Free Essay

Redhat

In:

Submitted By redhat
Words 1964
Pages 8
Refer your friends to the following positions.

Division: AIM

Requirement : Ab Initio Lead/ Architect
Experience 5-10 years
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate Requirement
Primary : Ab Initio
Secondary : Oracle 8i/9i RDBMS, PLSQL, Database Stored Procedures, Scripting skills with Unix Korn shell, Perl
Candidates should have experience in following vicinity
• System Analysis & Design
• Strong Ab Initio ETL design skills
• Involved in Ab Initio Design, Configuration experience in Ab Initio ETL,
• Data Mapping, Transformation and Loading in complex and high-volume
Environment and data processing at Terabytes level.
• Capacity of designing solutions around Ab Initio, with advanced skills in high performance and parallelism in Ab Initio
• Data warehousing implementation experience
• Knowledge of Oracle 8i/9i
• Strong analytical & problem solving skills
• Strong UNIX, korn shell scripting experience.
• Experience in leading a team of ETL developers
• Experience in co-coordinating with offshore on development/ maintenance projects Work Location Bangalore, Chennai, Pune
Requirement Cognos Lead/ Architect
Experience 5-10years
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate
Requirement
• Extensive Experience & Expertise on Business Intelligence, DW
• Min. 3 years of hands on experience with Cognos toolsets, Cognos architecture. • Must have hands on experience on Cognos Report Studio , Cognos Analysis
Studio , Metrics Studio , and Cognos 8 portals
• Must have experience in building large data warehousing and BI applications.
Able to gather requirements, and the ability to lead. Design, Develop, configure and optimize Cognos reports, cubes and dashboards.
Have an understanding of logical and physical database design / modeling.
Experience with dimensional modeling is a must.
Hands on experience to working with SQL Server, Oracle or DB2
Possess the ability to successfully interact with all levels of internal and external clients
• Ability to conceptualize BI solutions to match the Practice initiatives on BICC etc. • Support BDMs on BI through presentations and RFP responses
• Strong interpersonal / communication skills
• Ability to handle issues relating to customer, people, and business as they will be primary Responsibilities.
• Strong analytical & problem solving skills
Work Location Bangalore, Chennai, Hyderabad

Requirement : Data Stage Lead/ Architect
Experience 5-10yrs
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate Requirement
Primary : Data Stage
Secondary: RDBMS, PLSQL, Database Stored Procedures, Unix.
• Minimum experience of 3+ years in Business Intelligence
• Should have very good knowledge of ETL process and Data Warehousing concepts • Minimum experience of 3 years IBM Websphere Datastage
• Hands on experience in Designing datastage job and end-end implementation. • Expertise in identifying the performance related bottle-necks in Data stage jobs
• Experience in loading high volume data and performance tuning for
Enterprise
• Data Warehouses
• Should have good experience on ETL Testing
• Should have been part of implementing large BI solutions.
• Should have very good knowledge of SDLC and has involved in all the phases of
• SDLC.
• Skilled in Teradata Utilities like M-Load, Fast Load etc...
• Overall experience in Large Teradata implementation projects.
Work Location Bangalore, Chennai, Hyderabad, Pune, Greater Noida

Requirement: Micro Strategy Lead/ Architect
Experience 5-10 years
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate Requirement
• Should have good knowledge to Design and Development of Business
Intelligence (BI) applications.
• Experienced in Micro Strategy suite of toolset (Architect, Desktop, Web) and exposure to Micro Strategy Dashboard and Scorecards is add on.
• Understand the business objectives and suggest technical strategies to meet those objectives by introducing innovation through technology.
• Sound knowledge of Data Warehousing concepts, RDBMS.
• Good communications skills to talk client to understand the Business requirements and prepare the Requirement specification documents.
• Knowledge on MSTR 9 will be add on
• Architecting/designing MOLAP Cube & BI Reporting solution.
Work Location Bangalore, Chennai, Pune

