Urgent Requirement: Information Security, GRC, Big Data, Business Analyst, Python, VMware, IDAM, JAVA, FRONT-END Openings in Bangalore, Mumbai and Gurgaon.
Soft4Leasing - Software for lending and asset finance companies. Obtain opera...Soft4
Soft4Leasing is business software for lending and asset finance companies. The software
is tailored for the leasing business process and adaptable to the unique needs of your
company, helping you obtain operational excellence, reduce risks, support compliance
and promote growth throughout your company. Soft4Leasing is built on the Microsoft
Dynamics NAV platform and thus allows you to enjoy all the advantages of a world-class
ERP system.
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
This document provides a summary of key challenges and approaches for key management in mobile ad hoc networks (MANETs). It discusses how MANETs have dynamic topologies and limited resources, posing security challenges. It reviews how cryptography is used to provide security but requires effective key management. It surveys research on asymmetric, symmetric, and group key management schemes proposed for MANETs. It also discusses trust models for key distribution, including centralized models using a trusted third party and decentralized models without a central authority.
Regional Economic Development from the Perspective of Circular Economy-- From...AM Publications,India
2014 November held the twenty-first session of the APEC conference in Beijing, during the meeting of Beijing sky appear for a long time did not see the blue sky, the air quality is good, be net friend for fun "APEC blue". The reasons why people have this demand is the reverse effect of economic development. This reminds us, the economic development not to the expense of environmental pollution. From the analysis of regional economic point of view, found that regional economic to be healthy, harmonious development, it must be combined with the circular economy, improve resource utilization efficiency, reduce pollution and keep the sustained economic growth at the same time, the problem of environmental pollution can improved. This paper intends to study how high utilization of circular economy in the development of regional economy, make economic development and environmental protection can change with direction. This paper firstly expounds the circular economy related theory; secondly, analyzes the necessity of the development of regional circular economy; thirdly, analysis the development of regional circular economy problems faced and how to develop the regional circular economy.
Design and Development of an E-Commerce Security Using RSA CryptosystemAM Publications,India
E-commerce has presented a new way of doing transactions all over the world using internet. The success of ecommerce depends greatly on how its information technology is used. Over the years the rate at which ecommerce sensitive information is sent over the internet and network has increased drastically. It is for this reason that every company wants to ensure that its ecommerce information is secured. There is need for ecommerce information transmitted via the internet and computer networks to be protected. There is substantial growth in the areas of credit card fraud and identity theft because the internet is a public network with thousands of millions of users. Amongst users are crackers or hackers that carry out the credit card fraud and identity theft in numerous ways facilitated by poor internet security; a concern regarding the exchange of money securely and conveniently over the internet increases. The criticality, danger, and higher priority importance of any e-commerce money transfer makes it a hot area of research interest in modern computer science and informatics. E-commerce industry is slowly addressing security issues on their internal networks but security protection for the consumers is still in its infancy, thus posing a barrier to the development of e-commerce. There is a growing need for technological solutions to globally secure ecommerce transaction information by using appropriate data security technology. The technology solution proposed for solving this security problem is the RSA cryptosystem. This research paper focuses on securing ecommerce information sent through the computer network and internet using RSA cryptography. It elucidates the implementation of RSA algorithm and shows that ecommerce security powered with RSA cryptography is very important in ecommerce transaction. While many attacks exist, the system has proven to be very secure
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksAM Publications,India
Wireless links losses result in poor TCP throughput since losses are perceived as congestion by TCP with the evolution of 3G technologies like Universal Mobile Telecommunication System (UMTS), the usage of TCP has become more popular for a reliable end-to-end (e2e) data delivery. However, TCP was initially designed for wired networks and therefore it suffers performance degradation due to the radio signal getting affected by fading, shadowing and interference. There are many strategies proposed by the research community on how to improve the performance of TCP over wireless links such as introducing link-layer retransmission, explicitly notifying the sender of network conditions or using new variants of TCP. As UMTS network coverage and availability are currently experiencing rapid growth, optimization of various internal components of its wireless network is very important. One of the optimization is the introduction of High Speed Downlink Packet Access (HSDPA). This architecture not only allows higher data rates but also more reliable data transfer by the introduction of Hybrid ARQ (HARQ). With this enhancement to the UMTS network, it becomes vital to see the performance of TCP in such a network. Therefore in this thesis, we try to evaluate two aspects of UMTS networks: first, the impact of HSDPA parameters like scheduling algorithm and RLC/MAC-hs buffer size on overall performance of TCP and second, to study the behaviour of two categories of TCP rate and flow control: loss based and delay based. Our simulation shows that delay based TCP tends to perform better than loss based TCP in our selected scenarios. The simulations are performed using the network simulator NS-2 with an e2e network model for enhanced UMTS (EURANE).
