Friday, January 9, 2009

Hot Job News

Perot Systems - 5th to 11th Jan 2009 - Chennai - BPO careers for freshers

Posted: 07 Jan 2009 09:13 PM PST

WALK IN for exciting BPO careers for freshers (2008 batch graduates can also apply)

Venue:

Chennai

A9, 1st Main Road, Ambattur Industrial Estate, Chennai 600058
Ph: 044 42060330

Walkin time: 10.00 amto 5.00pm

Walk in with your resume and walk out with an offer letter
Desired Candidate Profile
- Graduates / Post-graduates in any discipline
- Strong analytical and typing skills (13WPM)
- Willingness to work in continuous night shifts.

Company Profile
At Perot Systems, we provide solutions that help global corporations achieve business-building results. Perot Systems is a Fortune 1000 corporation with over 23,000 associates across 135 locations and revenues of $2.6 billion in 2007.

TCS BPO - 5th to 9th Jan 2009 - Chennai - Banking Jobs

Posted: 07 Jan 2009 08:44 PM PST

Tata Consultancy Services (TCS) is one of the world's leading information technology companies. Through its Global Network Delivery Model, Innovation Network, and Solution Accelerators, TCS focuses on helping global organizations address their business challenges effectively.

TCS continues to invest in new technologies, processes, and people which can help its customers succeed. From generating novel concepts through TCS Innovation Labs and academic alliances, to drawing on the expertise of key partners, it keeps clients operating at the very edge of technological possibility. .

Whether TCS is envisioning a business advantage, engineering an IT and ITES solution, or executing an outsourcing strategy, it helps its customers experience certainty in their every day business.

TCS reported 2007-08 global revenues of USD 5.7 billion.

Designation

Banking Jobs - TCS BPO

Job Description

Should be Open fior Night Shifts

Should have Excellent communication skills
Should have Financial Background
Desired Profile

Role- Team Member

Reconcilement of daily bank statement activity to sub ledger activity
Capturing data for MI reports.
Qualities check all requests with a high degree of accuracy while adhering to company policies and Industry standards.
Keep up to date with e-mails and procedure notices
Research process and QC errors to determine validity and use as a learning experience

Requirement:

Fresher & Experienced in any Domain,
Exposure in Backend Support.
Should be willing to work in shifts.

Interested Candidates can Walk-in with a hard copy of your CV, copy of last 2 months pay slip from current company and Relieving letter from Previous company (If you are experienced) and one passport size photograph(Mandator y).

Work Location: Chennai

Venue:

Tata Consultancy Services Limited,
165/1A, Velachery to Taramani 100 feet road,
Velachery, Chennai â€" 600 042.
Near Vijaya Nagar Bus Stop

Day : 5th to 9th Jan 2009

Registration Time: 11AM â€" 1PM

Contact Person: Kalvath

Note:

BE/B.Tech/MCA need not apply
Please bring a Xerox copy of this mail for the reference (Mandatory)
Should have 15 years of Regular Education
Candidates attended interview within 6 months will not be Eligible.
Experience 0 - 4 Years
Industry Type BPO/ITES /CRM/Transcription
Functional Area ITES/BPO/KPO, Customer Service, Ops.
Education UG - B.B.A - Management,B. Com - Commerce
PG - CA,ICWA,M.Com - Commerce,MBA/ PGDM - Any Specialization
Location Chennai
Keywords BPO , Non - voice , Finance, Banking, Fund, Hedge, Reconciliation, TCS, Back - end support , BCOM, Commerce, Accounts, Insurance, Freshers
Contact Kalvath
Tata Consultancy Services

Wednesday, January 7, 2009

Job Motivation Quotes

“We shall neither fail nor falter; we shall not weaken or tire...give us the tools and we will finish the job.”

Whenever it is possible, a boy should choose some occupation which he should do even if he did not need the money.

Don't waste time learning the "tricks of the trade." Instead, learn the trade.

“Why compare yourself with others? No one in the entire world can do a better job of being you than you.”

There are no menial jobs, only menial attitudes.

Choose a job you love, and you will never have to work a day in your life.

By working faithfully eight hours a day you may eventually get to be boss and work twelve hours a day.

“When you are asked if you can do a job, tell 'em, 'Certainly I can!' Then get busy and find out how to do it.”

“I think the person who takes a job in order to live - that is to say, for the money - has turned himself into a slave.”

“You can't do today's job with yesterday's methods and be in business tomorrow”

How to improve my Communication skills ?

Courtesy: www.neutralaccent.com


1.Listen and don't assume.
2.Exercise Emotional control.
3.Active Listening.
4.Interaction and Participation.
5.Practice Listening for better understanding.
6.Raise Good,Intellectual and Powerful questions.
7.Have an eye contact.
8.Listen with high energy level.
9.Improve body language.
10.Be in a normal and good mood.
11.Don't take things personally. 12.Concentrate inspite of distractions.
13.Avoid imagination, assumptions, and pre-judinging or pre-occupation.
14.Do not communicate with the intention of arguing, withdrawing, blaming, accusing and changing the subject.
15.Try to understand and not evaluate.
16.Build Rapport.
17.Have a purposeful listening. 18.Develop creative communication.

Monday, January 5, 2009

Networking Basics

NETWORKING

The first networks were time-sharing networks that used mainframes and attached terminals. Such environments were implemented by both IBM's System Network Architecture (SNA) and Digital's network architecture. Local area networks (LANs) evolved around the PC revolution and provide high-speed, fault-tolerant data networks that cover a relatively small geographic area or that is confined to a single building or group of buildings. They provide connected users with shared access to devices and applications and allow them to exchange files and communicate via electronic mail. Wide area networks (WANs) cover broader geographic areas, often using transmission facilities provided by common carriers, such as telephone companies, to interconnect a number of LANs.

Whilst LANs and WANs make up the majority of networks - indeed, the Internet can be correctly regarded as the largest WAN in existence - there are many different types of network, categorised by a number of distinguishing characteristics:

topology: the geometric arrangement of a computer system. Common topologies include a bus, star, and ring
standards/protocols: definitions of common sets of rules and signals that specify how computers on a network communicate. Ethernet and Token Ring are examples of network cabling standards, whilst TCP/IP is the predominant network communications protocol
architecture: networks can be broadly classified as using either a peer-to-peer or client-server architecture.
In addition to the computers themselves, sometimes referred to as nodes, the implementation of a network involves:

a device on each connected computer that enables it to communicate with the network, usually called a network interface card (NIC)
various items of specialist network hardware, including devices to act as connection points between the various nodes, generally referred to as hubs or switches
a connection medium, usually a wire or cable, although wireless communication between networked computers is increasingly common.


The Open Systems Interconnection (OSI)
reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer. The OSI reference model is a conceptual model composed of seven layers, each specifying particular network functions. The model was developed by the International Organisation for Standardisation (ISO) in 1984, and it is now considered the primary architectural model for intercomputer communications. The OSI model divides the tasks involved with moving information between networked computers into seven smaller, more manageable task groups. A task or group of tasks is then assigned to each of the seven OSI layers. Each layer is reasonably self-contained, so that the tasks assigned to each layer can be implemented independently. This enables the solutions offered by one layer to be updated without adversely affecting the other layers.

The seven layers of the OSI reference model can be divided into two categories: upper layers and lower layers. The upper layers of the OSI model deal with application issues and generally are implemented only in software. The highest layer, application, is closest to the end user. Both users and application-layer processes interact with software applications that contain a communications component. The term upper layer is sometimes used to refer to any layer above another layer in the OSI model. The lower layers of the OSI model handle data transport issues. The physical layer and data link layer are implemented in hardware and software. The other lower layers generally are implemented only in software. The lowest layer, the physical layer, is closest to the physical network medium (the network cabling, for example) , and is responsible for actually placing information on the medium.

Reference Layer Function
7 Application Layer Application programs that use the network
6 Presentation Layer Standardises data presented to the applications
5 Session Layer Manages sessions between applications
4 Transport Layer Provides error detection and correction
3 Network Layer Manages network connections
2 Data Link Layer Provides data delivery across the physical connection
1 Physical Layer Defines the physical network media


LAN topologies define the manner in which network devices are organised. Four common LAN topologies exist:

A bus topology is a linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations. Many nodes can tap into the bus and begin communication with all other nodes on that cable segment. A break anywhere in the cable will usually cause the entire segment to be inoperable until the break is repaired. Of the three most widely used LAN implementations, Standard Ethernet/IEEE 802.3 networks implement a bus topology in which all devices are connected to a central cable, called the bus or backbone.
A ring topology is a LAN architecture in which all devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Both Token Ring/IEEE 802.5 and FDDI networks implement a ring topology.
A star topology is a LAN architecture in which the endpoints on a network are connected to a common central hub, or switch, by dedicated links. 10BaseT Ethernet uses a star topology, generally with a computer being located at one end of the segment, and the other end being terminated with a hub. The primary advantage of this type of network is reliability - if one "point-to-point" segments has a break, it will only affect the nodes on that link; other computer users on the network continue to operate as if that segment were non-existent.
A tree topology is a LAN architecture that is identical to the bus topology, except that branches with multiple nodes are possible in this case.

