The Future of Indian Technology

The Indian technology industry got its start running call centers and doing low-level IT work for western firms. Then, in the 2000s, it started taking on higher-level IT tasks, offering management consulti
ng services, and performing sophisticated R&D. Now there is another transition happening, one far more significant: a transition to development of innovative technology products. Instead of providing IT services as the big outsourcing companies do, a new breed of start-ups is developing high-value products based on intellectual property. The Indian industry group NASSCOM estimates that in 2008, the country’s software product revenues totaled $1.64 billion. It forecasts that this will grow to $11 billion per year by 2015.


I attended the NASSCOM Product Enclave in Bangalore, this week, and gave several talks to the 1000+ entrepreneurs in attendance. I was surprised at the changes that are powering the new transition: its tech workers are leaving high-paying jobs in IT services, and kids out of school are ignoring social taboos against failure and defying marriage customs to become entrepreneurs. A few Americans are also joining the fray, starting their ventures in India rather than in Silicon Valley. Though in China, returnees from the U.S. are fueling the entrepreneurship boom, they aren’t as important in India. Sadly for my Indian friends in Silicon Valley who are looking to return home, returnees—formerly in high demand and treated like rock stars—are out of vogue and now treated like rocks.

Why are highly paid workers in an industry that does lucrative contract work for multinationals jumping ship? It’s the same dynamic as you observe in the United States. Entrepreneurs start their companies when they are, on average, 39 years of age. They have 10 to 15 years of work experience and ideas for products that solve real customer problems; they get tired of working for jerk bosses; and they want to build wealth before they retire. So they defy their fear of failure and take the plunge into entrepreneurship.


India’s outsourcing industry is about 20 years old and has hundreds of thousands of workers with 10 to 15 years of experience and ideas for innovative products.

At the NASSCOM event, I met dozens of tech-service industry workers who had become entrepreneurs. A surprisingly high proportion weren’t developing products for their former customers, but were instead looking inward to solve India’s problems. The one who impressed me the most was K. Chandrasekhar, of Forus Health.

Chandrasekhar learned that that the vast majority of the 12 million people in India who are blind could have maintained their sight if only their problems had been diagnosed and treated on time. The diagnostic equipment for a single hospital cost at least US$60,000—which put it out of the reach of most regional clinics—and required ophthalmologists to perform the diagnosis. Chandrasekhar and Forus co-founder Shyam Vasudev decided to leave their jobs as senior executives at NXP Semiconductor (an offshoot of Philips) to create an affordable, all-in-one intelligent pre-screening device that is non-invasive and can be used by minimally trained technicians in rural India. The device provides an indicative report in 10 minutes for five major eye-related problems, including diabetic retina. This frees the doctor up to treat patients rather than administer tests. The product costs less than $15,000, and Forus expects the price to drop to half that in volume production.

Another impressive entrepreneur at the NASSCOM event was Vishal Gondal. In youth entrepreneurship, Gondal is the Bill Gates of India. He dropped out of college to start his first company when he was 16, and launched his big success—Indiagames—when he was 23. He sold part of his company for a multimillion dollar sum 2005. He now mentors young entrepreneurs and invest in start-ups via his fund called Sweat & Blood Venture Group.

But college-dropout tech entrepreneurs like Gondal are extremely rare in India. Most make the wise choice to complete their education before joining a start-up. So far, the biggest inhibitor of youth entrepreneurship in India has been the social stigma associated with failure and the low social esteem bestowed on start-ups. In the arranged-marriage system—which is still the norm in India—a young male who joined a company such as Infosys or IBM would command the best marriage proposals, and those who took the start-up path risked trading down. No longer. All of the young entrepreneurs I met said either that they had told their parents that they would find their own partners, or that their parents supported their decision.

It also used to be that nearly all the graduates of India’s prestigious Indian Institutes of Technology (IITs) would join investment banks or take senior positions in the outsourcing industry. Given the huge salaries these workers commanded, entrepreneurship was out of the question. Yet I met dozens of entrepreneurs who had left these institutions and were now risking it all on entrepreneurship. Two such are Pavan Thatha and Rakesh Thatha.

