Google L-team with 3 indians

0 comments
Till recently Google's chief business officer, and also its highest paid executive — is moving on, but an influential tech troika of Indian engineers will continue to shape the future of the $60 billion global search giant. 

Amit Singhal, Sundar Pichai and Sridhar Ramaswamy are responsible for the nuts and bolts that power Google. The trio reports directly to Google co-founder & CEO Larry Page. They are part of what is popularly called the L-Team at Google — 'Larry's team', not leadership team. They drive innovation, are responsible for new products and most of Google's 40,000 employees report to them. 

All three are senior vice-presidents, as was Arora. They are among the top eight executives at Google. 

Ramaswamy, who is responsible for all the engineering behind Google's ad products, has the largest team of engineers under him. Advertising is basically how Google makes all its money. 

Singhal, who runs search, is also a 'Google Fellow', a much revered designation within Google given only to its top scientists. He is building intelligence into the search algorithm to ensure that results are as accurate as possible. 

Pichai runs the current hot businesses: Chrome, Android and Apps and is responsible for their development and building global partnerships to market them. 

Flipkart crashed again !

0 comments
Indian shopping site Flipkart crashed temporarily on Tuesday, minutes after Xiaomi's Mi 3 went on sale, as customers rushed to order the Chinese vendor's much-awaited Rs13,999 smartphone. The phone, which is only being offered through the site, was sold out in under 40 minutes, according to Xiaomi.

At around noon, when sales began, Flipkart site showed a 404 error, meaning the webpage wasn't found. An hour later it showed an out-ofstock message on the page promoting the device.

The price offered by the online retailer is about Rs1,000 lower than the Rs14,999 Xiaomi had announced at the launch earlier in the month. According to Xiaomi's Facebook page Mi India, the company got more than 100,000 registrations until July 21 from people seeking to purchase the Mi 3.

The Flipkart site said registrations for the phone will restart on July 28 and sales at noon on July 29. "The demand is much higher than anticipated. We have already started work on ramping up the supply chain to meet the demand for the Mi 3 and for other devices. We are still figuring out ways to handle the future demand," Manu Kumar Jain, head of Indian operations at Xiaomi told ET.

"We will ensure that customers who missed out on today's sale are automatically registered to buy a Mi 3 on 29th," Jain added.

In a separate statement, Flipkart said the company had anticipated a traffic spike and scaled up its services, but the number of customers who logged in immediately after the sale went live caused the process to slow down for a while. "We are expanding our capacity in order to provide a smoother shopping experience the next time."

The Flipkart website had previously experienced similar issues when it offered Motorola's Moto E smartphone for sale. That and the Moto G were launched in India solely through Flipkart

What your sleep schedule says about you !

0 comments


If you ever wondered what's wrong with people who jump right out of bed in the morning, well, a new study shows you might just be onto something: early risers may be less honest as the day goes on.
According to the US study with data acquired by researchers from Johns Hopkins, Washington and Georgetown, early birds may get the worm but they may not be so moral to get it. So, larks are more likely to cheat and lie than people who are late to bed and late to rise.
This of course flips the stereotype that night owls are badly behaved. But, before you start judging all your friends, family and lovers based on their sleep schedule -- listen up, because while morning types were less likely to resist temptation in the evening when their mental energy was low, those who burn the midnight oil tend to have similar issues in the morning when they're tired.
So, in the end, it turns out, you can't trust anyone. But, at least you know when it's more likely they're telling the truth.
 Sleeping baby

Hiring activity rises 22% in June this year

0 comments
Hiring activity in India registered a significant rise of 22 per cent in June and job market is expected to improve further in the coming months as the economy is showing signs of revival, says a report by job portal Naukri.com.

The Naukri Job Speak Index for June stood at 1,570, showing a 22 per cent increase in hiring activities compared to the corresponding period last year. The same is 2 per cent lower compared to May, 2014.

Industry wise hiring sentiment was positive with Telecom and BPO seeing an increase of 20 per cent each respectively in June 2014 as compared to June 2013.

