Wednesday, April 30, 2014

Dressing for Success

Arthur Ashe once said, "Clothes and manners do not make the man; but when he is made, they greatly improve his appearance." And true are his words in the corporate world. In order to make an impression you need to be able to deliver goods but the right attitude and image play an important role when you finally do deliver! It’s like icing on the cake!

Here are some things to be kept in mind while dressing for success:
  • Your clothes SHOULD BE neat, ironed and clean
  • Shoes should be in a good condition and clean. Men should polish their shoes as often as possible
  • Your hair should be neat and clean. Styling should be conservative.
  • Women - Lots of make up should be avoided. Wear light pastel shades. No make up look should be also avoided unless you have flawless complexion. Wear lip gloss and kajal if you prefer the no make up look
  • Nails should be clean, neat and should be of reasonable length. Avoid very long nails.
  • Skirts should be of conservative lengths and should not be too short. Preferably stick to knee length skirts.
  • Heels should be low. It’s all about being comfortable.
  • Teeth should be clean. Your smile says a lot about you!
  • Carry tissue instead of a hanky. A tissue is cleaner and germ free as you usually dispose it after one use.
  • Men - Shirts should be tucked in!
  • Women - Avoid wearing gajras as much as possible.
  • Women – Bindis should be conservative; not too big!
  • Sun glasses should not be worn indoors. It is NOT cool and fashionable unless you work for a fashion house.
  • Jewelry should be simple. Don’t come bedecked in diamonds and gold to work / interview.
Finally, wear your best smile and have confidence in yourself. You do not need to wear expensive designer clothes to make an impression. Clean, neat, conservative and ironed are the keywords to be kept in mind.
Dressing Table
Dressing YES
Dressing NO
Clean clothes, polished and clean shoes
High heels, sports shoes, slippers, colorful socks
Cut Nails
Jeans and other casual clothes
Combed hair and conservative hairstyle
Body piercing, tattoos that are visible
Conservative colors
Bright vibrant colors
Smell good – take a shower / bath before you go
Sweaty, un - bathed, straight out of bed look


Sample HR Questions (and how to answer them)

Here are some extra questions that you need to be ready to answer if you want to ace your interview. 

  1. Why do you want to work in this company? 

    Your Answer Should:
     Involve your experience with the company, if any. It should be honest and also make the interviewer know that you have done your research on the company.
  2. What are your hobbies? (Also be prepared for - why you like a particular hobby?)

    Your Answer Should:
     Be true. It should reflect you as a person with interests. Hobbies tell a lot about a person. So think carefully while answering this one.
  3. What are your strengths and weaknesses? 

    Your Answer Should:
     Tell the truth yet not sound either boastful (while mentioning strengths) or self critical (while mentioning weakness). Try not to mention more than one weakness. If you go on and on about your many flaws, the interviewer may think that you lack self esteem and are under confident.
  4. Where do you see yourself five years from now? 

    Your Answer Should:
     Not be boastful and full of fluff. Do not use terms like”  I see myself as CEO of a prestigious company, etc.” It is safer to stick to a practical answer. Something like “I see myself working in the same area of expertise but at a more responsible position”,  etc. will reflect honesty and loyalty to a field of experience. 
  5. Tell us / me something that your résumé does not cover about you? 

    Your Answer Should:
     Emphasize on your extra curricular activities where you have shown leadership abilities, team spirit and individual responsibility. It should cover arenas that you have not mentioned in your résumé It could be a personal interest that you pursue like a passion for photography, etc. or it could be a foreign language that you are currently learning. Along with that you should make it a point to talk about why you were part of that activity.

