Wednesday, 24 December 2014

The Best IT Resume Tips of 2014


CIO.com takes a brief look back at the IT Resume Makeover series and some of the best resume advice from the past 12 months.

The Best IT Resume Tips of 2014
Over the last year, our resume experts and career consultants have helped numerous IT professionals put their best foot forward. Here's a quick look at some of the top resume tips from 2014's IT Resume Makeover series.

For a deeper dive on resume tips with expert commentary, please read, IT Resume Makeover: Top 11 Resume Tips From 2014.

Clear Out the Clutter
Instead of a "laundry list" of job responsibilities and daily tasks, focus your resume on how you've solved problems for employers -- and in what context.

Know Your Audience
Tailor the message to your audience. Ask yourself who will read your resume and what they expect to see.

Tell a Compelling Personal Story
Finding a career success story within your work history will make your career narrative more interesting and engaging for potential employers.

Use Sales Tactics to Sell Yourself
A sales resume is built on metrics: sales figures, number of deals closed, revenue targets achieved. Without these metrics, it can be nearly impossible to differentiate yourself from other sales candidates.

For a deeper dive on resume tips with expert commentary, please read, IT Resume Makeover: Top 11 Resume Tips From 2014.

Keep Your Resume Fresh and Updated
Make time to review and refresh your resume each year. Make sure all information about current and past employers and responsibilities is correct and add any new skills, experience or knowledge you've gained.

Don't Sell Yourself Short
This is the place to showcase your achievements. Make sure to hone in on unique achievements, successes, skills and knowledge to really grab the reader's attention.

For a deeper dive on resume tips with expert commentary, please read, IT Resume Makeover: Top 11 Resume Tips From 2014.

Don't Lie
It can be tempting to embellish your work history, exaggerate your IT skills or even claim to hold advanced degrees. In the long term, this can not only kill your chances to land a specific job, it can be a black mark that follows you your entire career.

Avoid Information Overload
Most employers want to quickly see dates, the scope of an applicant's responsibility, the types of projects managed, and other pertinent details, but make sure you're not using too much detail, which can become overwhelming to a reader.

For a deeper dive on resume tips with expert commentary, please read, IT Resume Makeover: Top 11 Resume Tips From 2014.

Avoid Buzzword Burnout
If your resume is crammed with buzzwords, jargon and gibberish, you're dooming yourself. Make sure your language is plain and clear to better appeal to readers.

Know How (And When) to Break the Rules
If you've created something big at the beginning of your career and spend the rest of your professional life building on that initial success, you must turn the traditional resume on its head to showcase that accomplishment.

Position Your Accomplishments for Maximum Impact
Typically, a resume has between 10 and 15 seconds to make an impact on a recruiter, hiring manager or HR professional. That's why it's crucial that attention-grabbing achievements and information be positioned close to the top of the first page, where it's more likely to be seen and have maximum effect.

For a deeper dive on resume tips with expert commentary, please read, IT Resume Makeover: Top 11 Resume Tips From 2014.




Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, 19 December 2014

BYOD brings corporate contradictions

CIOs naturally want a BYOD policy in place to give them some level of control, but the reality is that employees will do whatever they want regardless of the policy.

During a roundtable discussion on the Bring Your Own Device (BYOD) trend, a tech leader candidly offered this bit of real-world insight: "My wife is a nurse. There is no BYOD policy at the hospital. But all of the nurses communicate with each other via SMS, because that's the most efficient way to do their job."

Be sure not to miss:

12 most powerful Internet of Things companies
It's a good bet that those text messages, which are practically impossible for IT to monitor and record, are out of compliance with healthcare regulations. It's an even better bet that this kind of BYOD-related breach is happening en masse across the country, in virtually every industry.

BYOD Policy Needed but Do They Really Matter?
Organized by Wisegate, an IT advisory service, the roundtable discussion was chock full of contradictions. For instance, CIOs need a formal BYOD policy in place to give them some level of control and, presumably, to cover their butts when something goes wrong. Yet they're quick to point out that employees will do whatever they want regardless of the policy.

Even standard-fare BYOD practices are running into roadblocks.
A mobile device management (MDM) system is usually the first line of defense to ward off malware on the devices and prevent company data leaks from lost or stolen devices, but MDM has been met with resistance.

For instance, a Wisegate member says his company moved away from ActiveSync's total remote wipe to an MDM solution that identifies and segments corporate and personal data and apps and thus can remotely wipe only corporate data. Sounds like a win for BYOD-empowered employees, right? Wrong. Many employees saw MDM as the secret listening agent on their personal devices.

"There were many comments about a Big Brother approach," the Wisegate member says. "We found the users don't want the company they work for to know what is on their device. Some have chosen not to register with the MDM, either insisting on a company device or not having the access capability at all."

Most Users Don’t Read BYOD Policies
Educating and training employees about BYOD policies is tricky business. Policies tend to be like every other IT policy, which is to say, excruciatingly difficult to comprehend. Most people scroll to the bottom of an IT policy, check the agreement box and click "OK" -- all without reading a single word.

"I don't think the users understand anything, because you have to read and learn," says another Wisegate member. "Generally speaking, our society no longer does that very well."

Then there's the Cochran v. Schwan's Home Service case throwing a monkey wrench into BYOD. In the first ruling to be binding in the BYOD space, the California Court of Appeal stated in August: "We hold that when employees must use their personal cellphones for work-related calls, Labor Code section 2802 requires the employer to reimburse them."

The ruling was a hot topic at the roundtable, and Wisegate has this to say about it:
"Several participants commented that this ruling had forced them to suspend or delay any BYOD policy while their legal departments work out what it actually means. The general feeling is that if you allow staff to use their own devices, you will have to pay for any use that was required for business purposes. But what would happen if a member of staff has not been told to use his personal device but does so and then claims it was necessary to do his job properly?"

CIOs might have to reward roguish behavior. In the case of the texting nurses working at a hospital without a BYOD policy, it's even worse. These nurses are clearly putting the hospital at risk by skirting healthcare regulations on patient privacy. Nevertheless, the nurses may still be entitled to reimbursement for those text messages, if they can show that they were necessary to get their jobs done.

"There's a wariness with BYOD," Nelson says.




 
Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Thursday, 27 November 2014

5 Top-Paying IT Jobs for Every Stage of Tech Careers

Whether you're entry level, mid-level or C-level, CIO.com has you covered as we identify the highest-paying IT roles in each of those three categories.

5 Top-Paying IT Jobs for Every Stage of Tech Careers
Demand for highly skilled IT workers isn't slowing down - research, managed services and staffing firm Upp reports that the unemployment rate for IT careers is hovering under 4 percent in every U.S. state, well below unemployment rates for other industries. But some hot, in-demand roles pay more than others.

Using data from research and compensation benchmarking provider PayScale's databases, we've put together the top five highest-paying IT roles for every career stage -- whether you're just starting your IT career, have a few years of experience under your belt or are moving into the C-suite.

Compensation data is median pay based on total cash compensation (TCC). Median pay is the 50th percentile - half of workers doing the job are paid more, half are paid less. TCC combines base annual salary or hourly wage, bonuses, profit sharing, tips, commissions and other forms of cash earnings. It does not include stock, retirement benefits or the value of healthcare benefits, for example.

5 Highest Paid Entry-Level Roles
If you're just getting started in your IT career, consider these five IT roles. Not only are they in high demand, the compensation's highly competitive for these entry-level positions. For our purposes, entry-level is defined as having zero to five years of experience in all applicable jobs in the field, not just the current job.

Business Intelligence Architect
The primary responsibility of the business intelligence architect is data standards and procedures; warehousing; design and development of logical and physical data models and databases; distributed data management; information management functions.

The business intelligence architect designs, develops and enforces standards and architecture for installing, configuring and using business intelligence applications for the purpose of directing and managing the organization. The role usually requires a bachelor's degree and at least some experience in a BI role.
Median Pay: $81,200

ASIC Design Engineer
The role produces application-specific integrated circuit (ASIC) designs and modifications by identifying design objectives and issues; researching and developing ASIC engineering techniques and approaches; verifying and validating designs; maintaining documentation; and mentoring team members, if applicable.
The role usually requires a bachelor's degree and experience with general ASIC designs, concepts and usage.
Median Pay: $83,300

Solutions Architect
While the title might seem vague, a solutions architect (SA) plays a key role in the software development lifecycle: in the conversion of the product, application or solution requirements taken from the business or customer into an architecture and design that will become the blueprint for the solution being created. This conversion is based largely upon the previous design patterns that the solutions architect has been involved with in the past through reading and staying abreast of the latest techniques, or through personal experience.
The role requires a bachelor's degree or equivalent experience.
Median Pay: $91,500

Software Architect
A software architect (SA) is responsible for the initial design and development of new software or extensive software revisions. The software architect defines product requirements and creates high-level architectural specifications, ensuring feasibility, functionality and integration with existing systems/platforms for internal use or for customers.

The role requires a bachelor's degree and, while still considered an entry level position, a solutions architect may be expected to have an advanced degree in area of specialty and may manage or guide other developers through the project to completion.
Median Pay: $94,100

Data Scientist, IT
Also known as "the sexiest job in IT," a data scientist's role is to use predictive analytics and machine learning experience to extract insight and actionable information from a firm's data stores. The role is fairly new and still evolving, but requires a bachelor's degree and at least familiarity with data mining, structured data modeling and predictive analytics.
Median Pay: $97,600

5 Highest Paid Mid-Level Roles
You've paid your dues in entry level jobs and you're looking to move up the ladder. Well, hopefully one of these lucrative and high-demand roles is in your career path.
A mid-level role is defined as having five to 10 years of experience in all applicable jobs in the field, not just the current job.

