30 November 2014

Social Media Jobs

Social media has transformed the way people socialize, network and stay in touch. We've seen large social networks like
Social Media Jobs
Social Media Jobs
MySpace and Friendster come and go, and other ones like Facebook, Twitter, Foursquare and LinkedIn completely transform and redefine our online trends.
One thing is abundantly clear: social media is now necessary for global commerce, and 2014 will be the catalyst for vital social media marketing positions. 
 
Social media is more than liking or retweeting a post; it's a new, cutting-edge marketing medium with unlimited potential. According to Constant Contact's Small Businesses: Then and Now Survey conducted in May 2013, social media marketing has exploded, with 87 percent of small businesses using social media as a marketing tool today.

Since social media marketing requires a combination of analytical skills, good communication and performing extensive research, you can bet business, communications and English-related degrees are good candidates for 2014 social media job openings.

Explore the new frontier of marketing with these six up-and-coming social media positions:

  1. Search engine optimization (SEO) specialist
  2. Social media strategist
  3. Online community manager
  4. Social media marketing manager
  5. Social media marketing coordinator
  6. Blogger or social media copywriter

Cloud Security Rules - Good to Start

The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud.

This book is made to help it easier for you to choose the right cloud supplier as well as setting up and running your critical services in the cloud. Questions you will find answers about include: - Do I have to accept that standard SLA? - What should an SLA include? - What standards should I be paying attention to, if any? - How do I treat mobile workers, and how do they fit into the cloud? - Do I really need to care about logging? - Many more! Since the cloud computing is global, you risk using service providers in other countries than your own - even if you only operate in your own country. The Cloud Security Rules aims at helping you understand the risks involved, and help you determine the best strategy for your organization.

29 November 2014

Top 6 Cloud Security Training institutes for developers

[Cloud security Training Institutes]
[Cloud security Training Institutes]

1.Cloud Security Hands-On Training

This course provides a solid foundation in cloud security, and includes a full day of hands-on labs to apply the principles in practice. We cover all the material needed to pass the Cloud Security Alliance Certificate of Cloud Security Knowledge (CCSK) exam, but add a pragmatic approach to immediate kick start your cloud security projects. For Black Hat we also add expanded material to show you how to take cloud security to the next level by leveraging DevOps techniques and the characteristics of the cloud.
An overview of security issues within each of these models will be covered with an in-depth discussion of the risks involved. This cloud security training course will go in-depth on architecture and infrastructure fundamentals for private, public and hybrid clouds, including a wide range of topics such as patch and configuration management, virtualization security, application security and change management. 

3.Institute of information Security

In this course, we shall first discuss the characteristics of cloud computing and later on focus specifically on cloud security’s best practices taking reference from industry standards like NIST, OWASP, Cloud Security Alliance etc. We then look into the broad set of policies, technologies, and controls deployed to protect client data, applications and infrastructure associated with cloud computing.


4.Cloud Security Training

In this course you will learn Virtualization Concepts and security, Risk Assessment on Cloud Migration and Emerging Threats

5.Certification in Cloud Security



6.Cloud Security Essentials

In this course you will learn about cycber cloud and mobile security concepts.

Top IT Skills 2015


IT spending for security technologies will increase 46% in 2015, with cloud computing increasing 42% and business analytics investments up 38%. Enterprise investments in storage will increase 36%, and for wireless and mobile, 35%.

IT spending for security technologies will increase 46% in 2015, with cloud computing increasing 42% and business analytics investments up 38%.

Cloud computing initiatives are the most important project for the majority of IT departments today (16%) and are expected to cause the most disruption in the future. IDG predicts the majority of cloud computing’s disruption will be focused on improving service and generating new revenue streams.

These and other key take-aways are from recent IDG Enterprise research titled Computerworld Forecast Study 2015. The goal of the study was to determine IT priorities for 2015 in areas such as spending, staffing and technology. 

Computerworld spoke with 194 respondents, 55% of which are from the executive IT roles. 19% from mid-level IT, 16% in IT professional roles and 7% in business management.  You can find the results and methodology of the study here.

