In: Business and Management

Submitted By redhat
Words 1964
Pages 8
Refer your friends to the following positions.

Division: AIM

Requirement : Ab Initio Lead/ Architect
Experience 5-10 years
Qualification B.E/B. Tech/MCA/ME/M. Tech
Candidate Requirement
Primary : Ab Initio
Secondary : Oracle 8i/9i RDBMS, PLSQL, Database Stored Procedures, Scripting skills with Unix Korn shell, Perl
Candidates should have experience in following vicinity
• System Analysis & Design
• Strong Ab Initio ETL design skills
• Involved in Ab Initio Design, Configuration experience in Ab Initio ETL,
• Data Mapping, Transformation and Loading in complex and high-volume
Environment and data processing at Terabytes level.
• Capacity of designing solutions around Ab Initio, with advanced skills in high performance and parallelism in Ab Initio
• Data warehousing implementation experience
• Knowledge of Oracle 8i/9i
• Strong analytical & problem solving skills
• Strong UNIX, korn shell scripting experience.
• Experience in leading a team of ETL developers
• Experience in co-coordinating with offshore on development/ maintenance projects Work Location Bangalore, Chennai, Pune
Requirement Cognos Lead/ Architect
Experience 5-10years
Qualification B.E/B. Tech/MCA/ME/M. Tech
• Extensive Experience & Expertise on Business Intelligence, DW
• Min. 3 years of hands on experience with Cognos toolsets, Cognos architecture. • Must have hands on experience on Cognos Report Studio , Cognos Analysis
Studio , Metrics Studio , and Cognos 8 portals
• Must have experience in building large data warehousing and BI applications.
Able to gather requirements, and the ability to lead. Design, Develop, configure and optimize Cognos reports, cubes and dashboards.
Have an understanding of logical and physical database design / modeling.
Experience with dimensional modeling is a must.
Hands on experience to working with SQL…...

Similar Documents


...graphical login (runlevel 5) for the installed system. zerombr — Partition table initialization zerombr (optional) — If zerombr is specified, and yes is its sole argument, any invalid partition tables found on disks are initialized. This destroys all of the contents of disks with invalid partition tables. This command should be used as: zerombr yes %packages — Package Selection Use the %packages command to begin a KickStart file section that lists the packages you’d like to install (this is for installations only, as package selection during upgrades is not supported). Packages can be specified by component or by individual package name. The installation program defines several components that group together related packages. See the RedHat/base/comps file on any Red Hat Linux CD-ROM for a list of 68 Part I: Red Hat Linux System and Network Administration Defined components. The components are defined by the lines that begin with a number followed by a space, and then the component name. Each package in that component is then listed, line-by-line. Individual packages lack the leading number found in front of component lines. Additionally, you may run across three other types of lines in the comps file: N Architecture-specific lines (alpha:, i386:, and sparc64:) If a package name begins with an architecture type, you need only type in the package name, not the architecture name. For example: For i386: netscape-common you need to use only the......

Words: 220815 - Pages: 884

Open Source Software

...criterion is that the open source software can not restrict other software. Proprietary software is well known to apply to common business models. In order to see if open source software is able to apply to the business model as well, we need to compare both software models. This research paper will compare the two different business models with three important criteria’s. These criteria’s are the important for any decision maker in a company. The cost of a new application or operation system (OS) is a very important factor to consider. A recent MS Windows 7 licenses cost approximately $200 (Microsoft, 2010). The cost of a Linux distribution is $0. You can download a recent OS from different distributers like SuSE, Ubuntu, Debian or RedHat, just to mention a few. Another source to save money is the hardware requirements for each OS. A recent Linux OS requires much lower computer specifications, such as memory and processor, compared to the newest Windows 7 OS. For example, the Ubuntu OS requires only a 700 MHz processor and 386 MB of memory (RAM) (Ubnutu, 2010). Windows 7 requires a minimum of 1 GHz processor and 1GB of RAM (Microsoft, 2010). These are just a few example on how open source could save money, but to understand how businesses are able to save money we need to understand the total cost of ownership (TCO). How is TCO defined? describes TCO on their website in a very understandable way, “The total price in money, time, and resources of owning and......

