Monday, October 18, 2010

When the "vision" into a "trap"



As Jim Collins's "From A to A +" hot book in Taiwan, many of the company's vision has turned into "from the good company into a great company." However, the trend is driven vision, employees can receive recognition from the heart of the real you? "Company Light scream銆?銆巉rom good to great, but not the exact implementation of the plan, but also not seen how much the company made changes to the system, things are still bound hand and foot. Nevertheless, the small number of middle level managers, top executives continue to please have been advocating for, the staff feel a strong political flavor .... "I complained to a friends in the industry.

Vision to become trendy political slogan, not a practical long-term goal

Enterprise's "vision" (Vision) trend can be traced back to Peter. Senge's "Fifth Discipline." Originally, the company refers to the enterprise vision shared by people in the scene, people on the scene of great concern and co-operation through various actions to practice it. Peter. Senge even believe that there is no common vision, there is no learning organizations. However, when vision is used by companies large and small, we encounter many pitfalls and problems. Vision into a trendy above the political slogan, not a practical long-term goal is one.
Some people think that content should be ambitious vision. But business history, too much "great" but it is difficult to implement the vision, anti-easy to make business resources to invest in inappropriate places and lead to policy failure. This is the vision of the second trap.

Ambitious but unrealistic vision, leading to failure of corporate strategy

The time back to 1978. Wang computer was the United States ranked the world's 32nd-largest computer supplier, the company said the head of Chinese-American Wangan Xuan, Wang computers will replace in the mid-1990s, Big Blue IBM, the world's largest computer company. Wang fascination with their own products - word processor, it underestimated the threat of IBM personal computers, said "personal computer is the world's most stupid things." Bent to make the company and its growing advantage in the personal computer, the IBM confrontation, not only underestimated the strength of IBM personal computers, but also insist on their own R & D is not compatible with the IBM computer operating system. Later, when Wang computer products found in the main market, has become a personal computer, word processor, not when I have to. In 1992, this had an annual turnover of 30 billion U.S. dollars, has 30,000 employees in large companies, to the courts for bankruptcy. Vision shattered.

Wang Computer's grand vision of the relative, who created "Spirited Away" and many other blockbuster Japanese animation Hayao Miyazaki and Studio Ghibli belong (Studio Ghibli), but never "intended" to make its great. "Business Week" Recent reports that the "strategy", "change", "profit" is not always the words in their dictionary. They only insisted that Ghibli film will be "interesting and useful", the "human interest" as the spirit is the most important works, to tremendous amount of attitude to make the highest quality work. 90% of the entire studio of human and 98% of the time only do one thing, animation. Hayao Miyazaki and Studio Ghibli did not intend to let his great modesty, but in practice they are doing is a great vision.

Vision is to make out, not to tell

Of the ambitious enterprises, the establishment of the vision of course is necessary. However, many companies have the vision, we all want to be winners, but who have real power? When the vision becomes trendy and sets the contents of the theoretical formula of cheap popular slogan, a tool for political maneuvering within the organization, or exaggerate the target has not been implemented, the vision but it will hurt hazardous enterprises, such as loss of people (including employees and customers ) support. Moreover, the true meaning of the vision is action, not words beautiful. Company leaders and management team, with a magnificent vision of shouting, we had better clarify the company's basic mission and values, identify the competitive positioning, and then encouraged to go and practice them in fear.

A Zen master once said: "Who in this world, reasoning many people, Realizing the fewer people; know many people, way street are few." Think about the vision is not true?







相关链接:



Concerned about the anti-monopoly law enforcement agency Jurisdiction overlap



Recommend Source Editors



Comments: Baidu More Recent Non-



Step by step teach you UNCOVER and remove Trojan horse disguised



Streaming audio format, the entire 10-year-old REAL companies will have a new action



Rooted In The Free Soil-FastCGI



Ashes of modern CAE



Graphic Viewers WIZARD



CGI Tutorial: Chapter cgilib cases



ASF To MPG



Automation Is everywhere



Review ASP And PHP



Fit, is the best



comments COMPONENTS And Libraries



FLV to 3GP



exe crash kernel32 dll Repair it in seconds



AVI to MKV



Tuesday, October 12, 2010

Tongfang response to piracy crisis: is the distributor of pirated security


Dealers of pirated software is safe for 顥?顥?br />
HP, Shenzhou, Tsinghua Tongfang, Acer (Acer) and other four manufacturers of computer sales stores were found to pirated Microsoft operating system installed yesterday, Tsinghua University, said in an interview with the party, which is dealer's personal behavior, will strengthen the dealer with the management and education.

