Tuesday, August 26, 2014

2014's Starting Salaries for College Tech Majors

As summer is winding down and colleges and university are about to kick it into high gear, it's time again for us to look at how college technology majors stack up in regards to starting salaries.

College Technology Major Starting Salary 2014
With two thirds of the summer behind us, it's the time of the year for students of all ages to contemplate what degree program to enroll in. And while compensation isn't always the biggest factor in their choice for a profession, it can be a good place to start.

Each year, with data provided by the National Association of Colleges and Employers (NACE), CIO.com looks at what degrees offer the best starting point salaries and how trends and markets have affected them over the previous years' data. Data in the Salary Survey is produced through a compilation of data from the BLS and the Census Bureau.

Average Salaries by Major
Salary gains are down significantly when compared to that of the previous salary survey. In fact, information sciences and systems degrees took a hit of almost 1%. This years' largest gain was in mechanical engineering degrees, up 2.5 percent, but that pales in comparison to the previous year's gains of 5.6 percent.

Computer Science Degree Starting Salaries
Under the computer science umbrella, federal, state and local government officials are still the head of the pack followed closely by the manufacturing industry. All players in this category made small gains.

Information Sciences and Systems Major Starting Salaries
Information sciences and systems saw graduates and entrants pretty flat over the last year. Federal, state and local government positions still are paying the highest in this category as well, beating out manufacturing by 9%. Professional scientific and technical services lost ground slightly on starting salary and the number of graduates decreased.

Computer Engineering Starting Salaries
Computer engineering degrees, in most cases, made modest gains. Professional, scientific, and technical services saw a 7% increase in pay over previous salary surveys. People with computer engineering degrees who chose enterprise management lost 3 % on starting salaries year over year.

Electrical/Electronics & Communications Engineering Degree Starting Salaries
If you've been paying attention, government jobs are where the money is at when you're just getting started with your technology degree, and it's no different with electrical/electronics and communications engineering degrees. No major gains made in this category over the last year and there were fewer graduates in the major categories.

Mechanical Engineering Degree Starting Salaries
Mechanical engineering graduates made significant increases in all areas except federal, state and local government positions. In the professional, scientific and technical services industries mechanical engineering graduates gained 12 percent year-over-year.

Tech Majors
There are many things to consider when choosing which technology degree is right for you, and starting salary is only one of them. Things like cost of living for a particular area, salaries levels for your region and personal interests all play a role. What is the most important factor to you? We'd love to hear from you in the comments.

For a look at last year's data, please check out my previous article, Best College Tech Majors for Landing a Top Starting Salary.

For more information on the NACE methodology and other relevant data visit their website.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com




Tuesday, August 19, 2014

Google brings robust cluster scheduling to its cloud

Google is drawing from the work of the open-source community to offer its cloud customers a service to better manage their clusters of virtual servers.

On Monday, the Google Cloud Platform started offering the commercial version of the open-source Mesos cluster management software, offered by Mesosphere.

With the Mesosphere software, "You can create a truly multitenant cluster, and that drives up utilization and simplifies operations," said Florian Leibert, co-founder and CEO of Mesosphere. Leibert was also the engineering lead at Twitter who introduced Mesos to the social media company.
10 of the Most Useful Cloud Databases

First developed by the University of California, Berkeley, Mesos can be thought of as an operating system that allows an administrator to control an entire cluster of computers, or even an entire data center, as if it were a single machine.

Thanks to its fine-tuned scheduling capabilities, Mesos can allow multiple frameworks, such as Hadoop or Spark, to share a single cluster, as well as allow multiple copies of the same framework to run on a single cluster.

The software also has built-in resiliency: If one or several nodes stop working, the software can automatically move that work to other, operational nodes in that cluster.

Twitter, Airbnb, Netflix and Hubspot have all used Mesos to coordinate operations.

Google has modified its new software for managing Docker containers, called Kubernetes, so it can run on Mesos, work Google also announced Monday.

Google has been an ardent user of Docker internally, using more than 2 billion containers a week in its routine operations. The open-source Docker provides a container-based virtualization, which is an alternative to traditional virtualization workloads now being considered by many organizations, due to its putative performance superiority.

Now, Google customers can use Mesosphere cluster to run Docker containers and use any leftover capabilities to run other framework-based workloads.

"You'll be able to create these modern distributed systems the way that Google does, and you'll be able to run them side-by-side with all your existing applications," said Craig McLuckie, Google Cloud Platform product manager.

Users can also move their workloads to any cloud provider that runs Mesos, eliminating the dependencies that can come with writing the applications to run on a specific cloud service, be that Google's or some other vendor's.

Google's Mesosphere cluster package also includes the Apache Zookeeper configuration software, the Marathon scheduling software, as well as OpenVPN for logging into the cluster.

