All posts by Navin Kabra

Enrich your website (with content & money) – An interview with Hover.in

hover_logoHover.in is a Pune startup that provides a service for web publishers (i.e. website/blog owners) to automatically insert extra content into the webpages, in the form of a bubble that appears when the mouse is hovered over underlined words. The bubble can be informational (like a map appearing wherever a name of a place appears, or a background information about a company appearing wherever a name of a company appears), or it can be contextual, in-text, advertisement from hover’s network of partners, and most importantly it is fully under the publisher’s control. While services like this have been around in other forms, hover.in believes that its ability to handle any language, and the focus on Indian market sets it apart from the competition. See the PuneTech profile of hover.in to get a better idea of what hover.in provides.

Hover.in was one of the startups chosen to be showcased at proto.in’s Jan ’08 edition. Earlier this, week, they announced that they have received seed funding from Media2Win, and will soon be seen in action on some large Indian portals.

PuneTech interviewed Arun Prabhudesai, CEO of Hover.in, (he also runs popular Indian Business blog trak.in) to get a deeper look at hover.in. To be true to the “tech” part of PuneTech, we also asked some technical questions that were answered by Bhasker V. Kode (Bosky), CTO of Hover.

Q: Congratulations on getting funded – especially under these economic conditions. How do you plan on using this funding – what will be the focus areas?

The seed funding was finalized few months back before the whole “recession” thing started constantly ringing in our ears.

Actually, from hover.in perspective we feel this funding as more of strategic investment where Media2Win – being a leading digital media agency – will help us to go to the market. We have immensely benefitted from the experience Me2W brings on table.

The funding is being mostly used to ramp up our technical resources and infrastructure.

Q: Your main “customers” are website publishers. Are you targeting any specific geography, like India (as the .in domain name would suggest)?

Hover.in in-text platform is global and open for web publishers and bloggers from all geographies. However, we are actively targeting Indian market first. India currently does not have any in-text platform and that’s puts us in a great position to capture this market. Infact, hover.in is world’s first in-text platform that is also language agnostic, which opens up a large chunk of regional language websites.

Q: I keep hearing that “there isn’t enough money to be made from online advertisements alone in India, except for a few specific verticals.” And you seem to be going squarely after this market. What is your take on this issue?

You know, this people have started talking about because there are too many ad networks that have come up in last couple of years…more than 15 odd I can count on my fingers !

But if you look at the larger picture, online advertisements are the only ones that are growing year on year. Traditional advertising is hardest hit…

For us the advantage is, we DO NOT compete with traditional ad networks as they are 99% display advertising. We are in-text and this market has not even tapped. From publisher perspective, it is an additional channel for content and monetization.

From Advertisers, this is the most targeted way of displaying their advertisement. Also, as we follow CPA / CPC kind of model, advertisers have full ROI on investment.

Co-founders of Hover.in - Bhasker V. Kode, CTO (left) and Arun Prabhudesai, CEO
Co-founders of Hover.in - Bhasker V. Kode, CTO (left) and Arun Prabhudesai, CEO

Q: If I remember right, you are using Erlang for your development – a very non-standard choice. Can you share the reasons behind the choice? Isn’t it difficult to get Erlang developers? In retrospect are you happy with this decision?

(by Bosky)

Erlang has been used to build fault-tolerant and distributed applications for quite some time in areas like telecom, especially for allowing highly granular choices in networking. Off-late projects like ejabberd, mnesia, yaws and tsung have shown how products spanning several hundred nodes can be implemented with the erlang stack and in particular – web technologies.

It most definitely is a paradigm shift courtesy of it’s functional programming concepts, and we are glad we took that decision because of its inherent focus on distributed systems, and although the erlang developer community in India is non-existent, with the right attitude towards learning now a day’s it does’nt matter. Moreover it only took a couple of months for our developers to get used to the semantics, following which as with any stack – it’s about what you do with that expertise.

Erlang gives you that power, but at the same time – there are areas where it might not seem a right fit and perhaps look to perl or ruby for tasks that suit them. For example, we use python wherever it seems required as well. The good part is erlang open-source community has quite a closely-knit presence online, which does help quite a lot. We ourselves are now looking at contributing and opening up internal projects.

Q: One of the important challenges for hover.in will be scalability. How are you gearing up to handle that?

(By Bosky)

Right from day one, erlang based systems like ours are designed built for horizontal scaling – which allows plug-n-play addition to our growing cluster. Regardless of the development stack you work on – some things need to be built in early and that’s something we spend a whole lot of time during our first year fine tuning.

