SlideShare a Scribd company logo
The
Millennials
July
Updates
• 2 IS’es in Architcture Colleges for TMP
• 1023 Recruitment Form Sold in 14
Colleges
• 30 Generation WE passes sold.
• 4 Media Appearances
• Membership Campaign
#AIESECDiaries CIM<3
• 1 Online Article
Updates
• AUGUST Recruitment Global Village !! 
• Generation WE !! 
• Generation WE Website
• Online Blogs
• Online Campaign for GCDP showcasing
and – OGX and ICX.
Coming
up…
Thank
Millennials
July
Updates

More Related Content

Viewers also liked

Bd agm 13 12 review
Bd agm 13 12 reviewBd agm 13 12 review
Bd agm 13 12 review
aiesechyderabad
 
Internal ppt
Internal pptInternal ppt
Internal ppt
aiesechyderabad
 
Best oGIP Award Application
Best oGIP Award ApplicationBest oGIP Award Application
Best oGIP Award Application
aiesechyderabad
 
15 sept aug updates bd
15 sept aug updates bd15 sept aug updates bd
15 sept aug updates bd
aiesechyderabad
 
Gbi 2
Gbi 2Gbi 2
Gbi 2
yuyis1254
 
Impirium 15.09.2014
Impirium 15.09.2014Impirium 15.09.2014
Impirium 15.09.2014
aiesechyderabad
 
Financial inclusion for managing risks against poverty & shocks
Financial inclusion for managing risks against poverty & shocksFinancial inclusion for managing risks against poverty & shocks
Financial inclusion for managing risks against poverty & shocks
sjavaad
 
Lesson plan adv
Lesson plan advLesson plan adv
Lesson plan adv
Marijo210
 
Chair
ChairChair
Assessment4
Assessment4Assessment4
Assessment4
Patel Meghna
 
Presentacion Aula Virtual
Presentacion Aula VirtualPresentacion Aula Virtual
Presentacion Aula Virtuallorenaarias86
 
HQTS Group
HQTS GroupHQTS Group
HQTS Group
asiasurfer
 
I gcdp
I gcdpI gcdp
Wwii picture analysis
Wwii picture analysisWwii picture analysis
Wwii picture analysis
Sam Wilkins
 
The imperium
The imperiumThe imperium
The imperium
aiesechyderabad
 
Lcp presentation
Lcp presentationLcp presentation
Lcp presentation
aiesechyderabad
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
 

Viewers also liked (20)

Bd agm 13 12 review
Bd agm 13 12 reviewBd agm 13 12 review
Bd agm 13 12 review
 
Internal ppt
Internal pptInternal ppt
Internal ppt
 
Best oGIP Award Application
Best oGIP Award ApplicationBest oGIP Award Application
Best oGIP Award Application
 
15 sept aug updates bd
15 sept aug updates bd15 sept aug updates bd
15 sept aug updates bd
 
教學設計
教學設計教學設計
教學設計
 
Gbi 2
Gbi 2Gbi 2
Gbi 2
 
Impirium 15.09.2014
Impirium 15.09.2014Impirium 15.09.2014
Impirium 15.09.2014
 
Financial inclusion for managing risks against poverty & shocks
Financial inclusion for managing risks against poverty & shocksFinancial inclusion for managing risks against poverty & shocks
Financial inclusion for managing risks against poverty & shocks
 
ppt
pptppt
ppt
 
Lesson plan adv
Lesson plan advLesson plan adv
Lesson plan adv
 
Chair
ChairChair
Chair
 
Assessment4
Assessment4Assessment4
Assessment4
 
Presentacion Aula Virtual
Presentacion Aula VirtualPresentacion Aula Virtual
Presentacion Aula Virtual
 
HQTS Group
HQTS GroupHQTS Group
HQTS Group
 
I gcdp
I gcdpI gcdp
I gcdp
 
Assalamu’alaikum.pdf 2
Assalamu’alaikum.pdf 2Assalamu’alaikum.pdf 2
Assalamu’alaikum.pdf 2
 
