Tech News Beats

Live Your Heart Beats On Tech News Beats

  • TCS Walkin Interview in Bangalore and Kochi

    Filed under News
    Feb 22

    TCS is conducting walk-in interview in Bangalore and Kochi on 25 February 2012. Tata Consultancy Services Limited (TCSL), is currently looking for Team Members / Team Leaders / Project Leaders / Project Managers with 4-8 years of relevant IT experience for our solutions / delivery centres at TCS Bangalore and TCS Kochi.


    Venue: TCS Abhilash, Bangalore (25 February, 2012, Saturday)

    Web Technology
    MQ/MB Developer / Lead

    Microsoft Technology
    MOSS 2007 Developer

    Enterprise Application Integration (EAI)
    WebMethods Developer

    Business Intelligence
    Informatica with Oracle Development

    Ab Initio Developer

    Informatica Development

    Oracle Apps
    Technical Consultant

    IT Infrastructure Services
    Oracle Apps DBA

    OBIEE Adminstration

    WebLogic Administration

    PeopleSoft Administration

    Teradata DBA

    Unix, Subversion Administration (5-7 years of experience)
    – Atlassian tools and Subversion for the enterprise, Perl/Python languages, Windows and UNIX environments, two years client support, infrastructure/client support of an Atlassian tools environment, problem solving skills

    Support Analyst (5-7 years of experience)
    – Atlassian tools and Subversion for the enterprise, Perl/Python languages, Windows and UNIX environments, Client Support, infrastructure/client support of an Atlassian tools environment, problem solving skills

    Support Analyst : Informatica
    – Infrastructure/client support of an Informatica environment, Informatica PowerCenter 6.x,7.x,8.x, UNIX (Sun Solaris), RDBMS : Oracle, Sybase and MS-SQL Enterprise Server

    Siebel Analytics
    – OBIEE Developer

    Open Systems
    C++ with Unix Development

    Engineering and Industrial Services
    CAE Analysts (3-5 years of experience)
    – Abaqus/Nastran and HM (Automotive Domain)

    CAE Modelling (3-5 years of experience)
    – Ansa/HM (Automotive body and interiors)

    Venue: TCS Think Campus, Bangalore (25 February, 2012, Saturday)

    IT Infrastructure Services
    Weblogic Administration

    – SQL Server Database Administration, managing multiple MS SQL 2000 and 2005 RDBMS on large systems, Practical experience in monitoring and tuning a database to provide a high availability service (Mainly Replication), backup and restore, Transactional SQL, and SSIS

    Oracle DBA
    – Oracle RDBMS version including Oracle 11g, Oracle RAC and ASM, installation of Oracle cluster/database on UNIX platform, upgrade and migration of Oracle databases, understanding of change management process, Oracle performance tuning, Oracle backup and recovery process using RMAN

    – Bladelogic administration with Bladelogic exposure on Unix/Linux environment, Shell Scripting, development exposure (release lifecycle), Unix or Solaris with Veritas and Volume Clustering

    VMWare Administration

    SCCM and SCOM

    BMC Remedy Developer / Specialist
    – BMC Remedy Development experience, Version 6.3 or above, Remedy version 7.6 ITSM Suite, Command Center, SRM Exposure

    BPPM (3-5 years of experience)
    – BMC Administrator, BMC ProactiveNet Performance Manager, Implementation, configuration of monitoring solutions based on BMC Event Manager, Patrol 7.x , Patrol Agent and Service Impact Manager, BPPM Troubleshooting and administration of all above products on UNIX, Windows based hosts, implementation and configuration of various Knowledge Modules Specification and implementation of interfaces to other systems management solutions, Life cycle management for all above mentioned products, Perl or PSL scripting knowledge, support for various monitoring solutions, problem tracking and escalation to the engineering teams

    Hitachi Storage
    – Symmetrix DMX-4, Symmetrix DMX foundation – Logical view FA, DA and Cache, EMC physical disk and Symmetrix device (logical volume), Read Hit/Miss, Write Hit/Miss, EMC Symmetrix Solution Enabler, Symmetrix/DMX Configuration Manager (Symconfigure)