Public Speaking

Here are a few tricks from the trade of public speaking:

  1. If you are writing your own material, then make sure you have done ample research on the same. This will make you feel more confident as you will know the topic inside out.
  2. Whenever given a topic to speak on, make sure you write your own speech. It is seen that when you write your own speech you tend to remember what you worked on rather than getting the material and reciting it as is.
  3. If material has been given to you to speak from, find out if you can change it to suit your style.
  4. If the material cannot be rewritten then go through the article / material thoroughly and do your own research on the topic to feel more comfortable with it. If possible write it down once so you can remember it better.
  5. Once you have made yourself comfortable with the material you can now begin practicing. The best place to practice is in front of the mirror. This way you will see yourself in action and can change your posture, expressions, etc.
  6. Always make sure to have your grammar and pronunciations are correct.
  7. Spoken English is different from written English so make sure you have your punctuations where they are meant to be.
  8. Pauses should be well timed and not too often and definitely for not more than a few (3 – 4) seconds.
  9. Practice in front of your own audience. Get you family or friends to listen to you before you face the real audience. Tell them to be objective in their criticism and listen to them when they give their inputs.
  10. Finally rewrite the speech without looking at it; this way you will be able to figure out how much you remember.
Remember a good presentation / speech will work only if you are confident and believe in what you are speaking about. A smile also takes the speech a long way. So smile, practice hard and talk to your audience. Good luck!

During an interview – Interview Skills and Etiquette

Your résumé reflects a lot on what you have achieved in your past but the final decision is made when you actually meet your interviewer and are able to prove what you have given him on paper is what you have to offer in real life too. Interview etiquette unfortunately is not stressed upon in our country. Colleges and schools too should develop activities that involve teaching students the right way to act, communicate, dress and behave.

The first impression is a lasting one, so it is very important that when you walk out after the interview, you leave with confidence that you have not only given it your best but have been able to carry yourself with poise, confidence and in a well mannered way. During my college days in the United States, we had career building work shops and also seminars on Interviews. Such workshops helped us a lot, especially when we were told about minor details that we as interviewees may miss out but the interviewer pays attention to. Here are some tips to do well in an interview:

Dress Smart – It is important to dress smartly for an interview. Wear comfortable and conservative clothes. Indian western both are good for women but ensure you don’t wear something too flashy or too modern. For men the safest bet is a suit or a shirt, trousers and a tie. 
Wear comfortable shoes. Women shouldn’t wear very high heels or shoes that they cannot carry off or are uncomfortable in. the way you dress says a lot about you so make sure you keep that in mind when picking up something from your closet.
Greet the Interviewer – Make sure you greet the interviewer with a Sir / Madam. If he/she tell you to refer to him/her by their name then do so. Do not call them by their first name unless asked to do so. Referring to them as sir / madam looks professional and can get you brownie points.
Depending upon your comfort level you can either shake hands or fold your hands for a namaste. Usually people tend to shake hands. If you are shaking hands then make sure you don’t hold the interviewer’s hand too tightly. Have a firm grip and smile. A smile is very important; it shows you are relaxed and confident.

Break the Ice
 – An ice breaker statement will put you at ease. You could talk to the interviewer about how beautiful the office campus / building is or how nice the city is (if you have come from out of town). This will make you more comfortable and will make you look confident and will show your communication skills. 
For on campus interview you can ask the interviewer if this is his/her first visit to the city; if they are having a good stay and if they have gone sight seeing, etc. Refrain from personal remarks. It is safest to talk about the weather, the city or the office building.
 

Answer Confidently
 – If you have done your homework on the job profile, the company and yourself then you should be able to confidently answer the questions posed to you. Make sure you look directly at the interviewer while answering questions. 

Take Time Before Answering
 – You can pause for five seconds before answering. This way you don’t look like you have like you are reciting something you have learnt. Also do not take up too much time while answering. Answer to the point and be brief.

Don’t Fidget
 – Don’t be restless during an interview. Do not answer your cell phone; better still turn it off before going into the interview. Do not play with anything; keep your hands free of anything distracting. Do not tap your feet or bite your nails.

Don’t Boast
 – It is much better to stick to what you have on your resume. If you do have anything to add then do so in a modest manner. Do not boast. It gives a very negative vibe to the interviewer.

Smile
 – It is very important to smile during an interview. It shows that you are relaxed and also makes you look and feel confident. Everyone wants to work with a friendly face!

