tag:blogger.com,1999:blog-35231255779645454102024-03-13T08:04:58.770-07:00Asp.net software company in indiaiFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.comBlogger27125tag:blogger.com,1999:blog-3523125577964545410.post-43557615268240992032017-08-09T02:52:00.003-07:002017-08-09T02:52:52.409-07:00Healthcare IT solution provider in india<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/healthcare-custom-software-development" target="_blank"><img alt="Healthcare Custom Software Development |iFour Technolab - Software Outsourcing Company India" border="0" data-original-height="307" data-original-width="930" src="https://3.bp.blogspot.com/-nu_R6w3bgsQ/WYrbGOneKbI/AAAAAAAAALs/Ka2lQwDerZAaWufdBbOmx4lQuoLoMWBigCLcBGAs/s1600/healthcare-app-development-banner.jpg" title="Healthcare Custom Software Development |iFour Technolab - Software Outsourcing Company India" width="570" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Information and data management is key in <a href="https://en.wikipedia.org/wiki/Health_care" target="_blank">Healthcare domain</a> as its services heavily depend on information accuracy, availability and accessibility for patient treatment. There are plenty of attributes that software companies should consider for <a href="http://www.ifourtechnolab.com/healthcare-custom-software-development" target="_blank">developing information system for Healthcare companies</a>. </div>
<div style="text-align: justify;">
Following are some of those attributes</div>
<ul style="text-align: justify;">
<li>Usability</li>
<li>System performance</li>
<li>Accessibility</li>
<li>Availability of system</li>
<li>Healthcare standard compliance like HIPAA</li>
<li>Security and safety of data</li>
</ul>
<div style="text-align: justify;">
Considering all these attributes team of iFour Technolab Pvt. Ltd.a leading <a href="http://www.ifourtechnolab.com/" target="_blank">.net software development company india</a> is providing content management system (CMS) for organizations in <a href="https://www.healthcare.gov/" target="_blank">healthcare domain</a> which helps them in managing all the resources efficiently. Integrated content management solution helps managing financial as well as operation information effectively. </div>
<div style="text-align: justify;">
<br />
It is having user interface simple enough to be operated by anyone. While building this system usability of non-technical users is firmly considered. A user interfacing with system first time would be comfortable enough to understand each and every functionalities and revert back to any notifications he gets. It is having different modules for doctors, patients, hospital administration and vendors. All the modules are having specified rights to manage the database of the system. Any user is given access to CMS inside as well as outside of the premises. Company also provides cloud solutions and firmly believes in having mobile access of system with reliable security. According to client’s need, company provides customized solution with greater extent so that the scope of CMS doesn’t remain limited.</div>
<div style="text-align: justify;">
<br />
iFour Technolab Pvt. Ltd. Is providing healthcare solutions to Indian as well as foreigner hospitals and healthcare organizations. Since a long company has been one of the leading IT outsourcing company in India which provides solutions not only to healthcare domain but also education, hospitality, etc. domains. Company provides strong and sustainable solutions with great security in terms of software solutions in limited budget.</div>
<div style="text-align: justify;">
<a href="http://www.ifourtechnolab.com/healthcare-custom-software-development" target="_blank"><br /></a></div>
<div style="text-align: justify;">
<a href="http://www.ifourtechnolab.com/healthcare-custom-software-development" target="_blank">.net Development for Healthcare Industries.</a></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-10800853682423511292017-04-19T23:06:00.002-07:002017-04-26T04:28:24.156-07:00Management involvement in risk assessment<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<div class="separator" style="clear: both;">
<a href="https://2.bp.blogspot.com/-A5PRs4-9IyA/WQCB1jTLmTI/AAAAAAAAALE/CyFrJBUXWVMvVykkbyWfse4xvCz-lsD_wCLcB/s1600/Management%2Binvolvement%2Bin%2Brisk%2Bassessment.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://2.bp.blogspot.com/-A5PRs4-9IyA/WQCB1jTLmTI/AAAAAAAAALE/CyFrJBUXWVMvVykkbyWfse4xvCz-lsD_wCLcB/s1600/Management%2Binvolvement%2Bin%2Brisk%2Bassessment.jpg" width="570" /></a></div>
<br />
Abolishing negative impact on any organization and necessity for sound basis in decision making are the fundamental reasons <a href="http://www.ifourtechnolab.com/" target="_blank">software companies in India</a> implement a risk management process for their IT systems. Risk management is a management responsibility. <br />
<br />
This article describes the key roles of the personnel who should support and participate in the risk management process.</div>
<div style="text-align: justify;">
<b>Senior Management </b><br />
Senior management, under the standard of due caution and crucial responsibility for mission accomplishment, must make sure that the necessary resources are effectively applied to develop the competences needed to complete the mission. They must also assess and fit in results of the risk assessment actions into the decision making process. An actual risk management program that assesses and alleviates IT-related mission risks requires the support and contribution of senior management.<br />
<br />
<b>Chief Information Officer (CIO). </b><br />
The CIO is accountable for the agency’s IT planning, accounting, and performance including its information security modules. Decisions made in these areas should be grounded on an effective risk management program.<br />
<br />
<b>System and Information Owners. </b><br />
The system and information owners are accountable for ensuring that proper controls are in place to address integrity, confidentiality, and availability of the IT systems and data they possess. Typically the system and information owners are liable for alterations to their IT systems. Thus, they usually have to support and sign off on changes to their IT systems (e.g., system enhancement, key changes to the software and hardware). The system and information owners must therefore realise their role in the risk management process and completely support this process.<br />
<br />
<b>Business and Functional Managers.</b> </div>
<div style="text-align: justify;">
The managers accountable for business operations and IT procurement process must take an active role in the risk management process. These managers are the folks with the authority and responsibility for making the trade-off decisions vital to mission accomplishment. Their involvement in the risk management process empowers the achievement of proper security for the IT systems, which, if managed appropriately, will deliver mission effectiveness with a minimal expenditure of resources. </div>
<div style="text-align: justify;">
<b>ISSO</b> <br />
IT security software package managers and computer security officers are in charge for their organizations’ security programs, including risk management. Consequently, they play a prominent role in introducing an appropriate, structured methodology to aid identify, evaluate, and minimize risks to the IT systems that support their organizations’ missions. ISSOs also perform as major consultants in support of senior management to make sure that this activity takes place on a continuing basis. </div>
<div style="text-align: justify;">
<b>IT Security Practitioners</b><br />
IT security practitioners (e.g., network, system, application, and database administrators; computer consultants; security analysts; security consultants) are in authority for proper implementation of security necessities in their IT systems. As changes happen in the existing IT system environment (e.g., growth in network connectivity, modifications to the existing infrastructure and organizational policies, introduction of innovative technologies), the IT security practitioners must support or utilize the risk management process to recognize and assess new probable risks and implement new security controls as required to safeguard their IT systems. </div>
<div style="text-align: justify;">
<b>Security Awareness Trainers (Security/Subject Matter Experts)</b><br />
The organization’s personnel are the operators of the IT systems. Use of the IT systems and data according to an organization’s policies, guidelines, and rules of behaviour is serious to mitigating risk and protecting the organization’s IT resources. To reduce risk to the IT systems, it is essential that system and application users be delivered with security awareness training. Therefore, the IT security trainers or security/subject matter professionals must know the risk management process so that they can develop appropriate training materials and add in risk assessment into training programs to educate the end users.<br />
<br />
<a href="http://www.ifourtechnolab.com/" target="_blank">Software companies in India</a> need an extensive management as well as personnel support in order to execute risk management program with sheer success resulting into abolishment of uncertainty and risks along with suitable backup plans.</div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-73552550754991453952017-03-10T02:44:00.000-08:002017-04-26T04:31:34.117-07:00ITIL Service Transition<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" target="_blank"><img alt="http://www.ifourtechnolab.com/" border="0" src="https://3.bp.blogspot.com/-xaSOc7-9KMo/WQCElfC143I/AAAAAAAAALQ/tDt6kUsSaXwYKCRX7Ns2RQdjxu1QJrUwwCLcB/s1600/itil-service-transition.jpg" width="570" /></a></div>
<br />
<b>Service Transition </b><br />
The ITIL Service Transition helps to plan and deploy IT services. Service Transition ensures that the changes made to IT services and Service Management are carried out in a synchronous way.<br />
<b>The Service Transition includes different phases, namely :</b></div>
<ul style="text-align: justify;">
<li>Service Asset &Configuration Management </li>
<li>Change Management</li>
<li>Change evaluation</li>
<li>Transition planning and support</li>
<li>Release & Deployment Management</li>
<li>Knowledge Management</li>
<li>Service validation and testing</li>
</ul>
<div style="text-align: justify;">
<br />
<b>SERVICE ASSET AND CONFIGURATION MANAGEMENT<br />The objective of the Service Asset and Configuration Management includes :</b></div>
<ul style="text-align: justify;">
<li>Identify, Record and provide accurate information of the Configuration Items (CI = IT components)</li>
<li>Provide the Logical Model for IT infrastructure correlating the IT services & their components </li>
<li>Protect Integrity of the CIs</li>
<li>To create, implement and maintain Configuration Management System </li>
<li>Manage Service Assets</li>
<li>Perform regular audits / status accounting activities for all the CIs</li>
</ul>
<div style="text-align: justify;">
<br />
<b>CHANGE MANAGEMENT</b><br />
<b>The objective of the Change Management includes :</b></div>
<ul style="text-align: justify;">
<li>Study the adverse Impact of change & minimize it</li>
<li>Create & maintain a Change Management process</li>
<li>Prevent Unauthorized changes</li>
<li>Prepare Change Management Plans </li>
<li>Post Implementation Reviews of Changes</li>
<li>Maintain a record of all changes</li>
</ul>
<div style="text-align: justify;">
<b>Activities :</b></div>
<ul style="text-align: justify;">
<li>Record RFC</li>
<li>Review RFC</li>
<li>Assess & Evaluate Change – 7 R s of Change</li>
<li>Authorize Change</li>
<li>Issue Change Plan (to R& D Team)</li>
<li>Support/Coordinate Change Implementation</li>
<li>Post Change Review</li>
</ul>
<div style="text-align: justify;">
<b><br />CHANGE EVALUATION</b><br />
To assess major Changes, like the introduction of a new IT service or a change to an existing service, before those Changes are allowed to proceed to the next phase in their life cycle.<br />
<br />
<b>Change Evaluation prior to Planning</b></div>
<ul style="text-align: justify;">
<li>To assess a proposed major Change before authorizing the Change planning phase.</li>
</ul>
<div style="text-align: justify;">
<b>Change Evaluation prior to Build</b></div>
<ul style="text-align: justify;">
<li>To assess a proposed major Change before authorizing the Change build phase.</li>
</ul>
<div style="text-align: justify;">
<b>Change Evaluation prior to Deployment</b></div>
<ul style="text-align: justify;">
<li>To assess a proposed major Change before authorizing the Change deployment phase.</li>
</ul>
<div style="text-align: justify;">
<b>Change Evaluation after Deployment</b></div>
<ul style="text-align: justify;">
<li>To assess a proposed major Change after authorizing the Change deployment phase.</li>
</ul>
<div style="text-align: justify;">
The next process of the Service Transition is<br />
<br />
<b>RELEASE AND DEPLOYMENT MANAGEMENT</b></div>
<ul style="text-align: justify;">
<li>The objective of the Release and Deployment Management includes :</li>
<li>Implementing the authorized changes as per Change Management plan</li>
<li>Plan, Design, Build, Test & Install Hardware & Software components</li>
<li>Skills & Knowledge Transfer to enable<br />-- Customers & users the optimum use of service<br />-- Operations & support staff to run & support the service</li>
</ul>
<div style="text-align: justify;">
<b>SERVICE VALIDATION AND TESTING</b><br />
<b>The objective of the Service Validation and testing includes :</b><br />
Service Validation and Testing ensure that the deployed releases and the resulting services meet customer expectations, and to verify that IT operations is able to support the new service.</div>
<ul style="text-align: justify;">
<li>Test Model Definition</li>
<li>Release Component Acquisition</li>
<li>Release Test</li>
<li>Service Acceptance Testing</li>
</ul>
<div style="text-align: justify;">
<b>KNOWLEDGE MANAGEMENT</b></div>
<div style="text-align: justify;">
<br />
<b>The objective of the Knowledge Management includes :</b><br />
Improve the efficiency by reducing the need to Re-discover the knowledge<br />
Create, Maintain & update Service Knowledge Management System<br />
Ensure that correct & up-to-date information is available at on the right time for organization’s requirements.<b></b></div>
<div style="text-align: justify;">
<b><br />TRANSITION PLANNING AND SUPPORT </b><br />
This process of Service Transition (Project management) deals with planning the resources to deploy major release within predicted cost, time and quality estimates.</div>
<ul style="text-align: justify;">
<li><b>Project Initiation</b><br />To define stakeholders of the project, responsibilities and resources available to the project, and documenting risks, constraints and various assumptions affecting the project.</li>
</ul>
<ul style="text-align: justify;">
<li><b>Project Planning and Coordination</b><br />To ensure the Service Transitions projects are planned in accordance with the software organization’s guidelines of the Project management, and to coordinate activities and resources across projects.</li>
</ul>
<ul style="text-align: justify;">
<li><b>Project Control</b><br />To monitor project progress and resource consumption</li>
</ul>
<ul style="text-align: justify;">
<li><b>Project Reporting and Communication</b><br />An overall summary of all planned or ongoing Service Transition projects as information for customers and other Service Management processes</li>
</ul>
<div style="text-align: justify;">
<b>Conclusion :</b><br />
Thus, the <a href="http://www.ifourtechnolab.com/" target="_blank">IT software development</a> should use and implement the Service Transition to plan, implement and manage the changes of an IT service as a part of ITIL processes. Managing the risk for the new as well as existing IT services and changes made to IT services will protect the product environment. This eventually leads to deliver business value along with the customer relationship management. <br />
<b><br />References :</b><br />
<a href="http://wiki.en.it-processmaps.com/index.php/ITIL_Service_Transition">http://wiki.en.it-processmaps.com/index.php/ITIL_Service_Transition</a></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-65674466639416661532017-02-07T22:44:00.000-08:002017-02-14T23:30:25.321-08:00IT Outsourcing – Local in comparison with Global<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="ASP DOT NET software companies in India" border="0" src="https://1.bp.blogspot.com/-hqAXxXCd6H0/WKQDahUurXI/AAAAAAAAAKI/nq7EXkOb0sQys7t0O3G6aiRl_o6Kt4L_QCLcB/s1600/IT%2BOutsourcing%2B%25E2%2580%2593%2BLocal%2Bin%2Bcomparison%2Bwith%2BGlobal.jpg" title="ASP DOT NET software companies in India" width="570px" /></a></div>
<br />
<br />
The latest trend for localised outsourcing includes hiring local employees which abolish language barriers and cultural difference. <a href="http://www.ifourtechnolab.com/" target="_blank">Software companies in India</a> don’t have to go to another country to find a bargain, a better resource, a better product, better service. Overall cheaper package can occasionally be found on doorstep, localised outsourcing can deliver all of these advantages and is coming to be seen as an increasingly attractive preference.</div>
<div style="text-align: justify;">
<br />
With businesses facing mounting costs with uncertain global economic steadiness, localised outsourcing has become a new cost saving measure that is seeing increased up-take. <a href="http://www.ifourtechnolab.com/" target="_blank">ASP DOT NET software companies in India</a> have moved to publicise and invest in SMEs, with the advancement of SMEs as suppliers being a key part of their strategy, in seeking to move the revenue out from recession. </div>
<div style="text-align: justify;">
<br />
Numerous popular offshore outsourcing destinations are becoming increasingly expensive, even outsourcing within the same country can present logistical complications. Local outsourcing can present proficiencies and levels of convenience that even in a digital are simply not present elsewhere.<br />
<br />
Repeatedly multi-national or global companies will seek proficiencies and employ local services around different sites. A <a href="https://msdn.microsoft.com/en-in/library/ff798433.aspx" target="_blank">hybrid approach</a> is becoming very popular, with huge business adopting the advantages of both local and distant outsourcing. </div>
<div style="text-align: justify;">
<br />
Individual customers may have precise reasons for wishing to keep specific services onshore – such as data-protection and security – but it is more than likely that for other services, location selections will depend largely on the vendor’s verdict that conditions are suitable.</div>
<div style="text-align: justify;">
<br />
Localised outsourcing can sometimes be problematic to employ successfully. Popular areas for outsourced overseas services can often include countries with developing economies. Political burdens and conflicts can be a risk of localised outsourcing. Social and political disturbance, particularly in many developing markets, and subsequently in <a href="http://www.ifourtechnolab.com/" target="_blank">software companies in India</a>, has validated the geopolitical risk of locating business services abroad. </div>
<div style="text-align: justify;">
<br />
Global business can recruit localised services around sites in numerous geographic locations. While this can be allowed for increased competency, lowering procurement costs, and taking benefit of local resources, such as; cultivated workforce, low cost labour and swift transport times, the employment of localised services can give upswing to cultural differences. These can sometimes be a hindrance if not effectively planned for. Essential dissimilarities in culture that exist from one nation to another. These differences can have an important manner on how procurement does business and builds relationships with suppliers.</div>
<div style="text-align: justify;">
<br />
Centralised procurement can debatably lead to a more consistent and persuasive message while leveraging economies of scale, however, these paybacks hinge on the relationship between central decision-makers and local markets. </div>
<div style="text-align: justify;">
<br />
Problems regarding cultural differences can be evaded through forward planning and an understanding of cultural backgrounds. Having a project manager or workers within the team who have a link to the cultural environment in proximity to an outsourcing project can assist to provide simplicity in transition and create robust links, which in turn increases the proficiency of localised outsourcing. </div>
<div style="text-align: justify;">
<br />
Some <a href="http://www.ifourtechnolab.com/" target="_blank">c# software companies in India</a> quest for a smooth, singular global model is unintentionally creating links in their own supply chain. Yet, it doesn’t have to be this way. If only local managers were involved and engaged from the commencement, global category managers would find that they could escape weeks of indecisive negotiations with their colleagues and agency suppliers.</div>
<div style="text-align: justify;">
<br />
Localised outsourcing can have difficulties and have crystal clear limitations, however the employment of a <a href="http://yaharasoftware.com/Why-We-Succeed/The-Hybrid-Approach" target="_blank">hybrid</a> model permits businesses to take full benefit of the efficiencies on offer. The benefits of localised outsourcing to businesses are being familiar by majority of <a href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in India</a>. With planning, users can escape potential risk and attain the likes of cost savings, overall efficiency, detailed overview, with the swift delivery of services.</div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-30856154971144223512017-01-13T03:03:00.001-08:002017-01-13T03:04:01.776-08:00Side-channel Attack <div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://1.bp.blogspot.com/-7ahCszQvLoU/WHizws4jMxI/AAAAAAAAAJg/_67yinr_CAUjMgmNhhtZCSR4PzWPq5OmQCLcB/s1600/Side-channel%2BAttack%25C2%25A0.jpg" title="asp.net software companies in india" width="570px" /></a></div>
<br />
In cryptography, a <b>side-channel attack</b> is any attack created on information gained from the physical execution of a cryptosystem, rather than brute force or theoretical weaknesses in the procedures of organizations including <a href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a> as well. For example, timing information, power feeding, electromagnetic leakages or even sound can offer an extra source of info, which can be used to break the system. Some side-channel attacks need technical knowledge of the inner operation of the system on which the cryptography is applied, although others such as differential power analysis are efficient as black-box attacks. <br />
<br />
<b>Classifications of Side Channel Attacks </b><br />
Side channel attacks are usually classified in literatures along the subsequent three orthogonal axes: </div>
<ul style="text-align: left;">
<li>Categorizations depending the control over the computation process; </li>
<li>Categorizations depending on the way of accessing the module; </li>
<li>Categorizations depending on the method used in the analysis process. </li>
</ul>
<div style="text-align: justify;">
<b>Controls over the Computation Process </b><br />
