Monday, November 29, 2010

Top 10 IT certifications in demand today

With the global economy moved out of the great recession, technology jobs are playing a significant role in the recovery. There are a number of technology certification programs. Some of them are sponsored by software vendors, some by vendor-neutral organizations, and some by educational institutions. But which are the skills and certifications that can give you an edge over the others on getting the job?
Top 10 IT certifications in demand today


Microsoft Certified Technology Specialist (MCTS)
MCTS helps IT staff validate skills in installing, maintaining, and troubleshooting a specific Microsoft technology. The MCTS certifications are designed to communicate the skills and expertise a holder possesses on a specific platform. For example, candidates won't earn an MCTS on SQL Server 2008. Instead, they'll earn an MCTS covering SQL Server business intelligence, database creation or SQL server. MCTS credential enables professionals to target specific technologies, and is generally the first step toward the Professional-level certifications.

Cisco Certified Internetwork Expert (CCIE)
CCIE is a vendor-sponsored certification, focusing on Cisco's products. It requires that the candidate passes both a written exam and a hands-on lab. Candidates have to choose from one of several tracks: Routing and Switching, Security, Storage Networking, Voice, and Service Provider. CCIEs must recertify every two years or the certification is suspended. CCIE accreditation captures most of the networking company's certification glory.

Cisco Certified Security Professional (CCSP)
CCSP focuses on skills related to securing networks that run Cisco routers and other equipment. Candidates are required to pass five written exams and must recertify every three years by passing one current exam. Before a candidate can take the CCSP exams, he must meet the prerequisites by obtaining one of Cisco's lower-level certifications, either the Cisco Certified Network Associate (CCNA) or the Cisco Certified Internetwork Specialist (CCIP). It focuses on skills related to securing networks that run Cisco routers and other equipment.

Red Hat Certified Engineer (RHCE)/Red Hat Certified Architect (RHCA)
RHCE is one of the well respected Linux certifications in the industry. The exam is performance-based. Candidates are required to perform actual network installation, configuration, troubleshooting, and administration tasks on a live system.

RHCA is an advanced certification that requires completion of five endorsement exams, each of which costs $749. Like the RHCE exam, they are hands-on skills tests. Candidates must have the RHCE certification to take the RHCA exams.

Technology Infrastructure Library (ITIL)
ITIL certifications provide demonstration of knowledge and skills involved in management positions in IT services. There are three certification levels: Foundation, Practitioner, and Manager. The Manager level certification requires completion of a two-week training program, and candidates must have the Foundation certification and five years of IT management experience. Then, they must pass two three-hour exams consisting of essay questions. ITIL is intended to assist organizations in developing a framework for IT service management. Worldwide, ITIL is the most widely recognized qualification in IT service management.

International Software Testing Qualifications Board (ISTQB)
ISTQB is a software testing qualification certification organization. It is responsible for the international qualification scheme called "ISTQB Certified Tester". The qualifications are based on a syllabus, and there is a hierarchy of qualifications and guidelines for accreditation and examination. It is the ISTQB's role to support a single, universally accepted, international qualification scheme, aimed at software and system testing professionals, by providing the core syllabi and by setting guidelines for accreditation and examination for national boards.
Project Management Professional (PMP)
The Project Management Institute (PMI), a nonprofit organization that serves as a leading membership association for project management practitioners, maintains the PMP exam. The certification measures a candidate's project management expertise by validating skills and knowledge required to plan, execute, budget, and lead a technology project. Eligible candidates must have five years of project management experience or three years of project management experience and 35 hours of related education.

Microsoft Certified Professional Developer (MCPD)
MCPD accreditation measures a developer's ability to build and maintain software solutions using Visual Studio 2008 and Microsoft .NET Framework 3.5. Split into three certification paths (Windows Developer 3.5, ASP.NET Developer 3.5, and Enterprise Applications Developer 3.5), MCPD targets IT professionals tasked with designing, optimizing, and operating those Microsoft technologies to fulfill business needs.