26 November 2014

Tech Mahindra Launched Big data platform

Tech Mahindra has announced the launch of Usage Based Insurance (UBI), a big data and predictive
analysis driven platform for auto insurers. It allows them to adjust premiums according to actual usage patterns of individual drivers instead of industry averages.

The platform is flexible to fit to the growing needs of global insurance enterprises, where the market is expected to grow $100 billion plus by the end of the decade.

The solution utilizes the capabilities of Tech Mahindra and AT and T in the areas of multi-vertical, engineering and infrastructure capabilities. As a result of this, the global insurers can reduce their claim costs by up to 20%,while reducing eligible insured driver premiums up to 40%. This Usage Based Insurance solution is hosted on the seamless AT&T cloud and served through AT and T's global Machine-to-Machine (M2M) capabilities.

More: Read Full story here


What is usage based insurance

This technology is already being used successfully for both car and motorcycle insurance in many
international markets such as Canada, France, Norway, parts of Latin America and the US. There have been trials and implementations for government insurers, commercial fleet insurers, driving schools and graduated drivers licensing programs – and these has already proven significant improvements in combined loss ratio s, customer acquisition and service costs and customer retention.

“Pay As You Drive” insurance solutions will be an important growth trend for the next decade. Not only do they respond to the impending need for insurers to design differentiated,
personalised products, they help build stronger, more frequent, engaging and meaningful relationships with customers all while improving underwriting and rating methodologies in what is a highly competitive and commoditised market.

A typical UBI solution implementation timeline is around 6-9 months and consists of the UBI configuration and product design, actuarial analysis and market research, systems integration, website and portal development, launch/rollout and all the related change management support required.

23 November 2014

Cloud Security - Challenges

The challenge in addressing this threats of data loss and data leakage is that "the measures you put in place to mitigate one can exacerbate the other," according to the report. You could encrypt your data to reduce the impact of a breach, but if you lose your encryption key, you'll lose your data. However, if you opt to keep offline backups of your data to reduce data loss, you increase your exposure to data breaches.
The second-greatest threat in a cloud computing environment, according to CSA, is data loss: the prospect of seeing your valuable data disappear into the ether without a trace. A malicious hacker might delete a target's data out of spite -- but then, you could lose your data to a careless cloud service provider or a disaster, such as a fire, flood, or earthquake. Compounding the challenge, encrypting your data to ward off theft can backfire if you lose your encryption key.
Data loss isn't only problematic in terms of impacting relationships with customers, the report notes. You could also get into hot water with the feds if you're legally required to store particular data to remain in compliance with certain laws, such as HIPAA.

The third-greatest cloud computing security risk is account or service traffic hijacking. Cloud computing adds a new threat to this landscape, according to CSA. If an attacker gains access to your credentials, he or she can eavesdrop on your activities and transactions, manipulate data, return falsified information, and redirect your clients to illegitimate sites. "Your account or services instances may become a new base for the attacker. From here, they may leverage the power of your reputation to launch subsequent attacks," according to the report. As an example, CSA pointed to an XSS attack on Amazon in 2010 that let attackers hijack credentials to the site.

Read more.

20 November 2014

The best career skills need for Social media platform

How-to-apply-social-media-analytics-for-all-it-developers
#How-to-apply-social-media-analytics-for-all-it-developers
Listening - This one is still very much true, and perhaps even more so. The best social media pros listen the most actively and most aggressively.
Pattern Recognition - This is getting more and more critical as the data and complexity of social continues to ratchet up. Are these posts on our Facebook page a crisis in the making, or just noise? Where are the real-time marketing opportunities? Instantly identifying patterns and being able to capitalize upon them are some of the skills that separate good social practitioners from great ones.
Visual Thinking - This is perhaps the biggest change in the past year or two. Being a great writer was formerly a key characteristic of many social pros, as being able to coherently write in 140 characters isn’t as easy as it appears. Today, with every social network embracing visuals and multi-media, being able to represent the brand visually is absolutely critical. This is a real challenge for many community managers who come from the PR/communications side of things, and all of a sudden need to be quasi graphic designers. I’m a big believer in social media pros taking photography classes in 2014.

16 November 2014

Data Security - Safetly Storing Data In Cloud

What exactly is the cloud? It is basically the collection of computers on the internet that companies are using to offer their services.  One cloud service that is being offered is a revolutionary storage method for your data. From music files to pictures to sensitive documents, the cloud invisibly backs up your files and folders  and alleviates the potentially endless and costly search for extra storage space. An alternative to buying an external hard drive or deleting old files to make room for new ones, cloud storage is convenient and cost-effective.

It works by storing your files on a server out in the internet somewhere rather than on your local hard drive.  (For a more technical discussion of cloud computing basics, read more here.) 

This allows  you to back up, sync, and access your data across multiple devices as long as they have internet capability.

Read more

Data Analytics Engineers - Salaries

Data Analytics Engineers - Salaries
#Data Analytics Engineers - Salaries and career options:
Some key skills which are very crucial for an employee these days are the ability to communicate disruptive ideas, multi-disciplinary skills with appropriate depth of specialisation, learnability and resilience," said Prithvi Shergill, chief human resources officer, HCL Technologies, the country's fifth-largest technology company.

So, an engineer with 2-3 years' experience working in data analytics can expect a salary of Rs 4-6 lakh in India and $70-80,000 in the US or Europe. 
But without big data skills, the same engineer can earn only Rs 3-5 lakh, according to Anurag Gupta, chief operating officer at Magna Infotech, an IT staffing firm.

  • Experience of 5-6 years in data analytics can help an engineer command a salary of up to Rs 10-12 lakh in the domestic market, according to Kamal Karanth, India MD of staffing firm Kelly Services.
  • Firms like IPsoft, Happiest Minds and Mu Sigma, operating in automation, mobility and analytics solutions as well as cloud-based deployment, are competing in areas that are seeing the fastest growth for the country's IT players. Digital technologies contribute 5-10% of the industry's revenue, according to the National Association for Software and Services Companies.

New York-based IPsoft, which has a facility at Bangalore, pays employees with proficiency in data analytics up to 20% more than what it pays for engineers with proficiency in just coding. The privately-held company has 1,700 employees across 10 offices globally.

"There are fewer than 50,000 machine-learning scientists in the world today who can make sense of big data science," said Arnab Gupta, founder CEO of Opera Solutions, the New Jersey-based predictive analytics firm. Read more.

15 November 2014

Top course contents to learn in Cloud computing

Cloud course contents
Top 20 modules or contents must to learn wherever you take course on cloud computing. The list fully analyzed from various sources and finalized.

Module 1

Fundamental Cloud Computing: Concepts, terminology, technologies, benefits,  challenges, SLAs and business cost metrics associated with cloud computing are covered, along with SaaS, IaaS, PaaS delivery models, common cloud deployment models, and cloud characteristics.

Module 2: Cloud Technology Concepts
Cloud Technology Concepts: This course covers a range of topics related to cloud computing mechanisms, cloud security threats and controls, and essential cloud technologies. Also addressed are testing, cloud storage, industry standards, and emerging technologies and trends.

Module 3: Cloud Technology Lab
Cloud Technology Lab: A hands-on lab during which participants apply practices, mechanisms, and technologies to design cloud-based service architectures in order to solve a set of complex problems.

Module 4: Fundamental Cloud Architecture

Fundamental Cloud Architecture: This course delves into the technology architecture of cloud platforms and cloud-based solutions and services by exploring a series of new cloud computing mechanisms and their utilization via a set of cloud computing design patterns.

Module 5: Advanced Cloud Architecture

Advanced Cloud Architecture: Advanced technology architecture topics are addressed in this course with a focus on complex cloud-based solution design, including the incorporation of hybrid cloud deployment models, compound design patterns, and solution architectures that span cloud and on-premise environments.

Module 6: Cloud Architecture Lab

Cloud Architecture Lab: A hands-on lab during which participants apply the patterns, models, concepts, techniques, and mechanisms covered in previous courses, in order to complete a series of architectural and design exercises.

