Senin, 28 November 2011

Best IT Certifications for 2011

IT certifications are a way to certify and validate an individual's IT skills. There are many IT certifications available from a number of institutions. But which are the best and most rewarding ones to pursue in 2011? Read on to learn more.

An IT certification is no ordinary exam. It is not a simple case of studying from textbooks and study material. IT Certifications require a good combination of practical and technical know-how. While majority are multiple choice questions, some certifications require a practical exam or on-job experience. In the ever changing IT market of today, a certification is an important piece of paper, for both experienced and fresh candidates. In this article, the best IT certifications for 2011 are listed, with a short description of each.

Why is an IT Certification Needed?

Certifications provide that much-needed edge, that differentiates one professional from the other. It gives experienced workers a chance to update themselves in their respective areas of expertise. Instead of going in for another degree, they can add to their education with a certification. Certifications prove how dedicated a professional is to the field they work in.

For fresh graduates, it gives them a hiring advantage over their competitors. It is a given IT industry fact, that an inexperienced but certified professional, is a better choice than an uncertified one. A certificate can be used as a proof of competency. And for the inexperienced, certification knowledge is more valuable for a job, than what they might have learned during their education. For example, during a four-year degree course in engineering, one learns a little bit of different languages, like Java or SQL. But at the hiring time, if certified in SQL, that individual is more valuable, since he is already well versed in the specific technology.

Best In Demand IT Certifications for 2011

Microsoft Certified Technology Specialist (MCTS): This certification tests your skills and expertise in a specific technology. For example, the MCTS ASP.NET certification focuses on the .NET 3.5 ASP.NET suite. There are currently 20 specializations, with 5 broad subject categories which are Office, .NET framework, SQL Server, Windows and business intelligence. This is the first level of certification exams for Microsoft.

Microsoft Certified IT Professional (MCTIP): This certification is extremely useful for experienced professionals, as it validates the skill set to perform a particular job role. It tests the ability of the candidate, to use Microsoft technologies in performing an IT job role, like database administrator or server administrator. To give this exam, one or more compulsory MCTS certifications must be obtained first.

A+: This is a vendor neutral certification, that covers multiple operating systems and technologies. This certification ensures basic knowledge of software and hardware components. It is intended for professionals, with at least 500 hours of hands-on experience, as the questions are based on practice, not theory. The A+ certification is especially used as a bench mark for computer support technicians, as the key exam areas are installation, networking, maintenance and troubleshooting of computer systems.

Apple Certified Technical Coordinator (ACTC): For those interested in working with the Mac OS X, this is one rare and necessary certification. It targets entry-level system administrators, who provide support for and maintain Mac OS X client server environment.

Red Hat Certified System Administrator (RHCSA): Red Hat certifications are the best and most sought-after Linux certifications. They carry out actual practical exams, instead of the normal multiple choice questions. The RHCSA is the entry level-exam to pursue a Red Hat certification. It deals with basic system administration and there is no experience prerequisite. It is the mandatory base for higher Red Hat certifications like RHCE.

Certified Information Systems Security Professional (CISSP): A certification from the non profit International Information Systems Security Certification Consortium (ISC2). It deals with information and network security, highly important subjects in any industry and organization. This particular certification is accredited by ANSI, and is highly regarded as an information systems standard. It requires a minimum of 5 years, full-time, security work experience.

Certified Ethical Hacker (CEH): An ethical hacker or penetration tester is employed by a company, to attempt to penetrate or hack into the network or computer systems, so that weaknesses and failings in their security system can be exposed. As illegal hacking is rapidly becoming a serious threat in any organization, ethical hacking is gaining popularity as a popular testing method for network security. This vendor neutral certification is provided by the International Council for E-Commerce Consultants.

Global Information Assurance Certification (GIAC): One of the leading institutions handling information security certifications, in a number of security disciplines. GIAC measures an individual's specific knowledge areas in the field of information security, for nearly 20 job specific responsibilities, like firewall analyst, intrusion analyst or security expert to name a few. It is a highly valued certification institute in the field of information security.

Cisco Certifications: The networking field is the fastest and best IT field in terms of growth and opportunities. And Cisco is the brand leader in networking certifications. For any level of networking expertise, be it entry or experienced, Cisco has a certificate and in a variety of networking subjects like security, installation and design. Here are some of the best IT certifications for networking from Cisco:
  • Cisco Certified Entry Networking Technician (CCENT)
  • CCNA (Cisco Certified Network Associate) in Security, Voice, Wireless, Routing and Switching
  • Cisco Certified Security Professional (CCSP)
  • Cisco Certified Wireless Professional (CCNP Wireless)
  • Cisco Certified Network Professional (CCNP)
Project Management Professional (PMP): This certifies the management know-how and skills of an IT professional, in handling projects and tasks at a managerial level, within a budget and time limit. Its prerequisite is educational qualifications and experience. A PMP is a renowned and internationally accepted certification in the management field.

