My experience on my daily works... helping others ease each other

Thursday, June 21, 2012

LabView for dummies

Where does LabView beginner needs to starts?


  1. Go to NI.com and download the student's version.
  2. LabView Technical Resource
  3. Self-paced courses athttp://sine.ni.com/nips/cds/view/p/lang/en/nid/2281
  4. LabVIEW for Scientists and Engineers (books by John Essick)

Share:

IASA Update


Becoming an Indispensable Partner Webinar - Tuesday, June 26th
Iasa Global has partnered with executive coach, Steve Lishansky, who will be presenting several key principles and best practices for improving communication with clients, in an upcoming webinar for the Iasa community:

Tuesday, June 26th - 9:00am-10:30am (CDT)

Becoming an Indispensable Partner™ positions you with your clients for easier access, earlier engagement, higher regard, and greater impact - the conditions that lead to much greater appreciation, respect and cooperation. How many times have your internal or external clients failed to understand not just your solutions, but the importance of those solutions to their own success?This webinar is focused on helping you understand and deploy complimentary skills that leverage the impact and value of your technical expertise with clients. 

Unlocking the Vault - A Look Inside the Iasa Content Repository
The Iasa Content Repository is a collection of white papers, presentations, videos, interviews, articles and many other downloadable items from Iasa's international architect community. Take a look at some of the items in the collection to see what's available to you:   

  = Member Exclusive


Doing the Math - Valuing Architecture as Investment

When people discuss architecture they often talk about architecture being more business focused and less IT focused. In fact, this statement has taken on the makings of a trend in and of itself. We often get caught in the hyperbole and grandiosity of statements about architecture instead of focusing on useful practical examples and things people can use today. The real opportunity to show value lies with an oft-misunderstood aspect of technology as an investment. . .
  
Three Keys to Evaluing Technology Techniques
  
We constantly hear people talking about value creation and architecting a solution or enterprise. From our perspective these things are semantically equivalent. The key skill in understanding value addition in business is valuation. What architecture teams in most businesses tend to lack is this additional value information. Yet value from technology investment is precisely what makes a design different from what you expect from an engineer. . . 

Enterprise Functionality: A Concept to Fix IT Sprawl

The concept of "Enterprise Functionality" is something that a lot of organizations have been chasing after over the years. It is the universal collection of functionality that the business can build once and reuse over and over. It was the promise of Java 10 years ago. It was the promise of SOA as a reference point 5 years ago. The reality of this pursuit is not the window dressing. It's a conceptual change for the business and for IT. . .


Iasa Partner Events & Activities                                                                                            

 
 

*Please be advised that the contents of Iasa partner advertisements reflect the views of the
partner, and do not reflect the official views, policies or endorsements of Iasa Global.
____________________________________________________________________________________

Iasa Global is the premier association focused on the IT architecture profession through the advancement of best practices, education and certification. Established in 2002, Iasa delivers programs and services to IT architects of all levels around the world. As a non-profit business association, we're dedicated to the advancement and sharing of issues related to software, infrastructure, information, and business architecture in the enterprise, product, education and government sectors. 

 
Headquartered in Austin, Texas, Iasa is committed to improving the quality of IT architecture by developing and delivering standards, education and accredited certification programs and services. With more than 35 Chapters in over 25 countries, and a member base and readership of 60,000 professionals worldwide, Iasa is the leader for IT architecture profession. For more information, visit our website at  www.iasaglobal.org
Sincerely,
Iasa Global
Share:

Monday, June 18, 2012

Wednesday, June 13, 2012

Google Apps Developer Challenge 2012


Participate in the Google Apps Developer Challenge!
It’s time to show the world what Malaysian's can do with Google Apps and the Google Drive API.
Developers in 6 regions across the world will win prizes that include Chromebooks and up to$20,000 USD with other special prizes for students and female developers!
All you have to do is build and submit an amazing application in one of these categories:
  • Enterprise / Small Business Solutions
  • Social / Personal Productivity / Games / Fun
  • Not-for-Profit: Education / Water / Food & Hunger / Health
A winner will be chosen for each category, in each region -- 18 prizes in total.