These topologies are logical architectures and the way in which devices are physically organised can mix topologies. For example, a star-wired bus network - as used by 10BaseT Ethernet - typically consists of a high-bandwidth backbone bus which connects to a collection of slower-bandwidth star segments.

These topologies are logical architectures and the way in which devices are physically organised can mix topologies. For example, a 10BaseT network's use of a hub effectively transforms a standard bus topology to a "star-wired bus" topology. A network comprising a high-bandwidth backbone bus which connects to a collection of slower-bandwidth star segments is another common example of this type of mixed topology.

Of the three most widely used LAN implementations, both Fibre Distributed Data Interface (FDDI) and Token Ring/IEEE 802.5 networks implement a ring topology and Ethernet/IEEE 802.3 networks implement a bus topology.

Client-server
networking architectures became popular in the late 1980s and early 1990s as many applications were migrated from centralised minicomputers and mainframes to networks of personal computers. The design of applications for a distributed computing environment required that they effectively be divided into two parts: client (front end) and server (back end). The network architecture on which they were implemented mirrored this client-server model, with a user's PC (the client) typically acting as the requesting machine and a more powerful server machine - to which it was connected via either a LAN or a WAN - acting as the supplying machine.

Their inherent scaleability make client-server networks suitable for mid-sized and large businesses, with servers ranging in capacity from high-end PCs to mainframes, as appropriate. Client-server networks require special Network Operating System (NOS) software in addition to the normal operating system software.

With the price of PCs falling at the same time the advantages for consumers to being connected - online investing and shopping, keeping in touch with long-distance friends and relatives, enjoying multiplayer games and tapping the vast resources of the Internet - continued to multiply, it was no surprise that by the late 1990s computer networking was being propelled from its traditional corporate base into a brave new world - the home.

However, with an increasing number of households owning two or more PCs - forecasts predicted that more than 30 million North American households would own two or more computers by the end of 2002 - they found themselves experiencing the same limitations that confronted businesses almost 20 years earlier: the inability to share computing and peripheral resources or to share information easily between computer users.

The four most compelling home network market drivers are:

Simultaneous high-speed Internet access using a single ISP account: As the Internet becomes an essential tool in business, education, medicine and government, as well as our personal lives, the demand for high-speed, convenient, easily accessible Internet access is mushrooming. Cable, ISDN, and digital subscriber line (DSL) modems provide the fastest Internet connections and allow family members to talk on the phone and use the Internet simultaneously.
Peripheral sharing: Families want to get the most out of their computer equipment investments by sharing the same printers, modems, or other peripherals from any PC in the home.
Sharing files and applications: Families also want to maximise the value of their software investments by sharing applications, and they want the convenience of sharing files easily, without having to transfer from machine to machine via floppies or CDs.
Entertainment: The new wave of multiplayer computer games, with their advanced graphics and exciting audio tracks, are beginning to grab consumer interest. Many analysts believe that PC games and entertainment software represent the swiftest long-term growth segment of the overall U.S. electronic gaming marketplace, with a combined unit annual growth rate of 24% being predicted between 1997 and 2002. The two biggest growth factors are the continuing price drop in home PCs and the opportunity for multiplayer gaming.
The solution for home users in the late 1990s is the same as it had been for corporate users more than a decade earlier: networking.

While consumer demand has swelled, recent advances have overcome the technological and complexity barriers that once prevented networking from migrating into nontechnical environments. Component prices have dropped, available network speeds have accelerated, and signal attenuation and noise problems have been addressed using low-cost, high-performance signal processing. However, success in the consumer market requires that home networks be inexpensive, easy to install and easy to use. Essentially, that means the technology must be transparent to the user.

By the early 2000s, home networking technologies had made significant progress towards meeting these requirements, providing consumers with an impressive array of options. The wired network technologies use some form of physical cabling to connect computing devices, the choice being between Ethernet, phoneline and powerline. Wireless networks, on the other hand, use electromagnetic airwaves - infrared or radio - to transmit information from one point to another.

As with the others, the technology for wireless networks has also been around for some time, achieving a measure of success during the late 1990s in a number of vertical markets, including health-care, retail and manufacturing. Home networking simply takes the technology to another level of functionality.

Wireless LANs (WLANs) can now offer the same advantages to consumers: first and foremost is mobility. Consumers have the flexibility to move inside or outside their homes and still remain connected to the Internet or to other computing devices on the network. Installation is easy because there are no wires. Wireless network components can be set up anywhere in the home. Wireless networking makes it easy to move computers and other devices without the need to reconfigure the network.

Wireless LANs use electromagnetic airwaves, either infrared IrDA) or radio frequency (RF), to communicate information from one point to another without relying on any physical connection. Radio waves are often referred to as radio carriers because they simply perform the function of delivering energy to a remote receiver. The data being transmitted is superimposed on the radio carrier so that it can be accurately extracted at the receiving end. This is generally referred to as modulation of the carrier by the information being transmitted. Once data is superimposed (modulated) onto the radio carrier, the radio signal occupies more than a single frequency, since the frequency or bit rate of the modulating information adds to the carrier.

Multiple radio carriers can exist in the same space at the same time without interfering with each other if the radio waves are transmitted on different radio frequencies. To extract data, a radio receiver or augment networks without installing or moving wires. Wireless LANs tunes in (or selects) one radio frequency while rejecting all other radio signals on different frequencies.

In a typical WLAN configuration, a transmitter/receiver (transceiver) device, called an Access Point (AP), connects to the wired network from a fixed location using standard Ethernet cable. At a minimum, the Access Point receives, buffers, and transmits data between the WLAN and the wired network infrastructure. A single Access Point can support a small group of users and can function within a range of less than one hundred to several hundred feet. The Access Point (or the antenna attached to the access point) is usually mounted high but may be mounted essentially anywhere that is practical as long as the desired radio coverage is obtained.

End users access the WLAN through wireless-LAN adapters, which are implemented as PCMCIA cards in notebook computers, ISA or PCI cards in desktop computers, or integrated within hand-held computers. WLAN adapters provide an interface between the client network operating system (NOS) and the airwaves (via an antenna). The nature of the wireless connection is transparent to the NOS.



The figure shows how a wireless network could be set up in the home. Internal or external adapters are installed on each PC. Printers or other peripherals can be shared through a connected PC. The devices then communicate using a set of reserved high-frequency radiowaves. An access point device connects to a DSL or cable modem and enables high-rate (broadband) Internet access for the entire network.

Because RF-based wireless home networking technology is not restricted by line-of-sight, network components do not need to be located in the same room to communicate. In a typical home, the maximum distance between devices is about 250 feet. Family members can wander from room to room or relax on the patio while surfing the Internet from their laptops.

Several wireless networking standards exist, including Bluetooth, HomeRF and IEEE 802.11, but each serves different purposes. Bluetooth is a technology to connect devices without wires. The intended use is to provide short-range connections between mobile devices and to the Internet via bridging devices to different networks (wired and wireless) that provide Internet capability. HomeRF SWAP is a wireless technology optimised for the home environment. Its primary use is to provide data networking and dial tones between devices such as PCs, cordless phones, Web Tablets, and a broadband cable or DSL modem. Both technologies share the same frequency spectrum but do not interfere when operating in the same space. Both Bluetooth and HomeRF functionality can be implemented in the same device. IEEE 802.11 is emerging as the primary standard for wireless network and Internet access. It supports 11 Mbit/s wireless access in the 2.4GHz radio band and works over longer distances than Bluetooth and HomeRF.

Routers

Routing achieved commercial popularity in the mid-1980s - at a time when large-scale internetworking began to replace the fairly simple, homogeneous environments that had been the norm hitherto. Routing is the act of moving information across an internetwork from a source to a destination. It is often contrasted with bridging, which performs a similar function. The primary difference between the two is that bridging occurs at Layer 2 (the link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer). This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways.



Routers use information within each packet to route it from one LAN to another, and communicate with each other and share information that allows them to determine the best route through a complex network of many LANs. To do this, routers build and maintain "routing tables", which contain various items of route information - depending on the particular routing algorithm used. For example, destination/next hop associations tell a router that a particular destination can be gained optimally by sending the packet to a particular router representing the "next hop" on the way to the final destination. When a router receives an incoming packet, it checks the destination address and attempts to associate this address with a next hop.

