IIT Inc. - IT Consulting, Staffing and Multimedia Communication Solutions
IT Consulting and Staffing Services
for the Government Public Sector Clients

  • About IIT
    • Home
    • About IIT - Overview
    • IIT Awards
    • IIT Certified MBE Diversity Supplier - IIT Inc.
  • Services
    • Services Overview
    • IT Consulting and Outsourcing
    • Contract and Direct Hire Staffing Services
    • Recruitment Process Management
    • Government Solutions - IIT Inc. Public Sector Practice >
      • NYS HBITS - IIT Inc
  • Careers
    • See All Current Jobs Openings >
      • Search Jobs
      • Submit Resume
    • Career Tips & Helpful Articles >
      • Resume Writing Tips
      • Career Tips - Enhancing your career and current job
      • Interview Tips
  • Supplier Diversity
  • Contact Us
    • Information Request
    • Geographic Markets Served
  • Blog

What is Google Glass and how does it fit in business environment?

6/30/2014

1 Comment

 

Google Glass is one of the more popular wearable technologies on the horizon. It sits on your face just like a pair of glasses. A glass prism sits right above the eye on the right side of the frame. Some people question if the glass prism creates an obstacle in front of the eye, but it sits above the eye and isn't intrusive. As a matter of fact, you can't see the glass image if you sit the frame too low on the face due to the angle that directs light to the eye.
 
Glass uses your smartphone's Bluetooth connection to synchronize your data. You use your smartphone's hotspot to connect Glass to the Internet. Because Glass is a wearable computer, it needs storage space. You get 16GB of storage space for videos, images and apps.

Google Glass is still in its beta stage, which Google calls "Explorer." You need an invite to get a pair of Google Glasses, and just being a beta tester costs you $1500 plus shipping expenses. Glass is wearable technology, which isn't at all innovative today, but the way Google Glass works is brilliantly different from any of its predecessors.
 
Glass was a catalyst for several app ideas for the visually impaired. The glass prism displays a clear image into the eye that can be used to help people identify unseen objects around them. Glass uses voice commands, so the wearer can take video and images without using his hands.
 
Some people criticize Glass as a hobbyist's toy, but it has potential and enough testers to possibly become the next wearable computer that people won't leave home without. It could even improve the lives of people with disabilities.

But is Google Glass only an end-consumer item? When smartphones and other tablets initially showed up, consumers were the first adopters. This also allowed the manufacturers to tweak their technologies, and allowed software developers to create useful apps for the business environment. With a plethora of apps now available, these devices have become a “Corporate” item. We have witnessed these devices in use in various corporate environments already. Any corporate websites built these days typically have to go through mobile/tablet testing, which means that corporate decision makers acknowledge that users will use their websites using mobile devices.

I see similar future for Google Glass. I’ve already heard apps being developed for the Glass platform that include GPS, iPod like music player, texting, personal fitness, sports simulation and others. They all typically fall under “consumer” space. But that’s no different from smartphones and tablets when they were first introduced. So how will Corporate America use these new wearable devices? Some ideas I foresee that could translate to business apps include a Presentation Projector, corporate database information lookup, inventory check-in/checkout in a warehouse environment (with a built in bar code reader add-on), and lets not forget the all important app “reading corporate emails”.

While I don’t see Google Glass in an office/desk environment, but I see uses for this device in mobile/active workforce not tied to a desk like me :-)But then again, when I am at my desk, I am typically using a PC, but when away from my desk, I do find myself using my smartphone and tablet devices.

So IT managers should get ready to handle more ‘wearable technology’ devices and integrating them with your current IT infrastructure.

What do you think?

1 Comment

11 Tips on hiring an IT Consultant

6/30/2014

39 Comments

 
In the last two weeks I had 6 conversations with our current and prospect clients who discussed their challenges when hiring an IT Consultant. There was one clear theme. They all 'interviewed' the submitted Contractor candidates for technical skills, focusing on the technical nuts and bolts. But 5 out of 6 had poor experiences with the performance after the consultant was on-boarded on the project. Does this sound like you?


You've screened them for Technical, Business and Interpersonal skills. But are you done? There are many other steps you should be considering, including

1 - Do you check how many layers of vendors are there between you (the client) and the actual individual who will be performing services for you. I feel the number should be 1 or 2. I've heard some of my clients voice that the number should only be 1, to which I disagree. No one vendor has access to all Consultant resources, and they frequently work with subcontractors with certain niche skill sets. These vendors have invested time and resources into building a realtionship with, and screening from a large pool of subcontractors. So if you believe that the layer number should be only 1, you may be missing out on a larger talent pool available through the vendor's subcontractor network.

