Posted on
Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

Feature Articles

Certification Feature
Reality Bytes: Preparing for Performance Exams
Kellye Whitney
Times are changing, and not just in regard to technology. Certification exams also are evolving. Performance-based tests that look not at whether a candidate can memorize and recall facts, but how well the person can replicate actual tasks in a real-world environment, are replacing traditional exams.


Job Roles Feature
Applications Developers: The Artists of Technology
Brian Summerfield
To the uninitiated, information technology might seem to be a tedious enterprise, virtually devoid of any artistry. While this view might not be too far off for certain sectors of IT, it’s certainly unjustified where applications developers are concerned.


Techniques Feature
Rules & Regulations: The Impact of Compliance on IT
Uday Ali Pabrai
The Wall Street Journal on Dec. 9 reported that Sarbanes-Oxley and other rules aimed at fighting fraud are creating a market for software. Microsoft, Computer Associates, Symantec and many other vendors have solutions specifically targeted at the regulatory compliance market.




Tech Careers
Landing a Job in Today’s Market
Katherine Spencer Lee
If you watch the latest news reports, it’s difficult to know what to make of the current job market. One day you might hear of layoffs, while the next day’s reports indicate improving employment numbers. All this uncertainty makes determining your next career move challenging.


Consultant’s Corner
Keeping Your Clients In the Know
David Garrett
Ah, the network. I don’t mean servers and routers, but people. If you can’t afford to advertise, then your network—your expanding circle of colleagues, clients and prospects—is your best route to new business. The question, of course, is how to work it and how to make it grow.


Virtual Village
The Slow Season
March is kind of a boring month. Like August, it’s practically without any holidays (with the notable exception of St. Patrick’s Day, our binge fest in the ides of March), but August has great weather going for it. Much of your spare time during this month is probably spent indoors, where you sit around and wonder what in the world you’re going to do-if you’re not a college basketball fan, that is.


Data Stream
Data Stream News & Notes for Certified Professionals


Brian Summerfield, Web Editor
If you’ve been closely following the news in the past few years about conflicts in regions such as the Middle East, the Balkans, the Caucasus and Central Africa, you might have noticed the regularity of phrases such as “terrorism,” “guerrilla tactics” and “asymmetrical warfare.” Simply put, these refer to the strategies weaker powers adopt against stronger ones.




Cingular Wireless: Developing IT Expertise
Cari McLean
With more than 52 million subscribers nationwide, Cingular Wireless is one of the largest wireless service providers in the United States. And of course, Cingular’s seasoned group of IT professionals plays an integral role in supporting its large digital voice and data network, expansive group of customers, and various products and data services that include ring tones and graphics, games, interactive messaging, short messaging and multimedia messaging.


Inside Certification
HP: The Benefits of Continuous Learning
Linda Musthaler
This month, the Hewlett-Packard Certified Professional Program in the Americas region will launch a new Continuous Learning initiative. Similar to skill refreshment programs in other professional fields such as nursing and accounting, the HP Continuous Learning Initiative encourages HP Certified Professionals to update their knowledge and skills and to stay current in the certification program.


Specialty Certification
Computer Hacking Forensics Investigators: Reducing Security Breaches
Jay Bavisi
Computer-hacking forensics investigation has become a very popular practice within the corporate world. Although most knowledge workers probably equate computer-hacking forensics investigation with law enforcement, the military or the security community, very few understand the deep, positive impact computer-hacking forensics investigators can bring to the organizations they represent.




Editor’s Letter
A Tale of Three Studies
Tim Sosbe

Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone


Posted in Archive|


Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>