Sun certified system administrator (SCSA)
SCSA gives the wide opportunity to professionals interested in imparting knowledge related to the Solaris operating system administrator. It's beneficial for all system administration professionals and linked with performing an essential system administration tasks on Solaris system. The basic requirements for SCSA certification is, to have deep knowledge of Solaris system and involves two examinations related to different versions of this operating system.

Oracle's Database administration (DBA)
Oracle has introduced a wide range of certification programs for entry level to experienced professionals and for domains ranging from database administration and database management to programming.

Oracle's OCA DBA 11g is an entry-level certification specifically designed to certify foundation skills required for database administration or application development. Its objectives are intended to measure a candidate's ability to work as a junior team member with database administrators or application developers. OCP DBA 11g develops, within the candidate, the skills of managing a large scale database and enhances the knowledge regarding the concepts and architecture relating to database, backup and recovery procedures. OCA DBA 10g is an entry-level certification specifically designed to certify foundation skills required for database administration or application development. OCP Certification DBA 10g validates a candidate's skills that include implementing and managing complex Oracle Database 10g functions, and recovering and tuning the database using advanced tools and technologies. OCA DBA 9i is an entry-level certification specifically designed to certify foundation skills required for database administration or application development.

Thursday, November 18, 2010

Top 5 Security Suites for your PC

Thanks to the various malicious software and phishing scams, today no one can stay online without having the threat of stealing of personal details, hijacking of browser, malware attacks and many other security issues. A mere antivirus program is not just well enough to stop malicious software like malwares from infiltrating your computer. We need multi-functional security suites that target not only viruses, but all types of attacks. A number of security firms are offering much improved multi-functional security suites these days. Below are the top five security suites that are capable of securing your PC from multiple security threats.
Top 5 Security Suites for your PC


Symantec Norton Internet Security 2011

Symantec Norton Internet Security 2011 meliorates its already-excellent protection. The edition is very easy to install and use. Most of the tasks run in idle time. It is loaded with additional virus cleanup tool and an intelligent firewall. It also offers many Web-based products and services like online backup and parental controls. There is a new interactive panel in its main window makes Norton Internet Security 2011 a manager for these online services.

Symantec Norton Internet Security 2011 extends the "Download Insight" feature introduced by the earlier edition. In the latest edition Norton also has introduced a free stand-alone application, Norton Power Eraser that discovers and kills hard-to-find scareware that cannot be detected by traditional antivirus software.

Symantec Norton Internet Security 2011 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only), Firefox 3.0 and later. It requires minimum 256 MB RAM and minimum 300 MB free hard disk space. It is available at 1,200.

Kaspersky Internet Security 2010

With a well-designed interface, Kaspersky Internet Security 2010 finishes second in the list for strong malware detection and efficient performance. Kaspersky is good in detecting active malware infections on a PC. It is a top performer in rootkit detection, finding and removing all inactive and active rootkits. In detection and disinfection of malware through behavioral scanning, Kaspersky Internet Security 2010 is very effective.

Kaspersky Internet Security's impact on system performance is minimal. A PC with Kaspersky's suite installed booted in 43.4 seconds on average, beating the average starting time by 3.5 seconds. The same PC running the McAfee or Norton suites, by comparison, took about 50 seconds to start up.

Kaspersky Internet Security 2010 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only) for downloading updates. It requires minimum 256 MB RAM and minimum 375 MB free hard disk space. It is available at 890.

McAfee Total Protection 2010

With excellent malware protection, McAfee Total Protection 2010 provides effective and real-time anti-phishing protection. The anti-spam is also great. This security suite has a very user friendly interface and it is an efficient solution which won't slow your system down. The firewall includes a useful feature called Attack Detection, which is used to detect popular exploits and attacks on the Web.

It also features malware protection that works to remove malware and spyware that could potentially give out sensitive information to thieves. McAfee Total Protection 2010 installs a browser toolbar called SiteAdvisor Plus, which helps users avoid malicious Web sites.

McAfee Total Protection 2010 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only), Firefox 3.0 and later. It requires minimum 512 MB RAM and minimum 200 MB free hard disk space. It is available at 1,220.

