2008/12/22

Windows UI - change to mac style

hide the windows bar and replace with this.



Get it free at http://rocketdock.com/

Beryl - change what u think about Linux UI

Beryl is an OpenGL accelerated desktop that seeks to provide a free, open source desktop experience to the community that reflects the wishes of the users. Above all else, the project seeks to listen to and respond to the requests of the user base...


Windows Vista (Aero) Vs Linux Ubuntu (Beryl) - The funniest videos are a click away

Installing Beryl On A CentOS 5.0 Desktop: http://www.howtoforge.com/beryl_centos5.0

Mount new disk on CentOS

1. Check what is the new hard disk device name with "fdisk -l", it should be something like /dev/sda. You can easily identify which is the new drive by running "mount" and finding the drive that exists in "fdisk -l" but is not mounted.
mount; fdisk -l

2. Create a partition on the new drive, (the sample code below assume the disk is /dev/sdd)
fdisk /dev/sdd

3. Create a filesystem on the new partition, we use ext3 file system.
mkfs.ext3 /dev/sdd

4. Create a directory named whatever you like, this will be where you mount the new disk
mkdir /backup

5. Edit /etc/fstab an add a record for the new drive at the end of the file. This will make the server mount the drive automatically after reboot. Mount options (like noatime and nodiratime) can be added as a comma separated list of values after "defaults": "defaults,noatime,nodiratime"

echo "/dev/sdd /backup ext3 defaults 0 0" >> /etc/fstab

Linux records information about when files were created and last modified as well as when it was last accessed. There is a cost associated with recording the last access time. Linux has a special mount option for file systems called noatime that can be added to each line that addresses one file system in the /etc/fstab file. If a file system has been mounted with this option, reading accesses to the file system will no longer result in an update to the atime information associated with the file. The importance of the noatime setting is that it eliminates the need by the system to make writes to the file system for files which are simply being read. Since writes can be somewhat expensive, this can result in measurable performance gains.

nodiratime does the same thing but for directories. I know the beginners guide says to use both mount options on file systems, but from others I've talked to and places I've read it seems noatime implies nodiratime because noatime is a superset and nodiratime is a subset used specifically to disable it for directories but leave it on for files, and when you use noatime, it does it for everything, files/dirs

echo "/dev/sdd /backup ext3 rw,noatime,nodiratime 0 0" >> /etc/fstab

Mount the drive. "mount -a" just mounts everything according to /etc/fstab.

mount -a

Reboot to make sure it starts ok with the new drive mounted.

2008/12/20

MonoDevelop 1.91 on Cent OS

Last post we installed Mono 2.x run time. Here we will get MonoDevelop install on GNOME, for development environment.

First, here are the related software. You should have most of them when installing the run-time:

yum install glib2-devel pango-devel gtk2-devel glade2-devel libgnome-devel \
gnome-desktop-devel gnome-panel-devel libgnomeprintui22-devel \
gtksourceview-devel ruby ruby-rdoc gtkhtml38-devel wget

Now, we need make the required environment variables while we're building the IDE, as well in its run-time. So let's make it into shellscript called env.sh (or whatever you like it).

echo 'PATH="/opt/mono/bin:$PATH"' /opt/mono/env.sh
echo 'export PKG_CONFIG_PATH=/opt/mono/lib/pkgconfig' >> /opt/mono/env.sh
echo 'export LD_LIBRARY_PATH=/opt/mono/lib' >> /opt/mono/env.sh
echo 'source /opt/mono/env.sh' >> /opt/mono/env.sh

chmod +x /opt/mono/env.sh

Now we are ready to build MonoDevelop from tarball source. The following packages are the minimum software needed - we will build them one-by-one:

gtk-sharp

cd ~/
wget http://ftp.novell.com/pub/mono/sources/gtk-sharp212/gtk-sharp-2.12.5.tar.bz2
tar xjf gtk-sharp-2.12.5.tar.bz2
cd ./gtk-sharp-2.12.5
./configure --prefix=/opt/mono
make;make install

Mono.Addins

wget http://ftp.novell.com/pub/mono/sources/mono-addins/mono-addins-0.3.1.tar.bz2
cd ./mono-addins-0.3.1
./configure --prefix=/opt/mono
make;make install

Monodoc

wget http://ftp.novell.com/pub/mono/sources/monodoc/monodoc-2.0.zip
unzip monodoc-2.0.zip
cd ./monodoc-2.0
./configure --prefix=/opt/mono
make;make install

Mono Tools

wget http://ftp.novell.com/pub/mono/sources/mono-tools/mono-tools-2.0.tar.bz2
tar jfxv mono-tools-2.0.tar.bz2
cd ./mono-tools-2.0
./configure --prefix=/opt/mono
make;make install

MonoDevelop

wget http://ftp.novell.com/pub/mono/sources/monodevelop/monodevelop-1.9.1.tar.bz2
tar jfxv monodevelop-1.9.1.tar.bz2
cd ./monodevelop-1.9.1
./configure --prefix=/opt/mono
make;make install

You should now able to start up MonoDevelop in GNOME, enjoy.

2008/12/17

Mono 2.x on CentOS 5

Mono no longer packages for Red Hat distribution but still provide sources. Here we will grab the source code, and install manually on a Cent OS 5.2 box.

First off, make sure you have all the development tools installed:

Pre-Software requirement

yum groupinstall "Development Tools"
yum install httpd build-essential gcc bzip bison pkgconfig glib-devel \
glib2-devel httpd-devel libpng-devel libX11-devel freetype fontconfig \
pango-devel ruby ruby-rdoc gtkhtml38-devel wget

At this time, Mono 2.0.1 is the latest. You can always check for new build at http://ftp.novell.com/pub/mono/sources-stable/

Getting all the needed Mono software

cd /root
wget http://ftp.novell.com/pub/mono/sources/mono/mono-2.0.1.tar.bz2
wget http://ftp.novell.com/pub/mono/sources/xsp/xsp-2.0.tar.bz2
wget http://ftp.novell.com/pub/mono/sources/mod_mono/mod_mono-2.0.tar.bz2
wget http://ftp.novell.com/pub/mono/sources/libgdiplus/libgdiplus-2.0.tar.bz2

Unlike many other tutorials, we will install using "Java" style - the version # is included:

mkdir /opt/mono-2.0.1

Let's make a desult symlink:,

ln -s /opt/mono-2.0.1 /opt/mono

This is needed when building xsp:

export PKG_CONFIG_PATH=/usr/lib/pkgconfig/:/opt/mono/lib/pkgconfig/:/usr/lib/
Set path (even we don't actually have it yet)

export PATH=/opt/mono/bin:$PATH

Now we are ready to compile:

tar jvfx mono-2.0.1.tar.bz2

cd mono-2.0.1
./configure --prefix=/opt/mono-2.0.1
make; make install

tar jvfx xsp-2.0.tar.bz2
cd ~/xsp-2.0
./configure --prefix=/opt/mono
make; make install

tar jvfx mod_mono-2.0.tar.bz2

cd ~/mod_mono-2.0
./configure --prefix=/opt/mono --with-mono-prefix=/opt/mono --with-apr-config=/usr/lib/httpd/modules
make; make install

tar jvfx libgdiplus-2.0.tar.bz2
cd ~/libgdiplus-2.0
./configure
make; make install