Principal Software Engineer
Principal software engineers are in charge of most of the technical aspects of an organization's software projects. Their primary function is scaling software projects efficiently while maximizing performance and minimizing costs. They also oversee development teams and coordinate strategies to make sure the technologies are interconnected and product lines are working smoothly. Principal software engineers focus on best practices and standards of design, application requirements and proper maintenance. Engineers in this role often manage teams of developers.

A bachelor's degree in computer science is usually the minimum educational requirement, although a (CSDP) Certified Software Development Professional certification along with hands-on experience in a previous position is also generally accepted.
Median Pay: $133,000

Data Scientist, IT
The role so nice, it appears on our list twice. As stated before, a data scientist's role is to use predictive analytics and machine learning experience to extract insight and actionable information from a firm's data stores. In a mid-level role, data scientists could be required to have software engineering experience, as well as higher-level strategic thinking and communication skills to more accurately make the case for business action based on the results generated by machine learning algorithms and insight gained from data mining.
The role is fairly new and still evolving, but requires a bachelor's degree and extensive experience with software development, data mining, structured data modeling and predictive analytics.
Median Pay: $134,000

Scrum Coach
The scrum coach role teaches and coaches all agile software development best practices and Scrum adoption to an IT organization or an agile development environment. Ideally, a scrum coach will have extensive experience with an agile development environment and will use his or her broad experience to help businesses adopt best practices as related to an agile framework.
Most scrum coaches have a bachelor's degree and experience in software development, engineering or architecture. While there is a specific scrum coach certification, experience and previous demonstrable success is most often used as criteria for hiring.
Median Pay: $151,000

Principal Software Architect
A principal software architect is tasked with identifying and evaluating software product requirements and their limitations to make sure solutions will work within larger business system functions. Principal software architects solicit the input of users, solution sponsors and executives to make sure the software meets the requirements, vision and needs of the business and customers; they work to drive innovation and research into new methods and technologies and also help position overall IT department and software development strategy.
The principal software architect role requires a bachelor's degree, as well as proven "soft skills" like business analysis, research skills, communications and negotiation skills.
Median Pay: $151,000

Chief Architect, IT
The chief architect role is one that's highly political and complex, and the job description varies widely from company to company. That said, there are some commonalities; the chief architect of IT must understand all aspects of a business' processes, infrastructure, applications and initiatives - in other words, the entire organization's IT blueprint. They are then tasked with ensuring that every part of the business operates in sync with these strategic IT initiatives.
The role requires a bachelor's degree and extensive technical and "soft skills" experience, and often reports directly to the CIO.
Median Pay: $155,000

5 Highest Paid Senior and Executive Roles
Ah, senior management - this is where all your hard work and political maneuvering pays off, literally. Senior and executive roles not only come with big responsibility, in the IT field, they also come with big paychecks.
Senior and executive roles are defined has having more than 10 years of experience in all applicable jobs, not just the current job, and include only management, senior and executive-level roles.

Project Management Director, IT
An IT project management director supervises and governs all corporate IT projects. The role is responsible for all aspects of project management direction, including reviewing proposals, determining costs, timelines, funding, identifying sponsors, setting and maintaining staffing requirements, and making sure goals and objectives are met. Professionals in this role are also likely to oversee project managers and their teams.
The role requires a bachelor's degree and requires not only technical skills, but also a degree of creativity, problem-solving, negotiation and management skills.
Median Pay: $142,000

Business Intelligence Director
The business intelligence director is responsible for developing and maintaining an organization's business intelligence reporting frameworks, tools and data stores. The role works cross-functionally with various business unit heads to determine their reporting and analytics needs and determines how best to meet them given constrains of time, budget and staffing. The business intelligence director is also charged with making sure that information is delivered on time and is of high quality - making sure business has the necessary data for ongoing daily operations as well as forward-looking strategy and competitive data.
A bachelor's degree is necessary, but in some instances an advanced degree in a related field is required.
Median Pay: $143,000

Senior Computer Scientist
Computer scientists often work as part of a research team with computer programmers, mechanical or electrical engineers, and other IT professionals. Their role leans more toward the theoretical than the practical - their research often is used to design new technology in areas like artificial intelligence, robotics or virtual reality. Computer scientists are also tasked with improving performance of existing computer systems and software as well as the development of new hardware or computing techniques and materials.
Most computer scientists hold a bachelor's degree with a major in computer science, information systems or software engineering, but at this senior level, many hold a Ph.D. in computer science, computer engineering or a similar field.
Median Pay: $145,000

Vice President, IT
The vice president of IT is responsible for strategizing and planning an organization's IT future, as well as implementing new technology and maintaining current systems. The vice president of IT also ensures teams are effectively supporting maximum uptime and stability in the company's computer systems and networks. The essence of the role is technology leadership, and the vice president of IT must use both technical skills and soft skills - leadership, communication, negotiation and analysis - to lead an IT focused business successfully.
In many organizations, the vice president of IT role is a stepping stone to the CIO position. Most companies require a master's degree in computer science or IT, while some organizations require an MBA, since extensive business knowledge is critical to the role.
Median Pay: $157,000

Vice President, Ecommerce
The vice president of ecommerce is responsible for all of a business' ecommerce activities, including channel development strategies, Web architecture and infrastructure requirements, and collaboration with IT, sales, supply chain and operations teams to successfully execute on e-commerce business strategies. The vice president of ecommerce must have extensive experience with ecommerce concepts, best practices, processes and strategies, as well as excellent communications, negotiations and strategic planning skills.
The role requires a bachelor's degree and, at many organizations, a minimum of 15 years of experience in the field.
Median Pay: $164,000


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Saturday, 1 November 2014

11 ways to re-energize your IT career

Mid-career blues, begone. Here are 11 actionable items tech pros can tackle to keep moving on up in IT.

Stuck in the middle -- and blue?
Eric Reed knows a thing or two about mid-career pitfalls. He's seen some mid-level IT managers get too enamored with technology for its own sake, rather than viewing it as a way to advance business goals. Other would-be leaders didn't know how to communicate or collaborate with non-IT colleagues and were sidelined as techies rather than ID'd as future business leaders.

Reed is grateful he was able to overcome those challenges in his own career and sustain his momentum -- he's now CTO at GE Capital. With that goal in mind, Computerworld asked Reed and other seasoned IT pros for advice on how to keep your tech career from getting bogged down. Read on for their tips.

Develop a road map
It's smart to know not just where you want to land but how best to get there. Piera Palazzolo, senior vice president at Dale Carnegie Training, which specializes in business-oriented improvement, recommends starting with self-reflection. Map out the exact positions you'd like to hold and the ultimate title you'd like to achieve. "Then set a course for yourself and find out what you need to learn," Palazzolo says. Talk to your supervisor and other higher-ups in the company to determine how they can help you and whether your company's plans for you mesh with your own.

Bob Flynn, manager of IT community partnerships at Indiana University, says his organization requires each worker to have a career management plan, which he says helps him and his colleagues to map out their goals.

Gain new perspective
Managers often pay lip service to the concept of "walking the shop floor," but James Stanger, senior director of product development at CompTIA, an IT trade association, suggests going beyond the typical pat-on-the-back mentality. Instead, get to know how your direct reports, your colleagues and your customers view the world.

"In middle management, due to the demands of the job and just trying to get it done, people get these blinders on, and they don't think about how others think," Stanger says. Try asking: What do you think about this problem? What's your perspective? Can you explain your need here?

"Take those blinders off and you'll find yourself much more nimble in your thinking," Stanger says, which in turn will make you a better problem-solver -- a valued leadership quality.

Find leadership opportunities
To continue honing your leadership skills, look for opportunities that will get you noticed -- especially ones outside of your department. "Volunteer for a cross-functional task force that exposes you to senior leaders. Get out of your silo, and get more people in your organization to know who you are," says Carly Goldsmith, a career coach specializing in guiding mid-career professionals. She suggests seeking out projects and committees that will help you grow your skills.

One of her clients took Goldsmith's advice, joining a project that required her to have more interactions and strategic conversations with senior leaders. The move paid off: She was offered a promotion shortly after the project wrapped up.

Be a perfectionist
Sure, no one's perfect, but if you're gunning for more responsibilities, you have to make sure you're doing your current job as close to perfect as possible.

Sean Andersen, director of interactive services at Six Flags Entertainment Corp., works with IT managers across the company's 18 theme parks. He says he notices the ones who "keep their house in order" -- consistently fulfilling all of their assigned duties, including routine and mundane tasks that often get overlooked. Andersen taps those individuals for special projects because they're most likely to be able to handle additional responsibilities.

Case in point: When the company launched a pilot program with the new Chromebox two years ago, he went to the manager who had everything else already under control.

Learn constantly, and share what you discover

To protect yourself from becoming technically obsolete as you move up in management and away from the tech trenches, you need to be constantly building and refreshing a well-rounded set of skills. "The idea is to be constantly learning," CompTIA's Stanger says. Take more classes, get another certification, earn an advanced degree, he says.

If you're like most workers, your current job requirements already fill your work week, which means you'll have to dig hard to find more hours for learning something new. Andersen, the Six Flags executive, says he carves out time -- usually late at night -- to read up on and test out new technologies. And he says he likewise has doled out plum assignments to direct reports who show similar initiative.

Compensate for your blind spots
Reed, the CTO at GE Capital, admits that in the past he often didn't think about the impact his decisions had on other people. "I'd sign onto an objective and put together a plan, but I was not thinking about the ramifications on the team," he says. He didn't realize the problem until someone on his team called him out on it.