2 - Did you do only conduct Phone interview? We've heard stories of "Bait and Switch" i.e. a client interviews a candidate on the phone, hires the candidate, but a different candidate shows up on their first day. I understand that there are issues interviewing candidates who are located on the opposite side of the country. My in my experience, video interviews using free technology like Skype has proven beneficial. You may use Skype video + telephone simulataneously (disable Skype audio, or putting your PC speakers down), to improve the interview experience. There are other 'pay for' solutions available for video interviews. Which one you use is less important than using one.


3 - Did you give them an Online Technical Test - Again, I have heard stories of "Bait and Switch". One candidate takes the online test, and a different candidate shows on their first day. Considering the scenario that the candidate may be located on the opposite side of the country, what are you supposed to do? I personally like interviewing candidates and asking them questions for which there are no online tests. I talk to them about my project, and explain to them one particular issue I may be having. I look for their thought process, mastery of overall subject. I give them points even if the answer to the problem is incorrect, as long as they show their mastery of the subject matter. Why? I feel anyone can Google any question, and find the correct answer. What I am looking for is not the correct syntax for a line of code, but their ability to understand a problem, and then their thought process on their approach to solving the problem
 
4 - There have been some projects where my needs were to screen candidates for the 'syntax'. In this case, Id did a screen share with them - and showed them our code. And them I let them control my PC. What I was looking for was to see how quickly they can grasp the code. Then I asked them for suggestions on improving the code. I felt this process assessed their critical thinking, and problem solving skills.

5 - Where's their immediate family / spouse / children etc. Does their spouse work? What I learnt was most of us are not single and have some attachments to some people in our lives. I've noticed that when you remove people from these attachments, and the distance is large, there is turnover. So this is something I am always curious about

6 - Don't waste time on Reference checks - I feel 7 out of 10 candidates give references of people who will give them good references. So if you want to ask a reference "How were they at their job" expect an answer "Great". While I still see a value of reference checks, but getting accurate references can sometimes be very difficult. Sometimes insisting on this has resulted in me loosing some good candidates, where my competition hired that resource before I could finish reference checks. So if I have a need to check references, and I absolutely can't do without it, I would look at employers/projects where a candidate may have worked, and do my independent investigation on the candidate, calling people from my personal network, rather than relying on a reference provided by a candidate.

7 - Impose minimum wage rate to the actual assigned personnel working on your site. If the vendor tells you a bill rate of $100/hr. but is paying the assigned personnel $25/hr., you can bet that you will not have that candidate working at your site for too long. The candidate will soon find another opportunity that pays them a fair market value. Most consultants are fairly well educated about their market value, but sometimes circumstances lead them to 'accept' your assignment, only to see them leave within a couple of months. So I like to see in my contracts that the assigned personnel is getting paid a fair market value, which could vary between 40% to 80% of the bill rate (depending on layers, and whether you are hiring a Deloitte consultant or an IIT Consultant). I wouldn't impose on vendors a number like 80%, but different vendors have different costs. But sometimes I do ask them about their costs, and what percent of bill rate goes to the assigned personnel. My vendors work hard, and they deserve to make a living, and as long as I get a fair rate, I just want them not to abuse the assigned personnel.

8 - Ask candidates if they have any planned time off / vacations. This area is sometimes overlooked. Imagine hiring a consultant, who has a wedding planned right when you have your major roll out planned.

9 - Honestly identify who you 'really' are - Is  your company a Tier-1 player, Tier-2 player etc... hire a consultant at the same level as you.. Lets say you are Google or Apple, then you can afford to hire a Tier-1 consultant. But if you are not, and want longevity in assigned personnel, get realistic about your expectations. I feel you can hire mediocre people, put them in a good environment with excellent processes, and receive 'superior' work. So invest in your process, culture and environment, and hire personnel that are a good fit. And in many circumstances, superstars are not a good fit in various environments.

10 - Don't hire friends / family / close referrals.. They are hard to fire.. I don't think I need to comment more on this subject

11 - Give interviewed candidate a takeaway question, and ask them to email you back with a response (don't propose a deadline) (see how soon they respond, and look at quality of their written and their analytical skills further)




I am sure there are many other ideas out there, to improve this process further. Do you have one?




39 Comments

4 Tips to improve Windows 8 performance

6/29/2014

0 Comments

 
Upgrading to a new operating system is a major undertaking for the enterprises. While IT managers are concerned with deployment and integration, rolling out Windows 8 in the enterprise comes with its own challenges. While the underlying code on Windows 8 is inherited from its predecessor Windows 7 architecture, Windows 8 presents a significantly revised user interface demonstrating Microsoft’s push to make its platforms relevant on mobile devices.