You should now have mod_mono.so in /usr/lib/httpd/modules. Also you should have mod_server in /opt/mono/bin.
You directories should look like those:

Directory contents are as follows:

ls /opt/mono/bin/

al                    mono-api-info
al2                   mono-api-info2
asp-state             monodis
asp-state2            mono-find-provides
caspol                mono-find-requires
cert2spc              monograph
certmgr               monolinker
chktrust              monop
cilc                  monop2
dbsessmgr             mono-service
dbsessmgr2            mono-service2
disco                 mono-shlib-cop
dtd2rng               mono-test-install
dtd2xsd               mono-xmltool
fastcgi-mono-server   mozroots
fastcgi-mono-server2  nunit-console
gacutil               nunit-console2
genxs                 pedump
gmcs                  permview
httpcfg               prj2make
ilasm                 resgen
ilasm2                resgen2
installvst            secutil
jay                   setreg
macpack               sgen
makecert              signcode
mbas                  smcs
mconfig               sn
mcs                   soapsuds
mjs                   sqlsharp
mkbundle              wsdl
mkbundle2             wsdl2
mod-mono-server       xbuild
mod-mono-server2      xsd
mono                  xsp
mono-api-diff         xsp2
ls /opt/mono/lib/
libgdiplus.a             libmono-profiler-aot.so.0
libgdiplus.la            libmono-profiler-aot.so.0.0.0
libgdiplus.so            libmono-profiler-cov.a
libgdiplus.so.0          libmono-profiler-cov.la
libgdiplus.so.0.0.0      libmono-profiler-cov.so
libikvm-native.a         libmono-profiler-cov.so.0
libikvm-native.la        libmono-profiler-cov.so.0.0.0
libikvm-native.so        libmono.so
libmono.a                libmono.so.0
libmono.la               libmono.so.0.0.0
libMonoPosixHelper.a     libMonoSupportW.a
libMonoPosixHelper.la    libMonoSupportW.la
libMonoPosixHelper.so    libMonoSupportW.so
libmono-profiler-aot.a   mono
libmono-profiler-aot.la  pkgconfig
libmono-profiler-aot.so  xsp
ls /usr/lib/httpd/modules/
libphp5.so              mod_file_cache.so
mod_actions.so          mod_filter.so
mod_alias.so            mod_headers.so
mod_asis.so             mod_ident.so
mod_auth_basic.so       mod_imagemap.so
mod_auth_digest.so      mod_include.so
mod_authn_alias.so      mod_info.so
mod_authn_anon.so       mod_ldap.so
mod_authn_dbd.so        mod_log_config.so
mod_authn_dbm.so        mod_log_forensic.so
mod_authn_default.so    mod_logio.so
mod_authn_file.so       mod_mem_cache.so
mod_authnz_ldap.so      mod_mime_magic.so
mod_authz_dbm.so        mod_mime.so
mod_authz_default.so    mod_mono.so
mod_authz_groupfile.so  mod_mono.so.0.0.0
mod_authz_host.so       mod_negotiation.so
mod_authz_owner.so      mod_proxy_ajp.so
mod_authz_user.so       mod_proxy_balancer.so
mod_autoindex.so        mod_proxy_connect.so
mod_cache.so            mod_proxy_ftp.so
mod_cern_meta.so        mod_proxy_http.so
mod_cgid.so             mod_proxy.so
mod_cgi.so              mod_rewrite.so
mod_dav_fs.so           mod_setenvif.so
mod_dav.so              mod_speling.so
mod_dbd.so              mod_status.so
mod_deflate.so          mod_suexec.so
mod_dir.so              mod_unique_id.so
mod_disk_cache.so       mod_userdir.so
mod_dumpio.so           mod_usertrack.so
mod_env.so              mod_version.so
mod_expires.so          mod_vhost_alias.so
mod_ext_filter.so
And the mod_mono config file should be like this:

ls /etc/httpd/conf/mod_mono.conf
vi
/etc/httpd/conf/mod_mono.conf
<ifmodule>
LoadModule mono_module /usr/lib/httpd/modules/mod_mono.so
AddType application/x-asp-net .aspx
AddType application/x-asp-net .asmx
AddType application/x-asp-net .ashx
AddType application/x-asp-net .asax
AddType application/x-asp-net .ascx
AddType application/x-asp-net .soap
AddType application/x-asp-net .rem
AddType application/x-asp-net .axd
AddType application/x-asp-net .cs
AddType application/x-asp-net .config
AddType application/x-asp-net .Config
AddType application/x-asp-net .dll
DirectoryIndex index.aspx
DirectoryIndex Default.aspx
DirectoryIndex default.aspx
</ifmodule>
Let's move it to CentOS style:

mv /etc/httpd/conf/mod_mono.conf /etc/httpd/conf.d/mod_mono.conf

Restart web server

service httpd restart

Make a simple test file named default.aspx:
<%Response.Write("mono on centos - it works");%>

If you see that message at http://localhost/default.aspx, congrad, there you have it!

2008/11/25

矽谷的未來 - 邱鴻安 @世界日報

世上有不少地方都想成為新矽谷─波士頓、西雅圖、奧斯汀、北卡州的「科研三角」、中國的蘇州以及印度的班加羅爾;但是矽谷依然無可替代,依然是科技之都。那麼,矽谷靠的是什麼?是什麼特點使矽谷成為矽谷?

關於矽谷的創立,其中的一種說法,是創於1957年─八名年輕工程師在這一年設立早期的晶片公司「快捷半導體」。1960年代和1970年代的矽谷,半導體公司到處都是,在半導體之前,矽谷到處仍是果園。之後,是電腦軟硬體的公司,接著是網路公司,然後是新形式的網路資訊,例如社交網站 Facebook和播放短片的YouTube。矽谷最新的發展是綠色科技:太陽能電池和金屬板、以及插電式的油電車。從這種發展過程可以看出,科技是矽谷的核心,而持續創新則是它的成功之道。

「創新」雖是眾所周知的說法,但實行起來卻很困難,否則其他地方早就可以追上矽谷。那麼,在持續創新的精神下,矽谷會有些什麼勝過其他地方的特點?