Module 7: Fundamental Cloud Security

Fundamental Cloud Security: This course dives into the implementation technologies behind the cloud security mechanisms first introduced in Module 2, and further explores how these mechanisms and associated security technologies can be configured and combined to establish a cloud security architecture.

Module 8: Advanced Cloud Security

 Advanced Cloud Security: Complex security topics are addressed by this course, which introduces a set of security design patterns that address the application of cloud security mechanisms and technologies in order to establish sophisticated, custom security controls for preventative and reactionary responses to common threats and attacks.

Module 9: Cloud Security Lab

Cloud Security Lab: A hands-on lab during which participants apply the patterns, concepts, techniques, and mechanisms covered in previous courses, in order to complete a series of exercises that present real-world security problems.

Module 10: Fundamental Cloud Governance

Fundamental Cloud Governance: This course covers the essential building blocks required to establish a governance system for cloud environments. Topics include the definition of cloud governance precepts, roles, practices, and processes, along with coverage of common governance challenges and pitfalls specific to cloud computing.

Module 11: Advanced Cloud Governance

Advanced Cloud Governance: Advanced cloud governance topics are addressed by this course, which focuses on establishing complex regulatory controls and precepts for a range of cloud-based IT resources and solutions, and further delves into technologies suitable for automating internal and remote cloud governance tasks.

Module 12: Cloud Governance Lab

Cloud Governance Lab: A hands-on lab during which participants apply the patterns, models, concepts, techniques, and mechanisms covered in previous courses, in order to complete a series of architectural and design exercises.

Module 13: Fundamental Cloud Storage

Fundamental Cloud Storage: This course expands upon the cloud storage topics introduced in Module 2 by further exploring cloud storage devices, structures, and technologies from a more technical and implementation-specific perspective. A set of cloud storage mechanisms and devices are established, along with in-depth coverage of NoSQL and cloud storage services.

Module 14: Advanced Cloud Storage

Advanced Cloud Storage: A number of advanced topics are introduced in this course, including persistent storage, redundant storage, cloud-attached storage, cloud-remote storage, cloud storage gateways, cloud storage brokers, Direct Attached Storage (DAS), Network Attached Storage (NAS), Storage Area Network (SAN), various cloud storage-related design patterns, and the overall information lifecycle management as it applies specifically to cloud-hosted data.


Module 15: Cloud Storage Lab

Cloud Storage Lab : A hands-on lab during which participants apply the patterns, concepts, practices, devices, and mechanisms covered in previous courses, in order to complete a series of exercises that pertain to solving cloud storage problems and creating cloud storage architectures.

Module 16: Fundamental Cloud Virtualization

Fundamental Cloud Virtualization: Core topic areas pertaining to the fundamental virtualization mechanisms and types used within contemporary cloud computing platforms are explored, along with various key performance indicators and related metrics.

Module 17: Advanced Cloud Virtualization

Advanced Cloud Virtualization: A range of specialized and advanced design patterns that build upon Module 16 to explore virtualization-related reliability, performance and integration, as well as combinations of mechanisms are covered, whereby the problem scenario, application, and solution are presented for each individual design pattern.

Module 18: Cloud Virtualization Lab

Cloud Virtualization Lab: A hands-on lab during which participants apply the models, concepts, and techniques covered in previous courses, in order to complete a series of complex exercises that enable participants to demonstrate proficiency in applying design patterns to solve common problems in cloud-based environments.

Module 19: Fundamental Cloud Capacity

Module 20: Advanced Cloud Capacity

Module 21: Cloud Capacity Lab

References

SMAC - $1 Trillion Industry By 2020

At least 5-6 lakh people will soon be employed in the space, according to Ganesh Natarajan, CEO, Zensar Technologies

The size of the overall SMAC industry globally will be close to $1 trillion by 2020. From the Indian software exporters’ point of view, it will be $15 billion within the next three years, and over $ 225 Billion by 2020.
Translating that to people it would mean at least 5-6 lakh people employed in this space by that time.
Zensar Technologies has a Digital Enterprise group focusing on digital transformation solutions, where we work with clients in the US, Europe and India to understand what applications can be taken to the Cloud, which is almost 30 per cent of the SMAC opportunity.
The second area is Social Listening involving analysis of information on the social media. Zensar provides a service that will enable our clients, especially those who are interacting with consumers directly and often, like insurance companies, retail banks, etc. on how to improve their marketing initiatives or service quality etc. This service involves a rich interweave of social media monitoring and applying analytics to it to help the client make informed decisions and very often in real time. A lot of marketing analytics is based on what is happening in the social media today. Increasing number of users are the Gen Y, and being digital natives their access to social media and their use of it for any transaction is immense, thus churning out a lot of data all the time. Big Data is about combining intelligence from your own measuring systems with what the world is talking about you.

