Job @ Intel India -30 Jun 2009
INTEL INDIA
Job Code : 562195
RCG
Job Description :
- In this position, you will work for the next generation multicore Intel? Xeon™ processor test content development team. Your responsibilities will include but not limited to:
- Porting or rewriting the Architecture Validation (AV) assembly test regression test suite targeting specific areas of design
- Helping to build a force-free/Silicon compliant Validation environment
- Building a fully automated infrastructure for above test porting to maximize fault-grading coverage
- Understanding design and/or familiarizing with all defeatures and apply them judiciously to stress the design for stimulating all possible faults
- Writing new tests and/or using automated test generation tools and/or templates, debugging failing tests, running test regressions and analyzing coverage of the tests
- Resolving pattern issues, performing first pass failure analysis for failing patterns on Silicon and on enhancing simulation scripts to correctly work
- Interfacing with the design, DFX, AV and product development engineering team
Qualifications
- You must possess a Master (or a Bachelor of Science degree
plus equivalent experience) in Electrical Engineering, Computer Science
, or Computer Engineering.
Additional qualifications include:
- Strong foundation in architecture, logic design and verification
- Excellent problem solving skills and teamwork
- Knowledge of design verification and test methods
- X86 Assembly Language, C++, Perl Programming skills
- Knowledge of hardware description languages (Verilog* would be an added advantage)
Last Date - 30 Jun 2009
Location : Bangalore
Click here for FREE Interview Questions
Click to Apply Online.
FRESHERS - iGate 15th Nov, 2008
iGate - For software functions (Not BPO or Call Centre)
BSc / BCA / 2009 pass outs
Postponed to Saturday, 15th November 2008
Outside Kerala Students Also Eligible
No More Tests scheduled for 2009 BSc after this
Batch : 2009 pass outs (Very good Requirement)
Salary : 2.0 Lakh Per Annum
MTech : Selected Eligible Candidates will have opportunity to do higher studies
No bond.
Date Saturday : Postponed to Saturday, 15th November 2008
Venue : Auditorium,Rajagiri Engineering College, Kakkanad, Ernakulam
Reporting Time : 8.30 AM
Eligibility : BSc / BCA 2008 pass outs with 60 %+ in X, XII & Degree.
Eligible Branches : BCA & BSc -
1. CS
2. IT
3. Computer and Networking
4. Computer Application
5. Computer Application & Information Technology
6. Computer Hardware Maintenance
7. Computer Information Systems
8. Computer Maintenance
9. Computer Maintenance & Electronics
10. Computer Science
11. Computer Science & Information
12. Computer Technology
13. Electronics & Computer Hardware
14. Electronics & Computer Maintenance
15. Software Systems
16. Software Technology.
17. Physics with Computer Applications
18. And subjects like Instrumentation, Mathematics,Chemistry, Optical Instrumentation, if they have computer as Sub.
All the candidates should bring the following.
1. Two copies of RESUME
2. Two sets of photocopies of your mark lists
3. Three copies of passport size photographs
4. Rs. 100/- towards exam fee
5. Valid photo identity card (Driving licence / Voters ID / Passport / College ID)
6. Writing Pad
7. Gum
Click here for FREE Interview Questions
For Registration: http://www.shredskerala.org/shredslogin.action
Walk-in for Graduate or Diploma - 31st Oct, 2008
ISO 9001:2000 certified software services company with State-of-the-Art development centers at Delhi , Hyderabad,Chennai,Bhubneswar, Dehradun and subsidiaries in US, UK, Australia & Middle East.
Computer Operator (30 Vacancies for freshers)
http://www.ChetanaS.org
Candidate Profile:
The Candidate should be (Graduate+ Computer Diploma) or (12th + Computer Diploma) or Autocad Diploma or Computer Diploma.
Job Location: Dehradun
Walk-In Date: 31 Oct 2008 | 2-4pm
Venue: RAMTeCH Software Solutions Pvt. Ltd.
STPI, Incubation Center, Sahastradhara Road
Interested candidates kindly come on Time along with all Original Documents
Click for Free Interview Questions
FRESHERS Walk-In for Java & .NET 27th to 31st Oct., 2008
Website: http://www.alcovetechnologies.com
Alcove Technologies is a fast growing IT , Bioinformatics, Knowledge/Business process outsourcing organization based in Hyderabad,requires the following FRESHERS candidates :
Walk-In Interview for Java & .Net Trainees who has completed B.E/B-Tech/ MCA Year of passout can be 2006/2007/2008.
- Java-trainees
Skills: Core java,servlet,jsp,MySql,Struts.
Exp: 0-1 yrs - .Net Trainees:
Skills:Candidate should have skills in Asp.Net, C# and SqlServer .
Experience:0-1 yrs
The candidate who appeared recently need not apply.
Walk-in Dates: 27-10-08 & 31-10-08 between 3 AM to 5 PM
Alcove Technologies Pvt. Ltd.
401, 402 Balaji Residency,
Hitec-City Main Road, Near Kasani GR Hotel Madhapur, Hyderabad-500081
Ph: +91 40 4435 5509 (D)
Click here for FREE Interview Questions
FRESHER - 3iInfoTech - 9th Nov, 2008
Website: www.3i-infotech.com
3i Infotech Ltd. (formerly ICICI Infotech Ltd.)
Looking for POST-GRADUATES/ GRADUATES/ Engineering diploma holders with/without experience (IT/non-IT) to join us as trainees.
- Selection Process:
Prior work experience is not required. However a strong aptitude for an IT career is a must.
To test candidates’ aptitude, an aptitude test will be conducted.
The test will be of 90 minutes duration and have sections on logical reasoning ability, quantitative aptitude and English language ability. It will consist of objective questions. Each section will have 50 questions. Passing in every section is essential. There will be negative score for incorrect answers to the extent of 25%. (i.e., if a question is of 1 mark then incorrect answer will have –0.25 marks). The test will be conducted on November 9th, 2008.
(The exact details of time and venue for the test will be communicated to the interested candidates through their respective admit cards.)
