Web Applications Continued

Total Page:16

File Type:pdf, Size:1020Kb

Web Applications Continued INFORMATION TECHNOLOGY 402 NAME :________________________________ CLASS/ SEC :______________ ROLL: _____ SESSION :_____________________________ QUOTE :_______________________________ _______________________________________ PART 1: Working With Accessibility Options 1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy for physically challenged people. Some of its options are discussed below: a. Sticky keys: is an accessibility option in Windows Operating System used for person who faces difficulty in holding multiple keys. When activated, it makes the key pressed without actually holding it until you press another key. b. Filter keys: is an accessibility option in Windows Operating System used for person who faces visual impairment. When activated, it makes a beep sound when Lock keys (CapsLock, NumLock, ScrollLock) are pressed. c. Toggle keys: is an accessibility option in Windows Operating System used for person whose hands keep on trembling by ignoring repeated keystrokes. When activated, if a person presses the same key multiple times quickly; its character is shown only once on the screen. d. Sound Sentry: is an accessibility option in Windows Operating System used for person with auditory impairments. It displays alerts when an error sound plays. e. Narrator: is an accessibility option in Windows Operating System used for person with visual impairment. It reads the selected text to the user. WEB APPLICATIONS CONTINUED.. Page 1 INFORMATION TECHNOLOGY 402 PART 2: Networking Fundamentals 1. Data Communication It refers to the transfer of data and information from one computer to another over a network. Types i. Wired Communication: involves data communication using wires. It is used in the following technologies: Digital Subscriber Line (DSL): is a technology which uses telephone cable to provide fast internet. It is used in the broadband connections. Dial Up: is a technology which uses telephone cable to provide internet connection with speed only up to 56 kb/s. Cable Internet Access: is a technology which uses cable TV lines to provide internet connection. ii. Wireless Communication: involves data communication using wireless technologies. It is used in the following technologies: 3G: is a Third Generation technology which uses wireless mobile networks for internet. Bluetooth: is a technology which transfers data at slow speed. Its range is spread across 10 m radius. Wireless Fidelity (WiFi): is a technology which transfers data at high speeds. Its range is spread across 30 m radius. Worldwide Interoperability Microwave Access (WiMax): is a technology which transfers data at high speeds. Its range is spread across 8 km radius. 2. Network It is a computer system in which computers are connected to each other to share data. Some of its advantages are: i. File Management: It helps to save file easily over long distance. ii. Resource Sharing: It helps to easily share resources such as data and hardware. iii. Cost Saving on Software: It enables us to use single software over different computers. Thus, it saves cost of purchase for multiple software. iv. Internet Sharing: It enables us to share internet connectivity to surrounding computers. v. Security: It helps us to securely save data from client computer to a server connected in network. Types i. Local Area Network (LAN): is a computer network in which computers and its peripherals (printer, scanner etc) are connected to each other over a smaller area. Usually, RJ-45 cable is used to make wired LAN connections. ii. Campus Area Network (CAN): is a computer network in which computers and its peripherals across a campus in multiple buildings are connected to each other. iii. Metropolitan Area Network (MAN): is a computer network in which computers and its peripherals are connected across the city. WEB APPLICATIONS CONTINUED.. Page 2 INFORMATION TECHNOLOGY 402 iv. Wide Area Network (WAN): is a computer network in which computers and its peripherals are connected across larger geographical distance. The largest WAN in Internet. Architecture It refers to the layout in which computers are connected to each other in a network. Peer to Peer Architecture Client Server Architecture All the computers are connected to each other All the client systems are connected to the and there is no server required. server. To connect computers in LAN, follow the steps below: i. Connect the Network Interface Card (NIC) to the motherboard of computers to be connected in the network. If NIC is wireless, it will have an antenna; otherwise connect RJ-45 cable to it. ii. Configure their connection with the switch/ hub. 3. Modem: stands for Modulator Demodulator. It is used for data transmission using telephone lines in a network. 4. Hot-Spot: is a zone in which high-speed internet speed connection is available. 5. Global Positioning System (GPS): is a positioning system which gives exact location of the user using a constellation of 24 satellites used for this purpose. 