Reed says his headlong decision-making style didn't kill his career, but it had done some damage with his business partners. Now that he's became aware of his blind spot, he works to keep it front of mind as he makes commitments that affect his team.

Bernadette Rasmussen, divisional senior vice president of information management and CTO of Health Care Service Corp. (HCSC), agrees with Reed's approach. "Listen to your team members, listen to your peers and listen to your business leaders," she advises.

Know how your business makes money…
It's not enough to have generic business acumen. That's required for most technologists these days.

To gain a leadership position, you have to know how your organization operates and, more importantly, how it makes money. "Some people get into middle management and they don't understand that. They don't understand that we're not here to implement neat technology. We're here to help the business make money," Reed says.

He recommends spending more time meeting with business colleagues to develop that insight and then using it to make smarter decisions within IT. Understanding which technologies have the biggest impact on the company's bottom line will help you prioritize projects and deliver the big bang that draws attention, Reed says.

… then use that knowledge to drive business results
As an IT middle manager, you most certainly need to know technology and must consistently deliver on your technology projects. As an aspiring C-level leader, your priority should be making sure those projects deliver a tangible benefit to the company. In other words, show your ROI.

"You must change your perspective from mastering technology to helping your organization drive results," says HCSC's Rasmussen. "Help connect the dots, drive change with perspective beyond your own and add your unique value," she advises.

Be the expert that people seek out
You need to be more than an expert to attain a corner office -- you need to be the expert.

Theresa Caragol learned that lesson during her upward climb. "You have to be the best and have the deepest expertise so someone says, 'If I want to understand this, I have to go talk to this person.' And if you're the expert in more than one technology, that's even better," she says.

Caragol, now global vice president for channels and partners at Extreme Networks Inc., positioned herself as an expert in software-defined networking at a previous employer. Her mentors helped line up opportunities for her to speak on the topic, which brought her to the attention of those in positions to promote her. She worked her way up to vice president of global channel, alliances and partners at Ciena Corp., her previous employer, a role that in turn served as a stepping stone to her current position.

Manage up and manage down
If you really want to shine, make sure your team does. And make your manager look good, too. After all, in almost all cases your boss will be the one to recommend you for top assignments and promotions. Have regular face-to-face conversations where you can talk about company objectives, professional goals and, yes, even your personal interests, says Dale Carnegie Training's Palazzolo.

Put the same effort into building relationships with your team, because you're only as good as the output you get from them. Vidhya Ranganathan, senior vice president of products and engineering at cloud-services firm Accellion Inc., takes a commonsense approach to building relationships. She regularly has lunch with her team and chats over coffee. "It's not to give them [formal] guidance, but to just listen and let them know I'm available," she says.

Avoid missteps

To make your rise through the ranks as painless as possible:
Don't wait for your manager to offer you opportunities. There's a reason why Microsoft CEO Satya Nadella recently found himself embroiled a firestorm of criticism when he urged women seeking a raise to "have faith in the system" rather than asking for what they want -- it's bad advice for all employees. "Too often, middle managers take a passive approach to their career advancement" -- including raises and promotions, career-coach Goldsmith says. "Go out and find the opportunities yourself.
Don't linger in a job you dislike or that's not well suited for you. "Motivation plummets, mistakes are made, stress increases. And whether you're conscious of it or not, you start to be seen as a poor performer," Goldsmith explains.
Don't get trapped in the weeds. According to Goldsmith, middle managers often do more hands-on work than they should. You need to move out of the tech trenches and lead your team, not code with them.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, 27 October 2014

Quality of Service explained: How routers with strong QoS make better home networks

The devices connected to your router battle for bandwidth like thirst-crazed beasts jostling for access to a receding watering hole. You can’t see the melee, but you can feel its impact. Without intervention, the strongest competitors—a BitTorrent download, for instance—will drink their fill, even if it’s not essential to their survival, while others—a VoIP call, a Netflix stream, or a YouTube video—are left to wither and die.

Data integration is often underestimated and poorly implemented, taking time and resources. Yet it

A router with good Quality of Service (QoS) technology can prevent such unequal distribution of a precious resource. You can dip only one straw into the Internet at a time, after all. QoS ensures that each client gets its chance for a sip, and it also takes each client’s specific needs into account. BitTorrent? Cool your jets. If one of your packets is dropped, it’ll be resent. You can run in the background. Netflix, VoIP, YouTube? Lag results in a bad user experience. Your data gets priority.

That’s a gross oversimplification, of course. Here’s a more in-depth explanation. QoS, also known as traffic shaping, assigns priority to each device and service operating on your network and controls the amount of bandwidth each is allowed to consume based on its mission. A file transfer, such as the aforementioned BitTorrent, is a fault-tolerant process. The client and the server exchange data to verify that all the bits are delivered. If any are lost in transit, they’ll be resent until the entire package has been delivered.

That can’t happen with a video or audio stream, a VoIP call, or an online gaming session. The client can’t ask the server to resend lost bits, because any interruption in the stream results in a glitch (or lag, in terms of game play). QoS recognizes the various types of traffic moving over your network and prioritizes it accordingly. File transfers will take longer while you’re watching a video or playing a game, but you'll be assured of a good user experience.

Traditional QoS

Different routers take different approaches to QoS. With some models, you simply identify the type of traffic you want to manage and then assign it a priority: High, medium, or low. With others, you can choose specific applications, or even identify the specific ports a service or application uses to reach the Internet. Yet another way is to assign priority to a specific device using its IP or MAC address.

Router Quality of Service QoS

Many older routers, such as this Netgear WNR2000 802.11n model, have predefined Quality of Service for a limited number of applications, but you must configure your own rules for anything the manufacturer didn’t think of.

Configuring QoS this way can be very cumbersome, requiring lots of knowledge of protocols, specific details about how your router operates, and networking in general. Some routers, for instance, depend on you to inform them of the maximum upload and download speeds your ISP supports. Enter the incorrect values, and your network might perform worse instead of better.

Fortunately, router manufacturers have made great strides in making QoS easier to configure. In some cases, it’s become entirely automatic.

Intelligent QoS

Some routers include the option of automated QoS handling. Most newer models support the Wi-Fi Multimedia (WMM) standard, for instance. WMM prioritizes network traffic in four categories, from highest to lowest: Voice, video, best effort (most traffic from apps other than voice and video), and background (print jobs, file downloads, and other traffic not sensitive to latency). WMM is good as far as it goes, but it ameliorates only wireless network contention. It does nothing to resolve the battle for bandwidth among wired network clients.

Better routers go further to cover both sides of the network. They automatically choose which traffic gets priority based upon assumptions—putting video and voice ahead of file downloads, for instance. The intelligence behind each vendor’s QoS functionality, however, varies according to the quality of the algorithm in use and the processor power available to run it.

Router Quality of Service QoS

Qualcomm's StreamBoost technolog enables the the D-Link DGL-5500 to display exactly what's consuming the majority of your network's bandwidth.

Right now, Qualcomm’s StreamBoost traffic-shaping technology seems to be the hot QoS ticket. StreamBoost, first announced in January, 2013, is based on technology originally developed by Bigfoot Networks. Bigfoot, a company that Qualcomm acquired in 2011, designed network-interface cards targeted at gamers, who are among the most latency-sensitive computer users in the world.

Qualcomm doesn’t manufacture routers, but the company does design and manufacture processors that go into high-end consumer routers such as Netgear’s Nighthawk X4 and D-Link’s DGL-5500 Gaming Router. While there’s no technological barrier to running StreamBoost on a Marvel or Broadcom processor, Qualcomm currently doesn’t license the firmware separate from its chips.

StreamBoost can distinguish between and prioritize latency-sensitive traffic (audio, video, gaming, and so on) over latency-insensitive traffic (downloads, file transfers, etc.), and it can adjust its allocation of bandwidth to various network activities to ensure all clients get a good experience. If several clients are streaming Netflix videos at the same time, for instance, it can automatically reduce one or more of those streams from 1080p quality to 720p quality to ensure all the sessions have enough bandwidth.

What’s more, StreamBoost can distinguish among the types of client devices and reduce the image quality streaming to a smartphone or tablet, because the degradation won’t be as noticeable on those small screens as it would be on a big-screen smart TV.

Router Quality of Service QoS

StreamBoost lets you assign priorities to client PCs, so you can preserve bandwidth for a smart TV at the expense of a PC used for BitTorrent downloads, for instance.

StreamBoost’s bandwidth graphs and tools provide better visibility and more precise tuning than other QoS tools I’ve seen. And if you opt in to participate, you’ll receive ongoing updates from Qualcomm’s database in the cloud so that your router can continually optimize its performance and learn how to handle new devices that come on the market. StreamBoost support alone won’t make a crappy router great, but it can make a difference.

Don’t stop with QoS

Good Quality of Service is essential if you use your network to stream video, play online games, make VoIP and Skype calls, or watch YouTube (and if you don’t do any of those things, you wouldn’t have clicked on this story in the first place). The performance benefits you’ll realize might even save you from moving up to a pricier service tier with your ISP.

Linksys WRT1900AC Wi-Fi router
An 802.11ac router can deliver higher performance even with clients that are equipped with 802.11n adapters.

But there are other things you can do beyond traffic shaping. Perform a site survey using a tool such as Kismet to see which radio channels your neighbors are relying on, and configure your router to use something else. There are only three non-overlapping channels in the 2.4GHz frequency band: 1, 6, and 11. Use one of these if possible.