Email Tips 10

Tips
Write a meaningful subject line.
Keep the message focused and readable.
Identify yourself clearly.
Be kind -- don't flame.
Proofread.
Don't assume privacy.
Distinguish between formal and informal situations.
Respond Promptly.
Show Respect and Restraint.

Good Email Manners - here are some simple yet effective tips for using email more efficiently:

1. If you are sending an email to multiple people, put their email addresses in the BCC field and your own email address in the To: field. No one likes to share their private email address with strangers.

2. The email subject should be detailed enough to give the recipient an idea about the email content without having to open it. Single words like "Hi" or "Hello" or "Help" are a strict no-no. Think of meaningful but short titles.

3. Do not attach large attachments in your email since not everyone is on a broadband connection. If you have to send a large file over email, upload it to services like Yousendit and then pass on the link in the email.

4. If you have to email more than two documents as attachments, zip them in one file. Doing so would ensure that your friend won't miss downloading any file.

5. Do not write an email while you are drunk or in a really bad mood. It would reflect on the style of your writing.

6. Do not request a Read Notification Receipt.

7. Always reply to emails especially the ones specifically addressed to you. The sender is still waiting to hear from you.

8. Keep you email message short and to the point. Sentences like "I hope this email finds you alive and well" look good only in letter correspondence.

9. Do not hit the Send button without doing a spell check. An email with spelling mistakes or grammatical errors indicate that you have written the message in a non-serious mood and may convey a bad impression. Always read the message before broadcasting it to the world.

10. You may want to remove your personal mobile number and the home number from the email signature if you are participating in a big mailing list. You never know the kind of people who have subscribed to that list.

Brief Overview of Punctuation: Semicolon, Colon,Parenthesis, Dash, Quotation Marks, and Italics

Period

Use a period to end a complete sentence. A sentence is a group of words containing a subject and predicate. In British English a period is called a 'full stop'.

Examples:

He went to Detroit last week.
They are going to visit.

Comma

There are a number of different uses for commas in English. Commas are used to:


Separate a list of items. This is one of the most common uses of a comma. Notice that a comma is included before the conjunction 'and' which comes before the final element of a list.
Examples:

I like reading, listening to music, taking long walks, and visiting with my friends.
They would like books, magazines, DVDs, video cassettes, and other learning materials for their library.


Separate phrases (clauses). This is especially true after a beginning dependent clause or a long prepositional phrase.
Examples:

In order to qualify for your certificate, you will need to take the TOEFL exam.
Although he wanted to come, he wasn't able to attend the course.


Separate two independent clauses that are connected by a conjunction such as 'but'.
Examples:

They wanted to purchase a new car, but their financial situation would not allow it.
I'd really enjoy seeing a film this evening, and I'd like to go out for a drink.


Introduce a direct quote (as opposed to indirect speech i.e. He said he wanted to come ...).
Examples:

The boy said, "My father is often away during the week on business trips."
His doctor replied, "If you don't stop smoking, you run the risk of a heart attack."


Separate appositives (a noun, or noun phrase) or non-defining relative clauses.
Examples:

Bill Gates, the richest man in the world, comes from Seattle.
My only sister, who is a fantastic tennis player, is in great shape.


Question Mark

The question mark is used at the end of a question.

Examples:

Where do you live?
How long have they been studying?

Exclamation Point

The exclamation point is used at the end of a sentence to indicate great surprise. It is also used for emphasis when making a point. Be careful not to use an exclamation point too often.

Examples:

That ride was fantastic!
I can't believe he is going to marry her!

Semicolon

There are two uses for a semicolon:


To separate two independent clauses. One or both of the clauses are short and the ideas expressed are usually very similar.
Examples:

He loves studying; He can't get enough of school.
What an incredible situation; it must make you nervous.


To separate groups of words that are themselves separated by commas.
Examples:

I took a holiday and played golf, which I love; read a lot, which I needed to do; and slept late, which I hadn't done for quite a while.
They plan to study German, for their travels; chemistry, for their work; and literature, for their own enjoyment.


Colon

A colon can be used for two purposes:


To provide additional details and explanation.
Examples:

He had many reasons for joining the club: to get in shape, to make new friends, to lose some weight, and to get out of the house.
She gave notice for the following reasons: bad pay, horrible hours, poor relations with colleagues, and her boss.


To introduce a direct quote (a comma can also be used in this situation).
Examples:

He announced to his friends: "I'm getting married!"
She cried out: "I never want to see you again!"

Underlining and Italics
Underlining and italics are not really punctuation, but they are significant textual effects used conventionally in a variety of situations. Before computerized word-processing was widely available, writers would underline certain terms in handwritten or manually typed pages, and the underlining would be replaced by italics in the published version. Since word processing today allows many options for font faces and textual effects, it is generally recommended that you choose either underlining or italics and use it consistently throughout a given document as needed. Because academic papers are manuscripts and not final publications and because italics are not always easily recognized with some fonts, many instructors prefer underlining over italics for course papers. Whichever you choose, italics or underlining should be used . . .

for example:

to indicate titles of complete or major works such as magazines, books, newspapers, academic journals, films, television programs, long poems, plays of three or more acts

Faulkner's last novel was The Reivers.

The Simpsons offers hilarious parodies of American culture and family life.

Shifts, Process, Support, and Callcenters

Shifts
1. Australian Shifts

2. US Shifts

3. UK Shifts

4. Day Shifts

5. Rotational Shifts

Process

1. In-Bound Process

2. Out-Bound Process

3. Surveys Process

Support

1. Customer Support Executives - (Non-Voice)

2. Customer Support Executives - (Voice)

3. Technical Support Executives - (Non-Voice)

4. Technical Support Executives - (Voice)

Call Center

1. Tamil Call Center Executives

2. Telugu Call Center Executives

3. Malayalam Call Center Executives

4. Kannada Call Center Executives

5. Hindi Call Center Executives

6. Customer Support Executives(Voice)

OPTIMUS (Polaris Group of Company), SUTHERLAND GLOBAL SERVICES, Adventity

OPTIMUS (Polaris Group of Company)

Polaris at a glance:

World's first CMMi (Capability Maturity Model Integrated) Level 5 Certified company
BS7799 certified
Ranked 11th in the list of Top Indian Software Exporters. Source: NASSCOM
20 years of experience in Banking, Financial Services &Insurance (BFSI)
6044 Associates
22 relationship offices across 14 countries
CAGR of over 70%, the highest among all the IT organizations in India
More than 750 Domain Experts
Including major countries such as United States, United Kingdom, Germany, Switzerland, Ireland, Singapore, Australia, Japan and UAE.

Polaris is among the top 10 global software exporters from India, according to rankings released by NASSCOM

--------------------------

Job profile:

Designation: Customer Support

Qualification: Any graduation (No B.E, B.Tech and MCA and 2008 Pass-outs allowed)

Experience: 0-1 year

Skills: Good communication (Any regional languages known along with manageable English)

Salary: 6 K & above

Location: Chennai

Website: www.optimus.com

-------------------

SUTHERLAND GLOBAL SERVICES:

Ranked Number Two Best Performing Managed Services Provider

Fifth Best Performing BPO Provider Globally

World’s First PCMM Level-5 company in Call Center Industry.


ABOUT THE COMPANY:

Year Founded : 1986

Headquarter : Rochester, New York

Chairman & CEO : Dilip R. Vellodi

Investors : Oak Investment Partners

Standard Chartered Private Equity (Merlion Fund)

Industry : Business Process Outsourcing (BPO)

Quality Standards : COPC, Six Sigma, ISO 9001:2000,

ISO 27001:2005

Headcount : 17,500 employees

Locations : United States

India

Philippines

Canada

Mexico


Website: www.suth.com

---------------

Adventity:


Adventity is the market leader in the provision of Knowledge Process Outsourcing ("KPO") to the Financial Services Industry.


Adventity serves a diverse global business community, including some of the world's top financial institutions and Global 1000 companies.

Website: www.adventity.com

Job Profile:

International call centre

Designation : Customer Support Executive


Experience : 0 – 2 years (Relevant experience),


Qualification : Any Graduation,


Skills : Good communication,


Salary : 6k for Freshers (For experienced its Negotiable),

SPARSH BPO, SITEL , INDIA INFOLINE LTD, HTMT, CSS-Slash Support, Ask Prime

SPARSH BPO: (One of the Leaders in Domestic BPO)

Sparsh is the domestic subsidiary of Intelenet Global Services (P) Ltd. Sparsh is dedicated towards adding value and substance to its client business through offering superlative and completely customized services. We provide state of the art solutions to Vertical Industries to meet their voice and BPO needs, operating 5194 seats on 24 x 7 basis, scalable upto 20,000 seats by 2009.