6. Miscellaneous terms: i. Internet is the world’s largest computer network in which computers and their peripherals are connected to each other for data sharing. ii. Internet Service Provider (ISP) is an organization which enables the customer to use internet. Examples are BSNL, MTNL, Reliance Communication, Sify etc iii. World Wide Web (WWW/ W3) is the graphical part of internet which is displayed on the screen. iv. IP Address is unique identification for computers which uses internet protocol over a network. It is a four set of numbers separated by periods. For example, 216.58.216.164 v. Uniform Resource Locator (URL) is the unique address of all the web resources. i. Parts of URL https:// www. mck. edu. au /subjects/IPT Protocol Informs that the Domain Top Level Geographical File Path/ resource is a webpage name Domain TLD Directory WEB APPLICATIONS CONTINUED.. Page 3 INFORMATION TECHNOLOGY 402 Protocol is the set of rules which computers use to communicate over a network. Domain name is the specific name of the website which is used to uniquely identify an IP Address. Top Level Domain Name (TLD) is the extension of domain name which identifies the type of website. It is broadly classified as: TLD .com .org .net .edu .gov .mil Entity Commercial Organization Network Education Government Military Some of the geographical top level domains are: TLD .in .us .uk .ca .au .de Country India United States United Kingdom Canada Australia Germany File Path/ Directory is the address of a specific file or folder within the website. vi. Domain Name Server is a directory on internet in which all the domain names are linked to a particular IP Address. vii. Webpage is a hypertext document used to display web resources on the World Wide Web. They are most commonly made using Hypertext Markup Language (HTML). viii. Web browser is the software which is used to browse World Wide Web. For example, Google Chrome, Internet Explorer, Mozilla Firefox, Dolphin, UC Browser etc. ix. Search engine are the programs which are specifically used to search information on the World Wide Web. For example, Google, Bing, Yahoo, DuckDuckGo etc WEB APPLICATIONS CONTINUED.. Page 4 INFORMATION TECHNOLOGY 402 PART 3: Introduction to Instant Messaging 1. Instant Messaging is a service in which usually two people can communicate with each other in real-time using text, audio, video etc. Most popular platforms which provide this service are WhatsApp, Facebook Messenger, Skype, Hangouts and Snapchat. a. Types i. Application based instant messaging software which is downloaded and installed on user’s computer. For example, WhatsApp, Skype, Google Talk, Yahoo Messenger etc. ii. Web based instant messaging software which is used through browsers. For example, WhatsApp Web, Yahoo Messenger for Web, Meebo etc. b. Etiquettes/ Rules to be followed i. Avoid strangers. ii. Start with a short greeting. iii. Don’t write messages completely in Capital letters. iv. Be careful with the abbreviations. v. Avoid sarcasm. vi. Don’t reply with a single letter word. vii. Never send bad news over such platforms. c. Advantages i. Real time communication ii. Cost saving iii. Convenient to use options iv. Compatible with many devices v. Team building vi. Spam reduction 2. Email, also called as electronic mail, is a digital message sent by person to one or more people using internet. 3. Video Conferencing is a method to conduct audio-visual conference between two or more people located at different places using a computer network. Requirements for video-conferencing include a webcam, a computer and fast internet connection. 4. Internet telephony is a technology that uses internet connection to make phone calls by converting analog speech signals into digital signals, and then sending them over internet. WEB APPLICATIONS CONTINUED.. Page 5 INFORMATION TECHNOLOGY 402 PART 4: Creating and Publishing Web Pages – Blog 1. Blog is a website which is used as online journal/ diary in which people writes post about their opinions, stories, photos, videos, creative writings such as poems etc. 2. Post is the material in a blog which a user publishes. 3. Free blog services are provided by websites such as blog.com, blogger.com, blogsome.com, wordpress.com, weebly.com etc. 4. Offline blog editor are tools using which one may create blog posts without internet creation and publish it on the blog when internet is available. Popular editors are BlogDesk, BlogJet, Qumana, MarsEdit, Ecto and Windows Live Writer. PART 5: Online Transactions 1. E-Commerce/ Online Shopping/ Internet Commerce is the practice of buying or selling of goods or services over internet. Advantages i. Provides more options to customers ii. Products are easily available iii. Helps in better customer service iv. Product with better pricing and rating can be easily found v. Reduces paperwork vi. Improves brand image of the company vii. Helps in growth of small industry in villages 2. Online Transaction is a payment method which is done using internet.