An Energy–Efficient Heuristic based Routing Protocol in Wireless Sensor Netw...AM Publications,India
Energy consumption is the critical issue to determine the lifetime of Wireless sensor networks (WSNs), due to limited batteries power resource of sensor nodes. The optimization of energy consumption is involves reduction of energy consumption in order to prolong the lifetime of the network as much as possible. However, to minimize the overall energy consumption of the sensor network, different types of routing protocols have been proposed. This paper proposes an energy efficient routing protocol using the A-star search algorithm to find the optimal path from the source node to the sink node. Simulation results with Matlab show that our proposed protocol is efficient in terms of total energy consumption and network lifetime compared with fuzzy approach.
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
GSTEB is a self-organized tree-based energy-balance routing protocol for wireless sensor networks. It aims to prolong network lifetime by balancing energy consumption across nodes. In GSTEB, the base station selects a root node and broadcasts its ID. Then each node selects its parent in a way that minimizes its distance to the root while balancing energy levels. The network operates in rounds, where a routing tree is constructed and nodes transmit sensed data to the base station along the tree. GSTEB dynamically changes the root node between rounds to further balance energy usage among all nodes. Simulation results show GSTEB outperforms other protocols in balancing energy consumption and extending network lifetime.
Soft4Leasing - Software for lending and asset finance companies. Obtain opera...Soft4
Soft4Leasing is business software for lending and asset finance companies. The software
is tailored for the leasing business process and adaptable to the unique needs of your
company, helping you obtain operational excellence, reduce risks, support compliance
and promote growth throughout your company. Soft4Leasing is built on the Microsoft
Dynamics NAV platform and thus allows you to enjoy all the advantages of a world-class
ERP system.
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
This document provides a summary of key challenges and approaches for key management in mobile ad hoc networks (MANETs). It discusses how MANETs have dynamic topologies and limited resources, posing security challenges. It reviews how cryptography is used to provide security but requires effective key management. It surveys research on asymmetric, symmetric, and group key management schemes proposed for MANETs. It also discusses trust models for key distribution, including centralized models using a trusted third party and decentralized models without a central authority.
Regional Economic Development from the Perspective of Circular Economy-- From...AM Publications,India
2014 November held the twenty-first session of the APEC conference in Beijing, during the meeting of Beijing sky appear for a long time did not see the blue sky, the air quality is good, be net friend for fun "APEC blue". The reasons why people have this demand is the reverse effect of economic development. This reminds us, the economic development not to the expense of environmental pollution. From the analysis of regional economic point of view, found that regional economic to be healthy, harmonious development, it must be combined with the circular economy, improve resource utilization efficiency, reduce pollution and keep the sustained economic growth at the same time, the problem of environmental pollution can improved. This paper intends to study how high utilization of circular economy in the development of regional economy, make economic development and environmental protection can change with direction. This paper firstly expounds the circular economy related theory; secondly, analyzes the necessity of the development of regional circular economy; thirdly, analysis the development of regional circular economy problems faced and how to develop the regional circular economy.
