Features and Amenities
Features and Amenities:
Wifi ready study area
Gym and Function Room
Features and Amenities:
2 Lap Pools
Ground Floor Commercial Areas
Features and Amenities:
3 Swimming Pools
Gym and Fitness Center
Outdoor Basketball Court
Contact us today for a no obligation quotation:
Copyright © 2018 SMDC :: SM Residences, All Rights Reserved.
P8060-002 exam Dumps Source : IBM Managed File Transfer Technical Mastery Test v1
Test Code : P8060-002
Test Name : IBM Managed File Transfer Technical Mastery Test v1
Vendor Name : IBM
: 33 Real Questions
it's miles unbelieveable, but P8060-002 present day dumps are availabe right here.
I handed, and clearly extraordinarily completely satisfied to document that killexams.com adhere to the claims they make. They provide actual exam questions and the finding out engine works flawlessly. The bundle includes the whole thing they promise, and their customer support works well (I had to get in touch with them for the motive that first my online rate would not go through, but it turned out to be my fault). Anyhow, this is a amazing product, masses higher than I had predicted. I handed P8060-002 exam with nearly top marks, something I in no way concept i was able to. Thank you.
real P8060-002 questions! i was no longer anticipating such ease in examination.
Great stuff for P8060-002 exam which has really helped me pass. i have been dreaming about the P8060-002 career for a while, but could never make time to study and actually get certified. As much as I was bored with books and guides, I could not make time and just study. These P8060-002 made exam preparation totally realistic. I even managed to study in my car while driving to work. The convenient format, and yes, the exam simulator is as good as the website claims it is and the accurate P8060-002 questions have helped me get my dream certification.
Found an accurate source for real P8060-002 Questions.
I need to recognize that your solutions and elements to the questions are superb. Those helped me apprehend the fundamentals and thereby helped me attempt the questions that have been no longer direct. I need to have handed without your question financial team, but your questions and answers and last day revision set were honestly helpful. I had predicted a score of ninety+, however though scored eighty 3.50%. Thank you.
simply attempted P8060-002 query financial institution as soon as and i'm convinced.
As i am into the IT subject, the P8060-002 exam turned into important for me to reveal up, but time barriers made it overwhelming for me to work rightly. I alluded to the killexams.com Dumps with 2 weeks to strive for the exam. I figured outhow to finish all the questions well underneath due time. The clean to keep solutions make it nicely less difficult to get prepared. It labored like a entire reference aide and i was flabbergasted with the result.
Use authentic P8060-002 dumps. brain unload high-quality and popularity does remember.
phrase of mouth is a completely sturdy manner of advertising and marketing for a product. I say, when something is so appropriate, why no longer do a little high quality publicity for it I would like to unfold the word about this one of a type and virtually awesome killexams.com which helped me in performing outstandingly rightly in my P8060-002 exam and exceeding all expectations. i might say that this killexams.com is one of the maximum admirable on line coaching ventures i have ever stumble upon and it merits a whole lot of popularity.
How many days preparation required to pass P8060-002 exam?
They fee me for P8060-002 exam simulator and QA document however first i did no longer got the P8060-002 QA material. there has been some file blunders, later they constant the error. i organized with the exam simulator and it changed intorightly.
i'm very happy with this P8060-002 study guide.
in case you want right P8060-002 training on how it works and what are the tests and all then dont waste your time and choose killexams.com as its miles an last source of help. I additionally desired P8060-002 education and i even opted for this super exam simulator and got myself the high-quality schooling ever. It guided me with each element of P8060-002 exam and supplied the top class questions and solutions i have ever seen. The test courses additionally were of very muchhelp.
Is there P8060-002 examination new sayllabus?
Before discovering this extremely good killexams.com, I become really positive about capabilities of the net. Once I made an account here I saw an entire new world and that was the beginning of my a hit streak. In order to get fully organized for my P8060-002 checks, I was given numerous test questions / answers and a fixed sample to comply with which became very particular and complete. This assisted me in achieving success in my P8060-002 test which turned into an extremely good feat. Thanks loads for that.
a whole lot much less effort, top notch information, assured success.
Passing the P8060-002 exam modified into in reality no longer possible for me as I couldnt manage my coaching time well. Left with only 10 days to go, I referred the exam through way of killexams.com and it made my life smooth. Topics have beenpresented rightly and turned into dealt well inside the test. I scored a suitable 959. Thank you killexams. I was hopeless but killexams.com given me desire and helped for passing while i used to be hopeless that i cant end up an IT certified; my friend told me approximately you; I tried your online training tools for my P8060-002 exam and become able to get a 91 bring about exam. I very own thanks to killexams.
can you believe, all P8060-002 questions I organized were asked.
This is my first time that I took this carrier. I sense very assured in P8060-002 but. I put together my P8060-002 the use of questions and solutions with exam simulator softare through killexams.com crew.
Managed File switch Softwarr Market by applications BFSI, Media & entertainment, Retail
This press free up changed into orginally disbursed by SBWire
Edison, NJ -- (SBWIRE) -- 01/18/2019 -- HTF MI lately added global Managed File switch software Market study with concentrated approach on market measurement & volumes via software, trade selected technique, product classification, avid gamers, and construction & Consumption evaluation because principal components, can charge structure and regulatory factors. At latest, the market is setting up its presence and some of the important thing gamers from the comprehensive study are IBM, Axway, Saison assistance programs, OpenText(Hightail), CA applied sciences, Accellion, GlobalSCAPE, Primeur, Signiant, Ipswitch, Micro focal point, TIBCO, Attunity & SSH (Tectia).
The report offers a comprehensive comparison of the market. It does so via in-depth qualitative insights, historic records, and verifiable projections about market measurement. The projections featured in the report have been derived the use of proven analysis methodologies and assumptions.
Get the internal scoop of the sample report @: https://www.htfmarketreport.com/sample-document/1513679-international-managed-file-transfer-utility-market-13
Market segmentationOn The foundation Of class: , device-centric File switch, americans-centric File transfer & intense File TransferOn The foundation Of purposes/ end clients: BFSI, Media & amusement, Retail, Manufacturing, Telecommunication & OthersOn The groundwork Of areas: u.s., Europe, China, Japan, Southeast Asia, India & critical & South the usa
This analyze additionally contains company profiling, product photo and requirements, earnings, market share and call advice of a number of international, regional, and native carriers of world Managed File switch software Market, some of them are IBM, Axway, Saison advice techniques, OpenText(Hightail), CA applied sciences, Accellion, GlobalSCAPE, Primeur, Signiant, Ipswitch, Micro focus, TIBCO, Attunity & SSH (Tectia). The market competitors is always turning out to be higher with the upward push in technological innovation and M&A activities in the business. moreover, many native and regional companies are providing certain application products for distinctive conclusion-clients. the new seller entrants available in the market are finding it complicated to compete with the foreign carriers based on first-rate, reliability, and improvements in expertise.
** The Values marked with XX is personal statistics. to know extra about CAGR figures fill to your counsel the usage of under enquiry hyperlink or email us at firstname.lastname@example.org in order that their company building executive can get in contact with you.
Enquire for customization in document @ https://www.htfmarketreport.com/enquiry-earlier than-purchase/1513679-world-managed-file-transfer-application-market-13
Highlights about report insurance:- an entire history analysis, which comprises an evaluation of the world Managed File switch application market- critical adjustments in Managed File transfer application market dynamics- Managed File switch software Market segmentation as much as the 2nd & third stage regional bifurcation- ancient, latest, and projected dimension of the global Managed File switch application market with recognize to both price (profits) and quantity (production & Consumption)- Reporting and contrast of contemporary Managed File transfer application business trends- Managed File transfer application Market shares and techniques of key gamers- emerging niche segments and regional markets- An purpose assessment of the trajectory of the Managed File switch software market- suggestions to organizations for strengthening their foothold in the Managed File transfer application market
moreover the export and import policies that could make an instantaneous impact on the global Managed File transfer software market. This examine incorporates a EXIM* connected chapter on the Managed File switch software market and all its associated corporations with their profiles, which gives effective records bearing on their outlook in terms of finances, product portfolios, investment plans, and marketing and company ideas.
buy this analysis file @ https://www.htfmarketreport.com/buy-now?layout=1&record=1513679
There are 15 Chapters to screen the world Managed File switch application market.
desk of Contents1 Market Overview1.1 international Managed File transfer utility Introduction1.2 Market evaluation via Type1.three Market evaluation by means of Applications1.four Market analysis by way of Regions1.5 Market Dynamics1.5.1 Market Opportunities1.5.2 Market Risk1.5.3 Market using force
2 producers Profiles2.1.1 business Overview2.1.2 Managed File switch utility category and Applications2.1.3 Managed File transfer application revenue, cost, income, Gross Margin and Market Share (2016-2017)
three global Managed File switch SoftwareMarket competitors, via Manufacturer4 international Managed File transfer SoftwareMarket evaluation by Regions5 place 1, classification, utility and producers.