"The economy is showing signs of revival and its effects are visible on the hiring landscape as well. The job market is reviving and we expect hiring activity to go up in the coming few months

(Breaking news)700 UST Global Layoffs – Technopark Trivandrum based US technology allegedly fires employees

0 comments
The Deccan Chronicle reports that UST Global, the Technopark Trivandum based MNC major has laid off 700 employees. The article has just been published today (June 4th) Most of the UST Global employee workforce is based at Technopark trivandrum and their Chennai office. Such news items of layoffs regularly come out of technopark, and are mostly unsubstantiated, but this news is getting a bit of traction perhaps due to the fact that its covered in a mainstream newspaper.
Some of the comments on the Deccan Chronicle article seem to be by US Technology employees who seem to confirm the fact that they have been fired. However this still remains an allegation though its unlikely that Deccan Chronicle would carry the story if they hadn’t done some background research.
Apparently the the UST employees who have been fired are either on the bench or those who have had 7-8 years of experience. In some companies it is common to fire employees on the bench if the ratio of the benched employees to the total employee strength becomes uncomfortable. However the layoffs amongst employees who are between 7-8 years seems to be a bit unusual, and indicates cost cutting or streamlining measures.
The article says that the employees are being ‘forced to resign’ – im not sure what that means, and that termination notices are issued to those who try to resist. That sounds like a bit of dramatization by the newspaper.
The news article does quote the country head Alexander Varghese as saying that there have not been massive layoffs, but that depends on what his definition of massive means. 700 layoffs may not be big compared to the size of the company which claims thousands of employees.
Atleast one comment indicates that some of the firings have been from sections dealing with the ageing Mainframe technology. Mainframes are increasing being replaced by leaner nimbler systems depending on the cloud. Development and testing teams in these divisions maybe nervous.
Obviously the employees will be under stress now due to lack of clarity on the matter – and will probably start shooting off resumes to other companies. It would be better if UST issued circulars calming down the employees.
Some comments are saying that it is the employees who got N Grade that are being laid off. N Grade is given to under performing employees. But then how can people on the bench be issued these grades? Also how come employees with 7-8 years experience are  put on the bench? Perhaps Deccan Chronicle has its facts wrong?
There is no project name being specified as being targetted for the layoffs, but let UST clear the air first.

Short film by Raviteja aakula

0 comments
 Click here

Short film by Raviteja aakula.


Google to Give Developers First Project Ara Hardware for Modular Smartphones

0 comments
Project Ara, Google's ambitious plan to create customizable modular smartphones, just moved one step closer to becoming reality.
The tech giant is now accepting applications from developers interested in receiving development boards, which will be used to create the first Project Ara modules.
The goal of Project Ara, led by Google's Advanced Technology and Projects (ATAP) group, is to create customizable phones that will be made up of individual single-function modules. This will enable users to build personalized smartphones, and swap out individual components — such as the processor or camera — without replacing the entire device.
The first boards are expected to ship at the end of July, and are "designed to help with prototyping and development of modules for the Ara platform, including modules for the current (first) prize challenge that we formally announced at Google I/O," Google wrote in an email to developers.
Developers interested in applying for the first round of development kits will have until July 17 to submit applications, while the window for the second round will close August 17, according to the email. There is a limited supply of the first boards, and Google said it will grant submissions based on "technical experience and the strength of your module concept."
Google showed off some of the first boards in April during its Project Ara developer conference, and ATAP head Paul Eremenko demoed a somewhat functioning Ara prototype last month at Google I/O.
Some of the first boards will go to teams competing in Project Ara's prize challenge— also announced during I/O — which will award $100,000 to the winning team based on four criteria, including whether or not the module enables "something you can't do today with a smartphone."

Hot requirement for selenium automation tester position at chennai

0 comments
Selenium Automation Tester 5 - 7 Yrs

Preferred Experience:  Bachelor's degree in computer science, related field or equivalent work experience

Position Requires:
·         Hands on strong experience with Selenium WebDriver (at least 2+ years) with Workable knowledge of Java.
·         Individually develop &  Built Frameworks for a minimum of 3 - 4 Regression suites is Mandatory.
·         Expertise in Build tools like Maven, Jenkins or ANT is required and desirable.
·         Should have faced challenges in Selenium using Middleware automation, Database connectivity and Web services with complex architectures.
·         Estimations for Automation ,conducting reviews on Automation scripts, Test Cases and mentoring a Automation team with selenium engineers.
·         Java programming with JUnit and TestNG is required.
·         Should have knowledge on how to setup and run the tests for multiple browsers (IE, Firefox, Chrome and Safari).
·         Guide team members and help them with technical/QA related issues.
·         Be a mentor to new automation engineers, conduct trainings and train them.
·         Strong communication and problem solving skills desired.

-- 
Thanks & Regards,
Vamsee |  IT Recruiter |
Plot # 13 , 4th Floor | Cyber Heights, Road - 2 | Banjara Hills | Hyderabad |
Consulting - Development - Staffing |
 Phone:+91-40-4943 4501 |
E-Mail : vamsee@spectrosign.com | www.spectrosign.com
www.facebook.com/Spectrosign   Linkedin  twitter.com/spectrosign  spectrosign.blog

Chinese brands are not a threat to us, says HTC

0 comments

HTC does not feel threatened by the entry of Chinese brands such as Xiaomi, Gionee and Lenovo in the Indian market and does not intend to compete with them on price, which is essentially one of their biggest USPs.

Speaking to TOI Tech, Chia-Lin Chang, chief financial officer and global sales head of HTC, said that the company is not competing on price with Chinese vendors as it doesn't just offers a hardware gadget but a complete brand experience.

"The first thing that you notice when you look at our phones is that we have better design, better form. We put our heart, mind and soul into it. We can compete on pure hardware specs but it will hurt our brand in the long term," said Chang.

"Take the example of Apple; nobody compares the hardware specs, it's all about the brand experience. Delivering on our brand promise is very important to us. There will always be a cluster of vendors fitting into (the interest of) a cluster of consumers. We're not trying to compete with these (Chinese) vendors," he added.

It's worth pointing out that Lenovo and Gionee are already selling their flagship phones in the Indian market, while Xiaomi has announced its Mi 3 phone at an extremely competitive price of Rs 14,999. The phone boasts of top-end hardware specifications including a full-HD display and Snapdragon 800 processor. The company is launching its operations in India on 15 July.


How to bypass internet censorship

0 comments

If you live in a free and democratic society, the idea that someone can control your browsing choices probably is quite disturbing. Employers blocking Facebook during working hours may be acceptable. What a free society should completely oppose, however, is censorship based on someone else's moral code, religious belief or political ideology.

How to bypass internet censorshipIrrespective of who does the censoring, the methods used are more or less the same. This article examines some of the most common methods used to filter content as well as emerging trends. In each case, I have provided a solution or practical workaround.

The current state of internet censorship

The internet is being censored in several countries around the world. Over a billion people — 20% of the global population — are affected. Due to its large population of internet users (over 500 million), China is the best known culprit, but certainly not the worst. Our Information Liberation Guide by Jim Rion has some useful information on global internet censorship and lists the following countries as the worst violators: North Korea, China, Iran and Saudi Arabia.

Other countries not well known for internet censorship include Bahrain, Belarus, Burma, Cuba, Syria, Uzbekistan, Turkmenistan and Vietnam.

Internet censorship isn't limited to oppressive regimes. For example, it is common practice for educational institutions all over the world to implement filtering of content deemed objectionable. Companies and institutions also do the same. Many public Wi-Fi access points block pornography or material based on hate and violence. Maybe you have also used public Wi-Fi hotspots where access to streaming media sites was blocked and file downloads were restricted. Clearly, the internet isn't free.

The methods used for internet censorship

IP Blocking

This is the most basic method used to filter content. It involves blocking the IP address of the target website. Unfortunately, all websites sharing the same IP address, which is usually the case on a shared hosting server, are also blocked. This was the method used by ISPs in the UK to block The Pirate BayWorkaround: All you need is a proxy with access to the blocked site. There are numerous free proxies online. This article by Guy McDowell lists four sites that give you a free updated proxy list. The proxy server fetches the website for you and displays it on your browser. Your ISP only sees the IP address of the proxy and not the blocked website. Blocked websites can also beat this censorship method by adding a new IP address and letting users know about it. Users are then able to access the site without any problems.

DNS filtering and redirection

This is a much more sophisticated filtering method where the Domain Name Server (DNS) fails to resolve the correct domain or returns an incorrect IP address. ISPs in many countries use this method to block illegal sites, for example, Denmark and Norway use DNS filtering to block child porn websites. China and Iran have also used this method numerous times in the past to block access to legitimate sites. Read Danny's article on how to change your DNS for more in-depth information.

Workaround: One way to circumvent this is to find a DNS that resolves the domain name correctly, for example, OpenDNS or Google Public DNS. To change your DNS from your ISP to OpenDNS or Google Public DNS, you must configure it in your operating system or device. Both have excellent tutorials for all types of operating systems. You can also type the numeric IP address in your URL bar instead of the actual domain name though this is less effective especially where sites share IP addresses.

URL filtering

With URL filtering, the requested URL is scanned for targeted keywords irrespective of the actual domain name typed in the URL. Many popular content control software and filters use this method. Typical users include educational institutions, private companies and government offices.