Wwii picture analysis
Wwii picture analysisWwii picture analysis
Wwii picture analysis
 
The imperium
The imperiumThe imperium
The imperium
 
Lcp presentation
Lcp presentationLcp presentation
Lcp presentation
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 

More from aiesechyderabad

Tracking CIM - oGIP
Tracking CIM - oGIPTracking CIM - oGIP
Tracking CIM - oGIP
aiesechyderabad
 
Tracking CIM - oGCDP
Tracking CIM - oGCDPTracking CIM - oGCDP
Tracking CIM - oGCDP
aiesechyderabad
 
Tracking CIM - internal communication
Tracking CIM -  internal communicationTracking CIM -  internal communication
Tracking CIM - internal communication
aiesechyderabad
 
Tracking CIM - iGIP
Tracking CIM - iGIPTracking CIM - iGIP
Tracking CIM - iGIP
aiesechyderabad
 
Tracking CIM - iGCDP
Tracking CIM - iGCDPTracking CIM - iGCDP
Tracking CIM - iGCDP
aiesechyderabad
 
Change
ChangeChange
Sona
SonaSona
Sofa
SofaSofa
Function sola
Function solaFunction sola
Function sola
aiesechyderabad
 
Evening plen presentation
Evening plen  presentationEvening plen  presentation
Evening plen presentation
aiesechyderabad
 
A cup of success
A cup of successA cup of success
A cup of success
aiesechyderabad
 
The ascent
The ascentThe ascent
The ascent
aiesechyderabad
 
Xecutive authority
Xecutive authorityXecutive authority
Xecutive authority
aiesechyderabad
 
Trajectory
TrajectoryTrajectory
Trajectory
aiesechyderabad
 
The Treadstone
The Treadstone The Treadstone
The Treadstone
aiesechyderabad
 
The origin
The originThe origin
The origin
aiesechyderabad
 
The Millennials updates
The Millennials updates  The Millennials updates
The Millennials updates
aiesechyderabad
 
Sona
SonaSona

More from aiesechyderabad (20)

Tracking CIM - oGIP
Tracking CIM - oGIPTracking CIM - oGIP
Tracking CIM - oGIP
 
Tracking CIM - oGCDP
Tracking CIM - oGCDPTracking CIM - oGCDP
Tracking CIM - oGCDP
 
Tracking CIM - internal communication
Tracking CIM -  internal communicationTracking CIM -  internal communication
Tracking CIM - internal communication
 
Tracking CIM - iGIP
Tracking CIM - iGIPTracking CIM - iGIP
Tracking CIM - iGIP
 
Tracking CIM - iGCDP
Tracking CIM - iGCDPTracking CIM - iGCDP
Tracking CIM - iGCDP
 
Change
ChangeChange
Change
 
Sona
SonaSona
Sona
 
Sofa
SofaSofa
Sofa
 
Purpose
PurposePurpose
Purpose
 
Gcdp lc day
Gcdp lc dayGcdp lc day
Gcdp lc day
 
Function sola
Function solaFunction sola
Function sola
 
Evening plen presentation
Evening plen  presentationEvening plen  presentation
Evening plen presentation
 
A cup of success
A cup of successA cup of success
A cup of success
 
The ascent
The ascentThe ascent
The ascent
 
Xecutive authority
Xecutive authorityXecutive authority
Xecutive authority
 
Trajectory
TrajectoryTrajectory
Trajectory
 
The Treadstone
The Treadstone The Treadstone
The Treadstone
 
The origin
The originThe origin
The origin
 
The Millennials updates
The Millennials updates  The Millennials updates
The Millennials updates
 
Sona
SonaSona
Sona
 

Recently uploaded

一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 

Recently uploaded (11)

一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 

The millennials!!