Use of Mesosphere on the Google Cloud Platform is not billed separately; it is included in the price of running a cluster.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Thursday, August 7, 2014

Big tech firms back Wi-FAR for remote broadband

802.22 standard, approved in 2011, promises low-cost broadband for remote areas

Google, Microsoft and Facebook are cranking up an emerging wireless technology known as Wi-FAR to help reduce the digital divide in remote and unconnected regions of the world.

Wi-FAR is a recently trademarked name from the nonprofit WhiteSpace Alliance (WSA) that refers to the 802.22 wireless standard first approved by the IEEE (Institute of Electrical and Electronics Engineers) in 2011.

The standard shares the underused TV band of spectrum called whitespace to send wireless signals, typically over distances of six to 18 miles in rural and remote areas. It has a theoretical download speed of more than 22 Mbps per TV channel that serves up to 512 devices, according to the WSA. That could result in speeds of about 1.5 Mbps on a downlink to a single device.

While such speeds are far slower than for the gigabit fiber-optic cable services that Google and AT&T are building in some U.S. cities, the speeds could theoretically begin to compete with some 3G cellular speeds, although not 4G LTE speeds. For an impoverished or sparsely populated region where businesses and schoolchildren have little Internet access, Wi-FAR could be a godsend when used to link base stations (typically found at the ground level of cell towers) in a distributed network.
Students in South Africa
Students at the University of Limpopo in South Africa use laptops connected to the Internet using Wi-FAR wireless technology. (Photo: Microsoft)

About 28 million people in the U.S. don't have access to broadband, while globally, about 5 billion people, nearly three-fourths of the world's population -- don't have broadband Internet access, said Apurva Mody, chairman of both the WSA and of the 802.22 Working Group.

"This is cheap Internet access and there are dozens of trials underway, with Google in South Africa, Microsoft in Tanzania and other continents, and even Facebook's interest," Mody said in an interview. "You have 1.2 billion people in India who need cost-effective Internet access. There's a lot of enthusiasm for Wi-FAR."

Wi-FAR will be cheaper for access to the Internet than LTE and other wireless services. The lower cost is partly because Wi-FAR works over unlicensed spectrum, similar to Wi-Fi, which allows network providers, and even government entities, to avoid paying licensing fees or needing to build as many expensive cell towers, that can cost $50,000 apiece, Mody said. "The prices for Wi-FAR service will be very small, perhaps less than $10 per month per household."

The 802.22 technology can be low cost because the whitespace spectrum is shared with conventional users, including TV stations on UHF and VHF bands. Thanks to sophisticated databases that track when a whitespace channel will be in use in a particular region, a cognitive (or smart) radio device can determine when to switch to another channel that's not in use. Testing in various Wi-FAR pilots projects, many of them in Africa, is designed to prove that Wi-FAR devices won't interfere with other existing users on the same channel.

"We have yet to have an interference problem," said James Carlson, CEO of Carlson Wireless Technologies, a Sunnyvale, California-based company that is working with Google on two six-month trials of 802.22 in the UK, among other areas. The company completed a successful trial with Google serving students in South Africa in 2013. Carlson, in an email interview, said the company is working with five database providers, noting that the "prime purpose of the database is to protect the incumbent spectrum user."

Whitespace spectrum sharing, coupled with the use of the databases, is generally called dynamic spectrum allocation technology. In January, the U.S. Federal Communications Commission approved Carlson's RuralConnect TV whitespace radio system for use with a Spectrum Bridge TV whitespace database, effectively bringing the first dynamic spectrum sharing product to market.

In the U.S., RuralConnect is authorized for use in the UHF TV band, running from 470 MHz to 698 MHz. The FCC opened up the band in 2010.

At the time, Carlson said the FCC's approval would give a boost to global efforts to use whitespace technology. "Providing connectivity to underserved populations worldwide is more than an interest to us," he said in a statement. "It's our corporate mission."

RuralConnect will get competition from products in other companies, including Redline, Adaptrum and 6Harmonics, Carlson said. In addition to other providers, Google has built a whitespace database that Carlson is testing.

In all, Carlson Wireless has piloted dozens of whitespace projects, and expects to start its largest yet for 30 base stations and 5,000 users near New Delhi in the next six months, Carlson said.

"India is the next big boom for online needs, and the rural areas are not getting [Internet service] with [typical] mobile systems," Carlson said. "So they are choosing to go with the TV whitespace because the UHF band is almost all vacant in rural areas and 600 MHz propagation is superb."

While Carlson has been working with Google, Microsoft separately announced in June a whitespace pilot project at the University of Limpopo in South Africa. It is part of a Microsoft 4Afrika Initiative to help ignite economic development in Africa.