其中一個別處所無的特點是對創業主意的重視,而對創業主意的重視,則可見於矽谷願意就創業主意進行投資,把風險和成本的考慮,視為次要因素。這種敢於冒險投資、不怕失敗的精神,就是矽谷特有的文化。

社交網站Facebook的創辦人馬克‧查克柏格 (Mark Zuckerberg)是哈佛的輟學生,他在想出社交網站的主意後,就像其他夢想創業的東岸人一樣,沒有留在希望成為新矽谷的波士頓發展,卻西來矽谷找機會;果然,他在這裏找到風險投資家彼德‧菲爾 (Peter Thiel),菲爾投資50萬元給他,因此Facebook.com就在2004年成立。2007年10月,微軟出資2億4000萬元購買 Facebook的1.6%股權,這表示Facebook的市值已增至150億元。

對於矽谷特有的冒險創新精神,Google執行長施密特(Eric Schmidt)說得最徹底。去年是矽谷創谷50年,矽谷各大企業的主管紛紛對矽谷的未來發表意見,施密特的說法是:「如果你相信自己的創業主意,那麼財務之事,自會慢慢水到渠成。」

施密特的主張創新,並不只限於科技,還在於管理和經濟,甚至在於政治。他管理Google,讓員工在上班時有20%的「自用時間」,這兩成的自用時間,當然不是用來埋頭幹活的,而是用來進行自訂項目的創新時間。

施密特對清潔能源甚有熱情,他認為美國和全球可以放棄石油,代之以清潔能源 (太陽能、風力發電、電池等),發展清潔能源可創造大量就業機會,並且為美國經濟開出一番新天地。他的其中一個目標是:在20年內,插掣充電式的油電車可占到美國整體汽車的50%。施密特的創新觀念,還用到政治上。他在英國金融時報撰文,指歐巴瑪思想創新,是推行開發清潔能源、開創新時代的理想人選。

總之,創新就是這個世界的一切法則,不獨是矽谷的未來,而且還是經濟、政治賴以成功的要素。

2008/10/21

Top Movies about Computer & Geeks

Pirates of Silicon Valley (1999)
This film is the semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.

Written by Flotis, biographical look at the men who founded Apple and Microsoft and a look at the early days of the companies. Noah Wyle and Joey Slotnick portray Apple founders Steve Job and Steve Wozniak. Anthony Michael Hall and John DiMaggio play Microsoft's Bill Gates and Steve Ballmer. The film attempts to compare the two firm's operations and differences in the founder's operations.

Revolution OS (2001)
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
On June 1, 2001, Microsoft CEO Steve Ballmer said "Linux is a cancer that attaches itself in an intellectual property sense to everything it touches."

Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft's way of life. Shot in cinemascope on 35mm film in Silicon Valley, REVOLUTION OS tracks down the key movers and shakers behind Linux, and finds out how and why Linux became such a potent threat.
REVOLUTION OS features interviews with Linus Torvalds, Richard Stallman, Bruce Perens, Eric Raymond, Brian Behlendorf, Michael Tiemann, Larry Augustin, Frank Hecker, and Rob Malda.

Live Free or Die Hard (2007)
When someone hacks into the computers at the FBI's Cyber Crime Division; the Director decides to round up all the hackers who could have done this. When he's told that because it's the 4th of July most of their agents are not around so they might have trouble getting people to get the hackers. So he instructs them to get local PD'S to take care of it. And one of the cops they ask is John McClane who is tasked with bringing a hacker named Farrell to the FBI. But as soon as he gets there someone starts shooting at them. McClane manages to get them out but they're still being pursued. And it's just when McClane arrives in Washington that the whole system breaks down and chaos ensues.

WarGames (1983)
A young computer whizz kid accidentally connects into a top secret super-computer which has complete control over the U.S. nuclear arsenal. It challenges him to a game between America and Russia, and he innocently starts the countdown to World War 3.

Hackers (1995)
A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.

Sneakers (1992)
Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn't work for the Government after all…

The Italian Job (2003)
The plan was flawless… the job was executed perfectly… the escape was clean. The only threat mastermind thief Charlie Croker never saw coming was a member of his own crew. After pulling off an amazing gold bullion heist from a heavily guarded palazzo in Venice, Italy, Charlie and his gang — inside man Steve, computer genius Lyle, wheelman handsome Rob, explosives expert Left-Ear and veteran safecracker John Bridger - can't believe when one of them turns out to be a double-crosser. Enter Stella, a beautiful nerves-of-steel safecracker, who joins Charlie and his former gang when they follow the backstabber to California, where they plan to re-steal the gold by tapping into Los Angeles' traffic control system, manipulating signals and creating one of the biggest traffic jams in LA history. Now the job isn't the payoff, it's about payback.

The Net (1995)
Angela Bennett is a computer expert. This young and beautiful analyst is never far from a computer and modem. The only activity she has outside of computers is visiting her mother. A friend, whom she's only spoken to over the net and phone, Dale Hessman, sent her a program with a weird glitch for her to de-bug. That night, he left to meet her and was killed in a plane crash. Angela discovers secret information on the disk she has received only hours before she leaves for vacation. Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record. She struggles to find out why this has happened and who has it in for her.

23 (1998)
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.

Takedown (2000)
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that…

TRON (1982)
Computer Classic, one of the first computer generated movies. A hacker is split into molecules and is transported into a computer. In this computer a mean program called Master Control behaves like a dictator. The hacker, who programmed a number of features of the environment he got into, teams up with a book keeping program and his girl-friend and together they try to replace Master Control with Tron. Tron is an honest safety system.

Antitrust (2001)
This movie is the fictional story of computer programming genius Milo Hoffman after graduating from Stanford and getting out into the competitive world of computer software. In his contemplation of where to begin his career, he is contacted by Gary Winston whose character is loosely based on Bill Gates. Winston is the CEO of a company called NURV, and they are on the brink of completing the global communication's system, Synapse. They need Hoffman to help them meet their launch date, so after much thought and with the full support of his girlfriend Alice, he accepts the job. Tragedy soon after strikes and Milo becomes suspicious of the company he has been wrapped up in. He learns that trusting anyone could be a mistake, and that nothing is as it seems.

The Matrix (1999)
Computer hacker Thomas Anderson has lived a relatively ordinary life–in what he thinks is the year 1999–until he is contacted by the enigmatic Morpheus who leads him into the real world. In reality, it is 200 years later, and the world has been laid waste and taken over by advanced artificial intelligence machines. The computers have created a false version of 20th-century life–the "Matrix"–to keep the human slaves satisfied, while the AI machines draw power from the humans. Anderson, pursued constantly by "Agents" (computers who take on human form and infiltrate the Matrix), is hailed as "The One" who will lead the humans to overthrow the machines and reclaim the Earth.

The Matrix Reloaded (2003)
6 months after the events depicted in The Matrix, Neo has proved to be a good omen for the free humans, as more and more humans are being freed from the matrix and brought to Zion, the one and only stronghold of the Resistance. Neo himself has discovered his superpowers including super speed, ability to see the codes of the things inside the matrix and a certain degree of pre-cognition. But a nasty piece of news hits the human resistance: 250,000 machine sentinels are digging to Zion and would reach them in 72 hours. As Zion prepares for the ultimate war, Neo, Morpheus and Trinity are advised by the Oracle to find the Keymaker who would help them reach the Source. Meanwhile Neo's recurrent dreams depicting Trinity's death have got him worried and as if it was not enough, Agent Smith has somehow escaped deletion, has become more powerful than before and has fixed Neo as his next target.