    SAN/NAS Storage
    – Storage, EMCISA (Information storage Associate) Certified, ITIl V3 Certified, Symmetrix DMX and VMAX, Clariion CX3 , Celerra – NAS and Centera-CAS, implementation of new SAN environment with EMC Clariion, DMX and VMAX, upgrading storage software code when and where required with Vendor, SRDF, Time finder, Powerpath software, ECC, Netapp filers, IBM DS 8K and 4k

    HP SM
    – Technical skills with installation, configuring, and management of HP Peregrine v4/v5/v6, HP Service Manager technology v7.x, HP IIA (under SM 7.1), ConnectIT, Web Services, and SDKAUto, analytical and troubleshooting skills, infrastructure and Application development experience, baseline support experience, demonstrated customer communication skills and excellent interpersonal communications, IT Service Management deployment or initiatives, Team leadership and management skills, ITIL Foundation certified or equivalent experience, Project Lifecycle Methodologies

    EMC Storage
    – Administrative experience in Storage EMC NAS and NetApps, ITIL V3 Certified, backup Netbackup / ArcServ Certified, Storage EMC/NetApps Certified, SLA driven environment, managing large (TB’s) storage / Backups, technology to provide higher level troubleshooting, utilizing EMC Storage : Symmetrix, DMX, VMAX, Celerra, Connectrix Director switches, replication technologies like (SRDF), open replicator

    Venue: TCS SJM Towers, Bangalore (25 February, 2012, Saturday)

    WIFI (4-6 years of experience)
    – 802.11, Wireless LAN (802.11 a/b/g/n, 802.11s), C Programming, Linux Kernel programming.

    Linux and Networking
    – Coding and programming skills in C, at least one scripting language, Networking (TCP/IP) concepts and background, Data Structures and basic lookup based algorithms, Linux OS internals

    – C/Python Programming, SNMPv2/v3 Agent development (Net-SNMP), Networking (TCP/IP) concepts and background, Linux

    For Kochi

    Venue: TCS Vismaya Building, Kochi (25 February, 2012, Saturday)

    iPhone Developer (2-8 years of experience)

    Android Developer (2-8 years of experience)

    Mobile Web Application Developer with CSS (2-8 years of experience)

    COCOA Developer (3-6 years of experience)

    IT Infrastructure Services
    Mainframes DBA (2-8 years of experience)

    UDB DBA (3-6 years of experience)

    PeopleSoft with HRMS (3-6 years of experience)

    PeopleSoft with CRM (3-6 years of experience)

    Eligibility Criteria:

    Full Time Graduates / Post Graduates in: BE / BTech / ME / MTech / MSc / MCA / MCM / MS CA / ICWA / MBA PGDIT (2 years full time and approved by AICTE)

    Special consideration will be given to B.Sc. / BCA / Diploma holders with 3 years of relevant functional / technical experience, subject to minimum reduction in experience, as per current TCS policy

    Consistent academic records Class X onwards (Minimum 50%)

    Candidates interviewed by us in the last 6 months are not eligible

    Mandatory documents required for a candidate in order to be eligible to apply for the TCS Interview process:

    A hardcopy of their CV
    One passport size photograph
    A photocopy of the last increment letter/offer letter, whichever is latest
    Photocopies of the last three months pay-slip
    Identity Proof (Passport / Voters ID card / PAN Card / Drivers License)
    Original and one photocopy of all the mark sheets of the X, XII, UG or PG and/or last full-time graduation or post graduation
    One photocopy of all relieving / experience / service letters from all previous organization
    Original and photocopy of proof of current residential address (Ration Card/Telephone Bill/Electricity Bill)
    Original and photocopy of proof of Identity (Passport/Voters ID/PAN Card / Driving Licence)
    Original and photocopy of the PAN Card
    Filled in TCS Application Form with EP Registration Number

    Venue 1:
    Tata Consultancy Services Ltd. Abhilash Building Plot No 96, EPIP Industrial Area Whitefield Road Bangalore – 560066