Especially for us – where practically every page hit – for every one of our users – reflects a page visit to us where we need to compute and render hovers in a matter of milliseconds. To this end – before starting out application-logic, we first built out our own distributed priority-queuing systems, our own distributed crawler and various indexing mechanisms, a time-splicing based cpu allocation for various tasks, which made things like adding jobs, executing them a more controlled operation regardless of what the actual job is and has been handling burst mode quite well.

Moreover, we can also add workers on-the-fly to almost all major tasks much like an Amazon ec2 instance where each work itself is supervised for crash recovery thanks to erlang’s open telecom platform libraries and guidelines. Caching is something else we have and continue to work on consistently. No matter how many papers, algorithms or implementations there are out there – every system needs to fine tune their own unique set of optimizations vs compromises that reflect their infrastructure, traffic, memory & space needs,etc ..

Having granular control of this is something that is a real challenge as well as a pleasure with the stack (Linux, Yaws, Mnesia, Erlang). We ‘ve also been quick to adopt cloud-computing initiatives like Amazon s3, and more recently cloudfront for our static content delivery needs.

We’re also working on a parallel map-reduce implementation, exploring options with xmpp, and better logging for our developers to find and fix glitches or bottlenecks, eventually translating to a faster and better user experience for our users.

Q: You moved to Pune specifically to start hover.in. What made you choose Pune?

Yes, I did move to Pune to start hover.in, however, it would not be fair to say that is the only reason why I moved here. I have lived most of my formative years here in Pune, before going to USA. And as you know, once a Puneite, always a Puneite!

Actually we had to choose from 2 cities – Chennai (Our Co-founder, Bhasker VK, is from Chennai) and Pune. Few important aspects tilted the balance in favour of latter. Better weather, Pune’s proximity to Mumbai where majority of big publishers, investors and advertisers have their offices. To add to it all Pune has great startup & tech community.

Q: In the journey so far, have you made any significant mistakes that you’d like to share with others, so they can learn from your experience?

Absolutely… Mistakes are important aspect of learning process and especially for first generation entrepreneurs like Bosky and Me. I think “attention to detail” is one of the most important aspects that an entrepreneur should watch for. You need to have clear in-depth blueprint in your mind about the direction your startup is going to take, otherwise it’s very easy to fall off the cliff!

Optimizing, especially during these tough times – be it resources, infrastructure or even your time. Optimize everything. Startups can’t afford any leaks.

The third thing and the one which I don’t see very often. Partner with other startups; see if there are any synergies between you. In most cases it is a win-win situation for both of them

Q: Are you partnering with other startups? At this stage, would it be possible for you to share info about any of these partnerships?

Yes, we are…one example would be Alabot (another Pune startup -ed.). Where we have got their NLP application (Travel bot) inside our hoverlet. So for any travel related publishers, it becomes a boon. So a win-win situation for both of us.

Another example would be – Before we got our own office, 2 other startups were kind enough to accommodate us for few weeks – These kind of partnerships in any way possible go a long way !

Q: What would your advice for struggling Pune entrepreneurs be?

Entrepreneurship is a roller coaster ride … It ain’t easy, but the thrills along the way make it all more than worth it!

Just jump into the rough waters and by the time you reach the other side, you will be glad you did it….

Reblog this post [with Zemanta]

Lecture and Demo of SAGE Mathematical Software – 23 Jan

A three-dimentional wireframe plot of the unno...
Image via Wikipedia

What: A lecture and demonstration of SAGE mathematical software by Dr. K.K. Surendran
When
: Friday, 23 Jan, 4:30pm
Where: Bhaskaracharya Pratishthana, 56/14, Erandavane, Damle Path, Off Law College Road, Pune
Fees and Registration: This event is free for all. No registration required

Details:
SAGE combines various open source mathematics software packages and seamlessly integrates their functionality into a common experience. Its aim is to create a Free Open Source equivalent to Magma, Mathematica, Maple and Matlab.

Sage can be used to study general and advanced, pure and applied mathematics. This includes a huge range of mathematics, including algebra, calculus, elementary to very
advanced number theory, cryptography, numerical computation, commutative algebra, group theory, combinatorics, graph theory, exact linear algebra and much more.

Sage was picked as the Hot Spot of the month in November 2008 by mathforum.org

The demo attempts to give a overview of SAGE with the aim of introducing mathematics students and teachers to appreciate the relevance of this wonderful open source software in contemporary mathematics education and research.

