Sunday, January 1, 2012

Operating Systems

!±8± Operating Systems

Introduction

Linux OS was first created by a student from the University of Helsinki in Finland. The creator's name was Linus Torvalds and he had an interest which turned into a passion for Minix, a small Unix application which was later developed into a system that surpassed the Minix standards. He started working on the minix in 1991 and worked heavily until 1994 when the first version of Linux kernal 1.0 was released. This Linux kernal sets the foundation to which the OS of Linux is formed. Hundreds of organizations and companies today have hired individuals and used them to release versions of operating systems using Linux kernal.
Linux's functioning, features and adaptation have made Linux and Windows OS's are excellent alternatives to other OS's. IBM and other giant companies around the world support Linux and its ongoing work after a decade from its initial release. The OS is incorporated into microchips using a process called "embedding" and is increasing the performance of of appliances and devices.

History of Linux

Through the 1990's some computer savy technicians and hobby insistent people with an interest in computers developed desktop management systems. These systems including GNOME and KDE that run on applications on Linux are available to anyone regardless of the persons motive to use the system. Linus Torvalds was interested in learning the capabilities and features of an 80386 processor for task switching. The application originally named Freax was first used with the Minix operating system.

Both the Freax and Minix designs seemed to be sacrificing performance for academic research and studying. Many of the computing specialists now are making assumptions that have changed since the 90's. Portability is now a common goal for these specialists of the computer industry and this is certainly not a academic requirement for software. Various ports to IA-32, PowerPC, MIPS, Alpha, and ARM along with supporting products being made and sold to wholesalers and retailers, commercial enterprises gave Linus a Alpha based system when tasks on Linus's priority list moved up to a notably busy point.

History of Windows

Presidents of Microsoft were Bill Gates and Paul Allen they shared the title until 1977, when Bill Gates became president and Paul Allen vice president. In 1978 the disk drives of the Tandy and Apple machines were 5.25-inch. First COMDEX computer show in Las Vegas introduces a 16-bit microprocessor, and from Intel manufacturers they introduce a 8086 chip. Al Gore comes up with the phrase "information highway." The same year Apple co-founder Steve Wozniak developed the first programming language called Integer Basic, this language was quickly replaced by the Microsoft Applesoft Basic.

Also in 1978, there was a machine that had an integrated, self contained design and was priced at less than 0, known as the Commodore PET which was a Personal Electronic Transactor. On 4/11/78 Microsoft announces its third language product, Microsoft COBOL-80. On the 1st of November in 1978 after their third language introduction, they opened their first international sales office in Japan. Microsoft delegates ASCII Microsoft, locatwed in Tokyo, asits exclusive sales agent for the Far East. And finally on New Years Eve of 1978 Microsoft announced that their year end sales was over million dollars. The following year in April of 1979 Microsoft 8080 BASIC is the first microprocessor to win the ICP Million Dollar Award. The big computers were dominated by software for the mainframe computer, the recognition for the pc computer indicated growth and acceptance in the industry.

Both Allen and Gates return home to Bellevue, Washington and announce plans to open offices in their home town, thus becoming the first microcomputer software company in the Northwest.

Technical Details of both Linux and Windows OS's

An OS takes care of all input and output coming to a computer. It manages users, processes, memory management, printing, telecommunications, networking, and etc. The OS sends data to a disk, the printer, the screen and other peripherals connected to the computer. A computer can't work without an OS. The OS tells the machine how to process instructions coming from input devices and software running on the computer. Therefore every computer is built different, commands for in or output will have to be treated differently. In most cases an operating system is not a gigantic nest of programs but instead a small system of programs that operate by the core or kernal. The pc computer system is so compact these small supporting programs it is easier to rewrite parts r packages of the system than to redesign an entire program.

When first created OS's were designed to help applications interact with the computer hardware. This is the same today, the importance of the OS has risen to the point where the operating system defines the computer. The OS gives off a layer of abstraction between the user and the machine when they communicate. Users don't see the hardware directly, but view it through the OS. This abstraction can be used to hide certain hardware details from the application and the user.

Applied software is that which is not generic but specifically for one single task machine. The software will not run on any other machine. Applications like this are SABRE, the reservation system of airlines, and defense systems. Computer Aided Software Engineering (CASE) Creating software is an expensive and time consuming process. These programs will support and in some cases replace the engineer in creating computer programs. Cad cam systems is the computer aided design &computer aided manufacturing. The electronic drawing board in a computer program the features are multiplying. Like premanufactured elements, strength calculations, emulations of how a construction will hold in earthquakes.

In Linux there has been a question that has been going back and forth now for a while, is SCSI dead for workstations? There have been many advancements in SATA and the mainstream acceptance of 10K RPM Western Digital Raptor maybe this made SCSI too expensive for what is needed in a workstation. It's time we take a look at Linux. How does the Western Digital Raptor WD740GD compare to the three latest Ultra320 SCSI drives: the Seagate Cheetah 10K.7, Seagate Cheetah 15K.3, and Seagate Cheetah 15K.4. This section covers the technology of the drives, acoustics, heat, size, and performance.

Lets take a look at the latest generation of the Seagate 10K Cheetah line and 15K Cheetah line. We will also be taking an in depth look at the latest 10K SATA drive from Western Digital the 74GB WD740GD. Starting with the Western Digital Raptor, WD pushes this drive as the low cost answer to SCSI. On their website, they like to show off the drives 1,200,000 hours MTBF(Mean Time Between Failure) which matches the last generation MTBF of the Seagate Cheetah 15K.3 and is very close to the reliability rating of today's Cheetahs.