After completing his MBA from IIT-Bombay and working in the outsourcing industry for four years, Pavan Thatha persuaded his brother Rakesh, an IIT-Madras graduate, to leave his job at Computer Associates India and start a security-software firm called Arrayshield. That was in May 2010. By October 2010, they had hired two more IITans who left new jobs at Oracle India and John Deere. The new recruits took 75% paycuts. The recruits received intense pressure from their family not to take the risk. Their parents couldn’t understand why they would leave prestigious, high-paying jobs to risk it all. But they were determined to be part of the journey of the brothers, who has set out to do something to make a difference and change the world.

And it isn’t just the Indians who are seeing opportunity in India.

Valerie Rozycki had always wanted to be an entrepreneur and was keenly interested in emerging markets while a student at Stanford University. She believed India’s growing economy would provide great opportunities for someone like her. She had an idea to build a mobile engagement platform based on dialing numbers or “missed calls” (most Americans are not familiar with the concept of “missed calls”, but in the developing world, they are a common way of sending a short message: “I’m on my way home”, “pick me up”, “I love you”, etc.). So, in February 2010 she started a company called ZipDial, in Bangalore. The company leverages “missed calls” in marketing campaigns—to log votes.

Valerie clearly has many great opportunities in Silicon Valley. When I asked her what a (white) gal like her was doing in a place like Bangalore, she smiled and said, “when all of the action is in Bangalore, who needs Silicon Valley?” 





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

US continues to face shortage of IT skills: Nasscom

BANGALORE: As Barack Obama was re-elected US President, India's IT industry body Nasscom said opposition to outsourcing in the US is actually targeted at the manufacturing sector and no
t IT services.

"Every time there is anti-outsourcing topic, we always take it as it's for our industry (Indian IT services industry)", Nasscom President Som Mittal told reporters.

Actually, it's targeted at manufacturing sector, he added. "Many of the jobs (in the manufacturing sector in the US) have moved (to China)", he said, adding, the election dynamics (anti-outsourcing rhetoric) is different from ground reality (in the US).

Mittal said the US continues to face shortage of IT skills, and expressed hope that there would be comprehensive changes in immigration policy.

He said the Indian IT services industry actually works for the US economy in many ways, adding that "We are solution to many of the problems that US faces. There is a realization (in the US) that we are part of the solution".

Meanwhile, Nasscom said, India and the US need to partner together to foster economic growth, develop an educated and skilled workforce and create jobs in order to find solutions to balance the current global situation.

"Rapid recovery in the US will benefit the entire global economy and consequently, our (Indian IT services) sector," the industry boday said in a release.

"Nasscom shares many of the same economic and diplomatic goals outlined by President Obama and specifically, we agree on the shortage of STEM professionals in the US and support expanding the visa program so that highly skilled workers can help companies lead the way on innovation and contribute additional jobs and economic growth in the United States," it added. 





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

India’s 8 richest tech czars

Hurun Report, a China-based research house, recently released a report on the richest Indians in 2012, in conjunction with GyanMagnus Associates. Here we list the eight richest Indians in technology and telec
om sectors as on September 22, 2012, as stated in the report. 


Azim Premji
Personal wealth: $12.3 billion
Company: Wipro
Age: 67
Azim Premji has led Wipro since the late 1960's. Then a $2 million hydrogenated cooking fat company, Wipro Limited is today a $7 billion revenue IT, BPO and R&D Services organization with presence in over 50 countries.

Shiv Nadar
Personal wealth: $5.7 billion
Company: HCL
Age: 67
Shiv Nadar was born and raised in mofussil Tamil Nadu, in an India awakening to its first Prime Minister, Jawaharlal Nehru's "Tryst with Destiny". Nadar was part of the elite DCM management trainee system and left DCM in 1976, along with seven others, to create HCL in a Delhi barsati.

Sunil Mittal
Personal wealth: $5.7 billion
Company: Bharti Airtel
Age: 55
Sunil Bharti Mittal, the founder, chairman and group CEO of Bharti Enterprises, started his career at 18 after graduating from Punjab university in India in 1976 and founded bharti. Today, at 52, he heads a successful enterprise which employs over 30,000 people and has market capitalisation of approximately US$ 25 billion.

