Sunday 24 November 2013

12 jobs getting the biggest raises in 2014

The average salary for newly hired IT pros is expected to increase 5.6% in the coming year

Looking to make your next career move? Staffing firm Robert Half analyzed 70 tech positions and found certain titles will be getting particularly big salary hikes in 2014. Read on to learn more about the 12 positions with the biggest raise potential. (Only base salaries are calculated; totals don’t include bonuses, perks or other compensation elements.)

U.S. starting salaries for professional occupations are projected to increase an average of 3.7% next year, according to data from Robert Half. That number jumps to 5.6% in the tech industry, which is expected to see the largest gains among all the fields researched.

Pre-sales/technical engineer
At the top of the heap, based on percentage gains, are pre-sales/technical engineers, who can expect an 8.4% increase in starting salaries, Robert Half reports. Typical duties for this position include: participating in customer presentations as the technical expert; determining technical requirements to meet client goals and acting as the liaison between the firm’s sales/business development and engineering groups; responding to RFIs or RFPs from current or potential customers with technical details of proposed solutions; coordinating the transition between pre-sales specifications and implementation engineering upon the awarding of contracts.

Mobile applications developer
Demand for people who can develop mobile apps remains strong, and companies are willing to pay a premium. Typical duties, as defined by Robert Half, include: coding, testing, debugging, documenting and monitoring mobile applications; interacting with different departments within the organization regarding new deployments; contributing to the development of project schedules and workflow; and recommending changes and enhancements to applications.

Software developer
Wanted: detail-oriented professionals with strong problem-solving capabilities, analytical expertise and communication skills. Software developers typically perform these duties: coding, testing and debugging programs according to computer engineering specifications; modifying, expanding and updating applications; communicating with a team that includes analysts, engineers and quality assurance testers in order to coordinate and document application development and testing; and developing software prototypes.

Software engineer
Candidates for a software engineer position should have broad information systems experience, says Robert Half. The firm describes these typical duties: designing and creating engineering specifications for software programs and applications; working with quality assurance to develop software test plans; collaborating with hardware engineers to assess and test hardware and software interaction; implementing a specific development methodology; and documenting software specifications.

Business intelligence analyst
In the era of big data, analytic talent is coveted. A business intelligence analyst is expected to perform these typical duties: designing and developing enterprise-wide data analysis and reporting solutions; reviewing and analyzing data from multiple internal and external sources; communicating analysis results and making recommendations to senior management; and developing data cleansing rules.

Data architect
A data architect brings analytical and creative skills to the table, along with in-depth knowledge of data systems and database methodology, design and modeling, says Robert Half. Typical duties include: understanding and evaluating business requirements and translating them into specific database solutions; creating data design models, database architecture and data repository design; working with the systems and database administration staff to implement, coordinate and maintain enterprise-wide data architecture; providing leadership in establishing and documenting data standards; and creating and testing database prototypes.

Developer/programmer analyst
According to Robert Half, the ability to understand applications from both a technical perspective and a business point of view is essential for a developer/programmer analyst. Typical duties include: analyzing business application requirements for functional areas such as finance, manufacturing, marketing or human resources; writing code, testing and debugging software applications; recommending system changes and enhancements; and documenting software specifications and training users.

Wireless network engineer
Among the network specialties, the position expected to get the largest percentage raise (7%) is wireless network engineer. Typical duties include: researching, designing and implementing wireless networks, including all engineering specifications and resource requirements for network hardware and software; making recommendations for wireless network optimization, additions and upgrades to meet business requirements; conducting and documenting RF coverage and site surveys; and documenting network infrastructure and design.

Network engineer
Robert Half also expects network engineers to receive sizable raises in the 6.9% range. Typical duties include: engineering enterprise data, voice and video networks; establishing and operating network test facilities; maintaining a secure transfer of data to multiple locations via internal and external networks; working with vendors, clients, carriers and technical staff on network implementation, optimization and ongoing management; providing high-level support and technical expertise in networking technology, including LAN/WAN hardware, hubs, bridges and routers.

ERP technical developer
ERP technical developers need to quickly identify technical problems in ERP applications, assess their potential impacts, and help design solutions, says Robert Half. Typical duties include: performing analysis, design, coding, data migration and testing for ERP production and development environments; implementing ERP enhancements to support changes in business processes; providing ERP application support; and working with various business teams to gather requirements and support business processes.

Network architect
Another network-related position in line for a sizable raise is network architect. As defined by Robert Half, the role is responsible for: assessing business and applications requirements for corporate data and voice networks; planning, designing and upgrading network installation projects; establishing and maintaining backup, version-control and viral defense systems; troubleshooting network architecture and making recommendations for system fixes and enhancements; and making recommendations for leveraging network installations and reducing operational costs.

Information systems security manager
One security-focused title showed up among the 12 IT jobs getting the biggest raises: information systems security manager. Expected to command a 6.8% raise in 2014, the position call for: providing leadership, guidance and training to information systems security personnel; reviewing, implementing, updating and documenting companywide information security policies and procedures; managing security audits, vulnerability and threat assessments and directing responses to network or system intrusions; ensuring fulfillment of legal and contractual information security and privacy mandates, including providing executive management with compliance reports and audit findings; and preventing and detecting intrusion.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday 13 November 2013

Products of the week

Our roundup of intriguing new products from companies such as Radware and NetMotion

Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.

Product name: RAM 6021 industrial router
Key features: Facilitates seamless communication between local and wide area networks, but rugged enough for extreme environmental conditions. RAM 6021 prevents unwanted network intrusions in the connected factory and remote locations. More info.