Recommended publications
  • Instant Messaging Market, 2009-2013 Executive Summary
    THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM 1900 EMBARCADERO ROAD, SUITE 206. • PALO ALTO, CA 94303 TEL. 650 322-8059 • FAX 650 322-8061 Instant Messaging Market, 2009-2013 Editor: Sara Radicati, Ph.D; Principal Analyst: Todd Yamasaki SCOPE This study examines the market for Instant Messaging (IM) solutions from 2009 to 2013. It provides extensive data regarding current installed base, broken out by region, business size, and other variables, including four year forecasts. This report also examines IM solution features, business strategies, plus product strengths and weaknesses. All market numbers, such as market size, forecasts, installed base, and any financial information presented in this study represent worldwide figures, unless otherwise indicated. All pricing numbers are expressed in $USD. METHODOLOGY The information and analysis in this report is based on primary research conducted by The Radicati Group, Inc. It consists of information collected from vendors, and users within global corporations via interviews and surveys. Secondary research sources have also been used, where appropriate, to cross-check the information collected. These include company annual reports and market size information from various market segments of the computer industry. EUROPE: 29E FITZJOHNS AVE • LONDON NW3 5JY • TEL. +44 (0)207 794 4298 • FAX. +44 (0)207 431 9375 e-mail: [email protected] http://www.radicati.com Instant Messaging Market, 2009-2013 – Executive Summary EXECUTIVE SUMMARY EXECUTIVE SUMMARY This study looks at the Instant Messaging market as comprising four different market segments: o Public IM networks – This segment includes free IM services which primarily target consumers, but are also prevalent amongst business users.
    [Show full text]
  • 127.0.0.1 127.0.0.1
    127.0.0.1http://www.ebuddy.com/ 127.0.0.1http://meebo.com.br/ 127.0.0.1http://www.koolim.com/ 127.0.0.1https://imo.im/ 127.0.0.1http://64.13.152.67/ 127.0.0.1http://www.verticalimits.uni.cc/ 127.0.0.1http://www.google.com/talk/ 127.0.0.1http://br.webmessenger.yahoo.com/ 127.0.0.1http://www.communicationtube.com/ 127.0.0.1http://express.instan-t.com/MyIM/start.htm 127.0.0.1https://www.imunitive.com/index.html 127.0.0.1http://airtalkr.com/im/ 127.0.0.1http://easymessenger.net/ 127.0.0.1http://flick.im/ 127.0.0.1http://www.orgoo.com/ 127.0.0.1http://www.mijnmessenger.nl/ 127.0.0.1http://www.iloveim.com/ 127.0.0.1http://msn.audiowatcher.com/# 127.0.0.1http://www.mangeloo.com 127.0.0.1http://www.imaginarlo.com/ 127.0.0.1http://piglet-im.com/ 127.0.0.1http://x6.iloveim.com 127.0.0.1http://x3.iloveim.com 127.0.0.1http://www.wbmsn.net/default.aspx 127.0.0.1http://www.e-messenget.net 127.0.0.1http://ibypass.com 127.0.0.1http://www.e-messenger.net 127.0.0.1http://x8.iloveim.com 127.0.0.1http://85.184.4.4/ 127.0.0.1http://www.onlinemessenger.nl/ 127.0.0.1http://www.freepgs.com/defilter/ 127.0.0.1http://capetown.e-messenger.net 127.0.0.1http://www.phonefox.com 127.0.0.1http://www.mastaline.com 127.0.0.1http://www.piglet-im.com 127.0.0.1http://www.piglet.0900provider.nl 127.0.0.1http://boston.e-messenger.net 127.0.0.1http://vicotria.e-messenger.net 127.0.0.1http://atlanta.e-messenger.net 127.0.0.1http://mob.e-messenger.net 127.0.0.1http://arkansa.e-messenger.net 127.0.0.1http://pretoria.e-messenger.net 127.0.0.1http://chicago.e-messenger.net 127.0.0.1http://thevirtualbrowser.com/
    [Show full text]
  • Meebo.Com - Privacy Policy
