Monday, March 23, 2015

Job Opening for Male Nurse - Oman at Sofomation in Muscat , Zufar - Oman

Job Opening for Male Nurse - Oman

at Sofomation in Muscat Zufar Oman


Education:Basic - Bachelor of Science(Nursing)
Nationality:Egyptian, IndianAlgerian, Indian
Industry Type:Hotels / Hospitality

Job Description


We are - SOFOMATION - a human resource staffing agency providing highest standards of quality and professionalism. We pride ourselves on our efficient, professional and yet personal services both to our clients and applicants and our ability to supply the right staff complements the recruitment needs of our esteemed client.

We are having the following urgent openings in Oman for one of the leading “EPC Company” for the Position of “Male Nurse”

Job Title: - Male Nurse
Copany Name: Rukun Al Yaqeen (RAY) Skills Development 
Job Location:- Muscat Ghala or Halban
Interview Date & Location : Manila – 03th or 04th of April 2015

Job Qualification

• Bachelor of Science (Nursing)
• Should be Arabic speaker
• Pleasing and pleasant
• Good interpersonal skills

Role & Responsibility
• 3 to 5 years experience
• Coordinating services for patients as needed, round the clock
• Attending to the calls at all times
• In charge of the nursing facility available in the premises

Please share your updated resume with following details for onward submission to client for shortlisting.

• Total years of work Experience :-
• Highest Qualification:-
• Current Salary (USD):-
• Expected Salary (USD):-
• Date of Birth:-
• Nationality:-
• Contact Number & Email Id:-
• Current Location:-

Click here to Apply this job

Job Opening for Filipino Lab Technician Trainer

Job Opening for Lab Technician Trainer - Oman - 

at Sofomation in Muscat Oman Zufar Oman


Nationality : 

Filipino




Job Description

We are - SOFOMATION - a human resource staffing agency providing highest standards of quality and professionalism. We pride ourselves on our efficient, professional and yet personal services both to our clients and applicants and our ability to supply the right staff complements the recruitment needs of our esteemed client.

We are having the following urgent openings in Oman for one of the leading “EPC Company” for the Position of “Lab Technician”

Job Title: - Lab Technician
Copany Name: Rukun Al Yaqeen (RAY) Skills Development 
Job Location:- Muscat Ghala or Halban
Interview Date & Location : Manila – 03th or 04th of April 2015

Job Qualification

• Bachelor Degree in chemistry 
• Minimum 5 years of experience
• Should have analytical and research abilities
• Well-spoken and pleasing in personality

Role & Responsibility
• Minimum 5 years of experience
• Petrochemical laboratory skills. 
• Analytical testing 
• Strong and analytical chemistry skills
• Knowledge on the use of LIMS

Please share your updated resume with following details for onward submission to client for shortlisting.

• Total years of work Experience :-
• Years of Experience in Oil & Gas Industry:-
• Highest Qualification:-
• Current Salary (USD):-
• Expected Salary (USD):-
• Date of Birth:-
• Nationality:-
• Contact Number & Email Id:-
• Current Location:-

Clich here for Apply


IT - Support Executive

IT - Support Executive

at Dhofar Cattle Field in Raysut - Salalah - Oman



Job Description

Manage Feed Mill day to day Operations with IT related Support. 

• Installing and configuring computer hardware, software, systems, networks, printers and scanners
• Maintaining records of software licenses
• Managing stocks of equipment, consumables and other supplies.
• Monitoring and maintaining computer systems and networks;
• Talking staff through a series of actions, either face to face or over the telephone to help set up systems or resolve issues;
• Troubleshooting system and network problems and diagnosing and solving hardware or software faults;
• Replacing parts as required;
• Providing support, including procedural documentation and relevant reports;
• Following diagrams and written instructions to repair a fault or set up a system;
• Supporting the roll-out of new applications;
• Setting up new users' accounts and profiles and dealing with password issues;
• Responding within agreed time limits to call-outs;
• Working continuously on a task until completion (or referral to third parties, if appropriate);
• Prioritizing and managing many open cases at one time;
• Rapidly establishing a good working relationship with users and other professionals, e.g., software developers;
• Testing and evaluating new technology;
• Conducting electrical safety checks on computer equipment.
• Shift and on-call work may be required, particularly where computing equipment is in continual 24-hour operation.