In May, Microsoft and Facebook joined with SpectraLink Wireless to announce a whitespace project for students and faculty at universities in Koforidua, Ghana. That project brought the number of nations where Microsoft has whitespace pilots to 10 countries on four continents.

In the Microsoft and SpectraLink partnership, Facebook's Connectivity Lab team will lead efforts to better understand how TV whitespace spectrum can support wireless Internet users, according to a statement.

Microsoft and others believe that TV whitespace technology will best work in combination with Wi-Fi and other low-cost wireless technologies. While much of whitespace technology is focused on building specialized bridge hardware for use in base stations, Mody said some companies are developing fixed wireless 802.22 routers, similar in appearance to Wi-Fi routers, that will be placed inside of homes.

Microsoft also spearheaded the Dynamic Spectrum Alliance, which Google and Facebook joined last November. The alliance is exploring many uses for whitespace spectrum, including Internet of Things device connectivity.

Craig Mathias, an analyst and wireless consultant for The Farpoint Group, said 802.22 devices may compete against or complement a number of other technologies, including cellular and Wi-Fi.

"802.22 is not a pipe dream, but so far there's not a lot of evidence of its success," Mathias said in an interview. "It does make sense. The rate of innovation in wireless is so high that you hear something exciting every week. But not all wireless standards are successful in terms of having [successful] wireless products."

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Friday, August 1, 2014

12 Tips to Help College Grads Land Their First IT Job

Technology and HR pros, as well as IT recruiters, share their advice on how recent graduates and those still in college can best position themselves for a technology career.

According to research conducted by labor market analytics and consulting firm Burning Glass , the future is looking bright, or brighter, for college students majoring in science, technology, engineering and math (STEM) -- especially if they are looking to go into healthcare, IT or engineering & advanced manufacturing. Indeed, according to Burning Glass's findings, STEM graduates have access to twice as many entry-level jobs as non-STEM graduates -- and the pay is better too, $66,123 compared to $52,299.

But just because you have a four-year degree in math or science or engineering does not mean you will get your dream job in IT, or any job in IT, or even a job interview.

So what can recent college graduates and students still in college do to boost their chances of getting their dream entry-level job in technology (be it at a software company, in healthcare or manufacturing/engineering)? Dozens of IT professionals, HR managers and recruiters offer their top 12 tips for how to increase the odds of landing your dream entry-level technology job.

1. Know what you are good at -- and if you want to be a specialist or a generalist, a technologist/coder or in product management or marketing. "Choose early on if you want to specialize in a certain segment, or if you want to be a generalist," says Evaldo Horn de Oliveira, director of Business Management, FairCom, a provider of database technology.

"If you are interested in management, then consider going the generalist route, since having diversified skills can help you land an entry-level position that will eventually lead you down the management track. It's also important to express your interest in management within an interview, which can alert the hiring manager that you are ambitious and have the drive to pursue opportunities for advancement," he says.

"Some technologists enjoy writing code. Others enjoy managing data centers. But there are also a host of roles like product manager, product marketing and even sales engineering that require passion and understanding of the technology but may play to additional nontechnical capabilities like communication skills and leadership," says Lilac Schoenbeck, vice president of product management and marketing, iland, an enterprise cloud infrastructure provider.

So before you start applying for jobs, she (and others) advise that you learn about the different options and career paths available and apply for positions best suited to your interests and talents.

2. Learn everything you can about the company and position you are applying/interviewing for, before you apply or interview there. "Familiarize yourself with the company," says Jennifer Rutt, senior director of Engagement, AfterCollege, a career network for college students and recent graduates.

"Have they been featured recently in the press? Are they active on TechCrunch?" Find out, Rutt says. Then, in your cover letter or during the interview, "highlight some of the exciting things the company is doing and why you would want to be engaged in that work and how you could add to the project with your skills."

"Inspire confidence by walking into the interview with a deep understanding of what the company sells," says Mindy Lieberman, vice president of IT at Zendesk, a provider of customer service software. "If it's an SaaS company, play with a free trial, if there is one. Also, "check out reviews [in tech publications], or find a friend who is a customer. [Skimming the company] website isn't enough; go deeper."

"To show that you're well-versed on the company and its offerings, come up with one great suggestion for how they can improve or a new feature you would add," adds Tarek Pertew, cofounder, Wakefield Media, which provides a content platform and produces Uncubed, a startup hiring event. "It shows you care about the company and have put a lot of thought into it. Also, always send a follow-up email, but try to add value and personalize it rather than just to check in."