Requirement :OBIEE Lead/ Architect
Experience 5-10years
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate Requirement
• Relevant experiences in delivering enterprise-wide BI, analytics, data warehouse solution using proven solution delivery methodology framework;
• Experience in at least 4 Siebel Analytics implementations
• Experience in Oracle ERP Analytics Applications (Financial, Supply Chain,
Procurement and Spend etc.) KPIs is must
• Expert knowledge with multiple successful implementations of Siebel
Analytics applications and OBIEE Server architecture and metadata management.
• Design of Informatica mappings and sessions, ODI
• Excellent Knowledge of OBI Data modeling, RPD customization,
Administration, Cache Management, Deployment and Promotion of RPDs from one environment to other
• Expert knowledge in ETL/Data integration with commercial tools such as
Oracle Warehouse Builder, Informatica or Data Stage
• Expert knowledge in developing and deploying Dashboard, Analytics/OLAP;
• Expert knowledge of Database Design and Development. Worked on wide range of databases SQL Server, Oracle, and IBM DB2.
• Experience in the Oracle ERP transactional application (data model and business process).
Work Location Bangalore, Hyderabad, Pune

Requirement :Teradata Lead/Architect
Experience 5-10yrs
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate Requirement
• Should have exposed to Translate design concepts from other teams into intuitive application interfaces
• Collect, mine, analyze, and communicate data with various stakeholders as needed
• Should have ability to validate design and architecture of the existing
Teradata applications
• Should have good understanding in the FSLD - Solution provided by Teradata.
• Should have sound knowledge in the Teradata components like - Fload,
Mload, B-Tec scripts
• Should have exposure to the data integration work experience
• Exposure to the Data modeling and relating to the High level design document is required.
• Should have worked in the End to end life cycle of project implementation.
• Should be able to handle productionization of Teradata components,
(Scripts, automation)
• Should be able to integrate Teradata with 3rd party BI tools
Work Location Bangalore, Chennai

Requirement :SAP BW Lead/ Architect
Experience 5-10yrs
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate Requirement
• SAP experience in the area of BW/BI and with working knowledge in application, integration modules.
• The ability to develop an overall approach, strategy and design of the
BW/BI landscape
• Providing solutions including designing the data models, extractors and data warehouse layer
• Strong hands-on experience in BW/BI front-end and back-end development with a deep understanding of the SAP BW/BI tools and techniques.
• Expertise in various data loading techniques
• Expertise in automating job scheduling, using event triggering and process chains
• Having experience in the development of ABAP related BW/BI objects
• SAP BW Architect should have good exposure to SAP Business Objects
Reporting tools and SAP BW Data model design and Implementation.
• Analyze customers’ business requirements, needs and objectives and map them to SAP BW / BO processes, solutions and products that are being implemented.
• Detailed design of customer-specific development, that maps to the current or future customers process-, application- and system landscape
• Preparing and running workshops with subject matter experts and Project
Management, including preparation of formal presentations, for instance to define business processes KPI’s or agree functional design for implementations.
• Develop necessary Functional/Technical specifications and modifications to meet and exceed customer requirements, needs and objectives.
• Develop Test Scripts and Test Plan along with the help of Customer
SME members
• Plan Trainings activities , Oversee walk through of code to ensure Customer standards are met
Work Location Bangalore, Chennai, Hyderabad

Requirement: Informatica Lead/ Architect
Experience 5-10 years
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate
Requirement
• Extensive hands on design and development experience in Informatica
Power Center (version 8.5 and above).
• Strong background in RDBMS/DW concepts.
• Strong experience in UNIX.
• Strong software engineering and data analysis skills, strong programming and Software design skills.
• Experience of software implementation and production problem solving.
• Interaction with customer team on assigned jobs
• Provide status reporting to customer stakeholders
• Arrange frequent knowledge sharing session to leverage offshore expertise
Work Location Bangalore, Chennai, Hyderabad, Pune, Kolkata

Requirement: SSIS Lead/ Architect
Experience 5-10 years
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate
Requirement
• Deep knowledge of the MS BI Suite (focus on SSIS, SQL Server 2005, working
• knowledge in SSAS, SSRS)
• Deep knowledge of Data modeling and tools like ERWIN
• Architecting the BI solution as per the requirements
• Should have experience in at least one end-to-end MSBI cycle
• Design Packages, Manage and Schedule Jobs as per the requirements
• Performance tuning of packages
• Knowledge of MS SSRS Tool for relational / OLAP reporting
• Tune SQL scripts within Sql-Server
• Minimum 2 year should have been as an architect for a team of 10-15, developing solutions on SSRS, SQL Server.
• Must have strong verbal and written communication skills