BitDefender Total Security 2010

BitDefender Total Security 2010 offers effective malware protection, anti-phishing coverage, a good spam filter and excellent parental controls. BitDefender gets a new interface that comes in three variations: a basic display with only three large icons and simple text, an intermediate design showing more detail, and an advanced interface for those who want to see granular details.

In detecting and disabling active infections, BitDefender Total Security 2010 is quite effective. It is also good at detection and disinfection of rootkits. BitDefender has improved the average startup time by roughly 3.5 seconds for a total of 43.46 seconds at startup.

BitDefender Total Security 2010 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only), Firefox 3.0 and later. It requires minimum 512 MB RAM and minimum 450 MB free hard disk space. It is available at 1,790.

PC Tools Internet Security 2010

PC Tools, which is better known for Spyware Doctor, also offers this complete security suite with firewall, anti-virus, anti-spyware, anti-phishing, and spam filter protection. The software is easy to use but the spam filter is slow and the package does significantly increase your system boot time.

Although the interface has very little change from last year, it's very user friendly. In rootkit detection PC Tools Internet Security 2010 is capable of scoring high. In detecting, blocking, and removing unknown malware, PC Tools is quite effective. The program gets installed quickly, but it does require a system reboot.

PC Tools Internet Security 2010 runs on Windows 7/XP/Vista (32-bit and 64-bit) and supports browsers like Internet Explorer 6.0 or higher (32-bit only), Firefox 3.0 and later. It requires minimum 256 MB RAM and minimum 150 MB free hard disk space. It is available at 1,890.

Sunday, November 14, 2010

Software to stop you writing e-mails when drunk

A new software can now stop you writing e-mails or posting messages when you are drunk. The Social Media Sobriety Test poses a series of simple problems that are intended to be fiendishly difficult to complete when intoxicated.

The test is designed to prevent alcohol-related posting to social media sites like
Facebook, MySpace, Twitter, YouTube and Flickr.


It also stops people from using custom sites like Foursquare or blogs and web-based
e-mail accounts such as gmail or hotmail, the Daily Mail reported.

If the inebriated user fails one of the simple tests, a message can be posted on their Facebook or Twitter page that tells their friends that they are "too drunk to post right now".

Developed by web security firm Webroot, the test's tagline is "Nothing good happens online after 1 a.m." And it is free to download.

Users are able to personalise it to choose which sites to block and then select the hours of the day when they are most likely to have enjoyed a few drinks.

If you want to access social media sites during these times, you will have to pass a randomly selected sobriety test such as 'drag your mouse in a straight line', 'type the alphabet backwards', or 'follow the finger'.

A Webroot spokesman said: "We saw an opportunity to remind people to be responsible on social networks, and to be humorous while talking about Internet security."

Tuesday, November 9, 2010

Top 10 ways your network can be attacked

Network security appliances do a great job of keeping the cyber monsters from invading your business. But what do you do when the monster is actually inside the security perimeter? Some of the major ways to attack your networks are mentioned below.

1. USB thumb drives: It is one of the common or the easiest ways to infect a network from inside a firewall. The ubiquity of thumb drives has driven hackers to develop targeted malware, such as the notorious Conficker worm, that can automatically execute upon connecting with a live USB port. Changes in the computer's default autorun policies can be said as one of the solution to this treat.
Top 10 ways your network can be attacked


2. Laptop and netbooks: A notebook may already have malicious code running in the background that is tasked to scour the network and find additional systems to infect. This notebook could belong to an internal employee or guest who's visiting and working from an open cube or office. Laptops are also really handy Ethernet port for tapping directly into a network. Implement an encrypted file system for sensitive data can be a precaution.

3. Wireless access points: Wireless attacks by wardrivers are common and have caused significant damage in the past. It can provide immediate connectivity to any user within proximity of the network. Wireless APs are naturally insecure, regardless if encryption is used or not. Strong, mixed passwords should be used and changed on a fairly frequent basis to prevent this.

4. Miscellaneous USB devices:Devices like digital cameras, MP3 players, printers, scanners, fax machines and even digital picture frames are also included in the list besides the common USB devices. Since the primary functions of these devices are different we often forget their potential to cause threats. Therefore it is important to implement and enforce asset control and policies around what devices can enter the environment and when.

5. Inside connections: Internal company employees can also inadvertently or intentionally access areas of the network that they wouldn't or shouldn't otherwise have access to and compromise endpoints using any of the means outlined in this article. Passwords should be changed regularly. Authentication and access levels are a must for any employee - he should only have access to systems, file shares, etc. are some of the important steps to prevent this.

6. The Trojan human: It can take less than a minute for an unsupervised person in a server room to infect the network. Avoid assumptions and identify the source by asking questions can be said as one of the major steps.

7. Optical media: Recordable media that appear to be legitimate can and has been used to piggyback data in and out of networks. And, like the thumb drives mentioned above, they can be used as a source for network infection. As with the USB tip, it's important to implement and enforce asset control and policies around what devices can enter the environment and when. And then follow that up with frequent policy reminders.

8. Hindsight is 20/20: The human mind is also very effective at storing information. Who is watching you when you log into your desktop? Where are your hard copies stored? What confidential documents are you reading on your laptop at the coffee shop, airplane, etc.? The best safeguard is being conscious and alert about this threat whenever working on sensitive material -- even if it means stopping what you're doing momentarily to observe your surroundings.

9. Smartphones and other digital devices: phones do more than just allow you to call anyone in the world from anywhere; they're full-functioning computers, complete with Wi-Fi connectivity, multithreaded operating systems, high storage capacity, high-resolution cameras and vast application support. And they, along with other portable tablet-like devices, are starting to be given the green light in business environments. Therefore it is important to implement and enforce asset control and policies around what devices can enter the environment and when.

10. Email: Email is frequently used within businesses to send and receive data; however, it's often misused. Messages with confidential information can easily be forwarded to any external target. Therefore source identification should be made compulsory.

Logitech introduces solar-powered keyboard

Logitech has unveiled a solar-powered keyboard K750 that allows users to enjoy computing for longer durations. The company claimed that the new Wireless Solar Keyboard K750 is powers itself whenever there is light, even indoors.

The keyboard powers itself through integrated solar panels and includes an integrated power-indicator light. The device is a third of an inch thick, and incurve keys that support the shape of fingertips. In addition, the keys have rounded edges that make it easier for fingers to glide from key to key.
Logitech introduces solar-powered keyboard


The Solar Keyboard requires a receiver that plugs into a computer's USB port. Using the 2.4GHz wireless connectivity, this Logitech Wireless Solar Keyboard is available for pre-orders at $80 (around 3550) in U.S. As of now, it is not clear about its availability and price in India.

Innovations that herald a new tech era

"Creativity is thinking up new things. Innovation is doing new things" and hence, innovative ideas are always critical for survival and growth today. Every other day we come across new technologies focusing on solving a variety of complexities. But very few of them we can tag as true innovations. Let's take a look at some of the important innovative technologies in key areas like computing systems, network security, software and wireless.
Innovations that herald a new tech era


Software:
Simplifying the process of building 3D games, San Francisco-based Unity Technologies has brought out software with the help of which one can easily create 3D interactive content like games, training simulations and medical visualizations for various device including cell phones to game systems. The software has an editor that can take prefabricated components and combine them with other features to create full game environments. It has the best innovation award in the Software category of The Wall Street Journal 2010 Technology Innovation Awards.

Wireless:
Addressing two of the key problems - poor cellphone coverage inside a house and the growing congestion on cellular networks, Ubiquisys, a UK-based firm has introduced a small cellular base station for use indoors named Femtocells. The company's first femtocell to be sold at a wholesale price under $100 was G3-mini. The technology has won the best innovation award in the Wireless category of The Wall Street Journal 2010 Technology Innovation Awards.

iSIM, developed by Motorola is another key innovation in the world of wireless technologies. Motorola's iSIM (Intelligent SIM) is based on a flexible wafer that can be attached to the subscriber's original SIM providing additional services that can be controlled via SIM tool kit (STK) allowing third party developers to build applications and services.

Now, let's come to Pyxis Mobile's Application Studio. It is a platform that allows creating applications for mobile devices without coding. Companies can build apps with Pyxis Mobile without any hard coding, which enables to cut development time by as much as 80 percent.

