The Information Systems and Computer Applications examination covers material that is usually taught in an introductory college-level business information systems course.

Welcome to the Jungle

  • 1b3c2-mcad_logo
  • c81a8-img1a
  • 2482b-imagen4

Latest

HOWTO: HTML5 Video that works (almost) everywhere

    

So I got this video from a friend, and I wanted to post it on my site, but I wanted to do it without using any Flash, or any plugins, and I wanted it to work on the iPhone, and Chrome, and Firefox, and IE…

Step 1: Convert the file.

First I took the file and used Miro Video Converter to make two versions of the file. The first version I made was using the “Theora” format. This is an Ogg format, and you basically only need to make it for the video to show up in Firefox. Future versions of Firefox will support the WebM format instead (Chrome supports it now), so when Firefox 4 comes out, use that format. Next, use Miro again and this time make a version using the iPhone preset. This basically creates an MP4 version of the file, but at the right resolution to have it show up on the iPhone. Annoyingly, the original file was from an iPhone, so it should have played, but it wouldn’t on mine. I suspect that the resolution difference between the iPhone 4 (used to make the photo) and the iPhone 3GS (which I have) is the problem. Regardless, I just used the preset to downscale the video resolution.

Step 2: Adjust WordPress’ settings

WordPress didn’t like me uploading these files. Turned out that it was because I’m on multisite. In the Network Admin screen, find the Network Settings menu option, go to the bottom of the page, and add the mp4 and ogv extensions to the list of allowed files. Also add webm while you’re there, for the future. Note: If you’re not on multisite but still have problems uploading the files, then add this line of code to your wp-config.php file, to turn on the unfiltered_upload capabilities for administrators:

define('ALLOW_UNFILTERED_UPLOADS',true);

Step 3: Check .htaccess settings

One of the things WordPress relies on to know if it’s a video or not is the MIME Type. Some servers have these properly configured, some don’t. Doesn’t hurt to help the process along by explicitly defining some of them in the .htaccess file. For good measure, I added a bunch of common ones, just to be sure:

AddType text/xml .xml
AddType video/mp4 .mp4 .m4v
AddType video/mpeg .mpeg .mpg
AddType video/quicktime .mov
AddType video/ogg .ogv
AddType video/webm .webm
AddType audio/mp4 .m4a .m4b .m4r
AddType audio/mpeg .mp3
AddType audio/playlist .m3u
AddType audio/x-scpls .pls
AddType audio/ogg .ogg
AddType audio/wav .wav

Step 4: Upload the videos

Easy one. Go into the Media->Library and upload your two videos. After doing that, get the URLs of both of them.

Step 5: Make the post

Make a new post and type in everything you want to type in. Then make sure you’re in the HTML editing mode, and add this code to the post:

<video width="640" height="360" controls>
  <source src="http://example.com/wp-content/uploads/video.mp4" type='video/mp4'></source>
  <source src="http://example.com/wp-content/uploads/video.ogv" type='video/ogg'></source>
</video>

There’s a few things there you’ll need to manually edit. Obviously the URLs need to point to your files. Also, it’s important that the MP4 one is first, some older iPad software doesn’t like it otherwise. The second one is the width and height. Now, like with posting images, these don’t have to exactly match the actual width and height of the video. The browser will use these sizes and scale the video accordingly. However, you’ll want to get the aspect ratio correct, so you don’t stretch or squish the video into the wrong sized box. And you can leave the height and width out entirely to not scale it, if you got your sizes correct in the video itself. But it’s a good idea to have them there regardless, to clue the browser into the size beforehand and speed up page rendering. Also note that the iPhone doesn’t care about those width and height tags, since it will just show the video full screen when you tap on it. Sidenote: Do NOT switch into Visual mode. TinyMCE will muck up this code, badly, and try to add a SWF player to it and Flash and a bunch of other stuff. This is probably by design, but I wanted to do this without Flash at all and see how that worked. Turns out to work fine in the browsers I tested. Finally, preview and publish as normal.