----------------


Job profile:

Designations: CSE
Qualification: Any Non Tech Graduates
No of openings: 250
Salary: up to 6000
Language: Good communication

----------------


INDIA INFOLINE LTD

India Infoline Ltd is listed on both the leading stock exchanges in India, viz. the Stock Exchange, Mumbai (BSE) and the National Stock Exchange (NSE).

----------------

Designation : Team Leader
Qualification : Diploma/Any graduates
Experience : min 1year relevant exp in Tele sales
No of opening : 20
Salary : 14k – 16 k

Pick up & drop facilities will be provided from the month of August.

----------------
SITEL

Sitel provides fully integrated customer care and back office processing services that focus on delivering a return on customer investment to our clients by reducing service costs, improving customer retention and increasing revenue per customer.
Sitel’s ability to serve customers and track customer information across multiple channels enables us to consistently provide positive, intelligent service on behalf of our clients.

---------------


Job Profile:

Designation: TSE (Voice Process)
Qualification: Any Graduates, Even 12th with (0.6mth to 1 yr Exp in BPO)
Shift: Night shift
No of openings: 80
Salary: Upto 2.15 LPA (according to the exp)
Language: Excellent communication
Skill Set: Basic computer knowledge is required.

HCL:


Information about the client:


(A leading global technology and IT Enterprise)


HCL is a 31 year old enterprise, with US $ 4.1 Billion revenue, 47,100 professionals operating out of 17 countries.


HCL BPO is a division of HCL Technologies Limited, a Global Technology and IT enterprise.
HCL BPO’s focus verticals include Telecom, Retail, Banking and Financial Services, Insurance and Hi-Tech and Manufacturing.
HCL BPO is one of the early players in Business Process Outsourcing in the world

HCL BPO is the first Indian and Third Company in the world to be COPC certified for Collections Process. HCL BPO was ranked second in Purdue Benchmark (2003) Global Peer Group of BPO Service Providers. HCL BPO ranked third in Highest Satisfaction for Business Process Outsourcing by the Black Book of Outsourcing (2007).

Job Profile :
Designation: Technical Support Executive
Experience: 0-1.5 yrs
Qualification: Any Computer Graduate or Diploma Holders (with 10 + 2 + 3yrs Diploma or 3 yrs Graduation)
Skills: Excellent communication/Technical knowledge,
Note: No arrears left out with the current qualification
Salary: BEST IN INDUSTRY
Website: www.hclbpo.com.

-----------
HTMT:

· It’s a part of India’s Leading Hinduja Group

· HTMT Global wins Best Performing Global Call Center Provider Award at the prestigious Global Services Award held in New York, USA.

· The Company employs over 12, 000 people worldwide.

Website: www.htmtglobal.com

----------

CSS-Slash Support:

· It’s a part of India’s Leading CSS Group

· Here employees are more into Technical

· They are providing Product Lifecycle Services, Enterprise IT Support, Consumer Support Solutions, Centers of Excellence

Website: www.csscorp.com

-----------

Ask Prime:

· Its Leading UK Call Centre

· They are clients are more into Retail Business

· No Work Pressure

· Excellent Salary

· Inbound

---------------------------

Job Profile:

Designation: Customer Support executive (Flexible UK Shift Call Center-No Work pressure-Inbound-Good Salary)

Experience: 0 – 3 years (Relevant experience),

Qualification: Any Graduation,

Skills: Excellent communication

--------------------

More about Win XP

broadband
Of or relating to communications systems in which the medium of transmission (such as a wire or fiber-optic cable) carries multiple messages at a time, each message modulated on its own carrier frequency by a modem.

browser
Software that interprets the markup of files in HTML, formats them into Web pages, and displays them to the end user. Some browsers also permit end users to send and receive e-mail, read newsgroups, and play sound or video files embedded in Web documents.

bus
A communication line used for data transfer among the components of a computer system. A bus essentially allows different parts of the system to share data. For example, a bus connects the disk-drive controller, memory, and input/output ports to the microprocessor.

cable modem
A device that enables a broadband connection to the Internet by using cable television infrastructure. Access speeds vary greatly, with a maximum throughput of 10 megabits per second (Mbps).

Class A IP address
A unicast IP address that ranges from 1.0.0.1 through 126.255.255.254. The first octet indicates the network, and the last three octets indicate the host on the network.

Class B IP address
A unicast IP address that ranges from 128.0.0.1 through 191.255.255.254. The first two octets indicate the network, and the last two octets indicate the host on the network.

Class C IP address
A unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets indicate the network, and the last octet indicates the host on the network. Network Load Balancing provides optional session support for Class C IP addresses (in addition to support for single IP addresses) to accommodate clients that make use of multiple proxy servers at the client site.

DNS Server
A service that maintains information about a portion of the Domain Name System (DNS) database and responds to and resolves DNS queries. A computer running this service is also known as a DNS server.

encryption
The process of disguising a message or data in such a way as to hide its substance.

Ethernet
An IEEE 802.3 standard for contention networks. Ethernet uses a bus or star topology and relies on the form of access known as Carrier Sense Multiple Access with Collision Detection (CSMA/DC) to regulate communication line traffic. Network nodes are linked by coaxial cable, fiber-optic cable, or by twisted-pair wiring. Data is transmitted in variable-length frames containing delivery and control information and up to 1,500 bytes of data. The Ethernet standard provides for baseband transmission at 10 megabits (10 million bits) per second.

FAT32
A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes.

Internet Protocol (IP)
A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets.

Internet service provider (ISP)
A company that provides individuals or companies access to the Internet and the World Wide Web. An ISP provides a telephone number, a user name, a password, and other connection information so users can connect their computers to the ISP's computers. An ISP typically charges a monthly or hourly connection fee.

IP address
A 32-bit address used to identify a node on an IP internetwork. Each node on the IP internetwork must be assigned a unique IP address, which is made up of the network ID, plus a unique host ID. This address is typically represented with the decimal value of each octet separated by a period (for example, 192.168.7.27). In this version of Windows, you can configure the IP address statically or dynamically through DHCP.

modem (modulator/demodulator)
A device that allows computer information to be transmitted and received over a telephone line. The transmitting modem translates digital computer data into analog signals that can be carried over a phone line. The receiving modem translates the analog signals back to digital form.

NTFS file system
An advanced file system that provides performance, security, reliability, and advanced features that are not found in any version of FAT. For example, NTFS guarantees volume consistency by using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log file and checkpoint information to restore the consistency of the file system. In Windows 2000 and Windows XP, NTFS also provides advanced features such as file and folder permissions, encryption, disk quotas, and compression.

Plug and Play
A set of specifications developed by Intel that allows a computer to automatically detect and configure a device and install the appropriate device drivers.

Recovery Console
A command-line interface that provides a limited set of administrative commands that are useful for repairing a computer.

router
In a Windows environment, hardware that helps LANs and WANs achieve interoperability and connectivity, and can link LANs that have different network topologies (such as Ethernet and Token Ring). Routers match packet headers to a LAN segment and choose the best path for the packet, optimizing network performance.

In the Macintosh environment, routers are necessary for computers on different physical networks to communicate with each other. Routers maintain a map of the physical networks on a Macintosh internet (network) and forward data received from one physical network to other physical networks. Computers running the Server version of Windows with AppleTalk network integration can act as routers, and you can also use other routing hardware on a network with AppleTalk network integration.

serial port
An interface on the computer that allows asynchronous transmission of data characters one bit at a time. Also called a communication or COM port.

System Restore
A tool that tracks changes to your computer and creates a restore point when it detects the beginning of a change. You can use the System Restore Wizard to select a restore point to restore your computer to an earlier state when your computer was functioning the way you like.

universal serial bus (USB)
An external bus that supports Plug and Play installation. Using USB, you can connect and disconnect devices without shutting down or restarting your computer. You can use a single USB port to connect up to 127 peripheral devices, including speakers, telephones, CD-ROM drives, joysticks, tape drives, keyboards, scanners, and cameras. A USB port is usually located on the back of your computer near the serial port or parallel port.

virus
A program that attempts to spread from computer to computer and either cause damage (by erasing or corrupting data) or annoy users (by printing messages or altering what is displayed on the screen).

Registry - WinXP

Windows RegistryWindows stores its configuration information in a database called the registry. (The registry editor that ships with Windows is regedit.exe.) The registry contains profiles for each user of the computer and information about system hardware, installed programs, and property settings. Windows continually references this information during its operation.

Registry editors are available that enable you to inspect and modify the registry. However, you should not need to do so. Instead, allow Windows programs to modify the system registry as needed. It is strongly recommended that you do not edit registry settings yourself.

Warning

Incorrectly editing the registry may severely damage your system. At the very least, you should back up any valued data on the computer before making changes to the registry.

Folder/predefined key Description

HKEY_CURRENT_USER Contains the root of the configuration information for the user who is currently logged on. The user's folders, screen colors, and Control Panel settings are stored here. This information is referred to as a user's profile.