The aptitude test is rescheduled. The new date is Nov 09, 2008
For Complte details of Recruitment Process , Test Centers & How To Apply Please visit: http://125.18.122.114/examtracker/login.aspx
SQL Server Interview Questions
Relational Data Base Management Systems (RDBMS) are database management systems that maintain data records and indices in tables. Relationships may be created and maintained across and among the data and tables. In a relational database, relationships between data items are expressed by means of tables. Interdependencies among these tables are expressed by data values rather than by pointers. This allows a high degree of data independence. An RDBMS has the capability to recombine the data items from different files, providing powerful tools for data usage.
What is normalization?
Database normalization is a data design and organization process applied to data structures based on rules that help build relational databases. In relational database design, the process of organizing data to minimize redundancy. Normalization usually involves dividing a database into two or more tables and defining relationships between the tables. The objective is to isolate data so that additions, deletions, and modifications of a field can be made in just one table and then propagated through the rest of the database via the defined relationships.
What is View?
A simple view can be thought of as a subset of a table. It can be used for retrieving data, as well as updating or deleting rows. Rows updated or deleted in the view are updated or deleted in the table the view was created with. It should also be noted that as data in the original table changes, so does data in the view, as views are the way to look at part of the original table. The results of using a view are not permanently stored in the database. The data accessed through a view is actually constructed using standard T-SQL select command and can come from one to many different base tables or even other views.
What is Index?
An index is a physical structure containing pointers to the data. Indices are created in an existing table to locate rows more quickly and efficiently. It is possible to create an index on one or more columns of a table, and each index is given a name. The users cannot see the indexes, they are just used to speed up queries. Effective indexes are one of the best ways to improve performance in a database application. A table scan happens when there is no index available to help a query. In a table scan SQL Server examines every row in the table to satisfy the query results. Table scans are sometimes unavoidable, but on large tables, scans have a terrific impact on performance.
Clustered indexes define the physical sorting of a database table’s rows in the storage media. For this reason, each database table may have only one clustered index.
Non-clustered indexes are created outside of the database table and contain a sorted list of references to the table itself.
What is the difference between clustered and a non-clustered index?
A clustered index is a special type of index that reorders the way records in the table are physically stored. Therefore table can have only one clustered index. The leaf nodes of a clustered index contain the data pages.
A nonclustered index is a special type of index in which the logical order of the index does not match the physical stored order of the rows on disk. The leaf node of a nonclustered index does not consist of the data pages. Instead, the leaf nodes contain index rows.
What are the different index configurations a table can have?
A table can have one of the following index configurations:
No indexes
A clustered index
A clustered index and many nonclustered indexes
A nonclustered index
Many nonclustered indexes
What is cursors?
Cursor is a database object used by applications to manipulate data in a set on a row-by-row basis, instead of the typical SQL commands that operate on all the rows in the set at one time.
In order to work with a cursor we need to perform some steps in the following order:
Declare cursor
Open cursor
Fetch row from the cursor
Process fetched row
Close cursor
Deallocate cursor
What is the use of DBCC commands?
DBCC stands for database consistency checker. We use these commands to check the consistency of the databases, i.e., maintenance, validation task and status checks.
E.g. DBCC CHECKDB - Ensures that tables in the db and the indexes are correctly linked.
DBCC CHECKALLOC - To check that all pages in a db are correctly allocated.
DBCC CHECKFILEGROUP - Checks all tables file group for any damage.
What is a Linked Server?
Linked Servers is a concept in SQL Server by which we can add other SQL Server to a Group and query both the SQL Server dbs using T-SQL Statements. With a linked server, you can create very clean, easy to follow, SQL statements that allow remote data to be retrieved, joined and combined with local data. Storped Procedure sp_addlinkedserver, sp_addlinkedsrvlogin will be used add new Linked Server.
What is Collation?
Collation refers to a set of rules that determine how data is sorted and compared. Character data is sorted using rules that define the correct character sequence, with options for specifying casesensitivity, accent marks, kana character types and character width.
What is difference between DELETE & TRUNCATE commands?
Delete command removes the rows from a table based on the condition that we provide with a WHERE clause. Truncate will actually remove all the rows from a table and there will be no data in the table after we run the truncate command.
TRUNCATE
TRUNCATE is faster and uses fewer system and transaction log resources than DELETE.
TRUNCATE removes the data by deallocating the data pages used to store the table’s data, and only the page deallocations are recorded in the transaction log.
TRUNCATE removes all rows from a table, but the table structure and its columns, constraints, indexes and so on remain. The coun........
DELETE
DELETE removes rows one at a time and records an entry in the transaction log for each deleted row. If you want to retain the identity counter, use DELETE instead. If you want to remove table definition and its data, use the DROP TABLE statement.
.
.
For more Check out the link http://www.prepareinterview.com
www.prepareinterview.com includes FREE Interview Questions in Information Technology softwares like Java, Dot Net, ASP, Oracle, SQL Server and General Aptitude, Logical reasoning, Software Testing.
Group Discussion - Tips
FACTORS THAT ARE IMPORTANT IN A GROUP DISCUSSION:
1. POWER OF EXPRESSION: The ideas must be expressed clearly, fluently and logically.
2. KNOWLEDGE: The range of ideas and depth of thoughts go a long way in favouring a candidate.
3. SOCIAL ADAPTABILITY: Co-operative attitude, readiness to accept mistakes, ability to accept criticism with grace and consideration for the thought of others are the qualities that are looked for in a candidate.
4. FLEXIBILITY: A selfless attitude and receptive natur....
TIPS TO THE CANDIDATE:
Be active and interested in the discussion. The candidate must remain alert to the activities of the group and must not allow the mind to wander away. Concentrate on and look at the individual who speaks with cheer and smile.
Listen to the briefing of the subject of discussion and understan....
.....
.....
For more Check out the link http://www.prepareinterview.com
www.prepareinterview.com includes FREE Interview Questions in Information Technology softwares like Java, Dot Net, ASP, Oracle, SQL Server and General Aptitude, Logical reasoning, Software Testing.