From an end user perspective, IT managers need to be concerned about training end users on the new interface, as well as delivering an improved user experience for best adoption of the new platforms.

This article focuses on improving user experience, via improved performance at the desktop level.

 

Windows 7 was an operating system that provided a significant increase in performance over previous Windows iterations. Windows 8, the successor to Windows 7, has been designed to provide an even bigger increase in performance due to efficient memory and CPU management. However, you will not see much of a boost in performance if you are running Windows 8 on a low-end computer or laptop. Fortunately, you can make Windows 8 run much faster by tweaking certain aspects of the operating system.

Windows 8 has let go of a number of visual effects that were found in Windows 7, but it still has enough effects left to cause a major strain on memory and processing power. If you are experiencing screen tearing and lag when opening, closing or moving applications around the screen, your computer may not have the resources available to run the default user interface normally. This issue can be remedied by using a built-in configuration tool named Performance Options. To open Performance Options, go to “Search” on the Charms Bar, select “Settings” and then enter “Performance Tools” into the search box. Now select “Performance and Information Tools” to open Performance Options. Next, select the “Visual Effects” tab, then click the radio button next to “Adjust for best performance.” Click “Apply” to save the changes. Applications will now start to run faster due to the freed up memory and processing power that were previously dedicated for visual effects.

Defragmenting your hard drive using a disk defragmenter is another great way to make Windows 8 run faster on older hardware. Grouping together file fragments makes it easier for the hard drive to access data, therefore speeding up data transfer rates considerably. Windows 8 comes with a built-in disk defragmenter that has the ability to defragment select partitions. To get to the disk defragmenter, open File Explorer and click “Computer” on the left-side navigation pane. Right click the partition that contains the Windows 8 installation and select “Properties.” Now select the “Tools” tab and click “Optimize.” Once again, select the Windows 8 partition on the “Optimize Drives” window and click “Optimize” to defragment the partition.

If you had used Windows 8 for some time, you would have noticed the User Account Control notifications that pop up whenever you make changes to applications or important system files. These notifications are accompanied by a dimming effect that taxes the resources on older hardware. Fortunately, you can lower the amount of UAC notifications that show up by changing the UAC security level. First, open the “Charms Bar” and select “Search.” Click “Settings” and type “User Account Control” into the search box. Now press “Enter” to open the User Account Control Settings window. Move the slider to a level below the default security level and click “OK.”

Running your computer on the latest drivers available can also create a huge impact on performance. Using the latest drivers for your video card and motherboard not only increases your computer’s performance, but also fixes issues that were present in older drivers. Windows 8 comes included with drivers for most hardware devices, but using latest drivers downloaded directly from a device manufacturer’s website provides additional configuration tools that you can use get the maximum performance from each device.

 

Disclaimer: This article and other articles provided on this electronic medium is not intended to be an advise of any kind, and provided by IIT Inc. as a value to our readers in a form of information and discussion. We recommend verifying this information, and performing your own analysis prior to using any information provided herein.

0 Comments

7 Tips to Harden Your Apache Installation on Linux

6/27/2014

1 Comment

 
Hackers are constantly discovering ways to gain access to Web servers to send spam, launch synchronized attacks on other servers, steal personal information and deface websites. Because Apache is the most commonly used Web server software, hackers focus many of their efforts on trying to discover vulnerabilities they can leverage on an Apache server. After you install Apache from the default APT package on Debian or Ubuntu, or from the default Yum package on Red Hat, CentOS or Fedora, you can strengthen the security of your installation with these seven tips to harden your Apache Web server.

 

1.      Keep Your OS Updated. The Apache community is very active and alert to security issues. Make sure that you frequently apply patches for your operating system, which will include security patches for Apache. Update your installation with either Apt or Yum:

apt-get update && apt-get upgrade (Debian/Ubuntu)

yum update (RHEL/CentOS/Fedora)

             

2.      Suppress OS Information When Errors Occur. When an error occurs, the default behavior in Apache is to display the Apache version and the operating system flavor and version, for example, "Apache2/2.22 (Debian) Server at 10.16.2.100 Port 80." This gives hackers valuable information they don't need to know. To suppress this information, edit your Apache configuration file:

           /etc/apache2/apache2.conf (Debian/Ubuntu)

           /etc/httpd/conf/httpd.conf (RHEL/CentOS/Fedora)




Add the following two settings:

           ServerSignature Off

           ServerTokens Prod

 

And restart your server:

           /etc/init.d/apache2 restart (Debian/Ubuntu)

           service httpd restart (RHEL/CentOS/Fedora)