Reblog this post [with Zemanta]

The Great Debate: PostgreSQL vs. MySQL – with Jim Mlodgenski, 23 Jan

PostgreSQL
Image via Wikipedia

This information sent in by @nikkhils of EnterpriseDB. Thanks!

What: “The Great Debate: PostgreSQL vs. MySQL” with Jim Mlodgenski, Senior Database Architect, EnterpriseDB
When: Friday, 23 Jan, 6pm
Where: Dewang Mehta Auditorium, Persistent, S.B. Road
Registration and Fees: This event is free for all to attend, thanks to Persistent Systems

Details:
For years, the common industry perception has been that MySQL is faster and easier to use than PostgreSQL. PostgreSQL is perceived as more powerful, more focused on data integrity, and stricter at complying with SQL specifications, but correspondingly slower and more complicated to use.

Like many perceptions formed in the past, these things aren’t as true with the current generation of releases as they used to be. DBAs, developers, and IT managers and decision-makers will benefit from this hour-long presentation about the pros and cons of using PostgreSQL or MySQL, which will include a discussion about the ongoing trend towards using open source in the enterprise.

About the Speaker – Jim Mlodgenski

Jim is one of EnterpriseDB’s first employees and joined the company in May, 2005. As Senior Database Architect he has been responsible for EnterpriseDB’s technical pre-sales, professional services, providing customized solutions and training.

Prior to joining EnterpriseDB, Jim was a partner and architect at Fusion Technologies, a technology services company founded by EnterpriseDB’s chief architect, Denis Lussier. For nearly a decade, Jim developed early designs and concepts for Fusion’s consulting projects and specialized in Oracle application development, Web development, and open source.

Jim received a BS degree in Physics from Rensselaer Polytechnic Institute.

Jim has spoken at many international open-source conferences and is the author of many white papers on RDBMS

Reblog this post [with Zemanta]

Enjoy Free beer and geeky conversation at WATBlog Wednesday Pune – 21 Jan

What: WATBlog Wednesday Pune – a “mixer” for Pune techies to enjoy each others’ company amidst free beer and snacks
When: Wednesday, 21st Jan, 7pm onwards
Where: Gaia Lounge, Garden of Eden, Sector 20 A, Near Kharadi Mundhwa Bridge, Kharadi, Chandan Nagar
Registration and Fees: This event is free for all, but entries are limited, so you must register here.

Why you should attend

We’ve had far too many tech events in Pune where all stand around seriously and exchange business cards. Meeting in a more informal, more social atmosphere would be good for the community. So be there. And use twitter for carpooling.

Note: Those who are afraid of landing up at an event full of “boozers”, have no worries. This is not going to be like your college buddies’ drinking party where everybody gets pissed drunk and throws up on the couch. The free beer is there only to attract the crowd (and believe me it works, even on people with multiple successful startups behind them and millions in the bank), but drinking will be moderate, people will be polite, and there will be no fistfights. (At least amongst the Pune crowd; don’t know about the rowdies coming down from Mumbai…)

Anyway, more details and pretty pictures at the WATBlog article.

And now I am off to go collect my gift from WATBlog for hyping up their event like this…

Also, if you want other (non-beer) occassions to meet other Pune techies and entrepreneurs in a social settings, and maybe even shoot them, check out the Pune OpenCoffee Club‘s Inter-StartUp Paintball tournament this Sunday. This would be your chance to punish Santosh for having shutdown BookEazy.

Understanding Data De-duplication

Druvaa is a Pune-based startup that sells fast, efficient, and cheap backup (Update: see the comments section for Druvaa’s comments on my use of the word “cheap” here – apparently they sell even in cases where their product is priced above the competing offerings) software for enterprises and SMEs. It makes heavy use of data de-duplication technology to deliver on the promise of speed and low-bandwidth consumption. In this article, reproduced with permission from their blog, they explain what exactly data de-duplication is and how it works.

Definition of Data De-duplication

Data deduplication or Single Instancing essentially refers to the elimination of redundant data. In the deduplication process, duplicate data is deleted, leaving only one copy (single instance) of the data to be stored. However, indexing of all data is still retained should that data ever be required.

Example
A typical email system might contain 100 instances of the same 1 MB file attachment. If the email platform is backed up or archived, all 100 instances are saved, requiring 100 MB storage space. With data deduplication, only one instance of the attachment is actually stored; each subsequent instance is just referenced back to the one saved copy reducing storage and bandwidth demand to only 1 MB.