Words: 2520 - Pages: 11


...state as well as the country in which a given business is registered. Domain-authenticated SSL certificates on the other hand only vouch for a given domain. Authenticating a 2 way Client/Server connection using an SSL certificate Redhat (2011) indicated that for the Authentication of a 2 way Client/Server connection using an SSL certificate , a client would digitally have to sign a randomly generated data piece and then send the digitally signed data together with the certificate across the network. The server then authenticates the identity of the user on the basis of the signed data and the certificate. [pic] Authenticating a 2 way Client/Server connection using an SSL certificate (Redhat ,2011) References GeoCerts (2011). Understanding SSL Certificate Authentication Onyszko,T (2004). Secure Socket Layer Patel,DR (2008). Information Security: Theory And Practice. PHI Learning Pvt. Ltd. PCI Security Standards (2008). Payment Card Industry (PCI) Data Security Standard. Redhat (2011)Product Documentation: 1.3. Certificates and......

Words: 756 - Pages: 4

Linux Research Paper

...included a sample configuration of a Linux DHCP server and have included explanations of the sample. According to Harrison (“Quick how to:,” n.d.), You can define your server configuration parameters in the dhcpd.conf file which may be located in the /etc the /etc/dhcpd or /etc/dhcp3 directories depending on your version of Linux. Note: The skeleton dhcp.conf file that is created when you install the package may vary in its completeness. In Ubuntu / Debian, the skeleton dhcpd.conf file is extensive with most of the commands deactivated with a # sign at the beginning. In Fedora / RedHat / CentOS an extensive sample is also created with activated commands. It is found in the following location which you can always use as a guide. /usr/share/doc/dhcp*/dhcpd.conf.sample Also, according to Harrison (“Quick how to:,” n.d.), Note: The dhcpd.conf configuration file formats in Debian / Ubuntu and Redhat / Fedora are identical. Here is a quick explanation of the dhcpd.conf file: Most importantly, there must be a subnet section for each interface on your Linux box. ddns-update-style interim ignore client-updates subnet netmask { # The range of IP addresses the server # will issue to DHCP enabled PC clients # booting up on the network range; # Set the amount of time in seconds that # a client may keep the IP address default-lease-time 86400; max-lease-time 86400; # Set the default......

Words: 1059 - Pages: 5


...LINUX-6 Curriculum chnoworld ive Development | Training | Consultancy Rh124 Red Hat System Administration I Red Hat System Administration I (RH124) is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. Focused on administration tasks that will be encountered in the workplace, this course will actively engage students in task-focused activities, labbased knowledge checks, and facilitative discussions to ensure maximum skill transfer and retention. In addition, GUI-based tools will be featured to build on the students' existing technical knowledge, while key command line concepts will be introduced to provide a foundation for students planning to become fulltime Linux system administrators. By the end of the five-day course, students will be able to perform installation, establish network connectivity, manage physical storage, and perform basic security administration. LINUX-6 Course Outline Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Unit 3: Get Help in a Graphical Environment Objective: Access documentation, both locally and online Unit 4: Configure Local Services Objective: Configure the date and time and configure a printer Unit 5: Manage Physical Storage I Objective: Understand basic disk concepts and manage......

