Archive for 2014

BIG DATA BIG DEMAND


What: Big Data is the collection and management of large and complex data pertaining to an organization.

Why: It makes storing huge information easier. Such data can help companies carry out business analytics and data based management, leading to better decision-making and business planning.

It is predicted than in 2020, 50 billion devices will be connected across the globe.

Storing information about each of these devices will be connected across the globe.

Storing information about each of these devices is going to be difficult without big data.

Where: Big Data finds application in all verticals.
It is not restricted by geography. It comes with the possibility of being accessed across the globe.

Who: Demand for big data professionals is on the rise.
They should have been exposed to Hadoop and MONGO DB and have the knowledge the ability to apply the knowledge in various processes that go with Big Data, which include analysis, capture, curation, search,Sharing, storage, transfer, visualization, and privacy violation.

When: According to experts, huge hiring of big Data professionals will soon be witnessed in mobile, healthcare and financial services.



Tuesday, 23 December 2014
Posted by Unknown
Tag :

Microsoft Collects User Data In Windows 10 Technical Preview

Microsoft Collects User Data In Windows 10 Technical Preview


Is Microsoft watching your every move on the recently-released Windows 10 Technical Preview? That may be the case thanks to portions of Microsoft's privacy policy, which indicates that the company is using a keylogger, among other methods, to obtain information about the software's performance. This is likely one of the reasons why Microsoft insists that Windows Technical Preview not be installed on computers that are used every day.




"When you acquire, install and use the Program, Microsoft collects information about you, your devices, applications and networks, and your use of those devices, applications and networks," the privacy policy stated. "Examples of data we collect include your name, email address, preferences and interests; browsing, search and file history; phone call and SMS data; device configuration and sensor data; and application usage."

Microsoft provided four examples, one of which clearly states that when entering text into any application, Microsoft may collect those typed characters. Why? So that the company can fine-tune the spell check and auto-complete features. Again, the Technical Preview is not ideal on machines used for everyday purposes unless users don't care about this "character collection."

Microsoft also revealed that when users open a file, the company collects information about the file, the program that opens the file and how long it takes to open said file. Microsoft claims that it uses this information to improve performance and more. Microsoft also collects information about programs that are installed -- including the device they are installed on -- and uses that information to determine and improve Windows 10's compatibility with those programs.

The company acknowledges that it may collect voice information if the customer uses voice input features, such as speech-to-text. This information will be used to improve speech processing, Microsoft revealed.

"Microsoft uses data we collect from the Program to operate, improve and personalize the Program and other Microsoft products and services," the privacy policy stated. "Some data is stored on your device and some data is transmitted to Microsoft. Microsoft shares some data with our partners to improve how their products and services work with Microsoft's products and services."

According to Microsoft, the user's contact information is only used to contact that customer, whereas the preferences are used to configure Program features. Under Disclosure of Data, Microsoft states that it will only share the data with the user's consent. Microsoft also states that the company will "share or disclose information about you with other Microsoft-controlled subsidiaries and affiliates, and with vendors or agents working on our behalf."



Tuesday, 4 November 2014
Posted by Unknown

ETHICAL HACKING TRAINING @ REDBACK IT ACADEMY




Redback IT Academy is a leading Information Technology Solutions provider. Redback had wide range of expertise include Hardware Solutions, Server, Software, Security and Networking Services. We are Technical Service Providers and also provide Quality Training.

ETHICAL HACKING COURSES:
  •           CEH (Certified Ethical Hacker)
  •           CPH (Certified Professional Hacker)
  •           CISSP (Certified Information System Security Professional)

Specialities  :
  •         ISO Certified IT Training Academy.
  •          Authorized partners by Microsoft, Intel, Cisco, Redhat, IBM, and VMware…….
  •          Special attention and placement guidance for all the students.
  •          Training program is completely practical (Hands on Practical Training).
  •          Separate lab facilities are there for all our trainees.
  •         Batches are there during weekdays as well as weekends. Students can choose their own convenient batch and timings.
  •          Individual attention to each and every student is guaranteed.
  •          Certified Institute awarded by worldwide companies.