Hewlett-Packard and other reporters had not been the attitude of the other three companies.

Tongfang regard a telephone interview, said that Microsoft in China as a partner in one of the most closely, with the side always recommend users to install genuine operating systems, adhere to legitimate strategy, it remains unchanged.

However, since different users have different versions of the operating system needs, in order to give the user plenty of their own choice, now part of the factory with side computer models, not pre-installed operating system, but in the sales process, with the side would urge all distributors, the user is better to play the machine functions, choose to install genuine software.

The store's display of individual agents to identify pirated software prototype in the same side that was very concerned about, though this is a distributor of personal behavior, but at the same side will strengthen the dealer's management, education, and said it would through their own efforts in the fight against piracy to do to their responsibilities.

Yesterday, China's also the matter to the Hewlett-Packard Co., Public Relations fax the interview outline, would like to know the company installed pirated operating system product attitude, but as of 8 pm last night, reporters did not receive a response.






相关链接:



Wait mature open SOURCE model



Download Shockwave Flash To Zen Vision Software



YUV To AVI



Wave of mergers BI have a happy life



Spot cash: how a "worry" Zile!



MTS to AVI



LG Fourth Quarter Net Profit Surged 91 Percent Net Profit 319 Million U.S. Dollars



MPEG4 to WMV



Dell Digital denial distribution relationship with HP induced breakdown



What is the JPEG2000



Best Telephony



Note That The Specifications Of DVD Burners Support



Comment Password Managers



[Death Spy: decision time] menu option to translate



Yu Zhicheng: How scientific orientation 3G problems



Tuesday, October 5, 2010

Symantec said the new storm worm detected



April 12, Symantec detected a new spam attack complex, using Trojan.Peacomm (also known as Storm Worm) or Storm Trojan, through spam e-mail password protected Zip files to send a large number. Symantec Security Response Center will increase its risk index to five in the second level. Symantec this month in the Global Fan Wei monitored a total of more than 200 million spam messages, to reach the maximum number of recent months, mainly for English district's enterprises and individual users. This year in January, Symantec will detect Storm Trojan started evolving, and the spam attack is part of the performance.

The attacks also appeared a new type of change, an attacker using social engineering means to spread Trojans. The junk e-mail to remind users to be careful of false virus detected (for example, Trojan Detected!, Virus Activity Detected) for the title, and then entice users to open a Zip file.

With the release earlier this year, the virus definition, Symantec customers are eligible for comprehensive protection against the threat of attacks in the Zip file. Symantec recommends that enterprise and individual users to download the latest virus definitions, self-detection of Zip files.








Recommended links:



DVR-MS to MPEG



MKV to Xbox 360



how to carry out the Database connection in



QuickTime to MPEG



Thursday, September 23, 2010

Longhorn Beta1 only compatible with two kinds of graphics chips


Microsoft will be opening tonight to show the General Assembly next Winhec2005 Longhorn Longhorn operating system, the beta1 version. According to the operating system Longhorn beta1 has been received and installed, said testing of the testers, Longhorn beta1 Avalon 3D user interface built-in support only two kinds of graphics chips, which are ATi's Radeon 9800 or NVIDIA's Geforce FX 5900. That is, if the player installed Microsoft Longhorn beta1 test version, if not more than two kinds of graphics chips, so can not open the Avalon 3D interface.




Want to use the Longhorn Beta1 of Avalon 3D user interface, can only use two graphics cards?