Words: 1463 - Pages: 6


...10/28/2013 LINUX James Tucker Unit 4 Exercise Ch 14 p. 582, Ex 1-5 1. Which commands can you use from the command line to send a file to the default printer? Redhat / Fedora 12 Answer: lp and lpr without arguments send their standard input to the printer. 2. Which command would you give to cancel all print jobs on the system? Executed as root, either lprn - or cancel –a removes all jobs from the print queues. 3. Which commands list your outstanding print jobs? lpc status shows a list of the print queues lpq shows what is in the default print queue lpq -Psomeprinter shows what is in a specific print queue 4. What is the purpose of sharing a Linux printer using Samba? Sharing a Linux printer using Samba allows windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? CUPS supports IPP, LPD/LPR, HTTP, SMB, and JetDirect (socket) protocols. Ch 10 p. 403, Ex 1 1. Describe the similarities and differences between these utilities: a. scp and ftp – scp is the "Secure Copy" program and it works just like the "cp", or "Copy" program, only it works through via the Secure Shell. ftp is the "File Transfer Protocol" and has nothing to do with security. Usually operates as its own interface with its own set of user sub-commands. Both are used to transfer files from one host to another via network connection. b. ssh and telnet – Both Telnet and SSH...

Words: 382 - Pages: 2

Cmis 102 Homework 2

...choice (OSChoice), the monitor choice (MonitorChoice), and the case choice (CaseChoice). After the user has made all of the required choices, the program will determine the appropriate cost of that option: OSCost, MonitorCost, and CaseCost. Output: The required output for the program will be the total cost (TotalCost) of the state of the art gaming computer. The program will then determine the total cost of the state of the art gaming computer by using the following computation: TotalCost = BasePrice+OSCost+MonitorCost+CaseCost. Variables: BasePrice // The cost of the computer prior to the user deciding on the three options OSChoice // The operating system selected by the user Win7 // Windows 7 Home Premium Win8 // Windows 8.1 RedHat // Red Hat Linux 9.0 Personal MonitorChoice // The monitor selected by the user Asus // Asus 23.6” LED ViewSonic // ViewSonic 20” LED Acer // Acer 23” LCD CaseChoice // The case selected by the user Thermal // Thermaltake Gaming Case Rosewill // Rosewill Black Gaming Case NZXT // NZXT Guardian Gaming Case OSCost // The cost of the selected operating system MonitorCost // The cost of the selected monitor CaseCost // The cost of the selected case TotalCost // The total cost of the gaming system Design Input the base price of the computer Calculate user selected options to add the additional costs Calculate the base price of the computer with the total of the user selected additional costs Display the results of......

Words: 735 - Pages: 3

Unix/Linux Comparison Matrix

...1. BSD/OS 2. AIX 3. Solaris 2. Name three versions of Linux 1. Canonical's Ubuntu 2. Novell's openSUSE 3. Red Hat's Fedora 3. Describe 3 major differences between Unix and Linux 1. Cost- Linux is free and Different flavors of UNIX have different cost structures according to vendors. 2. Linux is an example of Open Source software and UNIX is a closed source OS. 3. Text mode interface: Linux- BASH (Bourne Again SHell) is the Linux default shell. It can support multiple command interpreters. UNIX- Originally the Bourne Shell; now it's compatible with many others including BASH, Korn & C. 4. Which of the following is not a UNIX or Linux variant a. SunOS b. RedHat c. DOS d. HP-UX e. Debian 5. Use the command to change directory locations. a. cd b. rm c. mkdir d. cut 6. Use the command to delete a directory. a. delete_dir b. mkdir c. rmdir d. cat 7. Which of the following are text editors? (Choose all that apply.) a. vi b. emacs c. ls d. cat 8. The command creates a directory named winchester in the root directory. a. mkdir /winchester b. mkdir ../Winchester c. mkdir \winchester d. md /Winchester 9. The command allows you to change directory locations to a child directory named child1. a. mkdir ƒ......