Swordfish (2001)
When the DEA shut down its dummy corporation operation codenamed SWORDFISH in 1986, they had generated $400 million which they let sit around; fifteen years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by the duplicitious and suave Gabriel Shear, wants the money to help finance their raise-the-stakes vengeance war against international terrorism, but it's all locked away behind super-encryption. He brings in convicted hacker Stanley Jobson, who only wants to see his daughter Holly again but can't afford the legal fees, to slice into the government mainframes and get the money.

Enemy of the State (1998)
Robert Clayton Dean is a successful labor lawyer based in Washington DC. He has a beautiful wife and adorable son with a nice house located in Georgetown. But things take a turn for the surreal, when a chance encounter with an old friend leaves him evidence of a politically-motivated murder. On the run from a treacherous NSA official and his men, he comes into contact with a former government operative and surveillance expert, who is his only way out.

The Thirteenth Floor (1999)
Computer scientist Hannon Fuller has discovered something extremely important. He's about to tell the discovery to his colleague, Douglas Hall, but knowing someone is after him, the old man leaves a letter in his computer generated parallel world that's just like the 30's with seemingly real people with real emotions. Fuller is murdered in our real world the same night, and his colleague is suspected. Douglas discovers a bloody shirt in his bathroom and he cannot recall what he was doing the night Fuller was murdered. He logs into the system in order to find the letter, but has to confront the unexpected. The truth is harsher than he could ever imagine…

2008/09/24

有經營過網拍賣場者優先錄用

江亙松 理財周刊提供
2008 / 09 / 24 星期三 16:33
我最近在擔任一位扶輪社社友的行銷執行顧問,替他們公司銷售超氧酵素,雖然產品的品質與效果都不錯,但是畢竟是新包裝的不知名產品,所以在市場上詢問度與指名度並不高。

為了在建立知名度的同時能建立口碑效益,所以我選擇「以時間換取市場空間」的行銷策略,透過雅虎拍賣的方式,將原本一盒20包的產品拆成5包一組的體驗組,以1元結標外加99元運費的方式銷售,並且會進一步針對這些索取體驗組的使用者做採訪,贈送願意做正面評價的被採訪者一整盒價值NT$1,500的超氧酵素。

您覺得這樣的方式很簡單嗎?策略上不難,但如果您沒有自己操作過雅虎拍賣,千萬別以為很簡單,因為有很多結標、付款、對帳、出貨、評價、後續聯絡的問題,考驗著每一個希望利用網路拍賣來做行銷的賣家。

想到這個問題就不禁讓我預見將來,當我要把這個超氧酵素的網拍銷售模式建立起來,總是要移轉給我這位社友的公司繼續經營下去,他們公司目前看起來人力已經很吃緊,幾位業務與行政人員都已經忙得不可開交,所以勢必要請另外一位新員工來負責這個網拍行銷的業務,如果連我這個不怕網路、不怕行銷的管理顧問都必須謹慎小心,才能一個人處理一個產品的網拍,那這位新人一定被期望可以很快的上手接任這些工作。

「請註明您是否會使用網拍」,這個備註事項也許在將來的求才資訊中會經常被強調出來,或者是寫成「有經營過網拍賣場者優先錄用」,如果愈來愈多企業喜歡使用網拍來銷售產品,那我相信這件事情應該會發生。

學生最喜歡問的問題就是「我應該準備什麼才可以在將來求職的時候脫穎而出」,我每次的回答都是「請你用僅剩的在學期間,致力於經營一個每天有一萬次瀏覽人數的部落格」,而且我還會備註說明「如果你的部落格每天有這麼多人瀏覽你還找不到工作,請你畢業之後立刻到我的公司,我一定給你工作」。

剛開始有電腦的時候,懂得安裝電腦的工程師一定有工作,後來到了有網路的時候,懂得寫網站的工程師也不用怕失業,因為就理性的老闆的角度來看,一位國外碩士的薪水不應該比一個網拍評價1000點以上的賣家來得值錢。

行銷智慧:因應時代需求,青年朋友們多學學網拍與部落格經營吧。

2008/09/01

Google發表Android應用程式市集 -

Google Android團隊成員Eric Chu周四(8/28)在部落格中揭露了Android應用程式市集的輪廓,供開發人員將所建置好的Android應用程式上傳供使用者下載。測試版可望在第一批Android手機出爐時問世。此一Android市集與蘋果供iPhone下載應用程式的App Store概念一致。

Chu表示,該市場將採用類似YouTube的評論與意見機制,而且是一個開放的內容供應平台,讓使用者可搜尋、購買、下載並安裝在Android裝置上執行的各種應用程式;Google之所以不採用Store,而是以市集(Market)作為該網站的名稱,是因為認為開發人員應該要有一個開放且沒有障礙的環境來提供他們所創造的應用程式

全文>> http://www.ithome.com.tw/itadm/article.php?c=50661

2008/08/17

台灣50+選擇權

許庭禎:台灣50+選擇權 贏家策略
【2008/08/17 經濟日報 記者宋健生/台中報導】

凱基期貨投資顧問部副總許庭禎凱基證券研究團隊在與本報合辦的「投資特快車」講座上表示,一般散戶操作股票、期貨的困難,在於無法找出獲利成長股,操作期貨又不知適時停損,建議以台灣50搭配選擇權(sell call),可算是負利率時代最佳的投資策略。

凱基指出,這種投資組合的優點,是以時間換取金錢,主要是賺選擇權的時間價值;預期報酬為每月3%至15%,主要風險為開盤漲停、或開高300點以上,不過發生這種情形的機率極少。

台灣50的波動幅度低,選擇權的波動幅度相對大,只要選擇權部位沒有被要求履約,都可順利賺取時間價值。這項交互策略藉由同時擁有多、空部位的優點,克服選股與停損的人性弱點,操作難度低,適合長期操作。

寶來台灣卓越50基金,簡稱為台灣50。凱基期貨投資顧問部副總許庭禎指出,台灣50指數ETF設立時的單位淨值計算方式,是以台灣50指數除以100,假設ETF設立時,台灣50指數為3,689點,3,689點除以100為36.89元,就是台灣50的價格。

台灣50指數ETF另訂買賣價格升降單位,未滿50元為0.01元,50元以上為0.05元。上市當日即可融資融券買賣,且融券賣出沒有平盤下不得放空的限制。

至於選擇權標的,是以隱含波動率的40倍為進場參考履約價,而後每周倍數遞減40、30、20為原則,最低以20倍為限。假設目前隱含波動率為 30%,30X20為600,所以履約價為600點。若以期貨8,300點為例,加上600點,則選擇權履約價應設為8,900點。

許庭禎指出,根據歷史資料顯示,從2003年7月1日至2008年5月31日,以投入金額100萬元為例(台灣50部分為70萬元,選擇權部分為30萬元),五年累積獲利金額176萬7,150元,年平均報酬35萬3,430元,年獲利率35.3%。

許庭禎表示,台灣50與選擇權的操作策略,以二者同時進場為例,在sell call部位接近履約價100點時,sell call就要出場。再往上調整履約價,如果以跳高開直接進入價內時,還是要執行停損,規避風險。