    MEEBO.COM - PRIVACY POLICY MEEBO.COM PRIVACY POLICY Last updated: December 3, 2012 What this Privacy Policy covers This Privacy Policy applies to all services offered by Meebo, including the Meebo Bar. By visiting Meebo's website or using Meebo's services, you agree to this Privacy Policy. This Privacy Policy does not apply to any websites, products or services that are not owned or operated by Meebo or to actions taken by Meebo users. For example, this Privacy Policy does not apply to third-party websites where the Meebo Bar appears or to any third-party applications, social networks or social plug-in providers that you interact with via the Meebo services, all of which are governed by their own privacy policies. Information that Meebo collects When you interact with Meebo, we may ask for your name and email address. If you use the hosted instant messaging (IM) service provided within certain Meebo services ("Hosted Chat Feature"), the website service on which the Hosted Chat Feature is used may send us information about you, including your name, username at those services, unique user ID for those services, friends list, status, profile information, age and gender. Meebo, like most other websites, automatically collects information about you and your activity (known as "log data"), including your Internet Protocol (IP) address, your browser or device type, your interactions with Meebo, your interactions with third party social networks through Meebo, your geographic region and Meebo cookies associated with your browser. If you visit a site that has the Meebo Bar, we also collect information about the website or web page that you view and your interactions with that site.
    [Show full text]
  • Case No COMP/M.6281 - MICROSOFT/ SKYPE
    EN Case No COMP/M.6281 - MICROSOFT/ SKYPE Only the English text is available and authentic. REGULATION (EC) No 139/2004 MERGER PROCEDURE Article 6(1)(b) NON-OPPOSITION Date: 07/10/2011 In electronic form on the EUR-Lex website under document number 32011M6281 Office for Publications of the European Union L-2985 Luxembourg EUROPEAN COMMISSION Brussels, 07/10/2011 C(2011)7279 In the published version of this decision, some information has been omitted pursuant to Article MERGER PROCEDURE 17(2) of Council Regulation (EC) No 139/2004 concerning non-disclosure of business secrets and other confidential information. The omissions are shown thus […]. Where possible the information omitted has been replaced by ranges of figures or a general description. PUBLIC VERSION To the notifying party: Dear Sir/Madam, Subject: Case No COMP/M.6281 - Microsoft/ Skype Commission decision pursuant to Article 6(1)(b) of Council Regulation No 139/20041 1. On 02.09.2011, the European Commission received notification of a proposed concentration pursuant to Article 4 of the Merger Regulation by which the undertaking Microsoft Corporation, USA (hereinafter "Microsoft"), acquires within the meaning of Article 3(1)(b) of the Merger Regulation control of the whole of the undertaking Skype Global S.a.r.l, Luxembourg (hereinafter "Skype"), by way of purchase of shares2. Microsoft and Skype are designated hereinafter as "parties to the notified operation" or "the parties". I. THE PARTIES 2. Microsoft is active in the design, development and supply of computer software and the supply of related services. The transaction concerns Microsoft's communication services, in particular the services offered under the brands "Windows Live Messenger" (hereinafter "WLM") for consumers and "Lync" for enterprises.