3. Know or learn the right technical skills. "Make sure you are concentrating on current and marketable skills," suggests Esther Shih, head of U.S. HR and Operations at Mirantis, a pure play OpenStack company. "Commonly sought skills include programming in Python, PhP, C, Java, JavaScript, Ruby and Perl. Understanding databases based on both SQL (such as MySQL, Oracle and DB2) and NoSQL (such as MongoDB, Cassandra [and] Couchbase) is also key. Skills that set you apart might include understanding Linux internals, or working in a data center to gain hands-on networking and storage experience."

"The job market, especially in IT, is becoming increasingly specialized," says Matt Sigelman, CEO, Burning Glass. "Students who can match their portfolio of skills specifically with what employers are looking for will have an easier time gaining employment," he says. "Based on analytics from Burning Glass, big data skills such as Hadoop and data management, scripting languages such as Python and Perl, and skills that bridge software development with other fields such as graphical user design are among those skills employers find hardest to recruit for."

4. Hone your "soft" skills. "[Soft skills] are nontechnical, interpersonal skills, like effective communication, strong teamwork, leadership, problem solving and negotiation skills," explains Abhijit Pansare, head of recruitment at Collabera, an IT staffing and services company. "Even if you have proficiencies in a hard- to-find technical skill like Java, those skills alone won't land you a job in IT. It's these soft skills that will make you more employable and well- rounded to a potential boss," he says. "Identify the skills where you may not be strongest and invest in improving them. The best way to do this is with practice. Network as much as possible and take as many interviewing opportunities as you can."

"Coming directly out of college, I am hiring for intellect and attitude rather than expertise," says Patrick McGuinness, CIO, Global Risk and Compliance, GE Capital. "I want to see that you understand your context and that you are educated about GE Capital -- what we do and how we use technology in innovative ways for our clients."

So in addition to technical skills, or aptitude, grads looking for a hiring advantage, or who want to get on the management track, should have solid research, communication and listening skills.

5. Gain practical experience in your discipline. "One of the best ways for college seniors to improve their job prospects is by building relevant experience with an internship," says Sigelman. "Internships help job seekers develop and demonstrate the specific skills employers are demanding, and serve as key stepping stones to full-time employment," he explains.

"This is especially true in IT, where internships constitute 13 percent of all postings calling for IT-related skills, which is greater than all other skill areas besides engineering. Moreover, in the past 12 months IT internships were the second-most demanded, with employers seeking interns who already possess expertise in multiple IT skills such as JAVA, C++, and Python," Sigelman says. "For graduates without internship experience, a strong portfolio is another way to demonstrate relevant skills and experience."

"Community service projects are another excellent way to achieve real-world know-how," says Mary Dobransky, dean of the College of Science and Technology at Bellevue University. "Look in your local community for organizations that need help designing a Web page, creating a mobile app, or setting up a network, and volunteer your services."

"Look for programs [or internships that offer] hands-on training," adds Anjul Bhambhri, vice president of Big Data at IBM. "The best way to learn and prepare for a job in IT is to train in real-world scenarios using the systems employed in the business world today," she says. "So it's important that soon-to-be graduates take steps to gain hands-on training before applying for a position. For example, San Jose State University offers an Advanced Certificate in Business Analytics from the Lucas Graduate School of Business. The program incorporates IBM software and project-based collaboration with IBM big data and analytics clients."

6. Showcase your work, or at least your knowledge. "Set yourself apart with a sample of your work, whether it is from an internship or a class project," says Rutt. "Create a SlideShare, blog post or YouTube video of what you have done and how it would be relevant to the position you are applying to. (You can see a great example of an intern from Khan Academy's work here.)"

"As a recruiter, reviewing an applicant's website or portfolio is a great way for me to get a better understanding of who they are," explains Brian Long, talent advocate, The Nerdery, a developer-driven interactive production company. "Create a blog where you can write about things you are learning or trying, your thoughts on the newest JavaScript framework, or the process you went through for a class project."

"Build a digital presence on industry-specific websites, such as GitHub, Quora [or] Stack Overflow," suggests Pertew. "GitHub will allow you to show off the projects you have already worked on and Quora and Stack Overflow can help you exhibit your knowledge by answering other's questions (and asking your own)," he explains. "Recruiters are looking beyond the resume for knowledge, and will often look to GitHub or Quora for potential applicants."

"Demonstrate [your knowledge] by citing examples of how you've jumped in, tackled tasks and been successful," says Michael Waclawiczek, vice president of marketing and operations for distributed database startup NuoDB. "At software startups, a can-do attitude is a quintessential and necessary talent," he explains. Similarly, "demonstrate your ability to lead and take calculated risks. With concrete examples from your personal or professional life, show your strong desire to succeed" -- and how you are will go the extra mile to do so.

Finally, be sure to have a LinkedIn profile, so prospective employers can easily find you -- and you can find and network with prospective employers.