Depending on the control on the computation process by attackers in <a href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a>, SCA attacks can be broadly classified into two main categories: <b>passive attacks</b> and <b>active attacks</b>. We raise passive attacks to those that do not prominently interfere with the operation of the target system; the attacker increases some information about the target system’s operation, but the target system acts exactly as if no attack occurs. In active attack, on the other hand, the rival exerts some influence on the behavior of the target system. While the vigorously attacked system may or may not be able to detect such influence, an outsider viewer would notice a difference in the operation of the system. It is vital to note that the distinction between active attacks and <a href="https://en.wikipedia.org/wiki/Passive_attack" target="_blank">passive attacks</a> has further to do with the intrinsic nature of the attack than the invasiveness of a physical execution of the attack. <br />
<b>Ways of Accessing the Module </b><br />
When analyzing the safety of a cryptographic hardware module for <a href="http://www.ifourtechnolab.com/" target="_blank">asp.net software company in india,</a> it can useful to perform a methodical review of the attack surface — the set of physical, electrical and logical boundaries that are unprotected to a potential opponent. According to this observation, Side Channel attacks are divided into the subsequent classes: i<b>nvasive attacks, semi-invasive attacks</b> and <b>non-invasive attacks</b>. <br />
<br />
<b>Invasive Attacks </b><br />
<br />
An <b>Invasive attack</b> includes DE packaging to get direct access to the internal mechanisms of cryptographic units or devices. A distinctive example of this is that the attackers may open a hole in the passivation layer of a cryptographic module and place a penetrating needle on a data bus to see the data transfer. <br />
Tamper resistant or responsive instruments are usually implemented in hardware to effectively pawn <a href="https://www.sec.ei.tum.de/en/research/invasive-attacks/" target="_blank">invasive attacks</a>. For example, some cryptographic modules of higher safety level will erotize all their memories when tampering are detected [116]. </div>
<div style="text-align: justify;">
<br />
<b>Semi-invasive Attacks </b> </div>
<div style="text-align: justify;">
This kind of attack includes access to the device, but without damaging the passivation layer or creating electrical contact other than with the official surface. For example, in a fault-induced attack, the attacker may use a laser beam to ionize a device to alter some of its memories and thus alter the output of this device. </div>
<div style="text-align: justify;">
<br />
<b>Non-invasive Attacks</b> </div>
<div style="text-align: justify;">
A non-invasive attack includes close observation or handling of the device’s operation. This attack only uses externally available info that is often accidentally leaked. A classic example of such an attack is timing analysis: calculating the time consumed by a device to perform an operation and correlating this with the computation executed by the device in order to deduce the worth of the secret keys.<br />
<br />
<b>Methods Used in the Analysis Process</b><br />
Depending on the approaches used in the process of examining the sampled data in <a href="http://www.ifourtechnolab.com/" target="_blank">c#.dot net companies in india</a>, SCA attacks can be separated into simple side channel attack and differential side channel attack. In a SSCA, the attack uses the side-channel output mostly depending on the achieved operations. Normally, a single trace is used in an <a href="http://www.ssca.net/" target="_blank">SSCA</a> analysis, and so the secret key can be directly read from the side-channel trace.<br />
Differential side-channel attacks uses the link between the data and the instantaneous side-channel leakage of the cryptographic device. As this link is usually very small, statistical methods must be used to exploit it effectively. In a differential side-channel attack, an attacker uses a hypothetical model of the device beneath attack. The quality of this model depends on the abilities of the attacker.<br />
<br />
<b>Conclusion:</b><br />
Cryptology may be appreciated as a constant struggle between cryptographers and cryptanalysts. Attacks on cryptography have a similarly long history. The safety of cryptographic modules for providing a practical degree of safety against white-box (total access) attacks should be observed in a totally un-trusted implementation environment.</div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-39484435907144153032016-12-05T03:55:00.000-08:002016-12-17T02:42:07.658-08:00Organization based access control<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-xI5RHgyGPYQ/WFUWaivN2vI/AAAAAAAAAI8/zjQgcrZ5rgcCHgRv8dawXAH6riq6c2hzACLcB/s1600/orbac_main_concepts.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="software development companies" border="0" src="https://4.bp.blogspot.com/-xI5RHgyGPYQ/WFUWaivN2vI/AAAAAAAAAI8/zjQgcrZ5rgcCHgRv8dawXAH6riq6c2hzACLcB/s1600/orbac_main_concepts.png" title="software development companies" width="570px" /></a></div>
<b><br /></b>
<b>Introduction:</b> The current methods to access control and usage control depend on three entities: subject, action and object. Hence requiring a security policy contains in specifying security rules applying on the {subject, action, object} trio. It can be a authorization for some subject to understand some action on some object.One of the main goals of the <a href="https://en.wikipedia.org/wiki/Organisation-based_access_control" target="_blank">OrBAC </a>model is to permit the policy designer to describe a security policy independently of the application. </div>
<div style="text-align: justify;">
The selected method to achieve this goal is the overview of an abstract level.<br />
<ul>
<li>Subjects are abstracted into characters. A role is a set of topics to which the same security rule apply.</li>
<li>Similarly, an activity is a set of events to which the same security rule apply.</li>
<li>And, a view is a set of substances to which the same security rule apply. </li>
</ul>
Tools that integrate partly or entirely OrBAC concepts in their implementation. <br />
<ul>
<li><b>MotOrBAC:</b> MotOrBAC is an OrBAC security policy corrector</li>
<li><b>The OrBAC library:</b> the OrBAC library is a set of Java classes which can deploy and understand OrBAC policies</li>
<li><b>Protekto: </b>a tool established by the SWID company </li>
</ul>
<b>MotOrBAC: </b><br />
MotOrBAC is an execution of the OrBAC access control model. <a href="http://motorbac.sourceforge.net/index.php?page=screenshots&lang=en" target="_blank">MotOrBAC</a> aims at providing an OrBAC policy description tool. Moreover it can be used to simulate OrBAC policies. The GUI is open source. The OrBAC API, on top of which MotOrBAC has been established to help <a href="http://www.ifourtechnolab.com/" target="_blank">software developers</a> to contain security mechanisms in their software.<br />
<br />
<b>OrBAC API</b> <br />
The OrBAC Application Programing Interface is a Java library which has been recognized to programmatically deploy OrBAC policies. The API features the subsequent OrBAC policy editing capabilities:<br />
<br />
<ul>
<li>Abstract policy specification: organizations, roles, activities, views, contexts, and abstract rules (permissions) can be used. This comprises organizations, roles, activities, and views hierarchies</li>
<li>Separation constraints and rules priorities can be stated to solve conflicts between abstract rules </li>
<li>Numerous languages can be used to traditional situations and object definitions. Simple ad-hoc languages have been defined to express time-based conditions or modest conditions on existing entities (subject, action or object) attributes. Two more powerful languages can be used, Java and Prolog, to be able to direct a wide variety of conditions </li>
<li>The administration policy, or AdOrBAC policy, related to an OrBAC policy can be stated using the same concepts and API methods </li>
</ul>
<b>Protekto</b><br />
<br />
The Protekto project contains in the development of a platform which allows security policy concentration by executing verification and approval functions in the similar platform. It uses the OrBAC model and standards like SAML 2.0, XACML 2.0 and OpenID 2.0. Open source libraries like OpenSAML, OpenID4Java and SunXACML have been recycled through development. The platform is contains three principal entities:<br />
<ul>
<li>Protekto IDP (Identity Provider)</li>
<li>Protekto SP (Service Provider)</li>
<li>Protekto PDP (Policy Decision Point)</li>
</ul>
Each component connects with the others using SAML mails. The OpenID protocol is used in the Protekto IDP component which can authenticate a user by a password or OpenID. Protekto IDP is accountable for empowering subjects into roles and manages the subject attributes.<br />
<br />
Protekto can be used to download content presented by the Protekto SP. In this case the Protekto PDP is questioned to know if the user trying to download content is authorized to do so. In order to guarantee that privacy is enforce<br />
<br />
<b>Conclusion:</b> The description of the security policy is entirely parameterized by the organization so that it is possible to handle concurrently various security policies related with different organizations. The model is not limited to permissions, but also comprises the possibility to specify prohibitions and duties. From the three abstract units (roles, activities, views), abstract privileges are defined. And from theses abstract privileges, concrete rights are derived. </div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-18591376144629005982016-11-03T06:49:00.001-07:002016-11-03T06:49:12.765-07:00E Business – Strategy<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;">
<a href="http://www.ifourtechnolab.com/" target="_blank"><img alt="software development companies" border="0" src="https://4.bp.blogspot.com/-H2KiE6FF9uU/WBtAFs5dE4I/AAAAAAAAAIg/fsaacJ-Hof0yYakMSs1HiayfRIpycABrgCLcB/s1600/E%2BBusiness%2B%25E2%2580%2593%2BStrategy.jpg" title="software development companies" width="570px" /></a></div>
<b><a href="http://www.ifourtechnolab.com/" target="_blank">ASP DOT NET Software companies in India </a></b>have belief that progress in e-business will not only deliver <b>economic yields,</b> but it is an important component of business definition and <b>competitive strategy. </b>Still, IT performance research has revealed that the relation between IT investment and enhanced organizational performance is still vague. Again and again, ambiguity and arguments have characterized the e-business regarding what is known and what is not known about its <b>payoff. </b>Strategists fail to capture the indisputability that e-business performance depends upon the convergence of <b><a href="https://www.boundless.com%20%E2%80%BA%20...%20%E2%80%BA%20boundless%20management%20%E2%80%BA%20control%20%E2%80%BA%20types%20of%20control/" target="_blank">strategic and tactical factors.</a></b><br />
<br />
Among many established industries, with the help of <b><a href="http://www.ifourtechnolab.com/" target="_blank">software companies in India, </a></b>there is significant evidence of e-business being deployed to accomplish strategic goals. Where this deployment has been most successful, there is a tough scenario that the organization has taken a combined approach that both shapes on the organization's strengths and pays cautious attention to the process of change within the organization. There are <b>two perspectives </b>with this, one is strategy content – which focuses on unique packages of resources – and second is strategy process – which captures human guidance and e-business implementation. These two perspectives are integrated to develop a more holistic understanding of the underlying drivers of e-business performance.<br />
<br />
In spite of the dot.com downfall, there remains a strong belief among <b><a href="http://www.ifourtechnolab.com/" target="_blank">software companies in India</a></b> that e-business – with its <b>rising potential for generating new transactional prospects</b> between firms, suppliers, corresponding product/service providers and customers – will eventually contribute meaningfully to the future performance of many well-known firms. E-business is more than an instrument but part of an intensely held strategic character that enables them to <b>outpace the competition.</b> Yet, in spite of these high-profile triumph stories many other likewise set firms have failed to replicate these results. This is not altogether shocking as technology modernization theory predicts that within any population <b>there are significantly more followers than innovators.</b> For those imitators wanting to study from these role models, a number of important queries come to mind, two of which, are:<br />
<br />
<ul style="text-align: left;">
<li>Why does performance (precisely that related to e-business) <b>differ</b> between organizations that function within the same line of business and have access to the same information and technologies?</li>
<li>To what extent are these variances essential – that is, driven by firm <b>assets and infrastructure – </b>or intellectual – that is, driven by the <b>principles and obligation</b> of managers to a precise future (in this case a future inferring e-business implementation)?</li>
</ul>
<br />
Both questions are of <b>real-world significance</b> for <a href="http://www.ifourtechnolab.com/" target="_blank"><b>ASP DOT NET software companies in India </b></a>because they hit into the organizational thinking that takes place to clarify e-business applications. This reasoning is also of <b>theoretical significance</b> to the information technology (IT) literature in that it underlies the extent to which organizational success is dogged by strategy content and/or process. Although naturally linked to one another, the content and process viewpoints have evolved independently.<br />
<br />
Developments in e-business applications and technologies, done by <b><a href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in India,</a></b> present many prospects for modern businesses to redefine their strategic objectives and improve or transform products, services, markets, work processes and business communication. The experiential results tell that e-business performance varies as<a href="https://www.scribd.com/document/.../E-Business-Strategy-and-Firm-Performance-A" target="_blank"> <b>external pressures and capabilities</b> </a>(i.e., human, technological and business) fluctuate. Still, the <b>exact degree</b> of these capabilities is not determined. Most notably, the study shows that variation in managerial opinions, regarding the supposed benefit of e-business, tells much about performance.<br />
<br />
Organizational differences comes out to be a factor for variation in success or failure of e commerce implementation and its alignment with strategic goals. This principle is perhaps most marked in e-business settings where <b>inconsistent markets, swift technological change and financial limitations </b>strongly effect the organizational reasoning that takes place to determine e-business strategy and the following implications for firm development and existence<br />
<div>
<br /></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-16361412321323078602016-10-04T00:22:00.000-07:002016-10-04T00:22:02.494-07:00Security considerations in SaaS<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="Software development company in india" border="0" src="https://4.bp.blogspot.com/-9ahf1Ytq4j0/V_NYSBPcduI/AAAAAAAAAH0/eFyuI-j_PJMciFIifPhuf4F0qoXkB15mgCLcB/s1600/SAAS.png" title="Software development company in india" width="570" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Software development companies should consider following security factors in SaaS development and deployment:</div>
<br />
<ul style="text-align: left;">
<li style="text-align: justify;">Security of the data</li>
<li style="text-align: justify;">Segregation of data</li>
<li style="text-align: justify;">Security in the network</li>
<li style="text-align: justify;">Availability</li>
<li style="text-align: justify;">Backup</li>
<li style="text-align: justify;">SaaS deployment model</li>
</ul>
<br />
<div style="text-align: justify;">
<b>Security of the Data</b></div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
In the good old days of on-premise application deployment model, the critical data of each enterprise was placed within the enterprise boundary and was in context to its physical, technical and personnel security and--access control policies suggested by software companies. But, in the <a href="http://www.oracle.com/SaaS%E2%80%8E" target="_blank">SaaS</a> model, the organization’s data is stored outside the enterprise edge, at the SaaS vendor end. Consequently, the SaaS vendor must adopt added security checks to ensure security of the data and prevent breaches due to security weaknesses in the application or through vindictive employees. This involves the use of strong encryption techniques for data security and a granular authorization to control access to data.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In Amazon alike cloud vendors,administrators are unable to access the customer instances and can’t log into the Guest OS. To gain access to a host the administrators who have a business need are compelled to use their own strong cryptographic SSH keys. Logging and routine auditing of such accesses is carried out. While the data at rest in storage service offered by vendor is not encrypted by default, the encryption of data is done by users before uploading it to Amazon, so that it isn’t accessed or tampered by any illicit party.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Segregation of data</b></div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
Security checks need to be implemented to ensure data security and prevent unauthorized access to data of one tenant by users of other tenants. This involves hardening the data store and applicationso as to segregate the data.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
If the SaaS application is deployed at a third party cloud service provider, added safeguards need to be adopted so that application tenant’s data is inaccessible to other applications.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Security in the network</b></div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
According to software development companies, in a SaaS deployment model, critical data is obtained from the organizations, processed by the SaaS application and stored at the SaaS service provider end. Security of all the data that flows over the network is mandatory in order to prevent sensitive information from leaking. This involves the use of strong network traffic encryption techniques such as SSL and TLS for security.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In case of AWS, the protection against MITM attacks, IP spoofing, port scanning, packet sniffing, etc. is provided by the network layer. With the help of SSL encrypted endpoints, Amazon S3 is accessed, for maximum security. To ensure that data is transferred securely within AWS as well as to and from sources outside of AWS, encrypted endpoints are accessible from both the Internet and from within Amazon EC2.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Availability</b></div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
The SaaS apps of the service providers need to ensure that organizational clients are provided with service round the clock. This involves making changes in the architecture at the application and infrastructural levels to add scalability and high availability. Adoption of a multi-tier architecture should be done, supported by a load-balanced farm of application instances, running on large number of servers. Resistance to failures in hardware and software, as well as to DOS attacks, needs to be built starting from the bottom and up within the application.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
At the same time, BCP and DRP needs to be considered for any unintended emergencies. This is essential to ensure the safety of the client data and marginal downtime for enterprises.</div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
<b>Backup</b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The SaaS vendor needs to ensure that all critical data of the client organization such as a <b><a href="http://www.ifourtechnolab.com/" target="_blank">software development companyis</a></b> regularly backed up to facilitate quick recovery and restoration in case of disasters. To prevent the sensitive information from accidental leakage, backed up data is protected using strong encryption techniques.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In the case of cloud vendors such as Amazon, the stored data in S3 is not encrypted by default. The users need to separately encrypt their data and backup it, so that it cannot be accessed or altered with by illicit parties.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>SaaS Deployment Model</b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Deployment model used by the vendor is the major differential factor in the types of <a href="https://en.wikipedia.org/wiki/Software_as_a_service" target="_blank">SaaS</a> security challenges faced by the organization. SaaS service providers may choose either between deploying the solution themselves or doing it using a public cloud provider. Amazon is a dedicated public cloud provider that helps to build secure SaaS solutions by providing infrastructure services that helps in ensuring perimeter and environment security. This involves the use of firewalls, intrusion detection systems, etc. whereas if it’s a self-hosted SaaS deployment, it requires the vendor to build these services and assess them for security weaknesses.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Conclusion:</b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Software as a Service [SaaS] is quickly emerging as the leading delivery model for meeting the needs of enterprise IT services. But most <b><a href="http://www.ifourtechnolab.com/" target="_blank">software development companies</a></b> are still uncomfortable with the SaaS model due to dearth of visibility about the way their data is stored and secured. Subsequently, addressing organizations’ security concerns has emerged as the biggest challenge for the adoption of SaaS applications</div>
<div style="text-align: justify;">
<br /></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-39980024416046644062016-09-25T23:23:00.001-07:002016-09-28T06:54:09.043-07:00Ways to Hack A Website<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="custom application development companies" border="0" src="https://3.bp.blogspot.com/-_bveFwCo7lI/V-vLViLxHTI/AAAAAAAAAHk/feFvdCRlBXQh83XqhOwTIFHxezEry6eoACLcB/s1600/Hack-Proof.png" title="custom application development companies" width="570" /></a></div>
<br />
Hacking is gaining unauthorized access to a computer and viewing, copying, or creating data with the intention of destroying data or maliciously harming the computer. Nowadays, hacking is a growing threat for every business-large, medium and small. Hackers can impact any business at any time by stealing private data, taking control of a computer or by shutting down its website. It is a major concern for <b><a href="http://www.ifourtechnolab.com/" target="_blank">web development companies</a></b>. Hackers can attack and threaten security of a business and its website in so many ways as follow:</div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