Those were some of the best IT certifications available. IT certifications have been a source of debate for industry experts. In recruiters minds, the key factor for deciding to hire an individual is experience. And unfortunately, a certification cannot replace experience. Also, you can get pigeonholed into that technology, and your company might hesitate to promote you. Find out if a certification will result in a pay raise or make you considerable for a promotion. And see how flexible your timings and schedule is, so that you can actually study for the exam. In the long run, your talent and skills are the key point to your success in the IT field.

Read More:
http://www.buzzle.com/articles/best-it-certifications-for2011.html

Jumat, 18 November 2011

Types of Social Influence

Whether we realize it or not, our behavior and habits are influenced by other individuals in society. The way in which they influence us can be studied under the different types of social influence. In this following article, we will try to shed light on the various types of social influence, the way they work and their distinguishing factors.
Given that man is a social animal and lives as a part of this society, it is safe to assume that there are certain behavioral patterns, habits, feelings and attitudes that come about, or are influenced in either a small or a major way due to other human beings in society (words, actions or the mere presence). Simply put, this concept is known as social influence. Think about it for a minute - from something as simple as learning manners, or the things we buy, to something more complicated like the opinions we form about others; or something like the way we behave in certain social settings, it is all influenced by other individuals (whether we do it consciously or unconsciously). All these habits and behavioral patterns come about due to social influence, and that is exactly what we will be studying in the following sections.

Types of Social Influence on Behavior

The concept of social influence can be broadly classified under three major types. These being:

* Conformity
* Compliance
* Obedience

These concepts will give us a clear idea about why we are influenced by others and the way in which it happens.

Conformity

Conformity is the need to conform or fit in. Individuals bring about a change in their thoughts, feelings, behavior and habits in order to conform, belong or fit in with a group or a person whom they look upon as a superior. The need to conform stems from two basic needs - One, we want to be right (Informational Social Influence) and two, we want others to like us (Normative Social Influence).

Informational Social Influence
It has been seen that in a given situation, when we aren't sure about the right course of action to take, we usually turn to others for help with the assumption that they know what is the right thing to do. They may or may not be right, but we tend to follow them. This concept is also known as social proof. Thus we follow others because we think that they possess more knowledge than us and following them will mean that we are doing the right thing. An example of this is herd behavior.

Normative Social Influence
This form of influence stems from our need to be liked by others. That is why we will follow certain behavioral patterns in order to conform to others' expectations. Depending on how influential or popular a person or group is and how important their approval is for one, they will follow suit just so that they are liked by them. An example of this is peer pressure.

Experiment
The first person to study conformity in a lab setting was Solomon E. Asch. He put forth a theory which stated that people tend to conform to a group even when the group might be wrong. In order to prove this, he set up an experiment whereby he introduced a line of a particular length and then placed 3 lines against it asking the subjects to choose one that was of the same length as the standard line. They had to undergo 18 trials of the same, and one of the subjects was deliberately asked to give the wrong answer in 12 trials. It was observed that 76% of the people conformed to the wrong answer even when it seemed that the choice was clear.

Compliance

In a social setting, we comply or follow others in order to be more like them. This comes about as a form of submission where we either follow their request (implicit or explicit) out of our own free will or we are coerced into submission due to the fear of social rejection or punishment. Therefore, compliance could bring about a change in behavior, but not necessarily in the attitude.

Getting others to comply to our request requires persuasion. Based on this theory, there are 8 techniques or tactics of persuasion that have been observed. Let's take a brief look at these in the following section.

1. Ingratiation
This persuasion technique follows the principle of becoming more likable to the subject. In order to do this, 3 basic forms are used: One - flattery and compliments, two - agreeing with and accepting others' opinions, and three - emphasizing the positive attributes and values of one's own self.
2. Foot-in-the-Door
In this technique, a smaller request is followed up by a bigger request and the subject usually complies because of the bond that is created. The way in which this works is that the first request is not very significant and therefore the subject goes along willingly, therefore when the bigger request is made, the subject feels obligated to go along as well.
3. Low-Ball
In this persuasion technique, the initial offer is presented in a very attractive way such that the subject agrees to buy it or go along with it. Only when the subject has fully bought into the idea does the persuader tell him/her about the downside of the product or increase the price (for example). By then, the subject has already agreed and goes along with it.
4. Door-in-the-Face
In this technique, the persuader will make a very large request, which is very excessive and will most likely be turned down by the subject. Immediately after this, the person will make a request that is smaller and more reasonable in comparison. This works on the principle that the subject will be guilty at having turned down the persuader and will want to make up for it. Add to that the fact that in comparison to the initial request, the second request is much more reasonable and therefore, more easily followed.
5. That's-No-All
In this method of persuasion, the persuader will present the things in a 'build up' format. He will offer a product and then slowly add the increments/discounts, free products and the like. This works on the principle that the subject feels obligated to buy the product because the persuader is making so many concessions.
6. Playing hard to get
In this technique, the persuader will put forth a product as something that is very valuable and hard to get. Thus, the general mood is created that if the subject does not go in for the product or scheme, then he is losing out on something very valuable.
7. Fast approaching deadline
This form of persuasion works because it has a sense of urgency to it. The product or scheme is made valuable because the subject is given the impression that this is the last time that he/she can avail of this scheme. If they don't, they can never get such a great scheme again.
8. Putting others in a good mood
This technique is also known as 'the wining and dining technique'. In this, the subject is put in a good mood by employing different methods (like treating him to a meal) and only when the subject is ensured of being in a good mood is the product or scheme put forth. When a person is in a good mood, he/she will not usually refuse a request.