Wantlist

One thing I haven’t figured out is how to target the iPhone specifically with a separate file. With this setup, Chrome and IE are now showing the iPhone file, which is lower resolution than the OGV file (which is at original resolution). In this specific case, the video was poor and so it doesn’t make much difference, but I’d prefer to have a separate file specified that only iPhones used without having to resort to user agent targeting. EDIT: Turns out you can do this with a media query on the source that targets the iPhone. So here’s my new code:

<video width="640" height="360" controls>
  <source src="http://example.com/wp-content/uploads/video.iphone.mp4" type='video/mp4' media='only screen and (max-device-width: 480px)'></source>
  <source src="http://example.com/wp-content/uploads/video.mp4" type='video/mp4'></source>
  <source src="http://example.com/wp-content/uploads/video.ogv" type='video/ogg'></source>
</video>

The media attribute lets you specify a CSS3 Media Query. The max-device-width of 480px = iPhone. So desktop browsers will use the video.mp4 while the iPhone uses the video.iphone.mp4. I’ve confirmed that this works properly with Chrome. It’s interesting to see that browsers can do this reasonably well, even if you do have to make a few different versions of the video.

Shortcode Plugin

At the suggestion of ipstenu in the comments below, I made this into a shortcode plugin. You can download it here: HTML5 Video Shortcode. This plugin has the advantage of being ignored by TinyMCE. :)

Onfido, o cómo un joven abandonó Merrill Lynch tras una semana de trabajo para hacerse rico con su propia empresa de tecnología

Genbeta by Águeda A.Llorca
Captura De Pantalla 2016 01 13 A La S 15 38 43

A finales de diciembre del año pasado te hablamos de un joven que, con su aplicación (DoNotPay) había conseguido ahorrarle a los conductores ingleses hasta 3,6 millones de euros en multas por aparcamiento en solo 4 meses. Se trataba de Joshua Browder, un chico inglés de 18 años que decidió embarcarse en una aventura que le salió sorprendentemente bien.

Sin embargo, parece que no es el único cerebro post-adolescente que ha triunfado en los últimos meses. De hecho, hoy se cuela en el panorama noticioso un graduado de Oxford: Husayn Kassai. En su caso, abandonó su puesto en el banco Merrill Lynch (una división del Bank of America) tras solo una semana después de empezar a trabajar en la empresa para crear la empresa que lo ha hecho rico: Onfido.

Qué es Onfido

Comprobacion

Así, su entidad ya ha recaudado más de 5 millones de dólares y cuenta con el respaldo de inversores de la talla de Wellington Partners (detrás de Spotify y otras) y Brent Hoberman (fundador de Lastminute.com). Y no solo eso sino que Onfido ha sido considerada como una de las empresas más inteligentes del Reino Unido. Pero ¿cuál es la clave de su éxito?

En concreto, la tecnología de Onfido permite a las compañías verificar los antecedentes de sus futuros trabajadores antes de contratarles. Y no nos estamos refiriendo únicamente a aquellos que tienen que ver con la delincuencia, el nombre y otros datos fáciles de falsear; sino también aquellos que atañen al currículum.

7yeotgjy

De hecho, los potenciales candidatos reciben un correo electrónico en el que han de responder a una prueba que se cerciora de alguno de los conocimientos indicados. Un test de inglés, preguntas básicas del carnet de conducir y otros pueden utilizarse para la comprobación. Un sistema tremendamente útil del que ya se valen Onefinsestay (rival de Airbnb), Hays, TransferWise y más.

La idea, pese a su sencillez, nació después de que Husayn Kassai empezara a trabajar para Merrill Lynch y se percatase de la falta de preparación de muchos de sus integrantes. “Crees que un banco tiene a las personas más inteligentes del mundo, y entras y descubres que el gerente está usando hojas de cálculo y Windows 95 y te encuentras pensando: ¿me he perdido algo?”, comenta Kassai.

Onfido, asimismo, cuenta en la actualidad con 72 empleados, que se distribuyen en sus distintas sedes, ubicadas en San Francisco, Lisboa y Londres. En estos momentos, además, se encuentra en proceso de negociaciones con varias empresas de capital de riesgo para conseguir nuevos inversores.