    [Show full text]
  • Implementing Reliable Instant Messaging at Your Library
    Implementing Reliable Instant Messaging at Your Library Karen McCoy Adult Services Librarian Farmington Public Library, NM Some background… More libraries are communicating with patrons in real time over the internet “Online real-time chat reference services have become increasingly prevalent in many types and sizes of libraries” (1). BUT… “Because no IM technology standard has been approved by all the major players, IM has long been problematic to libraries… but newer IM products can help resolve these dilemmas.”(2). 1. Kwon, Nahyun, & Gregory, Vicki L. (2007). The effects of librarians' behavioral performance on user satisfaction in chat reference services. Reference & User Services Quarterly. 47, 137-148, 137. 2. Rethlefsen, Melissa L. (Summer 2007). Product Pipeline. Netconnect, 14-16 Instant Messaging vs. Chat Software What’s the difference? Chat Software: fee-based, usually only used in businesses and libraries (usually part of a consortium to reduce cost) also referred to as “virtual reference” or “chat reference.” Instant Messaging: FREE to libraries and patrons, more often used by people in their daily lives, generally not platform dependent (1), more compatible in a Web 2.0 environment A recent trend in reference service seems to be a move from use of chat reference software to use of IM (2). 1. Johnson, Kris. “Pros & Cons of IM/SMS Virtual Reference.” NMLA/MPLA Presentation. March, 2007 2. Naylor, Sharon, Stoffel, Bruce, & Van Der Laan, Sharon (2008). Why isn't our chat reference used more? Reference & User Services Quarterly.
    [Show full text]
  • Access the Web – IM and SMS for the Circulation Desk
    Access the Web – IM and SMS for the Circulation Desk By June L. Power It’s been well documented in a number of articles regarding the contemporary library patron that with the rise in mobile computing and smart phone technology, our patrons are looking for fast and easy service from whichever technological avenue they are using to access our library services. Libraries are responding with increasing numbers of online resources and online means of assistance. One means of communication that is seeing more widespread use in libraries is the use of instant messaging. Many reference desks, and more and more circulation desks, are using instant messaging as a means of communication regarding a number of different library services. Instead of my usual perusal of a number of web sites on a given topic, in this issue I am instead going to describe the application of a number of free online resources at my library’s circulation desk in order to set up instant messaging communications. There are so many great freeware programs out there, I think it is easy to lose sight of how they can be practically applied. We had for some time been using instant messaging at the reference desk. At first we were using the freeware version of a program called Trillian (www.trillian.im), which can connect to multiple IM services and social networks – allowing you to access all simultaneously without the need to run multiple client programs. It also allows for multiple connections with the same service. After a short time with Trillian, we switched to using Meebo (https://www.meebo.com/messenger), which functions like Trillian but is browser based, so there was no need to download any software.
    [Show full text]
  • 321444 1 En Bookbackmatter 533..564
    Index 1 Abdominal aortic aneurysm, 123 10,000 Year Clock, 126 Abraham, 55, 92, 122 127.0.0.1, 100 Abrahamic religion, 53, 71, 73 Abundance, 483 2 Academy award, 80, 94 2001: A Space Odyssey, 154, 493 Academy of Philadelphia, 30 2004 Vital Progress Summit, 482 Accelerated Math, 385 2008 U.S. Presidential Election, 257 Access point, 306 2011 Egyptian revolution, 35 ACE. See artificial conversational entity 2011 State of the Union Address, 4 Acquired immune deficiency syndrome, 135, 2012 Black Hat security conference, 27 156 2012 U.S. Presidential Election, 257 Acxiom, 244 2014 Lok Sabha election, 256 Adam, 57, 121, 122 2016 Google I/O, 13, 155 Adams, Douglas, 95, 169 2016 State of the Union, 28 Adam Smith Institute, 493 2045 Initiative, 167 ADD. See Attention-Deficit Disorder 24 (TV Series), 66 Ad extension, 230 2M Companies, 118 Ad group, 219 Adiabatic quantum optimization, 170 3 Adichie, Chimamanda Ngozi, 21 3D bioprinting, 152 Adobe, 30 3M Cloud Library, 327 Adonis, 84 Adultery, 85, 89 4 Advanced Research Projects Agency Network, 401K, 57 38 42, 169 Advice to a Young Tradesman, 128 42-line Bible, 169 Adwaita, 131 AdWords campaign, 214 6 Affordable Care Act, 140 68th Street School, 358 Afghan Peace Volunteers, 22 Africa, 20 9 AGI. See Artificial General Intelligence 9/11 terrorist attacks, 69 Aging, 153 Aging disease, 118 A Aging process, 131 Aalborg University, 89 Agora (film), 65 Aaron Diamond AIDS Research Center, 135 Agriculture, 402 AbbVie, 118 Ahmad, Wasil, 66 ABC 20/20, 79 AI. See artificial intelligence © Springer Science+Business Media New York 2016 533 N.