ASP.NET Interview Questions
inetinfo.exe is theMicrosoft IIS server running, handling ASP.NET requests among other things.When an ASP.NET request is received (usually a file with .aspx extension), the ISAPI filter aspnet_isapi.dll takes care of it by passing the request tothe actual worker process aspnet_wp.exe.
What’s the difference between Response.Write() andResponse.Output.Write()?
Response.Output.Write() allows you to write formatted output.
What methods are fired during the page load?
Init() - when the page is instantiated
Load() - when the page is loaded into server memory
PreRender() - the brief moment before the page is displayed to the user as HTML
Unload() - when page finishes loading.
When during the page processing cycle is ViewState available?
After the Init() and before the Page_Load(), or OnLoad() for a control.
What namespace does the Web page belong in the .NET Framework class hierarchy?
System.Web.UI.Page
Where do you store the information about the user’s locale?
System.Web.UI.Page.Culture
What’s the difference between Codebehind="MyCode.aspx.cs" andSrc="MyCode.aspx.cs"?
CodeBehind is relevant to Visual Studio.NET only.
What’s a bubbled event?
When you have a complex control, like DataGrid, writing an event processing routine for each object (cell, button, row, etc.) is quite tedious. The controls can bubble up their eventhandlers, allowing the main DataGrid event handler to take care of its constituents.
Suppose you want a certain ASP.NET function executed on MouseOver for a certain button. Where do you add an event handler?
Add an OnMouseOver attribute to the button. Example: btnSubmit.Attributes.Add("onmouseover","someClientCodeHere();");
What data types do the RangeValidator control support?
Integer, String, and Date.
.
.
.
.
For more Check out the link http://www.prepareinterview.com
www.prepareinterview.com includes FREE Interview Questions in Information Technology softwares like Java, Dot Net, ASP, Oracle, SQL Server and General Aptitude, Logical reasoning, Software Testing.
Dot Net Framework - Interview Questions
The Microsoft .NET Framework is a platform for building, deploying, and running Web Services and applications. It provides a highly productive, standards-based, multi-language environment for integrating existing investments with next-generation applications and services as well as the agility to solve the challenges of deployment and operation of Internet-scale applications. The .NET Framework consists of three main parts: the common language runtime, a hierarchical set of unified class libraries, and a componentized version of Active Server Pages called ASP.NET.
Runtime Technical Questions
Terminology
What is the common language runtime (CLR)?
The common language runtime is the execution engine for .NET Framework applications.
It provides a number of services, including the following:
Code management (loading and execution)
Application memory isolation
Verification of type safety
Conversion of IL to native code
Access to metadata (enhanced type information)
Managing memory for managed objects
Enforcement of code access security
Exception handling, including cross-language exceptions
Interoperation between managed code, COM objects, and pre-existing DLLs (unmanaged code and data)
Automation of object layout
Support for developer services (profiling, debugging, and so on)
What is the common type system (CTS)?
The common type system is a rich type system, built into the common language runtime, that supports the types and operations found in most programming languages. The common type system supports the complete implementation of a wide range of programming languages.
What is the Common Language Specification (CLS)?
The Common Language Specification is a set of constructs and constraints that serves as a guide for library writers and compiler writers. It allows libraries to be fully usable from any language supporting the CLS, and for those languages to integrate with each other. The Common Language Specification is a subset of the common type system. The Common Language Specification is also important to application developers who are writing code that will be used by other developers. When developers design publicly accessible APIs following the rules of the CLS, those APIs are easily used from all other programming languages that target the common language runtime.
What is the Microsoft Intermediate Language (MSIL)?
MSIL is the CPU-independent instruction set into which .NET Framework programs are compiled. It contains instructions for loading, storing, initializing, and calling methods on objects.
Combined with metadata and the common type system, MSIL allows for true cross-language integration.
Prior to execution, MSIL is converted to machine code. It is not interpreted.
What is managed code and managed data?
Managed code is code that is written to target the services of the common language runtime (see What is the Common Language Runtime?). In order to target these services, the code must provide a minimum level of information (metadata) to the runtime. All C#, Visual Basic .NET, and JScript .NET code is managed by default. Visual Studio .NET C++ code is not managed by default, but the compiler can produce managed code by specifying a command-line switch (/CLR).
Closely related to managed code is managed data—data that is allocated and de-allocated by the common language runtime's garbage collector. C#, Visual Basic, and JScript .NET data is managed by default. C# data can, however, be marked as unmanaged through the use of special keywords. Visual Studio .NET C++ data is unmanaged by default (even when using the /CLR switch), but when using Managed Extensions for C++, a class can be marked as managed by using the __gc keyword. As the name suggests, this means that the memory for instances of the class is managed by the garbage collector. In addition, the class becomes a full participating member of the .NET Framework community, with the benefits and restrictions that brings. An example of a benefit is proper interoperability with classes written in other languages (for example, a managed C++ class can inherit from a Visual Basic class). An example of a restriction is that a managed class can only inherit from one base class.
Assemblies
What is an assembly?
An assembly is the primary building block of a .NET Framework application. It is a collection of functionality that is built, versioned, and deployed as a single implementation unit (as one or more files). All managed types and resources are marked either as accessible only within their implementation unit, or as accessible by code outside that unit.
Assemblies are self-describing by means of their manifest, which is an integral part of every assembly. The manifest:
Establishes the assembly identity (in the form of a text name), version, culture, and digital signature (if the assembly is to be shared across applications).
Defines what files (by name and file hash) make up the assembly implementation.
Specifies the types and resources that make up the assembly, including which are exported from the assembly.
Itemizes the compile-time dependencies on other assemblies.
Specifies the set of permissions required for the assembly to run properly.
This information is used at run time to resolve references, enforce version binding policy, and validate the integrity of loaded assemblies. The runtime can determine and locate the assembly for any running object, since every type is loaded in the context of an assembly. Assemblies are also the unit at which code access security permissions are applied. The identity evidence for each assembly is considered separately when determining what permissions to grant the code it contains.