大盤下跌時,則每100-200點調整一次履約部位,以當時隱含波動率及call的價值為準。許庭禎強調,絕對禁止收盤時只留單邊部位,要嚴守進出原則。

2008/07/24

網路標會 good details

http://mag.udn.com/mag/newsstand/storypage.jsp?f_MAIN_ID=253&f_SUB_ID=1312&f_ART_ID=136624

網路標會 穩賺?那可不一定!
‧理財周刊 2008/07/16
標會是民眾理財方式之一,隨著時代與科技進步,現在不但上網就可以跟會,被倒會還有銀行會負責。不過,網路標會一定好嗎?看完本文再作決定。
【撰文/徐介凡】

全球股市表現不佳,不少基金族在這波下跌過程中遭到套牢,27歲在設計公司上班的林文勇(化名)便是其中之一,透過每月定期定額扣款5000元,打算以強迫儲蓄累積一筆出國留學經費,若能賺進更多的投資報酬,便留作購屋頭期款之用,因此,儘管目前持有的幾檔基金少說賠了20%,但這筆資金並不急著用,所以就耐心等著未來景氣好轉、投資轉虧為盈的一天到來。

會腳上網輕鬆找

「之前買的基金現在賠那麼多,如果繼續加碼買進,萬一到最後全部賠光該怎麼辦?」林文勇雖然明白投資要持續的重要,卻無法拿定主意到底該選擇什麼商品;一方面因為目前投資正在賠錢,一朝被蛇咬,始終無法安心的持續扣款投資基金;另外,國內正處通膨嚴重的情況下,6月份更是來到4.9%的高峰,他發現與台灣銀行1年期牌告定存的固定利率2.735%相較,實質存款利率是將近2.2%的負數,若把錢放在銀行會越存越薄。

這時他注意到永豐銀行新推出網路標會的理財工具,而憑自己過去對標會的印象,一般來說都有約10%左右不錯的收益,在投資氣氛不佳的此時,似乎會是一個還不錯的選擇。

倒會銀行做擔保

過去可選擇的投資商品不多,標會結合借款紓困以及儲蓄理財兩項功能,成為當時民眾主要投資工具之一,會腳(參加標會者)多半是熟識的親友或同事所組成,之所以逐漸沒落,主要原因在於,若有任何成員發生倒會的情況,不僅參與所投入的資金會血本無歸,更將造成人際關係的嚴重決裂。另外,理財商品近年來朝向越來越多元化發展,即便買不起股票,也能以門檻較低卻有同樣投資效果的基金進場,因此,林文勇對這個網路標會的新商品,與一般傳統標會到底有什麼差異,感到相當好奇。

永豐銀行信貸部經理高國興表示:「現在民眾上網的習慣非常普遍,而使用網路銀行進行買賣基金的操作,也已廣被使用,因此透過網路結合標會的作法,可望解決過去會腳難尋的問題。」雖然會員來自全國各地,彼此之間更是毫無互信基礎存在,但銀行會依照每人個別的條件,審核是否可成為標會成員之一;此外過程中只要有任何人產生倒會情況,銀行就會負起擔保責任,支付每期應繳會錢至到期為止,排除過去傳統標會最大問題所在。

比傳統標會更有彈性

「有銀行提供投資保障,讓人比較放心參加。」林文勇先上網填寫申請資料成為網路會員,打算了解詳細內容後再決定是否要參加,他發現這個網路標會的工具每期會錢可分作5000元、1萬元、2萬元與3萬元4種,最低底標依會錢大小從300元至800元都有,期數可自由以1、2、3年搭配,比起傳統標會更具彈性。另外,由於銀行承擔倒會風險,因此針對期數不同分別於得標時收取1.5%、2%、2.5%的管理費用。

經過細算之後發現,假設依據平時的儲蓄習慣,跟了個1年期、每期會錢5000元的會,由於底標金額300元為保障之利息收入,換算年利率為6%,即便扣除1.5%管理費,若存滿1年於最後得標時,報酬率至少有3.5%以上,比起定存要好,因此他便決定要參加。

過了3天,銀行客服人員打電話來確認資料,並詢問一些平時的收支情況後,便依照信用條件給了林文勇36萬元額度,以及1組上網登錄使用的標會密碼,而他也進入銀行建立的「標會大廳」平台,瀏覽每個不同會期與金額且正在募集中的標會,並依照每個人參加目的與需求的不同,從中選出1個時間共12期、每期會錢 5000元的會參與,就在所有程序都完成、標會順利進行之後,他才猛然驚覺自己忽略了一些問題。

衡量收支運用標會額度

參加網路標會跟傳統標會相同,競標過程有最低底標限制,若遇到出價相同或無人投標,便由電腦隨機挑選,按照底標金額出價成為當期得標人。

高國興表示,投資人在填寫資金用途時,務必提供正確訊息,讓有意參加的人能夠了解每個人的需求,藉以掌握不同時間,做出最合適的投標規劃。舉例來說,標會是在參加者資金需求越大時,透過付出更高競標成本之下產生越多獲利,如果跟了一個大家都不需要錢的會,便難以擁有更高的利息收入。另外,起會的會頭必定是有資金需求在,但若是其他參加者全部都是為儲蓄而來,能否成為最後1期的最大獲利者,便得靠運氣決定。

銀行所給予的標會額度,高國興說:「會根據一般信貸的標準進行審核後決定,例如從事行業與所得高低、過去信用與消費情形,以及每月收支狀況等。」以林文勇 36萬元額度來看,可以選擇3個12期、每期會錢1萬元的會參加,或者是1個12期、每期會錢3萬元的會,但必須依照自己每月實際能夠支付的會費,以及平時管理帳戶的習慣,選擇合適自己的標會參加,避免發生遲繳而由銀行墊付的情況,額外增加1%的墊付費用支出。

當心存錢變借錢

中國信託商銀個人金融處處長隋榮欣進一步指出:「標會這種投資方式之所以會逐漸沒落,期數過半以後才開始獲利是相當重要的因素。」如果把錢放在銀行定存,只要時間超過1個月以上,提前贖回雖然利息會被打折,但仍有利息收入存在,就算是被套牢的基金,認賠賣出也還能將剩餘資金贖回;標會卻不一樣,結合借貸與存款兩方面之下,若是提早把錢標到手拿回來,不但本來想賺的利息收入沒了,還有可能反過頭來變成借貸成本,增加支出。

以林文勇所跟的會而言,隋榮欣說:「若他在最理想的狀況下,於最後1期順利得標,投資報酬率約為3.5%,根據現在的投資商品來看,換成保守型投資的債券型基金,或是固定收益的外幣定存,多半都能達到這個數字;重點在於如果提前得標的話,那麼投資收益可能便不如其他選擇來得好。」

如果林文勇真的在第1期就得標,高國興表示,永豐銀行將有專業的理財人員,提供理財諮詢服務與建議,讓他能透過投資合適的理財商品,把必須支付的利息給賺回來,並且進一步創造獲利。也就是說,首先要考量該如何把這筆錢用來產生7.5%的報酬率,才能達到損益兩平的投資效果。

考量損益 三思而後行

隋榮欣認為:「若以對應的工具來看,雖然投資股票型基金可能最有機會,但是投資報酬與風險往往等價,同樣有賠7.5%的可能存在。」在目前全球股市表現不佳的情況下,想找一個年報酬率能夠達到7.5%的投資工具已非易事,即便是不保本的連動債,或是單一國家型基金,現在都很難達到這個數字,萬一不幸發生 7.5%的投資虧損,投資損失合計其實是15%,因此進場操作前,多在各種投資工具間進行比較,才是較為恰當的作法。

利息收入要繳稅

當標會順利開始進行之後,不論是已經把錢標到手的死會,還是仍在等待賺取利息的活會,高國興說:「參加者都不能在中途退出,必須等到會期結束以後才會終止。」顯示出相較於一般的小額信貸,即便利息支出相較10~12%要來得低,但在無法提前償還之下,資金運用的靈活度卻較為不足,若運用標會額度跟越多的會,必須花在管理上的時間也會越多。高國興並指出,參加網路標會的利息收入,並非由銀行支付給民眾,因此,不在27萬的免稅額度之內,所有的投資利得都必須要繳稅。

參加標會必須支付的管理費,當中並無議價空間,隋榮欣表示,如果民眾申購基金、連動債等商品,只要平時與銀行往來貢獻度夠高,都可以憑著這些條件向銀行爭取手續費優惠的折扣,相對提高投資報酬率,或是酌降借貸利率,降低支出,這些都是民眾必須要一併考量的關鍵因素。

聯徵中心同步紀錄

審核民眾能否參與網路標會,以及能夠擁有多少額度,高國興表示,銀行跟聯徵中心所調閱的資料,檢查有無信用不良,或是曾經還款情形不佳的紀錄,是影響評估過程相當大的一環。由於發生倒會時,銀行必須承擔投資人的損失,並負起追討債務的責任,當中其實隱含著借貸條件,所以在整個標會進行過程,聯徵中心都會留有完整紀錄。

高國興進一步說:「換個角度思考,透過網路標會,若一切都很順利,不僅會在聯徵中心留下良好紀錄,提供往後向其他銀行爭取更佳條件的利基,也可提高與銀行往來的貢獻度,日後若有其他商品需求,可擁有更多優惠折扣。」

2008/05/06

trac-10.4 繁體中文版

trac-10.4-zh_TW Traditional Chinese translation
trac-10.4 繁體中文版

Modified from ZoomQuiet version, this version provides translation for Traditional Chinese.

To download: http://trac-hacks.org/wiki/TraditionalChineseTranslation

2008/05/04

Setup Subversion and Trac on CentOS 5

Recently I set up a virtual server to use as a development machine. It runs on CentOS 5 and hosts several Subversion repositories with associated Trac projects.
There are many guides and plenty of help on the net to help you setup such a system. The easiest way is to YUM it.
yum --enablerepo=rpmforge trac

But that's not it, you need to do the following post-installs.

Initialize a Trac project for your new repository

trac-admin /var/trac/project_name initenv

From there you will enter the trac-admin commands. Use the defaults if not sure.
File permissions

chown -R apache.apache /srv/svn/project_name
chown -R apache.apache /var/trac/project_name

If you don't like the location, edit the /etc/httpd/conf.d/trac.conf.
Subversion

vim /etc/httpd/conf.d/subversion.conf


Add the following directive:

<Location /svn>
DAV svn
SVNParentPath /srv/svn
AuthType Basic
AuthName "My SVN Repository"
AuthzSVNAccessFile /srv/svn/svn-acl-conf
AuthUserFile /srv/svn/.htpasswd
Require valid-user
</Location>

Add a repository user
touch /srv/svn/.htpasswd
htpasswd -m /srv/svn/.htpasswd username


Create the Access Control List for the SVN Repository

vim /srv/svn/svn-acl-conf
Add the following directives:

[project_name:/]
username =  rw
Where username represents the username of the repository user you created earlier.
Trac Config
vi /etc/httpd/conf.d/trac.conf

Edit this line:
AuthUserFile /srv/svn/.htpasswd

Give admin permissions to the Trac user you just created:
trac-admin /srv/trac/project_name permission add username TRAC_ADMIN
Where username represents the trac user you just added in htpasswd.
Restart Apache
service httpd restart
You should now have http://server/svn/ and the Trac system at http://server/trac/ associated with the repository.
What's Next?
check out http://trac-hacks.org

Resources

2008/04/28

Samba Setup on CentOS 5

I have an existing user "amy" on my new installation of CentOS v5.1. I want a directory located at "/home/fileServer" to be shared through samba as "fileServer", that can be mounted by amy in Windows XP and Vista.

Here's the steps:

1. Installed samba server
yum install samba

2. Created directory to be shared
# mkdir /home/fileServer
# chown root:root /home/fileServer
# chmod 770 /home/fileServer

3. Edit samba configuration file
# cd /etc/samba
# mv smb.conf smb.conf.sample
# vi smb.conf
[global]
workgroup = MYWORKGROUP

[fileServer]
comment = file server
path = /home/fileServer
writable = yes
create mask = 0770
directory mask = 0770

4. Edit samba user accounts
# smbpasswd -a root
# smbpasswd -a amy

5. Update smbusers file
# vi smbusers
root = administrator admin
amy = amy

6. Started smb daemon
# service smb restart

7. Test
In Windows XP, typed \\, and entered amy as user with the password. You should see the share defined in smb.conf.

2008/04/19

Tuning the Linux kernel for better network throughput

If your linux server needs to have better network throughput, try this out.
From /etc/sysctl.conf:
net.ipv4.tcp_window_scaling = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_rmem = 4096 87380 16777216
net.ipv4.tcp_wmem = 4096 65536 16777216
net.core.rmem_max = 16777216
net.core.wmem_max = 16777216
The first command enables TCP window scaling, which allows clients to download data at a higher rate by enabling extra bits in TCP packets that are used to increase the window size.
The second command enables TCP SYN cookies, which is often enabled by default and is extremely effective in preventing conditions such as SYN floods that can drain the server of resources used to process incoming connections.
The last four options increase the TCP send and receive buffers, which allow an application to move its data out faster so as to serve other requests. This also improves the client's ability to send data to the server when it gets busy.
To make the change immediately:
sysctl -p /etc/sysctl.conf
To see all of the currently configured sysctl parameters:
sysctl -a
You can also use sysctl to make the change:
sysctl -w net.ipv4.tcp_window_scaling=1
This can be useful for testing the effectiveness of certain settings without committing them to being defaults.

4GB RAM on Vista

All 32-bit Operating Systems can only physically address 4 GB of RAM, due to the math involved (232 = 4,294,967,296). Depending on your hardware, Vista may only see 3GB or 3.5GB of the total RAM installed, because there are some devices that are memory mapped. The most common hardware of this type of device is a video card, which can use up to 512MB of memory for mapping.

You can tweak Vista's core to add another 4-bits of addressing capability, but you must have a 64-bit capable CPU (pretty much any processor made within the past two years like Core 2 Duo or Athlon 64). Even though the math works out to address way more than 4GB (236 = 68,719,476,736), the operating system still has a cap (Windows Server can address anywhere from 8GB to 128GB depending on the flavor).

To force this new addressing method, you have to tell Vista to boot using this new parameter. Vista no longer uses a BOOT.INI file as previous versions of Windows did, so you must modify the boot file using a built-in Vista tool called BCDedit.

To turn on PAE, in Command prompt, type BCDedit /set PAE forceenable.

This PAE flag (Physical Address Extension) tells the Vista core to use an additional 4 bits of addressing, which in theory allows the OS to see all of the RAM you have available. We're not out of the woods yet, because once you reboot you may find that Vista still doesn't see all of your RAM.

Using PAE might make Vista to run slower. Vista runs slower with PAE because of the new page-translation system being used. By default Vista uses 2 cycles to address memory, and will use 3 when Physicall Address Extension is enabled. PAE also supports advanced procesor features such as Data Execution Prevention (no execute), Non-Uniform Memory Architecture (NUMA), and hot-add memory. PAE is automatically disabled when DEP (Data Execution Prevention) is disabled, so you must force PAE when DEP is disabled by running BCDedit:

To disable DEP: BCDedit /set nx AlwaysOff

PAE force on: BCDedit /set pae ForceEnable

You can turn PAE off again by typing BCDedit /set PAE forcedisable or BCDedit /set PAE default.


2008/04/17

Inspectd:用真實股市資料做的股票交易遊戲

Find this from Read for Joy's blog - Inspectd:用真實股市資料做的股票交易遊戲

在《蘋果橘子經濟學》(Freakonomics,簡體版:魔鬼經濟學)一書作者Steven D. Levitt、Stephen J.Dubner的部落格Place Your Stock Bets Here看到了Inspectd網站的簡介——與股市有關,又容易讓人欲罷不能的遊戲。(不知道這網站會不會成為技術分析信徒的修煉處或試劍石?)

根據Inspectd網站的介紹,所有的股價走勢圖都是真實的股票歷史資料,然後就像玩大富翁一樣,一開始提供一個(Account Value)十萬美金的帳戶讓你玩,如果想重新從十萬美金開始,按下reset就清除所有交易紀錄....

Learn from play is cool idea. Check it out yourself - Inspectd.com

2008/04/04

I love M5, the one and only E39

Sooner or later I will get this one back. In the mean time, check this out:



Also check out the BMW film, Star in our test channel

2008/03/28

Touch Curise 必裝PPC

其他如Tytn II 也可以裝。請自行Google 檔名就下的到了

PHM Registry Editor
必裝

Cruise_Photo Quality.CAB
fix 照相機的bugs

SoftKeyAppletEx.cpl
直接拷到Windows目錄,然後在系統設定就可以看到
這個是用來設定下方menu的2個快捷鍵

iContact.exe
touch style 的通訊錄,隨便看你要拷到哪裡都行。拷完後用SoftKey Applet設成快捷鍵
裝完後通訊錄就可以touch囉

SPB Mobile Shell
比HTC HOME還棒

SSH
3G來remote 主機,讓你上山下海也可以work。比較適用有keyboard的PDC 如TytnII

QMenu
Windows Style menu

ClearTemp.CAB
三不五時清一下,保持PDA苗條建康

Skype

2008/03/20

VBScript & Outlook

If you get VBScript.DLL error when open up Outlook (v2000, 2003, up to 2007), here's how to fix it:

1. Start menu -> Office -> Language Tool
2. Change the language to match with your OS. For example, English->EN; Chinese->TW

That's it. Restart outlook and all should be fine.

2008/02/01

高薪的秘密

他們都是中高階經理人,他們的年薪至少百萬、年齡卻不超過40歲,他們為什麼可以成功?

30雜誌》針對56位成功經理人進行調查,在他們身上,我們找到四組關鍵密碼。

王品集團董事長戴勝益喜歡閱讀,閱讀是他的享受,也是蒐集情報與知識最重要的來源。他有一個工作習慣,每年都會請助理幫他買十二個資料夾,分別標上月份,閱讀時,隨手撕下的好文章,以及該月重要的資料,就夾在當月資料夾中,這個工作習慣累積多年後,當他想要找一份記憶中的資訊時,只要翻一翻這些排列有序的資料夾,不僅省下東翻西找的時間,辦公桌也永遠乾淨。

美商美林證券台灣區研究部主管程淑芬喜歡思考與研究,思考與研究為她帶來策略,這些投資策略,動輒影響客戶上千億資產的布局。身為專業分析師,她必須每天過濾、分析來自全球各地的財經訊息,有些訊息看似重要,實際意義卻不大;有些表面毫無關聯,卻影響深遠,只有透過縝密的思考,才能抽絲剝繭,為客戶預先掌握市場金融走向。

台灣Google業務總經理張成秀非常善用時間,即使是從辦公室走到洗手間這短短時間裡,她都可以完成六件事情;她甚至會在半夜打電話到辦公室留言給自己,提醒明日要做的重要事情。

成功不是偶然,坐領高薪,是因為他們能幫老闆賺進更多錢,但是上天很公平,每個人一天都只有二十四小時,面對繁忙公事,日立環球儲存科技台灣及上海區總經理劉士維,卻能每天準時6點下班,業績在去年還是拿到電腦硬碟市場第一名,遠高於同業。

四組密碼,成就百萬年薪經理人

每位經理人一定有特殊的工作方法與習慣,協助他們攀上成功的天梯,這是他們累積經驗與知識的成果展現,如果能夠提前學會這些智慧,在職場上,就能少走冤枉路,即使面對不景氣,也能逆境勝出。

《30雜誌》這一期特別針對五十六位,來自各行各業的青壯年經理人,針對他們的獨特工作方法與日常作息進行「30世代成功經理人」調查,試圖為讀者解碼他們的成功基因。這些經理人年齡介於25歲到40歲之間,從事行業以科技業與金融業比例最高,各為37%與23%,這些受訪者,來自世界頂尖的金融集團、全球第一流的製造業、世界知名的管理顧問業,以及台灣最優秀的餐飲服務業等。

透過深度訪查,我們發現經理人的四組成功密碼:

成功密碼1. 勤閱讀 知識使你更有力量

95%的受訪者有固定閱讀的習慣,同時,在極度繁忙的工作之中,仍有超過八成受訪者每個月至少讀兩本書,每天讀書超過一小時的人,高達六成。

資深出版人,同時也被譽為台灣本土趨勢大師的詹宏志,每日晚上12點入睡,清晨4點起床看書,這個習慣維持二十年,對他來說,晚上閱讀是「漸入困境」,早上閱讀卻有「漸入佳境」的感受。

詹宏志喜歡晨讀,華人首富李嘉誠六十年來不斷的習慣,卻是睡前閱讀。李嘉誠相信,知識能改變命運,因為他自己就是靠著從早年就培養的閱讀習慣,從閱讀中獲得知識的力量,進而超越競爭對手。