<b>DDOS Attack – Distributed Denial Of Service Attack:</b></div>
<div style="text-align: justify;">
</div>
<ul>
<li>In this attack, a server or a machine’s services are made unavailable to its end-users. And then hacker proceeds to compromise the website of a business when the system gets offline.</li>
<li>The example of a DDoS attack is sending many URL requests to a website in a very small amount of time. This causes overflowing at the server side because the CPU just ran out of resources.</li>
</ul>
<br />
<div style="text-align: justify;">
<b>Remote code execution Attack:</b></div>
<div style="text-align: justify;">
</div>
<ul>
<li>This attack takes place as a result of either server side or client side security weaknesses. This attack is mostly seen in <b><a href="http://www.ifourtechnolab.com/" target="_blank">application development companies</a></b>.</li>
<li>Weak components include libraries, remote directories on a server that have not been monitored and other software modules that run on the basis of authenticated user access. </li>
<li>These components which are used by applications are always under attack through things like scripts, malware, and small command lines that extract information.</li>
</ul>
<br />
<div style="text-align: justify;">
<b>DNS Cache Poisoning:</b></div>
<div style="text-align: justify;">
</div>
<ul>
<li>It involves old cache data that a company might think it no longer has in its computer but it is actually there.</li>
<li>Hackers identify weaknesses in a domain name system (DNS) which allow them to divert traffic from genuine servers to a fake website.</li>
<li>This attack is major concern for <b><a href="http://www.ifourtechnolab.com/" target="_blank">web development companies</a></b>.</li>
</ul>
<br />
<div style="text-align: justify;">
<b>Clickjacking Attack:</b></div>
<div style="text-align: justify;">
</div>
<ul>
<li>This is also known as UI Redress Attack commonly seen in <b><a href="http://www.ifourtechnolab.com/" target="_blank">Web development companies in India</a></b>.</li>
<li>The attacker is hijacking clicks that are not meant for the actual page, but for a page where the attacker wants you to be.</li>
</ul>
<br />
<div style="text-align: justify;">
<b>Cross-site Request Forgery Attack:</b></div>
<div style="text-align: justify;">
</div>
<ul>
<li>This attack happens when a user is logged into a session and a hacker uses this opportunity to send them a fake HTTP request to collect their cookie information.</li>
<li>Once the browser session of a user is compromised, the hacker can initiate requests to the application that will not be able to differentiate between a valid user and a hacker.</li>
</ul>
<br />
<div style="text-align: justify;">
<b>Injection Attack:</b></div>
<div style="text-align: justify;">
</div>
<ul>
<li>Injection Attack occurs when there are flaws in <a href="https://en.wikipedia.org/wiki/SQL" target="_blank">SQL Database</a>, SQL libraries or the operating system itself. </li>
<li>Employees of <b><a href="http://www.ifourtechnolab.com/" target="_blank">application development companies</a></b> open seemingly credible files with hidden commands or injections unknowingly.</li>
<li>By doing this, employees have allowed hackers to gain unauthorized access to private data such as cardholder data or other financial data.</li>
</ul>
<br />
<div style="text-align: justify;">
<b>Cross-site scripting Attack:</b></div>
<div style="text-align: justify;">
</div>
<ul>
<li>This attack is also known as XSS attack.</li>
<li>It occurs when an application, URL “get request”, or file packet is sent to the web browser window and bypassing the validation process. </li>
<li>Once an <a href="https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)" target="_blank">XSS script</a> is triggered, it makes users believe that the compromised page of a specific website is genuine.</li>
<li>It is a major threat for <b><a href="http://www.ifourtechnolab.com/" target="_blank">web development companies</a></b>.</li>
</ul>
<br />
<div style="text-align: justify;">
<b>Social Engineering Attack:</b></div>
<div style="text-align: justify;">
</div>
<ul>
<li>It happens when you disclose private information in good faith, such as a credit card number, through different communication ways such as chat, email, social media sites or virtually any website.</li>
</ul>
<br />
<div style="text-align: justify;">
<b>Conclusion:</b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
This article is helpful for <b><a href="http://www.ifourtechnolab.com/" target="_blank">web development companies</a></b> to prevent them hacked by hackers. Every business should implement countermeasures for all above attacks.</div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-39192104152696053882016-09-12T03:31:00.003-07:002016-09-15T00:09:28.191-07:00Fundamental of Android Security<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="custom application development" border="0" src="https://3.bp.blogspot.com/-jL2w65LtH_k/V9pHqAr2TQI/AAAAAAAAAHE/-muwKSz6dIcFB8QP7awf6o-WppfCt0eSwCLcB/s1600/Fundamental%2Bof%2BAndroid%2BSecurity.png" title="custom application development" width="570" /></a></div>
<br />
<a href="https://www.android.com/" target="_blank">Android </a>is an open mobile platform. Android applications use advanced hardware and software, besides local and served data, open through the platform to bring improvement and add consumer’s value. In order to guard that value, the platform used for <b><a href="http://www.ifourtechnolab.com/" target="_blank">custom application development</a></b> must offer an environment that guarantees the users security, information, applications, device plus network.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
To secure an open platform, there exist a need for a robust security architecture and demanding security programs. Android was planned with multi-layered security that provides the flexibility open platform, while ensuring protection for all users using the platform.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Android was designed with clear thought about developers in mind and security controls were designed to ease the burden on developers. Developers who are Security-savvy can easily work depend onflexible security controls. And the Developers who are less familiar with security, will be safeguarded by safe-defaults.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Android was designed with users of the device in mind. Users are provided reflectivity into how applications operate and work, and guided control over those Android applications. The design of Android includes the probability that attackers would attempt to perform commons attacks to breach security, such as social-engineering attacks to assure device users to install malware, and outbreaks on third-party applications of Android. Android was designed and planned to both reduce the probability of breaches and attacks as well as limit the impact of the attack.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Android offers an open source platform for mobile devices along with application environment.</div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
<b>The core Android platform building blocks are:</b></div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
Device Hardware, <a href="https://www.android.com/" target="_blank">Android Operating System</a>, and Application Runtime. Android applications outspread the core Android operating system.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
There are two primary sources for applications: Pre-Installed Applications and User-Installed Applications.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Android Security Program Overview</b></div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
Early during development, the core development team of <b><a href="http://www.ifourtechnolab.com/" target="_blank">application development company</a></b> of Android recognized that a robust security framework was required to enable a strong ecosystem of applications and devices built the Android platform and sustained by cloud services. As a result of this, through its complete development life cycle, Android has been lay open to a professional security program. The Android team has had the chance to see how other mobile, desktop, and server platforms disallowed and reacted to security issues and accordingly built a security program to address weak spot. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>The key components of the Android Security Program include:</b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Design Review:</b> The Android security procedure begins early in the development lifecycle with the design of a rich and configurable security model. Each major feature of the Android platform is looked over by engineering and security resources, with appropriate security controls integrated into the architecture of the security system.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Penetration Testing and Code Review: </b>During the platform development, Android-created and open source modules are subject to dynamic security reviews. These security reviews are performed by theGoogle’s Information Security Engineering team,Security Team of Android, and various independent security consultants.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The goal of these security reviews is to identify weaknesses in the platform and possible vulnerabilities well before the android platform is open sourced.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Open Source and Community Review:</b> The Android Open Source Development enables wide security reviews by any interested party. Android also practices open source technologies that have undergone substantial external security review, such as the Linux kernel.</div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
<b>Incident Response:</b> The Android project has made a comprehensive security response process. A full-time Android security team continually monitors Android-specific and the over-all security community for the potential vulnerabilities. The Android team has Incident response process which enables the quick mitigation of vulnerabilities and weakness to ensure that the risk to all Android users is minimized.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Platform Security Architecture</b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Android architecture seeks to be the more secure and usable operating system for mobile platforms by re-purposing traditional operating system security controls:</div>
<br />
<ul style="text-align: left;">
<li style="text-align: justify;">To protect data of the users</li>
<li style="text-align: justify;">To protect various system resources</li>
</ul>
<br />
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>To achieve these objectives of the platform, Android offerskey security features like:</b></div>
<br />
<ul style="text-align: left;">
<li style="text-align: justify;">Provided robust security at the Operating System level through the Linux kernel</li>
<li style="text-align: justify;">Mandatory application sandbox for all android applications</li>
<li style="text-align: justify;">Provided Secure inter-process communication</li>
<li style="text-align: justify;">Signing in Android Application</li>
<li style="text-align: justify;">Application-defined and user-granted permissions</li>
</ul>
<br />
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Conclusion: </b></div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
Thus, the <b><a href="http://www.ifourtechnolab.com/" target="_blank">Application Development Company</a></b> should consider the security aspects while designing any application. The application built should use advanced hardware and software to bring innovation. Implementing and integrating security controls in the architecture leads to secure access and intact security in the company or a firm which guard against attacks.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>References :</b></div>
<ul style="text-align: left;">
<li style="text-align: justify;"><a href="https://source.android.com/security/">https://source.android.com/security/</a></li>
</ul>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-51667876639760065072016-08-24T04:06:00.000-07:002016-09-01T00:04:21.346-07:00Dirty Threats of the Cloud Services<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-EThfKLA6tho/V8fSQqPbLVI/AAAAAAAAAFk/kqxyjAq7x40E1EBvqNuYSo4B08btfZBtACLcB/s1600/dirty.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="Custom software development companies" border="0" src="https://4.bp.blogspot.com/-EThfKLA6tho/V8fSQqPbLVI/AAAAAAAAAFk/kqxyjAq7x40E1EBvqNuYSo4B08btfZBtACLcB/s1600/dirty.jpg" width="570" title="Custom software development companies" /></a></div>
<br />
<h3>
<b>Introduction</b></h3>
<div style="text-align: justify;">
<div style="background: white; margin: 0in 0in 0.0001pt;">
<a href="http://www.ifourtechnolab.com/" target="_blank"><b>Custom software development companies</b></a> are no more sitting on their hands, questioning if they should risk transferring applications and data to the cloud. They're undertaking it -- but security remains a thoughtful concern.<br />
<br />
The shared, on-demand nature of cloud computing acquaint with the likelihood of new security breaches that can obliterate any gains made by the switch to cloud technology. Cloud services permit users to bypass <b><a href="http://www.ifourtechnolab.com/" target="_blank">software development company</a></b>-wide security policies and implement their own books in the service of IT projects<br />
<br />
<b>The top cloud security threats are given as follows:</b><br />
<b><br /></b>
<b>Data breaches</b><br />
<b><br /></b>
Cloud atmospheres face many of the same threats due to the huge amount of data stored on the cloud servers, providers become an attractive target. The brutality of potential damage depends on the exposure of data sensitivity.<br />
<br />
When a data breach occurs, <b><a href="http://www.ifourtechnolab.com/" target="_blank">software development companies</a></b> might incur charges, or they might face lawsuits or criminal charges leading to significant loss of data, brand image and money costs.<br />
Compromised credentials and broken authentication<br />
<br />
Data breaches and attacks often arises from lack of authentication, weak or poor passwords, and meager key or digital certificate management.<a href="http://www.ifourtechnolab.com/" target="_blank"><b>Custom software development organizations</b></a> frequently struggle with identity management as the organizations try to give permissions as per the user’s job role. More important, they occasionally forget to take away user access rights during job termination.<br />
<br />
Majority of the developers make the error of setting in credentials and cryptographic keys in source code and keeping them in public-facing repositories. Keys need to be properly protected and rotated occasionally to make it tougher for attackers to use keys without authorization.<br />
<br />
The <b>software development organization</b> need to understand the security measures the provider practices to protect the identity platform.<br />
<br />
<b>Hacked interfaces and APIs</b><br />
<br />
Almost all cloud service and application offers APIs. In <b><a href="http://www.ifourtechnolab.com/" target="_blank">software development companies</a></b>, IT teams use interfaces and APIs to interact with cloud services, as well as services that offer cloud provisioning, management, orchestration, and monitoring.<br />
<br />
The safety and accessibility of cloud services from authentication to encryption depends on the security of the API. Risk grows with 3rd parties that depends on APIs and build on these interfaces, as organizations may need to expose additional IT services and credentials. Weak interfaces and APIs expose organizations to security issues related to confidentiality, integrity, availability, and accountability<br />
<b><br /></b>
<b>Exploited system vulnerabilities</b><br />
<br />
Organizational vulnerabilities, or vulnerable bugs in programs, are not novel, but they have become a greater problem with the introduction of multi-tenancy in cloud computing.<b><a href="http://www.ifourtechnolab.com/" target="_blank">Custom software development organizations</a></b> share memory, databases, and other resources in close proximity to one another, creating new attack surfaces.<br />
<br />
The expenses of mitigating system vulnerabilities are comparatively low compared to other IT expenditures. Change control processes that discourse reserve patching safeguard that remediation events are properly documented and revised by technical teams<br />
<br />
<b><a href="https://www.techopedia.com/definition/24632/account-hijacking" target="_blank">Account hijacking</a></b><br />
<br />
Phishing and software exploits are quiet successful, and cloud services complement a new dimension to the threat as attackers can eavesdrop on actions, operate transactions, and change data. Attackers might also use the cloud application to introduce many other attacks.<br />
<br />
Collective Defense-in-depth protection approach encompass the damage incurred by the data breach. <b>Software development Organizations</b> must for bid the sharing of the credentials between different users and various services. Accounts should be tracked monitored to trace all the transactions. The key point is to safeguard credentials from being stolen.<br />
<br />
<b><a href="https://en.wikipedia.org/wiki/Denial-of-service_attack" target="_blank">DoS attacks</a></b><br />
<br />
DoS attacks have gained prominence as a result of cloud computing as they majorly affect availability. The software systems slows down to a crawl or merely time out. There is nothing that can done about DOS attack except for the fact to sit and wait.<br />
<br />
DoS attacks devour huge quantity of processing power. <b>Software development organizations</b> must be attentive of asymmetric, application-level DoS attacks, which goal Web server and database vulnerabilities.<br />
<br />
Cloud providers incline to be better composed to lever DoS attacks than their customers. The key point is to have a plan to mitigate the outbreak before it occurs, so supervisors have access to various resources when they want them.<br />
<br />
<b>Conclusion:</b><br />
<b><br /></b>
While the scope of Cloud Computing is wide and comprises several new trends and <b>IT Services</b>, Software development companies in India are keeping pace with the latest or the emerging trends in IT. It has become essential and important for <b>IT organizations</b> to understand various service threats and take necessary action to avoid possible loss.<br />
<br />
<b>References :</b><br />
<b><br /></b>
•<a href="http://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html">http://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html</a><br />
<br />
<br /></div>
</div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-35004037769779723002016-05-30T22:38:00.003-07:002016-09-01T22:48:44.505-07:00Physical Security<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="text-align: justify;">
<div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;">
<a href="http://www.ifourtechnolab.com/" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://2.bp.blogspot.com/-1Jy_2OnCiL0/V8kSeEiDodI/AAAAAAAAAGA/rWvZG2zlT44ZergX7FGYAwJM7IixafgmQCLcB/s1600/physical-security.jpg" title="asp.net software companies in india" width="570px" /></a></div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><br /></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b>Introduction: </b><span style="background: white;">Physical security is
the security of personnel, hardware, programs, networks, and data from physical
environments and events that could cause serious sufferers or damage to an
enterprise, agency, or organization for <b><a alt="Software development companies in india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>. This contains security from fire, natural disasters,
theft, vandalism, and terrorism.<o:p></o:p></span></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="background: white;"><br /></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Physical
security breaches can result in more problems for an institute than a <a href="https://en.wikipedia.org/wiki/Computer_worm" target="_blank">wormattack</a>. Loss of data, temporary loss of accessibility by shutting systems down,
or longer term loss of accessibility by bomb or arson are all things to reflect
when applying physical security.<span style="background: white;"><o:p></o:p></span></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="background: white;">Physical security is often ignored (and its importance undervalued) in
favor of more technical and dramatic matters such as hacking,<span class="apple-converted-space"> </span></span><span style="background: white;">virus</span><span style="background: white;">es,<span class="apple-converted-space"> </span></span><span style="background: white;">Trojan</span><span style="background: white;">s, and<span class="apple-converted-space"> </span></span><span style="background: white;">spyware</span><span style="background: white;">. However, breaches
of physical security can be accepted with little or no technical knowledge on
the chunk of an attacker. Moreover, accidents and natural calamities are a part
of everyday life, and in the long term, are unavoidable for<b> <a href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a> </b>or any company for that matter.<o:p></o:p></span></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="background: white;"><br /></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The security
of laptops and desktops is often ignored; laptops in particular. According to<span class="apple-converted-space"> <w:sdt citation="t" id="71624146"><!--[if supportFields]><span
style='mso-element:field-begin'></span> CITATION SAN151 \l 1033 <span
style='mso-element:field-separator'></span><![endif]-->(<a href="https://www.sans.org/reading-room/whitepapers/physical/" target="_blank">Institute, Physical Security, 2015</a>)<!--[if supportFields]><span
style='mso-element:field-end'></span><![endif]--></w:sdt></span>, laptop usage
related to desktop has been growing since 2010 and their 2019 forecast is 121
million desktops compared to 170 million laptops. They also plan tablet use to
continue to decline after the tablets will replace PCs mania of 2013 when more
tablets were sold than laptops. Android, Windows and Mac (from <a href="http://www.apple.com/">Apple </a>Inc) also have the
capability so match files across all devices: PC, laptop, tablet. If one of
them is lost, it is a probable portal into all of them.<span style="background: white;"><o:p></o:p></span></span></div>
<h3 style="line-height: 12pt; margin: 22.5pt 0in 0.1in; text-align: justify; text-indent: 0in;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="letter-spacing: -0.6pt;">Physical
Security Protection</span></span></h3>
<div style="margin: 0in 0in 0.1in; text-align: justify;">
<span style="color: windowtext;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Relying
on the organization physical security countermeasures will differ in <b><a href="http://www.ifourtechnolab.com/" target="_blank">c#.net companies in india</a></b>. A government
agency such as the Department of Defense may have armed guards at the door of
the house. Many governments are not in the situation of breaching national
security so armed guards are not a requirement. In many cases a administrator
greets any new visitors and makes the suitable provisions for an on-site visit.
Let's analyze some physical security countermeasures for the server room,
laptops and desktops.<span style="font-size: 11pt;"><o:p></o:p></span></span></span></div>
<h3 style="line-height: 12pt; margin: 22.5pt 0in 0.1in; text-align: justify; text-indent: 0in;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="letter-spacing: -0.6pt;">Server
Room Protection</span></span></h3>
<div class="MsoNormal" style="margin-left: .25in; mso-list: l2 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
</div>
<ul style="text-align: left;">
<li style="text-align: justify;"><strong style="font-family: Arial, Helvetica, sans-serif; text-indent: -0.25in;">Access
Control Cards</strong><span class="apple-converted-space" style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">- These are secured to a specific user
and must be swiped in order to get admission. The disadvantage is that they can
be stolen and used without authorization and they are really costly to
implement.</span></li>
<li style="text-align: justify;"><strong style="font-family: Arial, Helvetica, sans-serif; text-indent: -0.25in;">Biometrics</strong><span class="apple-converted-space" style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">- Uses a physical characteristic such
as a fingerprint or retina to recognize a user. Due to the cost of applying
this solution, as well as employee privacy issues, biometrics has not been broadly
accepted yet.</span></li>
<li style="text-align: justify;"><strong style="font-family: Arial, Helvetica, sans-serif; text-indent: -0.25in;">User
Awareness</strong><span class="apple-converted-space" style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">- User awareness is by far the most vital
aspect to security for </span><b style="font-family: Arial, Helvetica, sans-serif; text-indent: -0.25in;"><a href="http://www.ifourtechnolab.com/" target="_blank">c#.net softwarecompanies india</a></b><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">. Programs like</span><span style="font-family: "arial" , "helvetica" , sans-serif;"><span class="apple-converted-space" style="text-indent: -0.25in;"> </span>Securing
the Human</span><span class="apple-converted-space" style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">are
becoming as critical as anti-virus.</span></li>
</ul>
<h3 style="line-height: 12pt; margin: 22.5pt 0in 0.1in; text-align: justify; text-indent: 0in;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="letter-spacing: -0.6pt;">Laptop/Desktop
Protection</span></span></h3>
<div class="MsoNormal" style="margin-left: .25in; mso-list: l0 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
</div>
<ul style="text-align: left;">
<li style="text-align: justify;"><strong style="font-family: Arial, Helvetica, sans-serif; text-indent: -0.25in;">User
Awareness</strong><span class="apple-converted-space" style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">- Employees need to be made alert that
strangers cannot be in the office without a guide. Awareness programs should inspire
all employees to confront and ask an unnamed individual if they need any help.</span></li>
<li style="text-align: justify;"><strong style="font-family: Arial, Helvetica, sans-serif; text-indent: -0.25in;">Laptop
Locks</strong><span class="apple-converted-space" style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">-
These cables are physically linked to the laptop, which are then linked to a
desk. A key is essential to unlock the cable and, although these cables can be
cut, instigating them on easily transferrable devices such as laptops may deter
an attacker from truly making the effort.</span></li>
<li style="text-align: justify;"><strong style="font-family: Arial, Helvetica, sans-serif; text-indent: -0.25in;">OS
Hardening</strong><span class="apple-converted-space" style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">- USB ports for drives and CD-R/DVD-R
drives should be restricted on all laptops/desktops so that files cannot be simply
copied and stolen by a malevolent user drifting around the office. NOTE: there
is still the issue of USB devices that are programmable keyboards in </span><a alt="ASP.NET software companies in india" href="http://www.ifourtechnolab.com/" target="_blank"><b>asp dot net companies in india.</b></a></li>
</ul>
<!--[if !supportLists]--><br />
<h3 style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><span style="font-size: 12pt; line-height: 115%;">Conclusion</span></b></span></h3>
<h3 style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif; font-size: small;"><span style="font-weight: normal; line-height: 115%;">Without strong physical security an organization
can use thousands of dollars on anti-virus, firewalls, and intrusion stoppage
systems only to have private data stolen by a careless error. Secure your
critical infrastructure. When physical security flops the only security we have
left is encryption.</span><span class="apple-converted-space"><span style="line-height: 115%;"> </span></span></span></h3>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-5466627665057910422016-04-26T03:37:00.000-07:002016-08-31T07:06:41.903-07:00Mobile Content Management Top 10 Considerations Part 2<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormalCxSpFirst" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software comapanies in india" src="https://2.bp.blogspot.com/-xZeBqoj7A4s/V8bkOIanAwI/AAAAAAAAAEc/p1vcooaNwDQ4M1ifGpndFWN7i8P-vxlUQCLcB/s1600/flagsfet.jpg" title="asp.net software comapanies in india" width="570" /></a></div>
<h3>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b></h3>
<h3>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b></h3>
<h3>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b></h3>
<h3>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b></h3>
<h3>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#5: </span><span style="color: #00b050;">File Sharing</span></span></b></h3>
</div>
<div class="MsoNormalCxSpFirst" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">If
an enterprise’s users need access to not only shared corporate documents, but
also their own work materials, business leaders should select a mobile content
management solution that allows both corporate and user content storage for </span><b style="font-family: arial, helvetica, sans-serif;">asp.net software comapanies in india</b><span style="font-family: "arial" , "helvetica" , sans-serif;">. With
user storage, users should be able to manage the content they create, both
through personal folders in the mobile application and through a web-based
self-service portal. Users will be familiar with this kind of management, which
is common among consumer file sync and share services.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><a href="http://www.air-watch.com/solutions/mobile-content-management/" target="_blank">AirWatch’s Secure Content Locker</a> Collaborate offers storage for both corporate and
user content. With the desktop client, users can synchronize content to and
from their desktop and mobile devices. Users can also share files and folders
with colleagues and other collaborators through the web-based portal.</span><b><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b><br />
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<h3>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#6: </span><span style="color: #00b050;">Editing And Annotating</span></span></b></h3>
</div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The
ability to collaborate via the </span><a href="http://www.kony.com/resources/glossary/mobile-content-management-system-mcms" style="font-family: arial, helvetica, sans-serif;" target="_blank">MCM interface</a><span style="font-family: "arial" , "helvetica" , sans-serif;"> is paramount for companies that
have remote or traveling workforces, or that share documents in the extended
enterprise. Collaboration tools should allow not only mobile viewing, so documents
can be accessed and viewed anywhere, but also mobile editing and annotating so
they can be updated on any device for </span><b style="font-family: arial, helvetica, sans-serif;"><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b><span style="font-family: "arial" , "helvetica" , sans-serif;">. Alternative file-sharing methods that lack
editing and annotating capabilities have been shown by an IDG survey to be
restrictive. The goal of an MCM solution should be enablement, rather than
restriction.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">More
and more employees today demand an in-the-office experience for file viewing
and editing from their mobile devices. And they should – the ROI for the
ability to perform work anytime, anywhere is tremendous. The ability to do so
conveniently via MCM is a significant incentive for employees to continue
working when they are traveling, during a weekday commute, or the moment an
email is received. MCM should enable employees to do more work more efficiently
from their mobile devices, while simultaneously protecting corporate interests
and preventing security breaches.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #00b050; font-size: large; line-height: 115%;"><br /></span></span></b>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#7: </span><span style="color: #00b050;">Keeping Data Costs Low</span></span></b></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Cost-conscious
companies will want to consider choosing a MCM system that allows
administrators to limit synchronization and downloading to Wi-Fi only. In other
words, updated files will sync to the mobile only when it is connected to a
Wi-Fi network. The ability to enable offline access on a per document basis is
also an important consideration if data costs are a concern for </span><b style="font-family: arial, helvetica, sans-serif;"><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c# .net software companies in india</a></b><span style="font-family: "arial" , "helvetica" , sans-serif;">.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">With
Secure Content Locker, administrators can limit synchronization and downloading
to Wi-Fi only and enable offline access on a per-document basis. These tools
are designed to enable a mobile workforce while keeping data costs low.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The
right mobile content management solution can help reduce a business’s operating
costs in more than one way. Implementing mobile content management increases
the ability to go paper free, or to significantly reduce paper consumption.
According to a recent AIIM research report, companies can reap tremendous
financial benefits by incorporating paper-free projects, such as MCM, into
their business improvement initiatives. The report, “Winning the Paper Wars,”
surveyed 562 information management professionals in organizations of all
sizes. Results indicated that 74 percent of survey respondents have business
improvement campaigns underway that would benefit from paper-free processes.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#8: </span><span style="color: #00b050;">Advanced Reporting</span></span></b></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Analytics
and reporting are essential for determining the success of a mobile content
management program. Administrators should be able to gauge how well, and how
much, their users are accessing and using content from mobile devices. The
ability to analyze use can help determine the success of a company’s mobile
content management initiatives, and even its mobility initiatives as a whole.
And showing that users are accessing and downloading files frequently can help
justify the expense of a mobility program for </span><b style="font-family: arial, helvetica, sans-serif;"><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies india</a></b><span style="font-family: "arial" , "helvetica" , sans-serif;">.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">All
device events, such as content downloaded, and console events, such as an added
content category, are recorded and can be viewed from the admin console. Air
Watch provides a complete audit trail for admin and user activities. IT
administrators can generate and export file and user activity reports, such as
how many times a file has been opened or which users have downloaded a
particular document.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#9: </span><span style="color: #00b050;">Role-based Administrative Controls</span></span></b></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The
most effective MCM solutions allow advanced administrative control options.
Centralized control is a key differentiator from consumer file sharing
applications. It enables IT administrators to access a simplified view of all
activity related to mobile content on a single screen. While most MCM vendors
include centralized controls, companies should also ensure they are purchasing
a multi-tenant system, which allows the administrator to manage access for
large groups of users. A system that integrates with existing active
directories will simplify group management even further.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Multitenancy
also allows the delegation of administrative control across internal groups
based on user role, so managers can manage user access rights and file
privileges for the groups of employees they manage. Empowering multiple
managers with administrative control is beneficial for several reasons.
Appropriately assigned administrators will ensure that management of the entire
workforce’s content is delegated among relevant leaders and not left in a
single IT administrator’s hands. Furthermore, a manager of a group of employees
will understand the content needs of his or her employees need better than the
IT administrator.</span><br />
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;"><br /></span></span></b>
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#10: </span><span style="color: #00b050;">A global, Scalable Solution</span></span></b></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Global
business is on the cusp of a mobile revolution, which offers companies a
tremendous opportunity to get ahead of the curve. The best mobility strategies
create empowerment without sacrificing security. And giving users access to
content is a key element in that strategy. If companies do not find a secure
way to get content devices, with a solution employees will use, research shows
they will find a way to do it themselves. Now is the time to give employees a
certified, compliant way for them to use these technologies for </span><b style="font-family: arial, helvetica, sans-serif;"><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp dot net software companies in india</a></b><span style="font-family: "arial" , "helvetica" , sans-serif;">.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The
future is bright for mobile empowerment. Beyond the ability to work from
anywhere, organizations will reap major benefits from access to broadcast
channels through MCM. Both synchronous and asynchronous content collaboration
will begin to proliferate among large organizations. But global businesses face
an additional challenge when it comes to MCM. A company’s scale can be a
challenge when implementing an MCM solution that will be used by multiple user
groups in multiple locations.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<o:p></o:p></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Courtesy: Priyank Patel</span></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-76220549336385250152016-04-26T03:29:00.000-07:002016-08-31T07:08:28.250-07:00Mobile Content Management Top 10 Considerations Part 1<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormalCxSpFirst" style="margin-bottom: 10.0pt; margin-left: 0in; margin-right: -4.5pt; margin-top: 0in; mso-add-space: auto; text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.software companies in india" border="0" src="https://3.bp.blogspot.com/-GC1-5T3xI7k/V8bkloQj1TI/AAAAAAAAAEk/6mg1R1Ieho84S6dA8x5bXqG-IRIZo_c5ACLcB/s1600/Cloud-File-Sharing-Integration-V4.png" title="asp.software companies in india" width="570px" /></a></div>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span><br />
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">In Forrester’s most
recent annual “Consumerization of IT” survey (as reported by Mobile
Enterprise), 40 percent of survey respondents reported using an unsupported
“bring your own” app or cloud service, such as personal email, file-sharing
service or video conferencing, for work of <b><a href="http://www.ifourtechnolab.com/" target="_blank">asp.software companies in india</a></b>. According to the Enterprise Storage
Forum, these tools are not a workable solution for enterprise because they
require employees to remember to upload files before leaving the central
office. Nonetheless, use of these applications is on the rise. While the
familiar user interfaces of these tools are convenient and appealing to the
user, most of them lack the software APIs, security and compliance features
that are necessary for protecting corporate interests, which an MCM solution
can provide. Data and documents that are stored in these services are outside
corporate IT’s control and will remain in the employee’s personal account even
after the employee leaves the company.<o:p></o:p></span></span></div>
<div class="MsoNormalCxSpMiddle" style="margin-bottom: 10.0pt; margin-left: 0in; margin-right: -4.5pt; margin-top: 0in; mso-add-space: auto; text-align: justify;">
<span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; line-height: 115%;">An enterprise-level
corporate file sharing program should mitigate all of these risks and allow
users to securely access corporate content through an encrypted tunnel. Access
should be managed and monitored at the enterprise level from a central console,
removing any threat of data loss for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b>. The right MCM solutions can also enable
greater efficiency, both in the mobile workforce and on premise, with features
such as data syncing and real-time updates across the enterprise.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin-bottom: 10.0pt; margin-left: 0in; margin-right: -4.5pt; margin-top: 0in; mso-add-space: auto; text-align: justify;">
<span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; line-height: 115%;">Along with each of these
points, readers will learn about the corresponding features in Air Watch’s
Mobile Content Management solutions, Secure Content Locker View and the more
advanced Secure Content Locker Collaborate. Air Watch has developed its Mobile
Content Management platform as one part of a comprehensive Enterprise Mobility
Management platform designed to help companies manage every aspect of mobility.</span></div>
<h3 style="text-align: justify;">
<b><span style="color: red; font-size: 12.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Mobile Content Management: Top 10 Consideration</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 1. User Friendliness<o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 2. Flexible Deployment Options <o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 3. Flexible Storage Options<o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 4. Enterprise-grade Security<o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 5. File Sharing<o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 6. Editing and Annotating<o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 7. Keeping Data Costs Low<o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 8. Advanced Reporting<o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 9. Role-based Administrative
Controls<o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"> 10. A Global, Scalable Solution<o:p></o:p></span></b></div>
<div class="MsoNormalCxSpMiddle" style="margin-bottom: 10.0pt; margin-left: 0in; margin-right: -4.5pt; margin-top: 0in; mso-add-space: auto; text-align: justify;">
<br /></div>
<h3 style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<b><span style="color: #00b050; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Consideration
#1: User Friendliness</span></span></b></h3>
<div class="MsoNormalCxSpMiddle" style="margin-bottom: 10.0pt; margin-left: 0in; margin-right: -4.5pt; margin-top: 0in; mso-add-space: auto; text-align: justify;">
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Over the last five years,
the information management industry has transformed from one that was
enterprise centric and complex to one that must cater to end users. Widespread
use of smartphones, tablets and apps has had a profound impact on corporate mobility
initiatives, especially content management. Employees have come to expect
simple, user-friendly apps for work purposes, just as they expect as consumers of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software company india</a></b>.
When organizations don’t offer adequate solutions for accessing content from
mobile devices, employees will find their own solutions, most often with
familiar, consumer-focused apps. These trends have forced mobile content
management to shift from an industry focused behind the firewall to one that
provides secure access to content via an intuitive user interface on any
device, anywhere.</span></span></div>
<div class="MsoNormalCxSpMiddle" style="margin-bottom: 10.0pt; margin-left: 0in; margin-right: -4.5pt; margin-top: 0in; mso-add-space: auto; text-align: justify;">
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">There are two key
elements of user friendliness that a mobile content management solution needs
in order to be successful. First, the MCM app should be intuitive and as easy
to use as a consumer alternative. Second, and perhaps most importantly, it
should provide features and functionality that provide users a clear business
advantage over consumer alternatives.</span></span></div>
<h3 style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#2: </span><span style="color: #00b050;">Flexible Deployment Options</span></span></b></h3>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<b><span style="color: #7030a0; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">BYOD
Deployment<o:p></o:p></span></span></b></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Effective mobile content
management today must balance meeting corporate needs with being convenient for
employees to use. In most cases, companies will want to offer a BYOD solution
for mobile content management so users can access content across devices and
platforms. It’s necessary, then, that the mobile content management solution
offers support for all major operating systems that are popular in a BYOD
setting. Mobile content management for BYOD can be deployed in two ways: as a
standalone app or through a workspace container solution. With Air Watch’s
Workspace, Secure Content Locker users can download email documents straight
into Secure Content Locker and open links straight into Air Watch Secure
Browser, so documents or their elements are never exposed to unmanaged apps.</span></span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<b><span style="color: #7030a0; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">MDM
Deployment <o:p></o:p></span></span></b></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Organizations with
corporate-issued devices should consider a mobile content management solution
that is integrated with existing MDM. An integrated solution will allow
seamless management of devices and content from a single console, so
administrators can avoid the hassle of managing content with a separate solution
requires administrators to sign into one console to manage devices and another
to manage content. Integrated solutions can also create a more seamless user
experience across corporate apps.</span></span></div>
<h3 style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#3: </span><span style="color: #00b050;">Flexible Storage Options</span></span></b></h3>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="color: #0d0d0d; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Business leaders should
opt for a solution that has the flexibility to have integration across file
repositories, so that all the existing repositories an organization is already
using – SharePoint, Google Drive, etc. – are accessible from mobile devices
within the mobile content repository of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies in india</a></b>. <o:p></o:p></span></span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; line-height: 115%;">In <a href="http://www.air-watch.com/solutions/mobile-content-management/" target="_blank">Secure Content Locker</a>,
Air Watch lists all the repositories in a menu bar – automatically assigned to
the user based on their credentials and access permissions set by IT so those
resources are made available to the user.</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; line-height: 115%;">There are two major
approaches in the mobile content storage space: on premise solutions and
enterprise grade cloud storage solutions. On-premise solutions tout the
security of local servers and play up the riskiness of storing data in the
cloud, while enterprise-grade cloud solutions attract customers with a model
that is similar to the consumer file sharing services that have already entered
into many corporate environments, often through the back door. Air Watch
supports both on premise and cloud storage options.</span></div>
<h3 style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><span style="color: #00b050; line-height: 115%;">Consideration
#4: </span><span style="color: #00b050;">Enterprise-grade Security</span></span></b></h3>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">A
recent <a href="http://www.aiim.ac.in/" target="_blank">AIIM</a> survey asked respondents which devices employees were using to scan
or capture corporate data. Fourteen percent of respondents reported that
employees accessed corporate data on smartphones or tablets with no app. A
combined 28 percent are using smartphones and tablets with a security-enabled
app. According to the report, “the 14 percent using smartphones and tablets
with no specific app are plainly running a considerable security risk that
scanned content will remain on the device.” Respondents cited encryption of
on-device files the most important security feature before allowing mobile
information capture. The AIIM report includes content creation on the device as
a part of the definition of mobile capture, in its widest sense for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c# dot net software companies india.</a></b><o:p></o:p></span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Encryption
of on-device files is an essential element of content security. But there are
many additional layers of security that should be considered. Perhaps the two
most essential are multifactor user authentication and the ability to
distribute files over an encrypted connection. Multifactor authentication using
existing corporate credentials may be the most effective and the easiest for
employees to remember. This is only possible with MCM solutions that integrate
with companies’ existing active directories. Encrypted connections ensure data
is protected not only at rest, but also in transit. Together, these features
will prevent anyone other than the designated user from being able to access
the content. A third essential feature is the ability to remotely wipe a device
of all corporate content.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Courtesy: Priyank Patel</span></div>
<div class="MsoNormalCxSpMiddle" style="margin: 0in 0in 10pt -4.5pt; text-align: justify;">
<o:p></o:p></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-4381281083749671782016-04-25T19:54:00.004-07:002016-09-01T23:03:01.534-07:00Firewall Features<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://1.bp.blogspot.com/-Tv2XbAdg4xg/V8kTIX2hHgI/AAAAAAAAAGE/2XIQy3J1n6UbHCfSyXaBLBwKvIF1NscfwCLcB/s1600/CFF.png" title="asp.net software companies in india" width="570px" /></a><a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><br /></a><a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><br /></a><a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><br /></a><a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><br /></a><a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><br /></a><a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><br /></a></div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;">Firewalls are the first line of defense between the
internal network and untrusted networks like the Internet.</span></i></b><span style="color: #7030a0;"> </span>You should think about firewalls in terms of
what you really need to protect for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>, so you will achieve the right level of
protection for your environment.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Firewalls
have been one of the most popular and important tools used to secure networks
since the early days of interconnected computers. The basic function of a
firewall is to screen network traffic for the purposes of preventing
unauthorized access between computer networks.</span></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
<b><span style="color: red; font-size: 12.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Firewall Features </span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Today’s
firewalls are expected to do much more than simply block traffic based on the
outward appearance of the traffic (such as the TCP or UDP port). As
applications have become increasingly complex and adaptive, the firewall has
become more sophisticated in an attempt to control those applications. You
should expect at least the following capabilities from your firewall. </span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #002060;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Application
Awareness </span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The firewall
must be able to process and interpret <span id="goog_85850554"></span><span id="goog_85850555"></span><a href="https://www.blogger.com/"></a>traffic at least from <b><a href="https://support.microsoft.com/en-us/kb/103884" target="_blank">OSI layers</a></b> three through seven of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>. At
layer three, it should be able to filter by IP address; at layer four by
port; at layer five by network sessions; at layer six by data type, and, most
significantly, at layer seven to properly manage the communications between
applications. </span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #002060;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Accurate
Application Fingerprinting </span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The firewall
should be able to correctly identify applications of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software company in india</a></b>, not just based on their
outward appearance, but by the internal contents of their network
communications as well. Correct application identification is necessary to
ensure that all applications are properly covered by the firewall policy
configuration </span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #002060;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Granular
Application Control </span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">In addition
to allowing or denying the communication among applications, the firewall
also needs to be able to identify and characterize the features of
applications so they can be managed appropriately for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies in india</a></b>. File transfer, desktop
sharing, voice and video, and in-application games are examples of
potentially unwanted features that the firewall should be able
to control. </span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #002060;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Bandwidth
Management (QoS) </span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The <b><a href="http://www.cisco.com/c/en/us/products/ios-nx-os-software/quality-of-service-qos/" target="_blank">Quality of Service (QoS)</a></b> of preferred
applications, which might include <b><a href="https://en.wikipedia.org/wiki/Voice_over_IP" target="_blank">Voice over IP (VoIP)</a></b> for example, can be managed through the firewall
based on real-time network bandwidth availability for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies india</a></b>. If a sporting event is
broadcast live via streaming video on a popular web site, your firewall
should be able to proactively limit or block access so all those people who
want to watch it don’t bring down your network. The firewall should integrate
with other network devices to ensure the highest possible availability for
the most critical services.</span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Courtesy: Sanika Taori</span></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-45496363238720765372016-04-25T19:46:00.001-07:002016-08-31T07:10:59.321-07:00Firewall Capabilities<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://3.bp.blogspot.com/-ImXyShdl5iM/V8blUavduEI/AAAAAAAAAEs/FUCC04zTcHIzYSLKT7pyWCUWqyfGeJyOACLcB/s1600/firewall.png" title="asp.net software companies in india" /></a></div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;">Modern
firewalls can do more than manage application communications and behaviors;
they can also assist in other areas of network quality and performance.</span></i></b>
Features vary by manufacturer and brand for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>, but you will probably find that you
can solve other problems in your environment with the same firewall you use to
secure network traffic.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Application and Website Malware Execution Blocking</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">In the old days (just a few years
ago), viruses required a user to click on some disguised link or button to
execute. If the end users were sophisticated enough to recognize the virus
writers’ tricks, these viruses wouldn’t get very far. Modern malware can
execute and spread itself without the intervention of end users of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b>. Through
automatic, browser-based execution of code (via ActiveX or Java, for example),
simply opening a web page can activate a virus. Adobe PDF files can also
transmit malware, due to their extensive underlying application framework.
Firewalls with advanced anti-malware capability should be able to detect these
“invisible” malware vectors and stop them in their tracks. They should also be
able to block the communication “back home” to a <b>Command and Control (CnC)</b> server once malware successfully implants
itself on a victim system and tries to reach back to its controller for
instructions.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Antivirus</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Firewalls that are sophisticated
enough to detect malware can (and should) block it on the network for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>. Worms that
try to propagate and spread themselves automatically on the network, and
malware that tries to “phone home,” can be stopped by the firewall, confining
their reach. Malware control solutions should be layered, and the firewall can
form an important component of a network-based malware blocking capability to
complement your organization’s endpoint antivirus software.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Intrusion Detection and Intrusion Prevention</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><a href="http://www.webopedia.com/DidYouKnow/Computer_Science/intrusion_detection_prevention.asp" target="_blank"><b>Intrusion Detection Systems (IDSs)</b> and <b>Intrusion Prevention Systems (IPSs)</b></a> which included in centralized
system. Firewalls can provide IDS and IPS capabilities at the network
perimeter, which can be a useful addition or substitution for standard
purpose-built intrusion detection and prevention systems, especially in a
layered strategy. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Web Content (URL) Filtering and Caching</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The firewall is optimally
positioned on the network to filter access to web sites (between an
organization’s internal networks and the Internet) of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies in india</a></b>. You can choose to implement
a separate URL filtering system or service, or you can get a firewall that has
the capability built-in. Today’s firewalls are demonstrating web content
filtering capabilities that rival those of purpose-built systems, so you may be
able to save money by doing the filtering on the firewall—especially if it
doesn’t cost extra.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">E-Mail (Spam) Filtering</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">As with <a href="https://en.wikipedia.org/wiki/Content-control_software" target="_blank">web content filtering</a>,
modern firewalls can subtract the spam from your e-mail messages before they
get delivered to your mail server. You can sign up for an external service or
buy a purpose-built spam filter instead, but with a firewall that includes this
capability, you have another option.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #002060; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Enhance Network Performance</span></span></b></h3>
<div style="text-align: justify;">
<span style="font-size: 11pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Firewalls need to be able to run at <b>“wire speed”</b>—fast enough to avoid
bottlenecking application traffic for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies in india</a></b>. They should be able to perform all the
functions that have been enabled without impacting performance. In addition,
firewalls should be able to allocate network bandwidth to the most critical
applications to ensure QoS, without sacrificing filtering functionality. As
firewall features continue to become more sophisticated, the underlying
hardware needs to keep up. If your network has a low tolerance for performance
impact, you’ll want to consider firewall platforms that are built for speed.</span></span><br />
<span style="font-size: 11pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="font-size: 14.6667px; line-height: 16.8667px;">Courtesy: Sanika Taori</span></span></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-52289404862812109662016-04-21T04:27:00.002-07:002016-08-31T07:12:44.200-07:00Ten Best Practices for Secure Software Development Part 2<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://1.bp.blogspot.com/-Yn9ts3E0OaU/V8blmOVp5UI/AAAAAAAAAE0/eKKJXofoJGwj11SaV0OsVlWKWxjYkUBZQCLcB/s1600/Secure-Software-Development-blog%2B%25281%2529.jpg" title="asp.net software companies in india" width="570" /></a></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;"><br /></span></span></b></h3>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #5: Know the Basic Tenets
of Software Security</span></span></b></h3>
<div style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">When it comes to secure software for <b><a alt="ecommerce solution providers in india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>,
there are some tenets with which the SSLP must be familiar. These basic tenets are: protection from
disclosure (confidentiality); protection from alteration (integrity);
protection from destruction (availability); who is making the request
(authentication); what rights and privileges does the requestor have
(authorization); the ability to build historical evidence (auditing); and the
management of configuration, sessions, and exceptions. Knowledge of these basic
tenets, and how they can be implemented in software, is of vital importance for
the SSLP. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #6: Ensure the Protection of
Sensitive Information</span></span></b></h3>
<div style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">In addition to ensuring that the
brand your customers trust is protected, it is essential that any sensitive
information be protected as well for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b>. Sensitive information refers to any
information upon which the organization places a measurable value. By
implication, this is information that is not in the public domain and would
result in loss, damage, or even business collapse should the information be
lost, stolen, corrupted, or in any way compromised. Sensitive information may
be personal, health, financial, or any other information that can affect the
competitive edge of your organization.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #7: Design Software with
Secure Features</span></span></b></h3>
<div style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The <a href="https://msdn.microsoft.com/" target="_blank">MSDN</a> article on “Lessons
Learned from Five Years of Building More Secure Software,”d under the heading
“It’s not just the code,” highlights that many software security
vulnerabilities are not coding issues at all but design issues. When one is exclusively focused on finding
security issues in code, that person runs the risk of missing out on entire
classes of vulnerabilities. Security issues in design and semantic flaws (ones
that are not syntactic or code related), such as business logic flaws, cannot
be detected in code and need to be inspected by performing threat models and
abuse cases modeling during the design stage of the SDLC.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #8: Develop Software with
Secure Features</span></span></b></h3>
<div style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Designing for security in
software is futile unless you plan to act on the design and incorporate
necessary secure controls during the development stage of your software
development lifecycle<span id="goog_1124397094"></span><span id="goog_1124397095"></span><a href="https://www.blogger.com/"></a> for <a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank"><b>c#.net software companies in india</b>.</a> It is imperative that secure features are not ignored
when design artifacts are converted into syntax constructs that a compiler or
interpreter can understand. Writing
secure code is no different than writing code that is usable, reliable, or
scalable.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #9: Deploy Software with
Secure Features</span></span></b></h3>
<div style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Most software development teams
would agree that, often, software that works without any issues in development
and test environments will start experiencing hiccups when deployed/ released
into a more hardened production environment. Post mortem analyses in a majority
of these cases reveal that the development and test environments do not
properly simulate the production environment. Fundamentally, this is a
configuration management issue. Changes made to the production environment
should be retrofitted to the development and test environments through proper
change management processes.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #10: Educate Yourself and
Others on How to Build Secure Software</span></span></b></h3>
<div style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The need to design, develop, and
deploy more secure software is evident
from the security incidents prevalent in the industry, and the plethora of regulations and privacy
requirements one needs to comply with .
The modus operandi of software today is the infamous release-and-patch
cycle for </span><b style="font-family: Arial, Helvetica, sans-serif;"><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" style="font-family: Arial, Helvetica, sans-serif;" target="_blank">c#.net software companies india</a></b><span style="font-family: "arial" , "helvetica" , sans-serif;">. To combat this vicious cycle of release-and-patch, there is a need for a
change – to create a culture that factors in software security from the very
beginning by default. Creating a security culture can be accomplished through
education. The National Institute of Standards and Technology (NIST) states
that education should cause a change in attitudes, which in turn will change
the organizational culture. In essence, this cultural change is the realization
that IT security is critical because a security failure has potentially adverse
consequences for everyone and, therefore, IT security is everyone’s job. Even
the most expensive security measures can be thwarted by people, and educating
people about software security is of paramount importance</span></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
<b><span style="color: red; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Conclusion</span></span></b></h3>
<div style="text-align: justify;">
<b><span style="color: red; font-size: 12.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The importance of educating
people and creating a culture that views software security as second nature is
crucial. The newest certification from (ISC), the <a href="https://www.isc2.org/csslp/default.aspx" target="_blank">Certified Secure SoftwareLifecycle Professional (CSSLPCM)</a>, is a step in that direction. Covering areas
that ensure security is considered throughout the entire software lifecycle,
the <a href="https://www.isc2.org/csslp/default.aspx" target="_blank">CSSLP</a> is created around the specific need for building security in the
software lifecycle.<o:p></o:p></span></div>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Software development involves various
stakeholders. Those tasked to build software securely must follow certain
directives. These “Ten Best Practices for a Secure Software Lifecycle
Professional” when followed will ensure that the SSLP build secure,
hackresilient, and compliant software. </span><o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Courtesy: Sanika Taori</span></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-11589867487105838672016-04-21T04:19:00.001-07:002016-08-31T07:15:24.299-07:00Ten Best Practices for Secure Software Development Part 1<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://3.bp.blogspot.com/-6BVDeLEvYuk/V8bmJcEVQHI/AAAAAAAAAE4/Bp0orymqaQolc1-PD52pQqfwJzj1bF4KwCEw/s1600/Open-Source-and-Agile-Software-Development-Slider%2B%25281%2529.jpg" title="asp.net software companies in india" width="570" /></a></div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;">The Need for Secure Software,
Software Assurance for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>: A Kaleidoscope of Perspectives, and Software Security:
Being Secure in an Insecure World, address the “Why”, “What” and “How-Tos” of
designing, developing, and deploying secure software. This whitepaper focuses
on the human element – the “Who” and will center around “The Ten Best
Practices” that a secure software lifecycle professional should follow to build
secure, hack-resilient, and compliant software.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: red;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">The Ten Best Practice</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
</div>
<ol>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Protect the Brand Your Customers Trust</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Know Your Business and
Support it with Secure Solutions</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Understand the Technology of
the Software</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Ensure Compliance to
Governance, Regulations, and Privacy</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Know the Basic Tenets of
Software Security</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Ensure the Protection of
Sensitive Information</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Design Software with Secure
Features</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Develop Software with Secure
Features</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Deploy Software with Secure
Features</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Educate Yourself and Others on How to Build
Secure Software</span></li>
</ol>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
<span style="font-size: large;"><b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Best Practice #1: Protect the Brand Your
Customers Trust</span></span></b></span></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The Harvard Business Review
special publication, “Breakthrough Ideas for 2008,”b listed “Cybercrime Service
Economy” as one of the top 20 transformations of the business world for <a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank"><b>asp.net software companies india</b>.</a> Scott
Berinato, Executive editor of CSO magazine, who contributed to the publication,
asserts that the new breed of hackers don’t just cause interruptions to a business,
but threaten it by undermining commercial confidence and customer trust. His
conclusion is noteworthy; in the event of cybercrimes, victims will look for
someone to be held responsible, and it will not be the hackers but the brands
that the victims trusted to protect them.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #2: Know Your Business and Support it with Secure
Solutions</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Most skilled security
professionals agree that, along with a strong background in technology, a
thorough understanding of the business is of paramount importance when it comes
to creating secure solutions for that business. Though some purist security
technologists may find it difficult to accept, it is nevertheless true that
security is there for the business and not the other way around. Security
exists to enable the business, not to be an impediment. The answer to the
question, “Why were brakes invented?” could be answered in two ways: to prevent
the vehicle from an accident, or to allow the vehicle to go faster. Security is
similar; it can prevent the business from a crash, or allow the business to go
faster.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #3: Understand the
Technology of the Software</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Not only is it critical to know
the business, but one must have a strong background in technology to be
effective in building or buying secure software fpr <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies in india</a></b> . A lack of understanding of the
technology used to build or buy software can lead to insecure implementations
of the software. When it comes to building the software in-house, a thorough
understanding of the existing infrastructural components, such as network
segregation, hardened hosts, and public key infrastructure, is necessary to
ensure that the deployment of the software will, first, be operationally
functional and, second, not weaken the security of the existing environment. In
other words, understanding the interplay of your current technological
components with the software you build and/or deploy will help determine the
impact on overall security. Further, understanding the technology used in
building software can help towards making decisions that favor security. As an
example, knowing that <a href="http://www.c-sharpcorner.com/uploadfile/puranindia/managed-code-and-unmanaged-code-in-net/" target="_blank">managed code</a> (.Net and Java) have less likelihood of
memory corruption and thus are less susceptible to overflow attacks than
<a href="https://en.wikipedia.org/wiki/Managed_code" target="_blank">unmanaged code</a> (C/C++), would help in choosing newer-generation managed code as
part of the coding standard to develop software.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: #00b050;"><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: large;">Best Practice #4: Ensure Compliance to
Governance, Regulations, and Privacy</span></span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">In this day and age, an industry
that is not regulated is more the exception than the norm as opposed to just a
few years ago when the industry that was regulated was the exception for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies india</a></b>. The increase in regulatory and privacy
requirements imposes a serious burden on organizations. Governance, Risk, and
Compliance (GRC) is not just an industry buzz phrase, but a reality and a means
toward meeting regulatory and privacy requirements. As a SSLP, one must
understand the internal and external policies that govern the business, its
mapping to necessary security controls, the residual risk from post
implementation of security controls in the software, and the evergreen aspects
of compliance to regulations and privacy requirements</span><o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Courtesy: Sanika Taori</span></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-697980519110106872016-04-20T05:01:00.001-07:002016-08-31T07:16:37.795-07:00Safety in Construction Site Part 2<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;">
<a href="http://www.ifourtechnolab.com/" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://3.bp.blogspot.com/-rG5QxmoXOrI/V8bmlVPYsdI/AAAAAAAAAE8/JNpYFDynSY8BqSNtjVtMdGuLP1STQoANgCLcB/s1600/AtkinsonConstruction_JobSite3.jpg" title="asp.net software companies in india" width="570px" /></a></div>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b><br />
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b>
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Equipment and Electricity<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-bidi-font-family: "Segoe UI";"><span style="font-family: "arial" , "helvetica" , sans-serif;">Lifting
Appliance and Gear</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not operate a lifting appliance unless trained in <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>. In the case
of a crane, </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">a certificate is required.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Before using lifting gear such as hook, shackle or chain sling, </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">check
whether there is any wear and tear.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Check the weight of the load to be lifted.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not exceed the safe working load of </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">a
lifting appliance or lifting gear.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Adopt the correct lifting method.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not use a lifting appliance or lifting gear </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">unless
it has been examined and certified</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">safe by a competent examiner.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not use a lifting appliance unless it </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">has been
regularly repaired and</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">maintained by a competent person.</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">No unauthorized repair is allowed.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Follow the safe working instructions </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">of the
manufacturer of a lifting appliance.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not work beneath any suspended load.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<span style="color: #333333; mso-bidi-font-family: "Segoe UI";"><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></span><b><span style="color: #333333; mso-bidi-font-family: "Segoe UI";"><span style="font-family: "arial" , "helvetica" , sans-serif;">Material
Hoist</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not ride on a material hoist of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b>.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not operate a material hoist without prior proper </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">training.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not exceed the safe working load of a material hoist.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not use a material hoist unless it has been examined </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">and
certified safe by a competent examiner.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not use a material hoist unless its gates have been </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">installed
with an effective interlocking safety system.</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">The hoist is only operable after all the gates
have been closed.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not use a material hoist unless it has been repaired </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">and
maintained by a competent person. No unauthorized</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">repair is allowed.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not put loose materials into recep</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">tacles
unless properly secured.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Ensure good communication with the operator of a material </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">hoist.
All signals should be understood and followed.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<o:p><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></o:p><b><span style="font-family: "arial" , "helvetica" , sans-serif;">Load shifting Machinery</span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Unless
you are a <a href="https://www.osha.gov/Publications/OSHA3252/3252.html" target="_blank">worker concerned</a>,</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> do not work in an area where a loader, an excavator, etc. is
in operation.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not operate any loadshifting</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> machinery without training and approval.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Operators
of forklift trucks,</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> bulldozers, loaders, excavators, trucks or lorries should
possess appropriate certificates.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<o:p><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></o:p><b><span style="color: #333333; mso-bidi-font-family: "Segoe UI";"><span style="font-family: "arial" , "helvetica" , sans-serif;">Portable
Power Tool</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not use a <a href="https://en.wikipedia.org/wiki/Power_tool" target="_blank">portable power tool</a> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">(such as saw, grinder and
drill)</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">unless
its dangerous parts have been effectively guarded.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Place the electric cable and </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">hose of a tool at an appropriate</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">position
to avoid tripping</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">hazards</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<span style="color: #333333; mso-bidi-font-family: "Segoe UI";"><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></span><b><span style="color: #333333; mso-bidi-font-family: "Segoe UI";"><span style="font-family: "arial" , "helvetica" , sans-serif;">Cartridge-operated
Fixing Tool</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not operate a cartridge-operated </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">fixing
tool unless you have</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">possessed a valid certificate <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies in india</a></b>.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear suitable eye and ear </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">protectors while operating a</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">cartridge-operated
fixing tool.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Use a cartridge-operated fixing tool </span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">with
great care.</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif;"> </span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Compressed Air</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Use
compressed air only for specified</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> purposes.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use any compressed air</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> equipment, pipes and relevant devices unless they are of
good construction and have been examined and certified safe by a competent
examiner before use.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Fix
the connectors properly.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not twist the pipes.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not abuse the use of compressed air</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> for cleaning purpose. Use a brush or a vacuum
cleaner to remove dust from clothing and skin.</span><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Electric Tool</span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Before
using</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
an electric tool, check the tool and its plug and connecting cable.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use a damaged tool.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use an electric tool unless</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> its connecting cable is well protected.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use an electric tool unless</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> its metal casing is earthed and its</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Power supply is provided with an earth leakage circuit
breaker.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not repair or alter any electrical</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> installation unless competent to do so.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">If
you meet any fault or problem, report</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> it to your supervisor immediately.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<v:shape id="Picture_x0020_19" o:spid="_x0000_s1040" style="height: 135.4pt; left: 0px; margin-left: 1.75pt; margin-top: 368.45pt; position: absolute; text-align: justify; visibility: visible; width: 113.45pt; z-index: 251668480;" type="#_x0000_t75">
<v:imagedata o:title="" src="file:///C:\Users\Abhi\AppData\Local\Temp\msohtmlclip1\01\clip_image004.emz"><span style="font-family: "arial" , "helvetica" , sans-serif;">
<w:wrap anchorx="margin" anchory="margin" type="square">
</w:wrap></span></v:imagedata></v:shape><b><span style="font-family: "arial" , "helvetica" , sans-serif;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<v:shape id="Picture_x0020_16" o:spid="_x0000_s1039" style="height: 109.05pt; left: 0px; margin-left: 1.75pt; margin-top: 231.45pt; position: absolute; text-align: justify; visibility: visible; width: 122.65pt; z-index: 251667456;" type="#_x0000_t75">
<v:imagedata o:title="" src="file:///C:\Users\Abhi\AppData\Local\Temp\msohtmlclip1\01\clip_image005.emz"><span style="font-family: "arial" , "helvetica" , sans-serif;">
<w:wrap anchorx="margin" anchory="margin" type="square">
</w:wrap></span></v:imagedata></v:shape></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Workplace Safety and Fire Prevention</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-bidi-font-family: "Segoe UI";"><span style="font-family: "arial" , "helvetica" , sans-serif;">Excavations</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-bidi-font-family: "Segoe UI";"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Keep the fence on all sides of </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">an excavation intact.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Use safe access for ingress </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">and egress.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not pile soil or any other </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">materials at the edge
of an</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">excavation.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Make sure that a trench is </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">securely shored before</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">working
in it.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b style="text-indent: -0.25in;"><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Gas Welding and Flame Cutting</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use the equipment of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies india</a></b> for gas welding</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> or flame cutting unless you have attained the age of
18 years and hold a valid certificate.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use a</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">ny
gas cylinder unless it has been fitted with flashback arrestors.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear
personal protective equipment.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Keep
the workplace clean.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Place
fire extinguishers</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> within reach.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Keep
gas cylinders in an</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> upright position and secure it properly to avoid overturning.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">If
gas leakage is detected,</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> report it to your supervisor immediately.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Fire Risk</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif;">There is always a fire
risk. However, the chances of fire can be reduced, and you will know what to do
when a fire breaks out if you:</span></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"></span></div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Always
keep the workplace clean</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> and tidy.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Handle
machinery and tools that</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> may generate sparks or heat carefully.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not smoke or use naked</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> flames in any area where flammable and explosive substances are
stored.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Know
where fire extinguishers are</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> located and how they are used.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Know
the place of assembly for</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> fire evacuation.</span><b><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></b></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Public Safety</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Pay
attention to public safety.</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> Members of the public are often unaware of or do not understand
the work carried out on construction sites and the risks involved.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Take
great care to prevent the fall</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> of materials from height.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not stack materials on floor</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> edges or on scaffolds.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></span></b><b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Waste Disposal</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Dispose all wastes, and unwanted materials must be disposed
of at a designated place.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Notify
your supervisor of the</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> requirement for the separate disposal of chemical or
inflammable wastes.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not leave planks with nails</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> on passageways.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Safety Supervisors</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Their
responsibility is to assist</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> others to work smoothly and safely.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">They
have received specific</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> safety training and are important members of the construction
team.</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">They
have legal responsibility</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> or liability for the overall safety of the construction site.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">You
should get to know your</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> safety supervisor.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoListParagraph" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-line-height-alt: 8.6pt; mso-list: l2 level1 lfo14; text-align: justify; text-indent: -.25in;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #333333; font-size: 11.0pt;"><br /></span></span></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; font-size: 14.0pt;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Personal Safety and
Hygiene</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Eye Protection</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">A
wise worker of <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp dot net companies in india</a></b> will certainly take</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> good care of his eyesight.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">A
small fragment may cause</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> serious consequences if it enters one's eyes.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">When</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> there is a risk of eye
injury, such as in concrete breaking or using abrasive wheels, you should wear
suitable eye protectors.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Take
proper care of the eye</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> protectors provided to you.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Replace
damaged or defective</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> eye protectors immediately.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Ensure
that eye protectors are comfortable to wear, and keep clean.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Use
eye protectors for eye protection ─ do not put it on your head</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> or hang it on your
neck</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Bear
in mind that eye protectors are replaceable, but not your eyes</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">.</span></li>
</ul>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Noise</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear
ear protectors in ar</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">eas with high noise levels.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Properly
wear ear protectors</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> according to the manufacturer's instructions.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not reuse disposable ear</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> plugs.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Clean
ear protectors regularly</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></span></b><b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Personal Protective Equipment</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">For
your own safety and interest, use the personal</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> protective equipment provided by your employer.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear
gloves when handling or contacting</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> chemicals.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Remember
to wear a mask when working</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> in a dusty environment.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear
eye and ear protectors whenever</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> necessary.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear
a safety harness and secure it to</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> a safe anchorage point when working at height. A
bamboo scaffold is not a safe anchorage point, so do not fasten the safety
harness to it.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear
safety shoes to prevent foot injury.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Consult
your supervisor if in doubt</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></span></b><b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">First Aid</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">If
you sustain an injury or</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> feel not well while at work, even if it is minor, go to the
first aid room right away for medical treatment and notify your supervisor.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Put
the case on record</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></span></b><b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Safety Helmet</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear
a safety helmet on a</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> construction site.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Keep
the harness of th</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">e helmet clean and make sure that it fits well.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not drill any holes on the</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> helmet or use it for pounding.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></span></b><b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Manual Handling Operations</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Avoid
manual handling operations as far as</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> possible to minimize the risk of injury.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Estimate
the weight of the load.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Lift
an o</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">bject
with a correct posture.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear
suitable protective equipment.</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> Put on gloves as far as possible to protect your hands from any
cut, scratch or puncture, and wear safety boots or shoes to prevent injury to
toes by heavy falling objects.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Seek
assistance from someone</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> in lifting a load if necessary.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></span></b><b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Personal Hygiene</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Ke</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">ep yourself clean.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wash
hands before meals</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> and after using the toilet.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Dress
tidily and in protective</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> clothing.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b><span style="color: #333333; mso-ascii-font-family: Calibri; mso-bidi-font-family: "Segoe UI"; mso-hansi-font-family: Calibri;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Alcohol and Drugs</span></span></b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not drink alcohol, or take</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> drugs, while at work.</span></li>
<li style="text-align: justify;"><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">If
you need to take drugs due</span><span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> to illness, report it to your supervisor.</span></li>
</ul>
<div style="text-align: justify; text-indent: -24px;">
<span style="color: #333333; font-family: "arial" , "helvetica" , sans-serif;"> Courtesy: Sanika Taori</span></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-57265661157992805562016-04-20T04:23:00.002-07:002016-08-31T07:18:07.244-07:00Safety in Construction Site Part 1<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://4.bp.blogspot.com/-GvPN8nt-kJ4/V8bm7W9GZXI/AAAAAAAAAFE/6q1zQXgjbL0KwOZJGJCkPC-s3ot8i2NswCLcB/s1600/Construction-Safety-small.jpg" title="asp.net software companies in india" width="570px" /></a></div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Most accidents can be
prevented by taking simple measures or adopting proper working procedures for <b><a alt="asp.net software companies in india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b> . This
article is intended to outline important issues on safety and health that
should be paid attention to on construction sites for easy reference by the
workers. If we work carefully and take appropriate safety measures, there will
definitely be fewer work injury cases, and our sites will become a safe and
secure place to work in. <o:p></o:p></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><a href="http://www.legislation.gov.hk/blis_pdf.nsf/CurAllEngDoc/9198BE222266C421482575EF0012128E/$FILE/CAP_509_e_b5.pdf" target="_blank">The Occupational Safetyand Health Ordinance</a>, which came into operation on 23 May 1997, covers most
workplaces in order to protect the safety and health of employees at work.
Other legislation applicable to construction sites includes the Factories and
Industrial Undertakings Ordinance and its subsidiary legislation, particularly
the Construction Sites (Safety) Regulations.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Employee’s Responsibilities <o:p></o:p></span></b><br />
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Employees should
cooperate in <b><a alt="asp.net software companies india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b> with their employers and other persons in complying with the safety
legislation and guidelines, and should not do anything to endanger themselves
and other persons.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-size: 14.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Basic Rules for Safety<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-size: 14.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Tidy up construction sites</span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Keep passages clear all the time.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Sort out materials and pile them up safely. The
stacks should no</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">t be too
high.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Beware of floor openings and ensure that they are
fenced or covered.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Remove refuse as soon as possible.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Provide sufficient lighting.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Familiarize with the location and the operation of
fire-fighting equipment.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Safety measures</span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Before</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> you operate a machine, ensure that the dangerous part of the
machine has been installed </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">with a guard.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Avoid going to any area with insufficient lighting as
there may be some </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">dangerous
places which </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">have not been provided with fencing.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Keep vigilant all the time and watch out for moving
cranes, hooks or </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">other
lifting equipment.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Before you use any electrical installation or tool,
check the condition of </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">its
electric cables.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Avoid dragging electric cables on the ground or allowing
the</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> cables to come into
contact with </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">water.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Use electrical tools installed with an earth leakage
circuit breaker.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Use and handle chemicals with care.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Personal Safety</span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Wear protective equipment.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not drink or take drugs while working.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Pay attention </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">to personal hygiene.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do not play in the workplace.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Report to your supervisor immediately if you notice
any unsafe condition.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-size: 14.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Emergency Response to
Accidents<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-size: 14.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">You should have a good
understanding of your working environment of <b><a alt="c#.net software companies in india" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies in india</a></b> and the instructions given by your
supervisor. When evacuation is required in an emergency, you should keep calm
and find out:</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">What
dangerous situation the alarm refers to.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">The
routes for evacuation.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">The
s</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">afe place that you
should go to as designated by the company</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">When someone is found
seriously injured, you should:</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Keep
calm.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Seek
help immediately.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Accompany
the injured person.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Assist
in the immediate rescue work as far as possible.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Call
the site </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">safety staff.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not tamper with the accident scene while waiting for the arrival </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">of the investigation team.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">When a fire breaks out,
you should remember:</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Put
out the fire with a fire extinguisher if it is a small fire.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">If
the blaze is out of control, do not try to extinguish the fire on your </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">own. Call the Fire Services
Department right away.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><a href="https://en.wikipedia.org/wiki/Emergency_telephone_number" target="_blank">Emergency telephonenumbers</a>:</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Always
pay attention to the eme</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">rgency
telephone numbers posted on the notice board in the site office.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-size: 14.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Tips for Workplace
Safety<o:p></o:p></span></span></b><br />
<b><span style="font-size: 14.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Falsework<o:p></o:p></span></b><br />
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">If you are engaged in
falsework operation of <b><a alt="c#.net software companies india" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies india</a></b>, you should:</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Check
whether the falsework is </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">erected
in accordance with the design.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Make
sure that the falsework is </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">securely
erected.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Check
whether the struts of the </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">falsework
are secure.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Ensure
that the props are erected </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">vertically
and arranged at a</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">suitable distance in a
row.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Report
to your supervisor when </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">any
unsafe situation is found</span><span style="font-family: "arial" , "helvetica" , sans-serif; font-size: 11pt; text-indent: -0.25in;">.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Scaffold<o:p></o:p></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use scaffolds unless they have </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">been erected by trained workmen
and under</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">the supervision
of a competent person.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use a scaffold unless it has </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">been inspected and certified safe
by</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">a
competent person before use.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Strictly
follow the instructions of a </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">competent person. Do not alter the</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">scaffold
unless authorized to do so.</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not work on an unfinished scaffold.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">When
it is necessary to work on a mobile </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">scaffold, lock the wheels of the
scaffold</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">before you
start working.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not work on a scaffold unless it has been </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">provided with a suitable working
platform.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Fencing</span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not work in a dangerous place </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">unless
its floor edges and</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">openings have been
installed with secure fencing.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">If
you notice any dangerous places </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">that have not been installed with</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">fencing or the fencing has
been</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">damaged, reinstall or
repair the</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">fencing. If this is beyond
your</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">capability, inform your</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">supervisor at once.</span></li>
</ul>
<div class="MsoListParagraph" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in; mso-layout-grid-align: none; text-align: justify; text-autospace: none;">
<br /></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
<b style="font-family: Arial, Helvetica, sans-serif;">Ladder</b></div>
<div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 8.6pt; text-align: justify;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Use
a ladder which is of good construction,</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> sound material and adequate strength.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Examine
the ladder before using it</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
and inspect it at regular intervals.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Place
the ladder on a level and</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
firm footing.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Place
the ladder at an app</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">ropriate
angle.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Ensure
that the ladder has a</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
sufficient length. The upper end of the ladder should be at least 1 meter above
the landing against which the ladder leans.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Do
not use a ladder unless its</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
upper or lower end has been securely fixed or secured by another worker.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">If
there are electrical installations</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;"> nearby, do not use metal ladders.</span></li>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">If
work is carried out 2 meters or</span><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">
more above the floor, use a suitable working platform.</span></li>
</ul>
<div style="text-indent: -24px;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
</div>
<div style="text-indent: -24px;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"> Courtesy: Sanika Taori</span></div>
</div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-3377448401392145172016-04-19T04:05:00.000-07:002016-09-01T23:08:17.497-07:00Information Security Processes<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://1.bp.blogspot.com/-qNK2DInx39k/V8fTiG3q6JI/AAAAAAAAAFw/zDLEyujieswMuIct-7tkoGyVdP-C9P7fQCLcB/s1600/sss.jpg" title="asp.net software companies in india" width="570" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<h2 style="text-align: justify;">
</h2>
<h2 style="text-align: justify;">
Five Ways to Future-Proof Information Security
Processes</h2>
<div class="MsoNormal" style="text-align: justify;">
<!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600"
o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f"
stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Picture_x0020_1" o:spid="_x0000_s1026" type="#_x0000_t75"
style='position:absolute;margin-left:-31.5pt;margin-top:-63.75pt;width:427.5pt;
height:300pt;z-index:-251657216;visibility:visible;mso-wrap-style:square;
mso-wrap-distance-left:9pt;mso-wrap-distance-top:0;mso-wrap-distance-right:9pt;
mso-wrap-distance-bottom:0;mso-position-horizontal:absolute;
mso-position-horizontal-relative:text;mso-position-vertical:absolute;
mso-position-vertical-relative:text'>
<v:imagedata src="file:///C:\Users\Abhi\AppData\Local\Temp\msohtmlclip1\01\clip_image001.jpg"
o:title="analytics-600x300-1406834069"/>
<w:wrap type="tight"/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]-->From DDoS to IP
theft, cyber-attacks are taking their toll on organizations.<span style="mso-spacerun: yes;"> </span>Realizing the potential impact to the bottom
line, the business is increasingly ready to participate in managing cyber
risks for <b><a alt="asp.net software companies in india" href="http://www.ifourtechnolab.com/">asp.net software companies in india</a></b>. According to the <a href="http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey.html" target="_blank">Global State of Information Security</a>® Survey 2014,
leading organizations are “enhancing security capabilities in ways that show
security is now a business imperative—not just an IT challenge.” The survey
reveals average losses from incidents are up 18% over last year, with big
liabilities increasing faster than smaller losses. More proactive cyber risk
management is required in order for organizations to innovate and prosper.<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
If the business is ready to be part of the security
equation for <b><a alt="asp.net software companies india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b>, what’s the game plan for security teams? They need to establish
formalized, consistent security processes that will integrate into critical
business processes. Security teams will have to work closely with the business
to establish goals, educate on risks, and communicate solutions. It requires an
understanding of how information is used in conducting business and the best
way to protect critical business processes end-to-end.<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
The <a href="https://www.sba.gov/sbic" target="_blank">SBIC</a> has been championing the need for businesses to
proactively manager cyber risk for some time now for <b><a alt="asp.net software company india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software company india</a></b>. Our latest report is focused
on optimizing security processes and draws attention to that fact that the ad
hoc processes from the days of checklist compliance and perimeter-based
security won’t work to manage today’s cyber risks.<span style="mso-spacerun: yes;"> </span>The report – Future-Proofing Processes –
highlights some of the most problematic outcomes of outdated security
processes:<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal">
</div>
<ul style="text-align: left;">
<li style="text-align: justify;">Using technical terms for risk measurement makes advising
business leaders difficult</li>
<li style="text-align: justify;">Cumbersome manual methods for tracking risks are not
business-friendly</li>
<li style="text-align: justify;">Point in time piecemeal control assessments are no longer
sufficient</li>
<li style="text-align: justify;">The system for third-party security assessments and
oversight needs fixing – fast</li>
<li style="text-align: justify;">Headway needs to be made towards meaningful collection and
analysis of threat data</li>
</ul>
<div style="text-align: justify;">
<o:p></o:p><br /></div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><span style="margin-left: auto; margin-right: auto;"><a href="http://www.ifourtechnolab.com/" target="_blank"><img alt="c#.net software companies in india" border="0" height="200" src="https://3.bp.blogspot.com/-_cF-S_3_yQc/VxYPLVjmWsI/AAAAAAAAABk/DS5ub2lw9hAzTFRwNekpreY6kJmtYRBVACLcB/s400/merger.jpg" title="c#.net software companies in india" width="400" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><a href="http://www.ifourtechnolab.com/" target="_blank">Ways to future proof info sec processes</a></td></tr>
</tbody></table>
<br />
The report’s five recommendations provide guidance on how to
update existing processes for <b><a alt="c#.net software companies in india" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies in india</a></b>, design key new processes, and upgrade techniques to
help move information security programs forward. They include:<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal">
</div>
<ul style="text-align: left;">
<li style="text-align: justify;">Shift Focus from Technical Assets to Critical Business
Processes – start documenting processes and think about how to protect the most
critical business processes from end-to-end</li>
<li style="text-align: justify;">Institute Business Estimates of Cybersecurity Risks –
develop scenarios estimating the likelihood and impact of incidents and hone
techniques to quantify risks by projecting monetary losses</li>
<li style="text-align: justify;">Establish a Business-Centric Risk Assessment Process – use
automated tools for tracking risks and hold the business accountable.</li>
<li style="text-align: justify;">Set a Course for Evidence-Based Controls Assurance – collect
relevant data to test the efficacy of controls on an on-going basis for both
internal and 3rd party assessments.</li>
<li style="text-align: justify;">Develop Informed Data-Collection Methods – Examine the types
of questions data analytics can answer then build a set of data use cases</li>
</ul>
<div style="text-align: justify;">
<o:p></o:p><br /></div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<o:p></o:p></div>
<w:sdt contentlocked="t" id="89512093" sdtgroup="t"><span style="font-family: "calibri" , sans-serif; font-size: 1pt;"><w:sdtpr></w:sdtpr><w:sdt docpart="49DF09E64BAF4839966AD6B4F6634872" id="89512082" storeitemid="X_5F329CAD-B019-4FA6-9FEF-74898909AD20" text="t" title="Post Title" xpath="/ns0:BlogPostInfo/ns0:PostTitle"></w:sdt></span>
</w:sdt>
<br />
<div class="MsoNormal" style="text-align: justify;">
As information security teams for <b><a alt="asp dot net software company india" href="http://www.ifourtechnolab.com/" target="_blank">asp dot net software company india</a></b> face greater demands and
elevated expectations, a fresh look at key processes can be an enabler for
positive change. We’re confident that this latest guidance can help your
organization zero in on processes that deserve some attention.<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
Courtesy: Aagam Shah</div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-31298155322870093972016-04-18T07:15:00.002-07:002016-09-01T23:10:01.893-07:00Personl Quality Management with Personal Software Process Part 2<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies in india" border="0" src="https://3.bp.blogspot.com/-SyBbyQ7OnSo/V8kXcYsyufI/AAAAAAAAAGU/AuhGFLHW1FUGHGy0AK_c9-KrkcL0rgCiwCLcB/s1600/hands.jpg" title="asp.net software companies in india" width="570px" /></a></div>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Career Enhancement by Reducing
Both Costs and Defects</span></b></h3>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">As professionals, we Software Engineers must assume responsibility for
the quality of the products we produce for <b><a alt="asp.net software companies in india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>. Our employers pay us for producing not
just software, but good software, high-quality software.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The quality assurance organization cannot be thought of as the people
who are responsible for quality. Indeed, of all members of the organization,
they are in the position that is least able to affect the quality of the
product. Testing and other QA activities can detect defects and make sure that
they are removed, but quality cannot be tested into the product at the end.
Quality must be built in or it will be absent. Therefore, the software
engineers are the ones who have the most direct impact on the quality of the
product of <b><a alt="asp.net software companies in india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">It is easy to lose sight of the tremendous costs that defects cause
for our employers. Integration and system test can account for 50% of
development time (and most of that time is spent in remediation and re-testing
to eliminate the scores of defects that are commonly found). Then post-release
defect mitigation and removal can cost more than the original development
effort (including testing)! Supporting customers, investigating problems and
releasing patches consume huge amounts of time and effort. And the cost of
defects in loss of customer good will and market image goes beyond even that.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Defect removal costs escalate with each passing lifecycle phase.
Different people have estimated different costs at the various phases, but they
tend to agree that the costs rise (possibly even exponentially) with each
passing phase. Regardless of the specific numbers one might cite, the cost
escalation is obvious from the fact that we talk about removing "defects
per hour" before Integration, and spending "hours per defect"
during and after Integration.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Your value to your employer will be enhanced by your ability to
produce salable (or usable) software at a minimum cost. Although the early
defect detection and prevention methods we will discuss all have costs
associated with them, they are demonstrably less expensive than removing the
same defects later in the software lifecycle. So you can reduce costs through
defect prevention and early defect removal, while at the same time producing
more salable or usable software with fewer delivered defects. You enhance your
career and value to your employer by exercising professional responsibility and
managing your own quality.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Quality of Work-Life Issues</span></b></h3>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Practitioners of Personal Quality Management have also found that it
has a positive impact on the quality of their work-life.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Most of us went into programming because we enjoy building things and
seeing the results of our labor for <b><a alt="c#.net software companies india" href="http://www.ifourtechnolab.com/" target="_blank">c#.net software companies india</a></b>. We like the challenge of figuring out how to
attack a problem, of designing the structures and algorithms that will get the
job done, and even of writing the code to make it all happen. And we like to
see the fruit of our labor integrated into a system that meets people’s needs
or provides an important service.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">But between the coding and use, there is a long and (for most of us)
painful time of fighting our way past defect after defect. It starts with the
compiler leading us around by our noses, complaining about every little typo
and syntax error, and often totally misinterpreting what the code was supposed
to say. Then after achieving a clean compile, we try over and over again to get
the program to do the right thing. It loops, it hangs, it crashes; and now the
debugger is the thing that is dragging us around by the nose. For each problem
we fix, there seems always to be another one lurking in the shadows. And even
more frustrating is that too often our fix was the cause of the ensuing
problem!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">But releasing the software doesn’t end this frustration. Right when
we’re in the middle of designing the next interesting program, we get
interrupted to fix a latent problem. There is a fuming customer and an unhappy
boss, so we must drop everything to make an emergency fix. And to add insult to
injury, the interruption of our design work is likely planting the seeds for
future problems and their interruptions and frustrations.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Personal Quality Management allows us to gain control over defects.
Instead of being ruled by the defects in our software, we can gain the upper
hand. We can understand them, find them, remove them earlier and even avoid
them altogether. That means that we will spend a much greater proportion of our
time on the tasks we enjoy, and less on the problems we missed. That is a
significant improvement in our work-life!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Bibliography</span></b></h3>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<ol>
<li><a href="http://www.askprocess.com/consult/quality.html" style="font-family: Arial, Helvetica, sans-serif; font-size: 11pt; font-weight: normal;">http://www.askprocess.com/consult/quality.html</a></li>
<li><a href="http://en.wikipedia.org/wiki/Personal_software_process" style="font-family: Arial, Helvetica, sans-serif; font-size: 11pt; font-weight: normal; text-indent: -0.25in;">http://en.wikipedia.org/wiki/Personal_software_process</a></li>
<li style="text-align: justify;"><span style="text-align: left; text-indent: -0.25in;"><span style="color: #0070c0; font-size: 11pt; font-weight: normal; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">http://www.methodsandtools.com/archive/archive.php?id=60</span></span></span></li>
</ol>
</h3>
<div class="MsoListParagraph" style="margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -.25in;">
<span style="text-indent: -0.25in;"><br /></span></div>
<div class="MsoListParagraph" style="margin: 0in 0in 0.0001pt 0.5in; text-align: justify; text-indent: -0.25in;">
<span style="text-indent: -0.25in;">Courtesy : Sanika Taori</span></div>
<div class="MsoListParagraph" style="margin: 0in 0in 0.0001pt 0.5in; text-align: justify; text-indent: -0.25in;">
<u style="text-align: left;"><span style="color: #0070c0; font-size: 11pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></u></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-46894561054179455832016-04-18T07:04:00.000-07:002016-08-31T23:54:42.988-07:00Personl Quality Management with Personal Software Process Part 1<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software companies india" border="0" src="https://2.bp.blogspot.com/-9QWZNecCarQ/V8fQKgHzvxI/AAAAAAAAAFU/ZET0onRbFn4S2X1zYUL5BzEp65z_39xlgCLcB/s1600/WordItOut-word-cloud-1819484.png" title="asp.net software companies india" width="570px" /></a></div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Software development organizations have a variety of mechanisms at
their disposal to help in managing and improving the quality of the products
they produce for <b><a alt="asp.net software companies in india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>. Quality Assurance organizations, problem reporting systems,
software process improvement and peer reviews (to name just a few) are
important tools for product quality enhancement. But an often-overlooked piece
of the quality puzzle may well provide the most effective means to improve
product quality: the individual software engineer.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">After a short introduction to what the Personal Software Process (PSP)
is, we will highlight the ways in which individual engineers (and their
organizations) can benefit from adding the PSP’s Personal Quality Management
techniques to their professional repertoires. We will take a brief look at the
benefits that have been achieved by those who have already learned to apply
these principles in their work for <b><a alt="asp.net software companies india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b>. Then we will examine in more detail the
specific activities PSP-trained engineers engage in to manage the quality of
the software they produce. We will look at everything from simple defect
logging, to personal and peer reviews, to developing a personal quality plan
and using it to guide your work.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">What is the PSP?</span></b></div>
<div style="text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></b></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The concepts and activities discussed in this article are the quality
management aspects of the <a href="https://en.wikipedia.org/wiki/Personal_software_process" target="_blank">Personal Software Process</a> (PSP) developed by Watts S.
Humphrey of the <a href="http://www.sei.cmu.edu/" target="_blank">Software Engineering Institute</a> (SEI).</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The PSP is more than just training; it is a boot camp consisting of
about 40 hours of classroom instruction, 10 programming assignments, and 3
data-analysis exercises, requiring a total of about 150 hours for the average
programmer to complete for <b><a alt="asp.net software company in india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software company in india</a></b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The result of the PSP boot camp is that the programmers don’t just
learn about good processes, they actually improve their own processes, measure
the effects of those process changes, quantify the benefits they have
experienced, and set goals for further improvements. The PSP achieves these
results by leading students through three steps.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">In PSP step0, they lay a simple foundation for the learning to come:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
</div>
<div style="text-align: left;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Following
simple process scripts,</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Collecting
three basic measures of their work (time spent, size of products produced, and
defects corrected), and</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Performing
a simple post-project analysis.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">In PSP step1, they begin to build the capability to plan and manage
their own work, setting the stage for Personal Quality Management:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
</div>
<div style="text-align: left;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Following
a defined project planning process,</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Using
their own prior data to make increasingly more accurate estimates for each
programming assignment, and</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Planning
their work at a level of detail that allows them to track and manage their
progress.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">In PSP step2, they focus on achieving significant quality improvements
by learning how to engage in Personal Quality Management:</span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
</div>
<div style="text-align: left;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Using
their prior data to plan for incremental improvements in the quality of their
programs,</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Removing
defects early using personal review techniques guided by their own prior defect
performance, and</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Identifying
and capitalizing on defect prevention opportunities in their program design and
implementation methods.</span></li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Those who complete the PSP boot camp emerge with the knowledge and
skills to make accurate plans, work to those plans, and produce superior
quality products.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><span style="font-family: "arial" , "helvetica" , sans-serif;">T</span></b><b><span style="font-family: "arial" , "helvetica" , sans-serif;">he Motivation for Personal
Quality Management</span></b></span></h3>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Most programmers have never learned to apply personal quality
management techniques like those described in this article in their work for <b><a alt="asp dot net software companies in india" href="http://www.ifourtechnolab.com/" target="_blank">asp dot net </a></b></span><a alt="asp dot net software companies in india." href="http://www.ifourtechnolab.com/" target="_blank"><b style="font-family: Arial, Helvetica, sans-serif;">software</b><b style="font-family: Arial, Helvetica, sans-serif;"> companies in india</b></a><span style="font-family: "arial" , "helvetica" , sans-serif;">. This
is because our educational system has generally ignored the topic, and in the
software business, "quality assurance" often refers to little more
than testing. This is unfortunate, because vast opportunities for improving the
quality of the software we produce are being missed as we continue with
business as usual.</span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">This is surprising, given that these techniques are anything but new.
Other engineering disciplines have embraced them for decades and manufacturers
and engineering companies have been applying them for nearly fifty years. <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Watts Humphrey, in the PSP has given programmers the opportunity to
understand these methods and apply them to software development. Those who have
done so have found the effects on their work to be dramatic, with the
improvement in the quality of their software the most obvious and rewarding
aspect. These individuals have begun to take control of the task of writing programs,
and are taking the first steps toward changing "software engineering"
into a true engineering discipline.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<b><span style="font-family: "arial" , "helvetica" , sans-serif;">Defect Content as a Dimension
of Quality</span></b></h3>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">When we think of software quality, we tend to think about defects.
This is a natural tendency, since defective software isn’t good for much. But a
defect (or more correctly, lack of defects) is not the only, or even the most
important dimension of quality. Other dimensions of quality include Usability,
Maintainability, Install-ability, Security, and Reliability. In any product,
each of these dimensions is important to one degree or another and every
development project must be careful to pay appropriate attention to them. But
from the point of view of Personal Quality Management, defect management is
first priority. This is true for two reasons:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
</div>
<div style="text-align: left;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">The
other dimensions of quality are issues of either product requirements or
organizational standards. While the individual software engineer can affect
these things, they are not under his or her direct control.</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Defect
injection is a purely personal phenomenon. Each person’s defect numbers, types
and patterns are unique, and require personalized actions to effectively detect
and eliminate them.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "arial" , "helvetica" , sans-serif;">You may note throughout this article that I will never refer to
"bugs". I believe that this term trivializes a very important issue,
making it sound minor, or even cute. In fact, defective software wastes
millions of dollars for companies and individuals throughout the world. And as
we become more and more dependent on software for critical functions, it is
becoming important to organization’s and individual’s health and life. In order
to focus on defects as a quality management priority, we must understand their
nature. This nature can be summed up this way:</span><span style="font-family: "arial" , "helvetica" , sans-serif;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
</div>
<div style="text-align: left;">
</div>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Software
that contains one or more defects is "defective".</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">Defects
are the result of human errors.</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">All
humans make errors.</span></li>
</ul>
<ul>
<li style="text-align: justify;"><span style="font-family: "arial" , "helvetica" , sans-serif; text-indent: -0.25in;">All
software engineers are human.</span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Therefore, defect management must be the first <a href="http://www.fao.org/docrep/w7295e/w7295e03.htm" target="_blank">quality management</a>
focus for all Software Engineers.</span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Courtesy: Sanika Taori</span></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-29636034134258535742016-04-17T11:10:00.003-07:002016-08-31T03:13:21.781-07:00Overview and Evolution of Firewalls<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.ifourtechnolab.com/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="asp.net software company in india" border="0" src="https://4.bp.blogspot.com/-GueygQ_zOvo/V8atUiRwlsI/AAAAAAAAAEA/S6fA6Csm2kcppqSAh1Qfaw4tDHC8_N4JACLcB/s1600/science-dna-2048x1536-303874-3d.png" title="asp.net software company in india" width="570px" /></a></div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;">Firewalls
are the first line of defense between the internal network and untrusted
networks like the Internet.</span></i></b> You should think about firewalls in
terms of what you really need to protect <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software company in india</a></b> , so you will achieve the right level
of protection for your environment. <o:p></o:p></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Firewalls have been one of the
most popular and important tools used to secure networks since the early days
of interconnected computers. <b><i><span style="color: #7030a0;">The basic
function of a firewall is to screen network traffic for the purposes of
preventing unauthorized access between computer networks.<o:p></o:p></span></i></b></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i><span style="color: #7030a0;"><br /></span></i></b></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">First introduced conceptually in
the late <b>1980s</b> in a whitepaper from
Digital Equipment Corporation, “firewalls” provided a then new and important
function to the rapidly growing networks of the day for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software comapany india</a></b>. Before dedicated hardware
was commercially available, router-based access control lists were used to
provide basic protection and segregation for networks. However, they proved to
be inadequate as emerging malware and hacking techniques rapidly developed.
Consequently, firewalls evolved over time so their functionality moved up the
OSI stack from layer three to layer seven.<o:p></o:p></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<h3 style="text-align: justify;">
<b><span style="color: red; font-size: 12.0pt; line-height: 115%;"><span style="font-family: "arial" , "helvetica" , sans-serif;">The Evolution of Firewalls</span></span></b></h3>
<div>
<b style="font-family: arial, helvetica, sans-serif; text-align: justify;"><span style="color: #002060;">First-Generation Firewalls</span></b><span style="color: #002060; font-family: "arial" , "helvetica" , sans-serif; text-align: justify;"> </span><span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; text-align: justify;">were simply permit/deny engines for layer three traffic,
working much like a purposed access control list appliance. Originally,
first-generation firewalls were primarily used as header-based packet filters,
capable of understanding source and destination information up to OSI layer
four (ports). However, they could not perform any “intelligent” operations on
the traffic other than “allow or deny it from this predefined source IP address
to this predefined destination IP address on these predefined TCP and UDP
ports.”</span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #0d0d0d; mso-themecolor: text1; mso-themetint: 242;"><br /></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><span style="color: #002060;">Second-Generation Firewalls</span></b><span style="color: #002060;"> </span><span style="color: #0d0d0d; mso-themecolor: text1; mso-themetint: 242;">were able to keep track of active network sessions for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies in india</a></b>, putting
their functionality effectively at layer four. These were referred to as
stateful firewalls or, less commonly, circuit gateways. When an IP address (for
example, a desktop computer) connected to another IP address (say, a web
server) on a specific <b>TCP or UDP</b>
port, the firewall would enter these identifying characteristics into a table
in its memory. This allowed the firewall to keep track of network sessions,
which could give it the capability to block <b>Man-In-The-Middle (MITM)</b> attacks from other IP addresses. In some
sophisticated firewalls, a high-availability (HA) pair could swap session
tables so that if one firewall failed, a network session could resume through
the other firewall. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #0d0d0d; mso-themecolor: text1; mso-themetint: 242;"><br /></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><span style="color: #002060;">The Third Generation</span></b><span style="color: #002060;"> </span><span style="color: #0d0d0d; mso-themecolor: text1; mso-themetint: 242;">of firewalls ventured into the application layer—layer
seven. These “application firewalls” were able to decode data inside network
traffic streams for certain well-defined, preconfigured applications such as <b><a href="https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol" target="_blank">HTTP</a></b> (the language of the web), <b><a href="https://en.wikipedia.org/wiki/Domain_Name_System" target="_blank">DNS</a></b> (the protocol for IP address
lookups), and older, person-to-computer protocols such as <b>FTP</b> and <b>Telnet</b>.
Generally, they were unable to decrypt traffic, so they were unable to check
protocols like HTTPS and <b>SSH</b>. They
were designed for <a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank"><b>c#.net software company in india</b></a> with the <b>World Wide Web</b>
<b>(WWW)</b> in mind, which made them well
suited to detecting and blocking web site attacks that were generating a great
deal of concern at the time, like cross-site scripting and SQL injection. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="color: #0d0d0d; mso-themecolor: text1; mso-themetint: 242;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Consider these in comparison to today’s
current generation of firewalls (commonly termed the fourth generation), which
have the intelligence and capability to look inside packet payloads and
understand how applications function. As silicon has increased in speed,
advanced router-based firewalls exist today that can provide IP inspection as a
software component of a multipurpose router, although they do not provide the
speed or sophistication of today’s industrial-strength firewalling
solutions. In addition, <b><a href="https://en.wikipedia.org/wiki/Unified_threat_management" target="_blank">Unified Threat Management</a>
(UTM)</b> devices have combined sophisticated, application-layer firewalling
capability with antivirus, intrusion detection and prevention, network content
filtering, and other security functions. These are true layer seven devices. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="color: #0d0d0d; mso-themecolor: text1; mso-themetint: 242;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></div>
<div style="text-align: left;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><span style="color: #002060; line-height: 115%;">Fourth-Generation Firewalls</span></b><span style="color: #002060; line-height: 115%;"> </span><span style="color: #0d0d0d; line-height: 115%;">can
run application-layer gateways, which are specifically designed to understand
how a particular application should function and how its traffic should be
constructed and patterned (traffic that conforms predictably to an
application’s well-defined communication protocol is referred to as “well
formed”). There are </span><b><span style="color: #002060; line-height: 115%;">Fifth-Generation Firewalls</span></b><span style="color: #0d0d0d; line-height: 115%;">,
which are internal to hosts and protect the operating system kernel for <b><a alt="ecommerce solution providers in india
" href="http://www.ifourtechnolab.com/" target="_blank">c# dot net </a></b></span></span><b style="color: #0d0d0d; font-family: arial, helvetica, sans-serif; line-height: 18.4px;"><a alt="ecommerce solution providers in india
" href="http://www.ifour-consultancy.com/">software</a> </b><span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; line-height: 115%;"><b><a alt="ecommerce solution providers in india
" href="http://www.ifour-consultancy.com/">company in india</a></b>, and some </span><b style="font-family: arial, helvetica, sans-serif;"><span style="color: #002060; line-height: 115%;">Sixth-Generation Firewalls</span></b><span style="color: #002060; font-family: "arial" , "helvetica" , sans-serif; line-height: 115%;"> </span><span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; line-height: 115%;">have
been described (meta firewalls), but most network appliances you will find
today fall into the generally accepted fourth-generation firewall definition.
Some manufacturers call their devices <b>“Next-Generation
Firewalls”</b> or <b>“Zone-Based Firewalls,”</b>
and these essentially function under the same guiding principles of the fourth-generation
designs. In this chapter, we primarily focus on fourth-generation firewalls and
the key functionality that they enable.</span></div>
<br />
<div style="text-align: justify;">
<span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; line-height: 18.4px;"><br /></span></div>
<span style="color: #0d0d0d; font-family: "arial" , "helvetica" , sans-serif; line-height: 115%;">Courtesy: Sanika Taori</span></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0tag:blogger.com,1999:blog-3523125577964545410.post-72757822408932445722016-04-14T20:43:00.001-07:002016-09-01T23:12:19.528-07:00Organization of Information Security Part 3<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="background: white; margin-bottom: 6.45pt; mso-line-height-alt: 8.6pt; text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a alt="asp.net software company in india" href="http://www.ifourtechnolab.com/" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://4.bp.blogspot.com/-sxOjpCNKe8k/V8kX-b0NolI/AAAAAAAAAGc/aX-jg6hzFTAonbCScHB3N44cFSJGpKFmACLcB/s1600/Information-Security.jpg" width="570" /></a></div>
<h4>
<span style="font-size: 18.6667px;">Mobile Computing and Teleworking</span></h4>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Policies for use of mobile computing devices and work in off-site settings (“tele-work”) for <b><a alt="asp.net software company in india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software company in india</a></b> should aim for information security commensurate with that for work in on-site settings and for non-mobile devices, where operationally and technically feasible.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<h3>
<span style="font-size: 18.6667px;">Mobile computing and tele-working controls</span></h3>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Controls should be implemented that are in proportion with settings of mobile/tele-working use, the types of users and sensitivity of the data and applications being accessed from mobile/tele-working settings.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<h3>
<span style="font-size: 18.6667px;">Applicability</span></h3>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Controls on mobile computing and tele-working should extend to any non-traditional or extra-institutional work setting where the information of the organization is accessed. Controls on following could be included:</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• "Smart" phone-PDAs and mobile phones</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Desktop computers used off-premises</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Media and portable storage devices </span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Any other type of component capable of displaying, using, transmitting and storing the information of the organization.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Notebook, palmtop computers and laptop</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<h4>
<span style="font-size: 18.6667px;">Portable devices and media controls</span></h4>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Appropriate security measures should be required for mobile computing and communications activities for <b><a alt="asp.net software companies india" href="http://www.ifourtechnolab.com/" target="_blank">asp.net software companies india</a></b>. Following Guidelines and/or requirements could be included:</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Regular data backups for stored sensitive data</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Physical security measures</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Prohibition or minimization of data storage on devices in off-premises locations or mobile devices, particularly sensitive data</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Secure communication methods for transmitted data such as Virtual Private Network</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Updates for operating system and other software updating</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Independent validation of appropriate device configuration</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Access control and appropriate user authentication (biometric-based) </span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Cryptographic methods for sensitive data</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Protective software such as anti-virus and others</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<h4>
<span style="font-size: 18.6667px;">Controls against malicious mobile code</span></h4>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Proper controls should be implemented for response, detection and prevention to mobile versions of malicious code also including appropriate user awareness.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<h3>
<span style="font-size: 18.6667px;">Tele-working controls</span></h3>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Appropriate security measures should be required for "tele-working" activities. Following could be included:</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Policies regarding organizational property used at the site (e.g., organization’s software and hardware)</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Environmental and physical security measures</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Policies concerning safety of private property used at the site </span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Appropriate user access control and authentication, given reasonably anticipated threats from other users at the site</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Security measures for wireless and wired network configurations at the site</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Specification of financial responsibility for equipment replacement or repair and Insurance coverage.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Cryptographic techniques for communications from/to the site and data storage</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Data backup at regular intervals and security measures for those backup copies</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">• Intellectual property policies created or used at the site which includes software licensing</span><b style="font-family: arial, helvetica, sans-serif; text-indent: -0.25in;"></b><br />
<div style="display: inline !important; text-align: left;">
<div style="text-align: justify;">
<br />
<b style="text-indent: -0.25in;"></b></div>
<b style="text-indent: -0.25in;">
</b>
<br />
<div class="MsoNormal" style="background: white; margin-bottom: 6.45pt; mso-line-height-alt: 8.6pt; text-align: justify;">
<div style="display: inline !important; text-align: left;">
<div style="text-align: justify;">
<b style="text-indent: -0.25in;"><b style="text-indent: -0.25in;"><br /></b></b></div>
</div>
</div>
<div style="text-align: justify;">
<b style="text-indent: -0.25in;">
References:</b></div>
</div>
</div>
<div class="MsoNormal" style="background: white; margin-bottom: 6.45pt; mso-line-height-alt: 8.6pt; text-align: justify;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif; text-align: left; text-indent: -0.25in;">1. <a href="http://privacy.med.miami.edu/glossary/xd_iso_org_info_sec.htm">http://privacy.med.miami.edu/glossary/xd_iso_org_info_sec.htm</a></span></div>
</div>
<div class="MsoNormal" style="background: white; margin-bottom: 6.45pt; mso-line-height-alt: 8.6pt; text-align: justify;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif; text-align: left; text-indent: -0.25in;">2.<a href="http://www.westhertstraining.co.uk/Induction/Clinical%20Informatics/Mobile_computing_teleworking_v1.pdf">http://www.westhertstraining.co.uk/Induction/Clinical%20Informatics/Mobile_computing_teleworking_v1.pdf</a></span></div>
</div>
<div class="MsoNormal" style="background: white; margin-bottom: 6.45pt; mso-line-height-alt: 8.6pt; text-align: justify;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif; text-align: left; text-indent: -0.25in;">3. Teleworking and Mobile Working Procedures--<a href="http://www.derbyshire.gov.uk/">www.derbyshire.gov.uk</a></span></div>
</div>
<div class="MsoNormal" style="background: white; margin-bottom: 6.45pt; mso-line-height-alt: 8.6pt; text-align: justify;">
<u style="font-family: arial, helvetica, sans-serif; line-height: 115%; text-indent: -0.25in;"><b>Courtesy</b></u><u style="font-family: arial, helvetica, sans-serif; line-height: 115%; text-indent: -0.25in;"><b>: Sanika Taori</b></u></div>
</div>
iFour Abhi Pabarihttp://www.blogger.com/profile/08371539911577508868noreply@blogger.com0