Ask Questions
 – If you have something you want answered, ask the interviewer. Do this towards the end. Usually the interviewer will ask you if you have any questions, make use of this opportunity. Keep questions away from money and monetary related issues. You will have ample time to discuss this later. Ask what you “next steps” should be, etc.

Thank the Interviewer
 – Make sure to thank the interviewer after the interview is done. Shake hands, smile and thank him / her for their time before leaving the room.

Now that you know what you should and should not do during an interview, you are ready to nail it. Just make sure that you have researched the company and the job profile thoroughly before going in for the interview.
 
Once you are done with you interview there are a few dos and don’ts to be followed after it. But that is next time. So do make sure to read next month’s article on “After and Interview – What NOT to do and what you SHOULD do!”

Good Luck!

Résumé Writing Skills

What your résumé should cover:
  1. Your Details
  2. Education Background: include, school and college.
  3. Work Experiences: include internships, work experiences if any.
  4. Skills: you can mention your online research ability, your proficiency in a foreign language or any Indian languages, computer skills, cross cultural sensitivity and why, organizational skills, etc.
  5. Credits: include all awards won; curricular and extra / co–curricular.
What your résumé should leave out:
  1. Details – a résumé should be brief and concise; leave details for the interview.
  2. Personal life stories.
  3. Bad grammar – make sure you have your résumé checked by your peers before submission.
  4. Vulgarity and abusive language.
  5. Hobbies – these can be included if you have won accolades / awards
Make Sure:
  1. If you have no work experience, your résumé SHOULD NOT be more than a single page.
  2. Grammar, spelling and punctuation are correct.
  3. Send a cover letter along with your résumé.
  4. Do not attach / send photographs.
Carry extra copies of your résumé with you.