In Linux's datasheet or newsletter, they also mention that the Cheetah drive is designed for "high performance around the clock usage." Both the Cheetah and the Western Digital Raptor drives have the same amount of cache memory. When you are speaking of operations in a multi-tasking/multi-user environment, the benefit of various queuing techniques is an advantage. All Ultra 320 SCSI drives support what is called Native Command Queuing or NCQ. This technique is where all commands sent to the disk drive can be queued up and reordered in the most efficient order. This stops the drive from having to request service on only one side of the disk, then going to the other side of the disk serving another request, in order to return for the next request.. While some of the SATA drives do support NCQ, the Raptor does not. The Raptor does have another form of queuing called Tagged Command Queuing or TCQ. This method is not as effective as NCQ and requires support in both the drive and host controller. From what they have been able to determine, TCQ support is sparse, even under Windows.

The SATA drive has itself backed up on their durability claim by stating their use of fluid dynamic bearings in their drives. The fluid dynamic bearings replace ball bearings to cut down on drive wear and tear and decrease operating noise.

Microsoft Windows XP technologies make it easy to enjoy games, music, and movies in addition to creating movies and enhancing digital photo's. Direct X 9.0 technology drives high speed multimedia and various games on the PC. DirectX provides the exciting graphics, sound, music, and three dimensional animation that bring games to life. Direct X is also the link that allows software engineers to develop a game that is high speed and multimedia driven for your PC. Direct X was introduced in 1995 and it's popularity soared as multimedia application development reached new heights. Today Direct X has progressed to an Application Programming Interface (API) and being applied into Microsoft Windows Operating Systems. This way software developers can access hardware features without having to write hardware code.

Some of the features of the windows media playerb 9 series with smart jukebox gives users more control over their music. With easy cd transfer to the computer, cd burning and compatibility is available on portable players. Users can also discover more with services that have premium entertainment. Windows media player 9 seriers works well with windows xp using the built in digital media features and delivers a state-of- the- art experience.
When Windows Millenium Edition 2000 came out of stores it was specifically designed for home users. It had the first Microsoft version of a video editing product. Movie Maker is used to capture and organize and edit video clips, and then export them for PC or web playback. Movie maker 2, released in 2003, adds new movie making transitions, jazzy titles, and neat special effects. Based on Microsoft Direct Show and Windows Media technologies, Movie Maker was originally included only with Windows Millenium Edition. Now Movie Maker 2 is available for Windows XP Home Edition and Windows XP Professional.

With the release of Windows XP in 2001 came Windows Messenger, bringing instant messaging to users across the internet. Users communicate using Text messages in real time in Windows Messenger. Real time messaging with video conferencing has been available for a long time before now. The first communication tool provided by Windows Messenger used integrated, easy to use text chat, voice and video communication, and data collaboration.

Linux is being developed and thus is freely redistributable in code form. Linux is available and developed over the internet. Many of the engineers who took part in producing it are from over seas and have never meet one another. This operating system is at a source level code and is on a large scale that has led the way to it becoming an featureful and stable system.

Eric Raymond has written a popular essay on the development of Linux entitled The Cathedral. and the bazaar. He describes the way the Linux kernal uses a Bazaar approach that has the code released quickly and very often, and that this requires input that has provided improvement to the system. This Bazaar approach is reported to the Cathedral approach used by other systems like GNU Emacs core. The Cathedral approach is characterized in bringing a more beautiful code that has been released, but unfortunately it is released far less often. A poor opportunity for people outside the group who can not contribute to the process.

Some of the high-lights and success of the Bazaar projects do not include the opening the code for everyone to observe, at the design level of the Bazaar. On the same token the Cathedral approach is widely viewed by everyone and is appropriate. Once debugging the code is executed, it is necessary to open the Bazaar to have everyone find different errors involving the code. If they can fix the code this a great effort and help to the coders.

Advantages and Disadvantages of the two OS's

The writer of this Linux OS web page Chris Browne, describes the way that Linux efforts are distributed and some of the advantages and disadvantages of the Linux OS. The Linux OS comes with some experimental versions such as the 2.5. x series where version numbers go steadily upwards every week. The stable version changes only when bugs are detected in the system and the bugs must be fixed in the experimental series, and this occurence does not change very often. Linux users know that this happens, and they work to resolve the bugs.
It is not guaranteed that all users will immediately fix their problems with the systems if they are not being affected (or don't notice they are affected) by problems, there are fixes quickly available, sometimes distributed across the internet after a few hours of diagnosis. For Linux fixes are available more quickly than commercial vendors like Microsoft, HP, and IBM usually this diagnosis is before they even know there's a problem. This acknowledgement is in contrast to other companies behavior, Bill Gates claims in his press releases Microsoft code has no bugs. This seems to mean that there are no bugs that Microsoft cares to fix.

Microsoft came to the conclusion that the majority of bugs detected in their systems are present because users don't use their software correctly. The problems that remain for Microsoft are few in number and are caused by actual errors. There is remaining work to get the stable Linux system, with configured Linux kernels that should and do have suitably configured software on top of the workload the systems have to run for hundreds of days without rebooting the computers. Some of the general public as well as computer professionals like engineers and technicians complain that Linux is always changing. Chris says that "effort and interest of the Linux kernal will stop when people want to stop building and enhancing the Linux kernal." As long as new technology and devices like the video cards are being constructed and people interested in Linux keep coming up with new improvements for Linux, work on Linux OS will progress.

The disadvantage of the Linux OS is that it may end because of there being a better platform for kernal hacking, or because Linux in the future will be so displaced that it becomes unmanageable. This has not happened yet but many researchers say that in the future of Linux, with various plans for attaining services to the consumer or business, Linux is moving away from the base kernal and into user space which creates less room for data and information. The announcement of a Debian Hurd effort suggests an alternative to the problem of kernal hacking. The Hurd kernal, which runs and is sent as a set of processes on top a microkernal such as MACH, may provide a system for those people that are not satisfied with changes to the linux kernal. Mach has a "message passing" abstraction that allows the OS to be created as a set of components that will work in conjunction with one another.