Click here for Apply here :
http://www.naukrigulf.com/job-listings-IT-Support-Executive-Raysut-Salalah-Oman-Dhofar-Cattle-Field-2-to-5-years-230315000009-?xz=&jobId=230315000009&key=&keyar=&loc=oman&exp=&srchRank=1&srchId=142717881192836000&currPage=1&sort=relevance&freshness=&compType=&companyId=&partnercompany=&userSource=

Milky Cap Mushrooms RECIPES

Milky Cap Mushrooms RECIPES


Recipe Instructions


The group of mushrooms known as Lactarius are commonly called "milky caps." That's because the tissues of these fungi exude a variously colored milk, or latex, when bruised. With time, the color of the latex may change. How lovely it is to discover one of these mushrooms in the forest, and to find that when it is cut, vivid red, white, blue, or orange juice oozes out.
There are many kinds of Lactarius. Most are short stemmed, with centrally depressed caps. Three are commonly eaten. L. deliciosus ("delicious milky cap") and L. rubrilacteus ("bleeding milky cap") can be used interchangeably or together in recipes. These two mushrooms are stout and robust, similar in appearance, and occasionally mistaken for one another. Their flesh is somewhat granular and chalky in consistency. L. deliciosus has a cap decorated with concentrically arranged bands colored in differing shades of orange and green. It releases orange-colored latex. L. rubrilacteus is zoned with red-brown and orange pigments, and produces red latex.

L. fragilis, the "candy cap," represents a group of closely related species. They are small red-brown mushrooms with watery latex and a fragrant odor identified variously as maple syrup or curry. This becomes more intense when dried. They are found in many habitats, usually late in the mushroom season.
In the eastern United States a stunning blue form, L. indigo, is found. It has a pleasant and unusual flavor.
Cleaning: Brush or wipe clean. These mushrooms can be wormy, especially the stems, so check the interiors carefully.
Cooking: Milky caps require a long period of slow cooking. The Russian people like to grill the caps whole by brushing them with oil and seasoning them with salt and pepper. They are best used in conjunction with other foods, as in casseroles. Try making a Lactarius loaf with bread crumbs, eggs, herbs, onions, and cheese. Old-timers toss fresh or dried candy caps into soups and stews for flavor or incorporate them into a sweet sauce or pudding to use as a dessert.
Preserving: Saute L. deliciosus and L. rubrilacteus in butter and store in the freezer. They can be put up in a favorite pickling mixture and kept in the refrigerator for 1 week. Be sure to parboil them first.
L. fragilis is best dried whole or powdered. It has a smoother texture than the other edible Lactarius mushrooms and maintains its flavor for years.

Easily Reveal Hidden Passwords In Any Browser

Easily Reveal Hidden Passwords In Any Browser


If you use autofill for your passwords in your browser of choice then you know it's easy to forget what your password is. As it turns out, tech blog Digital Inspiration shows off how to easily reveal these passwords using the developer tools. 
Whether you us a password manager like LastPass, or you just let your browser store your passwords, your browser will always block the password box from passersby seeing it by using asterisks. To remove the mask and reveal your password, you just need to do a few things.
Right-click the password box and select "Inspect Element." This brings up the developer console. On the line that starts with "input type=password" change the word "password" to "text." This will reveal your password. While you can always pop into your browsers menu screen to look up saved passwords (or into your LastPass profile), this is a far quicker way to see your hidden passwords

Top 10 Computer Related Mistakes That Can Get You Fired

Top 10 Computer Related Mistakes That Can Get You Fired


Even if you're not a programmer or an IT technician, mistakes you make on the work computer can get you fired. Here are the top 10 reasons.

In today's economy, people get fired all the time. Even a lot of good employees get let go because their company needs to downsize and make budget cuts. This is why you would probably really regret if you make a stupid mistake that gets you fired. Since today most of the jobs revolve around PCs, computer-related mistakes can get people sacked more often than you might think. Here are the top 10 things you shouldn't do if you are an employee who likes or needs to keep his / her current workplace.

1. Making the wrong comment on social media

Facebook, Twitter and other social networking websites are a great place to make your feelings and opinions known. However, they can affect your career just as much (if not more) as your actions in the real life do. If you think that what you post on your private profile is your own business you may be partially right. However, public opinion will judge no matter where you shared your thoughts and if your workplace doesn't want to be associated with your image you will get fired. Just recently an English teacher from Texas got fired for posting a racist and offensive Ferguson-related comment on Twitter.


2. Accidentally shutting down the core business functionality

This happens very rarely, but when you somehow manage to stop your company from performing its regular work for more than a day, you are almost guaranteed to be sacked. How does this happen? If you are not from the IT department, you must be really unlucky to achieve such an accomplishment. Basically, you can only do this either by using a third party device such as a USB flash drive which is infected with some really nasty malware or downloading a malicious software from the Internet. Most often you will not have access to do any of these two actions, but if you do, be very careful about what you bring or download at work.