               3.      Turn Off Directory Listings. If a visitor navigates to a Web page that doesn't have an index.html, index.php or other valid index file, Apache displays a list of all files in the directory to the visitor. The visitor who can click to open each file and use the listing to navigate the file system on the server. Disable this option using an Options directive in your Apache configuration file:

           <Directory /var/www>

     Options -Indexes

           </Directory>

             4.      Disable the Trace HTTP Request. In a cross-site scripting attack, a hacker can trick the HTTP Trace request into displaying the HTTP cookies to steal the session. Disable the option by editing your Apache configuration file:

           /etc/apache2/apache2.conf (Debian/Ubuntu)

           /etc/httpd/conf/httpd.conf (RHEL/CentOS/Fedora)

    Add the following setting:

           TraceEnable Off

 

  And restart your server:

           /etc/init.d/apache2 restart (Debian/Ubuntu)

           service httpd restart (RHEL/CentOS/Fedora)

               5.      Protect Your Root Directory. A website visitor should never have access to your root directory. If a hacker finds his way there, protect the directory with the Order option:

           <Directory />

                 AllowOverride None

                 Order deny,allow

                 Deny from all

           </Directory>

 

6.      Disable unnecessary modules. More modules mean more ways for a hacker to exploit your system. Generate a list of modules that are enabled:            cat /etc/apache2/mods-enabled (Debian/Ubuntu)

           grep LoadModule /etc/httpd/conf/httpd.conf (RHEL/CentOS/Fedora)

  Disable the modules you don't need:

           unlink /etc/apache/mods-enabled/<module>.so (Debian/Ubuntu)

           vim /etc/httpd/conf/httpd.conf and prefix the LoadModule line with a "#" (RHEL/CentOS/Fedora)

  Then restart your server:

           /etc/init.d/apache2 restart (Debian/Ubuntu)

           service httpd restart (RHEL/CentOS/Fedora)

 

Some modules you might not need include autoindex, include, imap, info, suexec, and userdir.   


7.      Limit outgoing connections. An Apache server should have very few instances where it needs to initiate a connection. Use IPTABLES to place Apache output connections in a specific chain, and only accept the connections on valid ports. For example, to reject all outgoing connections except outgoing email on ports 25 and 143 use the following iptables configuration:

 

            iptables --new-chain apache2_out

            iptables --append OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

            iptables --append OUTPUT -m owner --uid-owner <user> -j apache2_out

            iptables --append apache2_out -p tcp --syn -d 127.0.0.1 --dport 25 -j RETURN

            iptables --append apache2_out -p tcp --syn -d 127.0.0.1 --dport 143 -j RETURN

            iptables --append apache2_out -j REJECT

 

Substitute www-data for <user> on Debian/Ubuntu or nobody for <user> on RHEL/CentOS/Fedora.

 

Then restart IPTABLES:

           /etc/init.d/iptables restart (Debian/Ubuntu)

           service iptables restart (RHEL/CentOS/Fedora)

 

 

Disclaimer: This article and other articles provided on this electronic medium is not intended to be an advise of any kind, and provided by IIT Inc. as a value to our readers in a form of information and discussion. We recommend verifying this information, and performing your own analysis prior to using any information provided herein.  

1 Comment

    Author

    Picture
    Dinesh Gulati, Managing Director, IIT Inc.

    About IIT: Since 1995, IIT has been a leading provider of technology 
    services. Our core services include IT Consulting, Outsourcing and 
    Staffing Services.


    Archives

    September 2019
    March 2019
    October 2018
    February 2018
    December 2017
    June 2017
    March 2016
    November 2015
    October 2015
    September 2015
    May 2015
    November 2014
    September 2014
    July 2014
    June 2014
    May 2014
    April 2014
    January 2014
    March 2013
    September 2012

    Categories

    All
    Careers
    General Business
    Government
    HR / Recruiting
    Leadership
    Technology


    Tag

    IT Staffing, IT Consulting, Recruiting,  MBE Certified IT Staffing, NY Upstate and Downstate NYC New York Top IT Consulting Firms, MA Massachusetts Boston Top IT Consulting Firms, TX Texas Austin Top IT Consulting Firms, NC North Carolina Raleigh Top IT Consulting Firms, Oracle Consulting, Microsoft Consulting, IBM Consulting, Data Warehouse Consulting, CMS Consulting, Network Consulting, QA Testing Consulting, 



Home | About IIT | Services | Industries | Careers | Open Jobs | Submit Resume | NYS HBITS | Blog | Privacy Policy | Contact Us 
Copyright, IIT Inc. 1995 - 2019