HKEY_USERS Contains the root of all user profiles on the computer. HKEY_CURRENT_USER is a subkey of HKEY_USERS.

HKEY_LOCAL_MACHINE Contains configuration information particular to the computer (for any user).

HKEY_CLASSES_ROOT Is a subkey of HKEY_LOCAL_MACHINE\Software. The information stored here ensures that the correct program opens when you open a file by using Windows Explorer.

HKEY_CURRENT_CONFIG Contains information about the hardware profile used by the local computer at system startup.

BPO Industry in India- A Report

Business process outsourcing (BPO) is a broad term referring to outsourcing in all fields. A BPO differentiates itself by either putting in new technology or applying existing technology in a new way to improve a process.
Business Process Outsourcing (BPO) is the delegation of one or more IT-intensive business processes to an external provider that in turn owns, administers and manages the selected process based on defined and measurable performance criteria. Business Process Outsourcing (BPO) is one of the fastest growing segments of the Information Technology Enabled Services (ITES) industry.

Few of the motivation factors as to why BPO is gaining ground are:

Factor Cost Advantage
Economy of Scale
Business Risk Mitigation
Superior Competency
Utilization Improvement
Generally outsourcing can be defined as - An organization entering into a contract with another organization to operate and manage one or more of its business processes.
Different Types of Services Being Offered By BPO's
Customer Support Services
Our customer service offerings create a virtual customer service center to manage customer concerns and queries through multiple channels including voice, e-mail and chat on a 24/7 and 365 days basis.

Service Example: Customers calling to check on their order status, customers calling to check for information on products and services, customers calling to verify their account status, customers calling to check their reservation status etc.


Technical Support Services
Our technical support offerings include round-the-clock technical support and problem resolution for OEM customers and computer hardware, software, peripherals and Internet infrastructure manufacturing companies. These include installation and product support, up & running support, troubleshooting and Usage support.

Service Example: Customers calling to resolve a problem with their home PC, customers calling to understand how to dial up to their ISP, customers calling with a problem with their software or hardware.


Telemarketing Services
Our telesales and telemarketing outsourcing services target interaction with potential customers for 'prospecting' like either for generating interest in products and services, or to up-sell / promte and cross sell to an existing customer base or to complete the sales process online.

Service Example: Outbound calling to sell wireless services for a telecom provider, outbound calling to retail households to sell leisure holidays, outbound calling to existing customers to sell a new rate card for a mobile service provider or outbound calling to sell credit or debit cards etc.


Employee IT Help-desk Services
Our employee IT help-desk services provide technical problem resolution and support for corporate employees.

Service Example: of this service include level 1 and 2 multi-channel support across a wide range of shrink wrapped and LOB applications, system problem resolutions related to desktop, notebooks, OS, connectivity etc., office productivity tools support including browsers and mail, new service requests, IT operational issues, product usage queries, routing specific requests to designated contacts and remote diagnostics etc.


Insurance Processing
Our insurance processing services provide specialized solutions to the insurance sector and support critical business processes applicable to the industry right from new business acquisition to policy maintenance to claims processing.

Service Example:

New Business / Promotion:
Inbound/outbound sales, Initial Setup, Case Management, Underwriting, Risk assessment, Policy issuance etc.

Policy Maintenance / Management:

Record Changes like Name, Beneficiary, Nominee, Address; Collateral verification, Surrender Audits Accounts Receivable, Accounting, Claim Overpayment, Customer care service via voice/email etc.


Data Entry Services / Data Processing Services
Service Example:


Data entry from Paper/Books with highest accuracy and fast turn around time (TAT)
Data entry from Image file in any format
Business Transaction Data entry like sales / purchase / payroll.
Data entry of E-Books / Electronic Books
Data Entry : Yellow Pages / White Pages Keying
Data Entry and compilation from Web site
Data Capture / Collection
Business Card Data Entry into any Format
Data Entry from hardcopy/Printed Material into text or required format
Data Entry into Software Program and application
Receipt and Bill Data Entry
Catalog Data Entry.
Data Entry for Mailing List/Mailing Label.
Manuscripting typing in to word
Taped Transcription in to word.
Copy, Paste, Editing, Sorting, Indexing Data into required format etc.

Data Conversion Services
Service Example:


Conversion of data across various databases on different platforms
Data Conversion via Input / Output for various media.
Data Conversion for databases, word processors, spreadsheets, and many other standard and custom-made software packages as per requirement.
Conversion from Page maker to PDF format.
Conversion from Ms-Word to HTML format
Conversion from Text to Word Perfect.
Conversion from Text to Word to HTML and Acrobat
Convert Raw Data into required MS Office formats.
Text to PDF and PDF to Word / Text / Doc
Data Compilation in PDF from Several Sources.
E-Book Conversion etc.

Scanning, OCR with Editing & Indexing Services
Service Example:


High speed Image-Scanning and Data capture services
High speed large volume scanning
OCR Data From Scanned page / image
Scan & OCR paper Book in to CD.
ADOBE PDF Conversion Services.
Conversion from paper or e-file to various formats

Book Keeping and Accounting Services
Service Example:


General Ledger
Accounts Receivables and Accounts Payable
Financial Statements
Bank Reconciliation
Assets / Equipment Ledgers etc.

Form Processing Services:
Service Example:


Insurance claim form
Medical Form / Medical billing
Online Form Processing
Payrol Processing etc.

Internet / Online / Web Research
Service Example:


Internet Search, Product Research, Market Research, Survey, Analysis.
Web and Mailing list research etc.

Challenges for a HR Professional in BPO
Brand equity: People still consider BPO to be "low brow", thus making it difficult to attract the best talent.

Standard pre-job training: Again, due to the wide variety of the jobs, lack of general clarity on skill sets, etc, there is no standard curriculum, which could be designed and followed.

Benchmarks: There are hardly any benchmarks for compensation and benefits, performance or HR policies. Everyone is charting their own course.

Customer-companies tend to demand better results from outsourcing partners than what they could actually expect from their own departments. "When the job is being done 10,000 miles away, demands on parameters such as quality, turn around timeliness, information security, business continuity and disaster recovery, etc, are far higher than at home. So, how to be more efficient than the original?

Lack of focused training and certifications
Given this background, the recruiting and compensation challenges of HR departments are only understandable.


Key To success
The key to success in ramping up talent in a BPO environment is a rapid training module. The training component has to be seen as an important sub-process, requiring constant re-engineering.
Business Process Outsourcing: The Top Rankers
WNS has emerged as the top BPO in India, pushing Wipro Spectramind to the second position, according to a survey done by NASSCOM. The basis of ranking is the revenues generated by the BPO companies in 2003-04, as per US GAAP. A list of top fifteen BPO companies in India is given below.