Obedience

Obedience is the quality of bringing about a change in one's behavior and habits by obeying a command that has been put forth by an authority figure. It is different from compliance and conformity in the way that in both these forms of influence, there is a choice that is available. A person may or may not agree to the terms; however, in obedience, a person feels like he/she has no choice and that he/she has to agree. There are two forms of obedience - Constructive and Destructive.

Constructive Obedience
For any society to function well enough, there have to be certain authority figures who will yield the power to bring about a positive change in society. When an authority figure commands a person/a group of people and obeying him is going to benefit the society, then that is known as constructive obedience. An example of this form of obedience is military training camps or the legal system.

Destructive Obedience
This form of obedience is called so because, it leads to the harm of individuals and the society. It has been seen that people who obey authority figures, even while being aware that it could harm people, do so only because there is an innate need to follow and obey authority figures in command. An example of this form of obedience is the Holocaust where innocent Jews were killed by the Nazis.

Experiment
The concept of destructive obedience was first brought forth by an experiment conducted by Stanley Milgram. In the Milgram experiment, volunteers were invited to take part in a study/survey on learning and memory. One of them was asked to be the learner and the other, the teacher. The teacher was asked to administer electric shocks and increase the intensity of the same with every wrong answer that the student gave. The teacher was asked to strap the student onto an electric chair and a mild shock was given to the teacher himself so that he would know how it felt (you can read about the experiment in more detail with the help of the above link).

It was observed that the teacher continued to administer shocks, increasing the intensity of them for every wrong answer that the student gave (taking it to the highest level). This was done even when he knew that the subject was in pain. He did this only because he was ordered to do so by an authority figure who was present there. This experiment showed that the need to obey authority figures was so high that people were willing to hurt innocent people without considering the consequences or feeling guilty about the same, and neither did they do anything to oppose it.

Types of social influence on behavior is a very interesting and an important topic in social psychology. It goes on to show us that even though individuals might consider themselves to possess qualities of uniqueness, when studied, their behavioral patterns are not very different from other individuals.

Read More:
http://www.buzzle.com/articles/types-of-social-influence.html

Minggu, 06 November 2011

Information Security - All about Information Security in IT

Definition:
Information security refers to protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The goals of information security include protecting the confidentiality, integrity and availability of information.
All organizations, including governments, military, financial institutions, hospitals, and private businesses, gather and store a great deal of confidential information about their employees, customers, products, research, and financial operations. Most of this information is collected, processed and stored on electronically and transmitted across networks to other computers. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. For the individual, information security has a significant effect on privacy and identity theft.
The field of information security has grown significantly in recent years. There are many areas for specialization including Information Systems Auditing, Business Continuity Planning and Digital Forensics Science, for example. There are also specific information security technical certifications that can assist getting started in this field.

Sabtu, 08 Oktober 2011

How Platespin Server Consolidation Works

It is no secret that servers can take up a lot of floor space, and power. As a result, they can sometimes seem inconvenient. One way to save space and power is to consolidate servers. Server consolidation is very important in order to ease some of the frustrations of overdue consolidation processes.

It is no secret that servers can take up a lot of floor space, and power. As a result, they can sometimes seem inconvenient. One way to save space and power is to consolidate servers. Server consolidation is very important in order to ease some of the frustrations of overdue consolidation processes. Server consolidation projects can also be accelerated via automation and virtualization. Platespin server consolidation helps to accelerate consolidation projects, and reduce errors. This is done without actually having to have contact with the physical machines.


Platespin allows managers to measure and evaluate resource utilization in order to speed up capacity planning for consolidation projects. This is accomplished by remotely gathering information about the server. This information can be the server operating system, memory, CPU speed, the network, and memory. Platespin server consolidation works on Windows NT, 2000, and 2003 systems. The system works without the help of agents. Therefore, the need to manually deploy software is eliminated. The risk of missing certain agent dependencies is also eliminated in this case. Platespin is also very simple and lightweight, so it can start to collect data in almost one minute.


Platespin completely automates the physical to virtual migration of data. This allows the servers to be consolidated quickly and with more ease. There is a drag and drop interface that allows the user to convert machines running Windows or Linux into one fully functional virtual machine that is hosted on several types of servers. These servers include VMware GSX Server, Microsoft Virtual Server 2005, or simply a Platespin Flexible Image file.


Network configurations, CPU cycles disk space, and memory allocations can all be converted rather quickly. This ease allows users to right-size target servers as the conversion process is occurring. As a direct result, data centers are made able to increase the number of servers that are able to be consolidated. This further optimizes resource utilization rates.


Sever consolidation may seem complicated, but the right program can make it quite simple. Platespin automates many processes and allows many different factors to be converted quickly. This means that the total time for consolidating servers is reduced.