Vía | Business Insider

Imagen | Onfido

En Genbeta | DoNotPay o cómo un joven ha ahorrado a los conductores más de 3,6 millones de euros en multas por aparcamiento en solo 4 meses

También te recomendamos

Cuatro herramientas de gestión del tiempo que te ayudarán a organizarte mejor. Pero, ¿de veras?

Las 11 mujeres más influyentes que están definiendo la tecnología

“Facebook at Work” llegará el 1 de enero del 2015, según WSJ


La noticia Onfido, o cómo un joven abandonó Merrill Lynch tras una semana de trabajo para hacerse rico con su propia empresa de tecnología fue publicada originalmente en Genbeta por Águeda A.Llorca .

Estimate_percent

Here’s a live one from OTN – here are a couple of extracts from the problem statement:

We’re experiencing an issue where it seems that the query plan changes from day to day for a particular procedure that runs once a night.
It’s resulting in a performance variance of 10 second completion time vs 20 minutes (nothing in between).
It started occurring about 2 months ago and now it’s becoming more prevalent where the bad query plan is coming up more often.
I noticed that the query plans vary for a simple query.
We do run gather statistics every night. (DBMS_STATS.GATHER_SCHEMA_STATS (ownname=>sys_context( ‘userenv’, ‘current_schema’ ), estimate_percent => 1);)

The query and two execution plans look like this:

select count(*) from cs_bucket_member_v2 where bucket_type='P' and sec_id > 0 and order_id=0;

----------------------------------------------------------------------------------------------------
| Id  | Operation                    | Name                | Rows  | Bytes | Cost (%CPU)| Time     |
----------------------------------------------------------------------------------------------------
|   0 | SELECT STATEMENT             |                     |     1 |    12 |   155   (0)| 00:00:02 |
|   1 |  SORT AGGREGATE              |                     |     1 |    12 |            |          |
|*  2 |   TABLE ACCESS BY INDEX ROWID| CS_BUCKET_MEMBER_V2 |  1148 | 13776 |   155   (0)| 00:00:02 |
|*  3 |    INDEX RANGE SCAN          | CS_BUCKET_MEMBER_N1 |  1272 |       |     3   (0)| 00:00:01 |
----------------------------------------------------------------------------------------------------

Predicate Information (identified by operation id):
---------------------------------------------------
   2 - filter("BUCKET_TYPE"='P' AND "SEC_ID">0)
   3 - access("ORDER_ID"=0)


------------------------------------------------------------------------------------------
| Id  | Operation          | Name                | Rows  | Bytes | Cost (%CPU)| Time     |
------------------------------------------------------------------------------------------
|   0 | SELECT STATEMENT   |                     |     1 |    12 | 11215   (2)| 00:01:41 |
|   1 |  SORT AGGREGATE    |                     |     1 |    12 |            |          |
|*  2 |   TABLE ACCESS FULL| CS_BUCKET_MEMBER_V2 |  1522K|    17M| 11215   (2)| 00:01:41 |
------------------------------------------------------------------------------------------

Predicate Information (identified by operation id):
---------------------------------------------------
   2 - filter("ORDER_ID"=0 AND "SEC_ID">0 AND "BUCKET_TYPE"='P')

There are a couple of bits of information that would be useful – such as the database version, the number of rows in the table, the number of distinct values in each column, and whether any of the columns have histograms – but there are a couple of reasonable guesses that we might make about the problem. Notice particularly that the number of rows estimated from the index ranges scan is 1272 and only a small volume is then eliminated by the table filter predicates on sec_id and bucket_type. This suggests that the optimizer has information that tells it that most of the rows in the table have sec_id > 0 and bucket_type = ‘P’, and you might note that that suggests that there’s a histogram on bucket_type.