If you have a dual-band router that supports both the 2.4- and 5GHz frequency bands, use the less-crowded higher frequency for latency-sensitive traffic such as media streaming, and reserve 2.4GHz for things like downloads. There are many more non-overlapping channels at 5GHz, and the higher channels—150 and up—support more bandwidth than the lower channels.

Lastly, if you’re using an 802.11n (or older) router, consider moving up to a model based on the newer 802.11ac standard. Even if your clients are stuck with 802.11n adapters, you’ll still see a significant performance boost with an 802.11ac router.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Sunday, 19 October 2014

10 Tips to Ensure Your IT Career Longevity

Enjoying a long career doesn't happen by accident. It takes planning and effort. Use these tips to get your head in the game and keep your eye on the future.

Many people say that IT and technology are a young man's game, and if you look at most influential tech companies you might agree. Most IT workers employed at those companies there are under 35 and male. However, these big name firms employ only a fraction of tech professionals and there are plenty of opportunities out there for everyone. IT has one of the lowest unemployment rates of any industry because in most organizations technology touches every part of the business.

Be Responsible for Your Own Career
Achieving career longevity in the IT business takes time effort, time and resources -- and nobody but you can organize, facilitate and be responsible for all of it. To stay ahead of the learning curve you need to think about your goals and architect your future.

Many organizations are getting better at providing embedded employee performance and career management processes, according to Karen Blackie, CIO of Enterprise Systems & Data for GE Capital. However, she warns that you are your own best advocate and should always strive to "own" your career. Don't wait for your organization to do it for you because that day may never come.

This means stepping back and thinking about where you want to be in X amount of time and then outlining the different skills and experience needed to get there. With that information you can start mapping out your career. "Doing research into what interests you, setting goals and objectives and then having a plan around how you will accomplish those goals is very important," says Blackie. Remember positions get eliminated and things don't always work out so it's wise to consider alternate paths.

Flexibility and Agility Required
Technology moves at an unprecedented pace, which means you've got to be flexible. "Adaptability is key. CIOs who can't adapt to that change will see themselves - unfortunately - left behind in a competitive job market. But the CIOs who see each new change - whether mobile, BYOD, Cloud, IoT - as an opportunity are the technology executives who will continue to be in demand-- because they've proven that they can leverage new solutions to drive business value, "says J.M. Auron, IT executive resume writer and president of Quantum Tech Resumes.
Learn About the Business

"Having the business knowledge is a key foundational element to one's career, " says GE Capital's Blackie. Being a great developer isn't enough if you plan to climb the corporate ladder. You've got to understand your industry and how your company does business. This kind of data can also help you be a better programmer. By better understanding the business needs it will help you deliver products, software and services that better align with the business.

Always Be Learning
The price of career longevity in the world of IT and technology is constant learning. If you aren't passionate about it or you're complacent, it's easy to find yourself locked into outdated technology and left behind. There are many ways to stay current like a formal college environment or a certification course for example. "It is your career and it is up to you to keep educating yourself," says Robert P. Hewes, Ph.D., senior partner with Camden Consulting Group, with oversight for leadership development and management training.

Professional organizations, conferences, developer boot camps and meet-ups are all great ways to stay abreast in the newest technologies and build network connections within your industry. "It's often a place where you develop life-long friends and colleagues, "says Blackie.

Attend Industry Conferences

Industry conferences are great way to learn about the newest trends in technology as well as network with like-minded people who hold similar interests. Be selective about which conferences you attend and make sure you allot the necessary time to socialize and network with your peers.

"One mistake attendees often make at conferences is filling their schedule so tightly with panels that they miss out on the networking available during downtime. It's important to attend mixers and informal gatherings at conferences to meet your peers and build relationships that could last throughout your career," says Blackie.

Incorporate Time into Your Day for Reading
Set up a little time each day to stay current with the goings-on in your part of technology and beyond. "Become a regular reader of info in your industry, be it an industry journal or an online blog/magazine. There is a lot of information out there. Another quick way to find relevant information is via an aggregator, Pocket and LinkedIn do this," says Hewes.

Google News and a host of other news aggregators like LinkedIn Pulse or Reddit offer a daily stream of news and with alerts and notifications that allow users to focus on key areas of interest.

Pay Attention to Competitors
"It's important to get to know industry competitors and watch what they're doing. You can learn a lot from the successes and failures of your competitors," says Blackie. Being first isn't always required to be successful. Doing it better than the next guy is, however. Find your competitors as well as organizations that you think are thought leaders in your industry and follow them in social media or create a Google Alert for them.

Find a Mentor or Coach

Mentoring is useful at all levels of one's career. A mentor can help you negotiate internal politics or provide insight into how to solve lingering problems. You may also have different mentors throughout your career, each offering a different perspective or expertise.

Understand the Value of Social Media
Not everyone adores social media, but it's a necessary element in the race to separate you from the rest of IT professionals. Build and maintain profiles on relevant social media sites and then use them to explain the value proposition you offer.

Work on Soft Skills and Some Not-so-Soft Ones

Branding Skills

Branding is what help separates you from the rest of the pack and explains what your value proposition is to your employer or prospective employers. "Branding is another key for career advancement - and one that few technology leaders have fully embraced. Giving thought to that brand is key for career longevity and advancement," Auron says.

Communication Skills

According to Auron, the ability to find the right path, communicate value and build enthusiasm is a crucial step in transforming the perception of IT from that of a cost center to that of a business enabler. "The most critical skill is the ability communicates the real value of technology investment to nontechnical leadership. Some technologists can fall into one of two traps: giving so much detail that the audience's eyes glaze over or, appearing patronizing when intelligent - but nontechnical leaders - don't get a specific reference," Auron says.

Project Management Skills

At some point in your technology career you will be asked to lead a project. When the time comes make sure you've got the necessary tools. "It is critical if you are headed onto the management track. In fact, you should try to gain wide experience with all kinds of projects," says Hewes.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Saturday, 4 October 2014

The crazy cellphone ideas of 2004

Take a look back at the futuristic cellphone ideas of a decade ago.


A year is a long time in smartphone technology today, so remember if you can the changes that have taken place over the last decade.

In 2004, Apple had only just started working on development of its iPhone and no one outside the company knew about it, Samsung was focused on the South Korean market, and the hottest thing in wireless was the success of the I-mode mobile Internet service in Japan.

Here's a look back at the futuristic phones on display at ITU's Telecom Asia expo in Busan, South Korea in September 2004.

Samsung Satellite TV Phone
It seems improbable, but satellite TV direct to cellphones was a dream of Japanese and South Korean engineers in 2004. The service was broadcast from a custom satellite and didn't require the bulky dishes usually associated with satellite TV reception in homes. Samsung's SCH-B100 had a flip-out screen for watching the programs and packed an MPEG4 video recorder function with a two-hour memory. The 14-channel service cost US$11 per month at the time and was successful for a while, but was later eclipsed by free terrestrial TV and online streaming. In Japan, the service never achieved success.

Pantech Body Temperature Cellphone
If you think swiping left and right on a bulky smartwatch looks goofy, you probably don't remember Pantech's G670 cellphone. The phone had a body temperature sensor on it's rear that required it to be held up and pressed against the user's forehead to take a measurement.

NTT DoCoMo Fuel Cell Charger
Back then as now, battery life was a headache for phone users. NTT DoCoMo thought it had an answer with a portable fuel cell that could generate power from a little bit of methanol. The idea was that small methanol cartridges would be sold in convenience stores and, when your phone ran out of power, you could snap it in the charger cradle, squirt in some methanol in and back in business. Fuel cells were seen at the time as an answer to the on-the-go charging needs of phone and laptop PC users in part because the power generation was immediate. The charger never came to market, but some companies are still pursuing fuel cell technology.

Samsung Hard Disk Phone
Apple's new iPhone 6 packs as much as 128GB of storage and just this week SanDisk announced a 512GB SD card. Imagine how improbable that sounded in 2004 when Samsung proudly announced the first cellphone in the world ... with a hard-disk drive! The SPH-V5400 was only available in South Korea and packed an impressive (at the time) 1.5GB of storage capacity. The phone also featured an FM transmitter so stored music could be played through a radio.

LG Glucose Monitor Phone
Another phone with a medical twist was LG's KP8400. It had a built in sensor for measuring blood sugar. You'd put a drop of blood onto a glucose testing strip and slide that into a reader embedded in the clamshell phone. After a few moments, the phone would provide the blood sugar reading. There was even a facility to load the data to an online database over the phone's GPRS connection.

Pantech Gaming Phone
It's a gaming device! No, it's a phone! Whatever Pantech's PH S-3500 was intended to be, it was unique. A circular clamshell phone with a circular keypad that probably took a lot of getting used to, especially when tapping out text messages, the phone had a 2.1-inch color display and packed a 3D graphics chip -- a rarity at the time. Unfortunately for Pantech, just three months later Sony released the PlayStation Portable and handheld gaming was changed forever.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Thursday, 4 September 2014

Patch Tuesday: Internet Explorer needs critical patches, again

Microsoft browser needs the most urgent patching on an otherwise light Patch Tuesday

In a very light set of monthly security bulletins, Microsoft will issue just one that it’s ranking critical and it involves Internet Explorer.

If left unpatched, the browser is subject to attacks that execute malicious code on victim machines, so getting the updates to patch it is important, says Ross Barrett, a security engineer at Rapid7. “This will be the top patching priority for this month,” he says.