NR Narayana Murthy
Personal wealth: $1.4 billion
Company: Infosys
Age: 66
NR Narayana Murthy founded Infosys in 1981, served as the CEO during 1981-2002, and as the chairman and chief mentor during 1981-2011. He is currently the chairman emeritus of Infosys.

S Gopalakrishnan
Personal wealth: $1 billion
Company: Infosys
Age: 57
S Gopalakrishnan (Kris), along with NR Narayana Murthy and five others, founded Infosys in 1981. Kris served as director (technical) and his initial responsibilities included the management of design, development, implementation, and support of information systems for clients in the consumer products industry in the US.

Nandan Nilekani
Personal wealth: $1 billion
Company: Infosys
Age: 57
Nandan Nilekani, a co-founder of Infosys, was appointed as the chairman of the Unique Identification Authority of India, in the rank and status of a cabinet minister for an initial tenure of five years in 2009. Nilenkani also heads the Technology Advisory Group for Unique Projects, a body under the Government of India.

Bhupendra Kumar Modi
Personal wealth: $1 billion
Company: Spice Group
Age: 63
Bhupendra Kumar Modi is the global chairman of Spice Group and was appointed to the board on April 24, 2010 as non-executive director and chairman. About his ventures, he says, "I want to ensure that people everywhere enjoy the highest levels of personal productivity. And today the mobility of the internet will drive this more than any other phenomenon."

SD Shibulal
Personal wealth: $650 million
Company: Infosys
Age: 57
SD Shibulal (Shibu) is the co-founder, member of the board, chief executive officer and managing director of Infosys. He was instrumental in the development of Infosys Global Delivery Model, a standard for the delivery of outsourced IT services and helped set the stage for the company's evolution into a leading multinational business consulting and IT services provider.


"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

Job portal for disabled people launched

MUMBAI: In an effort to help the millions of disabled in India earn a livelihood with dignity, Leonard Cheshire Disability (LCD), an International NGO that supports disabled people 52 countries has designed a unique portal dedicated to facilitate recruitment for persons with disability.

The portal named Jobability.org will cater to people with visual, hearing, speech, loco motor and mild-intellectual disability. The portal is not only for the highly educated and the highly skilled, it will serve as a forum where people with disability can showcase their capabilities, discuss their issues, take advice and meet others in similar situations.

Commenting on this unique Portal developed by LCD, Aruna Rangachar, National Director of CDT said, "Our aim is to use technology and reach out to the under-served communities, break down the barriers that can hinder the access to employment and the professional growth rate of persons with disability. This is a good start to creating an inclusive society which is our ultimate aim, through placing disabled people in mainstream jobs. We need to create visibility for this portal for more and more people with disability to join and find a new career scope through Jobability. We also encourage progressive employers to register themselves and start using Jobability to recruit untapped People With Disability (PWD) talent"

The website targets leading companies in the country to offer jobs by going through the uploaded resumes of the candidates and by registering vacancies which persons with disability can apply to. The website will also provide information related to the livelihood opportunities

This unique portal, which has accessibility features for employment was conceptualized and developed by Leonard Cheshire Disability (UK), as an exclusive job portal for persons with disability from South Asian regions and is currently registered in India by Cheshire Disability Trust (CDT).

CDT is promoting www.Jobability.org to persons with disability and potential employers through its Livelihood Resource Centers across India. 

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 


Indian IT has failed to support the growth of its own inventions

NEW DELHI: Despite making landmark advances, the Indian software industry has failed to support the growth of its own inventions, Infosys founder Narayana Murthy said today, asking students to reinvent their idea of education to end this anomaly.

Speaking to engineering students at the annual convocation of the Indrprastha Institute of Information Technology, Delhi, Murthy pointed out that the much famed Indian software sector ends up importing every innovation from the West despite the fact that the country produces a large number of software professionals.

He said emphasis solely on passing examination and enormous focus on rote learning rather than on learning and using fundamentals was partly to blame for this state of affairs.

"Unfortunately, almost all of the advances in the Indian software industry - other than the Global Delivery Model and 24-hour productive day - in software engineering, quality, productivity, security, and user interface design have come from the western nations.