Monday, April 28, 2014

Cloud Attacks Are Following Enterprise Workloads

Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them.
Cloud Attacks Are Following Enterprise Workloads
Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report. But while attacks on cloud environments have increased significantly in frequency and are becoming as diverse as those targeting on-premises data centers, the data also reveal thatthe cloud is not inherently less secure than traditional on-premises environments.
Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report.
But while attacks on cloud environments have increased significantly in frequency and are becoming as diverse as those targeting on-premises data centers, the data also reveal that the cloud is not inherently less secure than traditional on-premises environments.
"Cloud deployments are no less secure than your own data centers," says Stephen Coty, chief security evangelist at Alert Logic, a provider of managed security services for on-premises data centers as well as hosting and cloud service providers. "That's what the numbers are really showing across the board."
Alert Logic this week released its Spring 2014 Cloud Security Report, the latest in a series of cloud security reports it began releasing in early 2012.
The Spring 2014 report is based on a combination of real-world security incidents captured in customer environments secured via Alert Logic's intrusion detection system (IDS) and honeypot data gathered using low-interaction software to emulate a vulnerable OS. The report draws from 232,364 verified security incidents (validated by a team of Global Information Assurance Certification (GIAC)-certified security analysts) that were identified from more than one billion events observed between April 1 and September 30, 2013.
Alert Logic says the customer set includes 2,212 organizations across multiple industries, located primarily in North America and Western Europe. Of those customers, 80 percent use cloud hosting provider (CHP) environments, while 20 percent represent on-premises data centers.
Attacks Have Increased Across All Incident Types
Alert Logic found that with a single exception, attacks have increased across all incident types malware/botnet, brute force, vulnerability scan, Web app attack, recon and app attack in both on-premises and CHP environments.
In CHP environments, brute force attacks (exploit attempts enumerating a large number of combinations in hopes of finding a weakness) increased from 30 percent of customers in the 2013 report to 44 percent of customers in the current report. Vulnerability scans (automated vulnerability discovery in applications, services or protocol implementations) increased from 27 percent to 44 percent in the same period.
The sole exception to the increases was app attacks (exploit attempts against applications or services not running over HTTP) in on-premises environments, which were experienced by 19 percent of on-premises customers in 2013 and 16 percent in 2014. On the CHP side, app attacks increased from 3 percent of customers to 4 percent of customers over the same period.
Coty notes that while brute force attacks and vulnerability scans have historically been far more likely to target on-premises environments, the data show that they are now occurring at near-equivalent rates in both CHP and on-premises environments. Likewise, malware/botnet attacks, which are the most prevalent form of incident for on-premises data centers (affecting 56 percent of customers), are on the rise in CHP environments; they now affect 11 percent of customers.
Most Prevalent Incident Types Vary Between On-Premises and Cloud Still, the most prevalent types of incident do vary between on-premises environments and CHP environments. The top three incident classes for on-premises data centers were malware/botnet (affecting 56 percent of customers), brute force (49 percent of customers) and vulnerability scans (40 percent of customers). For CHPs, the most common incidents were brute force (44 percent), vulnerability scans (44 percent) and web application attacks (44 percent).
"Our intelligence suggests that the observed increase in cloud attacks is correlated to the growth of cloud adoption in the enterprise," Coty says. "As more enterprise workloads have moved into the cloud and hosted infrastructures, some traditional on-premises threats have followed them. This reinforces the necessity for enterprise-grade security solutions specifically designed to protect cloud environments."
"The number one thing you need to really understand in a cloud environment is that security in the cloud is a shared responsibility," Coty says. "The service provider is responsible for the foundation. They're even responsible for some level of perimeter security, hardening the hypervisor, giving you root access to your instance. But other than that, you as a consumer are 100 percent responsible for what happens in that environment. The better you understand the shared model between you and your service provider, the better you'll be able to secure your environment. That really applies to all service providers."
Honeypots in European Clouds Attract the Most Flies Alert Logic's cloud honeypots also told an interesting story. The company deployed its honeypots in public cloud infrastructures around the world in an effort to observe the types and frequencies of attacks, as well as how they vary geographically. Alert Logic found that honeypots in European clouds experienced the highest number of attacks four times more than honeypots in U.S. clouds and twice as many as honeypots in Asian clouds.
The incident attack types against European honeypots were tremendously varied. They included: MS-SQL Server (13 percent), MySQL (13 percent), HTTP (13 percent), RPC (13 percent), FTP (13 percent) and MS-DS (35 percent).
"The attacks in Europe were probably more diverse than anywhere else in the world," Coty says. "Outside of attacks on Microsoft Directory Services, everything was about 13 percent across the board."
Coty attributes the number and variety of attacks in Europe to Eastern European malware "factories," primarily in Russia, testing their efforts locally before deploying worldwide.
"The Eastern European guys who write a lot of this code test it in their own backyard," Coty says. "It originates from Europe. Once they've successfully deployed one place in Europe, they just go all over the globe now."
In Asia, the story is different. Attacks on MS-DS represent 85 percent of incidents there, particularly attacks on port 445. Coty attributes this to the plethora of pirated (and unpatched) Microsoft software in China and some other Asian countries. Port 445 supports direct hosted "NetBIOS-less" SMB traffic and file-sharing in Windows environments and, if not locked down appropriately, it is an easy target for accessing files and infecting systems.
Attacks on U.S. honeypots included MS-SQL Server (12 percent), MySQL (13 percent), HTTP (23 percent) and MS-DS (51 percent).
Alert Logic also notes that 14 percent of the malware collected through its honeypot network was not detectable by 51 percent of the world's top antivirus vendors. That's not because it was zero-day malware, Coty notes. Instead, much of the malware that was missed was repackaged variants of older malware like Zeus and Conficker.
Security in Depth Is Key in Cloud "The threat diversity for the cloud has increased to rival that of on-premises environments," Alert Logic says in the report. "And new threats uncovered by our honeypot research demonstrate how top antivirus software vendors cannot be solely relied upon to detect attacks. The continued focus by hackers on infiltrating IT infrastructure underscores the importance of adopting the right security procedures and tools, and of continuously evaluating and adjusting those procedures and tools as attackers find new ways to thwart defense."
Coty says that much as with on-premises data centers, security in depth is the key. He says a cloud security solution should address: Network.: Firewall, intrusion detection and vulnerability scanning to provide detection and protection, while also lending visibility into security health. Compute: Antivirus, log management and file integrity management to protect against known attacks, provide compliance and security visibility into activity within an environment and to help you understand when files have been altered (maliciously or accidentally).
Application: A web application firewall to protect against the largest threat vector in the cloud: web application attacks. Encryption technologies should be ubiquitous for data in-flight protection, and some companies select encryption for data-at-rest when necessary, assuming applications can support it.