7. Network: Find a mentor or become part of a tech community. "Create a strong network of affiliations, including classmates, faculty and professionals in your discipline," says Dobransky. "Attend meetings held by professional organizations, such as AITP, IEEE and ISACA. These meetings are a terrific way to network with people in your field and learn about potential positions," she says. Then, when looking or applying for tech jobs, "prepare a concise message that describes the type of position you are looking for, and take every opportunity to share your message with your contacts."

"Take advantage of your student alumni network, professors, career center, volunteer opportunities and other community affiliations," agrees Josie Perez, senior vice president, Human Resources, Narus, a cybersecurity solution provider. "Attend industry events to make connections with people. Even if the connections you make now don't lead to a job right away, they may be useful in the future."

"Even if your professors aren't cofounders of a tech company like I am, they are often connected to employers looking for grads," says Giovanni Vigna, a professor at University of California, Santa Barbara, and the cofounder and CTO of Lastline, which develops software that protects against malware.

"Whether the hiring manager is an alum or the hiring company is their former employer, your computer science professors are more hip to the IT job scene than you think," Vigna says.

"Connect to them on LinkedIn and keep their email addresses. They will be a resource for years, and who knows, perhaps they'll invite you to speak to future classes about launching a successful career in IT, or will refer a candidate to you, years from now," Vigna says.

"Find a mentor," says Jesper Helt, chief human resources officer, CommVault, a provider of enterprise backup and recovery, data management, data deduplication, data protection, archiving and eDiscovery software. "Having a mentor who is knowledgeable in the field of study you wish to pursue is imperative. This allows you insights into what your future roles will entail and help you grasp the concepts of the materials in a new light, beyond the walls of the classroom," he says.

"Mentors include professors, advisors and even other students with experience in the field," Helt says. "They are there to inspire you and bring out your confidence in the subject matter, are aware of new trends and future predictions and in the job hunt are a more important resource than just a resume."

8. Participate in local industry events, like hackathons and coding competitions. "We search for talent at tech-related events and competitions like hackathons," says Dorie Blesoff, chief people officer, kCura, which develops Web-based e-discovery applications. "It's a chance for students to demonstrate their skills while networking with peers and potential employers. Recently we hosted the National Day of Civic Hacking at our office, which aimed to solve local organizations' challenges with technology," she says.

"There are also great organizations like the Illinois Technology Association, which convenes Midwestern college students each year for a programming skills tournament, giving students an opportunity to engage with great tech companies," Blesoff says.

"For engineers, participation in coding competitions is also a good way to make your programming skills stand out," says Mike Jennings, senior director of IT at LinkedIn. "Highlight them on your LinkedIn profile [blog, or website] with clear and concise descriptions. Consider competing on sites such as TopCoder."

9. Tailor your resume to each position -- and avoid jargon and simply listing keywords. "Develop a resume that reflects the IT professional you want to be by detailing every project you've completed or been a part of, regardless of its size or scope (even that college coursework demonstrates your skills)," says Jennifer Doran, consultant program manager TEKsystems, an IT staffing firm.

"When writing your resume, make sure the content is detail- oriented and focuses on the skills you've applied, technologies you've worked and, especially important, the results you've generated," Doran says. "Too often I see resumes with a skills summary section that's simply keywords with no details about those skills within the candidate's job descriptions."

10. Don't just apply to the cool startup in Silicon Valley. "Don't be afraid to make your search wide-ranging, not only geographically but in the kinds of things you might like to work on," says Stephen Pimentel, technologist evangelist at database software startup FoundationDB, a data storage technology provider. "Look for companies solving difficult, interesting problems."

"Job seekers in IT fields should look beyond the technology industry as sources of employment," adds Sigelman. "Over half of all job postings for IT roles are outside of the IT sector, in areas such as manufacturing, healthcare, finance and retail."

11. Know your interviewer. "Prior to an interview, ask with whom you will be meeting and use LinkedIn and the Web to learn as much as you can about them," says Doran. "This shows initiative and provides an opportunity to identify similarities you might share with your interviewer (e.g., attended the same college or played the same sport).

The most positive feedback from hiring managers comes when a candidate is able to make a personal connection," Doran says. "Also, take note of the professional paths of the IT managers with whom you interview. Asking how they got to where they are today is an excellent icebreaker and shows career initiative."

12. Finally, be realistic about salary. "Be realistic and don't expect that you are going to get $100K+ because that's what you saw that job position pays at the high range," says Brad Roth, IT manager, EZSolutionIT, which provides computer and IT services. "That high range is meant for people that have years of experience in the field."


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Wednesday, July 23, 2014

Say goodbye to desktop phones

Insurer leverages VoIP client software, 11ac Wi-Fi for “complete mobility”

“When are we going to get rid of these things?” said Ken Henderson’s boss as he pointed at the corded desktop telephone that has been emblematic of the American office for decades.