In addition to the threat posed by the vulnerabilities that the patches correct, these critical browser updates will be challenging for IT organizations, says Eric Cowperthwaite, vice president of advanced security & strategy, Core Security. Installing the updates requires system restarts and the browser in all its versions is widely distributed among organizations. “We don’t yet know if there are active exploits in the wild, but there may well be. And, even if not, this appears to be something that is likely to have exploits developed in the near future,” Cowperthwaite says.

Vulnerable versions include IE 6, 7, 8, 9, 10, and 11 running on desktop Windows Vista, Windows 7 and Windows 8.1 as well as Windows Server 2003, 2008 and 2012.

The bulletin about the Internet Explorer problems is likely to include a roll-up of fixes for any number of vulnerabilities found over the past month, says Ross Barrett, a security engineer at Rapid7.

The rest of this month’s bulletins are rated important, which means that attacks against these vulnerabilities require some action on the user’s part in order to succeed. Still, one bulleting warns against vulnerabilities that could lead to escalation of privilege on compromised Windows 8 and 8.1 machines and Server 2012 and 2012 RT, says Jon Rudolph, a senior software engineer at Core Security.

A third bulletin addresses flaws in Windows Server 2003, 2008 and 2012 and Windows Vista, 7, 8, and 8.1 that could lead to DDoS attacks against the machines. The final bulletin involves Lync Server 2010 and 2013 and also addresses problems that could lead to DDoS attacks.




 
Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


Friday, 29 August 2014

10 things about (the Internet of) things

Floating things, flying things, finding things and fashion things are all part of the Internet of Things. Prepare for a hyper connected future.

We've all heard about the promise of the Internet of Things, where your alarm clock will start your coffee maker and your refridgerator will tell you when it is time to buy new milk. That future is coming -- many think it will even be here by 2025.

But if you can't wait that long for IoT, here are 10 things that are bringing the hyperconnected future to you today.

A better Google Glass
Belgium-based SmartPick may have done more to prove the potential of Google Glass for business use than Google by developing camera-equipped glasses for distribution management. (Video in Dutch.) The product, Smart Glasses, includes a camera and connects via WiFi.

The glasses work by recognizing a code hanging above a basket. This code is relayed to a sales order management system and the amount of product to pull is displayed in the eyeglasses. The company says the technology can reduce product distribution error rates by 60% and improve productivity by 25%. Dirk Matheussen, a former CIO and IT manager who founded the company, is working on an app to allow his system to work with Google Glass.

Small and solar
Tzukuri’s Bluetooth-enabled sunglasses, which can be located via your iPhone, will be welcomed by some. But they are also noteable for the diminuitive technology used and their energy independence.

The Bluetooth Low Energy (BLE) chip inside these glasses is a mere 3mm wide, and there’s no USB charging plug. The sunglasses, which take only an hour to charge, are powered by a solar cell.

Tzukuri’s glasses illustrate how small and low-powered IoT devices can be. The company says it will track the exact proximity of the Tzukuri sunglasses up to 82 feet, depending on environment, and the iPhone app will “pinpoint the exact location” of your glasses. The glasses cost $349 and ship later this year.

Cheap wireless, finally?
The cost of wireless connectivity has become a barrier to IoT deployment. Today, IoT devices are dependent on either a local or cellular network connection, but local networks are limited in range and cellular networks are expensive.

But Sigfox, a French company now deploying in the U.S., uses a low-bandwidth network that at only 100bps gives it long range. Exclusively for machine-to-machine communications, it can't be used for video, voice or blogging. Sigfox base stations can be miles apart, and the cost of using them will range from $1-$12 annually. That means people will eventually be able use connected devices on their person and in their homes and businesses inexpensively and independent of a home network.

Google’s Nest does a lot, could do more
Google’s Nest Protect smoke detector offers Wi-Fi access and has a Zigbee radio that can connect to a low-bandwidth mesh network. In addition to smoke, it also detects carbon monoxide, heat, temperature and humidity and keeps tabs on its own battery charge. When connected to Wi-Fi, users can monitor these things remotely. (Without Wi-Fi, Nest works as a smoke detector.)

Nest offers a variety of useful features, but there's potential for more -- should Google push the technology envelope. It could, for instance, include sensors to detect natural gas, mold, pollen and other problems that can aggravate health issues. Nest could also be set up so it doesn't need Wi-Fi. And it has potential to serve as an inexpensive home monitoring system.

Help save the water
One reason agriculture interests will be big adopters of IoT technologies is better water management. One product, Valley Irrigation's SoilPro 1200, reaches 48 inches into the ground and uses multiple sensors to track temperature, moisture levels and soil electrical conductivity, which provides data on how well the soil is using fertilizer.

The device uses solar panels and a battery for power, and has a cellular connection to transmit data to the vendor’s cloud service that a user can then access. With better info about soil moisture conditions, farmers can avoid wasting water, the company says.

A tracking technology for an intractable problem
In March, 2014, airlines lost or mishandled 3.68 bags for every 1,000 passengers. But baggage location technology won't always mean an airport or airline employee running around fetching lost luggage. That’s why AT&T’s idea of activating a flashing light on a bag to help airport crews find it is interesting.

Bluetooth bag-tracking technologies that will locate a bag if it’s in range, and devices that use a combination of GPS and cellular networks, aready exist. But AT&T, as a major network carrier, may be able to deliver on its idea of integrating baggage location data with airline systems. Might that make it possible to avoid the supreme aggravation of standing in the lost baggage line after a delayed flight?

Does your clothing come with an API?
Wearable clothing still seems like a stretch, but not for OMsignal of Montreal. It says its clothing can track heart and breathing rates, breathing depth, activity intensity, steps and calories burned. Men’s shirts will be available this summer, women’s clothing by the end of year.

OMsignal's garment sensors connect to a little black box that is water resistant. The system relies on Bluetooth, is good for 30 hours and recharges via USB. Open is good: An API and SDK are promised. A men’s bio-sensing compression shirt, one data module and one USB charging cable is priced at $199.

We really do like drones
Amazon certainly popularized the idea of drones as a flying delivery service, but drones will also play a broad role in IoT as flying sensors. They are already being adopted in agriculture, for example, to monitor crop health. The construction industry is using drones to inspect buildings, and they are being used in mapping.

One company, QuiQui, is even preparing to deliver pharmacy prescriptions in San Francisco, while another company, Matternet, is working with drones to deliver medicine and supplies to globally remote locations.

A 3D printer, off-the-shelf sensors and stir
A traditional method for checking water height after a flood involved manually marking water levels on a post from a rowboat. Samuel Cox had a better idea: Flood Beacon. He assembled a microprocessor, accelerometer, ultrasonic sensors, rechargeable battery, cellular GSM and GPS into a floating shell created on a 3D printer. The end result is a device that can measure water turbulence via the accelerometer, and water depth with the ultrasonic sensors.

The data, which is sent to Xively, an IoT-specific cloud firm, can be viewed on a mobile app. It took Cox about six weeks and less than $700 to produce a working prototype, something that would have cost more than $10,000 before 3D printing and the advent of do-it-yourself hardware development.

Smart roads, please
GPS revolutionized the trucking industry and has made driving more efficient for many. But more is possible. The U.S. Dept. of Transportation imagines a future where vehicles communicate with each to avoid crashes. It wants systems that “see vehicles that you can’t see,” and notify of you of road hazards beyond your range of vision.

Some day, sensor-rich systems will be able to tell you the speed and location of approaching vehicles, provide real-time data on travel times and parking costs and manage traffic flow with real-time info. Most importantly, the U.S. wants to reduce motor vehicles crashes, which are the leading cause of death for people between the ages of 4 to 34.




Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, 4 August 2014

Windows 8's uptake falls again, now slower than dud Vista

Windows 8's uptake was stuck in reverse for the second straight quarter as the reputation-challenged operating system fell behind the pace set by Windows Vista six years ago, according to data released Friday.

Web metrics firm Net Applications' figures for July put the combined user share of Windows 8 and 8.1 at 12.5% of the world's desktop and notebook systems, a small drop of six-hundredths of a percentage point from June. That decline was atop a one-tenth-point fall the month before, the first time the OS had lost user share since its October 2012 debut.
MORE ON NETWORK WORLD: 10 (FREE!) Microsoft tools to make admins happier

Windows 8 accounted for 13.6% of the personal computers running Microsoft's Windows. The difference between the numbers for all personal computers and only those running Windows was due to Windows powering 91.7% of all personal computers, not 100%.

While in June Windows 8's user share came dangerously close to the sluggish uptake tempo of Windows Vista, in July Windows 8's pace fell below Vista's for the first time. (Computerworld erred in calling Windows 8's uptake slower than Vista's in the early stages of the former's lifespan based on incorrect comparisons.)

At the point in Vista's post-release timeline that corresponded to July, the 2007 operating system ran on 13.6% of all personal computers -- a larger percentage than Windows 8's last month -- and on 14.3% of all Windows PCs. The latter is the most credible, as it accounts for the slightly-greater dominance of Windows at the time. (When Vista was in its 21st month after launch, Windows powered 94.9% of all personal computers.)

That Windows 8's uptake performance has not matched Vista's is important because the latter, widely panned at the time, has earned a reputation as one of Microsoft's biggest OS failures. By association, then, Windows 8 looks to be the same.

While Windows 8 again lost user share in July, Windows 7 gained another seven-tenths of a percentage point to close the month with 51.2%. It was the fifth straight month that the 2009 operating system has grown its share. The surge has not been surprising, since most industry analysts have said that the recent uptick in computer sales has been due to businesses replacing the now-retired Windows XP with Windows 7.

Windows 7 has grown by nearly twice the amount of Windows 8 in the past six months.