10 international Managed File transfer utility Market phase via Type11 Managed File transfer software Market section via Application12 Managed File switch utility Market Forecast (2019-2025)13 sales Channel, Distributors, traders and Dealers14 research Findings and Conclusion15 Appendix....persevered
finished file on Managed File switch application market file unfold across one hundred+ pages, list of tables & figures, profiling 10+ organizations. study targeted Index of full research examine at @ https://www.htfmarketreport.com/stories/1513679-global-managed-file-transfer-utility-market-13
Thanks for analyzing this text; that you would be able to also get particular person chapter sensible part or vicinity smart file version like North america, Europe or Asia.
For extra tips on this press liberate consult with: http://www.sbwire.com/press-releases/managed-file-transfer-application-market-to-witness-massive-growth-with the aid of-key-players-ibm-axway-saison-assistance-methods-1125856.htm
IBM's 4Q and FY14 salary: Transition Has Yet to Yield respectable consequences (half 9 of 17)
(persevered from part eight)
IBM is the chief within the middleware and utility market
in response to Gartner, IBM (IBM) with a market cap of about $160 billion is a market chief within the middleware and application house. according to IBISWorld, “Middleware offers interoperability between disparate kinds of utility, enabling the persisted use of obsolete, legacy or unrelated utility packages with contemporary software.” according to its record in 2014, with a 30% market share, IBM has maintained this place during the past 13 years.
among the 11 software infrastructures and middleware markets that Gartner studied, IBM become number 1 in eight of these markets, followed with the aid of Oracle with a market share of 15%. Microsoft (MSFT), SAP AG (SAP), and Tibco held 5%, 4%, and three% market share, respectively.
IBM continues to hold its excellent place with a 67% market share in Message Oriented Middleware it truly is a key enabler for cellular computing. there is an extended demand to hyperlink together huge facts, cellular, cloud, and social computing applied sciences into core commercial enterprise application techniques. In business-to-company (or B2B) middleware, IBM is the chief that drives enhanced collaboration amongst partners and shoppers. The company is additionally a pacesetter in managed file transfer suites, a section that's intended for comfy, legitimate start of statistics between people, approaches, and systems.
To benefit diverse exposure to IBM, that you would be able to make investments within the know-how SPDR (XLK). XLK invests three.51% of its holdings in IBM.
Strategic boom areas registered good increase
In fiscal 12 months 2014, IBM’s cloud revenues and cloud delivered as a carrier profits stood at $7 billion and $3 billion, respectively. These revenues grew by using 60% and 75% on a yr-over-12 months foundation, respectively. company analytics saw its revenues enhance by using 7% on a yr-over-yr foundation to $17 billion.
in the past eleven consecutive quarters, IBM’s salary has declined. The enterprise has repeatedly pointed out that its focus now lies on strategic imperatives that consist of five companies: cloud, information analytics, cellular, social, and security efforts.
in the March 2015 Morgan Stanley (MS) know-how, Media, and Telecom convention, IBM’s CFO, Martin Schroeter, stated that the enterprise’s strategic areas (large records, analytics, cloud cellular, and security) posted $25 billion of revenues or 27% of usual revenues, an increase of 16% on a 12 months-over-12 months basis. via investing $four billion in 2015, the enterprise intends to increase the contribution of those areas to forty four% of overall revenues through 2018.
proceed to part 10
Browse this sequence on Market Realist:
Toronto, Ontario, Feb 11, 2019 (Newsfile Corp by way of COMTEX) -- Relay scientific Corp. (otcqb:RYMDF) (EIY2) ("Relay" or the "enterprise"), an engine of MedTech innovation, is completely happy to report on building activities and hardware design on the Pharmatrac treatment administration technology. Following the completion of the primary Relay led Pharmatrac user look at, the company is completely satisfied to current the Pharmatrac's digital label hardware design.
In November 2018 the company announced the graduation of the Relay led Pharmatrac consumer analyze to assist in the evolving design of the medicine management equipment. The consumer look at protocols were designed and carried out with the suggestions of Human components North to aid with the designing of a sensible gadget to accurately address the wants of sufferers and their care circle while compiling statistics to enrich prescription administration and affect patient habits.
figure 1To view an stronger edition of determine 1, please visit:https://orders.newsfilecorp.com/files/952/42764_f66e7cdf14f1a95a_001full.jpg
The Pharmatrac digital label hardware design has been designed to affix to regular sized medication/capsule bottles by the use of both reusable and tamperproof methods. The Digital Label contains Bluetooth and proprietary connectivity channels, an effective speaker, affected person engagement button, identification LED, and a few sensors, packaged in a small tamperproof form aspect with onboard vigor management and reminiscence cache.
The Digital Label is designed to communicate seamlessly with the hardware and software apps in the existing product unencumber pipeline, to create a comprehensive suite of items and services to cater to the wants of patients and care givers. The hardware and apps will raise and simplify treatment administration for each affected person and caregiver, in addition to gathering prosperous facts for the patient/caregiver and for the suppliers and Payors. The cloud-based AI, analytics and predictive algorithms will give exceptional cost to all stakeholders.
"remedy adherence is a fancy concern which is mirrored in their design, business, and go to market strategy. because the client-facing part, the Pharmatrac Digital Label has been designed to present users a frictionless, sensible solution to address the multifaceted challenges of secure and consistent remedy use," observed Lahav Gil, CEO, Relay scientific Corp. "Our philosophy has been to improve a system that addresses the wants of all the most crucial stakeholders inside the prescription atmosphere, and they consider that this complete-solution method has the potential to play a big position in solving this multi billion greenback issue."
The enterprise is at present preparing for the next two consumer reports to examine out its most superior ideas for consumer event and expertise integration. The team continues to design the business structure, which contains pricing thoughts, integration with present wise-audio system and wise domestic methods, like Amazon Alexa and Google domestic, as well because the ordinary income flow thoughts for the subscription provider choices to the users and institutional stakeholders.
The customer gadget launch is a component of a direction to market approach that allows for the Pharmatrac to be built-in with the allotting process on the pharmacy.
treatment non-adherence is a global-wide difficulty that costs payors and healthcare systems billions of greenbacks yearly and puts patrons at massive risk. there is a transforming into need for advice within the administration of medicines and for tips involving adherence to enhance efficiencies within the pharmaceutical ecosystem.
in the u.s. it is estimated that over 20% of americans are on 5 or extra prescribed drugs(1), an expenditure of US $250B every year(2) for prescription drugs. individuals have a tricky time managing their drugs which outcomes in un-vital medical institution admissions (33%-sixty nine%)(three) and readmissions inside 30 days as a result of adherence considerations (~sixty four%)(4).
In North the us it's estimated that affected person compliance and drugs adherence is below 50%(5) which capability more than half of sufferers/consumers are prone to improperly take or bypass drugs, appointments, and different remedy protocols. one hundred twenty five,000 pointless deaths are estimated to turn up each year within the US as a result of this subject(6) and adds an estimated US $290B to the USA healthcare system(7).
1 source: Mayo health center (2009)2 source: Mayo hospital (2009)3 supply: New England Journal of drugs (2005)4 supply: HIN (2010)5 supply: the world fitness corporation (2003)6 source: AM Pharm (1989)7 supply: Mayo health facility (2009)
The Pharmatrac is a UX-centric (person adventure) device designed to improve management and identification of medicines. The device presents refined smart options to sufferers, caregivers and other stakeholders within the pharmaceutical prescription lifecycle.
The preliminary stage of commercialization can be the launch of the 1st generation customer product that consists of a suite of interactive trackers and apps being developed to connect with an AI-driven analytics platform, enabled by way of IBM BlueMix, IBM Watson, and other SaaS modules. The customer product is being designed to integrate with current and evolving smart domestic programs and makes it possible for consumers and caregivers to confidently determine, tune, and monitor medications with the aid of using audio labels, sensors, cloud, AI and Bluetooth expertise, to have an impact on person habits.
the first technology Pharmatrac is deliberate for industrial launch in 2020.
About Relay clinical Corp.