The self-describing nature of assemblies also helps makes zero-impact install and XCOPY deployment feasible.
What are private assemblies and shared assemblies?
A private assembly is used only by a single application, and is stored in that application's install directory (or a subdirectory therein). A shared assembly is one that can be referenced by more than one application. In order to share an assembly, the assembly must be explicitly built for this purpose by giving it a cryptographically strong name (referred to as a strong name). By contrast, a private assembly name need only be unique within the application that uses it.
By making a distinction between private and shared assemblies, we introduce the notion of sharing as an explicit decision. Simply by deploying private assemblies to an application directory, you can guarantee that that application will run only with the bits it was built and deployed with. References to private assemblies will only be resolved locally to the private application directory.
There are several reasons you may elect to build and use shared assemblies, such as the ability to express version policy. The fact that shared assemblies have a cryptographically strong name means that only the author of the assembly has the key to produce a new version of that assembly. Thus, if you make a policy statement that says you want to accept a new version of an assembly, you can have some confidence that version updates will be controlled and verified by the author. Otherwise, you don't have to accept them.
For locally installed applications, a shared assembly is typically explicitly installed into the global assembly cache (a local cache of assemblies maintained by the .NET Framework). Key to the version management features of the .NET Framework is that downloaded code does not affect the execution of locally installed applications. Downloaded code is put in a special download cache and is not globally available on the machine even if some of the downloaded components are built as shared assemblies.
The classes that ship with the .NET Framework are all built as shared assemblies.
If I want to build a shared assembly, does that require the overhead of signing and managing key pairs?
Building a shared assembly does involve working with cryptographic keys. Only the public key is strictly needed when the assembly is being built. Compilers targeting the .NET Framework provide command line options (or use custom attributes) for supplying the public key when building the assembly. It is common to keep a copy of a common public key in a source database and point build scripts to this key. Before the assembly is shipped, the assembly must be fully signed with the corresponding private key. This is done using an SDK tool called SN.exe (Strong Name).
Strong name signing does not involve certificates like Authenticode does. There are no third party organizations involved, no fees to pay, and no certificate chains. In addition, the overhead for verifying a strong name is much less than it is for Authenticode. However, strong names do not make any statements about trusting a particular publisher. Strong names allow you to ensure that the contents of a given assembly haven't been tampered with, and that the assembly loaded on your behalf at run time comes from the same publisher as the one you developed against. But it makes no statement about whether you can trust the identity of that publisher.
What is the difference between a namespace and an assembly name?
A namespace is a logical naming scheme for types in which a simple type name, such as MyType, is preceded with a dot-separated hierarchical name. Such a naming scheme is completely under the control of the developer. For example, types MyCompany.FileAccess.A and MyCompany.FileAccess.B might be logically expected to have functionality related to file access. The .NET Framework uses a hierarchical naming scheme for grouping types into logical categories of related functionality, such as the Microsoft® ASP.NET application framework, or remoting functionality. Design tools can make use of namespaces to make it easier for developers to browse and reference types in their code. The concept of a namespace is not related to that of an assembly. A single assembly may contain types whose hierarchical names have different namespace roots, and a logical namespace root may span multiple assemblies. In the .NET Framework, a namespace is a logical design-time naming convenience, whereas an assembly establishes the name scope for types at run time.
Application Deployment and Isolation
What options are available to deploy my .NET applications?
The .NET Framework simplifies deployment by making zero-impact install and XCOPY deployment of applications feasible. Because all requests are resolved first to the private application directory, simply copying an application's directory files to disk is all that is needed to run the application. No registration is required.
This scenario is particularly compelling for Web applications, Web Services, and self-contained desktop applications. However, there are scenarios where XCOPY is not sufficient as a distribution mechanism. An example is when the application has little private code and relies on the availability of shared assemblies, or when the application is not locally installed (but rather downloaded on demand). For these cases, the .NET Framework provides extensive code download services and integration with the Windows Installer. The code download support provided by the .NET Framework offers several advantages over current platforms, including incremental download, code access security (no more Authenticode dialogs), and application isolation (code downloaded on behalf of one application doesn't affect other applications). The Windows Installer is another powerful deployment mechanism available to .NET applications. All of the features of Windows Installer, including publishing, advertisement, and application repair will be available to .NET applications in Windows Installer 2.0.
I've written an assembly that I want to use in more than one application. Where do I deploy it?
Assemblies that are to be used by multiple applications (for example, shared assemblies) are deployed to the global assembly cache. In the prerelease and Beta builds, use the /i option to the GACUtil SDK tool to install an assembly into the cache:
gacutil /i myDll.dll
Windows Installer 2.0, which ships with Windows XP and Visual Studio .NET will be able to install assemblies into the global assembly cache.
How can I see what assemblies are installed in the global assembly cache?
The .NET Framework ships with a Windows shell extension for viewing the assembly cache. Navigating to % windir%\assembly with the Windows Explorer activates the viewer.
What is an application domain?
An application domain (often AppDomain) is a virtual process that serves to isolate an application. All objects created within the same application scope (in other words, anywhere along the sequence of object activations beginning with the application entry point) are created within the same application domain. Multiple application domains can exist in a single operating system process, making them a lightweight means of application isolation.
An OS process provides isolation by having a distinct memory address space. While this is effective, it is also expensive, and does not scale to the numbers required for large web servers. The Common Language Runtime, on the other hand, enforces application isolation by managing the memory use of code running within the application domain. This ensures that it does not access memory outside the boundaries of the domain. It is important to note that only type-safe code can be managed in this way (the runtime cannot guarantee isolation when unsafe code is loaded in an application domain).
Garbage Collection
What is garbage collection?
Garbage collection is a mechanism that allows the computer to detect when an object can no longer be accessed. It then automatically releases the memory used by that object (as well as calling a clean-up routine, called a "finalizer," which is written by the user). Some garbage collectors, like the one used by .NET, compact memory and therefore decrease your program's working set.