Windows XP's user share fell half a percentage point in July, accounting for 24.8% of all personal computers, and 27.1% of only those running Windows. The decline came after a month where the aged OS remained flat. In the last six months, XP has contracted by 4.4 points.

Computerworld now projects that Windows XP will still be running between 20% and 22% of the world's personal computers at the end of 2014.

Another analytics company, Ireland's StatCounter, had different numbers for Windows. StatCounter's figures are typically at odds with those from Net Applications because they measure with dissimilar methodologies: StatCounter tallies "usage share" by counting page views to show how active users of each OS are on the Web, while Net Applications estimates "user share" by collating unique visitors, which more closely resembles user base than does StatCounter's data.

StatCounter pegged July's Windows 8 and 8.1 usage share at 15%, Windows 7's at 55.3%, XP's at 15.2% and Vista's at 3.5%.

A second straight month of user share decline in Windows 8 put the newest OS behind the post-launch trajectory of the company's Vista flop. (Data: Net Applications.)


MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 4000+
Exams with Life Time Access Membership at http://www.actualkey.com

Tuesday, 15 July 2014

Windows Phone 8.1 and its first update could appear this week

This might be the first time an OS and patch came out simultaneously.

Windows Phone 8.1, the revision to Microsoft's mobile OS that has taken longer to manifest than Windows 8.1, might finally show up this week or next, along with its first update.

Improvements in 10GbE technology, lower pricing, and improved performance make 10GbE for the mid-market

Windows Phone 8.0 came out in October 2012. That's 20 months between major releases if 8.1 shows up this month, longer than the gap between Windows 8 and 8.1, and far, far longer than the updates between iOS and Android.

Fortunately, there's a lot to love in this point release, which is really closer to a full revision. The big addition is Cortana, the voice assistant, along with the App Framework that makes it easier for Windows 8.1 apps to be ported between a PC and phone.

Well, the news site Neowin is claiming that Windows Phone 8.1 has been done for a while, and not only will it be pushed out soon, so will the first update to the OS, called a General Distribution Release (GDR). The GDR will be relatively minor, with a small set of enhancements, such as native folder support. That will enable users to create folders of tiles by dropping a tile on top of another, something iOS and Android have had for a while.

Of course, first thing we need is WP 8.1. Microsoft has kept the release date quiet, but someone from Microsoft India tweeted that the OS could roll out in the first or second week of July. He didn't say if that's for the U.S., India (where WP is popular), or worldwide.

Given the GDR hasn't even shown up on the developer network for testing, we can only take this with a few grains of salt. If Microsoft does indeed have an update ready to go this fast, then it's more evidence of its plans to reduce the time between software updates, something CEO Satya Nadella has promised.

I just hope it does something to get WP moving. This 3% market share is pitiful, as is the lack of apps. As a WP phone owner (Samsung ATIV SE), I'm getting tired of searching for apps and coming up empty. As Beta News noted, the Windows Phone app store is a ghost town, not an encouraging sign for a platform that is solid and should be a lot more popular than it is.

I'm not clamoring to return to the iPhone, but I'm not blindly loyal, either.

Best Microsoft MCTS Certification, Microsoft MCSE Training at certkingdom.com



Sunday, 29 June 2014

Impact of Today’s Hardware and Software Applications in Cloud-based Environments: Part 1

As an industry, we have been looking at cloud-based technologies both from private and public structure and how best to optimize design, engineer and develop such technologies to better optimize the world of wireless and the Internet of Everything.

But one aspect that has not been discussed at length is how poorly hardware and software perform in cloud-based environments. I want to discuss some of the challenges facing the industry and some potential solutions that can help create and bring a new revolution to the world of Wide Area Networks (WAN), along with the automation of practically every human-to-human and human-to-machine interface.

Currently, there are two technologies being discussed in almost every seminar or white paper being published—software defined networking (SDN) and network function virtualization (NFV). While these vary in structure by different vendors, clearly, all of them attack certain aspects of the mobile carrier network or Tier 1 landline networks. Let me give you my two-cents on what these technologies must address:

SDN must create a more agile network with the development of an open northbound interface. This becomes an enabler for service providers (SPs) to reduce time-to-market for service introduction, reduce capex unit cost by focusing network elements (NEs) to just move traffic, and reducing opex unit cost for network services that take significant human capital cost to deliver, such as establishing protection and restoration or provisioning new connectivity services.
NFV must enable SPs to provide new services, and hence, new incremental revenue, by replacing dedicated hardware/software located on the customer premise, e.g., DVR, storage, firewall and others.

Cloud computing, on the other hand, must enable enterprises to leverage shared and scalable computing resources, hardware and software to impact their capex and opex unit costs.

The promise of such technologies has always been for

These promises are expected to deliver much better total cost of ownership (TCO) with lower opex and in essence support moving to a hardware-agnostic or independent model, offering further savings.

About a decade ago, I predicted that the battleground in the 21st century would be all about software and not hardware. Although hardware is needed, it is the role of software to optimize all five functions above using new state-of-the-art technologies such as SDN and NFV.

The problem that can become very complicated is that enterprise customers’ networks and appliances are not designed for multiple tenants, pay-for-play or on-demand services. However, SDN and NFV are fundamentally designed for such functions. That means that it is imperative for CXOs to sponsor corporate-wide programs to move into SDN and NFV, offering capabilities to drive higher revenues while competing for device replacements at the network margins from mobile access points up to wireline or Wide Area Networks.

SDN, by itself, is not really a new technology and has been in existence since 2006. It has been used to mainly improve data center performance, since the concept of big central offices with large Class 4/5 switches are pretty much obsolete in the 21st century.

But SDN has a long way to go to deliver an agile network. Today’s management of transport networks does not match the agility of the cloud-based services being deployed on them. These two have to converge to bring the transport agility into the 21st century for service delivery. Why should it take weeks and months to establish a new enterprise customer on an SP network? Why should it take weeks to provision high-speed point-to-point connectivity with specific protection requirements? SDN has yet to deliver just that.

NFV, in contrast, was introduced between 2010 and 2012 to operators in order to improve service time-to-market and network flexibility and allow a smooth transition to the cloud with significantly lower opex. In my view, the sky is the limit on NFV. For any onsite services (e.g., storage, firewall and DVR), whether today or in the future, NFV gives SPs the opportunity to deliver both consumers and enterprises major benefits, such as having a turn-key solution that lowers costs and improves quality of service (QoS).

The initial applications of SDN and NFV have changed greatly over the past few years. SDN focused mainly on cloud orchestration and networking, while NFV focused on IP-based protocols and capabilities such as DNS, DHCP, DPI, firewalls, gateways, and traffic management.

From my perspective, I believe NFV has already taken over Layer 4-7 of the SDN movement by delivering lower capex and cycle time, creating a competitive supply of innovative applications by third parties and introducing control abstractions to foster innovations that carriers need in order to compete with all over-the-top players.

Let’s also note that the new world requires openness in almost every API layer of the network from access to the core. The issue is legacy systems and processes that need to be changed in order to adapt to the new world of SDN and NFV.

Nowhere is this more critical than the mobile and Tier 1 landline carriers.

In essence, these sectors need to change all analog processes using legacy systems into digital processes, in which NFV can easily fit. That transition may take years, if not a decade, before it is fully implemented.

But the question is whether MNOs and Tier 1 carriers can wait that long to implement NFV and get the most optimized set of solutions in order to compete globally.

My guess is no, they cannot wait and stay competitive. The transition to NFV can be done more quickly, and I'm going to tell you how.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Thursday, 5 June 2014

Sprint near deal to buy T-Mobile USA for $50 billion, reports say

Sprint has reached a deal to buy T-Mobile US for about US$50 billion, according to news reports on Wednesday.

Sprint, owned by Japan's Softbank, would pay about $40 per share for T-Mobile, The Wall Street Journal reported, citing people familiar with the matter. The deal could still fall apart, the Journal warned.
Featured Resource
Presented by Riverbed Technology
10 Common Problems APM Helps You Solve

Such a deal would combine the nation's third- and fourth-largest mobile operators, forming a larger rival to Verizon and AT&T but reducing the U.S. mobile market to just three major national carriers. Because of that change in the competitive lineup, the plan would probably face an uphill battle for regulatory approval.

If regulators rejected the plan, Sprint would have to pay T-Mobile more than $1 billion in cash and other assets, the Journal reported.

Under the proposed terms of the deal, T-Mobile parent company Deutsche Telekom would own 15 percent to 20 percent of the combined company.

Reports of a deal to combine Sprint and T-Mobile have circulated since late last year. Both carriers have struggled against much larger rivals in AT&T and Verizon, and each has only about half as many subscribers as either of the two big players. Just last year, Sprint agreed to sell 80 percent of its shares to Softbank in a deal that gave it a much-needed injection of cash to complete an elaborate network transformation.

However, the U.S. Department of Justice and Federal Communications Commission rejected an earlier attempted buyout of T-Mobile by AT&T, and since then T-Mobile has introduced plans that have helped change the way U.S. carriers sell phones and service. Some federal regulators have indicated they want the U.S. to remain a four-carrier market for just the kind of competitive pressure that an underdog like T-Mobile can put on prices and choice.

Absorbing T-Mobile would also be one more task for a very busy Sprint, which in recent years has been integrating multiple networks while phasing out others.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 4000+
Exams with Life Time Access Membership at http://www.actualkey.com

Monday, 26 May 2014

Five new threats to your mobile device security

I like the IBM Edge conference because it tries to showcase how infrastructure can provide a large company with a competitive edge. While the event clearly contains content on IBM products and services, the emphasis appears to be on getting things. This year's event also offered a snapshot of how IBM is adapting to address one of the most massive changes the technology market has yet made.