Relay clinical is an evolving "built-in MedTech Accelerator" headquartered in Toronto, Canada, acquiring early-stage technologies and inventions, advancing and getting ready them for pre-business acquisitions in the HealthTech marketplace. by using integrating the funding, development and exit technique into one company led and managed by one professional crew, Relay medical is building the skill to accelerate and transact applied sciences with excessive efficiency and develop into a leading engine for MedTech innovation in the international HealthTech industry.
web site: www.relaymedical.com
Contact:W. Clark KentPresidentRelay medical Corp.office. 647-872-9982 ext. 2TF. 1-844-247-6633 ext. 2investor.family email@example.com
Bernhard LangerEU Investor RelationsOffice. +forty nine (0) 177 774 2314Email: firstname.lastname@example.org
forward-searching information Cautionary commentary
other than statements of ancient fact, this information release consists of certain "ahead-searching suggestions" in the meaning of applicable securities legislation. ahead-looking assistance is often characterized by using words reminiscent of "plan", "are expecting", "undertaking", "intend", "agree with", "assume", "estimate" and different equivalent phrases, or statements that certain hobbies or conditions "might also" or "will" ensue. ahead-searching statements are in keeping with the opinions and estimates at the date the statements are made, and are area to plenty of dangers and uncertainties and different components that may cause specific events or outcomes to vary materially from those anticipated in the ahead-searching statements together with, however now not limited to delays or uncertainties with regulatory approvals, including that of the CSE. There are uncertainties inherent in forward-looking tips, including factors past the enterprise's control. There aren't any assurances that the commercialization plans for the UltraPalm product described during this news unencumber will come into impact on the terms or time body described herein. The enterprise undertakes no duty to update forward-looking counsel if cases or administration's estimates or opinions may still trade apart from as required via legislations. The reader is advised no longer to location undue reliance on ahead-searching statements. additional info making a choice on risks and uncertainties that may have an effect on monetary consequences is contained in the company's filings with Canadian securities regulators, which filings are available at www.sedar.com
To view the source edition of this press free up, please consult with https://www.newsfilecorp.com/unencumber/42764
copyright (c) newsfile corp. 2019
Obviously it is hard assignment to pick solid certification questions/answers assets concerning review, reputation and validity since individuals get sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report objection customers come to us for the brain dumps and pass their exams cheerfully and effectively. They never trade off on their review, reputation and quality because killexams review, killexams reputation and killexams customer certainty is vital to us. Uniquely they deal with killexams.com review, killexams.com reputation, killexams.com sham report grievance, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. In the event that you see any false report posted by their rivals with the name killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com dissension or something like this, simply remember there are constantly terrible individuals harming reputation of good administrations because of their advantages. There are a great many fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, their specimen questions and test brain dumps, their exam simulator and you will realize that killexams.com is the best brain dumps site.
77-604 test prep | MOS-W3C dump | 642-383 questions answers | SPS-202 mock exam | M2080-663 real questions | 9L0-614 VCE | C2010-023 free pdf | FSMC real questions | 000-598 Practice test | 156-915.77 practice exam | HP2-Q01 dumps questions | HPE0-J78 exam questions | 000-609 dumps | 156-215 practice test | 700-260 study guide | AND-401 sample test | SD0-101 free pdf download | 050-684 pdf download | 3X0-103 exam prep | 920-335 braindumps |
Remember these P8060-002 dumps and enroll for the test
We are generally particularly mindful that an imperative issue in the IT business is that there is a nonattendance of significant worth investigation materials. Their exam prep material gives all of you that you should take a confirmation exam. Their IBM P8060-002 Exam will give you exam questions with affirmed answers that mirror the real exam. High gauge and impetus for the P8060-002 Exam. They at killexams.com are set out to empower you to pass your P8060-002 exam with high scores.
IBM P8060-002 exam has given another bearing to the IT enterprise. It is presently needed to certify because of the qualification that prompts a brighter future. Be that because it will, you wish to place great effort in IBM IBM Managed File Transfer Technical Mastery Test v1 test, in delicate of the actual fact that there will be no escape out of poring over. killexams.com have created your swish, currently your test preparing for P8060-002 IBM Managed File Transfer Technical Mastery Test v1 is not intense from now on. Click http://killexams.com/pass4sure/exam-detail/P8060-002 killexams.com Discount Coupons and Promo Codes are as under; WC2017 : 60% Discount Coupon for all exams on website PROF17 : 10% Discount Coupon for Orders additional than $69 DEAL17 : 15% Discount Coupon for Orders additional than $99 SEPSPECIAL : 10% Special Discount Coupon for All Orders As, the killexams.com will be a stable and dependable qualification furnishes P8060-002 exam questions with 100 percent pass guarantee. you wish to hone questions for a minimum of someday at any charge to attain well within the test. Your real expertise to success in P8060-002 exam, sure enough starts offevolved with killexams.com test questions that's the astonishing and examined wellspring of your focused on perform.
If you're seeking out P8060-002 Practice Test containing Real Test Questions, you are at proper place. They have compiled database of questions from Actual Exams in order to help you prepare and pass your exam on the first try. All training materials at the site are Up To Date and tested via their specialists.
killexams.com provide cutting-edge and up to date Practice Test with Actual Exam Questions and Answers for brand new syllabus of IBM P8060-002 Exam. Practice their Real Questions and Answers to Improve your understanding and pass your exam with High Marks. They make sure your achievement in the Test Center, protecting all of the subjects of exam and build your Knowledge of the P8060-002 exam. Pass four sure with their accurate questions.
100% Pass Guarantee
Our P8060-002 Exam PDF includes Complete Pool of Questions and Answers and Brain dumps checked and established inclusive of references and references (wherein applicable). Their goal to collect the Questions and Answers isn't always best to pass the exam at the start strive however Really Improve Your Knowledge about the P8060-002 exam subjects.
P8060-002 exam Questions and Answers are Printable in High Quality Study Guide that you could download in your Computer or some other tool and begin making ready your P8060-002 exam. Print Complete P8060-002 Study Guide, carry with you while you are at Vacations or Traveling and Enjoy your Exam Prep. You can get right of entry to up to date P8060-002 Exam out of your online account every time.
nside seeing the bona fide exam material of the brain dumps at killexams.com you could without numerous an enlarge broaden your declare to fame. For the IT specialists, it's miles fundamental to modify their capacities as showed by way of their work need. They make it primary for their customers to hold certification exam with the assist of killexams.com confirmed and sincere to goodness exam material. For an splendid destiny in its domain, their brain dumps are the excellent choice. A nice dumps creating is a primary section that makes it straightforward for you to take IBM certifications. In any case, P8060-002 braindumps PDF offers settlement for applicants. The IT announcement is a important troublesome attempt if one doesnt locate proper course as obvious aid material. Thus, they have true and updated material for the arranging of certification exam. It is essential to acquire to the guide cloth in case one desires towards keep time. As you require packs of time to look for revived and true exam material for taking the IT certification exam. If you locate that at one location, what can be higher than this? Its simply killexams.com that has what you require. You can store time and keep a strategic distance from hassle in case you purchase Adobe IT certification from their website online.
killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017 : 60% Discount Coupon for all tests on internet site
PROF17 : 10% Discount Coupon for Orders greater than $69
DEAL17 : 15% Discount Coupon for Orders extra than $ninety nine
DECSPECIAL : 10% Special Discount Coupon for All Orders
Download your IBM Managed File Transfer Technical Mastery Test v1 Study Guide straight away after shopping for and Start Preparing Your Exam Prep Right Now!
P8060-002 | P8060-002 | P8060-002 | P8060-002 | P8060-002 | P8060-002
Killexams HP2-W104 VCE | Killexams 000-223 braindumps | Killexams JN0-560 study guide | Killexams HP0-D03 test prep | Killexams 156-915-70 dump | Killexams 310-814 exam prep | Killexams 156-315-75 bootcamp | Killexams OMG-OCRES-A300 real questions | Killexams A2040-956 examcollection | Killexams 920-316 practice exam | Killexams HP0-S45 Practice test | Killexams 000-752 braindumps | Killexams 000-M20 dumps questions | Killexams 250-505 questions and answers | Killexams 310-540 practice questions | Killexams HP0-460 cheat sheets | Killexams 300-175 study guide | Killexams 00M-641 braindumps | Killexams C9510-319 test prep | Killexams 190-831 free pdf |
Killexams EADA10 brain dumps | Killexams 00M-652 exam prep | Killexams C9020-461 brain dumps | Killexams HP0-919 practice questions | Killexams HP0-J59 study guide | Killexams CAT-060 dumps | Killexams 9A0-097 questions answers | Killexams HP0-M18 test questions | Killexams C2040-958 bootcamp | Killexams C2180-271 free pdf download | Killexams P8010-003 examcollection | Killexams 000-609 Practice test | Killexams AND-403 free pdf | Killexams MB2-706 braindumps | Killexams 1Y0-311 cram | Killexams 9L0-608 sample test | Killexams 250-370 braindumps | Killexams BH0-011 free pdf | Killexams 00M-241 test prep | Killexams HP0-J16 test prep |
Not long ago, Google produced a video that’s making the rounds on the Internet. In it, a Google employee asks people in Times Square in New York City a series of questions, such as “What is a browser?”, “What browser do you use?”, and “Have you heard of Google Chrome?” (Chrome is Google’s new Web browser; it’s available for Windows and in pre-release test versions for the Mac.)