Competetive, Collaborative Efforts

To start this section I'll tell about the beginning of the personal computer and it's roots with IBM. Vertically integrated proprietary de facto standards architectures were the norm for the first three decades of the postwar computer industry. Each computer manufacturer made most if not all of its technology internally, and sold that technology as part of an integrated computer. This systems era was ascendant from IBM's 1964 introduction of its System 360 until the release of the 1981, personal computer from IBM. This was challenged by two different approaches. One was the fragmentation of proprietary standards in the PC industry between different suppliers, which led Microsoft and Intel to seek industry wide dominance for their proprietary component of the overall system architecture, making what Moschella (1997) terms the "PC era" (1964-1981). The second was a movement by users and second tier producers to cvonstruct industrywide "open" systems, in which the standard was not owned by a single firm.

The adoption of the Linux system in the late 1990s was a response to these earlier approaches. Linux was the most commercially accepted example of a new wave of "open source" software, the software and the source code are freely distributed to use and modify. The advantages of Linux in contrast to the proprietary PC standards, particulary software standards controlled by Microsoft. Product compatibility standards have typically been considered using a simple unidemensional typology, bifurcated between "compatible" and "incompatible." Further more, to illuminate differences between proprietary and open standards strategies, Gabel's (1987) multi-dimensional classification attribute, with each dimension assuming one of several (discrete) levels:

"multivintage" compatibility between successive generations of a product:

"product line" compatibility, providing interoperability across the breadth of the company's

product line-as Microsoft has with its Windows CE, 95/98/ME, and NT/2000 product families.

"multivendors" compatibility, i.e. compatibility of products between competing producers.

The first successful multi-vendor operating system was Unix, developed by a computer science research group at Bell Telephone Laboratories (BTL) in New Jersey beginning in 1969. As with the earlier Multics research project between MIT, BTL and mainframe computer maker General Electric, Unix was a multi-user time-shared OS designed as a research project by programmers for their personal use. Other characteristics key to Unix's success reflected path dependencies by its developers and early users( Salus 1994):

AT&T was forbidden by its 1956 consent decree from being in the computer business, so it did not sell the OS commercially. After publishing research papers, Bell Labs was flooded with requests from university computer science departments, who received user licenses and source code but a lack of support. Along cam budget constraints that limited BTL researchers to DEC minicomputers opposed to large mainframe computers, Unix was simpler and more efficient than its Multics predecessor, based on the simplified C programming language rather than the more widely used PL/I. Although originally developed DEC minicomputers, Unix was converted to run on other models by users who found programmer time less expensive than buying a supported model, thus setting the stage for it to become a hardware-independent OS.

Maybe one of the most important developments was the licensing of UNIX by the U.C. Berkeley Computer Science Department in 1973. The Berkeley group issued its own releases from 1977 to 1994, with much of its funding provided by the Defense Advanced Research Projects Agency (DARPA). The result of the Berkeley development included (Garud and Kumaraswamy 1993; Salus 1994) :

The first Unix version to support TCP/IP, later the standard protocols of the internet;

Academic adoption of BSD Unix as the preferred OS by many computer science departments throughout the world;

Commercial spread of BSD -derived Unix through Sun Microsystems, cofounded by former BSD programmer Bill Joy;

As they evolved their versions of Unix, fragmentation of Unix developers and adopters into rival "BSD" and "AT&T" camps.

AT&T Unix provided a multivendor standard which, when coupled with the BSD advancements, helped spur the adoption of networked computing. Helped by Sun, whose slogan is "the network is the computer," Unix rapidly gained acceptance during the 1980s as the preferred OS for networked engineering workstations (Garud and Kumaraswamy 1993). At the same time, it became a true multivendor standard as minicomputer producers with a small amount of customers, weak R&D and immature OS licensed Unix from AT&T. The main exceptions to the Unix push were the early leaders in workstations (Apollo) and minicomputers (DEC), who used their proprietary OS as a source of competitive advantage, and were the last to switch to Unix in their respective segments.

Some of the advocates from the two producers formed a number of trade associations to promote Unix and related operating systems. In doing so fueled the adoption and standardization of Unix, they hoped to increase the amount of application software to compete with sponsored, proprietary architectures(Gabel 1987; Grindley 1995). These two groups promoted these under the rubric "open systems"; the editors of a book series on such systems summarized their goals as follows:
Open systems allow users to move their applications between systems easily; purchasing decisions can be made on the basis of cost-performance ratio and vendor support, rather than on systems which run a users application suite (Salus 1994: v).

Despite these goals, the Unix community spent the 1980s and early 1990s fragmented into AT&T and Berkeley warring factions, each of which sought control of the OS API's to maximize the software available for their versions. Each faction had its own adherents. To avoid paying old earlier mainframe switching costs, U.S. Department of Defense procurement decisions began to favor Unix over proprietary systems. As AT&T formalized its System V Interface Definition and encouraged hardware makers to adopt System V, it became the multivendor standard required by DoD procurements

BSD group was only developed for DEC minicomputers, its Unix variant was not multivendor and less attractive and appealing for DoD procurements. The numerous innovations of the BSD group in terms of usability, software development tools and networking made it more attractive to university computer scientists for their own research and teaching, making it the minicomputer OS preferred by computer science departments in the U.S., Europe and Japan (Salus 1994). The divergent innovation meant that the two major Unix variants differed in terms of internal structure, user commands and application programming interfaces (APIs). It was the latter difference that most seriously affected computer buyers, as custom software developed for one type of Unix could not directly be recompiled on the other, adding switching costs between the two systems. Also, both the modem-based and DARPA networking facilitated the distribution of user donated source code libraries, that were free but often required site-specific custom programming if the Unix API's at the users site differed from those of faced by the original contributor.