Rather than stating the most obvious guesses about the problem, though, I’ll start by creating a data set and emulating the problem, starting from an empty schema on 11.2.0.4:

create table t1
nologging
as
with generator as (
        select  --+ materialize
                rownum id 
        from dual
        connect by 
                level <= 1e4
)
select
        rownum                  sec_id,
        case
                when mod(rownum,1000) = 0
                        then 'X'
                        else 'P'
        end                     bucket_type,
        case
                when rownum < 1e6 - 50000 
                        then mod(rownum-1,1e5)
                        else 1000
        end                     order_id,
        lpad(rownum,10,'0')     id_vc,
        rpad('x',100,'x')       padding
from
        generator       v1,
        generator       v2
where
        rownum <= 1e6
create index t1_i1 on t1(order_id) nologging; 

select count(*) from t1 where order_id = 1000 and bucket_type = 'P' and sec_id > 1000;

The column names in the table match those needed by the query, and the bucket_p column has a very skewed distribution that will eliminate very little data; the sec_id column is also not going to eliminate data, but it’s very evenly distributed with no large gaps so not a good candidate for a histogram in any case. The order_id has 50,000 rows out of 1,000,000 (5%) set of a single value, and most of those special rows are at the end of the table – it’s a pretty good candidate for a histogram (if Oracle spots it, and if we actually write queries to access that data).

I’ve run a query that references all three columns so that the default method_optof “for all columns size auto” will apply to them when I gather stats. So here’s the code that gathers stats and checks the result execution plans, first for “auto_sample_size” then for the 1% used by the OP:

set autotrace traceonly explain

begin
        dbms_stats.gather_schema_stats(
/*              estimate_percent => 1, */
                ownname          => user
        );
end;
/

select count(*) from t1 where order_id = 1000 and bucket_type = 'P' and sec_id > 1000;

begin
        dbms_stats.gather_schema_stats(
                estimate_percent => 1,
                ownname          => user
        );
end;
/

select count(*) from t1 where order_id = 1000 and bucket_type = 'P' and sec_id > 1000;

set autotrace off

And here are the two plans – in the same order:

---------------------------------------------------------------------------
| Id  | Operation          | Name | Rows  | Bytes | Cost (%CPU)| Time     |
---------------------------------------------------------------------------
|   0 | SELECT STATEMENT   |      |     1 |    12 |  2333   (4)| 00:00:12 |
|   1 |  SORT AGGREGATE    |      |     1 |    12 |            |          |
|*  2 |   TABLE ACCESS FULL| T1   | 51063 |   598K|  2333   (4)| 00:00:12 |
---------------------------------------------------------------------------

Predicate Information (identified by operation id):
---------------------------------------------------
   2 - filter("ORDER_ID"=1000 AND "SEC_ID">1000 AND "BUCKET_TYPE"='P')


--------------------------------------------------------------------------------------
| Id  | Operation                    | Name  | Rows  | Bytes | Cost (%CPU)| Time     |
--------------------------------------------------------------------------------------
|   0 | SELECT STATEMENT             |       |     1 |    12 |    23   (0)| 00:00:01 |
|   1 |  SORT AGGREGATE              |       |     1 |    12 |            |          |
|*  2 |   TABLE ACCESS BY INDEX ROWID| T1    |    20 |   240 |    23   (0)| 00:00:01 |
|*  3 |    INDEX RANGE SCAN          | T1_I1 |    20 |       |     3   (0)| 00:00:01 |
--------------------------------------------------------------------------------------

Predicate Information (identified by operation id):  
---------------------------------------------------
   2 - filter("SEC_ID">1000 AND "BUCKET_TYPE"='P')
   3 - access("ORDER_ID"=1000)


I don’t know why, but with a 1% sample (which really did sample 10,000 rows) the optimizer didn’t spot the need for a histogram on order_id, but with the auto_sample_size (which sampled 5,500 – yes, half as many rows) the optimizer spotted the need for the histogram. Checking the trace files the only difference visible in the sample SQL was the presence in the 1% sample of the id_vc and padding columns which the auto_sample_size ignored because they hadn’t been logged as used by col_usage$.

Moral

Histograms are tricky things – and you can only make things worse in 11g by NOT using the auto_sample_size.

Footnote

Based on previous experience – my “obvious” guess about the OP’s data was that there was a special-case value for order_id, that the rows for that value were fairly well clustered, probably towards the end of the table, and constituted a small percentage of the table, and that the rest of the data reported “a few” rows per value. That’s why I built the model you see above.

JAPO complete

My Little Posterous (ScIeNtIfIc DiSsEmInAtIoN)

I have now reviewed every release in the JAPO catalogue. Shout outs to Craig LeHoullier, Steve Lake, and Bernd Webler for helping make my JAPO listening complete!