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • IP Phones, Software Voip, and Integrated and Mobile Voip
    Chapter 2 IP Phones, Software VoIP, and Integrated and Mobile VoIP Abstract In order to establish their technical, communication, and service affordances, this chapter explores and three types of VoIP tools: 1) IP Phones, 2) software VoIP, and 3) mobile and integrated VoIP. Type 1: IP Phones Another reply to my e-mail list call-out came from consul- tant Susan Knoer, who reflected: VoIP is an old technology now, and many people didn’t even realize that their “new” phone lines are VoIP. Even the smaller corporations I work with have ReportsLibrary Technology gone over. It might be more interesting to talk to campuses that don’t have VoIP and find out why.1 Figure 5 Cisco Ip phone handset. Excellent point, Susan. The first VoIP type I explore is the most institutionally established yet least obvious hardware externals they are also virtually indistinguish- form of networked calling: the mass-market carrier IP able from older phones (figure 5). Broadband IP calls are phones sitting inconspicuously on desks at a growing initiated with either specially made IP handsets or head- number of offices and homes. Digital voice is becoming sets or with existing handsets converted with adapters. standard for schools, organizations, and business, which Unlike the small-scale startup culture of software VoIP, still tend to rely on fixed-location communication. As IP IP phones tend to follow a more traditional provider- www.alatechsource.org phones are bundled with high-speed Internet and televi- subscriber customer service model. These characteristics sion subscriptions, individual consumers still interested make IP calling an easier conceptual leap for users who in landline service are steadily adopting them, as well.
    [Show full text]
  • Strategic Performance Measurement for Ebuddy
    Strategic performance measurement for eBuddy May 2007 Graduation thesis of: V.J.M. Hoogsteder Student number 9901795 Business Information Technology Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) University of Twente [email protected] +31 (0) 6 16 376 233 On behalf of: eBuddy Keizersgracht 585 1017 DR Amsterdam +31 (0) 20 514 1430 Under supervision of: P. Bliek (University of Twente, School of Management and Governance, NIKOS group) L. Bodenstaff (University of Twente, faculty of EEMCS, Information Systems group) J.J. Rueb (CEO eBuddy) 1 Management summary Motivation eBuddy management wants to define and implement strategic performance measurement to improve strategic decision making by reducing the necessary time to support decisions and by gaining a solid and complete view on eBuddy’s strategic performance. Recommendations 1) Assess strategic performance with the strategic performance measures identified in eBuddy’s balanced scorecard, as defined in this research; 2) Assign a responsible employee for monthly reporting of the balanced scorecard; 3) Update the balanced scorecard based on changes in strategic objectives; 4) Define desired employee skills and measure these in the balanced scorecard; 5) Develop an information system to present the defined strategic performance measures; 6) Involve business unit directors in strategic performance assessment; 7) Use the balanced scorecard to facilitate problem solving and action planning. Argumentation 1) The eBuddy balanced scorecard is defined according to Kaplan & Norton’s model (Kaplan & Norton 1996). This model provides a comprehensive set of guidelines for definition and implementation of strategic performance measurement and is supported by extensive literature attention. The steps taken towards the definition and implementation of eBuddy’s balanced scorecard were based on the roadmap identified by Assiri et al.