3. Treating every little thing like a huge disaster 

You know what happened to the boy who cried wolf too often, don't you? If you need a computer to do your job, you'd better learn how to handle the smaller stuff, because not every little incident is work impairing and you don't need to call someone from IT every time. Picking up a few things about how to repair or bypass certain errors can even make you an asset at work. Furthermore, not every little problem is the biggest one, so you don't need to get too alarmed when asking for assistance in case your display doesn't start up or you no longer have access to the Internet.


4. Not taking responsibility for your actions

This should probably be ranked higher on this list, but understanding this issue will eliminate the need for additional explanations on some of the following topics. When you are at the workplace, everything you do on your computer can be (and probably is) monitored. Especially if it's Internet-related, every website you visit will first go through the server which happens to keep logs about the activity. If your boss, the audit or the IT guys think that you are doing something suspicious, it only takes them a few minutes to check it out. So if you did something wrong like visited a website you shouldn't have, unintentionally downloaded software, etc., you will be better off confessing and admitting to it. They will find out it was you anyway, and (in this case) your honesty might be appreciated.


5. Using Real Data In Testing Environments

When testing a new program/system/project, you shouldn't use real data, especially if the information in questions is confidential. Even if it's much easier to use the data you have than to make up some new information, this action can and probably will get you fired. Test programs aren't protected as well as the ones in use, so the sensitive data is easier to steal. Furthermore, test projects usually involve cooperating with third parties which could easily leak the real information that you've been using.


6. Ignoring a critical security event

If you work in the IT department, then I don't even need to explain, but if you are just a regular employee who chooses to ignore a security threat who later turns out to be critical, you will more than likely be fired. So, if you see any kind of security notifications, let the guys in IT or your manager know. Furthermore, if you got infected by accident with some kind of adware or other type of malware, it's better to report it as quickly as possible even if it doesn't seem to be terribly aggressive. If given enough time, the smallest threat can become a huge problem.


7. Using work passwords on the Internet for your private accounts

When it comes to security, your work life and your private life need to stay completely separated so that you don't pose a security risk to your company. For a hacker, it is a lot easier to steal the passwords from your personal accounts, than your work ones. Furthermore, it is a lot easier for an individual to get targeted by a hacker than it is for a company, so why should someone who is after you personally also be able to affect your work life? If you are using the same (or almost similar passwords) at work as well as at home, change them as soon as possible and hope that no one finds out.


8. Using the resources available at work for your personal needs

At one point or another we've all used some of the resources available at work for our private needs: utilized a work computer to check on the flight information for the weekend trip that we planned, used a work phone to call a family member, etc. However, there are certain situations, especially when your workplace gets you access the information most people don't know, when you will get sacked for this reason. I recently read in a magazine about a guy who worked as an IT technician in a hospital. After hearing rumor about a certain celebrity being treated in the building, he performed a database search to check it out. A couple of days later, the information that the VIP was in the hospital leaked to the press and the management asked for the data about those who performed a database search for the celebrity name. Even though he never divulged the information to anyone else, he and every other person on the list got fired.


9. Spending more time procrastinating on the Internet than actually working

This is one of the most often occurrences and it generally happens over time. If distracting websites like YouTube, Facebook, Twitter, 9gag, etc. aren't restricted at your workplace and you spend too much time on them, you will probably end up being let go. As I stated before, your online activity is very easy to verify and any audit can easily see you've been more occupied watching funny videos or being social than actually doing your job. Spending too much time on Internet distractions could be a problem even if you do your job properly, as management may consider that you have too much free time so you can work more or that you are setting a bad example for your coworkers.


10. Sending e-mails to the wrong personI know it sounds stupid, but it happens quite a lot, so be sure to check the address before hitting that send button. Once it has left your computer, there is no way the get back the e-mail that you've sent. What happens frequently is that co-workers diss their boss through e-mails but end up sending the text to the wrong person: either to the boss boot-licker or to the boss himself. Another version is mistakenly sending of personal e-mail (either hateful or embarrassing) to your boss or to a client. If he or she believes that it was an honest mistake, the boss may let you off the hook, but if your error alienates a client, you will very likely pay for it with your job.