"... every book, we use, has been written by people who work abroad. Every gadget we use and every invention that we see around us have been invented abroad. Why is it so?" asked Murthy, who founded the Indian software major in 1981 along with six friends.

Suggesting a change in the way students' approach their education, he said the idea that education ends with passing the last examination in the college should be done away with, and professionals should continue the learning process all their lives.

"Making education purposeful is a key aspect of gaining recognition for our education system. No wonder then that there is no Indian institution of higher education in the top 200 in Shanghai rankings," he said.

Murthy exhorted students to imbibe fundamentals of education as instruments to solve problems around them and continue to evolve with rapidly changing technology.

The convocation function was also attended by former Nasscom chief Kiran Karnik and IIT-D Director Pankaj Jalote.

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

10 free tools to manage your files on Windows

1-Instant Search: Everything
With huge hard drives being the norm, searching for any document on your PC can be a painstakingly slow exercise. This is because every time you search using the default tool in Windows, it has to scan each and every folder till it finds the file. Everything, on the other hand, helps you locate any document almost instantl
y.
The first time you install the software, it indexes the contents on your hard drive. The program then sits unobtrusively in your system tray till you double-click its icon. To search, simply type the name of the file you are looking for, and the software will serve it up to you - no wait whatsoever. You can also search by file extension and add strings for custom searches. For example, use 'office\invoice' to search for filenames with the word 'invoice' in your 'office' folder, or 'Beatles! Love' to exclude the term 'Love' from your search. www.voidtools.com

2-Better File Copy: TeraCopy
The default copy tool in Windows is bothersome if you deal with huge files. If there's an error while copying multiple files, it'll abort the whole job. Also, there's no way to pause and resume a transfer. And did you know that Windows doesn't actually copy files at the fastest rate possible?
TeraCopy to the rescue. The software features full shell integration, which means that it replaces the default Explorer copy tool so you don't have to start the program each time you are copying files.
While transferring, if there is an error, TeraCopy will try multiple times to copy that file - and if that doesn't happen, the file is skipped and the rest of the data is copied. At the end of the process, you can see which files posed a problem and try copying them again.
What's more, you can even pause and resume the process if you need to run a more resource intensive program alongside. And yes, the software is optimized to get the fastest possible transfer speed on your computer. codesector.com/teracopy

3-Tag Files: Elyse
Sometimes, the same file can fit in different folders. For example, a photo can find place in a folder for profile pics, the party it was clicked in, or by date. Instead of keeping multiple copies of the file, Elyse brings a smart 'tagging' system.
The idea is to store your files anywhere, but classify them with tags to find them easily. Just point Elyse to a folder and then you can start creating as many tags as you want.
After that, just drag-and-drop files to the tag. It's handy for office use (different projects that use the same documents) as well as personal data (tagging photos or videos). It's not easy to use initially, but once you get accustomed to it, Elyse works splendidly. silkwoodsoftware.com

4-Folder Lists: Filelist Creator
When a friend asks you to send him a list of the MP3 songs you have, it would be downright ridiculous to sit and type the name of each file. If only there was a way to make a list of all the files in your folder. Well, meet Filelist Creator. Point the program to the folder to start. You can choose to search all sub-folders if you want.
Next, select which parameters of the files you want to be included: name, format, file size, path, date, etc - all of which can be seen live in the preview window. Filelist Creator lets you choose formatting options too, such as the header, spacing, grouping and the order of the columns as well. Once you've had your pick, choose whether you want a text file, CSV, HTML or image and save it. www.sttmedia.com/filelistcreator

5-Delete Forever: File Shredder
When you "delete" a file in Windows, it's not entirely erased from your hard drive.
The Delete function simply hides the file till the space it occupies is overwritten with new data. Still, specialized file recovery software can retrieve these files easily (see Recuva). So how do you get rid of a sensitive file permanently?
File Shredder is a simple tool that gets the job done by 'writing' over the files multiple times with random binary data. Start the program, select the files and shred them with a button. Simple.
In the Settings tab, you can choose the type of encryption you want to use to shred the file. There's also an option to Shred Free Disk Space. As we said, a file isn't completely gone when you delete it; which means it's still occupying some space. File Shredder purges this data by rewriting over it as well.www.fileshredder.org