Design and Development of an E-Commerce Security Using RSA CryptosystemAM Publications,India
E-commerce has presented a new way of doing transactions all over the world using internet. The success of ecommerce depends greatly on how its information technology is used. Over the years the rate at which ecommerce sensitive information is sent over the internet and network has increased drastically. It is for this reason that every company wants to ensure that its ecommerce information is secured. There is need for ecommerce information transmitted via the internet and computer networks to be protected. There is substantial growth in the areas of credit card fraud and identity theft because the internet is a public network with thousands of millions of users. Amongst users are crackers or hackers that carry out the credit card fraud and identity theft in numerous ways facilitated by poor internet security; a concern regarding the exchange of money securely and conveniently over the internet increases. The criticality, danger, and higher priority importance of any e-commerce money transfer makes it a hot area of research interest in modern computer science and informatics. E-commerce industry is slowly addressing security issues on their internal networks but security protection for the consumers is still in its infancy, thus posing a barrier to the development of e-commerce. There is a growing need for technological solutions to globally secure ecommerce transaction information by using appropriate data security technology. The technology solution proposed for solving this security problem is the RSA cryptosystem. This research paper focuses on securing ecommerce information sent through the computer network and internet using RSA cryptography. It elucidates the implementation of RSA algorithm and shows that ecommerce security powered with RSA cryptography is very important in ecommerce transaction. While many attacks exist, the system has proven to be very secure
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksAM Publications,India
Wireless links losses result in poor TCP throughput since losses are perceived as congestion by TCP with the evolution of 3G technologies like Universal Mobile Telecommunication System (UMTS), the usage of TCP has become more popular for a reliable end-to-end (e2e) data delivery. However, TCP was initially designed for wired networks and therefore it suffers performance degradation due to the radio signal getting affected by fading, shadowing and interference. There are many strategies proposed by the research community on how to improve the performance of TCP over wireless links such as introducing link-layer retransmission, explicitly notifying the sender of network conditions or using new variants of TCP. As UMTS network coverage and availability are currently experiencing rapid growth, optimization of various internal components of its wireless network is very important. One of the optimization is the introduction of High Speed Downlink Packet Access (HSDPA). This architecture not only allows higher data rates but also more reliable data transfer by the introduction of Hybrid ARQ (HARQ). With this enhancement to the UMTS network, it becomes vital to see the performance of TCP in such a network. Therefore in this thesis, we try to evaluate two aspects of UMTS networks: first, the impact of HSDPA parameters like scheduling algorithm and RLC/MAC-hs buffer size on overall performance of TCP and second, to study the behaviour of two categories of TCP rate and flow control: loss based and delay based. Our simulation shows that delay based TCP tends to perform better than loss based TCP in our selected scenarios. The simulations are performed using the network simulator NS-2 with an e2e network model for enhanced UMTS (EURANE).
An Energy–Efficient Heuristic based Routing Protocol in Wireless Sensor Netw...AM Publications,India
Energy consumption is the critical issue to determine the lifetime of Wireless sensor networks (WSNs), due to limited batteries power resource of sensor nodes. The optimization of energy consumption is involves reduction of energy consumption in order to prolong the lifetime of the network as much as possible. However, to minimize the overall energy consumption of the sensor network, different types of routing protocols have been proposed. This paper proposes an energy efficient routing protocol using the A-star search algorithm to find the optimal path from the source node to the sink node. Simulation results with Matlab show that our proposed protocol is efficient in terms of total energy consumption and network lifetime compared with fuzzy approach.
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
GSTEB is a self-organized tree-based energy-balance routing protocol for wireless sensor networks. It aims to prolong network lifetime by balancing energy consumption across nodes. In GSTEB, the base station selects a root node and broadcasts its ID. Then each node selects its parent in a way that minimizes its distance to the root while balancing energy levels. The network operates in rounds, where a routing tree is constructed and nodes transmit sensed data to the base station along the tree. GSTEB dynamically changes the root node between rounds to further balance energy usage among all nodes. Simulation results show GSTEB outperforms other protocols in balancing energy consumption and extending network lifetime.
People often ask how venture capitalists arrive at valuations for companies that are sometimes pre-product or pre-revenue. The answer: it’s a mix of art and science. Unlike other asset classes, Venture Capital requires you to value companies amidst a high degree of uncertainty, where predicting the future outcome can sometimes be equated to looking into a crystal ball. While there are quantitative tools that we use to help guide our valuation, a lot of it depends on ascribing value to intangible things such as market, team and product. However, at the end of the day, high, sustainable growth rates will always command a premium – and that holds true for both the private and public markets.
Above is a high-level overview on how venture capitalists value a company. I hope it helps shine a light on the process that we use (at least at OMERS Ventures) to determine valuation. Frankly, sometimes we are right and sometimes we aren’t – but that’s a part of the game, especially when you are dealing with “art.”
Remember, as all things, there are always exceptions to the rule. Treat this simply as a guideline.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
This document provides a summary of an advanced process control final project. It includes sections on what-if scenario analysis, move suppression tuning, and a literature review of various model predictive control technologies. The what-if scenario analysis examines the effects of changing variables like fuel gas costs and feed rates. The move suppression tuning section details tuning the controller to suppress large manipulated variable moves. The literature review provides overviews of several commercial MPC systems, including descriptions of their capabilities and benefits.
Diversity in the technical workforce is a valuable asset for all companies, because it encourages different types of thinking and taps into the full potential of your team. Come learn from one AWS organization how a fast-moving, fast-growing team has put in place a "diversity circle" for personal and professional development. This program provides a peer mentoring group that builds skills and establishes informal networking support. The host and active participants of this two-year program will share tips and best practices for running a diversity peer mentoring group that spans engineering, product management, and operations.
