|
Simplicity is prerequisite for reliability
- Edsger Wybe Dijkstra (May 11, 1930-August 6, 2002)
In recent times, people with management, methodology and process skills are
mostly preferred for IT jobs in the market. Pay has been increased for business
process, modeling management and project management skills. It is down for
systems, networking, messaging, communications and database skills. Those with
virtualization, network security management, storage area networking and infrastructure
architecture skills are earning more along with those with the area security, VoIP, and
wireless networking skills. Those with SAP financial accounting, HCM, ERP and solution
manager skills command higher remuneration. In the application development area, those
with NetWeaver and extreme or agile programming skills are in demand. Java,
Oracle Developer Suite and Business Objects experience is highly valued. Microsoft.net,
Ajax, Microsoft Commerce Server, Apache HTTP Web Server, and Documentum are among
the most sought-after e-commerce development skills. Microsoft Certified Solution
Developers earned the highest pay premium for application development and
programming languages certifications, followed by the IBM-Certified SOA Solution Designers and
the Sun Certified Enterprise Architects for Java Platform credentials. Other top
certifications include Oracle DBA Administrator Certified Master, Citrix Certified Integration
Architect, Cisco Certified Internet work Expert, Certified Information Security Manager, Master
IT Certified Architect and Microsoft Certified Trainer.
Security has become a key product and service differentiator among customers
who are insisting on better protection for their data, whether in servers or transported
across networks. Companies are working actively to better secure virtualized
environments now that the differences in threats to physical and virtual computing environments
have become more apparent.
M V Panduranga Rao and K C Shet, in their paper, "Analysis and Refining of
Scheduler for Real-Time Operating System", have presented scheduling policies,
design requirements, scheduling of tasks and design summary of parametric scheduling.
In the paper, "PGP Using Chebyshev Polynomials", B Tirimula Rao, P
Srinivasu, Chukka Anantha Rao, Kanduri Satya Vivek Vardhan and Jami Vidyadhari, introduced
a way for achieving higher degree of privacy for e-mails using Chebyshev polynomials
for `Pretty Good Privacy' (PGP). A brief discussion on how these polynomials are helpful
in providing good security is presented in this paper and the security strengths are
also evaluated.
Pinaki Chakraborty, in her paper, "Extracting Equations for Actual Execution
Times of Some Frequently Used Sorting Algorithms", signifies the need to study the
actual execution times of algorithms on different hardware and software platforms.
N Suresh Rao, Devanand and P S Avadhani, in their paper, "Propagation Behavior
of Computer Virus in the Framework of SIR Model", have described the dynamics
of propagation of computer virus in a network of computers based on the
mathematical epidemiological model, Susceptible-Infected-Removed (SIR) model.
V Vasudevan and R Sukumar, in their paper, "Multiserver Approach for
Large-Scale Secure Multicast in Wireless Environments", proposed a multiserver architecture
that used a Time-Based Approach (TBA) for group key management to minimize the
overall system bandwidth.
In the paper, "Transition Networks for the Processing of Sanskrit Text
for Identification of Case Endings", Smita Selot, Neeta Tripathi and A S
Zadgaonkar have given the design of a system which processes the suffix with the help of a type
of network, similar to the transition network for identification purpose.
Anisha Kumar, in the research note, "Approaches of the WinRunner and
LoadRunner Software Testing Tools: A Case Study", presents a case study of the software testing
tools WinRunner and LoadRunner applicable for the real-time applications of a software
firm at Mysore.
-- C R K Prasad
Consulting Editor |