Function Keys: From F1 to F12

Function Keys: From F1 to F12
'What are those F-keys for?' 'They're just dead space on my keyboard … ' 'They can function? No kidding?' - Yeah, these are the most common comments on the poor little F1 through F12 keys, initially intended as a set ofFunction Keys. So, if you make little of them either, you're most likely to misknow that the F-keys cater for special functions and may have various uses, especially in combination with keys like Ctrl and Alt.
Taking this, today I'm going to enlighten the default as well as the best features of these secret Function Keys that are, hopefully, to enhance your user experience and boost workflow.
F1 is commonly the button to hit for Help in any software application. If you press the key in the Windows desktop or when the Windows Explorer is working, it will open the Windows help and support center. Still, the combination of F1 + Windows Key (the one with the Windows logo on it) will show up the Windows help screen even when you happen to be working in a program and face some issues to figure out.
F2 will allow you to quickly rename the selected file or folder. Just highlight an item, press the F2 key, and, after you type a new name, click outside the name box or on the Enter key. F2 can also help you out whenever you deal with Microsoft Word: Alt + Ctrl + F2 opens document window; Ctrl + F2 displays the print preview window.
F3 - In the desktop, pressing the F3 key will bring up the Find Files feature, while on most browsers this would be an instant way to launch the Find bar. Again, working in Microsoft Word, Shift + F3 will turn a text from upper to lower case or toggle between capitalizing each word.
F4 - Applying the versatile F4 will drop down the Address Bar menu in the Internet Explorer and Firefox browsers and repeat the last action in Word. If you press Alt + F4, the combination will close whatever window is open at the front, which is actually the safest straightforward way to shut annoying pop-ups right away.
F5 - In all known modern browsers F5 is a refresh key. Besides, in PowerPoint, it could be a rather handy shortcut to start a slideshow, while in Microsoft Word, it would open Find, Replace, or Go to window.
F6 - Like F4, it takes the focus or cursor to the Address Bar in most browsers and highlights the current address, allowing you to go to another website without moving your mouse up to that line. You can also use the F6 key to toggle between the menu items of a program or cycle from window to window with dispatch.
F7 actually doesn't offer any functionality in Windows but is commonly used as a spell checker in Microsoft applications. Along that, the F7 function key will turn on Caret browsing on Mozilla Firefox, the feature that places a movable cursor in webpages letting you navigate them only with arrow keys.
F8 will perform a pretty helpful function during the computer's boot up process: hold down the F8 key while booting your PC and it will enter the Windows Start Menu, commonly to access Safe Mode.
F9 - Still seeking for something significant, F9 doesn't offer any common uses in Windows. Yet, it may be essential in individual programs (for instance, the key refreshes documents in MS Word), so to find it out, open an application's Help file and search for 'Function Keys'.
F10 activates the menu bar (the bar at the top of the screen with File, Edit, View, etc. tabs) in most programs. Press F10 to highlight the first menu choice and then use the Arrow Keys to navigate the menus. F10 + Shift is similar to right-clicking on an object that opens up the context menu.
F11 switches on/off Full Screen mode in most Internet browsers or, pressed together with Shift, adds a new sheet in Microsoft Excel.
F12 - Just as F7 and F9, the F12 function key got its name for being in the F-keys row. That's it. The key can't offer any valuable functionality in Windows, while brings up the Save As dialogue in Microsoft Word or opens a new document if held down simultaneously with Ctrl.

How to update or slipstream an installation of SQL Server 2008

This article describes how to update or slipstream a failed installation of Microsoft SQL Server 2008 by using the latest Cumulative Update (CU) or latest Service Pack (SP). Use these instructions when you cannot install SQL Server 2008 because of a known issue in the Setup program. The "SQL Server 2008 Setup hotfixes" section lists the Microsoft Knowledge Base articles that describe known setup issues and explains how to obtain the latest update.

There are two situations to consider:
  • You attempt to install SQL Server 2008. You encounter a setup failure, and the setup files are installed on the computer.
  • You want to proactively avoid known setup issues by using an update setup.
It is recommend that you update or slipstream the original SQL Server 2008 by using Service Pack 1 because Service Pack enables to update the entire product. A CU that is based on the original SQL Server 2008 release can only update the SQL Support component.

For answers to frequently asked questions about slipstreaming, see the SQL Server 2008 Slipstream Frequently Asked Questionstopic on the following Microsoft Web site:

Collapse imageMore information

When you run the original release version of SQL Server 2008 Setup, the Setup program copies itself on the local computer, and then re-runs from the local copy. Therefore, if there is a later version of the support files on the computer, the Setup program will run these updated files. Therefore, you can update the SQL Server 2008 Setup support files before you run the Setup.exe file.