WNS Group
Wipro Spectramind
Daksh e-Services
Convergys
HCL Technologies
Zenta
ICICI Onesource
MphasiS
EXL
Tracmail
GTL Ltd.
vCustomer
HTMT
24/7 Customer
Sutherland Technologies
The parameters for the survey was: Employee Size (Operation level executives), Percentage of last salary hike, Cost to company , Overall Satisfaction Score, Composite Satisfaction, Company Culture, Job Content / Growth, Training , Salary and Compensation , Appraisal System, People, Preferred Company: (Percentage of respondents of a company who named their own company as the preferred one), Dream Company: (Percentage of respondents in the total sample who preferred a particular company).
Employee Benefits Provided By Majoriy Of the BPO Companies
Provident Fund: As per the statutory guidelines, the employee is required to contribute a percentage of his basic salary and DA to a common fund. The employer for this fund contributes as well. The employee can use the amount deposited in this fund for various personal purposes such as purchase of a new house, marriage etc.
Gratuity: Gratuity is one of the retrial benefits given to the employee in which the employer every year contributes a particular amount. The fund created can be used by the employee for the purpose of long-term investment in various things such as a house etc.
Group Mediclaim Insurance Scheme: This insurance scheme is to provide adequate insurance coverage of employees for expenses related to hospitalization due to illness, disease or injury or pregnancy in case of female employees or spouse of male employees. All employees and their dependent family members are eligible. Dependent family members include spouse, non-earning parents and children above three months
Personal Accident Insurance Scheme: This scheme is to provide adequate insurance coverage for Hospitalization expenses arising out of injuries sustained in an accident. It is applicable to all the employees of JFWTC and covers total / partial disablement / death due to accident and due to accidents.
Subsidized Food and Transportation: The organizations provides transportation facility to all the employees from home till office at subsidized rates. The lunch provided is also subsidized.
Company Leased Accommodation: Some of the companies provides shared accommodation for all the out station employees, in fact some of the BPO companies also undertakes to pay electricity/water bills as well as the Society charges for the shared accommodation. The purpose is to provide to the employees to lead a more comfortable work life balance.
Recreation, Cafeteria, ATM and Concierge facilities: The recreation facilities include pool tables, chess tables and coffee bars. Companies also have well equipped gyms, personal trainers and showers at facilities.
Corporate Credit Card: The main purpose of the corporate credit card is enable the timely and efficient payment of official expenses which the employees undertake for purposes such as travel related expenses like Hotel bills, Air tickets etc
Cellular Phone / Laptop: Cellular phone and / or Laptop is provided to the employees on the basis of business need. The employee is responsible for the maintenance and safeguarding of the asset.
Personal Health Care (Regular medical check-ups): Some of the BPO'S provides the facility for extensive health check-up. For employees with above 40 years of age, the medical check-up can be done once a year.
Loans: Many BPO companies provides loan facility on three different occasions: Employees are provided with financial assistance in case of a medical emergency. Employees are also provided with financial assistance at the time of their wedding. And, The new recruits are provided with interest free loans to assist them in their initial settlement at the work location.
Educational Benefits: Many BPO companies have this policy to develop the personality and knowledge level of their employees and hence reimburses the expenses incurred towards tuition fees, examination fees, and purchase of books subject, for pursuing MBA, and/or other management qualification at India's top most Business Schools.
Performance based incentives: In many BPO companies they have plans for , performance based incentive scheme. The parameters for calculation are process performance i.e. speed, accuracy and productivity of each process. The Pay for Performance can be as much as 22% of the salary.
Flexi-time: The main objective of the flextime policy is to provide opportunity to employees to work with flexible work schedules and set out conditions for availing this provision. Flexible work schedules are initiated by employees and approved by management to meet business commitments while supporting employee personal life needs .The factors on which Flexi time is allowed to an employee include: Child or Parent care, Health situation, Maternity, Formal education program
Flexible Salary Benefits: Its main objective is to provide flexibility to the employees to plan a tax-effective compensation structure by balancing the monthly net income, yearly benefits and income tax payable. It is applicable of all the employees of the organization. The Salary consists of Basic, DA and Conveyance Allowance. The Flexible Benefit Plan consists of: House Rent Allowance, Leave Travel Assistance, Medical Reimbursement, Special Allowance
Regular Get together and other cultural programs: The companies organizes cultural program as and when possible but most of the times, once in a quarter, in which all the employees are given an opportunity to display their talents in dramatics, singing, acting, dancing etc. Apart from that the organizations also conduct various sports programs such as Cricket, football, etc and regularly play matches with the teams of other organizations and colleges.
Wedding Day Gift: Employee is given a gift voucher of Rs. 2000/- to Rs. 7000/- based on their level in the organization.
Employee Referral Scheme: In several companies employee referral scheme is implemented to encourage employees to refer friends and relatives for employment in the organization.
Paid Days Off
Maternity Leave
Employee Stock Option Plan
Inspite of all these benefits, the attrition rate in BPO industry is very high, why?. What is the reason for an employee to leave? These and many more are the questions that need immediate attention from the industrial gurus.

Why people prefer to join BPO's?
In general a person with any graduation can join any of the BPO. Some BPO's like to take people with MBA but then again the specialization are of an individual hardly makes any difference. Again, this is the industry, where there is no reference checks and very often people don't even specify there exact age. Lets me share with you some of the reasons as why people prefer to join a BPO:
Did not get a better job.
Find nothing better to do.
Education level doesn't matter
Good work environment
Good Benefits
Flexibility of time
Attractive life style
Transport facility
Why people leave the BPO's?
When there are so many benefits associated with BPO industry.when there are so many privileges for the BPO employees than what makes them to change the company/industry?? Is it only MONEY that matters or anything else as well?? Here are some of the reasons for a BPO professional to change his/her job.
No growth opportunity/lack of promotion
For higher Salary
For Higher education
Misguidance by the company
Policies and procedures are not conducive
No personal life
Physical strains
Uneasy relationship with peers or managers

Courtesy: www.bpoindia.org

BPO Snaps







Motherboard










Windows Vista - Operating System

Windows Vista is an operating system developed by Microsoft for use on personal computers, including home and business desktops, laptops, Tablet PCs, and media center PCs.

Prior to its announcement on July 22, 2005, Windows Vista was known by its codename Longhorn.Development was completed on November 8, 2006; over the following three months it was released in stages to computer hardware and software manufacturers, business customers, and retail channels. On January 30, 2007, it was released worldwide, and was made available for purchase and download from Microsoft's website.

The release of Windows Vista came more than five years after the introduction of its predecessor, Windows XP, the longest time span between successive releases of Microsoft Windows.

Windows Vista contains many changes and new features, including an updated graphical user interface and visual style dubbed Windows Aero, improved searching features, new multimedia creation tools such as Windows DVD Maker, and redesigned networking, audio, print, and display sub-systems.

Vista also aims to increase the level of communication between machines on a home network, using peer-to-peer technology to simplify sharing files and digital media between computers and devices.

Windows Vista includes version 3.0 of the .NET Framework, which aims to make it significantly easier for software developers to write applications than with the traditional Windows API.

Microsoft's primary stated objective with Windows Vista, however, has been to improve the state of security in the Windows operating system.

One common criticism of Windows XP and its predecessors has been their commonly exploited security vulnerabilities and overall susceptibility to malware, viruses and buffer overflows. In light of this, Microsoft chairman Bill Gates announced in early 2002 a company-wide "Trustworthy Computing initiative" which aims to incorporate security work into every aspect of software development at the company.

Microsoft stated that it prioritized improving the security of Windows XP and Windows Server 2003 above finishing Windows Vista, thus delaying its completion.

While these new features and security improvements have garnered positive reviews, Vista has also been the target of much criticism and negative press.

Criticism of Windows Vista has targeted its high system requirements, its more restrictive licensing terms, the inclusion of a number of new digital rights management technologies aimed at restricting the copying of protected digital media, lack of compatibility with some pre-Vista hardware and software, and the number of authorization prompts for User Account Control.

As a result of these and other issues, Windows Vista has seen adoption and satisfaction rates lower than Windows XP.

However Vista is keeping well up with expectations stated by Microsoft before its launch of getting 200 million users by January 2009.[11][12][13]

USEFUL LINK: www.microsoft.com/windows/windows-vista/default.aspx

Navy Codes

A as in Alpha
B as in Bravo
C as in Charlie
D as in Delta
E as in Echo
F as in Foxtrot
G as in Golf
H as in Hotel
I as in India
J as in Juliot
K as in Kilo
L as in Leema
M as in Mike
N as in Nancy
O as in Oscar
P as in Papa
Q as in Quebac
R as in Romeo
S as in Seira
T as in Tango
U as in Uncle/Uniform
V as in Victor
W as in Wisky
X as in X-ray
Y as in Yankee
Z as in Zulu

Versant Test

Versant enables call center and BPO organizations to reduce interviewing costs and improve agent screening and training placement. Improve your talent programs with this accurate, reliable tool and drive positive business results.

http://www.ordinate.com

Formerly known as the Spoken English Tests (SET), VersantTM tests are the only completely automated tests of spoken languages. Using the Versant patented speech processing technology, Versant tests can be taken on a telephone or PC and are scored by computer. Once administered, numeric scores and performance levels that describe the test-taker's ability to understand and speak the selected language are generated within minutes and can be viewed online.

Versant tests are currently available to assess skills in English and Spanish and can be utilized in corporate, government, and educational settings across many areas of specialization and for a variety of purposes. Learn more about solutions that will meet the needs of your organization, school, or agency.

Looking for a practice test?
If you will be taking a Versant test and want to practice, note that this sample test is just that - a sample to give you an idea of what the test is like. It does not contain all of the item types or questions of our full test, and the test is not scored. If you would like to purchase a full practice test, contact at sales@ordinate.com.

Versant for English SAMPLE Test

Introduction:
Thank you for calling the Ordinate testing system.

Please enter your Test Identification Number on the telephone keypad.
Now, please say your name.
Now, please follow the instructions for Parts A through E.

Part A: Reading. Please read the sentences as you are instructed.
1. Traffic is a huge problem in Southern California.
2. The endless city has no coherent mass transit system.
3. Sharing rides was going to be the solution to rush-hour traffic.
4. Most people still want to drive their own cars, though.
5. Larry's next door neighbors are awful.
6. They play loud music all night when he's trying to sleep.
7. If he tells them to stop, they just turn it up louder.
8. He wants to move out of that neighborhood.
9. My aunt recently rescued a dog that was sick.
10. She brought her home and named her Margaret.
11. They weren't sure she was going to live, but now she's healthy.
12. I just wish she could get along better with their cat.