Microsoft Windows continues to invest in products based on the Itanium processor family, and the Itanium Solutions Alliance will further this investment by helping growth of the ecosystem of applications and solutions available on Windows platform and SQL Server 2005," said Bob Kelly, general manager, Windows infrastructure, Microsoft Corp. "We look forward to working with the members of the Itanium Solutions Alliance to help IT managers transition from RISC-based Unix servers to Itanium based systems running on the Windows platform."


Operating Systems

How To Sprout Seeds Best Total Gym Workout Cheap Used Brother 8480dn

Monday, December 26, 2011

How to Tailor Your Resume for the Job You Are Applying For

!±8± How to Tailor Your Resume for the Job You Are Applying For

Today's seasoned professional possess a variety of skills and abilities that benefit the work environment. Corporate employees are expected to keep up with trends within their field of expertise. If you are fortunate your employer will pay for your education and training. As a result of increased duties and cross-training many job seekers realize they can fill jobs outside of the title and industry they have been working with for years.

Recently I coached an individual that was having difficulty returning to the workforce after being laid off 8 months ago from her job where she worked as a District Store Manager for a retail employer. Karen was 49 years old and had worked for over 20 years within the retail industry in some form of management capacity. She posted her resume on Monster and searched for jobs on Indeed but she only had one phone interview in the past 8 months. Her resume looked OK but when I asked her to provide more details in her job duty section it was revealed that she had performed many job duties that a corporate human resource generalist, recruiter and trainer does. She conducted interviews, provided training, negotiated and extended offers. She prepared and distributed payroll. She enjoyed these H.R. related duties so we prepared a 2nd resume that highlighted all of her H.R. related duties. The best place to highlight your specific skills related to the job that you are applying for is in your summary which should always be listed right beneath your name and contact information. Your summary of qualifications is a very critical component of your resume, without it your odds of being recognized are diminished significantly. It was in the summary that Karen listed how many years she had with preparing payroll, interviewing and training. She mentioned what kind of payroll software she worked with, what type of interviewing techniques she used and the size of her audience that she trained. In the summary specifics sell. Karen reposted her revised resume on Monster, created a LinkedIn account and applied to human resource related jobs via Indeed.com, within one week she had three interviews for human resource jobs! Within two weeks of posting her new resume she accepted an offer with a major retailer to work within their human resources department. The offer paid more than she ever earned as a District Manager and an added bonus her exhausting road travel requirements were eliminated. In Karen's case she enhanced her human resources duties but applied to H.R. jobs within the retail field where she had many years experience.

One of the keys to tailoring your resume for a specific job is know which skills you have that are of value to the position/client. One of my human resource friends, Cindy, has a general version of her resume and a resume that she uses when she applies for jobs that require a recruiter that has experience finding Information Technology professionals. As a corporate recruiter consultant she has interviewed and on-boarded professionals for Sales and Marketing, Healthcare, Wireless and Information Technology positions of employment. When she applies for an information technology recruiter position Cindy minimizes her background that involves recruiting Sales, Marketing, Healthcare and Wireless professionals and expands on her I.T. recruiter experience. For her latest I.T. Recruiter resume she wrote a list of what are the most common questions she is asked in an interview setting when applying to an I.T. Recruiter position. Upon reviewing her list she was able to answer many of the interview questions in listing those skills first and foremost in her resume summary section. Cindy put in bold the areas she wanted the recruiter or hiring manager to be drawn to when reviewing her resume. If there is something that is very important for the reader to see she will print it in bold red lettering. She also looked carefully at the key words listed within the job descriptions that appeal to her and incorporated as many key words as possible in her resume summary and job description. To identify key words look for the specifics in the job description.

Below you will see Cindy's general Recruiter resume followed by her Information Technology Recruiter resume:

Cindy Examplelcandidate
Cindy's contact information listed here...
*successfully traveled to work on-site for duration of contracts as well as worked remotely

Summary: 5+ years agency experience, 10+years Corporate Contract Recruitment experience within a matrixed environment. Sr. Talent Acquisition Specialist with over fifteen years of full-life-cycle internal/external recruitment experience including developing and maintaining relationships with hiring managers to determining the best recruitment strategies. Serve as candidate advocate working to ensure a world-class experience for all potential candidates. Able to thrive in a high-pressured, ambiguous environment. Experienced with UltiPro, Vurv, Recruitmax, BrassRing, Prohire, Raycats, Peopleclick, PeopleSoft, SharePoint, Behavorial interviewing, Web 2.0 recruitment processes, Outlook & Lotus Notes. Managed vendor relationships. Articles published on corporate recruitment - Western International Media & e-zines.

Experienced sourcing and screening for the following: I.T., Sales, Marketing, Retail, Wireless, Healthcare, Government and Business professionals.

Work History **All assignments were completed successfully, on-time, within budget.
1999 - Present EXCELLENT Incorporation Company
Principal - Corporate Contract Recruiter
Aka: Talent Acquisition Consultant

CLIENTS:

IBM
As Recruitment Program Manager am responsible for managing exempt-level I.T. high-volume candidate activity. Serve as front end to hiring partners. Qualify candidates, facilitate the interview process, work closely with hiring executives to evaluate candidates and prepare offers. Also provide direction to dedicated sourcers for fulfillment of opening requisitions.
September, 2010 - present

Press Ganey/South Bend, IN
Responsible for staffing I.T., Legal, Sales & Marketing departments for this leader for Patient Satisfaction Surveys. Source and Screen legal, sales, marketing and I.T. professionals for positions located across the U.S.A. Coach managers on selection of hires. Prepare offers. Write and post job descriptions. Cold calling as well as utilizing major and niche job boards. Assist with the implementation of company ATS, Ultipro. 5/10/10 - 10/27/2010 and 9/14/09- 12/17/09