The document provides an overview of an entrepreneurship training program taking place from December 13-16. The training will cover topics such as what is an entrepreneur, selecting a viable business, market research, financing strategies, costs of starting a business, marketing strategies, financial records, and writing a business plan. Session outlines provide more details on the content that will be covered each day, including opportunity recognition, SWOT analysis, calculating return on investment, and types of financing. The training aims to give participants the knowledge and skills needed to start their own successful business.
Tamer Hammouda is a sales executive from Palestine currently residing in the UAE. He has over 5 years of work experience in sales, procurement, and customer service. His most recent role is as an Enterprise Sales Executive at Du in Abu Dhabi, where he is responsible for meeting sales quotas by developing relationships with customers and identifying their needs. Prior to this, he worked in procurement for Tetra Emirates and as a customer service agent for Abu Dhabi Islamic Bank. He holds a Bachelor's degree in Economics from Al-Azhar University.
When you have a cash flow problem, you'll stop at almost nothing to get out of it. Here is a list of sources of funding that are proven to be the most reliable ways to raise money for a Business by Daniel Plamier.
The GRC RSA Archer Training course is designed to help you understand the key concepts and best practices for managing enterprise Governance, Risk Management, and Compliance (GRC). The training program offers a range of tools for managing risks and compliance, including risk assessment, policy management, incident management, audit management, and business continuity management.
https://www.infosectrain.com/courses/rsa-archer-training/
The document provides a summary of Vipul Chokshi's experience and qualifications. He has over 18 years of experience in IT areas like infrastructure management, project management, and security. The summary highlights his expertise in areas such as service delivery, identity and access management, and managing complex IT projects from design through delivery.
Pratap Penmetsa is a technical project manager with over 10 years of experience managing IT projects, predominantly in the financial services industry. He has extensive experience implementing solutions for compliance, regulations, payments, and fraud prevention. Some of his responsibilities have included managing budgets over $3M, creating project plans, tracking progress, and reporting status. He is proficient in various technologies, methodologies like Agile and Waterfall, and project management skills.
RathinaKumar S is a SAP BASIS Security Consultant with over 3 years of experience working with clients such as British American Tobacco. He has extensive skills in SAP security including user and profile maintenance, role building, and access controls. RathinaKumar graduated from Anna University with a degree in computer science and underwent training in SAP BASIS technology. He is proficient in tools such as GRC, Transport Express, and Oracle/MySQL databases.
This document provides a summary of Krishna Mohan E.S.V.'s experience and qualifications. He has over 10 years of experience in quality analysis, validation, testing, and performance engineering for various applications. He is proficient in test planning, automation, and has expertise in tools like LoadRunner, JMeter, and Quality Center. Krishna Mohan has worked on projects in various domains for clients like MetaVante Corporation, Q-Capital Strategies, Quintiles, IBM, Volt, Tata Consultancy Services, and F. Hoffman-La Roche.
Imtiaz Khan is a Presales Consultant and Senior Solutions Engineer with over 14 years of experience in enterprise datacenter, virtualization, and hyperconverged solutions. He has expertise in presales, storage, servers, backups, networking, and technical consulting. He holds certifications from VMware, EMC, Dell, and Microsoft. Currently located in Riyadh, Saudi Arabia, he is seeking a challenging role to apply his skills and experience in infrastructure projects.
The document contains descriptions of several long-term IT contract positions. The positions include a Cognos developer, Business Analyst with Sharepoint experience, Network Integration Specialist, Systems/Business Analyst for QA and Compliance, and ERP Strategy Application Architect. The summaries provide the job title, location, duration, rate, and brief description of responsibilities for each role.
The document provides a summary of experience and technical skills for Prabhakar Kumar, a Java/J2EE developer with over 11 years of experience developing enterprise applications. He has extensive experience developing applications using Thunderhead and other technologies for companies such as BP, Jewelers Mutual Insurance, and HP/Palm. His skills include Java, J2EE, Thunderhead, databases, frameworks, and software development processes.
This resume summarizes Srinivas Yedla's experience as a Senior IT Manager specializing in server virtualization, cloud services, middleware technologies and data center management. He has over 9 years of experience managing virtualization platforms like VMware and Hyper-V, cloud platforms like AWS, middleware like WebLogic and Citrix technologies. He is skilled in technologies like virtualization, AWS, WebLogic, IIS, JBoss, Apache, XenApp, XenDesktop and data center management. Currently he works as a Senior Manager at Genpact India where he manages server, storage and network infrastructure across multiple locations.
Varghese V Joseph has over 9 years of experience as a Business Analyst and Quality Assurance Engineer with expertise in business analysis, documentation, testing, and supporting software applications. He has a track record of leading teams and motivating them to consistently meet critical requirements. His technical skills include Selenium, SQL Server, and testing tools like QTP. He is seeking new opportunities where he can apply his strong communication and problem-solving abilities.
The documents describe several job openings:
- A search analyst position in Kansas City and Chicago managing paid search campaigns and analyzing search performance.
- A senior web developer position in Eugene, OR working on a gaming portal using technologies like PHP, JavaScript, and databases.
- An engineering lead/architect position in Mountain View, CA with experience in storage management, EMC, VMware, and NetApp focusing on security, UI, or database design.
- A web engineer position in Mountain View, CA with responsibilities including designing and building scalable software using PHP, JavaScript, and related technologies.
The documents describe several job openings:
- A search analyst position in Kansas City and Chicago managing paid search campaigns and analyzing search performance.
- A senior web developer position in Eugene, OR working on a gaming portal using PHP, JavaScript, and databases.
- An engineering lead/architect position in Mountain View, CA with experience in storage management, EMC, VMware, and NetApp focusing on security, UI, or database design.
- A web engineer position in Mountain View, CA with responsibilities including scalable software design/development in PHP, JavaScript, and maintaining high quality code.
Shahnawaz Ali has over 12 years of experience managing IT infrastructure projects internationally. His career summary highlights experience with strategic performance management including datacenter planning, virtualization, cloud computing, storage solutions, networking and security. He has worked extensively on projects related to development, evaluation, datacenter planning and management, server/network/security planning, and disaster recovery. His technical responsibilities have included building solutions for tiered datacenters, cloud migration, virtualization, storage, networking, security and more.
Manpreet Singh is a senior-level professional with over 7 years of experience in product management, system analysis, and project management. He has expertise in areas like client relationship management, team management, software technology, and more. Currently working as a senior operations specialist, he is seeking a senior role in a reputable software or client-server company. He has strong skills in Linux, server management, automation, security, and cloud technologies.
This document contains job openings from GetSureJob, a Pune-based HR consultancy. Positions include Oracle/SAP/JDE consultants, a Java consultant, and SAP consultants specializing in GTS, CS, CC/CI, CRM, and more. Candidates' required experience levels range from 3 to 10 years. Locations include Pune, Dubai, Chennai, Bangalore, Hyderabad. Interested candidates should send their CVs to job@getsurejob.com.
People often ask how venture capitalists arrive at valuations for companies that are sometimes pre-product or pre-revenue. The answer: it’s a mix of art and science. Unlike other asset classes, Venture Capital requires you to value companies amidst a high degree of uncertainty, where predicting the future outcome can sometimes be equated to looking into a crystal ball. While there are quantitative tools that we use to help guide our valuation, a lot of it depends on ascribing value to intangible things such as market, team and product. However, at the end of the day, high, sustainable growth rates will always command a premium – and that holds true for both the private and public markets.
Above is a high-level overview on how venture capitalists value a company. I hope it helps shine a light on the process that we use (at least at OMERS Ventures) to determine valuation. Frankly, sometimes we are right and sometimes we aren’t – but that’s a part of the game, especially when you are dealing with “art.”
Remember, as all things, there are always exceptions to the rule. Treat this simply as a guideline.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
This document provides a summary of an advanced process control final project. It includes sections on what-if scenario analysis, move suppression tuning, and a literature review of various model predictive control technologies. The what-if scenario analysis examines the effects of changing variables like fuel gas costs and feed rates. The move suppression tuning section details tuning the controller to suppress large manipulated variable moves. The literature review provides overviews of several commercial MPC systems, including descriptions of their capabilities and benefits.
Diversity in the technical workforce is a valuable asset for all companies, because it encourages different types of thinking and taps into the full potential of your team. Come learn from one AWS organization how a fast-moving, fast-growing team has put in place a "diversity circle" for personal and professional development. This program provides a peer mentoring group that builds skills and establishes informal networking support. The host and active participants of this two-year program will share tips and best practices for running a diversity peer mentoring group that spans engineering, product management, and operations.
The document provides an overview of an entrepreneurship training program taking place from December 13-16. The training will cover topics such as what is an entrepreneur, selecting a viable business, market research, financing strategies, costs of starting a business, marketing strategies, financial records, and writing a business plan. Session outlines provide more details on the content that will be covered each day, including opportunity recognition, SWOT analysis, calculating return on investment, and types of financing. The training aims to give participants the knowledge and skills needed to start their own successful business.