Words: 378 - Pages: 2

Proposal Report

...Project Tasks Status Recent Updates on Red Hat Keeping in pace with the current scenario is also important and would be a valuable point to present in our Project presentation. Acquired Ansible Inc.   Oct 16th, 2015 Red Hat acquires Ansible Inc. which is an IT automation company. It helps companies organize and automate cloud based applications. Red Hat made this deal with an expectation this will help customers deploy and manage cloud and other software’s. Partnered with Citrix Oct 26th, 2015 Citrix, has partnered with Red Hat on new product integrations for building OpenStack Clouds. This joint venture will enable customers to assemble their Cloud infrastructure using components from Citrix and Redhat for the first time. Citrix unveils NetScaler which is an application delivery controller with Red Hat Enterprise Linux OpenStack Platform....

Words: 429 - Pages: 2


...within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Blum, R. (2008). Linux® command line and shell scripting bible. Indianapolis, IN: Wiley. Love, P., Merlino, J., Zimmerman, C., Reed, J. C., & Weinstein, P. (2005). Beginning Unix®. Indianapolis, IN: Wiley. Software RedHat Linux 5 (Virtual Desktop) Article References Ahmed, M. F., & Gokhale, S. (2009). Reliable operating systems: Overview and techniques. IETE Technical Review, 26(6), 461–469. Anthes, G. (2009, June 20-July 27). UNIX turns 40. Computerworld, 43(24), 16. Berlot, M., & Sang, J. (2008, January). Dealing with process overload attacks in UNIX. Information Security Journal: A Global Perspective, 17(1), 33–44. Cantrill, B., & Bonwick, J. (2008, November). Real-world concurrency. Communications of the ACM, 51(11), 34–39. Hendler, J., Shadbolt, N., Hall, W., Berners-Lee, T., & Weitzner, D. (2008, July). Web science: An interdisciplinary approach to understanding the web. Communications of the ACM, 51(7), 60–69. Liu, S.,......

Words: 1560 - Pages: 7

Cis 206 Slingshot Academy / Tutorialrank.Com

...the command prompt will appear as [root@redhat root]#. Take a screen shot of this portion. For a demonstration on how to access the virtual lab Red Hat Linux command prompt and starting the vi editor, view the accessing vi editor video. STEP 3: Using the ls command In this step, you use the ls command to find information about the file systems on a RedHat Linux system. This step is activity 4-5 of your text. Refer to page 159 of your eBook for step-by-step instructions. Note: skip steps 1-4. These steps are not required, since you have a virtual lab platform. Begin with step 5 and take a screen shot of this portion. For a demonstration on how to perform this step, view the week 5 step 3 video. STEP 4: Creating Directories In this step, you use the mkdir command to create directories in a RedHat Linux directory structure. This step is activity 4-11 of your text. Refer to page 169 of your eBook for step-by-step instructions. Note: skip steps 1-4. These steps are not required, since you have a virtual lab platform. In step 5, type cd /home and press enter, this will place you in the home directory and your command prompt should now read[root@redhat root home]#. Begin with step 6 and take a screen shot of the different commands as you complete them. For a demonstration on how to perform this step, view the week 5 step 4 video. STEP 5: Removing Directories (10 points) In this step, you use the rmdir command to create directories in a RedHat Linux directory structure. This......

Words: 3261 - Pages: 14

Sec280-Week1, but tools such as nmap and SuperScan must be reconfigured to increase the delay between sending SYN packets” (Chris, 2004). In addition, the publicly accessible servers must be kept in a (Demilitarized) DMZ zone where very few services can be accessed by the general public. This means that users can get into the network only by using a secure VPN connection. For the networks that mainly use IIS webservers (Microsoft), Microsoft provides a tool called URLScan, which filters all URLs that are known to attack IIS web servers. The ISP allows limited ICMP messages into the company's network so that ping sweep attacks can be contained. There are also open source tools that the company can take advantage of their services. According to RedHat, article Securing your system with Snort, Snort is a powerful network-intrusion prevention and detection system. Snort works by utilizing a rule-based language that combines the benefits of signature inspection, protocol inspection, and anomaly-based inspection. You can configure Snort to run in a few different modes Sniffer mode, Packet Logger mode, Network Intrusion Detection (NIDS) mode. It monitors and analyzes network traffic in real time and sends and logs alerts for suspicious packets. As well, ping sweep detectable tools should be configured in the firewall. For example, ippl is an Internet protocol logger that logs packets that enter the network and logs them accordingly. If there is a threat of attack, ICMP packets......