Part B: Repeat. Please repeat each sentence that you hear.
Example: a voice says, "Leave town on the next train."
and you say, "Leave town on the next train."

Part C: Questions. Now, please just give a simple answer to the questions.
Example: a voice says, "Would you get water from a bottle or a newspaper?"
and you say, "a bottle" or "from a bottle".

Part D: Sentence Builds. Now, please rearrange the word groups into a sentence.
Example: a voice says, "was reading" ... "my mother" ... "her favorite magazine"
and you say, "My mother was reading her favorite magazine."

Part E: Open Questions.You will have 20 seconds to answer each of two questions. The questions will
be about family life or personal choices. Each question will be spoken twice, followed by a beep. When
you hear the beep, you will have 20 seconds to answer the question. At the end of the 20 seconds,
another beep will signal the end of the time you have to answer.

Job profile

Designation : Technical Support Executives / Sr. TSE / Customer Support /(Voice Process / Non-Voice )

Skill Set : Excellent communication skill with Good Hardware Knowledge and typing skill.

Qualification : Any Technical Graduates

Optional: Experience : Minimum 6 months

Shift : Night shift

Transportion: Depends

Position : 250+

Neutral Accent

Why Indian Call centres train their employees with Neutral Accent ?

Indian call centres train their employees with neutral accent. That's true. First tell me some thing...can an American speak an Indian language with perfect Indian accent? No. Similarly, no Indian could suddenly learn and speak in American accent. Moreover, most of the people in Indians could understand and feel free with neutral accent only. I think its not a difficult issue for Americans to understand neutral accent.

If some one thinks that any Indian could speak american accent, thats wrong. No Indian could speak exactly how an american do. I mean to say, It's purely biological issue. American can't speak Indian accent though. When ur in calls, if u produce false accent eventually customers wil be irated. For this reason call centers have got a new solution of Neutral accent. Where the accent could be understood by every person who knows english. It consists of slight accent bending tricks, Voice modulation.

USEFUL LINK: www.neutralaccent.com

Home Work Topics

If you hate a person, what may be the reason from your perception?

People have a tendency to sit in front of the television for long hours continuously.
What's your opinion about this?

Nowsdays, the use of mobile phones are becoming more prominent.

What's your opinion on the usage of mobile phones.

Technology seems to be advancing day by day.Will the growing trend of technology hinder lifestyle in anyway?

If you had a disagreement with a close friend,how would you go about handling it?

Nowadays, parents have the habit of letting their children make their own decisions.
Do you think this is a healthy trend?

Describe an event or celebration that has special meaning to your family.Please describe the event in detail.

Who is the best teacher for a child - a family member or someone outside the family?
Please explain your answer.

If you had a choice, would you chose to live for 12 months in a very warm location or a very cold location? why? Explain.

Do you think it is possible that some children turn out bad no matter what their parents do? Please explain.

BPO Screening Rounds

1. Initial Screening.
Be prepared for Introduction about you, Topics on any subject not from academic interests.
Optional:Group Discussion

2. Technical Round (written/oral)

3. Aptitude test (written)

4. Typing at the rate of minimum 35 words/min

5. HR final round

Hot topis:

1. Your Option
2. Child labour
3. Movie you watched recently
4. The novel you read
5. Sports
6. Media and advertisements
7. Women in India
8. The person you admire
9. College life
10. School life
11. girls - boys question like who manage things in a better way, who is more intelligent..
12. Why BPO?
13. What is Customer care, Customer support, Callcentre
14. Cell phones
15. Your unforgettable and embarassing moments in your life
etc...

Voice and Accent Training - by www.neutralaccent.com



Useful links For Voice and Accent : www.neutralaccent.com


Improving your voice and accent in a day or week is impossible. If you have your interviews in near future then give it your best shot. For long time improvement here are some tips:
1)Mark at least words a day from a dictionary and memorize them and use dictionary keys to learn their pronunciation.
2)Nowadays talking dictionaries are also available. invest in any one.
3)Talk with your friends in the language you want to be fluent in, avoid all other languages. You will learn from your mistakes.
4)Watch the movies in that language extensively and listen to songs in that language & try understanding the lyrics.

Read more..www.neutralaccent.com

BPO Venue

Sutherland Technologies Pvt Ltd www.suth.com

Chennai
Sutherland Global Services
# 383, Velachery Tambaram Main Road
Vijayanagaram
Chennai - 600 042
INDIA
T: +91-44-42007884
F: +91-44-42048329



Chennai
Sutherland Global Services
#46, Santhome High Road
Mylapore
Chennai - 600 004
INDIA
T: +91-44-42227884
F: +91-44-24620577


Chennai
Sutherland Global Services
# 2, Park Road
Americorp Building
Padi
Chennai - 600 050
INDIA
T: +91-44-43917884



Chennai
Sutherland Global Services
Module 1, 4th floor
ETL Infrastructure
Pallavaram – Thoraipakkam 200 feet Road
Thoraipakkam
Chennai - 600 096
INDIA
T: +91-44-42827884

Cybernet Slash Support (CSS) - http://www.csscorp.com
Cybernet - SlashSupport
2nd & 3rd Floor,
No. 81, MBC Towres,
T.T.K. Road, Alwarpet
Chennai - Tamil Nadu ,
INDIA 600018


Sitel-Indiawww.sitel-india.com
City Centre,,
5th Floor,, Radhakrishnansalai,,
Mylapore, Chennai,
Tamil Nadu 400004
044 66185700


Accenture BPO Services
Location - Sholinganallur, Chennai-600119

Wipro Technologies
Location - Guindy, Chennai-600032

Scope International
Location - Nungambakkam, Chennai-600034

Perot Systems
Location - Ambattur Industrial Estate, Chennai-600058

Citi Group Global Services Ltd
Location - Mount Road, Chennai-600002

Intelenet Global Services
Location - Tharamani, Chennai-600113

Flextronics Technologies Pvt Ltd
Location - Nungambakkam, Chennai-600034

Optimus Global Services Ltd Head Office
Location - T Nagar, Chennai-600017

Aviva BPO Perungudi / Customer Operation Service
Location - Perungudi, Chennai-600096

Tata Consultancy Services
Location - Tharamani, Chennai-600113

H C L BPO Services
Location - Egmore, Chennai-600008

Nittany Outsourcing Services Kottivakkam
Location - Thiruvanmiyur, Chennai-600041

Allsec Technologies Ltd
Location - R A Puram, Chennai-600028

Cognizant Technology Solutions Ltd Kandanchavadi
Location - Perungudi, Chennai-600096

Perot Systems Anna Nagar
Location - Anna Nagar East, Chennai-600102

Info Vision Information Services
Location - Aminjikarai, Chennai-600029

Hcl Technologies Ltd
Location - Greames Road, Chennai-600006

Omega Healthcare Bpo
Location - Gopalapuram, Chennai-600086

ICICI One Source Ltd
Location - Royapettah, Chennai-600014

Spectrum BPO Pvt Tld
Location - Nungambakkam, Chennai-600034

Accel India Chennai
Location - Chennai-600011

so on...

First Round Interview

"Tell me about yourself"

The perfect opening for your two-minute presentation! Describe your educational and work background, identify your Key strengths and provide a couple of illustrations, and state your intended career direction. Usually, this is the first question asked. If it isn't, you can usually defer answering a different question by saying "It may help if I start by providing a bit of background" and following with your presentation. Then you can return to the interviewer's question.

"Why would you like to work here?"

Explain what you have Learned about the company, highlighting what you find appealing or admirable. Try to be specific—broad generalities sound trite.

Good answer: "I've researched the leading companies in this industry, and yours seems to be the one that does the best job in terms of customer relations, encouraging risk taking, and setting tough goals while giving people an idea of how they're doing. That appeals to me." (Shows that you've done some research and are basing your decision on specific criteria.)

Bad answer: I've heard it's a good company, and I have friends here. (You don't appear to have done any serious research, and the interviewer may wonder if you're more interested in socializing than in working.)

"What are your career goals?"

Focus on the idea that you want to grow professionally, but realize that there may be a variety of opportunities in the company as time goes on. Avoid naming titles—you may shoot too high or too low.

Good answer: "I've learned from the experiences I described earlier that I enjoy leadership, communication, and negotiation. I'm interested in leading to manage projects, people, and business situations. My goals are to work for a manager I can learn from, to develop on-the-job experience, and to achieve or surpass the goals that are set." (Ties together the past and future and shows business awareness and achievement orientation.)

Bad answer: "I haven't set any specific goals, but I know I want to work here." (If you don't have any goals, how do you know you want to work here? Are you focused on learning, or have you already completed all the learning you intend to do?)

"Why should I hire you?"

Be prepared to cite the key strengths that you see as necessary to do the job, relating them to your own demonstrated skills, as illustrated in stories you've already told. Then try to name one desirable extra that you provide, such as your enthusiasm, your ability to work long hours when necessary, or your love of learning.

