Wednesday, 6 February 2013

SPMCIL Recruitment 2013 Application Form | www.spmcil.com Career Jobs Read more: SPMCIL Recruitment 2013 Application Form | www.spmcil.com Career Jobs http://educationsportal.blogspot.com/2013/02/spmcil-recruitment-2013-application.html#ixzz2K5HOz3mu

SPMCIL Recruitment 2013 Application Form | www.spmcil.com Career Jobs : 1.Security Printing and minting Corporation of India Limited (SPMCIL) has published a latest recruitment notification for filling up General Manager (E-8 Level), Officer (Official Language) (E-1 Level) vacancies 2013. Eligible candidates can apply online application before 3rd March 2013. More details of SPMCIL recruitment 2013 is visit the given below link.

2.Candidates SPMCIL Recruitment 2013 Post name, Age Details, Age relaxations, Educational Qualification, Salary, Selection process, How To Apply online for SPMCIL Recruitment 2013, Application Form Fee, Important dates like exam dates, online application date visit the given below link.

3.SPMCIL Recruitment 2013 & Application form - http://www.spmcil.com/spmcil/Interface/JobOpenings.aspx

4.Candidates if you want to received all latest updates about SPMCIL Admit card, answer key, results 2013 via Facebook, then join us on Facebook page. Candidates Touch with us for more updates or book mark this page for future reference.

Read more: SPMCIL Recruitment 2013 Application Form | www.spmcil.com Career Jobs http://educationsportal.blogspot.com/2013/02/spmcil-recruitment-2013-application.html#ixzz2K5H811CO

Sunday, 3 February 2013

Employer Rules for Hiring Non-US Workers

The immigration debate isn't just about undocumented workers -- employers are key players too. No matter which side of the debate you favor or what role you play in the hiring process, job seekers of all kinds should understand the rules that employers must follow when hiring both citizens and noncitizens.
The Immigration Reform and Control Act (IRCA) of 1996 says employers with four or more employees may not discriminate against noncitizens with proper authorization to work. Employers are also responsible for verifying that employees are authorized to work in the United States.
Employers can demonstrate compliance with IRCA by treating all new hires -- citizens and noncitizens -- the same. Thus, many employers now routinely ask for proof of citizenship or work authorization documents from all new hires. According to the 'Lectric Law Library, this includes establishing a policy of hiring only individuals who are authorized to work; a "US citizens-only" policy is illegal except in cases where US citizenship is required by federal, state or local law, or government contract.
Documents Needed for Authorization to Work
Employers should complete an Employment Eligibility Verification Form (Form I-9) for all new hires, regardless of citizenship. To complete the form, employers must permit employees to present any document or combination of documents acceptable by law. The list includes a US passport, resident alien card ("green card") or a long list of documents showing identity and authority to work, including a driver's license, an ID card with a photograph and identifying information, US military card or draft record, Social Security card, or an original or certified copy of a birth certificate. Not all aliens authorized to work are issued green cards. Employers are also responsible for keeping track of expiration dates on the documents presented.
According to the US Citizenship and Immigration Services, formerly the Immigration and Naturalization Service, employers can terminate an employee who fails to produce the required document, or a receipt for a replacement document, within three business days of the date employment begins. An employee who presents a receipt for a replacement document must produce the actual document within 90 days after employment begins.
Employer Responsibility for Verification
Employers must examine the documents and, if they appear to be genuine and to relate to the person presenting them, accept them. To do otherwise could be an unfair immigration-related practice. If a document does not reasonably appear to be genuine and/or does not appear to relate to the person presenting it, an employer need not accept it. Contact the US Immigration and Customs Enforcement office for assistance.
If law enforcement authorities discover an employee is not authorized to work, employers who properly complete Form I-9 cannot be charged with a verification violation. However, an employer cannot knowingly continue to employ that individual. IRCA also makes it illegal to knowingly hire any alien not authorized to work.
Hiring Nonresident Workers
Employers who want to hire someone who lives outside the US for permanent work, must file Form I-140, Petition for Alien Worker, and may also have to complete a labor certification request (ETA 750) from the US Department of Labor Employment and Training Administration's Division of Foreign Labor Certification.
Employers must file an I-129 petition to hire foreign workers for temporary -- though not seasonal -- services or labor, or receive training.
Hiring noncitizen seasonal workers (usually agricultural workers) means employers must apply for temporary labor certificates from the US Department of Labor, under the H-2A Temporary Foreign Worker Program.
Employers who want to hire noncitizens who live outside the United States to work temporarily in the US must show their actions will not negatively affect the job opportunities, wages or working conditions of workers already residing here by demonstrating there are not enough such workers available and that the proposed wages and working conditions meet regional standards.
The employer must also actively attempt to recruit workers already residing in the US to fill the position, including newspaper and radio advertising. Employers must also provide free, approved housing for workers unable to go home each day, as well as certain types of transportation, workman's compensation or equivalent insurance and appropriate tools and supplies at no cost. Employers must also show that the position is not open because of a strike or lockout.
If certification is granted, an employer pays a fee of $100, plus $10 for each job opportunity certified, up to a maximum of $1,000 for each certification granted.