How does non-deterministic garbage collection affect my code?
For most programmers, having a garbage collector (and using garbage collected objects) means that you never have to worry about deallocating memory, or reference counting objects, even if you use sophisticated data structures. It does require some changes in coding style, however, if you typically deallocate system resources (file handles, locks, and so forth) in the same block of code that releases the memory for an object. With a garbage collected object you should provide a method that releases the system resources deterministically (that is, under your program control) and let the garbage collector release the memory when it compacts the working set.
Can I avoid using the garbage collected heap?
All languages that target the runtime allow you to allocate class objects from the garbage-collected heap. This brings benefits in terms of fast allocation, and avoids the need for programmers to work out when they should explicitly 'free' each object.
The CLR also provides what are called ValueTypes—these are like classes, except that ValueType objects are allocated on the runtime stack (rather than the heap), and therefore reclaimed automatically when your code exits the procedure in which they are defined. This is how "structs" in C# operate.
Managed Extensions to C++ lets you choose where class objects are allocated. If declared as managed Classes, with the __gc keyword, then they are allocated from the garbage-collected heap. If they don't include the __gc keyword, they behave like regular C++ objects, allocated from the C++ heap, and freed explicitly with the "free" method.
For additional information about Garbage Collection see:
Garbage Collection: Automatic Memory Management in the Microsoft .NET Framework
Garbage Collection, Part 2: Automatic Memory Management in the Microsoft .NET Framework
Remoting
How do in-process and cross-process communication work in the Common Language Runtime?
There are two aspects to in-process communication: between contexts within a single application domain, or across application domains. Between contexts in the same application domain, proxies are used as an interception mechanism. No marshaling/serialization is involved. When crossing application domains, we do marshaling/serialization using the runtime binary protocol.
Cross-process communication uses a pluggable channel and formatter protocol, each suited to a specific purpose.
If the developer specifies an endpoint using the tool soapsuds.exe to generate a metadata proxy, HTTP channel with SOAP formatter is the default.
If a developer is doing explicit remoting in the managed world, it is necessary to be explicit about what channel and formatter to use. This may be expressed administratively, through configuration files, or with API calls to load specific channels. Options are:
HTTP channel w/ SOAP formatter (HTTP works well on the Internet, or anytime traffic must travel through firewalls)
TCP channel w/ binary formatter (TCP is a higher performance option for local-area networks (LANs))
When making transitions between managed and unmanaged code, the COM infrastructure (specifically, DCOM) is used for remoting. In interim releases of the CLR, this applies also to serviced components (components that use COM+ services). Upon final release, it should be possible to configure any remotable component.
Distributed garbage collection of objects is managed by a system called "leased based lifetime." Each object has a lease time, and when that time expires, the object is disconnected from the remoting infrastructure of the CLR. Objects have a default renew time-the lease is renewed when a successful call is made from the client to the object. The client can also explicitly renew the lease.
Interoperability
Can I use COM objects from a .NET Framework program?
Yes. Any COM component you have deployed today can be used from managed code, and in common cases the adaptation is totally automatic.
Specifically, COM components are accessed from the .NET Framework by use of a runtime callable wrapper (RCW). This wrapper turns the COM interfaces exposed by the COM component into .NET Framework-compatible interfaces. For OLE automation interfaces, the RCW can be generated automatically from a type library. For non-OLE automation interfaces, a developer may write a custom RCW and manually map the types exposed by the COM interface to .NET Framework-compatible types.
Can .NET Framework components be used from a COM program?
Yes. Managed types you build today can be made accessible from COM, and in the common case the configuration is totally automatic. There are certain new features of the managed development environment that are not accessible from COM. For example, static methods and parameterized constructors cannot be used from COM. In general, it is a good idea to decide in advance who the intended user of a given type will be. If the type is to be used from COM, you may be restricted to using those features that are COM accessible.
Depending on the language used to write the managed type, it may or may not be visible by default.
Specifically, .NET Framework components are accessed from COM by using a COM callable wrapper (CCW). This is similar to an RCW (see previous question), but works in the opposite direction. Again, if the .NET Framework development tools cannot automatically generate the wrapper, or if the automatic behavior is not what you want, a custom CCW can be developed.
Can I use the Win32 API from a .NET Framework program?
Yes. Using platform invoke, .NET Framework programs can access native code libraries by means of static DLL entry points.
Here is an example of C# calling the Win32 MessageBox function:
using System;
using System.Runtime.InteropServices;
class MainApp
{
[DllImport("user32.dll", EntryPoint="MessageBox")]
public static extern int MessageBox(int hWnd, String strMessage, String strCaption, uint uiType);
public static void Main()
{
MessageBox( 0, "Hello, this is PInvoke in operation!", ".NET", 0 );
}
}
Security
What do I have to do to make my code work with the security system?
Usually, not a thing—most applications will run safely and will not be exploitable by malicious attacks. By simply using the standard class libraries to access resources (like files) or perform protected operations (such as a reflection on private members of a type), security will be enforced by these libraries. The one simple thing application developers may want to do is include a permission request (a form of declarative security) to limit the permissions their code may receive (to only those it requires). This also ensures that if the code is allowed to run, it will do so with all the permissions it needs.
Only developers writing new base class libraries that expose new kinds of resources need to work directly with the security system. Instead of all code being a potential security risk, code access security constrains this to a very small bit of code that explicitly overrides the security system.
Why does my code get a security exception when I run it from a network shared drive?
Default security policy gives only a restricted set of permissions to code that comes from the local intranet zone. This zone is defined by the Internet Explorer security settings, and should be configured to match the local network within an enterprise. Since files named by UNC or by a mapped drive (such as with the NET USE command) are being sent over this local network, they too are in the local intranet zone.
The default is set for the worst case of an unsecured intranet. If your intranet is more secure you can modify security policy (with the .NET Framework Configuration tool or the CASPol tool) to grant more permissions to the local intranet, or to portions of it (such as specific machine share names).