Any of you regular readers out there might have noticed that I recently reviewed the two latest XtraWATT albums. These stand as my backward entry into ECM’s other sub-labels. I do, of course, plan to also explore WATT and CARMO in full on this site, although such reviews may be sporadic, mixed in as they will be with the most up-to-date ECMs, along with albums from farther afield.

Below is a list of all JAPO releases, hyperlinked to my reviews for your convenience.

JAPO 60001 Mal Waldron The Call (Feb 1971)
JAPO 60002 Abdullah Ibrahim African Piano (Oct 1969)
JAPO 60003 Barre Phillips For All It Is (Mar 1971)
JAPO 60004 Herbert Joos The Philosophy of the Fluegelhorn (Jul…

View original post 385 more words

Tamaño de un disco (fdisk vs lsblk)

systemadmin.es by Jordi Prats

Si comparamos los tamaños que reportan las herramientas fdisk y lsblk veremos que difiere el tamaño

Por ejemplo, mediante fdisk vemos 10.7GB:

# fdisk -l /dev/sdg

Disk /dev/sdg: 10.7 GB, 10737418240 bytes
64 heads, 32 sectors/track, 10240 cylinders
Units = cylinders of 2048 * 512 = 1048576 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0xf921660d

   Device Boot      Start         End      Blocks   Id  System
/dev/sdg1               1       10240    10485744   8e  Linux LVM

Mientras que lsblk nos reporta 10G clavados:

# lsblk /dev/sdg
NAME                    MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
sdg                       8:96   0  10G  0 disk 
└─sdg1                    8:97   0  10G  0 part 
  └─vg0-LogVol01 (dm-1) 253:1    0  28G  0 lvm  /var

Si partimos de los bytes reportados en el /proc/partitions:

# cat /proc/partitions 
major minor  #blocks  name

(...)
   8       96   10485760 sdg
   8       97   10485744 sdg1

Haciendo los cálculos podemos ver que la diferencia entre las dos herramientas son las unidades:

# echo "10737418240/1024/1024/1024" | bc -l
10.00000000000000000000
# echo "10737418240/1000/1000/1000" | bc -l
10.73741824000000000000

En el caso de lsblk esta usando Gigabytes (base 10) mientras que fdisk esta usando Gibibytes (potencias de 2)

Tags: ,

Tamaño de un disco (fdisk vs lsblk) was first posted on August 6, 2015 at 9:01 am.

#NoHacked: How to avoid being the target of hackers

If you publish anything online, one of your top priorities should be security. Getting hacked can negatively affect your online reputation and result in loss of critical and private data. Over the past year Google has noticed a 180% increase in the number of sites getting hacked. While we are working hard to combat this hacked trend, there are steps you can take to protect your content on the web.

Today, we’ll be continuing our #NoHacked campaign. We’ll be focusing on how to protect your site from hacking and give you better insight into how some of these hacking campaigns work. You can follow along with #NoHacked on Twitterand Google+. We’ll also be wrapping up with a Google Hangout focused on security where you can ask our security experts questions.

We’re kicking off the campaign with some basic tips on how to keep your site safe on the web.

1. Strengthen your account security

Creating a password that’s difficult to guess or crack is essential to protecting your site. For example, your password might contain a mixture of letters, numbers, symbols, or be a passphrase. Password length is important. The longer your password, the harder it will be to guess. There are many resources on the web that can test how strong your password is. Testing a similar password to yours (never enter your actual password on other sites) can give you an idea of how strong your password is.

Also, it’s important to avoid reusing passwords across services. Attackers often try known username and password combinations obtained from leaked password lists or hacked services to compromise as many accounts as possible.

You should also turn on 2-Factor Authentication for accounts that offer this service. This can greatly increase your account’s security and protect you from a variety of account attacks. We’ll be talking more about the benefits of 2-Factor Authentication in two weeks.

2. Keep your site’s software updated

One of the most common ways for a hacker to compromise your site is through insecure software on your site. Be sure to periodically check your site for any outdated software, especially updates that patch security holes. If you use a web server like Apache, nginx or commercial web server software, make sure you keep your web server software patched. If you use a Content Management System (CMS) or any plug-ins or add-ons on your site, make sure to keep these tools updated with new releases. Also, sign up to the security announcement lists for your web server software and your CMS if you use one. Consider completely removing any add-ons or software that you don’t need on your website — aside from creating possible risks, they also might slow down the performance of your site.