Asus Appoints Peter Chang As Country Manager, India

Asus has appointed Peter Chang, Regional Head, South Asia as Country Manager, India.

Chang would be responsible for planning and synchronizing strategies of the System Business Products in India with those at the headquarters in Taiwan.

Commenting on the appointment, Chang said, “Asus has been successful in making an influential initial impression and has attained accolades for design and innovation across the globe. Taking over the operations in India, I would like to add greater value to the technological understanding and advancement of the country through our wide range of offerings.”

Chang started his IT career with Asus about 10 years ago. He was in-charge of Turkey, Israel and Africa as the Regional Director, Asus for two years starting 2011.

 

IBM India Fires Managers For Alleged Malpractices



IBM India has fired at least three of its senior managers for alleged malpractices that included forging customer purchase orders (POs) and diverting materials sourced for customer deals to the open market.

IBM refused to comment but at the same time didn’t deny the news.

The company has also scrapped its popular stock-and-sell program, Easy Sell, which IBM partners said has been the main culprit behind the alleged malpractices.

In addition, at least three IBM partners have been sent termination letters for their alleged involvement in the malpractices. Industry sources say that more partners could be ‘blacklisted,’ a term used for the termination of an IBM partnership.

According to an IBM partner from Mumbai who didn’t want to be named, “The manipulation of the Easy Sell program has been known to everyone. In the past 2-3 years, distributors and partners, on multiple occasions, had asked IBM to scrap the program because it was leading to malpractices.”

According to a reliable source, the malpractices were reported by an IBM senior manager to the company’s worldwide audit team in early 2012. “Last March, a senior manager who quit IBM, exposed some of these malpractices by writing a mail to IBM’s worldwide audit team that looks into compliance and ethical practices. The audit team began investigating this matter from April 2012 and submitted its report in November 2012, on the basis of which the current action has been taken,” said the source.

One IBM partner explained the modus operandi of the alleged malpractices: “Let’s assume that for the OND quarter a large deal is expected to close which would help the IBM manager to meet his target and earn incentive. However, the customer delays issuing the PO till the next quarter. In such a case, the IBM manager would request/insist that the partner raise a forged PO and enter it into the system. The original customer PO may eventually come 10 days later (at the start of the next quarter), but what’s been captured in the system is a forged invoice.”

Partners admitted that in many such instances, orders are booked using forged POs without any customer deals in pipeline; and products are then diverted to the open market. “Once a wrong practice starts, different partners bend the system in different ways. For instance, there are also partners who buy IBM products from distributors on forged documents to only divert them to the open market because the products bought for customer deals come at a discount over those sold in the open market,” claimed an IBM partner from Delhi who spoke on condition of anonymity.

However, partners said that this is not new in the industry. An IBM partner who is also a partner of other vendors, said, “A couple of years back, a similar episode had happened at Lenovo and the company had fired some of its senior managers and blacklisted few partners. It has happened with vendors like HP and Cisco too.”

Usually, vendor companies, for certain sized deals and in named accounts, have a user verification program. However, often the verification process isn’t followed, either by design or by oversight, resulting in partners getting away with fake POs. “In case of IBM they don’t have any user verification process or at least we aren’t aware of any. Also for Easy Sell, customer POs have to be submitted to IBM distributors and they don’t do any verification. Hence bending the rules and systems becomes that much easier,” said an IBM partner from Delhi.

In the opinion of another multi-vendor partner who also didn’t want to be identified, “Legally and ethically, such practices are wrong. But when you see other partners doing it, and doing it with the knowledge of distributors and vendors, you think it is a non-issue. The onus of stopping such malpractices lies with the vendors and distributors. They should create systems and processes that are stringently followed and any deviation must be dealt with strictly.”