How do I make it so that code runs when the security system is stopping it?
Security exceptions occur when code attempts to perform actions for which it has not been granted permission. Permissions are granted based on what is known about code; especially its location. For example, code run from the Internet is given fewer permissions than that run from the local machine because experience has proven that it is generally less reliable. So, to allow code to run that is failing due to security exceptions, you must increase the permissions granted to it. One simple way to do so is to move the code to a more trusted location (such as the local file system). But this won't work in all cases (web applications are a good example, and intranet applications on a corporate network are another). So, instead of changing the code's location, you can also change security policy to grant more permissions to that location. This is done using either the .NET Framework Configuration tool or the code access security policy utility (caspol.exe). If you are the code's developer or publisher, you may also digitally sign it and then modify security policy to grant more permissions to code bearing that signature. When taking any of these actions, however, remember that code is given fewer permissions because it is not from an identifiably trustworthy source—before you move code to your local machine or change security policy, you should be sure that you trust the code to not perform malicious or damaging actions.
How do I administer security for my machine? For an enterprise?
The .NET Framework includes the .NET Framework Configuration tool, an MMC snap-in (mscorcfg.msc), to configure several aspects of the CLR including security policy. The snap-in not only supports administering security policy on the local machine, but also creates enterprise policy deployment packages compatible with System Management Server and Group Policy. A command line utility, CASPol.exe, can also be used to script policy changes on the computer. In order to run either tool, in a command prompt, change the current directory to the installation directory of the .NET Framework (located in %windir%\Microsoft.Net\Framework\v1.0.2914.16\) and type mscorcfg.msc or caspol.exe.
How does evidence-based security work with Windows 2000 security?
Evidence-based security (which authorizes code) works together with Windows 2000 security (which is based on log on identity). For example, to access a file, managed code must have both the code access security file permission and must also be running under a log on identity that has NTFS file access rights. The managed libraries that are included with the .NET Framework also provide classes for role-based security. These allow the application to work with Windows log on identities and user groups.
For more Check out the link http://www.prepareinterview.com
www.prepareinterview.com includes FREE Interview Questions in Information Technology softwares like Java, Dot Net, ASP, Oracle, SQL Server and General Aptitude, Logical reasoning, Software Testing.
Job Interview Q & A
Trick question. If you know about weakness, they are no longer blind spots. Do not reveal any personal areas of ...
What is your greatest strength?
Numerous answers are good, just stay positive. A few good examples: Your ability to prioritize, Your problem-solving skills, Your ability to ....
What have you learned from mistakes on the job?
Here you have to come up with something or you strain credibility. Make it small, well intentioned mistake with a positive lesson learned. An example would ...
Why should you be hired for this job?
Point out how your talents and how they meet what the organization needs. Do not mention any other job candidates and try to make a comparison. Try to ....
Check out the link http://www.prepareinterview.com/tips/techJobInterviewQ.asp
. It has everything for interview tips and tricks.
Interview DOs and DON'Ts
Interview DOs
- Do Dress appropriately for the industry; err on the side of being conservative to show you take the interview seriously. Your personal grooming and cleanliness should be impeccable.
- Do Know the exact time and location of your interview; know how long it takes to get there, park, find a rest room to freshen up, etc.
- Do Arrive early; 10 minutes prior to the interview start time.
- Do Treat other people you encounter with courtesy and respect. Their opinions of you might be solicited during hiring decisions.
- Do Offer a firm handshake, make eye contact, and have a friendly expression when you are greeted by your interviewer.
- Do Listen to be sure you understand your interviewer's name and the correct pronunciation.
- Do Even when your interviewer gives you a first and last name, address your interviewer by title (Ms., Mr., Dr.) and last name, until invited to do otherwise.
- Do Maintain good eye contact during the interview.
- Do Sit still in your seat; avoid fidgeting and slouching.
- Do Respond to questions and back up your statements about yourself with specific examples whenever possible.
- Do Ask for clarification if you don't understand a question.
- Do Be thorough in your responses, while being concise in your wording.
- Do Be honest and be yourself. Dishonesty gets discovered and is grounds for withdrawing job offers and for firing. You want a good match between yourself and your employer. If you get hired by acting like someone other than yourself, you and your employer will both be unhappy.
- Do Treat the interview seriously and as though you are truly interested in the employer and the opportunity presented.
- Do Exhibit a positive attitude. The interviewer is evaluating you as a potential co-worker. Behave like someone you would want to work with.
- Do Have intelligent questions prepared to ask the interviewer. Having done your research about the employer in advance, ask questions which you did not find answered in your research.
- Do Evaluate the interviewer and the organization s/he represents. An interview is a two-way street. Conduct yourself cordially and respectfully, while thinking critically about the way you are treated and the values and priorities of the organization.
- Do Do expect to be treated appropriately. If you believe you were treated inappropriately or asked questions that were inappropriate or made you uncomfortable, discuss this with a Career Services advisor or the director.
- Do Make sure you understand the employer's next step in the hiring process; know when and from whom you should expect to hear next. Know what action you are expected to take next, if any.
- Do When the interviewer concludes the interview, offer a firm handshake and make eye contact. Depart gracefully.
- Do After the interview, make notes right away so you don't forget critical details.
- Do Write a thank-you letter to your interviewer promptly
Interview DON'Ts
- Don't Don't make excuses. Take responsibility for your decisions and your actions.
- Don't Don't make negative comments about previous employers or professors (or others).
- Don't Don't falsify application materials or answers to interview questions.
- Don't Don't treat the interview casually, as if you are just shopping around or doing the interview for practice. This is an insult to the interviewer and to the organization.
- Don't Don't give the impression that you are only interested in an organization because of its geographic location.
- Don't Don't give the impression you are only interested in salary; don't ask about salary and benefits issues until the subject is brought up by your interviewer.
- Don't Don't act as though you would take any job or are desperate for employment.
- Don't Don't make the interviewer guess what type of work you are interested in; it is not the interviewer's job to act as a career advisor to you.