Technological Classification

The practical benefits of this technology depend upon various factors like –

  1. Point of Application – Source Vs Target
  2. Time of Application – Inline vs Post-Process
  3. Granularity – File vs Sub-File level
  4. Algorithm – Fixed size blocks Vs Variable length data segments

A simple relation between these factors can be explained using the diagram below –

Deduplication Technological Classification

Target Vs Source based Deduplication

Target based deduplication acts on the target data storage media. In this case the client is unmodified and not aware of any deduplication. The deduplication engine can embedded in the hardware array, which can be used as NAS/SAN device with deduplication capabilities. Alternatively it can also be offered as an independent software or hardware appliance which acts as intermediary between backup server and storage arrays. In both cases it improves only the storage utilization.

Target Vs Source Deduplication

On the contrary Source based deduplication acts on the data at the source before it’s moved. A deduplication aware backup agent is installed on the client which backs up only unique data. The result is improved bandwidth and storage utilization. But, this imposes additional computational load on the backup client.

Inline Vs Post-process Deduplication

In target based deduplication, the deduplication engine can either process data for duplicates in real time (i.e. as and when its send to target) or after its been stored in the target storage.

The former is called inline deduplication. The obvious advantages are –

  1. Increase in overall efficiency as data is only passed and processed once
  2. The processed data is instantaneously available for post storage processes like recovery and replication reducing the RPO and RTO window.

the disadvantages are –

  1. Decrease in write throughput
  2. Extent of deduplication is less – Only fixed-length block deduplication approach can be use

The inline deduplication only processed incoming raw blocks and does not have any knowledge of the files or file-structure. This forces it to use the fixed-length block approach (discussed in details later).

Inline Vs Post Process Deduplication

The post-process deduplication asynchronously acts on the stored data. And has an exact opposite effect on advantages and disadvantages of the inline deduplication listed above.

File vs Sub-file Level Deduplication

The duplicate removal algorithm can be applied on full file or sub-file levels. Full file level duplicates can be easily eliminated by calculating single checksum of the complete file data and comparing it against existing checksums of already backed up files. It’s simple and fast, but the extent of deduplication is very less, as it does not address the problem of duplicate content found inside different files or data-sets (e.g. emails).

The sub-file level deduplication technique breaks the file into smaller fixed or variable size blocks, and then uses standard hash based algorithm to find similar blocks.

Fixed-Length Blocks v/s Variable-Length Data Segments

Fixed-length block approach, as the name suggests, divides the files into fixed size length blocks and uses simple checksum (MD5/SHA etc.) based approach to find duplicates. Although it’s possible to look for repeated blocks, the approach provides very limited effectiveness. The reason is that the primary opportunity for data reduction is in finding duplicate blocks in two transmitted datasets that are made up mostly – but not completely – of the same data segments.

Data Sets and Block Allignment

For example, similar data blocks may be present at different offsets in two different datasets. In other words the block boundary of similar data may be different. This is very common when some bytes are inserted in a file, and when the changed file processes again and divides into fixed-length blocks, all blocks appear to have changed.

Therefore, two datasets with a small amount of difference are likely to have very few identical fixed length blocks.

Variable-Length Data Segment technology divides the data stream into variable length data segments using a methodology that can find the same block boundaries in different locations and contexts. This allows the boundaries to “float” within the data stream so that changes in one part of the dataset have little or no impact on the boundaries in other locations of the dataset.

ROI Benefits

Each organization has a capacity to generate data. The extent of savings depends upon – but not directly proportional to – the number of applications or end users generating data. Overall the deduplication savings depend upon following parameters –

  1. No. of applications or end users generating data
  2. Total data
  3. Daily change in data
  4. Type of data (emails/ documents/ media etc.)
  5. Backup policy (weekly-full – daily-incremental or daily-full)
  6. Retention period (90 days, 1 year etc.)
  7. Deduplication technology in place

The actual benefits of deduplication are realized once the same dataset is processed multiple times over a span of time for weekly/daily backups. This is especially true for variable length data segment technology which has a much better capability for dealing with arbitrary byte insertions.

Numbers
While some vendors claim 1:300 ratios of bandwidth/storage saving. Our customer statistics show that, the results are between 1:4 to 1:50 for source based deduplication.