Want to start hacking?

Join the Google Apps Developer Launch events in Asia.
The first round of submissions closes August 24, 2012.


Visit ISOC MALAYSIA Chapter at: http://www.isoc.my/?xg_source=msg_mes_network
Share:

Sunday, June 10, 2012

BIT9 Cyber Security Report


Bit9 Logo
Cyber Security Brief
THE GLOBAL LEADER IN ADVANCED THREAT PROTECTION
Welcome Nurul, to the Bit9 Cyber Security Brief. With the increasing urgency of understanding and addressing cyber threats, we've created this security briefing. It includes the latest industry research reports, featured videos, webcasts, customer stories and more to keep you up-to-date on the industry and the solutions we provide to protect organizations from cyber attacks. Here's our latest resources:

2012 BIT9 CYBER SECURITY RESEARCH REPORT
In March and April of 2012, Bit9 conducted an online survey of nearly 3,000 IT and security professionals worldwide. Survey participants work in companies across a wide range of industries, as well as in government agencies. The majority of the respondents (66%) work in organizations with more than 500 employees. Click here to read what IT and security professionals, like you, foresee about the changing nature of cyber attacks and how it will affect organizations and their IT infrastructure.
Watch Webcast
DOMAIN CONTROLLERS: THE TARGET OF CHOICE
Bit9 has seen a 150 percent year-over-year increase in the number of attacks on domain controllers. Attackers, largely nation states and cyber criminals, are after corporate intellectual property (IP)—everything from chemical formulas and vaccines to military data and source code—all valuable competitive information. Rather than attacking directly the servers that house such information, advanced persistent attackers are targeting domain controllers so as to gain access to all information repositories and systems within the company. Read this Bit9 Threat Advisor to learn how to proactively secure your IP.
Download Whitepaper
RICHARD CLARKE DISCUSSES APPLICATION WHITELISTING
Richard Clarke, former white house security advisor and leading advocate against cyber espionage and its influence on corporate markets, offers critical insight about cyber security few others can. In this video, Mr. Clarke discusses the growth of industrial espionage and spear phishing and sheds light on exactly why antivirus solutions fail to protect. The solution he maintains to prevent this threat is application whitelisting as it is the only way to stop the advanced persistent threat. Watch this video and learn why Richard Clarke recommends Bit9 and why he joined our Board of Directors.
Watch Video
BIT9 PARITY SUITE: MOVING BEYOND A POROUS PERIMETER
Enterprise IT security based on anti-virus (AV) software, firewalls, and "in motion" intrusion detection/intrusion prevention systems (IDS/IPS) are demonstrably ineffective. A class of cyber attacks today is more targeted, sophisticated, and stealthy. In 2011, data breaches alone cost the enterprise an average of $5.5 million. Are you prepared for such attacks? Read this whitepaper which illustrates why deploying Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.
Download Whitepaper
IOS, FACEBOOK AND DROPBOX: RECIPE FOR IP THEFT?
Mobile computing… It's the Wild West of IT security, and this untouched land presents complicated new challenges to security professionals. Recently, a security flaw was discovered for iOS smartphone users who used the mobile apps Facebook, Dropbox, and LinkedIn. It was previously thought that these apps only presented vulnerabilities to users with “jailbroken” iOS devices, but further evidence by security researcher Gareth Wright suggests otherwise. Read this blog and join in the cyber conversation today.
Watch Webcast
Feel free to contact me directly if you'd like to learn how Bit9 can help you alleviate your cyber security challenges.
Best regards,
Tony
Tony Shadrake | Director of EMEA Sales
Bit9 | The Global Leader in Advanced Threat Protection
Desk 44 (0) 7810 200958 | tshadrake@bit9.com
Share:

About Me

Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography

Blog Archive

Blogger templates