Workaround: A highly technical method to circumvent this is to use escape characters in the URL. However, it is much simpler to use encrypted protocols such as a Virtual Private Network (VPN) service or Tor. Once the data is encrypted, the filter cannot scan the URL and you can therefore access any website.

Packet filtering

This method is also known as static packet filtering. It is a firewall technique used to control network access. Incoming and outgoing data packets are monitored and either stopped or allowed through based on pre-determined rules such as source and destination IP addresses, keywords and ports. When used in internet censorship, TCP packet transmissions are terminated by the ISP when targeted keywords are detected.

Workaround: Again, VPN services and Tor are the best ways to get around packet filtering. Packets sent over VPN and Tor contain dual IP headers. Firewalls are only able to apply the filtering rules to the outer header but not the inner header when these data packets are transmitted.

Man-in-the-middle (MITM) attack

I have only heard of this method being used by some of the regimes I mentioned earlier. It is a common hacking method, but in January 2010, Chinese authorities successfully used a MITM attack to intercept and track traffic to Github.com. As the name implies, an MITM attack is based on impersonation, where the eavesdropper makes independent connections with the victims and makes them believe they are communicating with one another.

Workaround: The best defense against MITM attacks is to use encrypted network connections, such as offered by HTTPS (what is HTTPS?) and VPN. HTTPS utilizes SSL capabilities in your browser to conceal your network traffic from snooping eyes. There are Chrome and Firefox extensions known as HTTPS Everywhere, that encrypts your communication on most major sites. When browsing on HTTPS, always take note of any browser warnings to the effect that a website's certificate is not trusted. This could indicate a potential MITM attack. VPN and Tor technology also uses SSL, which forces the attacker to obtain the key used to encrypt the traffic.

TCP connection resets/forged TCP resets

In this method, when a TCP connection is blocked by an existing filter, all subsequent connection attempts are also blocked. It is also possible for other users or websites to be blocked, if network traffic is routed via the location of the block. TCP connection resets were originally used by hackers to create a DOS (Denial of Service) condition, but Internet censors in many countries are increasingly finding the technique useful to prevent access to specific sites. In late 2007, it was reported that Comcast used this method to disable peer-to-peer communication. The US FCC ordered Comcast to terminate the practice in August 2008.Workaround: The workaround for this mainly involves ignoring the reset packet transmitted by the firewall. Ignoring resets can be accomplished by applying simple firewall rules to your router, operating system or antivirus firewall. Configure your firewall to ignore the reset packet so that no further action or response is taken on that packet. You can take this a step further by examining the Time-to-live (TTL) values in the reset packets to establish if they are coming from a censorship device. Internet users in China have successfully used this workaround to beat the Great Firewall of China.

Deep Packet Inspection (DPI)

Now this one is really scary. Under the wings of the PRISM project, the NSA used this method to eavesdrop and read private email communications. China and Iran use deep packet inspection for both eavesdropping and Internet censorship. DPI technology allows prying eyes to examine the data part of a packet to search for non-compliance against pre-determined criteria. These could be keywords, a targeted email address, IP address or a telephone number in the case of VoIP. While DPI was originally used to defend against spam, viruses and system intrusion, it is clear from recent developments that it is a now a weapon of choice for Internet censorship.

Workaround: To beat a Deep Packet Inspection, you need to connect to a remote server using a secure VPN link. The Tor Browser bundle is ideal to evade deep packet inspection because it conceals your location or usage from anyone carrying out network surveillance or traffic analysis.

Conclusion & Outlook

I have mentioned VPN and Tor as a workaround to most forms of internet censorship. However, I need to issue a caveat. Recent developments in China have demonstrated that even VPN can be blocked. In late 2012, it was widely reported that the Great Firewall of China is now able to learn, discover and block encrypted network traffic from several VPN systems (not all). China Unicom, one of the largest ISPs in China, is now terminating connections whenever an encrypted connection is detected.

However, it is clear that the there is an intense contest pitting VPN firms against internet censors with each trying to stay ahead. It is a cat-and-mouse game with the VPN companies just managing to stay above water - after all that is what we pay them to do. For complete anonymity online, though, nothing beats Tor. The NSA, in documents leaked to The Guardian, has admitted that Tor is hands down "the king of high-secure, low-latency internet anonymity."

Finally, future attempts at censorship appear aimed at hacking desktops, tablets and smartphones to embed blocking software directly in users' devices. Moving forward, powerful antivirus and anti-spyware will prove to be a sensible investment.