Work Location Bangalore, Chennai, Hyderabad

Requirement :Hyperion Lead / Architect
Experience 5-10 years
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate
Requirement
• Should have worked in core development projects in Hyperion, in the capacity of design and development.
• Should have worked in minimum of 2 Hyperion projects in development experience. Should be good with Oracle and UNIX shell scripting,
• Should have good communication and interpersonal skills and ability to work directly with customer team.
• Able to make design calls on performance related and operational areas
• Sound Conceptual & Practical experience on Hyperion- Essbase , Unix and database(s) • Knowledge in creating RULE file and designing the dimensions
• Write program specification based on HLD/LLD
• Write / Debug shell scripts
• Shell scripting experience
Work Location Greater Noida

Requirement :Business Objects Lead/ Architect
Experience 5-10yrs
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate
Requirement
• Strong BO infrastructure knowledge
• Expertise in BO installation and large deployment s
• Experience in Clustered environment
• Experience in implementing Single sign-on, LDAP, AD, tools such as
Siteminder, Wintella etc.
• Configuration of Business objects with IBM Websphere, Tomcat
• Deployment and maintenance of Universe, WebI, Crystal reports,
OLAP Intelligence, Voyager, XCelcius
• Universe designer (should be a universe expert and has enhanced and supported complex universes)
• Web Intelligence (expert in creating business reports, has good understanding of thin and rich WebI client and features)
• Crystal Reports(experience in creating state of the art BOXI crystal reports) • state of the art BOXI crystal reports)
• Experience in Live Office integration
• Extensive experience on using QAWS (Query as Web Service) and
Xcelcius integration
• Experience in using BO - BI services
• Basic knowledge of XCelcius dashboards
• Have used dashboard designer
• Strong SQL/PLSQL
• Basic Experience in Java
• Excellent Data Modeling knowledge
Work Location Bangalore, Chennai, Pune

Requirement: Datastage Designers
Experience 4 to 8 years
Qualification B.E/B. Tech/MCA
Candidate
Requirement
• Should have exposed to Translate design concepts from other teams into intuitive application interfaces.
• Should have ability to validate design and architecture of the existing DI applications • Should have sound knowledge in the DS components Sequencer, Lookups,
Complex transformation and Batch process automations.
• Should have good exposure to the code movement, scalability and performance tuning aspects.
• Should have good knowledge in the dB knowledge along with Knowledge of
Batch process and automation of job codes in the UNIX/
Mainframe environments.
• Should Understand the Requirement document/ E2E document/High-level design document - And convert them to the low level design documents/Pseudo codes.
• Experience in in UNIX, RDBMS (like Oracle, TD, etc.), Main Frame basics Will be an add on.
Work Location Chennai

Requirement: Teradata Designer
Experience 5 to 8 years
Qualification B.E/B. Tech/MCA
Candidate
Requirement
Technical Aspects
• Should have exposed to Translate design concepts from other teams into intuitive application interfaces
• Collect, mine, analyze, and communicate data with various stakeholders as needed • Should have good understanding in the FSLD - Solution provided by Teradata
• Should have sound knowledge in the Teradata components like - Fload,
Mload, B-Tec scripts
• Should have exposure to the data integration work experience
• Exposure to the Data modelling and relating to the High level design document is required.
• Should have worked in the End to end life cycle of project implementation.
• Should be able to handle productionization of Teradata components
(Scripts, automation)
Communication/Technical Assistance
• Assist in the development of guidelines and processes for the implementation • Participate in collaborative activities and projects involving mentors and other Staff
• Should have good communication skill (Oral, Written)
Work Location Chennai

