Good Companies Grow No Matter What

Every business demands growth, and double-digit growth is the dream of every dedicated business owner, even when lackluster results show up at quarter’s end.

Most entrepreneurial business owners need a guide to navigate their way toward substantial, sustainable growth.  It can be done even in a slow economy as demonstrated by such companies as Harley Davidson, Starbucks, and WalMart.  Even smaller companies such as Paychex and Oshkosh Truck have been able to make gains in revenue, gross profits and net profits.

Here are 5 disciplines of sustained growth:

Continue reading “Good Companies Grow No Matter What”

Advertisements

Become Your Own Personal CFO

Budgets and personal finances are not most people’s favorite topics, and certainly not one of mine.  Even bank executives have problems in this area, but if you’re an entrepreneur so do you.  You’re concentrating so much time on your business, your personal checkbook takes a back seat.  Then one day you are met with the startling fact that you’re not saving enough for lean times and you panic. Continue reading “Become Your Own Personal CFO”

How to use Telnet

Most of you only know that TelNet is a Port ( Port 23 ) or that TelNet is a Remote Control Tool. Remote Control means in this aspect that you as Client can get a Connection to for example a TelNet Server and then you can write Commands in a derivative of a Shell and this commands are executed only on this server not on your machine. But I want to show all you guys how to use this simple Remote Control Tool in several ways, because this simpleness is brilliant.  Continue reading “How to use Telnet”

Hacking Servers: A beginner’s guide

This information is to be used for informational purposes only.

I am asked at least 5 or more times a day by young, beginning “hackers”, “How can I hack?” or “Is there a way to hack a web site?” Well there is. There are, in fact, literally hundreds of ways to do this. I will discuss a few in this text to get you started. Every hacker has to start somehow and hacking web servers and ftp servers is one of the easiest ways.

If you are reading this I am assuming that you already have a basic knowledge of how web servers work and how to use some form of UNIX. But I am going to explain that stuff anyway for those of you who don’t know. Continue reading “Hacking Servers: A beginner’s guide”

Get every n-th record using SQL Server

First, a few things you should already know:
Modulus Returns the remainder of one number divided by another.
SELECT 32/10 -> 3
SELECT 32%10 -> 2

To return the n-th row only of a table, use:

WITH myTableWithRows AS (
    SELECT (ROW_NUMBER() OVER (ORDER BY myTable.SomeField)) as row,*
    FROM myTable)
SELECT * FROM myTableWithRows WHERE row = [value of n]

To return every n-th row in a table, use:

WITH myTableWithRows AS (
    SELECT (ROW_NUMBER() OVER (ORDER BY myTable.SomeField)) as row,*
    FROM myTable)
SELECT * FROM myTableWithRows WHERE [row]%[value of n] = 0

Example:

Return every 10th event from an events table:

WITH tableEvents AS (
    SELECT (ROW_NUMBER() OVER (ORDER BY EventDate)) as row,*
    FROM tblEvents
	Where Month(EventDate) = 7)
SELECT * FROM tableEvents WHERE [row]%10= 0

Assembly Language: Video Character Interface

This section has a set of code examples for writing character data to a PC in 80 character by 25 line mode. The first routine will check the video mode, and if it is a standard mode, the code returns with a no carry condition and starts using the standard video BIOS routines to perform the requested functions. These routines provide many code entry points where other programs may call in. Before using any of the video routines, the program must call the reset_video routine to initialize and make ready the other video calls. Some of the video display routines will respond to video display escape codes. Most of the escape codes deal with standard cursor control functions. There is an example of table selection jumping code.

Most computers use a raster graphics video system. The data is sent to the monitor as rows from left to right that are arranged from top to bottom. The first data bit sent goes to the upper left corner and the last data bit in a frame goes to the lower right corner. When addressing video RAM, the memory may be divided into rows that can be divided into columns. A fundamental understanding of this system is necessary when translating a row and column position into the actual video RAM address for a character or pixel location.

Continue reading “Assembly Language: Video Character Interface”