    [Show full text]
  • USCIS - H-1B Approved Petitioners Fis…
    5/4/2010 USCIS - H-1B Approved Petitioners Fis… H-1B Approved Petitioners Fiscal Year 2009 The file below is a list of petitioners who received an approval in fiscal year 2009 (October 1, 2008 through September 30, 2009) of Form I-129, Petition for a Nonimmigrant Worker, requesting initial H- 1B status for the beneficiary, regardless of when the petition was filed with USCIS. Please note that approximately 3,000 initial H- 1B petitions are not accounted for on this list due to missing petitioner tax ID numbers. Related Files H-1B Approved Petitioners FY 2009 (1KB CSV) Last updated:01/22/2010 AILA InfoNet Doc. No. 10042060. (Posted 04/20/10) uscis.gov/…/menuitem.5af9bb95919f3… 1/1 5/4/2010 http://www.uscis.gov/USCIS/Resource… NUMBER OF H-1B PETITIONS APPROVED BY USCIS IN FY 2009 FOR INITIAL BENEFICIARIES, EMPLOYER,INITIAL BENEFICIARIES WIPRO LIMITED,"1,964" MICROSOFT CORP,"1,318" INTEL CORP,723 IBM INDIA PRIVATE LIMITED,695 PATNI AMERICAS INC,609 LARSEN & TOUBRO INFOTECH LIMITED,602 ERNST & YOUNG LLP,481 INFOSYS TECHNOLOGIES LIMITED,440 UST GLOBAL INC,344 DELOITTE CONSULTING LLP,328 QUALCOMM INCORPORATED,320 CISCO SYSTEMS INC,308 ACCENTURE TECHNOLOGY SOLUTIONS,287 KPMG LLP,287 ORACLE USA INC,272 POLARIS SOFTWARE LAB INDIA LTD,254 RITE AID CORPORATION,240 GOLDMAN SACHS & CO,236 DELOITTE & TOUCHE LLP,235 COGNIZANT TECH SOLUTIONS US CORP,233 MPHASIS CORPORATION,229 SATYAM COMPUTER SERVICES LIMITED,219 BLOOMBERG,217 MOTOROLA INC,213 GOOGLE INC,211 BALTIMORE CITY PUBLIC SCH SYSTEM,187 UNIVERSITY OF MARYLAND,185 UNIV OF MICHIGAN,183 YAHOO INC,183
    [Show full text]
  • Pl P Id P H An, Provide, Push: Social Software, Gently
    Plan, Provid e, Pus h: Social Software, Gently Applied Mason R.K. Hall FSU Libraries http://www.lib.fsu.edu Department of Technology and Research February, 2007 I will discuss… • What we did • Why we did it • How we did it • Where to next? http://www.lib.fsu.edu Instant Messaggging Dep pyloyment I assure you, this is all work related. http://www.lib.fsu.edu Why IM? • Departmental sprawl • IM is easy and widespread • IM fills a niche [phone] this is that niche [email] http://www.lib.fsu.edu • It’s really cheap – like free Did you say free? vs. http://www.lib.fsu.edu Other benefits for use • IM can be used to build a person’ s “presence” • Non-detrimental when absent • Lots of people are using it anyway – Legitimize it http://www.lib.fsu.edu Key Decisions • IM for the software or hardware platform? • User naming conventions • Promote more than one utilityyg for accessing IM (Meebo, Trillian, proprietary client)? http://www.lib.fsu.edu AIM • Already in use for library’s virtual reference • Strong base among early adopters • Some nice bllbells an d w hist les • Not an in-house silo • Free (sort of) • Supports use of email addresshttp://www.lib.fsu.edu as screen name Using Email Addresses for Screen Names E.g. mrhll@hall@ma iler. fsu.e du • Extends presence • One less thing to learn or remember • Already indexed and documented • Creates a wall between personalhttp://www.lib.fsu.edu and professional IM Multiple Utilities (llb)(AIM, Trillian, Meebo) • AIM client: preferred by many existing AIM users www.aim.com • Meebo: easy to use , web-based, good for road warriors www.meebo.com • Trillian: deployed for virtual referencehttp://www.lib.fsu.edu www.
    [Show full text]