'Tell me about your greatest challenge and how you dealt with it."

This is the perfect entre for telling another of the accomplishment stories you developed when you were preparing your two-minuie presentation.

"Do you have any more questions?"

Never say no! Keep several good questions in reserve for just this request (more tnan one, because over the course of the interview the manager may address one or more of them).

Some good questions:

• "Can you give me an example or two of teamwork in action here?"

• "How can I learn what I need to know about the organization's strategic plan?

• "Assuming you hire me, how would you like me to spend my first month here?"

• "Have I said anything that causes you concern about my fitting in here?"

And to cap it of, make a final presentation of what you feel you have to offer, then inquire about how the decision-making process is expected to proceed. A good dosing statement will reiterate the strengths you have that would be most valuable on the job; your enthusiasm for the work; and your desire to become a member of the team.

"Who is your hero?"

Pick someone — don't answer that you don't have a hero or heroine, because the question is about the traits you value. (If you don't want the job, you might say that no one lives up to your standards.) This should be someone you genuinely admire, and you should make sure to name the traits that give rise to your admiration. Also consider whether the values these traits represent will seem positive to the company.
If you say, for example. "I'Ve always admired my Uncle because he did whatever it look to pile up a fortune, "you'll come off as greedy and selfish.

Interview tips and tricks: www.prepareinterview.com

Computer Basics

Computer

Typically, a computer consists of a monitor, a CPU, a keyboard, a mouse and a speaker setup.
The monitor is the output screen. It gives visual communication.
The CPU, central processing unit is responsible for the entire task given to the computer. Stores information, performs arithmetic and logical calculation boot or start the computer. It consists of a boot or starts the computer. It consists of a power controller, mother board, bios chip, hard disk, CD-drive, FD-drive, etc.
Keyboard is the input device which contains control keys, alphabet and number keys. Also have special keys. Through this we can type information and do calculations.
Using mouse, we can place cursor at any point on the screen, and can have a control over that.
Speaker provides sound effects.

UPS [Uninterrupted Power Supply]

When power supply gets off while working computer, there can be chance of losing data. In such cases, the UPS saves the power and will provide to computer for 20 to 30 min. During this time we can store the data and safely shut down the system.

Registered Jack (RJ)

A type of connector, most often used in telecommunications.
RJ11 is a four or six pin connector used in most connections destined for voice use; it is the connector used on phone cards.
RJ45 is the eight pin connector used for data transmission over twisted-pair wiring and can used for networking. RJ45 is the connector used on 10BaseT Ethernet cables.

IP address

A unique 32 bit address, each machine must have in order to communicate on a TCP/IP n/w. This address is in the form x.x.x.x where x is a number from 0 to 255. Eg. 61.1.205.185

TCP/IP

- Transmission Control Protocol/Internet Protocol.
- A set of networking protocols widely used on the internet that provides communications across interconnected networks of computers with diverse H/W architectures and various operating systems.

BIOS

- Is a S/W routine that test H/W at startup, start the operating system, and support the transfer of data among H/W devices. The BIOS is stored in read-only memory. Although critical to performance, the BIOS is usually invisible to computer users.
- ROM-based software on a motherboard that acts as a kind of interpreter b/w an operating system and a computer's H/W.

POST.

A set of diagnostic programs, loaded automatically from ROM BIOS during startup, designed to ensure that the major system components are present and operating. If a problem is found, the POST S/W writes an error message on the screen, sometimes with a diagnostic code number including the type of fault located. These POST tests execute before any attempt is made to load the O.S [Operating System].

PING [Packet Internet Grouper].

A utility used to send a short message to another computer on a TCP/IP N/W. PING can be useful to test connectivity b/w N/Ws or to see if a particular machine is communicating with the N/W.

Port.

A connection point on your computer where you can connect devices that pass data into and out of a computer. For example, a printer is typically connected to a parallel port (also called an LPT Port) and a modem is typically connected to a serial port (also called com port).

USB

It is an external bus that supports plug and play installation. Using USB, we can connect and disconnect devices without shutting down or restarting the computer. We can use a single USB port to connect up to 127 peripheral devices, including speakers, telephones, CD-ROM drives, joystick, tape drives, keyboards, scanners, and cameras.
A USB port is usually located on the back of your computer near the serial port or parallel port.

Plug and play.

A set of specifications developed by Intel that allows a computer to automatically detect and configure a device and install the appropriate device drivers.

Non-plug and play.

A device, such as printer, modem, or game controller, that requires manual configuration of hardware settings before it can be used. No n-plug and play devices are becoming increasingly rare as manufacturers stop producing them in favor of plug and play devices.

Driver.

A program that allows a specific devices, such as a modem, n/w adapter, or printer, to communicate with the operating system. Although a device might be installed on your system, windows cannot use the device until you have installed and configured the appropriate driver.
If a device is listed in the Hardware Compatibility List (HCL), a driver is usually included with windows. Device drivers load automatically when a computer is started and thereafter run invisibly.

ISP (Internet Service Provider)

A company that provides internet access and e mail addresses for users. Generally, ISPs are local or regional companies

Routers.

A network node connected to two or more networks that forwards packets from one network to another.

CMOS.

PC has to keep certain settings when it's turned off and its power cord is unplugged. Some of these settings include: date, time, hard drive configuration and memory. PC keeps these settings in a special memory chip called the complementary metal-oxide semi-conductor chip.
When we shut off a computer anything that is left in main memory is lost forever. To prevent CMOS from losing its information, Mother Board manufacturers include a small battery, called the CMOS battery to power the CMOS memory.

Modem.

A modem is a device that converts digital signals, from a computer, into anolog signals for transmission over telephone lines. A modem also converts incoming analog signals into digital signals.

DSL.

DSL is a type of high-speed Internet access for consumers. DSL stands for Digital Subscriber Line. This is a technology that allows for digital transmission over existing telephone lines.DSL provide faster internet service while allowing regular phone/voice usage simultaneously on the same telephone line.

Cable modem.

Cable modem service is a type of high-speed Internet access offered by local cable companies for consumers, using the same coaxial cable used for TV signals..

LAN - Local Area Network

A network based on any physical network technology that is designed to span distance of upto a few thousand meters.

TCP/IP.

The TCP/IP protocol suite is the protocol architecture of the internet.
The TCP/IP suite has four layers.They are Application, Transport, Network, and Datalink layer.
Functions Of Layers Services Functions
Datalink Reliable transfer of frames over link, media access control on a link. Framing, media access control, error checking
Network Move packets from source host to destination host. Routing, addressing
Transport Delivery of data between host Connection establishment, error control, flow control
Application Delivery of email, retrieval of HTML documents, reliable transfer of file Application specific


Operating system
windows xp

Using Backup

The backup utility helps you to create a copy of the information on your hard disk. In the event that the original data on your hard disk is accidentally erased or overwritten, or becomes inaccessible because of a hard disk malfunction, you can use the copy to restore your lost or damaged data.
To start Backup, click start, point to Accessories, point to System Tools, and then click Backup.


Using System Information


System Information collects and displays your system configuration information. Support technicians require specific information about your computer so they can resolve your system problem. You can use System Information to quickly find the data they need.
To open System Information, click start, and then click Run. In the Open box, type msinfo32.exe.

Using Disk Defragmenter

The process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval.
To open Disk Defragmenter, click Start, and then point to All Programs,point to Accessories, point to System Tools, and then click Defragmenter.

Using Device Manager

Device manager provides you with information about how the hardware on your computer is installed and configured, and how the hardware interacts with your computer's program.
With deice manager, you can update, disable, or uninstall the device driver for hardware installed on your computer, modify hardware settings, and troubleshoot problems.
Click Start, and then click Control Panel. Double-click System. On the Hardware tab, click device manager.

Using Disk Cleanup

Disk Cleanup helps free up space on your hard drive. Disk Cleanup searches your drive, and then shows you temporary files, Internet cache files, and unnecessary program files that you can safely delete. You can direct Disk Cleanup to delete some or all of those files.
To open Disk Cleanup, Click Start, and then point to All Programs,point to Accessories, point to System Tools, and then click Disk Cleanup.

Using System Restore

System Restore is a component of Windows XP Professional that you can use to restore your computer to a previous state, if a problem occurs, without losing your personal data files (such as Microsoft Word documents, browsing history, drawings, favorites, or e-mail). System Restore monitors changes to the system and some application files, and it automatically creates easily identified restore points. These restore points allow you to revert the system to a previous time. They are created daily and at the time of significant system events (such as when an application or driver is installed). You can also create and name your own restore points at any time.
To open System Restore, Click Start, and then point to All Programs,point to Accessories, point to System Tools, and then click System Restore.