Among the geek set, the video has gotten a lot of play because most of the people in the video – who appear to be functional adults and who use the Internet regularly – come off as highly clueless. According to the video, only 8 percent of people queried that day knew what a browser is.
The video is clearly not a scientific study, and suffers from horrible methodology. It’s likely, for instance, that simply asking “What is a Web browser?” would have produced better results, and the middle of Times Square is undoubtedly not where most people are thinking about the names of programs on their computers. But let’s leave aside such criticisms for the moment.
What’s Your Browser? Instead, let’s take the results on face value and consider their implications. What does it say about the technological world in which they live that 92 percent of the people asked could not identify the name of the program they use to access the Web? If other statistics are to be believed, browsing the Web is the primary use of computers today, so that’s saying these people couldn’t name the program they use more than any other.
Worse, some of the answers on the video reveal that they don’t even know what a program is. A number of them identified their browser as “a search engine” and “Google.” When asked which browser he used, one guy said “the big E,” undoubtedly meaning Microsoft Internet Explorer, which has a stylized lowercase letter E as its icon.
When the best someone can come up with is a vague recollection of a program’s icon, it says to me that we’ve entered a “post-literate” technological society, one in which people have lost not just the ability to read and write about a topic, but also the ability to speak about it, all while retaining the ability to use it.
As someone who earns a living crafting text to help people learn how to use technology, I found myself profoundly troubled by Google’s video. After all, if someone doesn’t know what browser they use, or even that a browser is a program on their computer, how could I possibly expect them to be interested in buying my company’s “Take Control of Safari 4” book (written, with infinite care, by the estimable Sharon Zardetto)? How could they even learn of its existence, if they had no idea that Safari is a Web browser or that they were using Safari?
(One concern that I don’t explore further in this article are the implications of a post-literate technological society for marketing technology itself – will even technology marketing be forced to rely solely on pretty pictures and emotional appeals? In fact, are they already there? Apple’s “I’m a Mac” ads help customers identify with the actor playing the Mac but give little solid information, and Apple conceals many technical specifications about the iPhone.)
But perhaps I’m barking up the wrong tree, and Google’s video in fact shows that we’ve taken great technological strides. TidBITS editor Glenn Fleishman, when they were discussing the video, suggested that it’s a good thing that the Web browser has become so ubiquitous that people need not know what it’s called to use it effectively.
(Linguistically, this same devolution has happened with the Web itself. Although it’s TidBITS house style to capitalize “Web” – a proper noun that’s a shortening of “World Wide Web” – it’s commonplace to see even professionally edited publications lowercase the word, thus de-emphasizing the fact that it’s a unique thing. I think they’re wrong: “Web” should always be capitalized, as should “Internet.”)
From a usability stance, I think I agree with Glenn – it’s a good thing that using the Web has become so easy that a myriad of people can do so without even knowing the name of the tool they use to access it. Most people just use the browser that comes bundled with their computer, and despite the issues with Microsoft Internet Explorer over the years, Firefox has garnered only a bit over 20 percent of the browser market since 2004 – largely from the small subset of people who know what a browser is.
On a platform like the iPhone, it’s even easier to see this trend toward obscuring the identity of the browser. Although Safari is the iPhone’s Web browser, and its icon is clearly named, applications like Twitterrific can display Web content internally, and others, like Mail, can open a Web link in Safari without ever informing you that Safari is displaying your page. It would be difficult to quibble with someone who didn’t realize that their iPhone browser was Safari, when in fact, much of the time they would be viewing the Web via some other app that piggybacks on top of OS X’s WebKit core.
Tied up in all of this is the fact that if what’s bundled with your computer or phone just works, you don’t need to learn much more. Dissatisfaction is the mother of exploration – only if Safari or Internet Explorer isn’t meeting your needs do you have much impetus to learn about and switch to Firefox. So the better technology works, the less we’ll learn about how it works. I can’t say that’s entirely a bad thing.
When the Thing Breaks — But I remain troubled by this post-literate inability to talk about everyday activities and the tools used to perform them, using the proper nouns that are not only generally agreed-upon by those in the know, but with which the graphical representations of those tools are clearly labeled. What happens when something goes wrong, and such a person can’t connect to the Internet at all? Can you imagine the tech support call?
"Hi, this is tech support. How may I help you?"
"I can't get on the Google."
"OK, what browser are you using?"
"I told you - Google."
"Let's step back for a second. What program are you running on your computer to access the Web?"
"I don't know - I just Google when I want to find something."
"Perhaps they should go a bit further back. What icon do you click on when you want to use Google?"
"The picture? It's blue and kind of round, I think."
"OK, that's probably Internet Explorer. Can you load any Web sites other than Google?"
"If I can't get on Google, how can I load any other Web sites?!"
I could draw this out further, but it’s not far-fetched (TidBITS staffer Doug McLean confirmed that my contrived dialog was painfully reminiscent of tech support calls he took in a previous job). In essence, the caller and the support rep don’t share a common language. They may both be speaking English, but that’s as far as it goes, and as soon as domain-specific words like “browser” come into play, communication breaks down. A good support rep would undoubtedly adjust his questions upon realizing that there’s a terminology barrier, and like Captain Kirk meeting an alien, would attempt to build up some shared terminology based on visual appearance before attempting to solve the problem.
Generational Problem Solving — If I asked you to tell me something about the caller in my fabricated script above, you might fall back on stereotypes and describe the caller as being elderly, or at least as someone who didn’t grow up with technology and therefore has come to it, perhaps grudgingly, later in life. But what if I told you it could be a college student?
My neighbor Peter Rothbart teaches music at Ithaca College, and he’s been noticing a disturbing trend among his students. Although they’re capable of using the digital music software necessary for his courses, he says that many of them have trouble with the most basic of computer tasks, like saving files in a particular location on the hard disk. Worse, if something does go wrong, he finds, they have absolutely no idea how to solve the problem.
These aren’t the sort of kids who are befuddled by high school – they’re students at a well-respected institution of higher education. (It’s the alma mater of Disney CEO Robert Iger, for instance.) No, they’re not computer science majors, but they’re not being asked to program, just to use off-the-shelf music software and perform commonplace tasks. And now those commonplace tasks are not only something that they apparently have never had to do, but lack the skills to figure out on their own.
Could this inability to solve a problem with a device with which they are otherwise familiar be a result of losing some ability to talk about it? I wouldn’t go so far as to say it’s impossible to troubleshoot without terminology, but it’s less radical to suggest that troubleshooting will become more difficult without being able to communicate effectively with people who are experts in the field.
Not all that long ago, when adults had trouble getting something working on a computer, they would sarcastically say that they needed a teenager to explain it to them. That was largely true of those of us who were teenagers in the 1980s and 1990s, but if Peter Rothbart’s experience is at all representative, today you’d be better off finding a 30- or 40-year-old geek to help.
Don’t get me wrong – I’m not saying that all young people are incapable of solving technical problems or going beyond the basics. My friend Dave Burbank, whose full-time job is as a fireman in the City of Ithaca, is also a serious geek known for taking hundreds of photos on his kids’ class trips, posting constant updates via Twitter, and updating a photo Web site for the trip before turning in each night. His 15-year-old son Istvan is currently a 3D animator at Moving Box Studios in Ithaca and is perfectly capable of maintaining a technical discussion on the evolution of backup media and other such geeky topics.
In other words, there will always be geeks, and in my mind, that’s a darn good thing. The technological sophistication of those people of my generation (I’m 41 now) who were interested in technology created the meme that young people were fluid with technology. But what they all missed was that being fluid with technology doesn’t mean you understand how it works or can fix it when it breaks. Being able to dash off text messages on a mobile phone demonstrates fluidity; being able to troubleshoot a dead Internet connection down to a corrupted preference file or flaky cable demonstrates understanding.
So what will most members of society do when something on their computers or smartphones fails to work? Let’s not pretend that problems won’t happen – technology may have become more reliable over time, but the rate at which things go wrong even for undemanding users is still shamefully high.