“I’m glad you asked that,” replied Henderson, the assistant vice president for technical infrastructure at American Fidelity Assurance in Oklahoma City. He outlined to his boss, AFA President David Carpenter, a plan that had been gestating for a while. The recent purchase of a new headquarters building was the spark to put it into action.

The insurer’s IT group is shifting hundreds of employees to voice-over-IP “softphones” on Windows 7 laptops and Apple iPad tablets, all clients to Microsoft Lync Server, for IM and video conferencing and now for VoIP calls, over an 802.11ac wireless LAN from Aruba Networks.

+ From Network World’s Archives (2007): “Wireless VoIP works, but it’s work” +

For years, WLAN vendors predicted that 802.11n Wi-Fi was the perfect foundation to support wireless VoIP. But most deployments were relatively small, at most a few hundred wireless VoIP handsets, in part because the combination of Wi-Fi and VoIP in the enterprise required a lot of work. [see our 2007 article, “Wireless VoIP works, but it’s work”]

The new Aruba 11ac network at AFA is a pervasive, high-performance, redundant WLAN, replacing what had been mainly a network-of-convenience for employees in the original headquarters building. Going with 11ac shifts all clients to the uncluttered 5 GHz band (AFA isn’t allowing 2.4 GHz use, even for Bluetooth), optimizes capacity, and “future proofs” the wireless network for an expected surge in the number of clients and in multi-media, real-time collaboration.
voip user American Fidelity Assurance

Laptop and iPad users at American Fidelity Assurance now make VoIP and video calls via Microsoft Lync and an Aruba 802.11ac WLAN at the new corporate headquarters. Here, Lee Ann DeArm takes a video call on her docked Windows laptop.

Nearly all of AFA’s Wi-Fi clients currently are still 11n, but even these will see a performance gain on the 5 GHz band.
Toward complete mobility

Founded in 1960, privately-held AFA offers a range of supplemental insurance products covering disability, death, and other areas, as well as a range of services to company health plans. In 2012, the fast-growing company bought an existing building to become its new headquarters. Much of the interior was gutted partly for renovations and partly for a new network infrastructure.

“We wanted complete mobility, to support a collaborative environment within the new complex,” says Henderson. “That meant we had to go wireless, and that meant getting rid of the desktop phone, because the cabled phone doesn’t let you move around and collaborate with others as needed.”

“Going wireless” at AFA entails distinct technologies that are intended to realize this idea of “complete mobility.”

One is a distributed antenna system (DAS), designed and deployed by RF Connect, a network services company in Farmington Hill, Mich. DAS is essentially a system of cabling and internal antennas for distributing carrier cellular signals inside a building, improving transmission and reception. The DAS deployment is about 80% complete at this writing.

Second is the 11ac WLAN, with a design to support its new role as a mission critical network. “We built out the WLAN as if it were cable,” says Henderson. “We emphasized redundancy, performance and operational measurements, and a big investment in the [RF] site survey.” (AFA worked with an Aruba systems integration partner, Sigma Solutions, headquartered in San Antonio, with two offices in Oklahoma.)

This type of network adds access points liberally. “We added access points so we’d have overlapping coverage,” says Henderson. Each Aruba AP 225 access point – dual-radio, three spatial streams, maximum data rate of 1.3Gbps - has two gigabit Ethernet ports, each cabled to a separate distribution switch, which in turn are each homed to a separate network core. The gigabit backhaul anticipates video conferencing traffic but also bandwidth-intensive applications such as re-imaging a laptop over the air. There are multiple, redundant Aruba WLAN controllers.

The WLAN environment is complicated by the fact that part of the building is occupied by another corporate tenant for several more years. Access point power levels and channel planning, and authentication and security, had to take into account that company’s separate WLAN.

Aruba’s AirWave WLAN management application provides a wealth of real-time data about the network’s performance and health, including interference sources. The AP 225 can monitor the RF environment, feeding data to AirWave. Aruba’s ClearPass handles network access control, security, guest access and other authentication services. For mobile device management, AFA uses software from AirWatch, a mobility management applications vendor.

The third key technology is VoIP, enabled over wireless, via an upgrade to AFA’s Microsoft Lync server, which had been an instant messaging, chat and video conferencing platform. The IT group worked closely with the various departments and business units to identify their full range of communications needs, Henderson says. Adding VoIP brought a range of PBX-like features to the Lync clients, whether Windows laptops or company-issued iPads running a Lync app. Lync also tied together Exchange Server contacts and calendaring with both voice and video conferencing. Because AFA already had a Lync enterprise license, “it was very cost effective to add voice,” says Henderson.