Further Detail :   
Contact :    K.Sivapriya   cel : 9500976062
                    T.Arularasi   cel : 8189985554


Venue : Redback IT Solutions Pvt. Ltd.,
     # AL – 24, TNHB, Phase III, Sathuvachari, Vellore-632 009
Monday, 27 October 2014
Posted by Unknown

RED HAT ENTERPRISE LINUX 7

REDHAT ENTERPRISE LINUX 7

The Release Notes documents the major features and enhancements implemented in Red Hat Enterprise Linux 7 and the known issues in this 7.0 release. 



INTRODUCTION:
I.                  NEW FEATURES :

1. Architectures
2. Installation and Booting
3. Storage
4. File Systems
5. Kernel
6. Virtualization
7. Linux Containers with Docker Format
8. System and Services
9. Clustering
10. Compiler and Tools
11. Networking
12. Resource Management
13. Authentication and Interoperability
14. Security
15. Subscription Management
16. Desktop
17. Web Servers and Services
18. Red Hat Software Collections
19. Documentation
20. Internationalization
21. Supportability and Maintenance

II.               KNOWN ISSUES :

22. Installation
23. Storage
24. Kernel
25. Virtualization
26. Deployment and Tools
27. Clustering
28. Networking
29. Authentication and Interoperability
30. Security
31. Entitlement
32. Desktop



Thursday, 9 October 2014
Posted by Unknown

Hardware & Networking

The A+ certification is the starting point for a career in IT. The exam covers maintenance of PCs, mobile devices, laptops, operating systems and printers.





Jobs that use A+
·         Technical support specialist
·         Field service technician
·         IT support technician
·         IT support administrator
·         IT support specialist
Topics Covered
·         Introduction
·         Power Systems
·         CPUs and Motherboards
·         Memory Systems
·         Expansion Cards
·         Data Storage Devices
·         Ports, Connectors and Cables
·         Printers and Scanners
·         Display Devices
·         Portable Computers and Devices
·         Operating System Management
·         Operating System Monitoring
·         OS Maintenance and Troubleshooting
·         Networking
·         Internet Connections
·         Network Troubleshooting
·         Security
·         Maintaining the PC Environment
·         Introduction
·         Getting Started with PC Hardware Support
·         Operating Systems
·         Electricity and Power Supplies
·         CPUs and Motherboards
·         Basic Input/Output System
·         Memory Systems
·         Bus Structures
·         Expansion Cards
·         Ports, Connectors and Cables
·         Data Storage Devices
·         Video and Multimedia Input/Output Devices
·         Printers
·         Portable Computers and Devices
·         Monitoring and Management
·         Operating System Troubleshooting
·         Connecting Computers
·         Networking Computers
·         Security
·         Windows Installation and Upgrades
·         Safety

·         Troubleshooting and Maintaining a PC
Friday, 12 September 2014
Posted by Unknown

Microsoft Private Cloud

This course provides you with the knowledge and skills to successfully implement the Microsoft Private Cloud solutions.
At the end of this training, candidates will provision private cloud infrastructure and applications that can deliver a flexible and cost-effective infrastructure.






TOPICS COVERED:
·        Design and Deploy System Center
·        Design a scalable System Center architecture
·        Install the System Center Infrastructure
·        Upgrade System Center components
·        Configure System Center Infrastructure
·        Configure System Center components
·        Configure portals and dashboards
·        Configure the Fabric
·        Configure the storage fabric
·        Configure the network fabric
·        Configure the deployment and update servers
·        Configure clouds and virtualization hosts
·        Configure System Center Integration
·        Configure private cloud integration
·        Configure integration of private and public clouds
·        Configure and Deploy Virtual Machines and Services
·        Configure profiles
·        Create and configure server App-V packages
·        Configure and deploy a service

·        Update a service
Friday, 5 September 2014
Posted by Unknown

widget

Pageviews

Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -