Saturday, 29 March 2014

LinkedIn cannot replace professional recruiters: Joseph Devasia



68% organisations avail services of professional recruiters to make the hiring process effective. 

In the age of social media, the charm of a professional recruiter still exists, simply for their ability to attract, assess and hire the best talent. As the war for talent intensifies, organisations are forced to use professional recruiters to assess and hire the best talent. And, nearly 68 per cent organisations are availing the services of assessment centers to make the hiring process more effective and flawless, revealed a study conducted by TimesJobs.com. This is because professional recruiters and assessors are better equipped to judge a candidate's suitability for the job, claimed 45 per cent of respondent companies. 

Joseph Devasia, managing partner, Antal International Network highlights five reasons why corporate need professional recruiters to source the best talent: 

LinkedIn cannot replace recruiters: You may often wonder why you need a recruiter when you have social media tools like LinkedIn. Here is a warning - you may think so at your own risk. LinkedIn cannot replace recruiters. It is a great aid in identifying people, who may be right for the opportunities we are hiring for. But there is so much more to recruitment than finding people. Placement, the end goal of recruitment begins when a recruiter calls a prospective candidate and sells the opportunity and interests them enough to say yes. From there on, through conversations after conversations, recruiter forges a relationship with the candidate to identify the reasons for leaving, the reasons for staying, validating if this is the right opportunity. 

Save on time & money: Most organisations assume that external recruiters are overpriced; and ask for exuberant fees; they need to change this assumption. If you calculate, organisations end up spending more money as well as time in advertising, marketing, interviewing, screening candidates, etc. Specialist recruiters save the company a great deal of time and effort as they do all the tedious work and bring only the best out of the entire lot after exhaustive screening and evaluation. 

Recruiters have access to the best talent: Recruiters have a very well connected network; they create their pipeline which includes only the best talent available in the market. Individuals are not always looking for jobs actively and hence, they do not usually pay much attention to the job adverts posted by corporates. As a result it is extremely painstaking to reach the passive talents who are already working for your competitor. However, for a trained recruiter this is their everyday job - to headhunt and build their talent pipeline. 

Recruiters have access to the best talent: Recruiters have a very well connected network; they create their pipeline which includes only the best talent available in the market. Individuals are not always looking for jobs actively and hence, they do not usually pay much attention to the job adverts posted by corporates. As a result it is extremely painstaking to reach the passive talents who are already working for your competitor. However, for a trained recruiter this is their everyday job - to headhunt and build their talent pipeline. 

Recruiters are aware of the industry pulse: Recruiters have experience and exposure to many companies and candidates, they are aware of the pulse of the industry and moreover they avoid mistakes in the hiring process by providing an in depth background check of a candidate or by following up on references, which in turn saves your time and capital.

10 emerging technologies for Big Data



1. Column-oriented databases- Column-oriented databases store data with a focus on columns, instead of rows, allowing for huge data compression and very fast query times.

2. Schema-less databases, or NoSQL databases- Key-value stores and document stores are some examples of schema-less databases which focus on the storage and retrieval of large volumes of unstructured, semi-structured, or even structured data.

3. MapReduce- This is a programming paradigm that allows for massive job execution scalability against thousands of servers or clusters of servers.

4. Hadoop- Hadoop is by far the most popular implementation of MapReduce, being an entirely open source platform for handling Big Data.

5. Hive- Hive- is a "SQL-like" bridge that allows conventional BI applications to run queries against a Hadoop cluster. It is a higher-level abstraction of the Hadoop framework that allows anyone to make queries against data stored in a Hadoop cluster just as if they were manipulating a conventional data store.

6. PIG- PIG is another bridge that tries to bring Hadoop closer to the realities of developers and business users, similar to Hive.

7. WibiData- WibiData is a combination of web analytics with Hadoop. It allows web sites to better explore and work with their user data, enabling real-time responses to user behavior, such as serving personalized content, recommendations and decisions.

8. PLATFORA- PLATFORA is a platform that turns user's queries into Hadoop jobs automatically, thus creating an abstraction layer that anyone can exploit to simplify and organize datasets stored in Hadoop.

9. Storage Technologies- As the data volumes grow, so does the need for efficient and effective storage techniques. The main evolutions in this space are related to data compression and storage virtualization.

10. SkyTree- SkyTree is a high-performance machine learning and data analytics platform focused specifically on handling Big Data.

Android apps infected with cyptocurrency mining malware


Android apps infected with cyptocurrency mining malware
Security researchers have discovered new malware on Android devices that mines for cryptocurrencies like Bitcoin.
The ANDROIDOS_KAGECOIN.HBT malware has been bundled with some popular apps in the Google Play store, some of which have been downloaded by millions of users, according to TrendMicro.
CPU mining code from a legitimate Android mining app, based on the popular cpuminer software, was injected into the apps to make them earn money for cybercriminals.

Digging deep

The malware mines for Bitcoin, Litecoin, and Dogecoin. Since mining uses a lot of battery power, the code only kicks in when the device is being charged, cleverly disguising the infection from users.
However, users may be alerted by the fact that their smartphone takes forever to charge or seems to be constantly hot.
The news follows a recent report on the Linux.Darlloz worm, which has also begun mining for cryptocurrencies on Internet of Things devices.
While mining on mobile devices is slow and not terribly profitable, these malware show that cybercriminals are willing to try their hand at anything to get money. Thousands of devices are believed to be infected.
Google has been informed of the latest Android threat.

DARPA calls for advanced big data ideas


DARPA calls for advanced big data ideas
The US military research agency DARPA has decided that cloud technology will be the next biggest thing to hit since the bunker-busting bomb.
According to V3, DARPA director Arati Prabhakar told a briefing on emerging threats with the House Armed Services Committee's Subcommittee on Intelligence that it is looking to come up with some advanced big data ideas.
She said that DARPA is creating a new set of cyber security capabilities that will ensure that networked information is trustworthy.
This is important for businesses because DARPA creates complex and sophisticated technologies for military departments, which are eventually rolled out to the public.
Prabhakar said that the tools DARPA are looking for will help it get a handle on the explosion of data. Instead of drowning in that data, it can actually get deep insights out of all of that information out there, she said.

Inflexible systems

The US's existing methods are not robust enough and the classic approach to complex military systems are so costly and inflexible that they are not going to serve the country's needs for the next generation, she said.
The data tools DARPA is developing will be used by intelligence agencies, such as the NSA, to improve the efficiency of mass-surveillance operations such as PRISM when sifting through data. But they also could be used to co-ordinate information from the battlefield from long distances away.

10 Gmail Hacks to Help You Master Your Inbox


Gmail_hacks
Feed-twFeed-fb
Gmail has quite a few tricks up its sleeve.
The popular email service, which will celebrate its 10th anniversary on April 1, can do more than just send messages. There are shortcuts, customizable options and quick hacks that all users can optimize, as long as they know how to find them.
See also: 10 Simple Google Calendar Tips and Tricks to Boost Your Productivity
We've rounded up 10 tips and tricks you can use to become even more of a Gmail genius.

1. Keyboard shortcuts

keyboard

Image: Flickr, electricnude


Have you ever wished you could press a few quick keys to do all of your Gmail actions? The email service has you covered. Here's a detailed list of keyboard shortcuts you can enable, from selecting and deleting contacts to opening your drafts.

'Industrial Internet Consortium' announced by tech giants



A group of major technology companies, including AT&T, Cisco, GE, IBM and Intel have revealed the formation of a new industry group: the Industrial Internet Consortium (IIC).
An open membership group, the IIC will reportedly focus on breaking down the barriers of technology silos to support access to big data, reports MBTMag. The group, which is not-for-profit, hopes to take the lead in establishing interoperability across the industry.
As to how it will encourage innovation, the IIC has said that it will deliver best practises, reference architectures, case studies and standards to ease new tech deployment. It also aims to facilitate an open forum for firms to exchange ideas and insights and build confidence around innovative approaches to security.

Fitting the pieces together

Founding members AT&T, Cisco, GE, IBM and Intel will all hold permanent seats on a committee along with four extra elected members. The committee hopes to provide leadership to businesses looking to capitalise on the IIC.
The IIC is open to any business, organisation or entity with an interest in the industrial internet and improving critical relationships with leaders in technology, the Government and academia, the website states.
"As leaders we have come together to drive the ecosystem and market development of Industrial Internet applications and ensure organizations around the world can more easily create better services, access better data, and most importantly, seamlessly connect all the pieces together," said Bill Ruh, vice president, GE Global Software.