Similar Documents

Premium Essay

Redhat

...edhat® ® Te r r y C o l l i n g s & K u r t W a l l UR ON IT OOLS IN Y T C E CD-R L TH O ED UD M Linux Solutions from the Experts at Red Hat ® ® P R E S S™ SEC Red Hat® Linux® Networking and System Administration Red Hat® Linux® Networking and System Administration Terry Collings and Kurt Wall M&T Books An imprint of Hungry Minds, Inc. Best-Selling Books G Digital Downloads G e-Books G Answer Networks e-Newsletters G Branded Web Sites G e-Learning New York, NY G Cleveland, OH G Indianapolis, IN Red Hat® Linux® Networking and System Administration Published by Hungry Minds, Inc. 909 Third Avenue New York, NY 10022 www.hungryminds.com Copyright © 2002 Hungry Minds, Inc. All rights reserved. No part of this book, including interior design, cover design, and icons, may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording, or otherwise) without the prior written permission of the publisher. Library of Congress Control Number: 2001093591 ISBN: 0-7645-3632-X Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/RT/QT/QS/IN Distributed in the United States by Hungry Minds, Inc. Distributed by CDG Books Canada Inc. for Canada; by Transworld Publishers Limited in the United Kingdom; by IDG Norge Books for Norway; by IDG Sweden Books for Sweden; by IDG Books Australia Publishing Corporation Pty. Ltd. for Australia and New Zealand; by TransQuest Publishers Pte Ltd. for Singapore, Malaysia, Thailand...

Words: 220815 - Pages: 884

Free Essay

Redhat

...LINUX-6 Curriculum chnoworld ive Development | Training | Consultancy Rh124 Red Hat System Administration I Red Hat System Administration I (RH124) is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. Focused on administration tasks that will be encountered in the workplace, this course will actively engage students in task-focused activities, labbased knowledge checks, and facilitative discussions to ensure maximum skill transfer and retention. In addition, GUI-based tools will be featured to build on the students' existing technical knowledge, while key command line concepts will be introduced to provide a foundation for students planning to become fulltime Linux system administrators. By the end of the five-day course, students will be able to perform installation, establish network connectivity, manage physical storage, and perform basic security administration. LINUX-6 Course Outline Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Unit 3: Get Help in a Graphical Environment Objective: Access documentation, both locally and online Unit 4: Configure Local Services Objective: Configure the date and time and configure a printer Unit 5: Manage Physical Storage I Objective: Understand basic disk concepts and manage system...

Words: 1463 - Pages: 6

Free Essay

Linux Redhat Virtualization

...Red Hat Linux Virtualization for Desktops By: Dorein Pfeil Instructor: Mike Mostafavi School: University of Phoenix Class: POS/355 One popular protocol for Linux Virtual desktop is SPICE it allows client and server to interact with virtual management tools and other standalone client applications. RHEV now allows management applications to run on Microsoft Windows server R2. V2V tools convert from ESX, RHEL Xen, and RHEL KVM to RHEV, the underling technology involved for V2V is called libguestfs, which is a library that binds programming languages to access Virtual Management disk images and interact with them in a variety of ways. VM’s can also work while the system is powered down. The draw-backs to using this system is that you must first obtain a license to use this feature, and it must be purchased before it can be used. Virtualization is becoming a key feature in the technology race for technology in the Linux system vendors, this technology provides a great advantage by letting the user aquire the ability to run powerful key features such as like image/storage management, clustering, system schedulars, power saver, ETC. By understanding what VR technology is capable of many companies are becoming more enthralled with what this technology can actually do, mainly in the world of medical science this technology was first discovered in its infancy as a way to seen through into the human tissue and muscle right to the bones of a person, this...

Words: 315 - Pages: 2

Free Essay

Open Source Software

...OPEN SOURCE SOFTWARE What are reasons for business to use open source software? With the current economy difficulties, companies are trying to find areas in their businesses where they can save money. Many companies are having no choice but to let people go. Some businesses try to avoid lay-offs and instead are looking in other areas to save money. One of the areas is, of course, the IT department; software application acquisition is an area that might lead to a big money savings. Even in financially difficulties times, businesses want or need to improve their application environment. Sometimes it might even be necessary to invest in the IT infrastructure for long-term savings, which may result in the company not needing to close their doors. But many business owners or CEO’s will question if open source software is ready for business. This research paper intends to answer this question. The best reason to use open source software in a business environment is cost savings. This gives the business freedom to use software and change the source code in other words, modify how the software application is used, as it is needed. Open source removes the need for dependence on single vendor solutions and it provides very high quality applications and very good support. To understand open source software it is important to know what open source is, and what the meaning of open source software is. This research paper will also show where open source came from; the history of open...