Tamer Hammouda is a sales executive from Palestine currently residing in the UAE. He has over 5 years of work experience in sales, procurement, and customer service. His most recent role is as an Enterprise Sales Executive at Du in Abu Dhabi, where he is responsible for meeting sales quotas by developing relationships with customers and identifying their needs. Prior to this, he worked in procurement for Tetra Emirates and as a customer service agent for Abu Dhabi Islamic Bank. He holds a Bachelor's degree in Economics from Al-Azhar University.
When you have a cash flow problem, you'll stop at almost nothing to get out of it. Here is a list of sources of funding that are proven to be the most reliable ways to raise money for a Business by Daniel Plamier.
The GRC RSA Archer Training course is designed to help you understand the key concepts and best practices for managing enterprise Governance, Risk Management, and Compliance (GRC). The training program offers a range of tools for managing risks and compliance, including risk assessment, policy management, incident management, audit management, and business continuity management.
https://www.infosectrain.com/courses/rsa-archer-training/
The document provides a summary of Vipul Chokshi's experience and qualifications. He has over 18 years of experience in IT areas like infrastructure management, project management, and security. The summary highlights his expertise in areas such as service delivery, identity and access management, and managing complex IT projects from design through delivery.
Pratap Penmetsa is a technical project manager with over 10 years of experience managing IT projects, predominantly in the financial services industry. He has extensive experience implementing solutions for compliance, regulations, payments, and fraud prevention. Some of his responsibilities have included managing budgets over $3M, creating project plans, tracking progress, and reporting status. He is proficient in various technologies, methodologies like Agile and Waterfall, and project management skills.
RathinaKumar S is a SAP BASIS Security Consultant with over 3 years of experience working with clients such as British American Tobacco. He has extensive skills in SAP security including user and profile maintenance, role building, and access controls. RathinaKumar graduated from Anna University with a degree in computer science and underwent training in SAP BASIS technology. He is proficient in tools such as GRC, Transport Express, and Oracle/MySQL databases.
This document provides a summary of Krishna Mohan E.S.V.'s experience and qualifications. He has over 10 years of experience in quality analysis, validation, testing, and performance engineering for various applications. He is proficient in test planning, automation, and has expertise in tools like LoadRunner, JMeter, and Quality Center. Krishna Mohan has worked on projects in various domains for clients like MetaVante Corporation, Q-Capital Strategies, Quintiles, IBM, Volt, Tata Consultancy Services, and F. Hoffman-La Roche.
Imtiaz Khan is a Presales Consultant and Senior Solutions Engineer with over 14 years of experience in enterprise datacenter, virtualization, and hyperconverged solutions. He has expertise in presales, storage, servers, backups, networking, and technical consulting. He holds certifications from VMware, EMC, Dell, and Microsoft. Currently located in Riyadh, Saudi Arabia, he is seeking a challenging role to apply his skills and experience in infrastructure projects.
The document contains descriptions of several long-term IT contract positions. The positions include a Cognos developer, Business Analyst with Sharepoint experience, Network Integration Specialist, Systems/Business Analyst for QA and Compliance, and ERP Strategy Application Architect. The summaries provide the job title, location, duration, rate, and brief description of responsibilities for each role.
The document provides a summary of experience and technical skills for Prabhakar Kumar, a Java/J2EE developer with over 11 years of experience developing enterprise applications. He has extensive experience developing applications using Thunderhead and other technologies for companies such as BP, Jewelers Mutual Insurance, and HP/Palm. His skills include Java, J2EE, Thunderhead, databases, frameworks, and software development processes.
This resume summarizes Srinivas Yedla's experience as a Senior IT Manager specializing in server virtualization, cloud services, middleware technologies and data center management. He has over 9 years of experience managing virtualization platforms like VMware and Hyper-V, cloud platforms like AWS, middleware like WebLogic and Citrix technologies. He is skilled in technologies like virtualization, AWS, WebLogic, IIS, JBoss, Apache, XenApp, XenDesktop and data center management. Currently he works as a Senior Manager at Genpact India where he manages server, storage and network infrastructure across multiple locations.
Varghese V Joseph has over 9 years of experience as a Business Analyst and Quality Assurance Engineer with expertise in business analysis, documentation, testing, and supporting software applications. He has a track record of leading teams and motivating them to consistently meet critical requirements. His technical skills include Selenium, SQL Server, and testing tools like QTP. He is seeking new opportunities where he can apply his strong communication and problem-solving abilities.
The documents describe several job openings:
- A search analyst position in Kansas City and Chicago managing paid search campaigns and analyzing search performance.
- A senior web developer position in Eugene, OR working on a gaming portal using technologies like PHP, JavaScript, and databases.
- An engineering lead/architect position in Mountain View, CA with experience in storage management, EMC, VMware, and NetApp focusing on security, UI, or database design.