Starting from SQL Server 2008 Service Pack 1, you can update SQL Server 2008 by using the slipstream infrastructure. When you install Service Pack 1 by using the slipstream procedure or install to an existing SQL Server 2008 installation, an entry is created for the Service Pack in Add or Remove Programs. You can uninstall the service pack by using this entry.

To verify whether a service pack is installed correctly, run the SQL Discovery report that is available in the SQL Server 2008 Installation Center. You should see the features are version 10.n.xxxx, where n represents the service pack version. For example, 10.1.xxxx represents Service Pack 1.

How to update an installation of SQL Server 2008

When you try to install SQL Server 2008 from a DVD or from a network share, the installation fails because of an issue with the release version of the Setup program.

The following steps describe how to update SQL Server 2008 Setup when a Setup issue occurs:
  1. If the SQL Server 2008 Setup support files are installed on the computer, you apply a CU or a hotfix to update the SQL Server 2008 Setup support files, and then rerun the Setup program from the DVD or the network share.
  2. If the SQL Server 2008 Setup support files are not installed, see the "Proactively running setup" section.
To determine whether the SQL Server 2008 Setup support files are installed on the computer, view the entry by using Add or Remove Programs in Control Panel in operating systems that are earlier than Windows Vista. In Windows Vista or later versions of Windows, view the entry by using Programs and Features in Control Panel. To apply a CU or a hotfix and run the Setup program, follow these steps:
  1. If a fix is available through a hotfix, download the CU or the hotfix, and then install it on the computer by running the .exe file or by using the command line. The package detects the SQL Server 2008 Setup support files on the computer and then applies a new version of the SQLSupport.msi file.
  2. Run the Setup program again from the DVD or from the network share. The Setup program detects that a later version of the SQLSupport.msi file is available on the computer, and the Setup program runs from the local version on the computer instead of from the DVD or network share.

Limitations

The following limitations apply when you update the Setup program or use the slipstream procedure:
  • Important You must uninstall a failed installation if the Summary.txt log file indicates that you must uninstall.
  • If you use the slipstream procedure to upgrade an installation to a Wow64 installation, you must perform one of the following additional steps:
    • Specify the /Action parameter on the command line in addition to the /x86 parameter.
    • On the Options page of the Installation Center, select x86.
  • If you add features to an instance that already has the database service installed through slipstreaming, the installation may fail. To work around this issue, you need to add feature by using the original SQL Server 2008 source media or upgrade the instance to SP1 and then use the slipstream infrastructure.
  • When you copy slipstream packages, use paths that do not contain spaces. If you specify a location that contains spaces for either /PCUSOURCE or /CUSOURCE parameters, a failure occurs with slipstream setup.

Proactively running setup

There are two methods that you can use to update an installation of SQL Server 2008. We recommend that you use the first method because of the following benefits of the slipstream infrastructure:
  • You can quickly update to SQL Server 2008 SP1 in a single installation.
  • Reduce the restart times.
  • Improve the overall setup experience.
  • Avoid known setup issues.


To use these methods, the administrator must obtain the updated SQL Server 2008 Setup support files by downloading the latest CU or hotfix, or service pack. For information about the Setup fixes that are included in the latest hotfix and for information about how to download the hotfix, see the "SQL Server 2008 Setup hotfixes" section. After you obtain the updated SQL Server 2008 Setup support files, use one of the following methods. 

Use the slipstream procedure to update SQL Server 2008

This method allows you to update the entire product when you run the SQL Server 2008 Setup program after following one of the following procedures:

Procedure 1: Basic slipstream steps

Follow the following steps to create a slipstream drop that you can use for installing the original media and a service pack at the same time.
  1. Install the following prerequisites for SQL Server 2008.
  2. Download the service pack package that matches you system architecture. For example download the x64 package of SQL Server 2008 Service Pack 1 if your system is an x64-based system.
  3. Extract the service pack by running the following command: 
    SQLServer2008SP1-KB968369-x64-ENU.exe /x:C:\SP1
  4. Run the service pack to install Setup files on the computer. You will receive a Setup Support Files dialog box if the Setup support files have not been installed. You can also run the following file to install the setup support files: 
    C:\SP1\x64\setup\1033\sqlsupport.msi
  5. Run the Setup.exe file from the SQL Server 2008 source media by specifying the /PCUSource parameter. For example:
    Setup.exe /PCUSource=C:\SP1 

For More Information please visit https://support.microsoft.com/en-us/kb/955392