Remember, the Fountain of Youth Is a Myth
Perhaps the strongest metaphor for the problem that IBM faces was the opener for the first keynote talk: A brilliant guitarist who's only 11 and has been playing for just three years. (I found that personally depressing.) An older musician soon joined him; he was able to keep up, and perhaps even outplay him, thanks to his experience.

This older musician represents IBM's potential. IBM can never again be an amazing young company, but its experience and history should let it step up and at least match any young firm. The key here is that the older musician matched the younger musician's tune and didn't try to step in with classic rock. IBM must be agile enough to play as well as the young companies entering the market to make its experience seem like an advantage.

As the youngster left the stage, and he was asked who he wanted to be like, he said he just wanted to be himself. There's the problem with the young company - it's still trying to figure out what it will be. That's a painful path that the older company has already completed. IBM knows what it is - and that's the sustaining advantage that any older company must remember. IBM's most iconic CEO, Thomas Watson Jr., said it best: To succeed, you have to be willing to change everything but who you are.

IBM Partnerships, Products Position Company Well
Perhaps IBM's most powerful and interesting move to the sale of the IBM System X group to Lenovo. This goes to the heart of the "change everything" part of the equation. System X wasn't working inside IBM. Lenovo's own server group represents an increasing threat, but it's not growing very quickly. System X brings low margin to IBM, but Lenovo is a low-margin company, so it could take this division and actually increase its margins. In short, IBM is trying to eat its cake and have it, too.

In addition, the ongoing drama between the U.S. and China on data security makes it nearly impossible for U.S. companies to sell in China and vice versa. IBM and Lenovo clearly execute better than most companies, but this issue still hampers them both. The deal surrounding the acquisition provides an answer: Lenovo can take the lead selling IBM products in China, while IBM can take the lead selling products in the parts of the U.S. where this conflict poses problems (such as the U.S. government). Neither company has ever been identified as working against its customers, and both firms' ability to assure a willing outcome should be a common competitive advantage.

That said, IBM does have another clear advantage: Watson. IBM is the only company working on artificial intelligence at enterprise scale, and Watson represents the next big step in real-time applied analytics-based decision support.

Integrated into IBM offerings, this system should significantly improve the decision accuracy of IBM executives and IBM customers as well. Watson stands out in IBM's line as a massive competitive advantage, as it turns the rest of IBM's data analytics solution into something that's nothing short of industry changing.

One IBM customer, a huge healthcare company, said its goal was an enterprise-scale solution using cloud methods and technologies. Buyers at this size need the compliance of an enterprise company and want the cost advantages of the cloud.

Everything Old Is New Again
That's what IBM presented this week - and it demonstrated that IBM's transition to a very different company continues. Once complete, IBM will have offerings such as Watson and partnerships with firms such as Lenovo that are unique, powerful and unmatched in the rapidly changing technology world.

IBM Edge 2014 provided a unique view into the future of at-scale cloud computing infrastructure and the near-term future of IBM as a company that plans to be the very best at providing what you need when you need it.

.MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 3000+
Exams with Life Time Access Membership at http://www.actualkey.com

Monday, 14 April 2014

Browser Security: Most Effective Browsers Against Socially Engineered Malware

NSS Labs recently released the results and analysis from its latest Browser Security Comparative Analysis Report, which evaluated the ability of eight leading browsers -- Apple Safari, Google Chrome, Kingsoft Liebao, Microsoft Internet Explorer, Mozilla Firefox, Opera, Qihoo 360 Safe Browser, and Sogou Explorer -- to block against socially engineered malware (SEM). The use of social engineering to distribute malware continues to account for the bulk of cyber attacks against both consumers and enterprises, thereby making a browser's ability to protect against these kinds of attacks an important criterion for personal or corporate use.

Microsoft Internet Explorer continues to outperform other browsers. With an average block rate of 99.9 percent, the highest zero-hour block rate, fastest average time to block, and highest consistency of protection over time percentages, Internet Explorer leads in all key test areas.

Google Chrome remained in the top three, but its average block rate fell significantly to 70.7 percent, down from 83.17 percent in the previous test.

Cloud-based endpoint protection (EPP) file scanning provides substantial defenses when integrated with the browser. Kingsoft Liebao browser utilizes the same cloud-based file scanning system used by Kingsoft antivirus and had the second highest overall block rate at 85.1 percent, ahead of Chrome by almost 15 percentage points.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Google's Safe Browsing API does not provide adequate SEM protection. Apple Safari and Mozilla Firefox both utilize the Google Safe Browsing API and were the two lowest performing browsers in this latest test. Both also saw significant drops of around 6 percent in their average block rates -- Safari from 10.15 percent to 4.1 percent and Firefox from 9.92 percent to 4.2 percent.

Chinese browsers tested for the first time prove viable. This year, three browsers from China were included in testing for the first time, and Kingsoft's Liebao browser jumped ahead of Google Chrome with an overall protection rate of 85.1 percent. Sogou Explorer had the fourth highest average block rate at 60.1 percent.

Commentary: NSS Labs Research Director Randy Abrams
"Selecting a browser with robust socially engineered malware protection is one of the most critical choices consumers and enterprises can make to protect themselves. Microsoft's SmartScreen Application Reputation technology continues to provide Internet Explorer the most effective protection against socially engineered malware," said Randy Abrams, Research Director at NSS Labs. "This year NSS added three browsers from China. The Kingsoft Liebao browser displaced Chrome from second place by using a combination of URL filtering with the cloud-based file scanning technology that Kingsoft uses for their antivirus product. Sogou Explorer, another browser from China, was the only other tested browser to exceed 50 percent protection against socially engineered malware. Firefox and Safari failed to achieve five percent effectiveness and leave less technical users at considerable risk."

NSS Labs recommendations
Learn to identify social engineering attacks in order to maximize protection against SEM and other social engineering attacks.
Use caution when sharing links from friends and other trusted contacts, such as banks. Waiting just one day before clicking on a link can significantly reduce risk.
Enterprises should review current security reports when selecting a browser. Do not assume the browser market is static.

Friday, 11 April 2014

11 sure signs you've been hacked

11 sure signs you've been hacked

In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

To combat this, many antimalware programs monitor program behaviors, often called heuristics, to catch previously unrecognized malware. Other programs use virtualized environments, system monitoring, network traffic detection, and all of the above at once in order to be more accurate. And still they fail us on a regular basis.

[ Verse yourself in the 7 sneak attacks used by today's most devious hackers, 14 dirty IT security consultant tricks, 9 popular IT security practices that just don't work, and 10 crazy security tricks that do. | Learn how to secure your systems with the Web Browser Deep Dive PDF special report and Security Central newsletter, both from InfoWorld. ]

Here are 11 sure signs you've been hacked and what to do in the event of compromise. Note that in all cases, the No. 1 recommendation is to completely restore your system to a known good state before proceeding. In the early days, this meant formatting the computer and restoring all programs and data. Today, depending on your operating system, it might simply mean clicking on a Restore button. Either way, a compromised computer can never be fully trusted again. The recovery steps listed in each category below are the recommendations to follow if you don't want to do a full restore -- but again, a full restore is always a better option, risk-wise.

Sure sign of system compromise No. 1: Fake antivirus messages
In slight decline these days, fake antivirus warning messages are among the surest signs that your system has been compromised. What most people don't realize is that by the time they see the fake antivirus warning, the damage has been done. Clicking No or Cancel to stop the fake virus scan is too little, too late. The malicious software has already made use of unpatched software, often the Java Runtime Environment or an Adobe product, to completely exploit your system.

Why does the malicious program bother with the "antivirus warning"? This is because the fake scan, which always finds tons of "viruses," is a lure to buy their product. Clicking on the provided link sends you to a professional-looking website, complete with glowing letters of recommendation. There, they ask you for your credit card number and billing information. You'd be surprised how many people get tricked into providing personal financial information. The bad guys gain complete control of your system and get your credit card or banking information. For bad guys, it's the Holy Grail of hacking.

What to do: As soon as you notice the fake antivirus warning message, power down your computer. (Note: This requires knowing what your legitimate antivirus program's warning looks like.) If you need to save anything and can do it, do so. But the sooner you power off your computer, the better. Boot up the computer system in Safe Mode, No Networking, and try to uninstall the newly installed software (oftentimes it can be uninstalled like a regular program). Either way, follow up by trying to restore your system to a state previous to the exploitation. If successful, test the computer in regular mode and make sure that the fake antivirus warnings are gone. Then follow up with a complete antivirus scan. Oftentimes, the scanner will find other sneak remnants left behind.

Sure sign of system compromise No. 2: Unwanted browser toolbars
This is probably the second most common sign of exploitation: Your browser has multiple new toolbars with names that seem to indicate the toolbar is supposed to help you. Unless you recognize the toolbar as coming from a very well-known vendor, it's time to dump the bogus toolbar.

What to do: Most browsers allow you to review installed and active toolbars. Remove any you didn't absolutely want to install. When in doubt, remove it. If the bogus toolbar isn't listed there or you can't easily remove it, see if your browser has an option to reset the browser back to its default settings. If this doesn't work, follow the instructions listed above for fake antivirus messages. You can usually avoid malicious toolbars by making sure that all your software is fully patched and by being on the lookout for free software that installs these tool bars. Hint: Read the licensing agreement. Toolbar installs are often pointed out in the licensing agreements that most people don't read.