- A web engineer position in Mountain View, CA with responsibilities including designing and building scalable software using PHP, JavaScript, and related technologies.
The documents describe several job openings:
- A search analyst position in Kansas City and Chicago managing paid search campaigns and analyzing search performance.
- A senior web developer position in Eugene, OR working on a gaming portal using PHP, JavaScript, and databases.
- An engineering lead/architect position in Mountain View, CA with experience in storage management, EMC, VMware, and NetApp focusing on security, UI, or database design.
- A web engineer position in Mountain View, CA with responsibilities including scalable software design/development in PHP, JavaScript, and maintaining high quality code.
Shahnawaz Ali has over 12 years of experience managing IT infrastructure projects internationally. His career summary highlights experience with strategic performance management including datacenter planning, virtualization, cloud computing, storage solutions, networking and security. He has worked extensively on projects related to development, evaluation, datacenter planning and management, server/network/security planning, and disaster recovery. His technical responsibilities have included building solutions for tiered datacenters, cloud migration, virtualization, storage, networking, security and more.
Manpreet Singh is a senior-level professional with over 7 years of experience in product management, system analysis, and project management. He has expertise in areas like client relationship management, team management, software technology, and more. Currently working as a senior operations specialist, he is seeking a senior role in a reputable software or client-server company. He has strong skills in Linux, server management, automation, security, and cloud technologies.
This document contains job openings from GetSureJob, a Pune-based HR consultancy. Positions include Oracle/SAP/JDE consultants, a Java consultant, and SAP consultants specializing in GTS, CS, CC/CI, CRM, and more. Candidates' required experience levels range from 3 to 10 years. Locations include Pune, Dubai, Chennai, Bangalore, Hyderabad. Interested candidates should send their CVs to job@getsurejob.com.
The document contains job descriptions for various IT roles including project managers, technical services managers, solutions consultants, SAP consultants and managers, PeopleSoft finance consultants, application architects, application consultants, production support engineers, database administrators, test consultants, systems consultants, network consultants, security consultants, desktop support specialists, IT helpdesk specialists, Java/J2EE developers, .Net senior developers, PeopleSoft developers, testers, Java developers, production support analysts, PHP developers, creative designers, and Java systems analysts. The roles involve responsibilities such as project management, infrastructure integration, pre-sales support, application development, production support, database administration, testing, systems administration, networking, security and more. Requirements for the roles include relevant
This document contains job descriptions for several IT roles including project managers, technical services managers, solutions consultants, database administrators, application architects, application consultants, production support engineers, systems consultants, network consultants, and consultants for SAP, PeopleSoft Finance, Java, and testing. The roles involve responsibilities such as project management, infrastructure implementation, pre-sales support, application development, database administration, production support, systems administration, and network design. Requirements listed for the roles include relevant experience, technical skills, and certifications.
The document lists several job descriptions, each containing 3-4 bullet points outlining the key requirements and responsibilities for that role. The roles include J2EE Administrator, JBoss Administrator, IT Portfolio Analyst, Business Analyst, ETL/Cognos Developer, and several other IT-related positions requiring experience in areas like project management, Java/web development, systems administration, and technical support.
This document provides an executive profile summary for a senior managerial candidate with over 23 years of experience in IT project delivery. The candidate has extensive experience managing projects in areas such as virtualization, cloud, SAP, and quality assurance. Some of the key responsibilities of the role have included providing technical guidance, managing resources and budgets, ensuring project profitability, and representing the company for new business pitches and sales. The candidate possesses relevant technical skills and project management experience working with major clients across industries and locations.
Shirish Sonawane is seeking a challenging role as a lead Manual/Automation QA Engineer with 9.5 years of experience in testing large applications. He has extensive experience in both manual and automated testing including functional, regression, performance, and installation testing. He is proficient in test automation tools like Selenium, Java, and frameworks like TestNG.
Similar to Happiest Minds - Recruitment - Urgent (20)
Happiest Minds is seeking a DQA candidate based in Bangalore with 4-6 years of overall IT experience. The ideal candidate will have experience implementing and appraising CMMI frameworks at Level 5, working in maintenance and production support environments, and using project management tools like Microsoft Project. They should also have skills in auditing, developing guidelines and templates, process tailoring, managing metrics programs, and defining and managing quality management systems. Relevant certifications like PMP, ITIL, Scrum Master or Six Sigma are preferred.
HappiestMinds is hiring for various technical positions. The document lists over 50 different roles along with the required years of experience. Roles include Java developers, .Net developers, iOS developers, data scientists, security roles, and more. Experience requirements range from 1 to 14 years depending on the specific role.