Recommended links:



Useful time of the class



Let Gmail tell friends WHERE you live



Instant Messaging SPI translation



Best Trace And Ping Tools



Facebook's growing pains



Guide Telnet Servers



domestic manufacturers baotuan nuggets resisted



3G2 To MPEG



For you Mail Servers



Best Cataloging



PRD employment "upward", "Labor SHORTAGE" moved to the Mainland



ASF Converter



"Storm the 1st" Crazy transmitted infections rose sharply to 100 000



"Cottage" Toxic



The insider denied that Lee was a man left and the black about Baidu



DVR-MS To MP4



Thursday, September 16, 2010

Beijing TV (radio and television media)



Beijing TV was in March 1999 officially opened AV2000 network video, audio distribution system for the realization of Beijing Television broadcast a program online, on-demand provides the most efficient and convenient tool. The entire system including the automatic acquisition programs, the program automatically upload online storage and release program, the program admin.

The special needs of the project:

鈻?Automatic live transmission of a television program, collecting Two different bit rate signals, respectively, two REAL SERVER passed 56K and 100K compressed streams.
鈻?can be manually controlled broadcast start and end features, including back-end management of management control and compression control.
鈻?automatic live, on-demand program has begun, you can increase or reduce the length of broadcast time.
鈻?live when compression-side display window screen capture and compression.
鈻?live broadcasts of the period from the day, daily, weekly, are free to set the compression cycle, such as every Tuesday, Wednesday, Thursdays, Fridays and so on.
鈻?broadcast live across 0:00.
鈻?increased, the number of compression parameters, such as: the number of frames / second; EMPHASIZE AUDIO; VBR ENCODING; TWO PASS ENCODING; LOSS PROTECTION; VIDEO NOISE FILTERING;.
鈻?compression program can set the output window size.
鈻?scheduled program can choose the backup operation, not only one to live, and another for file storage.
鈻?programs scheduled by the four (three) kinds of options, depending on the options program to write database operations.
鈻?additional configuration file management, simplifying the program is scheduled to operate.
鈻?management program is scheduled to show the background program start time, length of broadcast and compression status.
鈻?When the compression error, the program automatically restore compression, and compression to retain the previous name.
鈻?with full logging.
鈻?After the live broadcasts, according to slitting the start time and end function of time. Program will automatically file the contents of the response time cut out of office.
鈻?According to the date, file size is automatically deleted file management.
鈻?live / on-demand page automatically Shuaping.

System Topology:








相关链接:



flv FORMAT



Remodeling "value stream"



Lists Multimedia Creation Tools



Master is not highly educated does not mean that high-income elite



Wmv to divx



Thunder look at REAL-TIME on-demand player in the player to build pan-



Instant Messaging SPI TRANSLATION



FTP Site Preferences



Videoformat ipod



MMS can replace SMS?



COMPARISON Helpdesk And Remote PC



Official air strike 2 Cheats



Rmvb Ps3



Specialist Puzzle And Word Games



Comment E-Mail Clients



Talent war broke out, the direct selling industry Executives 300 000 -50 million annual salary



Thursday, August 5, 2010

Pao GS-816FC Fiber Disk Array


Baode GS-816FC fiber storage disk array to meet the massive Library, IDC data center, open and public utilities on the throughput bandwidth, access performance, storage ability for demanding business-critical, real-time video editing, digital libraries, online transaction processing, massive data mining to provide material security.

64-bit core technologies: Pao GS-816FC 64-bit RISC CPU, in addition to compatible 32-bit server and operating system, would also be an excellent fit for the market and the popular 64-bit 64-bit server operating system, which is not only the speed fast and compatible with current and future 64-bit hardware and software systems, especially on the hundreds of users simultaneously access the speed performance was particularly evident.

Strength of the reading and writing skills: use of 2Gbps Fibre Channel RAID controller and new controller design, to achieve more powerful processing capability, high-speed ECCSDRAM up to 2GB cache, read and write-back in advance (write-back cache) function, to ensure the disk array read and write operations on the performance.