Reblog this post [with Zemanta]

Acad DevCon: Microsoft Technologies Conference for Students – 18 Jan

pug_logoThis post by Pradnya Naik explains what Acad DevCon 2009 is, and why you should attend, and is reproduced here with permission.

ACAD DEVCON is a major event organized by Microsoft Student Partners and PUG in Pune to explain the most innovative and cutting edge technologies in Microsoft. So the question is who are Microsoft Student Partners and what is PUG?

Microsoft Student Partners are a group of enthusiastic students selected by Microsoft who love to explore and experiment with Microsoft products. Our main aim is to share knowledge among the student community because we believe in the proverb “teach one teach all”.We have been conducting developer’s conferences for students since 2005 and all events have been a major success…. The areas of interest not only limit to developing web based and windows based applications but also expand in areas of servers, operating systems and robotics.

Pune User Group is an association of professionals and students interested in technology who are dedicated and devoted to the noble cause of spreading knowlege. Every year PUG organises an event named DEVCON for professionals where experts address and give sessions to developers community. At present the whole organising team in Pune is an interested group of 25 people including MSP’s and the members cross the mark of 3000.

ACAD DEVCON is an event to get students from all colleges under one roof to share, collaborate and communicate ideas about their knowledge on various MS technologies. The sessions are interactive accompanied with onspot demos for better understanding of the subject.

What more !!!every student who attends ACAD DEVCON gets a kit for developing excellent applications on full version softwares provided at no charge.

So what are you waiting for!! Be there on 18th Jan, 2009 at COEP for ACAD DEVCON, 2009

For more information please click on ACAD DEVCON, 2009

About the author – Pradnya Naik

Pradnya, in her own words:

I go about the saying “Love what you do ..Do what you love..” A student by profession I love art, music, dance, travel and sports. I am a technology enthusiast and love working with computers. I believe that there is no end to learning and spreading knowlege and perfection comes with speed. I love to teach and so I became a Microsoft Student Partner, wherein I explore and explain Microsoft technologies to student community. It has been real fun to be a part of this campaign… So explore my blog to know me more… and ya keep smiling and be Happy…

You follow Pradnya’s blog, or you can follow her on twitter.

Reblog this post [with Zemanta]

CSI Pune Lecture: Security Testing Using Models – 16 Jan 6:30pm

csipune_logo

What: CSI Pune Lecture on Security Testing Using Models with Prof. Padmanabhan Krishnan, Bond University, Australia.
When: Friday, 16th Jan, 6:30pm-8:30pm
Where: Dewang Mehta Auditorium, Persistent, S.B. Road
Registration and Fees: Free for CSI/ISACA members; Rs. 50 for students & Persistent employees; others Rs. 100. Register at http://csi-pune.org

Details:
In this, we present a framework based on model based testing for security vulnerabilities testing. Security vulnerabilities are not only related to security functionalities at the application level but are sensitive to implementation details. Thus traditional model based approaches which remove implementation details are by themselves inadequate for testing security vulnerabilities. We demonstrate a framework that retains the advantages of model based testing that exposes only the necessary details relevant for vulnerability testing.

Our framework has three sub-models: a model or specification of the key aspects of the application, a model about the relevant aspects of the implementation and a model of the attacker. These three models are them combined to generate test cases. The same approach can also be used to test if a system meets a privacy policy.

Who Should Attend: Professionals interested in Test Automation and students.

About the Speaker – Padmanabhan Krishnan

Prof. Krishnan is a Professor at the Centre for Software Assurance, School of IT, Bond University, Australia. He also holds a research associate position at the United Nations University, International Institute for Software Technology. He got his BTech from IIT-Kanpur and MS and PhD from the University of Michigan, Ann Arbor. His interests are in model based testing, verification techniques and practical formal methods for software assurance. He has held positions in the USA, Denmark, New Zealand, Germany and Australia.

Update: The slides of the talk are now available. Click here if you can not see the slides below.

Security Testing Using Models

View SlideShare presentation or Upload your own. (tags: security bond)

Related Articles

Post removed

I removed this post because the originator of the information did not want the information put up on a public website. They were under the impression that I was going to mail it out to people. Apparently, mailing it out is fine, but putting it on a website is not. I don’t understand it, but removing it at their request. Oh well…

Find collaborators at IdeaCamp Pune 2: 17 Jan

Are you passionate about some idea, but don’t know enough like-minded people to partner with to give life to the idea? Are you an enthusiast of one domain looking for an someone with skills in another domain to implement a pet project? Do you want smart, energetic people to brainstorm with about how best to achieve something that you’ve long dreamt of?