Happiest Minds is hiring for various positions in Bangalore and Pune on April 30th and 29th, 2016. Positions include MDM Developer, MSBI Developer, MicroStrategy Developer, Pentaho ETL Developer, Talend Developer, BIRST Developer, Java Developer/Module Lead/Technical Lead, and Dot Net Developer. Requirements for each position include relevant skills and years of experience. Interviews will take place on specified dates in Bangalore and Pune.
Senior Software Engineer - Embedded Networks - San JoseAshok K DL
Happiest Minds is Hiring! Urgent – San Jose, CA
Please Inbox resumes to me at the earliest.
Applicants without valid work authorization will not be entertained.
Happiest Minds is Hiring!
Drive Date: 6th Feb 16, Saturday
Drive location: Hyderabad and Bangalore
Work Location: Bangalore
Please mention in subject line in this format #Job Code #Experience #Current Location of the candidate without which resumes may not be considered for any further action.
For example : #Java #7yrs #Bangalore
Inbox Resumes ASAP.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
1. Happiest Minds – Recruitment – Bangalore, Mumbai and Gurgaon.
Practice Requisition Name
Experience
in years
Primary Skills
Big Data &
Database
Data Base Architect 8 to 15 yrs
· Technical experience which includes Technology Operations and Service Delivery experience
· Experience in MS SQL stored procedure & query QA, Clustering & HA, modern Data Analytics techniques,MSSQL
2005 2008, 2012, 2014 versions.
· Subject Matter Expert and Hand On in MSBI SSRS, SSIS & SSAS
(Need exp in 70 to 80% of Architect and 20 to 25% for DBA Exp)
Python 4-6Yrs
· Strong Python programming skills
· Object-oriented design
· Unit testing
· Strong Linux command-line experience
Consulting &
GRC
GRC Risk Management 6 to 12 yrs
· Experience on Risk Management, ISO27001, PCI DSS, NIST, COBIT, and SANS,GRC tools (e.g. RSA Archer).
· Certification on CISSP, CISM, CRISC, CISA, or similar industry certification(s) preferred
Business Analyst (Night Shift) 6 to 8 yrs
· Night Shift
· Experience on Third Party risk assessors/TPA/Riskassessors with 6-8 years’ experience.
· Very good/excellent communication skill is mandatory.
Vendor Audit
Management(Mumbai)
1 to 3 yrs
· Strong Excel and PPT skills with solid communication
· Data collection, analysis and reporting, presentation ( currently 40-50 metrics are being tracked)
· Metrics data will be collected from IT , IT Security, Happiest Minds Solutions management team etc
· Tracking Deviations and Exceptions expiries
Information and Risk Security
Auditing(Mumbai)
5 to 8 yrs
· Coordination with Auditors, Auditees,Business Departments
· Planning, controlling, monitoring the audit process
· Tracking issues,agreeing to risk levels and remediation with stakeholders,following up for mitigation status,
management reporting
· Currently 250 vendors are covered as part of the vendoraudit process
· Candidate should have good understanding experience in the above + good excel and ppt skills
TPA(Third Party) 6 to 8 yrs
· TPA(Third Party)-Cloud
· Experience in doing third party assessment,cloud security risk assessments is a must, PCI DSS
assessments/implementations.
· Experienced in Information Security Risk Management; implementing, maintaining and auditing Risk Management
frameworks (ISO 31000 & ISO 27001
CTMS VMWare NSX 10 to 15 yrs
· Hands on VMware’s products (VMware ESX, vCenter, SRM, NSX, vCloud Director)
· Experience in configuring VMWare NSX 6.2 and SRM.
2. VMWare Server 10 to 15 yrs
· Must possess ability to configure ESX in a cluster, set up HA, DRS, SRM and VMotion functions.
· Windows Must possessworking knowledge of how to prepare virtual machines for Windows OS installation.
· Volume/Storage/File systemManagement: Must have knowledge of . HBA config, SAN. Disk config. Mirroring,
RAID, Multi-pathing. Understanding of SAN best practices
IDAM
FR Open 3 to 7 yrs · ForgeRock, Open AM, OpenIDM, OpenSSO, Liferay
RSA Aveska (Gurgaon) 5 to 8 yrs
· Net IQ IAM, Identity Management, Access Governance solution 6.9, LDAP, one or more databases such as Oracle,
IBM and MS SQL
JAVA
JAVA
FRONT-END DEVELOPERS
5 to 12
4 to 12
Java(Spring, hibernate and web services)
Java Front End (Angular.JS is must)
•