Showing posts with label article. Show all posts
Showing posts with label article. Show all posts

Thursday, 1 August 2013

How to pick a LOYAL EMPLOYEE ?



Employees are the strength for any company. So where employees are concerned, loyalty has nothing to do with blind obedience, or unthinking devotion, or length of tenure. In this tough situation, selecting an employee who is actually loyal and faithful, is a job which can either be completed in a blink of an eye or it may take years finding such a gem for your company. By keeping in mind the factors mentioned below, you can easily tell whether a particular employee will prove to be a loyal one or not.

1. A loyal employee will treat you like a person.
Loyal employees share their opinions with you even when they know that you may not initially appreciate those opinions. Remarkably loyal employees flip the employer-employee relationship because they know you want to help them in attaining their goals and that you want to provide them what's best for them. So, in return, they prove to be very helpful for your business.

2. A loyal employee will tell you what you least want to hear.
Remarkably loyal employees know that you most need to hear what you least want to hear. Like, they will tell you that your ideas may not work, your point of view is off, you made a mistake but no worries; if they think about you that much, they will definitely help you grow exponentially.

3. A loyal employee will do what she has to do for the betterment.
An employee who consistently seeks to do the right thing is not just following a personal credo but she is also looking out for your long-term interests. You may see her as a disloyal employee today, but eventually you will realize that she has always displayed the highest form of loyalty.

4. A loyal employee has blind trust in you.
Loyal employees trust you because they have been loyal to you. After all, they have put your preferences and interests ahead of their own for a number of times. And now they expect that you will do the same for them.

5. They generate discussions others will not.
Mostly loyal employees hesitate to voice their opinions in a group setting and some even hesitate to voice their opinions in private too; but they have a great feel for the issues and concerns and they ask questions when others won’t.


In fact, everyone loves loyalty.
... and now it is your turn to do the same for them as they have always been by your side through the toughest times.

Always remember:
The employer generally gets the employees he deserves.
J. Paul Getty.

Tuesday, 27 March 2012

Say bye bye to baldness - hopefully :)





















A very bright and hopeful news for all those who are very depressed of being bald at a very young age !


Link
http://www.bbc.co.uk/news/health-17457098

So cheer up and good luck ! :)

Friday, 17 June 2011

polling in 8085 microprocessor

What do you mean by polling in 8085.

When the microprocessor receives an Interrupt Service Request (ISR) on the interrupt line it must determine which of the devices connected to that input sent the request.

Software Polling is one method by which it can do so.

In Software Polling:

A software routine is used to identify the device requesting service. It does so by checking each device to see if it was the one needing service.

Wednesday, 15 June 2011

hardware interrupts in 8085 microprocessor

Explain hardware interrupts in 8085.

• When a device interrupts, it actually wants the MP to give a service which is equivalent to asking the MP to call a subroutine. This subroutine is called ISR (Interrupt Service Routine)
• Interrupts:
• The 8085 microprocessor has 5 interrupts. They are presented below in the order of their priority (from lowest to highest):
• INTR is mask able 8080Acompatible interrupt. When the interrupt occurs the processor fetches from the bus one instruction.
• RST5.5 is a mask able interrupt. When this interrupt is received the processor saves the contents of the PC register into stack and branches to 2Ch (hexadecimal) address.
• RST6.5 is a mask able interrupt. When this interrupt is received the processor saves the contents of the PC register into stack and branches to 34Ch (hexadecimal) address.
• RST7.5 is a mask able interrupt. When this interrupt is received the processor saves the contents of the PC register into stack and branches to 3Ch (hexadecimal) address.
• Trap is a non-maskable interrupt. When this interrupt is received the processor saves the contents of the PC register into stack and branches to 24h (hexadecimal) address.
• All maskable interrupts can be enabled or disabled using EI and DI instructions. RST 5.5, RST6.5 and RST7.5 interrupts can be enabled or disabled individually using SIM instruction.

Monday, 13 June 2011

Memory Mapping Scheme

What is the memory mapping scheme? Give any one advantage and disadvantage.

MEMORY MAPPING SCHEME:

WEB MAPPING:

Web mapping is the process of designing, implementing, generating and delivering maps on the World Wide Web and its product.

ADVANTAGE & DISADVANTAGE:

While web mapping primarily deals with technological issues, web cartography additionally studies theoretic aspects: the use of web maps, the evaluation and optimization of techniques and workflows, the usability of web maps, social aspects, and more.

Web maps can easily deliver up to date information. If maps are generated automatically from databases, they can display information in almost realtime. They don't need to be printed, mastered and distributed.

Reliability issues – the reliability of the internet and web server infrastructure is not yet good enough. Especially if a web map relies on external, distributed data sources, the original author often cannot guarantee the availability of the information.

Tuesday, 22 March 2011

Jump Command

If the program counter is always one count ahead of the memory locations from which the machine code is being fetched, how does the microprocessor change the sequence of program execution with a "Jump" execution?

During a jump instruction, the program counter is loaded with a new address that is not necessarily the address of the next sequential instruction. After a jump, the program execution continues from the new location in memory.

Friday, 18 March 2011

similarities between CALL_RET and PUSH_POP instructions

List out the similarities between CALL_RET and PUSH_POP instructions.

When CALL is executed the microprocessor automatically stores the 16-bit address of the instruction next to CALL on the stack pointer.

The programmer uses the instruction PUSH to save the contents of the register pair on the stack.

RET transfers the contents of the top two locations of the stack to the PC.

POP transfers the contents of the top two locations of the stack to the specified register pair.

Has 8 conditional RETURN instructions.

No conditional POP instructions.