Facebook's Relationship With Developers: It's Even More Complicated

When it comes to developers working with Facebook, "share and share alike" is the new policy. The social networking giant made it clear last week that if third-party apps want access to Facebook APIs, they have to let Facebook's users in on the results. The bottom line? No one rides the Facebook express for free.


Facebook dropped a bombshell on its developer community last week with the rollout of a clarified platform policy -- one that de-friends certain apps.
The new policy spells out which types of apps can use its data. Namely, developers must show "reciprocity"; their apps must let users post content to Facebook if they want to use the vast social network's friend-finding features.
"If you use any Facebook APIs to build personalized or social experiences, you must also enable people to easily share their experiences back with people on Facebook," Facebook said in a blog post announcing the change.
Developers also will not be able to use Facebook if their app replicates the network's core functionality.

Saying No to Vine and Yandex :

The clarification follows recent incidents in which Facebook restricted developers' access to its data. It reportedly restricted or curtailed access to Twitter's new Vine video-sharing app, as well as Wonder, a social search app from Yandex.
Facebook cited the new clarification policy when asked why the Vine app was no longer able to access Facebook.
Vine lets users create and share six-second videos on Twitter and Facebook. Its launch earlier this month featured controversy when it was revealed that some users was using the app to trade porn videos, and a salacious video mistakenly made Vine's "Editors Picks" recommendation list.

Keeping Up with Industry Trends or Slamming Doors?

On one hand it can be argued that Facebook is merely following industry trends; other social networks like Twitter have also banned apps that mimic their core functionality.
Facebook is targeting a small group of apps "that are using Facebook to either replicate our functionality or bootstrap their growth in a way that creates little value for people on Facebook, such as not providing users an easy way to share back to Facebook," wrote Justin Osofsky on the company's developers blog.
In short, Facebook is moving aggressively to block Twitter and other social media sites from establishing free-rider status on its site, said Rich Hanley, associate professor and director of the graduate journalism program at Quinnipiac University. In Vine's case, that means blocking "a video-sharing application that has the potential to make lots of money.
"Twitter's Vine features a tool that encourages people to search Facebook for their friends and invite them to share videos," Hanley told TechNewsWorld. "Money follows eyeballs, and if the eyeballs go from Facebook to Twitter, Facebook loses and is, in fact, facilitating access to a competitor. Facebook is essentially in block-that-kick mode in preventing Twitter from monetizing its user base."

Oracle Brings Emergency Patches For Java, Fixes 50 Holes

Oracle has updated Java 7 again following the frequently emerging security holes. 


                                           Oracle was due to release its Critical Patch Update February 2013" (CPU) for Java on 19 February 2013 but as one of the vulnerabilities got exploited, the company hurried with its pathces. Oracle has released security updates on emergency, which fixes 50 holes. Yesterday, we reported that Apple had also blocked Java. So, it seems Apple had a clue about the emergency patch being anticipated. According to an official posting from Oracle, “The original Critical Patch Update for Java SE – February 2013 was scheduled to be released on February 19th, but Oracle decided to accelerate the release of this Critical Patch Update because active exploitation 'in the wild' of one of the vulnerabilities affecting the Java Runtime Environment (JRE) in desktop browsers, was addressed with this Critical Patch Update.”

The security patch seems important as out of the 50 vulnerabilities, 26 holes are rated at the highest CVSS level (10.0) and two are rated at 9.3. Oracle is strongly recommending its users to update to the latest version as soon as possible. The Java Runtime Environment (JRE) update is available for Windows, Mac OS X, Linux and Solaris at the site. Oracle has also introduced updated versions of Java Development Kit for Java 6 and 7 along with updates for Java 6.

Well, the experts are yet to comment on the new update. Previously, after Oracle released the update 11 of Java 7, 'Security Explorations' researcher, Adam Gowdiak criticised Oracle for just stating theories and not acting on the issue. Java security lead explained that one of the changes include the ability to select a certain security level to control for executing unsigned Java Applets to Low, Medium, High or Very High. Gowdiak rammed into this protective measure by stating that he already developed a proof of concept applet which can run on Windows systems with any of the Java applet security levels set.

So, is Java actually safe now or there's more to it than meets the eye? Wait and watch!