Just recently, my father called because his iPod wouldn’t show up in iTunes. After some back and forth, I suggested that he reset the iPod, and when he went to use it, he realized it was indeed entirely frozen. A hard reset brought it back to life and resolved his problem, but had he been on his own, it’s possible that he – or at least someone less experienced than he is – would have concluded it was broken and bought another one.
This isn’t a new concern. In 1909, E.M. Forster wrote a piece of early science fiction, “The Machine Stops,” in which he imagined a future in which face-to-face contact was considered bizarre, humanity lived underground, and the “Machine” fed all their needs. Of course, one day…the machine stopped. More recently and amusingly, consider the Pixar movie “Wall-E.”
Cars and Computers — The obvious analogy in today’s world, and one that several people have suggested in response to their discussions, is the car. At one time, knowledge of keeping a car running was a kind of patriarchal rite of passage. Failure to monitor oil levels, radiator fluids, and other factors could lead to a dead horseless carriage.
Few people know how cars work these days, and even those of us who do have a basic understanding of them can’t really work on a modern car. If the car stutters when accelerating, or sometimes won’t start, most of us simply take it in to the repair shop and get it fixed. Problem solved with the application of money, and of course, since cars work relatively well these days, much less monitoring is needed. When was the last time you checked your car’s fluids?
Like so many automotive analogies, this one sounds good, but suffers under scrutiny. In part, repairing cars has become a specialty not so much because intelligent people couldn’t understand what’s wrong or figure out how to troubleshoot it, but because the training and equipment necessary to diagnose problems and effect repairs have themselves become highly specialized. Gone are the days when you could fix a car with a few screwdrivers and a set of wrenches. The shops all download data from the car computer for diagnosis.
But the more serious problem with the analogy is that cars are single-purpose machines – they do one thing, and they do it moderately well. Thus, the type of problems they can suffer, while troubling, frustrating, and sometimes seemingly inexplicable, are still relatively limited in scope, more like a household appliance. How often do you have to check the inner workings of your washing machine or refrigerator?
In contrast, computers are general purpose machines that can perform a vast number of wildly different tasks, such as browsing the Web, reading email, writing a book, developing a company budget, tracking a database of customers, composing music, editing video, and so on.
We have up-and-coming geeks like Istvan Burbank, but even bright young men like Istvan have their limits. While I’d happily ask him to fix a Mac that’s not booting, I’m not sure he’d have any idea how to help if I showed him a PDF where the text on some pages appeared darker and bitmapped when viewed in certain PDF readers (even Adobe hasn’t been able to fix that problem reliably for me). There’s a limit to how much any one of us can learn, but there’s no limit to what a computer can do.
In a way, this is an odd situation for those of us who grew up with the personal computer. Before Apple, before the IBM PC, they had mainframes and minicomputers that they interacted with via dumb terminals. You couldn’t do all that much, and you were sharing resources with many other people, but you also didn’t have to worry about things going wrong as much, because when they did, the computer operators would fix them.
They were the gatekeepers, the wizards who controlled access and could say who was allowed to do what. Personal computers were supposed to democratize computing so anyone and everyone could do their own work. While that’s come to pass in some ways, it seems to me that we’ve returned to the days when you need a wizard to solve problems or do anything beyond the norm. It’s a somewhat uncomfortable situation, since those of us who grew up with personal computers are finding that we’re the new wizards.
Technological Illiteracy — So how did they get here? I’d argue that Apple – and they Macintosh users – are perhaps more to blame for this state of affairs than any other group. After all, no one has championed usability like Apple, with the Mac’s vaunted ease-of-use. For years, many Mac users scoffed at manuals. “Why would anyone need a manual when the program is so easy to use?” they’d ask. It was a fair point, for the users of the time, who were highly interested in the technology, well versed in how it actually worked under the hood, and amenable to poking and prodding when things didn’t go right.
But then they got their wish, and ever more companies started writing software that was easy enough for most people to use without reading a manual, at least at some level. That was the death of documentation, a phrase I first coined more than 10 years ago (see “The Death of Documentation,” 1998-05-04). Of course, it was really the death of the manual, and technical books have remained popular, in part because of the lack of the manual (how else could David Pogue have made a mint on his Missing Manual series?).
Even still, back when I started writing technical books in the early-to-mid 1990s, the average computer book would sell about 12,000 copies. Today, despite a vastly larger audience (though with much more competition), 5,000 copies is considered acceptable.
I’d argue there was a more insidious effect from the loss of manuals – it caused an entire class of users to become technologically functional while remaining technologically illiterate. When I asked my mother-in-law, Linda Byard, what browser she used, she became somewhat flustered and guessed at Outlook. This is a woman who uses the Web fluidly and for all sorts of tasks far more sophisticated than simply browsing static Web pages. And yet, the fact that she used Internet Explorer to do so escaped her.
As the conversation proceeded (and keep in mind that my father-in-law, Cory Byard, helped design personal computers for NCR back in the 1980s and now consults on massive database projects for Teradata – Tonya didn’t grow up in a technologically backward household), it came out that Linda had stopped reading about how to use technology when manuals gave way to inferior online help.
She didn’t stop learning how to use various programs, but without any sort of formalized instruction or written reference, she lost the terminology necessary to talk about the technology she was using. Of course, she had Cory around to fix anything that went wrong, and she said that the same was true of all her peers too – there was always someone technologically adept in the family to deal with troubles.
Although it’s harder to pin this loss of technological literacy on the lack of manuals when looking at schoolkids, the problem isn’t necessarily being addressed there either. When my son Tristan was in second and third grade in the public schools in Ithaca, NY, the closest he was taught to computer skills were typing (not a terrible idea, but tricky for kids whose hands aren’t large enough to touch-type properly) and PowerPoint.
Although some level of presentation skills are certainly worthwhile, why would you have second graders focus on something that’s guaranteed to be different (if not entirely obsolete) by the time they’re in college?
I’d argue that some of the basics of technology – the concept of a program as a set of instructions and the essentials of networking – would be both more compelling for kids and more useful for understanding the way the world works later in life.
When TidBITS contributing editor Matt Neuburg tried to teach a group of his friends’ kids REALbasic one summer, he found himself frustrated at almost every turn – they lacked the conceptual underpinning that they could make the computer do something. And more important, they didn’t care, since they were accustomed to technology just working. It wasn’t until he got them to draw a stick figure and, by changing the location of its parts repeatedly, make it walk across the screen, that one of them said, “Hey, this must be how my video games are made.”
And networking? No, you don’t need to know it works to use the Internet, but isn’t it wondrous that an email message sent to a friend on the other side of the globe in Australia is broken up into many small pieces, shuttled from computer to computer at nearly the speed of light, and reassembled at its destination, no more than seconds later? Wouldn’t it be fun to act out a packet-switched network with an entire class of second graders and the pieces of a floor puzzle? Or at least more fun than PowerPoint?
Luckily, this lack in the public education system isn’t uniform. Glenn Fleishman’s son Ben is about to enter a public elementary school in Seattle, where the beginning curriculum teaches kids about opening, saving, and printing files; later, it moves to task-based – not program-oriented – computer projects. That’s much better.
But I digress.
Illiteracy Stifling Innovation? My more serious concern with their society’s odd fluency with a technology that they cannot easily communicate about is that it might slowly stifle innovation. Already we’re in a situation where browser innovation is almost the sole province of Apple and Microsoft, with contributions from Mozilla, Google, and maybe Opera.
Iterative changes from the incumbents can be worked in, since everyone will be forced to accept them, but does it become harder to convince most people to try a ground-breaking new technology because it’s different, because it’s talked about using strange new terminology, and perhaps because no paradigm-shifting new technology can by definition be so easy to use that it doesn’t require some level of training? I fear that might be the case.
In the dawn of the computer age, the stakes weren’t as high and the market wasn’t as large, so I’d suggest that companies were more likely to take risks on innovative technologies that might appeal to only a small subset of the population. Today, with everyone using technology, I suspect that business plans and funding proposals all assume a large potential audience, which in turn causes the ideas to be vetted more on their business chances than their technological innovation.
Put another way, there have always been technological haves and have nots, but since there was no chance of selling technology to the have nots, technology of the past was less limited by the literacy of the audience. Since the technologically illiterate are not just buying technology now, but are the primary market for it, that has to be affecting the kind of ideas that get funding and are being developed in a real way.
Plus, think back to the point about dissatisfaction being the mother of exploration. They geeks may be willing to belly up to the new technology feeding trough since we’re never satisfied. But once technology reaches a certain plateau of working well enough, if this lack of technological literacy is indeed a more general concern, spreading technological successes into the population as a whole may become all the more difficult.
I’m fully aware that my musings here are largely hypothetical and based on anecdotal evidence. But I think there’s a new technology on the horizon that could serve as a test of my theory that anything sufficiently innovative will face an uphill battle due to the technological illiteracy of the user base: Google Wave.
For those who didn’t see Google’s announcement of Google Wave (we didn’t cover it in TidBITS at the time because it was a technology announcement, not a service that people could use), it’s a personal communication and collaboration tool that’s designed to merge the strengths of email, instant messaging, wikis, and social networking services. (You can read more about it at Wikipedia.)
On the plus side, Google Wave has the power of Google behind it, and Google could potentially merge it into Gmail, thus introducing it to 146 million users nearly instantaneously. But Google Wave will undoubtedly be quite different from Gmail, and will require a learning curve. Will that hamper its adoption, since email and instant messaging and other services work well enough that people aren’t sufficiently dissatisfied to learn about and try Google Wave? Only time will tell.
Hardware and software are certainly different beasts. Software is really just information, and the storing, modification, duplication, and transmission of information is essentially free. Hardware is expensive, or so they think, because it’s made out of physical stuff which is costly to ship or copy. So when they talk about open-source software (OSS) or open-source hardware (OSHW), we’re talking about different things — OSS is itself the end product, while OSHW is just the information to fabricate the end product, or have it fabricated.
The fabrication step makes OSHW essentially different from OSS, at least for now, but I think there’s something even more fundamentally different between the current state of OSHW and OSS: the pull request and the community. The success or failure of an OSS project depends on the community of people developing it, and for smaller projects that can hinge on the ease of a motivated individual digging in and contributing. This is the main virtue of OSS in my opinion: open-source software is most interesting when people are reading and writing that source.
With pure information, it’s essentially free to copy, modify, and push your changes upstream so that others can benefit. The open hardware world is just finding its feet in this respect, but that’s changing as they speak, and I have great hopes. Costs of fabrication are falling all around, open and useful tools are being actively developed to facilitate interchange of the design information. I think there are lessons that OSHW can learn from the OSS community’s pull-request culture, and that will help push the hardware hacker’s art forward.
What would it take to get you to build someone else’s OSHW project, improve on it, and contribute back? That’s a question worth a thoughtful deep dive.The Patch and the Pull Request
Back in the early days of what they now think of as open-source software, there was the patch. Indeed, the UNIX utilities diff and patch are probably the unsung heroes of the OSS movement. They enabled a programmer to easily figure out the difference between two (source code) files and pass those changes on to someone else.
Then along came Linux, which started off as a pet project of Linus Torvalds’, but grew to include so many contributors that handling the patch requests became a full-time job for Linus, and then for his “lieutenants” as he subdivided the responsibilities. When Linus needed a version control system for the Linux codebase, he wrote his own: git. No surprise, it was based on the idea of recording and handling incremental patches, but in a distributed manner that gave his lieutenants (but also anyone in the community) the autonomy they wanted to work on the code and then ask Linus to pull their changes in when ready.
It’s easy enough to set up your own web-facing git repository to share your code with the world, but just as more people use e-mail or web-hosting services rather than rolling their own, it’s a lot easier to use a service for small projects. Add in a social-networking overlay to a public git repository, and you’ve got GitHub, the de facto means of sharing and working on OSS information. With a Wiki for community documentation helping you along the way, it’s all downright comfortable to tweak OSS these days.
TL;DR: the heart and soul of OSS these days is pointing your browser at a website, copying the code, using it and improving it, and asking to get your improvements pulled back into the project the same way you got it in the first place. Easy-peasy.Costly Fabrication
What would the pull-request cycle look like in the OSHW world? I download your design, look over the bill of materials (BOM), and decide to get a PCB manufactured and parts ordered. It arrives, and I play with it. Maybe I make modifications on the board itself or maybe, assuming that I can open up your design files, I make some modifications and order yet another version with my changes. If my changes work, I’ll submit a pull request back to you. Do you verify my changes by producing another one of your things? You can see where the friction introduced to the system by the need for fabrication raises its ugly head, two or three times: at least once for the changed version and once to verify that the change doesn’t break the original project. That’s something they need to work on.
On one hand, small-scale manufacturing has never been easier or cheaper. Gone are the days of spending hundreds on prototype PCBs; there are sources everywhere that will get the job done so inexpensively that many otherwise respectable hackers don’t even consider producing a one-off board at home. Of course the home PCB fab has also never been cheaper, with CNC mills capable of routing a board coming in around $200, or the relative ease of getting good results at home even with toner transfer. Add to this the secret weapon of a well specified BOM, maybe even one that can be ordered with one click or CSV upload, and the frictions here can be minimized. So far, so good. At least it’s plausible that I could replicate your masterwork.
If the fabrication costs are around $20 and a half-hour of time, I could maybe expect you, the diligent project maintainer, to approve one pull request per week, or maybe only if the patch improves the project enough to warrant a rebuild. But what if you ran three or five such successful projects? And it gets worse as a project scales up, of course. I wouldn’t expect a project owner to spin up a board with a $150 BOM cost just to verify my tweaks to the audio output section.
For yourself and any potential contributors to the project, it’s probably worth thinking about making the design as inexpensive and non-time-consuming to fabricate as possible. If you want pull requests, you’ll be looping through fabrication more than once, so extra time here pays off. But with the capabilities of DIY and small-scale fabrication ever increasing, and the price of professional work dropping, the fabrication step is becoming less and less of a barrier, at least for small projects.Design for Modification
What about big projects that are simply too intricate to replicate more than once or twice per user? Is there any hope for the pull request in ambitious OSHW projects?Adrian Bowyer’s Mendel
If you look at the RepRap project as a whole, it certainly has resulted in the very rapid, distributed development of open-source 3D printers, but you might not expect downstream changes to percolate upwards very rapidly. After all, building any printer from scratch costs $300 to $600 or more, takes hours of time, and isn’t a task that someone’s going to undertake just to check out your pull request.
But still, some of the most successful printers have a good degree of visible community contribution: the old Prusa Mendel has 30 pull requests, and the current Prusa 3 design scores 44. [Nophead], the designer of Mendel90, the other early square cartesian bot, was initially very reluctant to take community help. Interestingly, since he opened his project up on GitHub, he’s received 38 pull requests, and incorporated 35 of them. Success!
How can this be? First, these printer designs are entirely open, written in the parametric, and very easy to tweak OpenSCAD language. OpenSCAD is itself free, as well. So anyone with a 3D printer who wants to try out a modification has a very low barrier to entry. And a 3D printer is also eminently modifiable and tweakable. Many of the sub-assemblies are entirely modular and can be swapped out at minimal cost. You don’t have to build a whole new printer to test out various new hot-end mount designs, and neither do [Jo Prusa] or [Nophead] when they accept your patch.
Incremental changes are easiest to make when you only need to change one section, and not the global design. Modular design, with well-defined sub-units whenever possible, encourages improvement. (Am I talking about object-oriented coding or parts placement that locates the power supply off in a corner on its own on the PCB?) Can you use off-the-shelf breakout modules that are sourceable on the cheap that can be unplugged and reused in the next revision? Maybe you should.Open-Source Tools
Releasing your design files to the world doesn’t mean anything if others can’t dig in and help you improve them, and that means that they have the tools to do the job. With code, all that’s really required is a text editor and maybe a compiler. With hardware, the “code” — the design files — are often wrapped up in proprietary tools, which instantly limits the audience of potential contributors.
The obvious choice here is KiCad, which is open source and runs on everything. Of course, there’s still the learning curve that accompanies any package that’s not the one you’re used to, but until the entire industry settles on a compatible file format for schematic capture and PCB layout, you might as well choose the most open, widely available, and least encumbered tool.
Eagle, which has had an XML export format since Version 6 in 2012, is another contender. The tool is free to use for small boards, and it has a large number of users. They know how to get files out of Eagle’s format very well these days, including exporting entire part libraries, which means that KiCad users can hack on your files. I don’t know if it’s possible to make the round trip, though; can one import KiCad files back into Eagle?
There are many other tools, ranging in price from free to professional-use-only. For this article, I don’t care at all about their relative ease of use — if a large chunk of your target audience can’t use it, or if the file format doesn’t lend itself well to differences and revision tracking, you’re shutting out potential pull requests.The Fine Art of the README
If there’s something else they can learn from the OSS world, it’s how important good and inviting documentation is to the success of a project, both for the end-user and for the potential hacker. And perhaps the first lesson here is that the distinction between end-user and hacker isn’t that great.
The potential hacker will also be more likely to try your project out in the first place if it’s easy and appealing to make, just like the end-user. 77.23% of all statistics are made-up, but I’d bet that the overwhelming majority of folks contributing to OSS projects are satisfied, or maybe even slightly disgruntled, users of the software in question. So show potential builders how to build and use your project, but don’t forget to show potential hackers how it works and how they can get inside it. And if you want to accept pull requests, don’t forget to say so, out loud.Feedback?
Can they build a pull-request culture in OSHW? I hope so, because that’s the best part of OSS, but I’m also realistic. The raw physicality of the real world will always get in the way to some extent, but the pure cost barrier of replication is shrinking year on year. After that, it’s a simple matter of software, and getting everyone to use interoperable design tools. Yeah, that’s hard.
So in the mean time, what can you do to make your OSHW project more appealing for other hackers to contribute to? If the costs, both in labor and money, of replication are as low as possible, someone might make it. If they make it, how likely are they to improve it? That depends on how modifiable and modular the design is.
If you’re using non-free software for the design, can the data at least be exported? Or can the user work around your inflexibility by simply exporting the design to the tool of their choice? Finally, how well documented and inviting is your project for potential contributors, not just in use, but also in modification? Do you say you encourage pull requests?
Anyway, there’s some brainstorming about how they could make large-scale community OSHW work. Naturally, I’d love to hear your take, and examples of any successful projects with contributions from the public, in the comments. What else?
Despite the wide selection of vendor-specific information technology security certifications, identifying which...
ones best suit your educational or career needs is fairly straightforward.
This guide to vendor-specific IT security certifications includes an alphabetized table of security certification programs from various vendors, a brief description of each certification and advice for further details.Introduction: Choosing vendor-specific information technology security certifications
The process of choosing the right vendor-specific information technology security certifications is much simpler than choosing vendor-neutral ones. In the vendor-neutral landscape, you must evaluate the pros and cons of various programs to select the best option. On the vendor-specific side, it's only necessary to follow these three steps:
In an environment where qualified IT security professionals can choose from numerous job openings, the benefits of individual training and certifications can be hard to appraise.
Many employers pay certification costs to develop and retain their employees, as well as to boost the organization's in-house expertise. Most see this as a win-win for employers and employees alike, though employers often require full or partial reimbursement for the related costs incurred if employees leave their jobs sooner than some specified payback period after certification.
There have been quite a few changes since the last survey update in 2015. The Basic category saw a substantial jump in the number of available IT security certifications due to the addition of several Brainbench certifications, in addition to the Cisco Certified Network Associate (CCNA) Cyber Ops certification, the Fortinet Network Security Expert Program and new IBM certifications.
Certifications from AccessData, Check Point, IBM and Oracle were added to the Intermediate category, increasing the total number of certifications in that category, as well. However, the number of certifications in the Advanced category decreased, due to several IBM certifications being retired.Basic information technology security certifications
Brainbench basic security certificationsBrainbench offers several basic-level information technology security certifications, each requiring the candidate to pass one exam. Brainbench security-related certifications include:
Source: Brainbench Information Security Administrator certifications
CCNA Cyber OpsPrerequisites: None required; training is recommended.
This associate-level certification prepares cybersecurity professionals for work as cybersecurity analysts responding to security incidents as part of a security operations center team in a large organization.
The CCNA Cyber Ops certification requires candidates to pass two written exams.
Source: Cisco Systems CCNA Cyber Ops
CCNA SecurityPrerequisites: A valid Cisco CCNA Routing and Switching, Cisco Certified Entry Networking Technician or Cisco Certified Internetwork Expert (CCIE) certification.
This credential validates that associate-level professionals are able to install, troubleshoot and monitor Cisco-routed and switched network devices for the purpose of protecting both the devices and networked data.
A person with a CCNA Security certification can be expected to understand core security concepts, endpoint security, web and email content security, the management of secure access, and more. He should also be able to demonstrate skills for building a security infrastructure, identifying threats and vulnerabilities to networks, and mitigating security threats. CCNA credential holders also possess the technical skills and expertise necessary to manage protection mechanisms such as firewalls and intrusion prevention systems, network access, endpoint security solutions, and web and email security.
The successful completion of one exam is required to obtain this credential.
Source: Cisco Systems CCNA Security
Check Point Certified Security Administrator (CCSA) R80Prerequisites: Basic knowledge of networking; CCSA training and six months to one year of experience with Check Point products are recommended.
Check Point's foundation-level credential prepares individuals to install, configure and manage Check Point security system products and technologies, such as security gateways, firewalls and virtual private networks (VPNs). Credential holders also possess the skills necessary to secure network and internet communications, upgrade products, troubleshoot network connections, configure security policies, protect email and message content, defend networks from intrusions and other threats, analyze attacks, manage user access in a corporate LAN environment, and configure tunnels for remote access to corporate resources.
Candidates must pass a single exam to obtain this credential.
Source: Check Point CCSA Certification
IBM Certified Associate -- Endpoint Manager V9.0Prerequisites: IBM suggests that candidates be highly familiar with the IBM Endpoint Manager V9.0 console. They should have experience taking actions; activating analyses; and using Fixlets, tasks and baselines in the environment. They should also understand patching, component services, client log files and troubleshooting within IBM Endpoint Manager.
This credential recognizes professionals who use IBM Endpoint Manager V9.0 daily. Candidates for this certification should know the key concepts of Endpoint Manager, be able to describe the system's components and be able to use the console to perform routine tasks.
Successful completion of one exam is required.
Editor's note: IBM is retiring this certification as of May 31, 2017; there will be a follow-on test available as of April 2017 for IBM BigFix Compliance V9.5 Fundamental Administration, Test C2150-627.
Source: IBM Certified Associate -- Endpoint Manager V9.0
IBM Certified Associate -- Security Trusteer Fraud ProtectionPrerequisites: IBM recommends that candidates have experience with network data communications, network security, and the Windows and Mac operating systems.
This credential pertains mainly to sales engineers who support the Trusteer Fraud product portfolio for web fraud management, and who can implement a Trusteer Fraud solution. Candidates must understand Trusteer product functionality, know how to deploy the product, and be able to troubleshoot the product and analyze the results.
To obtain this certification, candidates must pass one exam.
Source: IBM Certified Associate -- Security Trusteer Fraud Protection
McAfee Product SpecialistPrerequisites: None required; completion of an associated training course is highly recommended.
McAfee information technology security certification holders possess the knowledge and technical skills necessary to install, configure, manage and troubleshoot specific McAfee products, or, in some cases, a suite of products.
Candidates should possess one to three years of direct experience with one of the specific product areas.
The current products targeted by this credential include:
All credentials require passing one exam.
Source: McAfee Certification Program
Microsoft Technology Associate (MTA)Prerequisites: None; training recommended.
This credential started as an academic-only credential for students, but Microsoft made it available to the general public in 2012.
There are 10 different MTA credentials across three tracks (IT Infrastructure with five certs, Database with one and Development with four). The IT Infrastructure track includes a Security Fundamentals credential, and some of the other credentials include security components or topic areas.
To earn each MTA certification, candidates must pass the corresponding exam.
Source: Microsoft MTA Certifications
Fortinet Network Security Expert (NSE)Prerequisites: Vary by credential.
The Fortinet NSE program has eight levels, each of which corresponds to a separate network security credential within the program. The credentials are:
NSE 1 is open to anyone, but is not required. The NSE 2 and NSE 3 information technology security certifications are available only to Fortinet employees and partners. Candidates for NSE 4 through NSE 8 should take the exams through Pearson VUE.
Source: Fortinet NSE
Symantec Certified Specialist (SCS)This security certification program focuses on data protection, high availability and security skills involving Symantec products.
To become an SCS, candidates must select an area of focus and pass an exam. All the exams cover core elements, such as installation, configuration, product administration, day-to-day operation and troubleshooting for the selected focus area.
As of this writing, the following exams are available:
Source: Symantec CertificationIntermediate information technology security certifications
AccessData Certified Examiner (ACE)Prerequisites: None required; the AccessData BootCamp and Advanced Forensic Toolkit (FTK) courses are recommended.
This credential recognizes a professional's proficiency using AccessData's FTK, FTK Imager, Registry Viewer and Password Recovery Toolkit. However, candidates for the certification must also have moderate digital forensic knowledge and be able to interpret results gathered from AccessData tools.
To obtain this certification, candidates must pass one online exam (which is free). Although a boot camp and advanced courses are available for a fee, AccessData provides a set of free exam preparation videos to help candidates who prefer to self-study.
The certification is valid for two years, after which credential holders must take the current exam to maintain their certification.
Source: Syntricate ACE Training
Cisco Certified Network Professional (CCNP) Security Prerequisites: CCNA Security or any CCIE certification.