Computing Systems:
U.S.-based Lightfleet has come up with a new way of connecting computer processors that uses beamed light instead of copper or fiber-optic wires. The key difference that this new technology from Lightfleet brings is that the traditional wired switches used to manage connections between microprocessors will be replaced by a device that will send a data-carrying beam of light to all the nodes at once. The technology has won the best innovation award in the Computing Systems category of The Wall Street Journal 2010 Technology Innovation Awards.

Another U.S.-based firm named Marvell Semiconductor has introduced Plug Computer, a small and low-power networked home server, which is capable of delivering data and applications to a variety of devices. At a time when consumers expect always- on and always- connected computing, this innovation from Marvell can find traction among the users. Unlike other embedded devices in the home, it contains a gigahertz- class processor designed to offer PC- class performance.

Network Security:
No matter how important the Internet is for us, it is true that it has gradually turned out to be the 'sweet home' for viruses, worms, spyware, Trojan horses and many other malicious software. But there are new ways coming out every day with the focus of heading off these threats.

Symantec's "reputation-based" technology is one of the most innovative ones in this category. In order to spot dangers that the traditional security products are unable to tap, this new technology examines the usage patterns of millions of computers. On the basis of data these patterns give about a particular program's characteristics like source, age and prevalence, the technology from Symantec assigns a "reputation rating" to each of the software that it examines. Since there are so many new malware variants constantly appearing, this new security solution can be effective to spot them. It has won the best innovation award in the Network Security category of The Wall Street Journal 2010 Technology Innovation Awards.

With the increasing demand for cloud computing, cloud-based security solutions are also gaining momentum. Spain-based Panda Security has introduced a free, cloud-based antivirus solution with 50 percent less impact on PC performance compared to the industry average. It utilizes a thin-client agent and server architecture which processes and blocks malware more efficiently than locally installed signature-based products.

SinglePoint is another key innovation by the U.S.-based cloud security company Symplified,that provides a cloud-native unified identity and access management platform allowing companies to extend and enforce IT security policies for access control, authentication, administration of users, and auditing to cloud applications.

Millions lie to take leave from work

One in five employees take leave for stress but almost all are too afraid to admit it and instead lie about having an upset stomach or that a relative is ill, researchers have found.

While it found that talking about workplace pressures is still a huge taboo, few workers actually want to hide their stress from their bosses.
Millions lie to take leave from work


Seven out of 10 would like to discuss the issue with their employers although one- third want their manager to make the first move, reports the Daily Mail.

Previous research from the Royal College of Psychiatrists suggests businesses are losing around 8.4 billion pounds a year through absenteeism caused by poor mental well being.

Paul Farmer, chief executive of Mind, a mental health charity which conducted the study, said: "Millions of people experience unmanageable stress at work, and the fact that so many people feel forced to lie about it rather than finding a solution should be a major concern for our businesses.

"If employees don't feel they can be honest about the pressures on them, problems that aren't addressed can quickly snowball into low morale, low productivity and high sick leaves. We'd urge employers to encourage a culture of openness at work so they can solve problems now rather than storing up problems for the future," Farmer said.

The Mind research also reveals that 62 percent of employees feel their bosses aren't doing enough to look after the workplace well-being of their staff.

Microsoft survey says most people hate bad phone behavior

Most people have a problem with bad phone behavior, reveals a Harris Interactive poll commissioned by Microsoft and states that its new mobile platform, Windows Phone 7 will help change phone etiquette for the better.

Microsoft said it commissioned Harris Interactive to conduct the telephone phone survey that shows how the mobile phone has infiltrated people's lives. 2,024 people aged 18 and older were surveyed during October 6-17. It revealed that 72 percent of those surveyed consider bad mobile phone behavior to be one of their top 10 pet peeves, but only 18 percent admitted to engaging in such behavior themselves.
Microsoft survey says most people hate bad phone behavior


The survey revealed that phone owners between the ages of 18 and 24 were more likely than older users to slot in inappropriate conduct. Twenty-four percent in that age group have had their phone ring and upset a wedding, religious service or play.