16 million people also visit: Pao GS-816FC up to 160,000 IOPS maximum (IO per second access number), that is, 16 million people visit the same time, the largest I / O throughput up to 760MB / s (IO per second throughput), especially for hundreds of concurrent users to simultaneously access the above performance requirements, high throughput can be greatly satisfied with college radio and television and streaming media and information inquiries and more requests for visits;

Body mass storage expansion: Pao GS-816FC maximum support 124 drives with a capacity of 18TB, and can use native COREMANAGER management software module management, the software is JAVA-based graphical environment management software, the user can easily disk array control the operational status of each module, and can be intuitive RAID disk array configuration, LUN allocation management, and so many management functions.






Recommended links:



B2C in China's "money" King



Neusoft interpretation of "child swallow mother" listed as a whole integration scheme



flv to mp3 converter



Compare Converters And Optimizers



My favorite Cartoons - Screen SAVERS



18th "Gold-collar Workplace," Senior Human Resources Fair



Failure from shutdown trouble



Vob to flv



What is avchd



Routing Protocol RIP Routing Basics Introduction To Note (2)



Compare Firewall And Proxy Servers



Review the DB2 Viper



[Aion] Korean clothing and equipment leveling frenzy 1.2 perfect



Unicom Frankly Difficult To Govern Without Legal Constraint SP Is Critical Violations



Prevent the illegal invasion of seven trick users



Convert flv to mov



Monday, July 26, 2010

Compilation of various source - CLEAN


name clean
page 55,132
title''CLEAN --- Filter text file''

;
; CLEAN --- a utility to filter text files.
; This program removes all control codes except
; For line feeds, carriage returns, and form
; Feeds, strips off the high bit of all characters,
; And expands tabs. Can be used to make a Wordstar
; File acceptable for other screen or line editors,
; And vice versa.
;
; Version 1.1 10 Dec 83 Blocking / deblocking
; Version 1.0 25 Nov 83
;
; Copyright (c) 1983 by Ray Duncan

cr equ 0dh; ASCII carriage return
lf equ 0ah; ASCII line feed
ff equ 0ch; ASCII form feed
eof equ 01ah; End of file marker
tab equ 09h; ASCII tab character

command equ 80h; buffer for command tail

blksize equ 1024; blocking / deblocking size

cseg segment para public''CODE''

assume cs: cseg, ds: data, es: data, ss: stack

clean proc far; entry point from PC-DOS

push ds; save DS: 0000 for final
xor ax, ax; return to PC-DOS
push ax
mov ax, data; make our data segment
mov es, ax; addressable via ES register
call infile; get path and file spec.
; For input file
mov ax, es; set DS = ES for remainder
mov ds, ax; of program
jnc clean1; jump, got acceptable name
mov dx, offset msg4; missing or illegal filespec,
jmp clean9; print error message and exit.

clean1: call outfile; set up output file name
call open_input; now try to open input file
jnc clean2; jump, opened input ok
mov dx, offset msg1; open of input file failed,
jmp clean9; print error msg and exit.

clean2:
call open_output; try to open output file.
jnc clean25; jump, opened ok
mov dx, offset msg2; open of output file failed,
jmp clean9; print error message and exit.

clean25:; set up buffers
call init_buffs
call sign_on; print ident and file names

; Files successfully opened,
clean3:; now filter the file.
call get_char; read 1 character from input.
and al, 07fh; strip off the high bit
cmp al, 20h; is it a control code?
jae clean4; no, write it to new file
; Yes it is control code,
cmp al, eof; is it end of file marker?
je clean6; yes, jump to close files.
cmp al, tab; is it a tab command?
jz clean5; yes, jump to special processing.
cmp al, cr; if control code other than
je clean35; tab or end-of-file mark, throw
cmp al, ff; it away unless it is a
je clean35; form feed, carriage return,
cmp al, lf; or line feed.
jne clean3
clean35:; If it is one of those three,
mov column, 0; incidentally initialize
jmp clean45; column count for tab processor.