6-Smart Backup: Copy Changed Files
If you routinely back-up your files to an external hard disk, then you might want to install Copy Changed Files. The tool allows you to compare the contents of similar folders in two different locations - and then, only copies the files that have been modified. First, select the 'From' and 'To' folders. Then, choose the method to compare files: Date-time and file size is faster, but can have errors, while the binary compare method is slower, but more accurate. You can choose to filter what to copy by file type or size. And that's it. Hit the copy button.www.copychangedfiles.com

7-Discover Duplicates: Anti-Twin
Sometimes, you have the same file stored in different folders or hard drives. So how do you find these and delete the duplicates? Say hello to Anti-Twin. It's a super-simple interface. First, select a folder as the basic comparison point - you can either search within this folder for duplicate files, or compare this folder with another.
For the comparison criteria, you can go by the filename, minimum or maximum file size, extensions, and even the content (by bytes or pixels). Once Anti-Twin finds multiple copies, you can choose to let the duplicate remain where it is, move it, or delete it and, in that folder, leave a link to the original. www.anti-twin .com

8-Batch Rename: Metamorphose
If you are constantly required to rename large groups of files on your computer, then you must install Metamorphose.
The tool is fairly simple to use: First, select the files you want to rename by browsing to them in the 'Picker' tab.
Then, in the 'Main' tab, you can pick whether the operation acts on the name, the extension or both. You can add a prefix or a suffix to each filename; and even search for text in the name and replace it with something else. You can also modify the length of the filename, add date, time or numbers, and even insert characters in any place in it.
The best part is that every change you make is instantly previewed in a pane at the bottom, along with the original filename next to it, so you know exactly what changes you've carried out.
Metamorphose is a fantastic tool to have with you when you are organizing your music or media collections, or sorting your photos. File-folder-ren.sourceforge.net

9-Secure Files: Encrypt On Click
Want to keep a file or a folder protected from snooping eyes? Encrypt On Click is here to help. Start the program, select the file or the folder that you want to protect, key in a password and you're done - the file is now inaccessible to anyone without the password.
Encrypt On Click is tightly integrated with the Windows OS, so you don't need to run the program again to access the file. Double-click a protected file and the software auto-starts, prompting for a password.
Also, you can right-click any file or folder and choose to 'Open With Encrypt On Click' to immediately lock it with a password.www.2brightsparks.com/freeware/ freeware-hub .html

10-Undelete Data: Recuva
Deleted a file by mistake? Unfortunately, there's no 'undo' button for that. But don't worry, it's not completely gone. Unless you used a shredding tool (see File Shredder), the file can be recovered with a nifty program called Recuva.
When you run the program, you are prompted by a pop-up to choose the type of file you're looking to 'undelete', whether pictures, music, documents, etc. Next, choose the drive where it was located or the whole PC itself. Before finishing, you will be asked whether you want to perform a 'deep scan' - check this option only if Recuva is unable to find your file in the first try. Files found in the scan are marked either green (easy to recover), yellow (difficult to recover) or red (permanently deleted). Sometimes, the file's name might not be identifiable, but you can try the thumbnail preview or use your own judgment to figure out whether that's the file you were looking for. Once you locate your file, click 'Recuva' and save it to your hard drive.www.piriform.com/recuva




"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

6 ways to get more from pen drives

That pen drive you carry along has become indispensable, letting you ferry documents, photos, music and movies to and fro. But it can do so much more. It can protect against viruses, automatically back-up data, launch your favorite programs off any PC without installing them, and even run a full operating system. Indeed, your USB drive is the digital equivalent 
of a Swiss army knife...

Pen drive PC
Most Linux operating systems, including Ubuntu (www.ubuntu.com) and Fedora (fedoraproject.org), can be run entirely off your pen drive. And we aren't talking about a stripped-down version either. Ubuntu, for example, runs just like it would if you installed it on your hard drive. It's not as fast, but it's spiffy enough for browsing the web or working on office documents.
The obvious advantage is that you get to carry your computer with you in your pocket. Any computer you come across can instantly become your own by just plugging in your pen drive. Currently, Windows and Mac don't have support for this, but Microsoft will soon be launching a new version called Windows 8 On The Go.