3. Research how your hosting provider handles security issues

Your hosting provider’s policy for security and cleaning up hacked sites is in an important factor to consider when choosing a hosting provider. If you use a hosting provider, contact them to see if they offer on-demand support to clean up site-specific problems. You can also check online reviews to see if they have a track record of helping users with compromised sites clean up their hacked content.
If you control your own server or use Virtual Private Server (VPS) services, make sure that you’re prepared to handle any security issues that might arise. Server administration is very complex, and one of the core tasks of a server administrator is making sure your web server and content management software is patched and up to date. If you don’t have a compelling reason to do your own server administration, you might find it well worth your while to see if your hosting provider offers a managed services option.

4. Use Google tools to stay informed of potential hacked content on your site

It’s important to have tools that can help you proactively monitor your site.The sooner you can find out about a compromise, the sooner you can work on fixing your site.

We recommend you sign up for Search Console if you haven’t already. Search Console is Google’s way of communicating with you about issues on your site including if we have detected hacked content. You can also set up Google Alertson your site to notify you if there are any suspicious results for your site. For example, if you run a site selling pet accessories called http://www.example.com, you can set up an alert for [site:example.com cheap software] to alert you if any hacked content about cheap software suddenly starts appearing on your site. You can set up multiple alerts for your site for different spammy terms. If you’re unsure what spammy terms to use, you can use Google to search for common spammy terms.

We hope these tips will keep your site safe on the web. Be sure to follow our social campaigns and share any tips or tricks you might have about staying safe on the web with the #NoHacked hashtag.

If you have any additional questions, you can post in the Webmaster Help Forums where a community of webmasters can help answer your questions. You can also join our Hangout on Air about Security on August 26.

Posted by: Eric Kuan, Webmaster Relations Specialist and Yuan Niu, Webspam Analyst

SanDisk anuncia un pendrive inalámbrico con 128GB de almacenamiento para smartphones

FayerWayer by Christian de la Cruz

En ocasiones, conectar el teléfono a la computadora mediante un cable USB para compartir archivos no parece ser un método eficaz, ya sea por problemas con los drivers, porque no cuentas con un cable USB compatible o porque es ridículo hacerlo para pasar sólo un archivo.

SanDisk lo tiene bien pensado, pues anunció el nuevo pendrive Connect Wireless Stick con 128GB de almacenamiento que puede conectarse inalámbricamente a un smartphone o tablet mediante una aplicación exclusiva.

El pendrive se conecta a una PC para pasar archivos a la par que tres dispositivos se conectan inalámbricamente para compartir archivos entre sí. Además, elimina la dependencia hacia una tarjeta microSD y el límite de memoria externa en lossmartphones.

El SanDisk Connect Wireless Stick permanece activo hasta 4,5 horas después de la carga, para que puedas llevarlo a todas partes sin obligarte a conectarlo en una computadora. Está disponible a partir de los 16GB por un precio que va desde los USD$29.99 hasta USD$99.99 por la versión de 128GB.

La aplicación para acceder a los archivos está disponible para teléfonos iOS y Android y el dispositivo es compatible con los sistemas operativos Windows y Mac OS.

Las mejores 10 certificaciones de IT

Con cada vez mayor competencia en el mercado de trabajo, las certificaciones se han vuelto más y mas importantes. Está claro que las certificaciones tienen un gran valor para cualquier empresa y un título específico aumenta las posibilidades de conseguir un mejor puesto de trabajo en empresas de TI. El grupo de Azure de EFY ha compilado una la lista de las 10 certificaciones de TI que promete mejores opciones de trabajo para este año y que podemos comparar con Las 10 certificaciones mejor pagas.

1. Project Management Professional (PMP)

Esta es la certificación más importante y reconocida para los directores de proyectos. PMP es conocida por la experiencia, la educación y las competencias para liderar y dirigir proyectos. La demanda de esta certificación se ha incrementado en el mercado y asegura un sueldo elevado a los gerentes de proyectos.