IMS -( I.T. Staffing Agency)/Huntington Beach, CA
Assist this agency with staffing for: Architect, Management, Project Leader, Programmer Analyst, DBA, Developer, Systems Analyst, Software Engineer, Business Analyst, and other I.T. related roles. Skills recruiter for: Citrix, SharePoint, SQL, LAN/WAN, DHCP, Lotus Notes Administrator, helpdesk, C#,.NET, IBM, Intel, migration, VB, Oracle DBA, MCSE, CCIE, PowerBuilder, XAML, WinForm, TCP/IP, C+, HIPAA, Scrum, Agile, Q.A. Analyst/Tester, MCP, J2EE, JDE and others. Extensive Cold- calling

Clients: Entertainment, Commercial, Automotive, Healthcare 1992 - (on/off support)

T-Mobile USA/Cerritos, CA & Novi, MI
Source and screen for retail division. Roles responsible for filling include: Sales Engineer, Account Development Representative, Event Rep., and Technical Sales Support. Positions are spread across the country. Partner with hiring managers to council on selection of candidates as well as construction of offers. ATS: Vurv 3/5/07 - 8/26/07 and 8/8/08 - 1/5/09

AT&T Mobility/Los Angeles, CA
Source and screen wireless sales professionals for the government division. Interact with H.R. Hiring Managers and Applicants across the country. ATS: Peopleclick Offer process: Peoplesoft Corporate community site for sharing information: Sharepoint

Assist hiring managers with newly developed recruitment process due to AT&T acquisition of Cingular Wireless. Create and conduct phone screens. Review resumes in ATS and make recommendations to hiring managers. Prepare and extend offers to candidates. Company was in M&A mode with U.S. Cellular
"It is evident that Kelly has a passion for recruiting, and a confidence in her skills. This shows in the way that she approaches the recruiting challenges that are presented to her.

I highly recommend Cindy for any recruiting position she will pursue in the future. She has been a very valuable resource on my team." Charlotte P - Associate Director Mobility Staffing 10/07 - 7/08

Humana /Louisville, KY
Using ATS, RecruitMax (Vurv), job boards, internet, and referrals sourced a variety of healthcare insurance professionals for exempt and non-exempt level positions of employment. Consult with hiring managers to determine specifications for role. Develop phone screens to determine interview eligibility. Interview applicants face-to-face. Consult with hiring managers for selection of candidates to extend offers to. Negotiate salaries for and with candidates.

Extend offers verbally and in writing. Assist with mass hiring campaigns for various Humana locations throughout the United States. Utilize basic HTML coding.
Was key contributor for two week hiring initiative of 20+ Frontline Leaders (Supervisors). This initiative required the sourcing of 200+ resumes, phone screening 40+ candidates, coordinating with hiring managers to interview and on-board new employees within two weeks all at the same time providing candidates and extending offers for other hiring departments.

"Cindy is an expert in the Staffing/Recruiting Industry. She has a wealth of knowledge and is an out-of -the-box thinker. She delivered results in a challenging and tough environment, while carrying a heavy workload of requisitions. I received numerous compliments from hiring managers on the quality of candidates presented and responsiveness." Larry M - Staffing Manager at Humana 10/05 - 2/07

HRFirst/American Express/Troy, MI
Using BrassRing, job boards and the internet was responsible for sourcing & screening various marketing professionals for sites across the United States. 8/05 - 10/05

Berbee Information Networks/Southfield, MI
Hired to develop talent pipeline and place networking and sales professionals for Berbee's enterprise software industry clients. Berbee provides end-to-end sales and services for IBM, Cisco & Microsoft business products. Utilize ATS: Prohire, job boards, employee referrals and networking to hire systems engineers, system architects, account managers, Network Voice

Engineers, and other I.T. professionals. Developed phone screens from questions asked of hiring managers and top level I.T. professionals within industry. Negotiate offers, consult on recommended starting sign-on bonuses, relocation and vacation packages. Check professional references. Sell candidates on the value proposition of joining the Berbee team. 2/05 - 6/05

Raytheon/Troy, MI
Hired for ten-week contract recruitment assignment for this Fortune 100 company. Raytheon Professional Services, LLC designs and executes integrated learning solutions for commercial, military and government organizations worldwide. Responsible for sourcing, screening and hiring web instructors, as well as hard-to-fill hybrid I.T. positions. Provide strategic recruitment methods. Create and conduct phone screens. Using Lotus Notes, set up interviews for multiple hiring managers. Utilized company ATS: RayCats. 11/04 - 2/05

Kaiser Permanente/San Jose, CA
As project manager for community-wide nurse hiring event was responsible for contacting college instructors, cold-calling potential attendees, keeping administration and recruitment staff abreast of activities, maintaining spreadsheets for activity updates, and delegating responsibilities to various personnel. Overall duties involved hiring of nurses from start to finish, i.e., sourcing, screening, interviewing, set up interview with management, follow up with applicant and management, salary negotiations, offer letter preparation. Utilized internet effectively for recruitment purposes. As part of recruitment team was able to bring on board over 60 nurses, thus cutting nurse hiring needs in half. "I am continually amazed at your dedication and work ethic." Sherry B, nurse management candidate, Kaiser email message. 8/04 - 11/04

Port Huron Hospital/Port Huron, MI
For this six-month contract assignment was responsible for full-life-cycle recruitment of allied healthcare professionals for 1200 employee hospital. On average filled four positions per week. Utilized behavorial interviewing techniques. Developed recruitment strategies and advertisement campaigns to attract candidates for difficult to fill positions of employment, i.e.: respiratory therapists, pharmacists, MRI technicians, ultra sonographers and phlebotomists. Prepare offer letters, prepare and give presentations to management on how to recruit effectively, gave presentations regarding H.R. procedures at staff orientations, negotiate with vendors and prepare a host of H.R. related paperwork. Track Affirmative Action using Peopleclick software. "She has covered every aspect of what I need to know to keep the process (recruitment) moving. I truly appreciate all she did to fill our open positions" Marlene Z/Housekeeping Supervisor, email sent to H.R. department head at Port Huron Hospital.
12/03 - 7/04

Additional Clients
Clients: Deloitte & Touche, Hewlett-Packard (HP), Accenture, Carlson Marketing, Paramount Pictures, Giorgio's, Universal Studios, Staffed senior level I.T. professionals.