Words: 2520 - Pages: 11

Free Essay

Secure Vpn

...Installation Guidelines GRUB/LILO GRUB is the boot loader of choice for RedHat installations; however LILO may always be used in the case of most flavors of LINUX. GRUB/LILO can receive many different kernel level commands and it poses a major security risk if an attacker is able to compromise the kernel. In response you can make sure that only authorized users are able to perform those commands by password protecting during the installation process. If using GRUB, the password is by default stored as clear text, and so you will want modify the /etc/grub.conf file to store the password in an MD5 checksum. $ /sbin/grub–md5–crypt Password: (at the prompt enter the GRUB password you created at installation and press enter) $ #%t%661GFGftffgctTFTDd (This is the MD5 hash) edit the grub.conf file and replace the clear text password with the MD5 Hash. You must use the –MD5 option or the password will be stored as the MD5 Hash and not the encrypted password. Password – md5 $1$m0tLR/ $#%t%661GFGftffgctTFTDd Partitioning Partitioning correctly will help to mitigate against one specific type of denial of service. For example and attack designed to fill up a /tmp or spool directory. If your files are on the same partition as the directory under attack, your system could be rendered unusable. One should use a partition strategy where those directories that are most likely to be filled by an attacker. Typically this is /var and /home . If you are using a server for ftp or e–mail, you...

Words: 5898 - Pages: 24

Free Essay

Cis 206 Slingshot Academy / Tutorialrank.Com

...CIS 206 All iLabs: Devry University (DEVRY) For more course tutorials visit www.tutorialrank.com CIS 206 All iLabs: Devry University ----------------------------------------------------------- CIS 206 Case Study 2-3 Discussing the Functions of an Operating System (DEVRY) For more course tutorials visit www.tutorialrank.com You have been selected to present a short talk on the functions of an operating system for the weekly tech meeting. To support your talk, you must prepare a handout for the attendees. The handout should summarize the information that you have learned about this topic. ----------------------------------------------------------- CIS 206 Case Study 2-4 Discussing How Applications Interact with Operating Systems (DEVRY) For more course tutorials visit www.tutorialrank.com You have been asked to prepare a short lecture for users in the Accounting Department. They have expressed interest in learning more about how the operating system supports the applications they use. Your boss would like to review your lecture notes prior to the class, so you need to save them to a document. Your notes should provide details of your lecture. ----------------------------------------------------------- CIS 206 Case Study 8-2 Researching Background and Font Combinations in Fedora Core 4 (DEVRY) For more course tutorials visit www.tutorialrank.com Case 8-2: Researching Background and Font Combinations in Fedora Core 4 You have been asked to prepare...

Words: 3261 - Pages: 14

Free Essay

Cmis 102 Homework 2

...choice (OSChoice), the monitor choice (MonitorChoice), and the case choice (CaseChoice). After the user has made all of the required choices, the program will determine the appropriate cost of that option: OSCost, MonitorCost, and CaseCost. Output: The required output for the program will be the total cost (TotalCost) of the state of the art gaming computer. The program will then determine the total cost of the state of the art gaming computer by using the following computation: TotalCost = BasePrice+OSCost+MonitorCost+CaseCost. Variables: BasePrice // The cost of the computer prior to the user deciding on the three options OSChoice // The operating system selected by the user Win7 // Windows 7 Home Premium Win8 // Windows 8.1 RedHat // Red Hat Linux 9.0 Personal MonitorChoice // The monitor selected by the user Asus // Asus 23.6” LED ViewSonic // ViewSonic 20” LED Acer // Acer 23” LCD CaseChoice // The case selected by the user Thermal // Thermaltake Gaming Case Rosewill // Rosewill Black Gaming Case NZXT // NZXT Guardian Gaming Case OSCost // The cost of the selected operating system MonitorCost // The cost of the selected monitor CaseCost // The cost of the selected case TotalCost // The total cost of the gaming system Design Input the base price of the computer Calculate user selected options to add the additional costs Calculate the base price of the computer with the total of the user selected additional costs Display the results of the...