clean4:; count alphanumeric chars. sent.
inc column

clean45:; write this character to
call put_char; output file,
jnc clean3; if CY not set, write was
; Ok so go get next char.
clean47:
call close_input; if CY set, disk is full
call close_output; so close files and exit
mov dx, offset msg5; with error message.
jmp clean9

clean5:; process tab character
mov ax, column; let DX: AX = column count
cwd
mov cx, 8; divide it by eight ...
idiv cx
sub cx, dx; remainder is in DX.
add column, cx; update column pointer.
clean55:; 8 minus the remainder
push cx; gives us the number of
mov al, 20h; spaces to send out to
call put_char; move to the next tab position
pop cx; restore space count
jc clean47; jump if disk is full
loop clean55
jmp short clean3; get next character

clean6:; end of file detected,
call put_char; write end-of-file marker,
jc clean47; jump if disk was full
call flush_buffs; write remaining data to disk
jc clean47; if CY set, disk was full
; Otherwise file was written ok
call close_input; close input and output
call close_output; files.
mov dx, offset msg3; addr of success message,

clean9:; print message and return
mov ah, 9; control to PC-DOS
int 21h
ret

clean endp

infile proc near; process name of input file
; DS: SI <- addr command line
mov si, offset command
; ES: DI <- addr filespec buffer
mov di, offset input_name
cld
lodsb; any command line present?
or al, al; return error status if not.
jz infile4
infile1:; scan over leading blanks
lodsb; to file name
cmp al, cr; if we hit carriage return
jz infile4; filename is missing.
cmp al, 20h; is this a blank?
jz infile1; if so keep scanning.

infile2:; found first char of name,
stosb; move last char. to output
; File name buffer.
lodsb; check next character, found
cmp al, cr; carriage return yet?
je infile3; yes, exit with success code
cmp al, 20h; is this a blank?
jne infile2; if not keep moving chars.

infile3:; exit with carry = 0
clc; for success flag
ret

infile4:; exit with carry = 1
stc; for error flag
ret
infile endp

outfile proc near; set up path and file
cld; name for output file.
mov cx, 64; length to move
mov si, offset input_name; source addr
mov di, offset output_name; dest addr
rep movsb; transfer the string
mov di, offset output_name
outfile1:; scan string looking for
mov al, [di]; "." marking start of extension
or al, al; or zero byte marking name end.
jz outfile2; if either is found, jump.
cmp al ,''.''
je outfile2; bump string pointer, loop
inc di; if neither''.'' or zero found.
jmp outfile1
outfile2:; found zero or''.'', force the
; Extension of the output file
; To''. CLN''
mov si, offset outfile_ext
mov cx, 5
rep movsb
ret; back to caller
outfile endp

open_input proc near; open input file
; DS: DX = addr filename
mov dx, offset input_name
mov al, 0; AL = 0 for read only
mov ah, 3dh; function 3dh = open
int 21h; handle returned in AX,
mov input_handle, ax; save it for later.
ret; CY is set if error
open_input endp

open_output proc near; open output file
; DS: DX = addr filename
mov dx, offset output_name
mov al, 1; AL = 1 for write only
mov ah, 3ch; function 3ch = MAKE or
int 21h; truncate existing file
; Handle returned in AX
mov output_handle, ax; save it for later.
ret; return CY = true if error
open_output endp

close_input proc near; close input file
mov bx, input_handle; BX = handle
mov ah, 3eh
int 21h
ret
close_input endp

close_output proc near; close output file
mov bx, output_handle; BX = handle
mov ah, 3eh
int 21h
ret
close_output endp

get_char proc near; get one character from input buffer
mov bx, input_ptr
cmp bx, blksize
jne get_char1
call read_block
mov bx, 0
get_char1:
mov al, [input_buffer + bx]
inc bx
mov input_ptr, bx
ret
get_char endp

put_char proc near; put one character into output buffer
mov bx, output_ptr
mov [output_buffer + bx], al
inc bx
mov output_ptr, bx
cmp bx, blksize; buffer full yet?
jne put_char1; no, jump
call write_block; yes, write the block
ret; return CY as status code
put_char1:
clc; return CY clear for OK status
ret
put_char endp

read_block proc near
mov bx, input_handle; read first block of input
mov cx, blksize
mov dx, offset input_buffer
mov ah, 3fh
int 21h
jnc read_block1; jump if no error status
mov ax, 0; simulate a zero length read if error
read_block1:
cmp ax, blksize; was full buffer read in?
je read_block2; yes, jump
mov bx, ax; no, store End-of-File mark
mov byte ptr [input_buffer + bx], eof
read_block2:
xor ax, ax; initialize input buffer pointer
mov input_ptr, ax
ret
read_block endp