- Don't Don't be unprepared for typical interview questions. You may not be asked all of them in every interview, but being unprepared looks foolish.
- Don't A job search can be hard work and involve frustrations; don't exhibit frustrations or a negative attitude in an interview.
- Don't Don't go to extremes with your posture; don't slouch, and don't sit rigidly on the edge of your chair.
- Don't Don't assume that a female interviewer is "Mrs." or "Miss." Address her as "Ms." unless told otherwise. Her marital status is irrelevant to the purpose of the interview.
- Don't Don't chew gum or smell like smoke.
- Don't Don't allow your cell phone to sound during the interview. (If it does, apologize quickly and ignore it.) Don't take a cell phone call.
- Don't Don't take your parents, your pet (an assistance animal is not a pet in this circumstance), spouse, fiance, friends or enemies to an interview. If you are not grown up and independent enough to attend an interview alone, you're insufficiently grown up and independent for a job. (They can certainly visit your new city, at their own expense, but cannot attend your interview.)
How To face HR Interview..?
Check out the link http://www.prepareinterview.com/. It has everything for interview tips and tricks.
How To face HR Interview
1. Are your work practices similar or different from ours? (If Experienced)
2. Describe our (products/services).
3. Describe our company for me.
4. Describe our corporate environment for me.
5. Describe your work (methods/processes) in comparison to ours? (If Experienced)
6. Do our competitors do things that we should be doing?
7. Do you have any concerns about working here?
8. Do you have any questions about (our/this) company?
9. Do you know how long we have been in business?
10. Do you know what products we make?
11. How could you have prevented your (judgmental) errors?
12. How do you think our company determines success?
13. How does you present employer communicate with others in your deprtment? (If experienced)
14. Tell me how you found out information about (our/this) company?
.....
.....
For more Check out the link http://www.prepareinterview.com/.
www.prepareinterview.com includes FREE Interview Questions in Information Technology softwares like Java, Dot Net, ASP, Oracle, SQL Server and General Aptitude, Logical reasoning, Software Testing.
Urgent requirement for Core Java, JDBC professionals in Mumbai
About company:
SkillNet Solutions India Pvt. Ltd. is the subsidiary of SkillNet Solutions Inc., a Silicon Valley based software consulting company, which prides itself in building vertical solutions in Retail, Manufacturing, and other industries. At SkillNet, our passion for the new e-Business economy knows no bounds and neither do our results. We are technology focused, where striving for excellence is the norm and opportunities to grow abound. SkillNet Solutions provides consulting and technology services to global retailers. SkillNet Solutions India Pvt. Ltd. is primarily an offshore development center for Skillnet Solutions, USA. A major chunk of all the projects carried out by SkillNet Solutions is done from India office. Additionally, all the outsourced product development is being done from India office. Our India offices are in Nariman Point, Mumbai. Visit www.skillnetinc.com for more details.
Position: Senior Software Engineers
Work location: Mumbai
Job Description:
High Level and Detailed design of Swing technology based Store Operations projects/products
Learn and grasp new Object Oriented technology / Swing based store operations product / softwares
Develop and UnitTest code using Java, Swing, XML, XSLT, databases
Develop and UnitTest code for eCommerce and web based / applet based store operation softwares / projects
Understand MVC, Struts, Spring, Hibernate and Swing based architectures
Understand Web Services based architecture
Carry out Analysis, Design, Estimation phases of software life cycle
Train and assist other individuals
Provide Technical Leadership for small projects
Skills Required:
4-6 years of experience [Close to 4 yrs or 5 yrs of experience]
B.E / B. Tech / M. C. A./ M. S./ M. Tech
2+ years experience in core Java
Excellent overall experience in Java / J2EE based Technologies
Hands-on experience on any Store Ops application IS BIG PLUS
Experience in Java, Swing, JDBC/Oracle or SQL Server, XML, XSLT is MUST
Experience in developing web based technology projects is PLUS
Understanding of Struts/MVC/Hibernate/Spring Framework is PLUS
Experience in UML is PLUS
Knowledge of Web Services is PLUS
Experience in Retail domain or Retek/360 products or Point of Sale applications is BIG PLUS
Should be able to work independently
Write Unit Test Cases based on Unit Specification
Good oral communication
Details of Skill Levels & Minimum Experience:
Core Java / Java 5 – Level: Expert – Exp: 3 years
Swings/Applets – Level: Intermediate – Exp: 2 years
JDBC/DBs – Level: Expert – Exp: 2 years
OOAD – Level: Expert – Exp: 2 years
360-Commerce/Store Operations Application – Level: Beginner – Exp: 0.5 years
XML – Level: Intermediate – Exp: 2 years
HOW TO APPLY: If interested, send your updated resume ASAP to ssiplhr at skillnetinc dot com
Best Opportunity for Java professionals
Experience: 4-7 years
Job Location: Pune
Education: University Graduate with a technical engineering degree preferably in computer science
Mandatory skills:
Very strong knowledge of Java, Objected Oriented Prgramming and design patterns.
Strong database programming experience, preferably using Oracle.
Database design knowledge.
Experience in CORBA a plus.
Experience in Process Modelling a plus
Primary Duties and Responsibilities:
Sound understanding & exposure of using best practices in coding & usage of design patterns.
Working on Development, Design, Unit Testing and Rollouts.
Working on client Server technology
Working on new products/application development
Working on Production Rollouts
Note: Candidates from Pune, Mumbai, and Bangalore can apply.
HOW TO APPLY? If interested, send your updated resume immediately to nidhi.v at alpconsultants dot com.
iSOFT Walk-in @ Chennai
Job Description
Collate functional requirements and prepare a detailed requirement specification through working collaboratively with other internal and external stakeholders. Produce functional design documents for functional and non-functional requirements in accordance with the product principles and hand over to technical design. Provide support to the development process to ensure the delivery of documented requirements against agreed designs. Track and monitor progress for adherence to design and timelines.