Portable programs
Just like portable operating systems, there is a host of apps that can run directly off your pen drive. For example, there are portable versions of the Firefox and Chrome browsers, the dictionary software Wordweb and even the image editing tool IrfanView. Portable apps also offer the advantage of letting you run your favorite programs off your pen drive when you don't have administrator privileges on your office PC to install them. You will find a large collection of such free software on www.portableapps.com, www.portablefreeware.com, or www.pendriveapps.com.

Don't just delete
In Windows, when you delete a file, it goes to the Recycle Bin - a helpful in-between step that lets you recover a file if you accidentally trash it. But on a pen drive, when you click delete, it's gone forever. Well, not if you use a nifty tool called iBin (sourceforge.net/projects/ibin). Essentially, iBin is a portable Recycle Bin for your pen drive. Download and extract the iBin folder to your USB drive and when you next plug it in, the program will start automatically. It continuously monitors your removable drive; if you try to delete any file, iBin will ask if you want to erase it or 'Dump it to iBin'. This way, your file stays on your drive for now. Given that pen drive sizes are increasing, it's a helpful app to have, especially since it won't take up too much space. Of course, if you're running short, you can always clean up your iBin with a click.

Stay Safe
It's a fear that everyone has. You plug your pen drive into a PC and a virus from that system infects your device without you knowing it. Then you come home, connect your USB drive to your laptop and just like that, your hard drive is infected. An antivirus can only help to a certain degree. The smarter option is to make your pen drive read-only, so that when you plug it into a system, nothing can be written on it. To do this, grab USB Write Protector (www.gaijin.at/dlusbwp.-php ). Once it's on your drive, run the program and you'll get an option to switch USB Write Protection on or off. If it's on, nothing can be written to the pen drive. However, Write Protector doesn't work instantly; once you switch it on, you'll have to eject and reconnect your pen drive for it to start.

Password Protect
In your pen drive, there might be some data that you don't want others to see. But you still want others to be able to use the pen drive. Rohos Mini Drive Portable (www.rohos.com/products/rohos-minidrive ) allows you to create a hidden partition within your pen drive, which is both encrypted and locked with a password. Of course, if you want to passwordprotect the entire drive such that the whole drive is locked down, then a great software to do that is Cryptainer LE (www.cypherix.com/cryptainer_le_download _center.htm).

Automatic backups
If you keep your documents on a pen drive and work directly on them, then you know how much of a pain it can be to back-up those files each time you connect the drive to your PC. But USB Flash Copy (www.usbflashcopy.com) offers a simpler solution. The app runs off the pen drive and lets you choose which folder on your hard drive it should automatically back-up files to. Additional options include settings for each file type, as well as whether to overwrite old files or keep copies of them. The cool part is that USB Flash Copy lets you create multiple profiles, so that if you use two PCs (such as home and office), you can have different settings for backing up to each of them, ensuring maximum data safety.

For Further Details Contact:
shubham@networkzperitus.com

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/


www.NetworkzPeritus.com

15 top paying IT certifications

A tough economy means a tough job market. Fewer jobs and companies getting selective of candidates they take. So, it is essential to arm yourself with IT skills and expertise that are in safe bets and are popular choices. Wondering which ones to go for? Here's 15 Top Paying IT Certifications for 2012 report. The list ranks some of the most popular IT certifications
.

1.) Project Management Professional (PMP)
Project Management Institute's (PMI's) Project Management Professional (PMP) certification is recognized as an important qualification for project managers according to the Global Knowledge list. The certification is globally recognized and has high demand in the job market. According to the Global Knowledge report, "The PMP credential should only be attempted by experienced project managers as the qualifications and testing for this certification are very rigorous."


2.) ITIL Foundation Certification in Information Technology (ITIL)
Infrastructure Library (ITIL)v3 Foundation is ranked at number four. ITIL Expert level is the third of four levels. According to the report, the ITIL Expert level certification is aimed at those individuals who are interested in demonstrating a superior level of knowledge of ITIL Version 3 (V3) in its entirety. Once a candidate has achieved ITIL Expert level, he will also fulfil the pre-requisite entry criteria for ITIL Master Level.