write_block proc near; write blocked output (blksize bytes)
mov dx, offset output_buffer
mov cx, blksize
mov bx, output_handle
mov ah, 40h
int 21h
xor bx, bx; initialize pointer to blocking buffer
mov output_ptr, bx
cmp ax, blksize; was correct length written?
jne write_block1; no, disk must be full
clc; yes, return CY = 0 indicating all OK
ret
write_block1:; disk is full, return CY = 1
stc; as error code
ret
write_block endp

init_buffs proc near
call read_block; read 1st block of input
xor ax, ax; initialize pointer to output
mov output_ptr, ax; output blocking buffer
ret
init_buffs endp

flush_buffs proc near; write any data in output buffer to disk
mov cx, output_ptr
or cx, cx
jz flush_buffs1; jump, buffer is empty
mov bx, output_handle
mov dx, offset output_buffer
mov ah, 40h
int 21h
cmp ax, output_ptr; was write successful?
jnz flush_buffs2; no, jump
flush_buffs1:
clc; yes, return CY = 0 for
ret; success flag
flush_buffs2:; disk was full so write failed,
stc; return CY = 1 as error flag
ret
flush_buffs endp

sign_on proc near; print sign-on message
mov dx, offset msg6; title ...
mov ah, 9
int 21h
mov dx, offset msg7; input file
mov ah, 9
int 21h
mov dx, offset input_name
call pasciiz
mov dx, offset msg8; output file
mov ah, 9
int 21h
mov dx, offset output_name
call pasciiz
mov dx, offset msg9
mov ah, 9
int 21h
ret
sign_on endp

pasciiz proc near; call DX = offset of ASCIIZ string
mov bx, dx; which will be printed on standard output
pasciiz1:
mov dl, [bx]
or dl, dl
jz pasciiz9
cmp dl,''A''
jb pasciiz2
cmp dl,''Z''
ja pasciiz2
or dl, 20h
pasciiz2:
mov ah, 2
int 21h
inc bx
jmp pasciiz1
pasciiz9:
ret
pasciiz endp

cseg ends

data segment para public''DATA''

input_name db 64 dup (0); buffer for input filespec
output_name db 64 dup (0); buffer for output filespec

input_handle dw 0; token returned by PCDOS
output_handle dw 0; token returned by PCDOS

input_ptr dw 0; pointer to input blocking buffer
output_ptr dw 0; pointer to output blocking buffer

outfile_ext db''. CLN'', 0; extension for filtered file

column dw 0; column count for tab processing

msg1 db cr, lf
db''Cannot find input file.''
db cr, lf ,''$''

msg2 db cr, lf
db''Failed to open output file.''
db cr, lf ,''$''

msg3 db cr, lf
db''File processing completed''
db cr, lf ,''$''

msg4 db cr, lf
db''Missing file name.''
db cr, lf ,''$''

msg5 db

cr, lf db''Disk is full.''db cr, lf ,''$'' msg6 db cr, lf db''Clean Word Processing File''db cr, lf db''Copyright (c) 1983 Laboratory Microsystems Inc.''db cr, lf ,''$'' msg7 db cr, lf,''Input file $''msg8 db cr, lf,''Output file $''msg9 db cr, lf ,''$' 'input_buffer db blksize dup (?); buffer for deblocking of data; from input file output_buffer db blksize dup (?); buffer for blocking of data; sent to output file data ends stack segment para stack''STACK''db 64 dup (?) stack ends end clean






Recommended links:



Brief Graphic CAD



Free Converter Mp4 To 3gp



Deletion of posts by the company, "3.15" price hike: prices starting at 20,000 yuan



7 Classic and practical performance evaluation tool



Wizard Personal Interest



Carrefour Business Golden Rule



Avi to flash



Real ones hidden IP



Mp4 Converter To Avi



Carrefour business golden rule



E world "means the consumer through a" good financial management easy



CONVERT .avi to .wmv



Facts And Figures