EDUCATION
B.A. with distinction in Speech Communication San Jose State University, San Jose, CA

MEMBERSHIPS
SHRM - Society for Human Resource Management
SMA - Staffing Management Association
ERE - Electronic Recruiters Exchange

Volunteer
Provide job-search workshops to various classes/groups/associations/government sponsored events
Published articles on job search in newspapers, e-zines and magazines

**Following is Cindy's I.T. Recruiter resume. You will notice that in addition to highlighting her I.T. recruiting activity in the first page of her resume she continues to highlight her I.T. related skills throughout the job duty descriptions and right up until the end of her resume where she list the additional clients that she has worked for. **

Cindy Examplecandidate
Cindy's contact information listed here...
*successfully traveled to work on-site for duration of contracts as well as worked remotely

Summary:
15+years Corporate Contract Recruitment experience within a matrixed environment.
15 years full-life-cycle internal/external recruitment experience including developing and maintaining relationships with hiring managers to determining best recruitment strategies. Serve as candidate advocate working to ensure a world-class experience for all potential candidates.
Able to thrive in a high-pressured, ambiguous environment.
Experienced with UltiPro, Vurv, Recruitmax, BrassRing, Prohire, Raycats, Peopleclick, PeopleSoft, SharePoint

Experienced sourcing and screening for the following:
20 yrs full-life-cycle recruitment for I.T. professionals for the following environments: Manufacturing, Wireless, Healthcare, Consulting, Retail
On & Off 10 yrs engineer staffing: software, sales, network, VOIP, systems
20yrs recruitment for exempt, non-exempt, enterprise software (ERP), SQL,.NET, Cisco, IBM, Microsoft infrastructure, engineer, architect, process improvement, business analyst, Business Intelligence, outsource operations, Six-Sigma Black-belts, Project Managers, others...

Tools and Sources used to locate quality I.T. professionals:
• Company ATS
• Linkedin (messages, invites, announcements via groups and associations)
• Job boards: DICE, Monster, TheLadders, SixFigures, Executnet
• Niche internet sites: Free-for-Recruiters, scguild.com, findadeveloper.com, ishunter.com
• Web 2.0 sites: Twitter, Facebook, Zoominfo, Spoke
• Utilize own income to join and participate in associations and conferences
• Referrals, heavy networking, meet others when I give job search presentations in the community
• Passionate about cold-calling

Work arrangement: Lifestyle flexible to where have travelled to work on-site for duration of contract as well as have worked successfully from home office as telecommuter.

Work History **All assignments were completed successfully, on-time, within budget.
1999 - Present EXCELLENT Incorporation Company
Principal - Corporate Contract Recruiter
Aka: Talent Acquisition Consultant
CLIENTS:

IBM
As Recruitment Program Manager am responsible for managing exempt-level I.T. high-volume candidate activity. Serve as front end to hiring partners. Qualify candidates, facilitate the interview process, work closely with hiring executives to evaluate candidates and prepare offers. Also provide direction to dedicated sourcers for fulfillment of opening requisitions. Positions processed: Oracle developer, Oracle DBA, SAP Basis, SAP Architect, COBOL developer, Siebel developer
September 16, 2010 - present

IMS -( I.T. Staffing Agency)/Huntington Beach, CA
Assist this agency with staffing for: Architect, Management, Project Leader, Programmer Analyst, DBA, Developer, Systems Analyst, Software Engineer, Business Analyst, and other I.T. related roles. Skills recruiter for: Citrix, SharePoint, SQL, LAN/WAN, DHCP, Lotus Notes Administrator, helpdesk, C#,.NET, IBM, Intel, migration, VB, Oracle DBA, MCSE, CCIE, PowerBuilder, XAML, WinForm, TCP/IP, C+, HIPAA, Scrum, Agile, Q.A. Analyst/Tester, MCP, J2EE, Java, CISSP, JDE and others. Extensive Cold- calling
Clients: Entertainment, Commercial, Automotive, Healthcare 1992 - (on/off support)

Press Ganey/South Bend, IN
Responsible for staffing I.T., Legal, Sales & Marketing departments for this leader for Patient Satisfaction Surveys and performance improvement. Source and Screen legal, sales, marketing and I.T. professionals for positions located across the U.S.A. Coach managers on selection of hires. Prepare offers. Write and post job descriptions. Cold calling as well as utilizing major and niche job boards. Assist with the implementation of company ATS, Ultipro. 5/10/10 - 8/27/10 & 9/14/09- 12/17/09

T-Mobile USA/Cerritos, CA & Novi, MI
Source and screen for retail division. Roles responsible for filling include: Sales Engineer, Account Development Representative, Event Rep., and Technical Sales Support. Positions are spread across the country. Partner with hiring managers to council on selection of candidates as well as construction of offers. ATS: Vurv 3/5/07 - 8/26/07 & 8/8/08 - 1/5/09

AT&T Mobility/Los Angeles, CA
Source and screen wireless sales and technical sales professionals for the government division. Interact with H.R. Hiring Managers and Applicants across the country. ATS: Peopleclick Offer process: Peoplesoft Corporate community site for sharing information: Sharepoint
Assist hiring managers with newly developed recruitment process due to AT&T acquisition of Cingular Wireless. Create and conduct phone screens. Review resumes in ATS and make recommendations to hiring managers. Prepare and extend offers to candidates. Company was in M&A mode with U.S. Cellular
"It is evident that Kelly has a passion for recruiting, and a confidence in her skills. This shows in the way that she approaches the recruiting challenges that are presented to her.