Product name: Locality Cloud
Key features: Hosted version of application that lets IT groups monitor what’s happening with mobile workers on cellular networks: collecting and analyzing data on connectivity issues, identifying and solving mobile problems. More info.

Product name – Anonymous Incident Portal
Key features - a web service that lets users securely and anonymously report incidents, complaints and violations while allowing organizations to manage issues internally. More info.

Product name: Baidu Antivirus
Key features: a permanently free antivirus and cloud security application. New feature: complete built-in protection from Virut botnet. More info.

Product Name: Alteon LBaaS
Product Description: application delivery controller (ADC) solution that offers Load Balancing as a Service natively built into the Havana version of OpenStack’s Neutron LBaaS driver. Alteon LBaaS solution integrates advanced ADC functionality in the OpenStack infrastructure for enterprise organizations considering to deploy OpenStack. The new solution ensures consistent QoE, provides performance consistency of network services across multiple tenants, and allows quick roll-out of new application delivery services. More info.

Product Name: AFORE Amazon Web Services (AWS) Data Encryption Suite
Key features: AFORE secures sensitive data for VDI, application servers and storage with enterprise-controlled key management and a single security management plane across private, hybrid and public clouds including AWS VPC and EC2. More info.

Product name: Vaultive Platform 3.4
Key features: extends support to Box, Yammer, Microsoft Dynamics, SAP SuccessFactors and other leading cloud applications. Integrations with DLP and eDiscovery in Office 365 also powers sensitive content detection. More info.

Product name: Aerospike 3 NoSQL database on Internap’s AgileSERVER bare-metal cloud
Key features: Combines Aerospike’s leading NoSQL database with the Internap’s AgileSERVER bare-metal cloud, resulting in a global “fast big data” platform that processes massive amounts of data in milliseconds. More info.

Product name: Commons Cloud
Key features: is the only collaboration solution that maintains a complete, permanent and easily accessible record of every edit, version, and comment about every file. More info.

Product name: AdRem NetCrunch 7.3
Key features: has rule-based monitoring and smart network rediscovery to maintain long-term control of ever changing network, systems and applications. More info.

Product name -- Virtual Office Mobile 4.0
Key features -- Turns iPhone, iPad and Android into a desk-phone over 3G, 4G and WiFi. Make/take calls, extension dial with video, transfer, conference, chat, visual voicemail, manage faxes for BYOD. More info.

Product name: OpenSpan Activity Intelligence
Key features: is a new, SaaS-based solution designed to provide actionable insight into interaction business intelligence, worker activity, process flows, and technology diagnostics. More info.

Product name: Unisys Mobile Environment Management 2.0
Key features: is a set of cloud-based or on-premise managed mobility services for supporting mobile users and managing and securing mobile resources–from devices to expenses. More info.

Product name: Velocity Zoom
Key features: IT leadership can examine transaction performance from the enterprise level down to a specific user’s experience, monitor application performance trends, and compare their statistics to the aggregate of Velocity’s customer community. More info.

Product name: Alpine 3.0
Key features: the first visual, script-less and web-based advanced analytics solution for Hadoop and Big Data. The new software release enables business analysts to create and deploy predictive models on the web using a simple drag-and-drop interface.

Product name: Workshare Protect Server
Key features: extends corporate data security policies to safeguard high-value content shared via email and webmail on mobile devices, eliminating employee risk of leaking sensitive data. More info.

Product name: OpenAM 11.0
Key features: OpenAM is the first access management solution that goes beyond the classic “castle defense” of legacy IAM, leveraging identity to extend business reach, drive new business models and grow revenue. More info.

Product name – EventTracker 7.5
Key features - brings new features and licensing models for MSP/MSSPs, integration with Threat Intelligence feeds and options for embedded vulnerability scans and intrusion detection. More info.


Thursday 7 November 2013

Microsoft offers quick fix for Zero-Day vulnerability

Company issues stop-gap patch for vulnerability targeting TIFF image format

Confirming reports of limited attacks in South Asia and the Middle East, Microsoft released a security advisory on Tuesday warning of a new vulnerability targeting the TIFF image format.

Microsoft issued an advisory and a stop-gap fix on Tuesday, for a new vulnerability that's targeting users in the Middle East and South Asia. Experts are urging IT administrators to deploy the Fix-It or EMET solutions, as it is unlikely that Microsoft will have a proper patch available for this month's round of updates.

The Zero-Day flaw resides in the TIFF image format, and has been used in what the software giant is calling limited attacks. According to their advisory, the vulnerability can be exploited to enable remote access to the victim's system, including code execution.

Microsoft Office 2003 and 2007 are affected, as well as 2010 on Windows XP and Server 2003. Moreover, Vista SP 2, Server 2008, and Microsoft Lync are vulnerable as well.

"Microsoft has provided a Fix-It that turns off TIFF rendering in the affected graphics library, which should have no impact if you are not working with TIFF format files on a regular basis. The listed software packages are not vulnerable under all conditions, so it is important that you take a look at your installed base and your possible exposure for the next couple of weeks into December," Qualys CTO, Wolfgang Kandek explained in an email to CSO.

According to Microsoft, the attacks against the flaw are being carried out against selectively, and requires user interaction. Thus, Phishing or other socually engineered attacks are likely to be the main phase of a given campaign. However, it is possible to exploit the flaw online, so malcious websites are a potential risk too.

If the Fix-It solution isn't an option, Microsoft reccomends that administrators install EMET and enable ROP mitigations, or others such as mandatory ASLR, EAF, or HeapSpray.

"Given the close date of the next Patch Tuesday for November, we don't believe that we can count on a patch arriving in time, but will probably have to wait until December, which makes your planning for a work-around even more important," Kandek added.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com