3.) Cisco Certified Internetwork Expert (CCIE)
The CCIE certifies the skills required of network engineers to plan, operate and troubleshoot complex, converged network infrastructures on a wide variety of Cisco equipment.
The CCIE is described by Cisco as "the most prestigious networking certification in the industry". The CCIE certifies a very specific set of skills in the field of networking. According to Cisco, less than 3% of Cisco Certified engineers obtain CCIE certification

4.) Microsoft Certified Systems Engineer (MCSE)
Microsoft Certified Systems Engineer (MCSE) certification ended with Server 2003, however, one can still do it (as well as the MCSE on Server 2000, though many of the tests have retired). The continued use of Windows Server 2003 in the market suggests that the demand for related expertise will continue for some time. MCSE certification equips individuals with required skills for designing, implementing, and administering infrastructure for business solutions based on Windows Server 2003 and Microsoft Windows 2000 Server.

5.) Cisco Certified Design Associate (CCDA)
On third position is Cisco Certified Design Associate (CCDA). The certification provides an IT professional the requisite knowledge, experience and understanding required to design a Cisco converged network. A CCDA-certified holder gets training in skills required to design a routed and switched network infrastructure and services involving LAN, WAN, and broadband access for businesses and organizations.

6.) Certified Information Systems Security Professional (CISSP)
The second highest-paid certification is Certified Information Systems Security Professional (CISSP). CISSP is for security managers and professionals who develop policies and procedures in information security.

7.) Cisco Certified Network Professional (CCNP) Second Cisco-based certification on the Global Knowledge list is Cisco Certified Network Professional (CCNP). There are two tracks available at the Associate and Professional levels: Cisco Certified Design Professional and Cisco Certified Network Professional. As per the report, "A CCNP-certified individual is expected to work collaboratively with other Cisco specialists on advanced security, voice, wireless and video solutions."


8.) CompTIA Server+
At number 8 on the list is CompTIA certification. CompTIA certifications are international, vendor-neutral certifications that validate a candidate's knowledge of a specific field. The CompTIA Server+ certification demonstrates an IT professional's knowledge of server hardware, software, storage, IT environment, disaster recovery and troubleshooting.

9.) Microsoft Certified IT Professional (MCITP)
Microsoft Certified IT Professional (MCITP)certification validates that an individual has the comprehensive set of skills necessary to perform a particular job role, such as database administrator or enterprise messaging administrator. MCITP certifications are reported to build on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications. Therefore, an individual earns one or more MCTS certifications on his way to earning an MCITP certification. There key MCITP certifications available from Microsoft are:

MCITP: Enterprise Desktop Support Technician on Windows 7
MCITP: Enterprise Desktop Administrator on Windows 7
MCITP: Consumer Support Technician on Windows Vista
MCITP: Enterprise Support Technician on Windows Vista
MCITP: Enterprise Administrator on Windows Server 2008
MCITP: Server Administrator on Windows Server 2008
MCITP: Virtualization Administrator on Windows Server 2008 R2
MCITP: Database Administrator 2008
MCITP: Database Developer 2008
MCITP: Business Intelligence Developer 2008
MCITP: Enterprise Project Management with Microsoft Office Project Server 2007
MCITP: Enterprise Messaging Administrator on Exchange 2010
MCITP: Enterprise Messaging Administrator on Exchange 2007
MCITP: SharePoint Administrator 2010
MCITP: Lync Server Administrator 2010

10.) Cisco Certified Network Associate (CCNA)
Third Cisco-based certification on the list is: Cisco Certified Network Associate (CCNA). CCNA equips a certification holder with the skills to install, configure, operate, and troubleshoot medium-sized route and switched network, including implementation and verification of connections to remote sites in a WAN. The new curriculum, according to the report, also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), SerialLine Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, and accesscontrol lists (ACLs).

11.) Microsoft Certified Systems Administrator (MCSA)
Third Microsoft-based certification on the list, Microsoft Certified Systems Administrator (MCSA) helps validate the holder's ability to manage and troubleshoot network environments based on the Windows Server 2003 operating system.