2. Certified Information Systems Security Professional (CISSP)

CISSP es un estándar reconocido a nivel mundial por sus logros en el conocimiento del individuo en el campo de la seguridad de la información. Las empresas prefieren a un candidato con la certificación CISSP, ya que asegura profundo conocimiento y las habilidades de la arquitectura, el diseño, la gestión y los controles de seguridad del entorno empresarial. Los exámenes CISSP cubren todos los temas necesarios y críticos como la gestión de riesgos, el cloud computing, seguridad móvil, la seguridad de desarrollo de aplicaciones, etc.

3. Microsoft Certified Solutions Developer (MCSD)

Esta certificación debes tenerla si eres es un desarrollador con experiencia en el análisis y diseño de software de solución empresarial con lenguajes y herramientas de desarrollo de Microsoft. Un candidato con MCSD es miembro de Microsoft Certified Professionals y los MCPs tienen un gran valor en el mercado de trabajo.

4. Microsoft Certified Database Administrator (MCDBA)

Microsoft Database Administrator Certified prueba la capacidad del candidato para diseñar, implementar y administrar bases de dato SQL Server 2000. Esta certificación fue eliminada en septiembre de 2012, sin embargo, todavía tiene un gran valor. Si estás planeando obtener una certificación en SQL, puedes optar a Microsoft Certified Solutions Expert (MCSE) for Data Platform para profesionales de bases de datos o Microsoft Certified Solutions Expert (MCSE) para Business Intelligence.

5. Cisco Certified Design Associate (CCDA)

Esta es una certificación reconocida para los ingenieros de diseño de la red, los técnicos y los ingenieros de soporte que puedan asegurar la eficiencia del entorno de red con el conocimiento profundo de los fundamentos de diseño de red. CCDA para profesionales de comunicaciones demuestra las habilidades para diseñar el campus básico, centro de datos, seguridad, voz y red inalámbrica.

6. Microsoft Certified Application Developer (MCAD)

Esta certificación asegura la capacidad de construir potentes aplicaciones que utilizan servicios Web .NET y Visual Studio de Microsoft. MCAD permite a los desarrolladores mostrar sus habilidades para implementar aplicaciones funcionales, implementarlas y mantenerlas. Conseguir el MCDA es duro pero añade mucho valor a tu currículum.

7. VMware Certified Professional (VCP)

VMware Certified Professional garantiza trabajo en el entorno del CDP. Esta certificación requiere la realización de un curso autorizado de VMWare y experiencia práctica con las tecnologías de VMware. Esta certificación es esencial para diferenciarse en el mercado de trabajo para validar las habilidades técnicas. La certificación VCP-DCV confirma la capacidad del candidato para instalar, desplegar y gestionar un entorno VMware vSphere.

8. Certificado Novell Engineer (CNE)

Esta certificación valida el conocimiento de habilidades de soporte de red. Con esta certificación se puede obtener fácilmente un trabajo deadministrador de red. Los empleadores tienen la seguridad de que el candidato con el CNE puede mantener la red de la empresa funcionando de manera eficiente. Un CNE realiza la planificación, instalación, configuración, solución de problemas y la mejora de los servicios de redes.

9. Fundamentos de ITIL v3

Se trata de una titulación de nivel de iniciación que garantiza elconocimiento de los elementos clave, conceptos y terminología utilizados en el ciclo de vida del servicio de ITIL. La conclusión con éxito de la certificación ITIL mejora la visión general y conocimientos básicos de ITIL en los candidatos. Este curso también cumple los criterios de nivel de entrada para el próximo estudio de nivel en el esquema de calificación de ITIL.

10. Database Administrator 2008 (MCITP)

Esta certificación demuestra que se tienen las habilidades necesarias para realizar un determinado puesto de trabajo de TI comoadministrador de base de datos o administrador de mensajería empresarial. Sin embargo, este curso de certificación se basa en las versiones anteriores de las tecnologías de Microsoft. Pero puede ser una base fundamental para las Microsoft Certified Solutions Expert (MCSE).

Fuente: HackPlayers

Follow

Get every new post delivered to your Inbox.

Join 21,076 other followers