I highly recommend Cindy for any recruiting position she will pursue in the future. She has been a very valuable resource on my team." Charlotte P - Associate Director Mobility Staffing 10/07 - 7/08

Humana Inc/Louisville, KY
Using ATS, RecruitMax (Vurv), job boards, internet, and referrals sourced a variety of healthcare insurance professionals for exempt and non-exempt level positions of employment. Consult with hiring managers to determine specifications for role. Develop phone screens to determine interview eligibility. Interview applicants face-to-face. Consult with hiring managers for selection of candidates to extend offers to. Negotiate salaries for and with candidates.

Extend offers verbally and in writing. Assist with mass hiring campaigns for various Humana locations throughout the United States. Utilize basic HTML coding.

Was key contributor for two week hiring initiative of 20+ Frontline Leaders (Supervisors). This initiative required the sourcing of 200+ resumes, phone screening 40+ candidates, coordinating with hiring managers to interview and on-board new employees within two weeks all at the same time providing candidates and extending offers for other hiring departments.

"Cindy is an expert in the Staffing/Recruiting Industry. She has a wealth of knowledge and is an out-of -the-box thinker. She delivered results in a challenging and tough environment, while carrying a heavy workload of requisitions. I received numerous compliments from hiring managers on the quality of candidates presented and responsiveness." Larry M - Staffing Manager at Humana 10/05 - 2/07

HRFirst/American Express/Troy, MI
Using BrassRing, job boards and the internet was responsible for sourcing & screening various marketing and I.T. professionals for sites across the United States. 8/05 - 10/05

Berbee Information Networks/Southfield, MI
For this high-tech consulting company that provided end-to-end services for IBM, Cisco & Microsoft business products utilize ATS: Prohire, job boards, employee referrals and networking to hire systems engineers, system architects, account managers, Network Voice Engineers, and other I.T. professionals. Negotiate offers including sign-on bonuses, relocation and vacation packages. Sell candidates on the value proposition of joining the Berbee team. 2/05 - 6/05

Additional Clients that I served on a contract basis
• Deloitte & Touche - I.T. professional placements - Greater Nashville area
• Hewlett-Packard (HP) - I.T. professional placements - Metro Detroit area
• Accenture - I.T. professional placements - Michigan
• Raytheon - Marketing professionals - Michigan
• Paramount Pictures - I.T. professional placements - Southern California
• Universal Studios - I.T. professional placements - Southern California
• Carlson Marketing - I.T. and Marketing professionals - Michigan
• Girogio's - I.T. professional placements - Southern California
• Kaiser Permanente - RN's for their hospitals in Bay area, CA

EDUCATION
B.A. with distinction in Speech Communication San Jose State University, San Jose, CA

MEMBERSHIPS
• SHRM - Society for Human Resource Management
• SMA - Staffing Management Association
• ERE - Electronic Recruiters Exchange
• AHIMA - American Health Information Management Association
• HIMSS - Healthcare Information and Management Systems Society

Volunteer
Provide job-search workshops to various classes/groups/associations/government sponsored events
Have been a guest on Cable TV show relating to the Job Search process
Online video speaker for Newspaper web site
Published articles on job search in newspapers, e-zines and magazines
Author of book, The Recruiter's Hiring Secrets

Create several versions of your resume and save them on your computer so you can easily upload the appropriate resume for the job you are applying for. Also remember to constantly be updating and refining your resume. Happy Job Hunting!


How to Tailor Your Resume for the Job You Are Applying For

Rock Band Cymbal Reviews Promotions Bbq Chicken Legs Oven Promotions Heater Plug Light Flashing

Thursday, December 15, 2011

Red5 Media Server and Security

!±8± Red5 Media Server and Security

Here are the steps to configure SSL in existing Red5 application. This article is keeping in the mind you have basic knowledge of Red5 or you are aware of how Red5 applications are built.

Software required on machine where Red5 server is installed:-

1: Open SSL //Open source SSL libraries required for compiling Stunnel

2: Stunnel //Open source SSL wrapper software uses open SSL works both on
Windows and Linux.

3: gcc // The GNU C compiler (although it always bundled with Linux
Machine, but I did not find it. Necessary if you are compiling the
Open SSL and Stunnel from source. Not required if using RPM

Configuration needed on server machine:-

1:- Install the Open SSL (if windows use exe RPM or source for Linux machine can be downloaded from openssl website).

2:- Install Stunnel (if windows, use exe otherwise RPM or compilation from source is preferred, can be downloaded from stunnel website). Make sure that you already have compiled Open SSL in your machine before proceeding with the installation of Stunnel; otherwise it will fail to compile.

Under Linux the standard command to compile Stunnel from source are described below. For any update please always follow the installation instructions given their website.

machine# gzip -dc stunnel-VERSION.tar.gz tar -xvzf -
machine# cd stunnel-VERSION
machine# ./configure
machine# make
machine# make install

There are several configurations that differ based on your computer and environment. That can be read from the website itself.

3:- Running Stunnel (There are several ways/mode you can run the stunnel. Follow the FAQ available in their website to choose the best which matches your requirements).
To run stunnel, you always require a configuration file. The process of making sample configuration file (stunnel.conf) is described below.