Years of Experience : 2 to 8 yrs
UI Designers : Technical Skills
Good UI conceptualisation, design skills and usability skills
Ability to create Quick HTML prototypes from Functional Specifications.
Knowledge of .NET, C#, SQL server and XML.
Knowledge of Healthcare domain and Usability Testing is an added advantage
Hands on experience in one or more of the following Adobe Photoshop,Dreamweaver, Flash MX , Corel Draw
Job Description
Collate functional requirements and prepare a detailed requirement specification through working collaboratively with other internal and external stakeholders. Produce functional design documents for functional and non-functional requirements in accordance with the product principles and hand over to technical design. Provide support to the development process to ensure the delivery of documented requirements against agreed designs. Track and monitor progress for adherence to design and timelines.
Years of Experience : 2 to 8 yrs
UI Designers : Technical Skills
Good UI conceptualisation, design skills and usability skills
Ability to create Quick HTML prototypes from Functional Specifications.
Knowledge of .NET, C#, SQL server and XML.
Knowledge of Healthcare domain and Usability Testing is an added advantage
Hands on experience in one or more of the following Adobe Photoshop,Dreamweaver, Flash MX , Corel Draw
Job Description
Conceptualisation and design of user experience (through appropriately packaged prototypes where required) pertaining to the product/research concepts through interactions with domain analysts, business analysts and product specialists, and end users wherever possible. Review and preparation of alternate product designs for usability and user experience
Years of Experience : 2 to 8 yrs
Please send in your referral profiles to Email Id employee.referral@isoftplc.com
All the positions are based in Chennai
Job Interview Questions
Why should you be hired for this job?
Point out how your talents and how they meet what the organization needs. Do not mention any other job candidates and try to make a comparison. Try to tie a few things to your career path and how it is a good fit. Answer this question with confidence. Do not waffle. You show already know why you should be hired. If you have doubts or are tentitive about this answer, your interviewer might also have doubts.
Why did you leave (or want to leave) your last job?
Stay positive regardless of the circumstances. Never refer to a major problem with management and never speak ill of supervisors, co-workers or the organization. If you do, you will be the one looking bad. Keep smiling and talk about leaving for a positive reason such as an opportunity, a chance to do something special or other forward-looking reasons.
What do you know about this company/organization?
This question is one reason to do some research on the organization before the interview. Find out where they have been and where they are going. What are the current issues and who are the major players?
What have you done to improve your knowledge in the last year?
Try to include improvement activities that relate to the job. A wide variety of activities can be mentioned as positive self-improvement. Have some good ones handy to mention.
Do you have any weaknesses?
Trick question. If you know about weakness, they are no longer blind spots. Do not reveal any personal areas of concern here. Let them do their own discovery on your bad points. Do not hand it to them.
What is your greatest strength?
Numerous answers are good, just stay positive. A few good examples: Your ability to prioritize, Your problem-solving skills, Your ability to work under pressure, Your ability to focus on projects, Your professional expertise, Your leadership skills, Your positive attitude.
What have you learned from mistakes on the job?
Here you have to come up with something or you strain credibility. Make it small, well intentioned mistake with a positive lesson learned. An example would be working too far ahead of colleagues on a project and thus throwing coordination off.
Have you ever had to fire anyone? How did you feel about that?
This is serious. Do not make light of it or in any way seem like you like to fire people. At the same time, you will do it when it is the right thing to do. When it comes to the organization versus the individual who has created a harmful situation, you will protect the organization. Remember firing is not the same as layoff or reduction in force.
Are you a team player?
You are, of course, a team player. Be sure to have examples ready. Specifics that show you often perform for the good of the team rather than for yourself are good evidence of your team attitude. Do not brag, just say it in a matter-of-fact tone. This is a key point.
Describe your management style.
Try to avoid labels. Some of the more common labels, like progressive, salesman or consensus, can have several meanings or descriptions depending on which management expert you listen to. The situational style is safe, because it says you will manage according to the situation, instead of one size fits all.
Would you be willing to relocate if required?
You should be clear on this with your family prior to the interview if you think there is a chance it may come up. Do not say yes just to get the job if the real answer is no. This can create a lot of problems later on in your career. Be honest at this point and save yourself future grief.
Are you willing to work overtime? Nights? Weekends?
This is up to you. Be totally honest.
What motivates you to do your best on the job?
This is a personal trait that only you can say, but good examples are:
Challenge, Achievement, Recognition
What motivates you to do your best on the job?
This is a personal trait that only you can say, but good examples are:
Challenge, Achievement, Recognition
What would your previous manager say your strongest point is?
There are numerous good possibilities:
Loyalty, Energy, Positive attitude, Leadership, Team player, Expertise, Initiative, Patience, Hard work, Creativity, Problem solver.
What kind of salary are you asking for?
A common loaded question. A tricky little game that you will probably lose if you answer first. So, do not answer it. Instead, say something like, That’s a tough question. Can you tell me the range for this position? In most cases, the interviewer, taken off guard, will tell you. If not, say that it can depend on the details of the job. Then give a wide range.
Stay away from a specific job. You cannot win. If you say the job you are contending for is it, you strain credibility. If you say another job is it, you plant the suspicion that you will be dissatisfied with this position if hired. The best is to stay genetic and say something like: A job where I love the work, like the people, can contribute and can’t wait to get to work.
Do you think you are overqualified for this position?
Regardless of your qualifications, state that you are very well qualified for the position.
How do you propose to compensate for your lack of experience?
First, if you have experience that the interviewer does not know about, bring that up: Then, point out (if true) that you are a hard working quick learner.
What qualities do you look for in a Manager?
Be generic and positive. Safe qualities are knowledgeable, a sense of humor, fair, loyal to subordinates and holder of high standards. All bosses think they have these traits.
Tell me about a time when you helped resolve a dispute between coworkers.
Pick a specific incident. Concentrate on your problem solving technique and not the dispute you settled.
Describe your work ethic.
Emphasize benefits to the company and the hiring manager. Things like, determination to get the job done and work hard but enjoy your work are good.
Source: http://www.PrepareInterview.com