Words: 1279 - Pages: 6

Netw 240 Course Project: Operating System Proposal

...Below Link to Download Tutorial For More Information Visit Our Website ( ) Email us At: or Course Project: Operating System Proposal Objectives Back to Top Your company is currently investigating the use of Linux. Your manager has asked you to research the feasibility of using Linux in both the server and workstation environments (from the operating system point of view). Your manager would like to see an 8- to 10-page paper that 1. compares and contrasts Linux server and Linux workstation OS products between three separate and distinct Linux distros (i.e., RedHat, SuSe, Ubuntu ); and 2. addresses the specific issues of total cost of ownership, training, support, performance, reliability, and application availability. Guidelines Back to Top The following is a list of guidelines for your Course Project, due in Week 6. • The Course Project is worth 150 points and is comprised of the following deliverables. o Week 3: Outline (35 points) o Week 6: Paper (115 points) • The paper shall only address business requirements and concerns, not personal or home use of Linux. • The paper shall address three different Linux vendors, along with each vendor’s specific server and workstation product. • Each comparison or contrast item should include each of the three specific vendors—for both server......

Words: 640 - Pages: 3

Secure Vpn

...Installation Guidelines GRUB/LILO GRUB is the boot loader of choice for RedHat installations; however LILO may always be used in the case of most flavors of LINUX. GRUB/LILO can receive many different kernel level commands and it poses a major security risk if an attacker is able to compromise the kernel. In response you can make sure that only authorized users are able to perform those commands by password protecting during the installation process. If using GRUB, the password is by default stored as clear text, and so you will want modify the /etc/grub.conf file to store the password in an MD5 checksum. $ /sbin/grub–md5–crypt Password: (at the prompt enter the GRUB password you created at installation and press enter) $ #%t%661GFGftffgctTFTDd (This is the MD5 hash) edit the grub.conf file and replace the clear text password with the MD5 Hash. You must use the –MD5 option or the password will be stored as the MD5 Hash and not the encrypted password. Password – md5 $1$m0tLR/ $#%t%661GFGftffgctTFTDd Partitioning Partitioning correctly will help to mitigate against one specific type of denial of service. For example and attack designed to fill up a /tmp or spool directory. If your files are on the same partition as the directory under attack, your system could be rendered unusable. One should use a partition strategy where those directories that are most likely to be filled by an attacker. Typically this is /var and /home . If you are using a server for ftp or e–mail, you...

Words: 5898 - Pages: 24

Linux Redhat Virtualization

...Red Hat Linux Virtualization for Desktops By: Dorein Pfeil Instructor: Mike Mostafavi School: University of Phoenix Class: POS/355 One popular protocol for Linux Virtual desktop is SPICE it allows client and server to interact with virtual management tools and other standalone client applications. RHEV now allows management applications to run on Microsoft Windows server R2. V2V tools convert from ESX, RHEL Xen, and RHEL KVM to RHEV, the underling technology involved for V2V is called libguestfs, which is a library that binds programming languages to access Virtual Management disk images and interact with them in a variety of ways. VM’s can also work while the system is powered down. The draw-backs to using this system is that you must first obtain a license to use this feature, and it must be purchased before it can be used. Virtualization is becoming a key feature in the technology race for technology in the Linux system vendors, this technology provides a great advantage by letting the user aquire the ability to run powerful key features such as like image/storage management, clustering, system schedulars, power saver, ETC. By understanding what VR technology is capable of many companies are becoming more enthralled with what this technology can actually do, mainly in the world of medical science this technology was first discovered in its infancy as a way to seen through into the human tissue and muscle right to the bones of a person,......

Words: 315 - Pages: 2