    Registration Time:
    09:30 AM to 12:30 PM

    25 February, 2012 (Saturday)

    Venue 2:
    Tata Consultancy Services Ltd. Vismaya Building, Infopark, Kochi

    Registration Time:
    09:30 AM to 12:30 PM

    25 February, 2012 (Saturday)

    Venue 3:
    Tata Consultancy Services Ltd. Think Campus, Electronic City, Phase II, Bangalore – 560 100

    Registration Time:
    09:30 AM to 12:30 PM

    25 February, 2012 (Saturday)

    Venue 4:
    Tata Consultancy Services Ltd. SJM Towers, No 18 Seshadri Road, 6th Cross, Gandhinagar, Bangalore – 560009

    Registration Time:
    09:30 AM to 12:30 PM

    25 February, 2012 (Saturday)

    Very important: Make sure you fill in TCS Application Form online and note the EP Registration Number



    Filed under Security
    Feb 22

    Identity theft in this web age is a big concern now. We need to put enough safeguards to prevent others from using our Identity or online identity. I am going to share with you a few tips which should be helpful in this regard.

    1. Enroll All Your Domains in Domain Privacy

    Our records indicate that one or more of your domains aren’t enrolled in our domain privacy service. “Domain privacy” may actually be a misnomer — it’s not the domain itself that’s in need of protection; it’s your personal information that’s publicly available whenever someone does a “whois” lookup online.

    Harvesting “whois” information is an easy way for identity thieves to impersonate you. We’ve temporarily enrolled one or more of your domains in our privacy service for free, but that free trial will expire in a few weeks. We encourage you to upgrade all your domains to be permanently enrolled in domain privacy.

    2. Protect Yourself Against Spyware

    Spyware is malware downloaded to your computer or website, without your knowledge or consent, that runs in the background and collects information about you:

    Make sure whatever anti-virus program you’re running on your personal computers includes spyware protection, as well. Some companies, such as Lavasoft or STOPzilla, will offer a basic anti-spyware service for free, while charging for advanced protection.

    Add SiteLock to your PowWeb account to protect your website from being compromised by spyware and other kinds of malware.

    3. Use Caution When Entering Information Online

    When providing personal or financial information online, be certain that you have a secure connection. The URL in the address bar should change from “http” to “https” or “shttp.” A closed padlock symbol also often indicates that the connection is secure. (If you want to make your own website secure in this way, you may want to look into purchasing an SSL certificate.)

    4. Create Strong Passwords

    We realize that generating strong passwords, not to mention keeping track of them all, can be a hassle, but it’s critical that you have strong passwords for every site you use.

    You may also want to check out When you visit a site that requires you to create a password, enter a simple password you’ll remember, but before you submit it, run the PwdHash browser extension (Firefox or Chrome), and it will invisibly generate a custom, strong password for that site. In the end, you only need to remember one password, which your browser is able to securely transform into a different, strong password for each site you use.

    5. Use Discretion When Sharing Information

    Use discretion when updating social media websites. Even if you limit the number of people who have access to your profile, tweets, etc., keep in mind that the information is still published online and can be copied and pasted elsewhere. If anyone asks you for personal information, make sure they are who they claim to be and that there is a legitimate reason for the request.

    6. Stop Unsolicited, “Pre-Approved” Credit Offers

    Opt out of pre-screened credit/insurance offers to prevent potential thieves from intercepting and accepting the offers in your name. Opting out doesn’t affect your eligibility for credit or insurance; visit for more information.

    You should also limit the amount of unsolicited emails you receive by customizing your spam filter settings.

    7. Shred Confidential Information

    When disposing of papers with account numbers or other identifying information, shred them. This includes convenience checks that come with your credit card statement, as well as unsolicited credit card offers.

    8. Remain Vigilant: Review Your Accounts Regularly

    Monitor your accounts online frequently, so you can discover potential issues without having to wait for bills or statements to come by mail. You also may want to check out; it’s a free service that reviews how likely it is your identity is being misused and provides ways you can reduce that risk.

December 2017
« Nov