Application Stack: Security Information Event Management (SIEM) can address the big data security challenge by collecting and analyzing all data sets. When deployed with the right correlation and analytics, this can deliver real-time insights into events, incidents and threats across a cloud environment.


Hand written notes better than typing on laptops: Study

WASHINGTON: Want to perform better in exams? Dust off those ballpoint pens and college-ruled notebooks! Taking notes by hand is better than writing them on a laptop for remembering conceptual information over the long term, a new study has found.

"Our new findings suggest that even when laptops are used as intended - and not for buying things on Amazon during class - they may still be harming academic performance," said Pam Mueller of Princeton University, lead author of the study.

Mueller and researcher Daniel Oppenheimer, who is now at the University of California, Los Angeles (UCLA), conducted a series of studies to investigate whether their intuitions about laptop and longhand note-taking were true.
In the first study, 65 college students watched one of five TED Talks covering topics that were interesting but not common knowledge.

The students, who watched the talks in small groups, were either given laptops (disconnected from Internet) or notebooks, and were told to use whatever strategy they normally used to take notes.

The students then completed three distractor tasks, including a taxing working memory task. A full 30 minutes later, they had to answer factual-recall questions based on the lecture they had watched.

The results showed that while the two types of note-takers performed equally well on questions that involved recalling facts, laptop note-takers performed significantly worse on the conceptual questions.

The notes from laptop users contained more words and more verbatim overlap with the lecture, compared to the notes that were written by hand.

Overall, students who took more notes performed better, but so did those who had less verbatim overlap, suggesting that the benefit of having more content is cancelled out by "mindless transcription."

"It may be that longhand note takers engage in more processing than laptop note takers, thus selecting more important information to include in their notes, which enables them to study this content more efficiently," researchers said.
Surprisingly, the researchers saw similar results even when they explicitly instructed the students to avoid taking verbatim notes, suggesting that the urge to do so when typing is hard to overcome.

Researchers also found that longhand note takers still beat laptop note takers on recall one week later when participants were given a chance to review their notes before taking the recall test.

Once again, the amount of verbatim overlap was associated with worse performance on conceptual items.

The findings are published in the journal Psychological Science. SAR AKJ SAR

Friday, April 4, 2014

World’s First 3D Printed House is Under Way in Amsterdam

It was only a matter of time before 3D printing expanded from foodlife-saving implants and underwear to something much larger and more complex. Work is under way on a full-scale house, a proof-of-concept project that is set to be completed in three years.
The house, which is located in Amsterdam, is the work of Dus Architects, which is using an industrial-sized KamerMaker 3D printer to create the plastic components that form the buiding’s walls, floors and furniture. A bioplastic mix made from plant oil ad microfibres is the material used to print the parts. When completed the house will will contain thirteen rooms, all supported and held together by a series of lightweight concrete supports and insulation.
“We’re still perfecting the technology,” Dus Architect’s Hedwig Heinsman told the Guardian. “We will continue to test over the next three years, as the technology evolves… It’s an experiment. We called it the Room Maker, but it’s also a conversation maker.”

If this project is a success then it could radically change the way houses and buildings are built. In theory 3D printed buildings could be recycled when they were no longer needed, while construction itself would mean less waste and transportation costs.
A 3 meter-high sample corner weighing 180kg is the result of just three weeks work. As each part is printed, they will be stacked together Lego-style.

“This could revolutionize how we make our cities,” says Heinsman. “This is only the beginning, but there could be endless possibilities, from printing functional solutions locally in slums and disaster areas, to high-end hotel rooms that are individually customized and printed in marble dust.”