Words: 735 - Pages: 3

Premium Essay

Cis341

...SSL CIS341 Security Design in a Network Environment Professor John Dormishian Introduction The Secure Sockets Layer (SSL) is defined by Techtarget (2010) as a common employed protocol used for the management of security of information being transmitted over the internet. SSL has been recently succeeded by the Transport Layer Security (TLS), a protocol that is based on SSL. SSL operates on the program layer that is located between the Transport Control Layer (TCP) and then Hypertext Transfer Protocol. PCI (2008) referred to SSL as the established industry standard that is used in the encryption of the channel between a given web browser and an appropriate web server in order to ensure that there is privacy and reliability in the information that is being transmitted over the given channel. SSL is basically included as part of the web browsers as well as Web servers. Patel (2008,p.223) indicated that the SSL protocol was originally developed by Netscape in order to ensure that the security of information that is being transmitted as well as routed via HTTP,POP3 or LDAP was assured. The protocol had since then been adopted by Microsoft as well as other client/server developers as the de facto standard prior to its evolution into Transport Layer Security (TLS).The “sockets” in the term is used to refer to the sockets method of data transmission to and from a client/server based program in a network or even between various program layers in a common, same computer....

Words: 756 - Pages: 4

Free Essay

Linux

...within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Blum, R. (2008). Linux® command line and shell scripting bible. Indianapolis, IN: Wiley. Love, P., Merlino, J., Zimmerman, C., Reed, J. C., & Weinstein, P. (2005). Beginning Unix®. Indianapolis, IN: Wiley. Software RedHat Linux 5 (Virtual Desktop) Article References Ahmed, M. F., & Gokhale, S. (2009). Reliable operating systems: Overview and techniques. IETE Technical Review, 26(6), 461–469. Anthes, G. (2009, June 20-July 27). UNIX turns 40. Computerworld, 43(24), 16. Berlot, M., & Sang, J. (2008, January). Dealing with process overload attacks in UNIX. Information Security Journal: A Global Perspective, 17(1),...

Words: 1560 - Pages: 7

Premium Essay

Unit 4 Assignment 1: Gudger-Garland S.: CUPS

...Comment lines start with the # character. The Printer Configuration Tool allows users to configure a printer. This tool helps maintain the printer configuration file, print spool directories, and print filters.Red Hat Enterprise Linux 3 uses the CUPS printing system. If a system was upgraded from a previous Red Hat Enterprise Linux version that used CUPS, the upgrade process preserved the configured queues. Using the Printer Configuration Tool requires root privileges. To start the application, select Main Menu Button (on the Panel) => System Settings => Printing, or type the command redhat-config-printer. This command automatically determines whether to run the graphical or text-based version depending on whether the command is executed in the graphical desktop environment or from a text-based console. To force the Printer Configuration Tool to run as a text-based application, execute the command redhat-config-printer-tui from a shell...

Words: 613 - Pages: 3

Premium Essay

Linux Research Paper

...NT1430 Linux Networking Research Paper Nicholas Lorick ITT Technical Institute St. Petersburg Campus NT1430 Linux Networking Research Paper All people in the IT field are familiar with the IPv4 protocol and they are quickly becoming familiar with the IPv6 protocol. Bradley (2012) states the following: Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34) With all the new technology and devices now accessing the internet the move to IPv6 will eventually happen. According to Bradley (2012), IPv4 is out of IP addresses. IPv4 supports only 4.3 billion addresses; and with PCs, smartphones, tablets, and gaming systems connecting to the Internet, we are running out of IP address. IPv6 uses 128-bit addresses and can maintain 340 undecillion (340 × 1036) addresses. The IPv6 protocol brings with it other benefits. With IPv4 most of the internet relies on Network Address Translation. With IPv6, every device can have its own unique public IP address. Most home and small-business users have one IP address on the Internet -- the one for the router that links their hardware to their ISP. The router issues IP addresses internally to the devices that attach to it, but it must constantly keep track of which traffic...

Words: 1059 - Pages: 5

Free Essay

Sec280-Week1

...Risks and Resolutions Introduction A Computer Network has many benefits to a company. However, it also puts a company at security and privacy risks if they are not tackled with a profound technical know-how. When a computer on a network is hacked, there is a possible threat to other systems getting effected as well. These security breaches can be severe to the organization information and privacy and resolve into a loss of information, leak of confidential data such as bank accounts, and loss of goodwill and trust. Ping Sweeps and Port Scans Intro Ping sweeps and port scans are two methods commonly used by hackers to detect vulnerabilities on computer networks (InfoSoc, 2014). Hackers use ping sweeps to check on which computers are active and being used; while they use port scan to find open ports which can be used to breach a network. If these two methods are used by knowledgeable hackers, they can jeopardize personal data and cause severe effects on the entire computer network. Ping Sweep Ping is the abbreviation for Packet Internet Groper. It is a service to check if a machine on the network is up and running. In ping sweep, an Internet Control Message Protocol (ICMP) echo request is sent to a machine to see if it responds. If a machine is live, it will send an echo ICMP response. Hackers use this facility to seek targets in large networks. They use ping sweeps to continuously ping addresses, leading to a slowdown in the network. “It’s a bit like knocking on your...