Would you like to help Arun Bhatia (ex Municipal Commissioner of Pune) figure out how to increase voter-turnout and citizen participation in governance? Would you like to figure out ways in which the internet can save lives? Would you like to help develop a campaigning tool?

Would you like to discuss different ways in which we can survive this recession? Does local Pune search interest you? How about a session on user-driven innovation from someone who’s been doing this for over 10 years?

Would you like to join me in creating a blog aggregator for all Pune blogs?

If you answered yes to any one of these questions, you should attend “IdeaCamp Pune 2” this Saturday, from 9:30am to 6pm at SICSR Pune. If you have no idea what SICSR is, then you really need to start reading PuneTech more often.

Still not convinced?

Check out my report of the first IdeaCamp Pune that happened last year. Or, see the IdeaCamp blog for various other reports of the last IdeaCamp (scroll down a couple of posts).

If you want to attend, register at the IdeaCamp page. You need to click on the Edit button at the top of the page. This will ask you to create an account; go ahead and follow instructions like a good soldier. Then you’ll get an activation link in the mail. Activate your account. Now you can go back to that page and click Edit, and this time it will allow you to edit the page. Scroll down to the list of participants and add your details to that table. You might have to right-click and use the “Row > Add Row After” menu to create a new row.

It is free, but you must register, because last time, due to space constraints, the number of participants were limited to 80, and many people who were interested were not allowed to attend. In other words, as we like to say here at PuneTech, Hurry! Offer valid until stocks last!!

And don’t forget to check the PuneTech calendar for all the other interesting events on offer for you.

And you are not subscribed to PuneTech, please do so – you can get updates (free) by email or via RSS. And tell your friends too.

Reblog this post [with Zemanta]

Get student interns for 6-months for your company

As a part of their course, students of courses like MCA and MSc CA are required to do a 6-month internship in the industry. Normally, students are expected to find the internships on their own, as a result of which, smaller companies and startups without much visibility lose out on this stream of students.

To fix this we are arranging a “speed-date” for companies to quickly give a very short pitch (3 minutes) about themselves and then meet many students in a short time so that in a single meeting companies can quickly shortlist probable candidates, and conversely candidates can quickly shortlist probable companies for further interviews. This will happen on January 22, 4:30pm at SICSR. If you are interested, send me a mail (navin@punetech.com). Hurry, offer valid until stocks last.

What to expect

  • These are students of the M.Sc. in Computer Applications offered by SICSR. They will know programming (java, javascript, PHP, Ajax, databases) quite well. They will also know computer science fundamentals (algorithms, etc.) but not quite as well as a B.E. student. See http://www.symbiosiscomputers.com/v5/programmes/programmes_msccastructure.php for details of their curriculum
  • The students can start working for you immediately, and will work for 5 to 6 months – i.e. until mid-June. This is supposed to be a full-time job for the students during this period.
  • You would be expected to pay the students a stipend of about 4k/5k per month (or more depending on quality of students and competition). The official line is that they are required to do this to learn something, and not for the money. (It’s a requirement for their degree and they cannot graduate without this experience.)
  • You would be expected to give an evaluation of the student’s work to the college
  • In one of the previous POCC meetings, I heard someone say that they had a good experience with SICSR student interns. If you or someone else has experience with SICSR interns, please share it here for the benefit of the community. Please share negative experiences also, if you’ve had any.

Interested?

  • Send me (navin@punetech.com) a requirement profile describing the kind of project/work you are willing to offer by Thursday, 15th January. This will be cirtulated amongst the students. Describe your company, and the project/role. Please also indicate whether you are willing to receive some resumes of interested students beforehand.
  • On Thursday, 22nd Jan, 4:30pm to 7:30pm, there will be a “speed date” kind of an event, where each one of you will get 3 minutes to pitch your company and/or projects. At the end, you get a table where interested students come and talk to you for a maximum of 5 minutes. In this time, you should get a quick judgement of whether you want call this student for a further interview. The expectation is that at the end of the day, you have a short list of students that you are interested in interviewing, and who are interested in working for you.
  • Due to time constraints, the number of slots is limited. So, in case we receive more entries than we can accomodate, we’ll choosed on a first-come-first-served basis.

We are trying to include other colleges with similar programs. I’ll send out updates as more info becomes available.

Reblog this post [with Zemanta]