在美商賀寶芙從事直銷十年,共同收入逾千萬的夫妻檔曾竹君與徐顗竣,也都異口同聲說,閱讀是最好的工作導師。「你不一定能學到成功人士的能力,但你會學到他們工作與處世的態度。」徐顗竣說。

雖然詹宏志認為晨讀可以「漸入佳境」,但調查發現,這些30世代經理人主要閱讀時間,仍是下班後與例假日。而且其中逾60%的人,對於閱讀具有明確而具體的目的,以「領導管理」、「行銷趨勢」與「經濟理財」為他們最常閱讀的三大類別。

值得注意的是,文學類與史哲類書籍也得到25%以上經理人青睞。向古人學習,在21世紀逐漸成為新顯學。除了近年在中國掀起的古書熱,《于丹〈論語〉心得》、易中天的《品三國》等,日本首富──軟體銀行總裁孫正義,也是中國史哲書籍的愛好者,他建議經商者必讀的《論語》、《孫子兵法》,甚至《菜根譚》、《韓非子》等書籍,也在日本商界走紅。

此外,根據日本《President》去年8月針對年薪450萬元新台幣以上的經理人閱讀調查發現,經理人認為可以提升自我價值的前三類書籍(複選三類,共十六類),排名依序是「溝通」、「思想哲學」、「歷史」等,均獲得三成以上的票選,行銷、金融、領導等專業技能書籍,反而排名在後

成功經理人對於閱讀重要性的壓倒性支持,與本次調查的另一項結果恰可呼應,調查發現,高達55%的受訪者認為,對學習最有幫助的是「自修」,這項比率,幾乎是「短期海外進修」、「再讀一個學位」這兩個選項的兩倍半。

反觀在收看電視的調查上,成功經理人平均每日花在看電視的時間較少,並且有七成的受訪者,看電視的主要目的是「放鬆」。

成功密碼2. 深思考 思辨幫助你精準判斷

30世代經理人,大多以中階主管為主,每天必須面對的例行事務相當多,但是根據調查發現,他們認為「動腦想」跟「動手做」一樣重要,動腦想才能「做對的事」,而不只是「把事情做對」。近七成的經理人,每日會特別安排時間思考,而且思考所花費的時間至少在十五分鐘以上。為什麼他們要特別安排時間思考?深度思考為什麼很重要?

政治大學科技管理研究所副教授蕭瑞麟認為,深度思考有助於企業人士培養敏銳的判斷力,對於任何問題或現象,如果都視之為理所當然、照單全收,結果就只能得到常識,而無法萃取與形成有價值的知識。

蕭瑞麟建議,釐清思維可以透過正反合的辯證方式,例如「蘇格拉底」式的辨證法,透過辯證,思路會愈辯愈明愈深入。他指導碩士班學生,正反合至少要做三到四次,但博士班學生至少要十次,才能做到真正的深思考。蕭瑞麟更進一步強調,深思考要與閱讀相結合,才能發揮更大的效用,才不會淪入空想、亂想,「如果你沒有理論,你的思考只是漫無目的,沒有一個著力點。」

成功密碼3 秀活力 積極態度是突圍關鍵

升官、加薪靠什麼?優秀的專業技能、良好的人際關係,這兩項都重要,但在成功經理人心中,卻不是最重要。根據這次調查,高達91%受訪者勾選「積極的工作態度」這個選項,認為對升遷、加薪最有幫助,這不僅用在他們自己的經驗,也是他們判斷下屬發展潛力的重要依據。

程淑芬從小研究員做到今天全球知名券商的台灣區高級主管,她沒有含著金湯匙出生,沒有豐沛的人脈,從擔任最基層的研究員開始,一天工作至少十五個小時。努力call公司、讀資料,她謙虛說,今天的成就沒有特別祕訣,就是永遠做得比別人要求的更多,「努力,努力,再努力,我要求自己比別人再多點努力,這就是我的態度。」程淑芬說。

想要激發積極的工作態度,必須先找到對工作的熱情,國內著名影音後製公司視元素副總經理萬曉娟形容,她看待工作,就像談戀愛,因此不會喊苦。這次調查也發現,成功經理人每天工作超過九小時以上的比例,高達96%,長時間埋首在成堆的工作之中,如果沒有足夠的熱情與積極的態度,必定無法持久。

萬曉娟說,當她在考慮拔擢人才時,最重視的就是員工對自己的工作是不是抱持積極主動的態度、對工作內容有沒有興趣,如果只是抱持交差了事,對所謂有興趣的工作只有三分鐘熱度,她也不會考慮拔擢。

成功密碼4. 練外語 學生時期的優先要務

調查顯示,大多數成功經理人,剛進職場與擔任主管後,最認真進修,這段期間的進修,以工作相關的專業技能最為重要,但在全球化的遊牧工作時代,第一外國語,甚至第二外國語,極其重要,等進入職場才加強,可能為時已晚,因此有62%的經理人建議,學生時代,最應該補強的就是語言能力。

開平餐飲學校的傑出校友劉一帆,今天之所以能夠站上國際舞台,成為國際知名飯店連鎖集團爭相邀請的西式料理大廚,憑藉的不僅是料理功夫,更重要的是,他在學生時代就靠自修的方式培養英文能力。當他在西華飯店工作時,正因為他能用熟練的英文與來自英國著名飯店的工作人員攀談,進而獲得對方賞識,進入百年飯店服務。

在調查中也可以發現,30世代經理人與過去認知的經理人有部分不同之處,其中最大的差異有兩項,第一項為大量使用科技工具,第二項是以「友情激勵」取代「嚴格管教」

在科技工具的運用上,網路已是普遍化的工作與管理工具,調查發現,沒有經理人不使用網路,使用網路除了處理工作外,「使用電子郵件」、「看新聞」與「增加專業知識」是最重要的三種用途。

在管理風格上,過去師徒制講究的「嚴格管教」已改以「友情激勵」與「殷切指導」的風格居多。

時代在變,但成功者的特質,有所「變」卻也有所「不變」。工具、溝通方法或許變了,但閱讀、思考、積極態度,在這個變動的時代,卻依然歷久彌新。

2008/01/27

昇陽收購開源資料庫廠商MySQL

昇陽日前宣布以10億美元收購開放原始碼資料庫廠商MySQL,其中除了8億美元現金收購MySQL的未上市股票之外,還有2億美元的選擇權必須自行吸收。相較於過去幾年,昇陽在軟體市場表現低調,如今斥資收購開放原始碼廠商MySQL的策略引人注目。昇陽表示,收購MySQL並不會影響昇陽對於另一套開放原始碼資料庫PostgreSQL所提供的技術服務,未來昇陽將會持續支援PostgreSQL.

http://www.sun.com/aboutsun/pr/2008-01/sunflash.20080116.1.xml

Mercury簡易改裝

有同好有一樣的困擾 - 如何使用自己的data logging軟體,因此寫了這篇來分享我的簡易改裝。 Background 雲豆子 MERCURY roaster 烘豆機的設計是使用自行開發的軟體,來:1. 操控風門/火力; 2. data logging/自動烘焙。 ...