Microsoft announced the results of the survey on the day its Windows Phone 7 went on sale in the U.S. Windows Phone 7's design has been advertised as an antidote to bad behavior, saying it makes it easier to do more with fewer steps.

Most people surveyed seemed to agree about places where phone use is out of line. Forty percent of mobile phone users surveyed admitted to using handset in a bathroom, and 48 percent said they think talking on the phone in a public restroom is inappropriate. Ninety percent said it's inappropriate at a religious service or funeral and 82 percent won't tolerate it at a wedding.

9 Ways to effectively use technology for a smart job search

Searching for jobs? But still following traditional ways? It's time for a change. It won't be easy to enhance your chance of getting a job if you cling to the older ways of job search. The technologies available today can double the chances of getting a preferred one, but they should be used in the correct way at the correct time. "Technology is a job hunter's friend, but only if you use it correctly", says Kate Wendleton, President of The Five O'Clock Club, a U.S.-based career coaching and outplacement network. Here are nine suggestions by Wendleton on proper new technology etiquette for job hunters.
9 Ways to effectively use technology for a smart job search


Make your first impression the old-fashioned way
Since hiring managers use to get too much e-mails and spam, chances are there that your mail might get deleted by them. When hiring managers get an unsolicited e-mail that they don't recognize, they may well hit 'delete' without ever opening it. What's the solution then? Go for snail mail, as it is the best way to get recognized by hiring managers. It allows you to take advantage of paper quality, resume design, and appealing typefaces so that the package you are sending is more like a printed marketing piece than a quick solicitation. This will differentiate you from other candidates.

E-mail is best for follow-up and networking
Suppose you want send a link to showcase your work after a meeting or indicate a relevant article reflecting the content of your conversation, E-mail would be the most suitable form of communication. But important follow-ups should always be sent by snail mail also, to assure that the formatting will be correct and the letter won't get lost in cyberspace. E-mail is ideal for building networks also. One should always put the person's name, by whom he has been introduced, in the subject line to be sure you are not automatically deleted (e.g. "Bob Smith Suggested That I Contact You").

When following up after a job interview
The form of follow-up for the organization or person you will be contacting is a vital thing. According to Wendleton, since hiring decisions are made very quickly these days, one should send an e-mail follow-up and also mail a copy of his follow-up influence letter. Also, at the end of the interview, one should ask the interviewer how he or she prefers to be contacted.

Use mobile devices only in a pinch
Generally mobile messages are composed in a hurry and in a quick reaction to an inbound e-mail. Therefore most of the times, the tone in a mobile message tends to be crisp and likely to be misunderstood. Hence, if it is necessary to use it, you should always proofread before sending it out.

To sell yourself to potential employers, don't "cell" yourself
One should never use a cell phone for telephone interviews or other phone communication, even if it's just a cursory screening interview. Chances are there that the interviewer could easily miss words, lose the tone of your voice, or not hear your emphasis on a critical question. And if it happens, you will fail to communicate your energy and enthusiasm.

Don't call your interviewers on their cells, either
As an applicant for a job, you should never make an initial or introductory call to a hiring manager's cell phone. Mobile phones are mostly perceived as private as their home phones, therefore, an unsolicited call from a job hunter may disturb a hiring manager, and it virtually guarantees a negative result.

Avoid instant messaging and social networks for first-time communication
Instant messaging is a permission-based concept. People invite others of their choosing to interrupt them with instant messages. Seeking out and finding a hiring manager via IM is considered intrusive. The same holds true for social networking. Even though the Internet enables you to search out an individual using directory tools or through social networks, it is not acceptable to approach future employers using these tools.
"Network" through LinkedIn and other sites
Sites like LinkedIn are the key ways in job search today. LinkedIn provides a jobseeker with a 21st century way to build up his professional network. Just as you should consider other passive techniques such as contacting search firms and answering ads, LinkedIn should be on your list of job searching strategies.


Always use your best judgment
One's own judgment is always the most crucial element in any strategy. In this job hunt strategy also a jobseeker should always rely on his judgment. There are always occasions where it's okay, or even advisable, to break the rules. When it comes down to it, you must assess the risks of your decisions and do what is right for you.