Sure sign of system compromise No. 3: Redirected Internet searches
Many hackers make their living by redirecting your browser somewhere other than you want to go. The hacker gets paid by getting your clicks to appear on someone else's website, often those who don't know that the clicks to their site are from malicious redirection.

You can often spot this type of malware by typing a few related, very common words (for example, "puppy" or "goldfish") into Internet search engines and checking to see whether the same websites appear in the results -- almost always with no actual relevance to your terms. Unfortunately, many of today's redirected Internet searches are well hidden from the user through use of additional proxies, so the bogus results are never returned to alert the user. In general, if you have bogus toolbar programs, you're also being redirected. Technical users who really want to confirm can sniff their own browser or network traffic. The traffic sent and returned will always be distinctly different on a compromised computer vs. an uncompromised computer.

What to do: Follow the same instructions as above. Usually removing the bogus toolbars and programs is enough to get rid of malicious redirection.

Sure sign of system compromise No. 4: Frequent random popups
This popular sign that you've been hacked is also one of the more annoying ones. When you're getting random browser pop-ups from websites that don't normally generate them, your system has been compromised. I'm constantly amazed about which websites, legitimate and otherwise, can bypass your browser's anti-pop-up mechanisms. It's like battling email spam, but worse.

What to do: Not to sound like a broken record, but typically random pop-ups are generated by one of the three previous malicious mechanisms noted above. You'll need to get rid of bogus toolbars and other programs if you even hope to get rid of the pop-ups.

Sure sign of system compromise No. 5: Your friends receive fake emails from your email account
This is the one scenario where you might be OK. It's fairly common for our email friends to receive malicious emails from us. A decade ago, when email attachment viruses were all the rage, it was very common for malware programs to survey your email address book and send malicious emails to everyone in it.

These days it's more common for malicious emails to be sent to some of your friends, but not everyone in your email address book. If it's just a few friends and not everyone in your email list, then more than likely your computer hasn't been compromised (at least with an email address-hunting malware program). These days malware programs and hackers often pull email addresses and contact lists from social media sites, but doing so means obtaining a very incomplete list of your contacts' email addresses. Although not always the case, the bogus emails they send to your friends often don't have your email address as the sender. It may have your name, but not your correct email address. If this is the case, then usually your computer is safe.

What to do: If one or more friends reports receiving bogus emails claiming to be from you, do your due diligence and run a complete antivirus scan on your computer, followed by looking for unwanted installed programs and toolbars. Often it's nothing to worry about, but it can't hurt to do a little health check when this happens.

Sure sign of system compromise No. 6: Your online passwords suddenly change
If one or more of your online passwords suddenly change, you've more than likely been hacked -- or at least that online service has been hacked. In this particular scenario, usually what has happened is that the victim responded to an authentic-looking phish email that purportedly claimed to be from the service that ends up with the changed password. The bad guy collects the logon information, logs on, changes the password (and other information to complicate recovery), and uses the service to steal money from the victim or the victim's acquaintances (while pretending to be the victim).

What to do: If the scam is widespread and many acquaintances you know are being reached out to, immediately notify all your contacts about your compromised account. Do this to minimize the damage being done to others by your mistake. Second, contact the online service to report the compromised account. Most online services are used to this sort of maliciousness and can quickly get the account back under your control with a new password in a few minutes. Some services even have the whole process automated. A few services even have a "My friend's been hacked!" button that lets your friends start the process. This is helpful, because your friends often know your account has been compromised before you do.

If the compromised logon information is used on other websites, immediately change those passwords. And be more careful next time. Websites rarely send emails asking you to provide your logon information. When in doubt, go to the website directly (don't use the links sent to you in email) and see if the same information is being requested when you log on using the legitimate method. You can also call the service via their phone line or email them to report the received phish email or to confirm its validity. Lastly, consider using online services that provide two-factor authentication. It makes your account much harder to steal.

Sure sign of system compromise No. 7: Unexpected software installs

Unwanted and unexpected software installs are a big sign that your computer system has likely been hacked.
In the early days of malware, most programs were computer viruses, which work by modifying other legitimate programs. They did this to better hide themselves. For whatever reason, most malware programs these days are Trojans and worms, and they typically install themselves like legitimate programs. This may be because their creators are trying to walk a very thin line when the courts catch up to them. They can attempt to say something like, "But we are a legitimate software company." Oftentimes the unwanted software is legally installed by other programs, so read your license agreements. Frequently, I'll read license agreements that plainly state that they will be installing one or more other programs. Sometimes you can opt out of these other installed programs; other times you can't.

What to do: There are many free programs that show you all your installed programs and let you selectively disable them. My favorite for Windows is Autoruns. It doesn't show you every program installed but will tell you the ones that automatically start themselves when your PC is restarted. Most malware programs can be found here. The hard part is determining what is and what isn't legitimate. When in doubt, disable the unrecognized program, reboot the PC, and reenable the program only if some needed functionality is no longer working.

Sure sign of system compromise No. 8: Your mouse moves between programs and makes correct selections
If your mouse pointer moves itself while making selections that work, you've definitely been hacked. Mouse pointers often move randomly, usually due to hardware problems. But if the movements involve making the correct choices to run particular programs, malicious humans are somewhere involved.

Not as common as some of the other attacks, many hackers will break into a computer, wait for it to be idle for a long time (like after midnight), then try to steal your money. Hackers will break into bank accounts and transfer money, trade your stocks, and do all sorts of rogue actions, all designed to lighten your cash load.

What to do: If your computer "comes alive" one night, take a minute before turning it off to determine what the intruders are interested in. Don't let them rob you, but it will be useful to see what things they are looking at and trying to compromise. If you have a cellphone handy, take a few pictures to document their tasks. When it makes sense, power off the computer. Unhook it from the network (or disable the wireless router) and call in the professionals. This is the one time that you're going to need expert help.

Using another known good computer, immediately change all your other logon names and passwords. Check your bank account transaction histories, stock accounts, and so on. Consider paying for a credit-monitoring service. If you've been a victim of this attack, you have to take it seriously. Complete restore of the computer is the only option you should choose for recovery. But if you've lost any money, make sure to let the forensics team make a copy first. If you've suffered a loss, call law enforcement and file a case. You'll need this information to best recover your real money losses, if any.

Sure sign of system compromise No. 9: Your antimalware software, Task Manager, or Registry Editor is disabled and can't be restarted
This is a huge sign of malicious compromise. If you notice that your antimalware software is disabled and you didn't do it, you're probably exploited -- especially if you try to start Task Manager or Registry Editor and they won't start, start and disappear, or start in a reduced state. This is very common for malware to do.

What to do: You should really perform a complete restore because there is no telling what has happened. But if you want to try something less drastic first, research the many methods on how to restore the lost functionality (any Internet search engine will return lots of results), then restart your computer in Safe Mode and start the hard work. I say "hard work" because usually it isn't easy or quick. Often, I have to try a handful of different methods to find one that works. Precede restoring your software by getting rid of the malware program, using the methods listed above.

Sure sign of system compromise No. 10: Your bank account is missing money
I mean lots of money. Online bad guys don't usually steal a little money. They like to transfer everything or nearly everything, often to a foreign exchange or bank. Usually it begins by your computer being compromised or from you responding to a fake phish from your bank. In any case, the bad guys log on to your bank, change your contact information, and transfer large sums of money to themselves.

What to do: In most cases you are in luck because most financial institutions will replace the stolen funds (especially if they can stop the transaction before the damage is truly done). However, there have been many cases where the courts have ruled it was the customer's responsibility to not be hacked, and it's up to the financial institution to decide whether they will make restitution to you.

If you're trying to prevent this from happening in the first place, turn on transaction alerts that send text alerts to you when something unusual is happening. Many financial institutions allow you to set thresholds on transaction amounts, and if the threshold is exceeded or it goes to a foreign country, you'll be warned. Unfortunately, many times the bad guys reset the alerts or your contact information before they steal your money. So make sure your financial institution sends you alerts anytime your contact information or alerting choices are changed.

Sure sign of system compromise No. 11: You get calls from stores about nonpayment of shipped goods
In this case, hackers have compromised one of your accounts, made a purchase, and had it shipped to someplace other than your house. Oftentimes, the bad guys will order tons of merchandise at the same time, making each business entity think you have enough funds at the beginning, but as each transaction finally pushes through you end up with insufficient funds.

What to do: This is a bad one. First try to think of how your account was compromised. If it was one of the methods above, follow those recommendations. Either way, change all your logon names and passwords (not just the one related to the single compromised account), call law enforcement, get a case going, and start monitoring your credit. You'll probably spend months trying to clear up all the bogus transactions committed in your name, but you should be able to undo most, if not all, of the damage.

Years ago you could be left with a negative credit history that would impact your life for a decade. These days, companies and the credit reporting agencies are more used to cyber crime, and they deal with it better. Still, be aggressive and make sure you follow every bit of advice given to you by law enforcement, the creditors, and the credit-rating agencies (there are three major ones).

Malware vector trifecta to avoid
The hope of an antimalware program that can perfectly detect malware and malicious hacking is pure folly. Keep an eye out for the common signs and symptoms of your computer being hacked as outlined above. And if you are risk-adverse, as I am, always perform a complete computer restore with the event of a breach. Because once your computer has been compromised, the bad guys can do anything and hide anywhere. It's best to just start from scratch.

Most malicious hacking originates from one of three vectors: unpatched software, running Trojan horse programs, and responding to fake phishing emails. Do better at preventing these three things, and you'll be less likely to have to rely on your antimalware software's accuracy -- and luck.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 3000+
Exams with Life Time Access Membership at http://www.actualkey.com