The VoIP transformation is deceptively simple, from the end user viewpoint. “Your laptop is now your phone,” says Henderson. An incoming voice call opens a window on your laptop or tablet screen, along with photo of the caller (if the caller is listed in your contacts). Users have wired or wireless headsets. Lync also shows “presence” – it can show the online status of someone you’re trying to reach. It also supports, via the WLAN, location tracking for 911 calls (AFA also has some hardwired phones in the new HQ for 911 emergency calls), according to Henderson.

Call quality is excellent. “Through Lync, it’s high definition voice,” he says. “Our colleagues realized that very quickly. ‘Oh my gosh, I thought you were sitting in the room next to me.’”

Despite all the documented benefits, for many users there was an unexpectedly strong emotional attachment to their desk phones. “User response was very mixed,” Henderson says. “Quite a few really embraced the technology. But others really like that phone on their desk. One stumbling block was the Microsoft Lync client didn’t flash a message light on their phone [for a new voicemail]. You’d be surprised at how many were upset by that, even though all their voicemail was now going to their email, and they could receive the complete message.”

The collaborative work environment this whole infrastructure is supposed to encourage and sustain is a work in progress. Right now, it means that employees in two separate buildings, and some 600 telecommuters, can use Lync’s video chat and online meeting features. With Lync’s integrated approach to different modes of communication, collaboration becomes a corporate service available over wireless. An AFA employee’s “office” is now wherever they happen to be. As users are switched to Lync, they get mandatory training in its features and capabilities.

Another mobile collaboration technology that’s part of the “complete mobility” concept is Crestron’s AirMedia, which combines an HDMI box that plugs into a projector or flat panel TV and the corporate network. Using a Web service and client applications for PCs, Macs, Android and iOS device, up to 32 users in a conference room and wirelessly share PowerPoint, Excel, Word and PDF documents, along with photos and screen shots. Up to 40 more users can log in via the Web. “I was passionate about that,” Henderson says. “I didn’t want our folks to have to worry about plugging into walls or HDMI ports. We use it to share spec sheets, presentations, videos. It’s very robust.”

Currently about 600 employees have shifted to mobile VoIP, including eight of the highest ranking executives. But so far AFA President Carpenter, the vocal advocate of wireless VoIP, is not yet one of them, mainly because he’s still in the old building.

“He’s still got a phone on his desk,” Henderson says. “But we’ll get to him eventually.”

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Sunday, July 6, 2014

Microsoft Windows Server 2008 Certification Exam

In this day and age, companies tend to hire those applicants who are not only well-qualified but have a diverse combination of skills as well. So it does not hurt if you have a certification on your resume; instead, it will help you a great deal. A certification in your profession will not only make you more qualified than the other applicants but it will also give a signal to the employers that you are a person who believes in moving forward and is determined to develop further his or her understandings and skills about the subject matter. MCSA – Windows Server 2008 certification exam is designed for IT professionals whose jobs revolve around handling Server Networks. This certification is quite an important one since Windows Server 2008 is an important program and it is needed for the proper functioning of extended programs.

Exam Topics of MCSA- Windows Server 2008: This exam consists of three papers. The first one is Windows Server 2008 Active Directory, Configuring with the certification code of 70-640. The second one is Windows Server 2008 Network Infrastructure, Configuring with the certification code of 70-642. Last one is Windows Server 2008, Server Administration with the certification code of 70-646.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Exam Topics of 70-640:
This exam tests an individual’s knowledge in configuring and implementing Windows Server 2008 Active Directory Environment. This exam is divided into 6 sections.

  • First section deals with Configuration of DNS for Active Directory and this section carries 17 percent marks.
  • Second section deals with Configuration of Active Directory Infrastructure and this section carries total of 17 percent marks.
  • Third part covers Configuration of Active Directory Roles and Services and this part is worth 14 percent marks.
  • Forth part deals with creation and maintenance of Active Directory objects and this part is worth 18 percent marks.
  • Fifth part deals with maintenance of Active Directory Environment and this part carries a total of 18 percent marks.
  • Sixth part deals with Configuration of Active Directory Certificate Services and this part is worth 15 percent marks.
     
Exam Topics of 70-642:
This paper is all about Network infrastructure and the topics are:

  • IP addressing and Services.
  • Configuring Name Resolution.
  • Configuring Network and Remote Access.
  • File and Print Services configuration.
  • Network Infrastructure Monitoring and Management.
Exam topics of 70-646:
This paper tests the candidate’s skills on the following topics:
  • Planning of Server Deployment. (This part carries 19 percent marks)
  • Planning for Server Management. (This part carries 23 percent marks)
  • Monitoring and Maintaining Services. (This part carries 20 percent marks)
  • Planning Application and Data Provisioning. (This part carries 19 percent marks)
  • Planning for Business continuity and High Availability. (This part carries 19 percent marks)
     
MCSA: Windows Server 2008 certification exam is held in Pro metric testing centers. When compared with its benefits, this exam is quite inexpensive; it costs around $240. Hence, IT professionals and Systems Administrators are encouraged to register for this exam. Moreover, if you are considering on taking MCSE in the future, you should start from this exam since it counts towards MCSE.


