functional tools that help the programmer to make some difficult computer programs. They also provide some useful tools like text editor, compiler, interpreter, linker and debugger etc.

10 Online Hacked Flash Games

10. Road of the Dead Hacked
Whats the hack? Start with 100 CR, all upgrades cost 1 CR only. The game is 25 MB - let it load. Hack updated with : car takes no damage and unlimited ammo.

9. Crush the Castle 2 Hacked
Whats the hack? All projectiles unlocked from the start.

8. Coaster Racer Hacked
Whats the hack? Start with 100 cash, all upgrades give you more.

7. Warlords Called to Arms Hacked
Whats the hack?
Unlimited Money, Instant Troop Spawn, Demons class unlocked, Charge ready in 1 kill, All classes unlocked

6. Madness Retaliation Hacked
Whats the hack? Start with 100HP and AP instead of 5. Gain 100 AP each turn. Using medikits, smoke grenades and flashbangs doesn't take them away. We don't want to overkill the game with hacks and 100AP will get any enemy killed with 1 unit only so let us know if there's something else we can help you with (hack wise).

5. Weapon Hacked
Whats the hack? Lots of health, enemies do no damage, 999999 money - you can buy all the upgrades/weapons you want.

4. Thing Thing 4 Hacked
Whats the hack? Health, Ammo, And all weapons owned ! Pipe and Sword 1 hit kill ! All guns auto ! All outfits unlocked after completing the 8 achievments ! See info below for weapon & health tip ! Also you can Play naked lol outfit "0"

3. Achievement Unlocked 2 Hacked
Whats the hack? Market Place Items only cost 1 coin - 30 minutes instead of 4 in time mode

2. Shopping Cart Hero 2 Hacked
Whats the hack? verything in the shop is free!

1. Toss the Turtle Hacked
Whats the hack? Everything in the shop costs $1. After the first shot you'll be able to get everything. No need of other hacks since it will take the fun out of the game.

Learning More about Internet History

The internet is a huge network of networks. Several computer networks across the world connect seamlessly with each other using a protocol known as the "IP Protocol". The connection is made possible through various telecommunication mechanisms such as telephone wires, cable lines or satellite signals. Sitting before your computer, any information that you want which is located in some remote computer on the far corner of the earth - is pipelined from server computer to server computer, until it lands on your screen, in a lightning fast speed. Chris Freville is an expert in this particular field, and throughout this article we shall dwell on some of his notes on internet history.
The Internet Society, also known popularly as ISOC, governs the internet. The mission of the ISOC is to promote global information exchange through internet technology. The governance of the protocol standards - that is, the practical details of how communication happens between computers and software applications - comes under the purview of another body called Internet Architecture Board (IAB). The IAB board also decides on the tracking mechanisms of the 32-bit address number that uniquely identifies every single device hooked onto the internet. There is a third governing body known as the Internet Engineering Task Force (IETF), whose responsibility it is to regulate operational and near-term technical issues facing the internet.
Just like there is somebody who builds, owns and operates the roads which our cars drive on, and to whom we have to pay toll for their usage, in the same way, we as customers pay for the elaborate infrastructure that has been built to run the internet. This payment is by way of the rentals to the internet service providers and the telephone companies.
The first vision of the internet was outlined by J.C.R. Licklider, an MIT researcher who in August 1962 wrote about a "galactic network" of interconnected computers that will be capable of providing access to information and programs from any site to any point of consumption. A paper published by Leonard Kleinrock, as noted by Chris Freville, concurrently followed this that dwelt on how to make communication on the internet practically feasible.
An outcome of this vision was the development of ARPANET in September 1969. This network of computers was first assembled at the Network Measurement Center at UCLA; and gradually roped in the computer networks at Stanford Research Institute, UC Santa Barbara and the University of Utah. Three years later, a stable version of the ARPANET was successfully demonstrated at the International Computer Communication Conference (ICCC). Over a period, other computer networks from the region, across the country, and later from around the world joined the ARPANET, to become what we know today as the internet.
Chris Freville also writes how from academic environs, the internet moved towards commercialization in 1990, when "The World" became the first internet service provider, offering internet service using dial-up. Companies such as CompuServe, Prodigy, America Online soon followed. Within two years, by the end of 1991, the internet had grown to include three dozen countries, 5,000 networks, 700,000 host computers, all serving over 4 million people.