Words: 1279 - Pages: 6

Free Essay

Root

...10/28/2013 LINUX James Tucker Unit 4 Exercise Ch 14 p. 582, Ex 1-5 1. Which commands can you use from the command line to send a file to the default printer? Redhat / Fedora 12 Answer: lp and lpr without arguments send their standard input to the printer. 2. Which command would you give to cancel all print jobs on the system? Executed as root, either lprn - or cancel –a removes all jobs from the print queues. 3. Which commands list your outstanding print jobs? lpc status shows a list of the print queues lpq shows what is in the default print queue lpq -Psomeprinter shows what is in a specific print queue 4. What is the purpose of sharing a Linux printer using Samba? Sharing a Linux printer using Samba allows windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? CUPS supports IPP, LPD/LPR, HTTP, SMB, and JetDirect (socket) protocols. Ch 10 p. 403, Ex 1 1. Describe the similarities and differences between these utilities: a. scp and ftp – scp is the "Secure Copy" program and it works just like the "cp", or "Copy" program, only it works through via the Secure Shell. ftp is the "File Transfer Protocol" and has nothing to do with security. Usually operates as its own interface with its own set of user sub-commands. Both are used to transfer files from one host to another via network connection. b. ssh and telnet – Both Telnet and SSH...

Words: 382 - Pages: 2

Premium Essay

Unix/Linux Comparison Matrix

...1. BSD/OS 2. AIX 3. Solaris 2. Name three versions of Linux 1. Canonical's Ubuntu 2. Novell's openSUSE 3. Red Hat's Fedora 3. Describe 3 major differences between Unix and Linux 1. Cost- Linux is free and Different flavors of UNIX have different cost structures according to vendors. 2. Linux is an example of Open Source software and UNIX is a closed source OS. 3. Text mode interface: Linux- BASH (Bourne Again SHell) is the Linux default shell. It can support multiple command interpreters. UNIX- Originally the Bourne Shell; now it's compatible with many others including BASH, Korn & C. 4. Which of the following is not a UNIX or Linux variant a. SunOS b. RedHat c. DOS d. HP-UX e. Debian 5. Use the command to change directory locations. a. cd b. rm c. mkdir d. cut 6. Use the command to delete a directory. a. delete_dir b. mkdir c. rmdir d. cat 7. Which of the following are text editors? (Choose all that apply.) a. vi b. emacs c. ls d. cat 8. The command creates a directory named winchester in the root directory. a. mkdir /winchester b. mkdir ../Winchester c. mkdir \winchester d. md /Winchester 9. The command allows you to change directory locations to a child directory named child1. a. mkdir ƒ child1 ...

Words: 378 - Pages: 2

Free Essay

Proposal Report

...Company: Red Hat Inc. Team Members Project Progress Report Project Status Summary Percent Complete: 45% Project Timeline: Oct 10th | Company Overview | We analyzed about the company , its products and services, industry reports, competitors, etc. | Oct 17th | Balance sheets and financial analysis | We met Anthony and he showed us the different databases from where we can access information. We were able to understand their annual and quarterly reports from the analyst reports. | Oct 24th | Information Sharing on respective tasks | This week we shared a lot of information among each other on our respective tasks. | Oct 30th | Concluding to a single view point and summarizing on all the tasks. | | Nov 7th | Project Report and Presentation | | Nov 14th | Project Report and Presentation | | Nov 21st | Buffer | | Nov 24th | Final Report | | Dec 7th | Final Submission | | As a team, we feel we are 5% behind schedule. We have another meet tomorrow where we would finalize on our findings and discuss about it. Anthony has showcased us an array of sources from where we can get help with the Project and there seems just too much of information for us to conclude on in our next meet. Company information, Market Information, Latest news, Financial Data, Products and Operations, etc. and a lot more articles and analyst reports are helping us put up a good presentation report for Red Hat Inc. Red Hat’s primary mission is to develop...

Words: 429 - Pages: 2