12.) CompTIA Security+
Ranked number 12, CompTIA Security+ certification validate an skills in network security, compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography and application, and data and host security. It is accredited by the International Organization for Standardization (ISO) and the American National Standards Institute (ANSI).

13.)Microsoft Certified Professional (MCP) Microsoft Certified Professional (MCP) certification ranks at number 13. MCP programme was designed for both IT professionals and developers. The MCP was replaced by the Microsoft Certified Technology Specialist (MCTS) certification, which aims to validate skills in a particular Microsoft technology.

14.) Cisco Certified Entry Networking Technician (CCENT)
Cisco Certified Entry Networking Technician (CCENT) certification validates the ability to install, operate, and troubleshoot a small enterprise branch network, including basic network security. CCENT arms network professionals with skills required for entry-level network support positions. The curriculum covers networking fundamentals, WAN technologies, basic security and wireless concepts, routing and switching fundamentals and configuring simple network

15.) CompTIA Network+
CompTIA Network+ certification shows the professional qualifications of a networking professional. The certification exam covers installation and configuration, media and topologies, management, and security.
For Further Details Contact:
shubham@networkzperitus.com

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/


IP Routing

IP routing is the process use by a router to forward packets towards destination network as found in the routing table, which is created by routing algorithms or routing protocols.

A router makes decisions based upon the destination IP address of a packet. Routers don’t care about hosts in a network, but networks and the best possible way to reach them. All network device
s along the way use the destination IP address to send the packet in the right direction to reach its destination. To make the correct decisions, routers must learn how to reach remote networks. Routers use either dynamic routing - this information is learned from other routers, or static routing - a network administrator configures information about remote networks manually.

Although it’s deemed necessary for every device in the network to be assigned a unique IP address, but this is not sufficient for them to communicate. It’s the work of a router to acts as a sort of traffic director to all packet destined to a destination.

In summary, routers route traffic to all networks in your internetwork. For a router to be able to do this, it must know the following:

i. Destination addressii. Possible routes to all networksiii. Neighboring routers from which it will learn about remote networksiv. The best route to reach a networkv. How to maintain and verify routing information.

Example below shows how a router uses information in its routine table to make decisions:


R2#show IP route

[Output omitted]

Gateway of last resort is not set

C 192.168.1.32/27 is directly connected, fastEthernet0/1

C 192.168.1.0/27 is directly connected, fastEthernet0/2

C 10.10.1.0/30 is directly connected, serial 0/0/0

The C in the routing table means the networks are directly connected. The remote networks are not found and displayed in the routine table because, we have not added a routing protocol – such as RIP, EIGRP, OSPF etc. etc or configured Static routes.

Looking at the output above, when the network router receive a packet with the destination address of 192.168.1.10, the router will send the packet to interface fastEthernet0/2, and this interface will frame the packet and then send it out on the network segment to Network B



"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

DHCP

Dynamic Host Configuration Protocol works in a client/server mode. DHCP enables clients on an IP network to obtain or lease IP address or configuration from a DHCP server. This reduces workload when manag
ing a large network. DHCP protocol is described in the RFC 2131.
Most modern operating system includes DHCP in their primary settings, these includes windows OS, Novell NetWare, Sun Solaris, Linux and Mac OS. The clients’ requests for addressing configuration from a DHCP network server, the network server manages the assignment of IP addresses and must be obliged to answer to any IP configuration requests from clients.

However, network routers, switches and servers need to have a static IP addresses, DHCP is not intended for the configuration of these types of hosts. Cisco routers use a Cisco IOS features known as Cisco Easy IP Lease. This offers an optional but full-featured DHCP server. Easy IP leases address for 24hrs by default, it is most useful in homes and small offices where users can take the advantages of DHCP and NAT without having an NT or UNIX server

The DHCP sever uses User Datagram Protocol (UTP) as it’s transport protocol to send message to the client on port 68, while the client uses port 67 to send messages to the server.
DHCP severs can offer other information, this include, DNS server addresses, WINS server addresses and domain names. In most DHCP servers, administrators are allowed to define clients MAC addresses, which the server automatically assigns same IP, address each time.
Most administrators prefer to work with Network server that offers DHCP services. These types of network are scalable and easy to manage.


"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/


Posted by Viviek