The sample configuration file used was like this:

sample.conf

; Sample stunnel configuration file by Sunil Gupta 2007
; Some options used here may not be adequate for your particular configuration

; Certificate/key is needed in server mode and optional in client mode
; The default certificate is provided only for testing and should not
; be used in a production environment

cert = /etc/stunnel/stunnel.pem
;chroot = /var/run/stunnel/
pid = /stunnel.pid
key = /etc/stunnel/stunnel.pem

; Some performance tunings
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1

; Workaround for Eudora bug
;options = DONT_INSERT_EMPTY_FRAGMENTS

; Authentication stuff
;verify = 2
; Don't forget to c_rehash CApath
;CApath = certs
; It's often easier to use CAfile
;CAfile = certs.pem
; Don't forget to c_rehash CRLpath
;CRLpath = crls
; Alternatively you can use CRLfile
;CRLfile = crls.pem

; Some debugging stuff useful for troubleshooting
debug = 7
Output = /var/log/stunnel.log
foreground=yes
; Use it for client mode
; client = yes
; Service-level configuration

;[pop3s]
;accept = 995
;connect = 110

;[imaps]
;accept = 993
;connect = 143

;[ssmtp]
;accept = 465
;connect = 25

[rtmps - https]
TIMEOUTconnect=20
accept = 443
connect = 80
TIMEOUTclose = 20

; vim:ft=dosin

Finish

Note: - When you install Stunnel, you get a default sample file, which is not enough in most of the cases to run the flash application. The additions to configuration file I made are as follows.
Also the line having ; in the start denotes the commented portion in file.

cert = /etc/stunnel/stunnel.pem
key = /etc/stunnel/stunnel.pem

pem stands for 'privacy enhanced mail' used as a key format. The above two lines tells the location of pem files need to be generated. This will be configured by user. The above is the best location for Stunnel although you can change it to any desired location.

;Some performance tunings

socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1

The above two lines are for better performance of Stunnel in our case.

; Workaround for Eudora bug
;options = DONT_INSERT_EMPTY_FRAGMENTS

The above line is a bug in a specific platform, since we are running it in Linux; we commented this line, although it could be needed in some case.

; Some debugging stuff useful for troubleshooting
debug = 7
Output = /var/log/stunnel.log
foreground=yes

The above lines are very important, Because Stunnel by default run in background mode. You will never be able to see if it is running. So better to put it in foreground, so that you can make sure that stunnel is running properly. Also the debug = 7 is very important since by default stunnel does not generate any log. You can direct him to generate log, so that you can debug your application by seeing all those log messages. The above mentioned log directory is default Linux directory where all system logs are generated.

; Use it for client mode
; client = yes

In the sample configuration file, you will always find this option un-commented leading to a different architecture, since we are running Stunnel in server mode not client mode, so we will comment this line.

[rtmps - https]
TIMEOUTconnect=20
accept = 443
connect = 80
TIMEOUTclose = 20

And the very last lines are mentioned above. In the sample configuration file, you will never find rtmps and it is not even mentioned anywhere in Stunnel. The default file contains only https, add rtmps like it is added here. Also accept port is 443, which is the default port used for secure communication and it is open like port 80 in all corporate firewalls in general. This port is to accept the connection from flash and to get the encrypted data. The connect port is 80; this is the port where stunnel will forward the decrypted data to red5 server.
The TIMEOUTconnect and TIMEOUTclose can be useful in some cases when the server where the data is being forwarded by Stunnel is delaying the connection. This is to make sure that connection is closed only when server is not responding at all. The value is in seconds (i.e. 20 sec.)

Now in order to run your application under secure connection, you require a certificate to be created on the machine where the Stunnel is installed. The procedure for creating a certificate and the possible directory to put this certificate is described below.

Use of certificate:-

When an SSL client connects to an SSL server, the server presents a certificate, essentially an electronic piece of proof that machine is who it claims to be. This certificate is signed by a 'Certificate Authority' (hereafter a CA) -- usually a trusted third party like Verisign. A client will accept this certificate only if
The certificate presented matches the private key being used by the remote end.
The certificate has been signed correctly by the CA. The client recognizes the CA as trusted.

Every stunnel server has a private key. This is contained in the pem file which stunnel uses to initialize its identity. If we notice above, we have given the reference of this pem file in the start of our configuration file under cert.

This private key is put in /usr/local/ssl/certs/stunnel.pem.

Note:-Under client mode we need not to have certificate in most of the cases, but if we are running it in server mode, we require a certificate. Since we are using server mode, I have generated a self certificate.

To make certificate:-

1: Go to /etc/stunnel directory and
2: Run the following command:-'

openssl req -new -x509 -days 365 -nodes -config stunnel.cnf -out stunnel.pem -keyout stunnel.pem

This creates a private key and self-signed certificate. More information on the options of this can be read from FAQ section of Stunnel website.

While executing the command, it will ask for some questions like Country, City, Company etc., Give the answer of those and it will generate the key and self certificate.

4:- Put your sample.conf file in /etc/stunnel directory where the .pem file was created earlier.

5:- Start Stunnel by issuing the command -

machine# stunnel stunnel.conf

If you are /etc/stunnel directory otherwise complete path of configuration file-

machine# stunnel /etc/stunnel/stunnel.conf

The above command will start the stunnel and you can verify the log from /var/logs/stunnel.log file.

Red5 server side changes:-

6:- Now stunnel is up and running, we need to change the Red5 configuration to accept the connection from Stunnel.

Go to red5 installation directory and search for conf folder where all red5 configuration files exist.

Open red5.properties file and under rtmps.host_port property put 443. The sample file can be like below.

rtmp.host_port = 0.0.0.0:1935
rtmp.threadcount = 4
debug_proxy.host_port = 0.0.0.0:1936
proxy_forward.host_port = 127.0.0.1:1935
rtmps.host_port = 127.0.0.1:443
http.host=0.0.0.0
http.port=5080
rtmpt.host=0.0.0.0
rtmpt.port=80

Flash client side changes:-

7:-Now we are done with server side, In order to run application under SSL, we need to change the client side protocol from rtmp to rtmps like below. And compile the flash client and run it on browser, a certificate will pop up, accept it and the application will run under SSL.

nc.connect ("rtmps://yourip/applicationname"); //used rtmps in place of rtmp

To get all Red5 media server related stuffs, visit the website below-


Red5 Media Server and Security

Comparison Simplehuman Trash Bags Order Mission Tiffany Table Lamp


Twitter Facebook Flickr RSS



Fran�ais Deutsch Italiano Portugu�s
Espa�ol ??? ??? ?????







Sponsor Links