14 November 2014

SMAC-Persistent Systems

The global leader in software product and technology services, today announced it has entered into a definitive agreement to acquire privately-held CloudSquads, an innovative consultancy that has created social communities for over 70 global companies. CloudSquads deploys, integrates and runs social communities on all leading social customer platforms.  Terms of the agreement were not disclosed and are subject to certain closing conditions which are expected to be completed in the coming financial quarter.

According to Forrester Research Senior Analyst, Kim Celestre in her July 9, 2013 blog post entitled Just Published: The Forrester WAVE: Social Depth Platforms, Q3 2013, “Social media has transformed the way that buyers discover, explore, and engage with a brand. As a result, many marketers have invested in establishing a presence on popular social networks like Facebook and Twitter yet are struggling with how to convert interactions on these social networks to a purchase.”
CloudSquads helps companies develop a strategy for engaging with the modern social customer across all customer facing functions including brand, marketing, sales and support.  The company implements platforms which provide rich capabilities that transform these interactions into healthy communities and then integrates those platforms with companies’ internal systems allowing them to better know and serve their customers.
“Social Communities are now an increasingly critical part of the digital transformation in enterprises, and this market is poised for significant growth. Persistent Systems is delighted to welcome on board the entire CloudSquads’ team of social computing domain and technology specialists,” said Ranga Puranik, President, Persistent Systems, Inc. “CloudSquads complements our software product development and SMAC (Social, Mobile, Analytics, Cloud) technology expertise with consulting, IP connectors and implementation services around social community platforms and is perfectly aligned to better serve our ISV and enterprise customer base.”

09 November 2014

Bank ATM Analytics - SAP Hana

Problem:

ATM(Automated Teller Machine) has become an integral part of our society. Recent estimates developed by ATMIA place the number of ATMs in use currently at over 2.2 million, or 1 ATM per around over 3000 people in the world. If we think of very specific banks than a recent information in wikipedia states that SBI Group (State Bank Of India) has around 45000+ ATM. So we see the numbers are huge. But there is a very big problem and i would like to use a typical example from India to illustrate this. Here, many times the ATM runs out of currency notes of specific denomination as lets say Rs 100. The end consumer is left with the option of either accepting currency of higher denomination or seek a different ATM. Here we also have a charge applied by the bank if a consumer withdraws money from a ATM of a bank different from the one in which he holds his account.
Now this is a major inconvenience for the end consumer and also a loss for the bank as their reputation is effected.

Latest Trends in Data Analytics - Speed of NOSQL

Traditional database theory dictates that you design the data set before entering any data. A data lake, also called an enterprise data lake or enterprise data hub, turns that model on its head, says Chris Curran, principal and chief technologist in PricewaterhouseCoopers’ U.S. advisory practice. “It says we’ll take these data sources and dump them all into a big Hadoop repository, and we won’t try to design a data model beforehand,” he says. Instead, it provides tools for people to analyze the data, along with a high-level definition of what data exists in the lake. “People build the views into the data as they go along.

It’s a very incremental, organic model for building a large-scale database,” Curran says. On the downside, the people who use it must be highly skilled
Speed of NOSQL
Alternatives to traditional SQL-based relational databases, called NoSQL (short for “Not Only SQL”) databases, are rapidly gaining popularity as tools for use in specific kinds of analytic applications, and that momentum will continue to grow, says Curran.
Read more 

Featured post

10 top Blockchain real features useful to financial projects

Blockchain is basically a shared ledger and it has many special features. Why you need it. Business transactions take place every second...

Most Viewed