Wednesday, June 25, 2014

10 Common Problems APM Helps You Solve

One mistake in understanding the nature of the threats to your enterprise can have dire consequences, says Accuvant's Jason Clark

There is a scene in HBO's adaption of Game of Thrones where a character counsels the king to dismiss the rising power of one of his rivals because "curiosities on the far side of the world" are no threat. A season later, that rival has three dragons and an army under her control.

Practical advice for you to take full advantage of the benefits of APM and keep your IT environment
In my travels and meeting with 400 CISOs a year, I find there is much confusion around threat intelligence. Many that need it do not have the foundational elements and maturity to consume the information to make it actionable. It’s critical to know what intelligence is, what kind you need, and how to build the organization to consume it.

Understanding the nature of the threats to your enterprise may not involve swords and dragons, but one mistake can have dire consequences. It is for this reason the words "threat intelligence" have become associated with a growing number of security products and services.

The overuse of this term by vendors has caused its share of confusion in the marketplace. What is certain, however, is that identifying threat intelligence that is relevant to your business and applying it correctly can help you strengthen the security of your IT network.

So, let's start at the beginning and try to define some basics.

For starters, threat intelligence can be divided into three buckets: informational, reactive and predictive.

Informational threat intelligence includes data such as software vulnerabilities and threat indicators black lists of IP addresses associated with criminal activity. It also includes information regarding the 'who' and the 'how' of threat groups – what vulnerabilities they are targeting and who they are.

Reactive threat intelligence includes targeted intel such as what adversaries are after and reports that your passwords or intellectual property has made its way online.

The final bucket of threat intelligence is reserved for information that can be used to forecast malicious activity such as online posts discussing upcoming attacks and what types of intellectual property may be targeted.

The data filling these buckets can come from a variety of sources. For example, industry groups such as the National Health Information Sharing and Analysis Center (NH-ISAC) can be good sources of information about cybersecurity issues affecting in the healthcare field. Information about attacks or groups targeting specific types of organizations also can be purchased from commercial vendors or gleaned from publicly accessible data feeds.

Some of the most critical information, however, comes from within your enterprise.
Without knowing what constitutes normal user activity, spotting anomalous behavior becomes impossible. Local sources for threat intelligence can come from data gleaned during the investigation into an incident. Useful information can be found in your organization's data monitoring tools in the aftermath of a breach that could be used to better understand how attackers targeting your company operate. Likewise, any malware caught on the network that can be analyzed to prevent future attacks as well.

Tying internal and external threat intelligence together eliminates the noise when it comes time to analyze information and determine risk levels and your strategy for dealing with them. At its best, threat intelligence allows organizations to get an understanding of their own security posture and build a profile of attackers and their activity.

That last part –threat activity – involves having a clear view of the various stages of an attack, known as the kill chain. An example of a kill chain would be reconnaissance followed by the delivery of an exploit, pivoting around a network and extracting information.

Disrupting any one of these phases can be the difference between a breach and a typical workday. In the event of an attack, the ability to correlate attack data about the kill chain with information from intelligence feeds can help enhance understanding of the business impacts of the breach and provide a framework for improving defenses.

As one can imagine, getting the data and operationalizing it are two different animals. Just recently for example, cyber attackers were observed targeting a series of Internet Explorer and Adobe Flash Player vulnerabilities in attacks on the aerospace industry. With that type of intelligence, companies can assess how best to handle the situation and, if they are lucky, thwart the threat before it hits their network.

Are there computers in your environment running IE? Are there exploits being delivered via malicious sites that can be filtered? Is there any mitigation that can be put in place while Microsoft works on a permanent solution? What kind of data are the hackers after? Is it critical? Where is that data on my network?

Answering these types of questions moves your business along a security journey that begins in the hell of ad hoc approaches and ends at the nirvana of a business-aligned security program. It is not a simple path, and many CISOs get stuck along the way by developing security approaches based on meeting regulatory compliance demands without the benefit of threat intelligence coming into play. But, it is only with those data feeds that organizations can move on to developing a security approach based on actual risk that can then be put into a business context.

As the saying goes, information is power. The more you know about the threat landscape and what is happening on your network, the better able you will be to reduce risk by proactively limiting the attack surface for hackers.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com