This Cisco credential recognizes professionals who are responsible for router, switch, networking device and appliance security. Candidates must also know how to select, deploy, support and troubleshoot firewalls, VPNs and intrusion detection system/intrusion prevention system products in a networking environment.
Successful completion of four exams is required.
Source: Cisco Systems CCNP Security
Check Point Certified Security Expert (CCSE)Prerequisite: CCSA certification R70 or later.
This is an intermediate-level credential for security professionals seeking to demonstrate skills at maximizing the performance of security networks.
A CCSE demonstrates a knowledge of strategies and advanced troubleshooting for Check Point's GAiA operating system, including installing and managing VPN implementations, advanced user management and firewall concepts, policies, and backing up and migrating security gateway and management servers, among other tasks. The CCSE focuses on Check Point's VPN, Security Gateway and Management Server systems.
To acquire this credential, candidates must pass one exam.
Source: Check Point CCSE program
Cisco Cybersecurity SpecialistPrerequisites: None required; CCNA Security certification and an understanding of TCP/IP are strongly recommended.
This Cisco credential targets IT security professionals who possess in-depth technical skills and knowledge in the field of threat detection and mitigation. The certification focuses on areas such as event monitoring, event analysis (traffic, alarm, security events) and incident response.
One exam is required.
Source: Cisco Systems Cybersecurity Specialist
Certified SonicWall Security Administrator (CSSA)Prerequisites: None required; training is recommended.
The CSSA exam covers basic administration of SonicWall appliances and the network and system security behind such appliances.
Classroom training is available, but not required to earn the CSSA. Candidates must pass one exam to become certified.
Source: SonicWall Certification programs
EnCase Certified Examiner (EnCE)Prerequisites: Candidates must attend 64 hours of authorized training or have 12 months of computer forensic work experience. Completion of a formal application process is also required.
Aimed at both private- and public-sector computer forensic specialists, this certification permits individuals to become certified in the use of Guidance Software's EnCase computer forensics tools and software.
Individuals can gain this certification by passing a two-phase exam: a computer-based component and a practical component.
Source: Guidance Software EnCE
EnCase Certified eDiscovery Practitioner (EnCEP)Prerequisites: Candidates must attend one of two authorized training courses and have three months of experience in eDiscovery collection, processing and project management. A formal application process is also required.
Aimed at both private- and public-sector computer forensic specialists, this certification permits individuals to become certified in the use of Guidance Software's EnCase eDiscovery software, and it recognizes their proficiency in eDiscovery planning, project management and best practices, from legal hold to file creation.
EnCEP-certified professionals possess the technical skills necessary to manage e-discovery, including the search, collection, preservation and processing of electronically stored information in accordance with the Federal Rules of Civil Procedure.
Individuals can gain this certification by passing a two-phase exam: a computer-based component and a scenario component.
Source: Guidance Software EnCEP Certification Program
IBM Certified Administrator -- Security Guardium V10.0Prerequisites: IBM recommends basic knowledge of operating systems and databases, hardware or virtual machines, networking and protocols, auditing and compliance, and information security guidelines.
IBM Security Guardium is a suite of protection and monitoring tools designed to protect databases and big data sets. The IBM Certified Administrator -- Security Guardium credential is aimed at administrators who plan, install, configure and manage Guardium implementations. This may include monitoring the environment, including data; defining policy rules; and generating reports.
Successful completion of one exam is required.
Source: IBM Security Guardium Certification
IBM Certified Administrator -- Security QRadar Risk Manager V7.2.6Prerequisites: IBM recommends a working knowledge of IBM Security QRadar SIEM Administration and IBM Security QRadar Risk Manager, as well as general knowledge of networking, risk management, system administration and network topology.
QRadar Risk Manager automates the risk management process in enterprises by monitoring network device configurations and compliance. The IBM Certified Administrator -- Security QRadar Risk Manager V7.2.6 credential certifies administrators who use QRadar to manage security risks in their organization. Certification candidates must know how to review device configurations, manage devices, monitor policies, schedule tasks and generate reports.
Successful completion of one exam is required.
Source: IBM Security QRadar Risk Manager Certification
IBM Certified Analyst -- Security SiteProtector System V3.1.1Prerequisites: IBM recommends a basic knowledge of the IBM Security Network Intrusion Prevention System (GX) V4.6.2, IBM Security Network Protection (XGS) V5.3.1, Microsoft SQL Server, Windows Server operating system administration and network security.
The Security SiteProtector System enables organizations to centrally manage their network, server and endpoint security agents and appliances. The IBM Certified Analyst -- Security SiteProtector System V3.1.1 credential is designed to certify security analysts who use the SiteProtector System to monitor and manage events, monitor system health, optimize SiteProtector and generate reports.
To obtain this certification, candidates must pass one exam.
Source: IBM Security SiteProtector Certification
Oracle Certified Expert, Oracle Solaris 10 Certified Security AdministratorPrerequisite: Oracle Certified Professional, Oracle Solaris 10 System Administrator.
This credential aims to certify experienced Solaris 10 administrators with security interest and experience. It's a midrange credential that focuses on general security principles and features, installing systems securely, application and network security, principle of least privilege, cryptographic features, auditing, and zone security.
A single exam -- geared toward the Solaris 10 operating system or the OpenSolaris environment -- is required to obtain this credential.
Source: Oracle Solaris Certification
Oracle Mobile SecurityPrerequisites: Oracle recommends that candidates understand enterprise mobility, mobile application management and mobile device management; have two years of experience implementing Oracle Access Management Suite Plus 11g; and have experience in at least one other Oracle product family.
This credential recognizes professionals who create configuration designs and implement the Oracle Mobile Security Suite. Candidates must have a working knowledge of Oracle Mobile Security Suite Access Server, Oracle Mobile Security Suite Administrative Console, Oracle Mobile Security Suite Notification Server, Oracle Mobile Security Suite Containerization and Oracle Mobile Security Suite Provisioning and Policies. They must also know how to deploy the Oracle Mobile Security Suite.
Although the certification is designed for Oracle PartnerNetwork members, it is available to any candidate. Successful completion of one exam is required.
Source: Oracle Mobile Security Certification
RSA Archer Certified Administrator (CA)Prerequisites: None required; Dell EMC highly recommends RSA training and two years of product experience as preparation for the RSA certification exams.
Dell EMC offers this certification, which is designed for security professionals who manage, administer, maintain and troubleshoot the RSA Archer Governance, Risk and Compliance (GRC) platform.
Candidates must pass one exam, which focuses on integration and configuration management, security administration, and the data presentation and communication features of the RSA Archer GRC product.
Source: Dell EMC RSA Archer Certification
RSA SecurID Certified Administrator (RSA Authentication Manager 8.0)Prerequisites: None required; Dell EMC highly recommends RSA training and two years of product experience as preparation for the RSA certification exams.
Dell EMC offers this certification, which is designed for security professionals who manage, maintain and administer enterprise security systems based on RSA SecurID system products and RSA Authentication Manager 8.0.
RSA SecurID CAs can operate and maintain RSA SecurID components within the context of their operational systems and environments; troubleshoot security and implementation problems; and work with updates, patches and fixes. They can also perform administrative functions and populate and manage users, set up and use software authenticators, and understand the configuration required for RSA Authentication Manager 8.0 system operations.
Source: Dell EMC RSA Authentication Manager Certification
RSA Security Analytics CAPrerequisites: None required; Dell EMC highly recommends RSA training and two years of product experience as preparation for the RSA certification exams.
This Dell EMC certification is aimed at security professionals who configure, manage, administer and troubleshoot the RSA Security Analytics product. Knowledge of the product's features, as well the ability to use the product to identify security concerns, are required.
Candidates must pass one exam, which focuses on RSA Security Analytics functions and capabilities, configuration, management, monitoring and troubleshooting.
Source: Dell EMC RSA Security AnalyticsAdvanced information technology security certifications
CCIE SecurityPrerequisites: None required; three to five years of professional working experience recommended.
Arguably one of the most coveted certifications around, the CCIE is in a league of its own. Having been around since 2002, the CCIE Security track is unrivaled for those interested in dealing with information security topics, tools and technologies in networks built using or around Cisco products and platforms.
The CCIE certifies that candidates possess expert technical skills and knowledge of security and VPN products; an understanding of Windows, Unix, Linux, network protocols and domain name systems; an understanding of identity management; an in-depth understanding of Layer 2 and 3 network infrastructures; and the ability to configure end-to-end secure networks, as well as to perform troubleshooting and threat mitigation.
To achieve this certification, candidates must pass both a written and lab exam. The lab exam must be passed within 18 months of the successful completion of the written exam.
Source: Cisco Systems CCIE Security Certification
Check Point Certified Managed Security Expert (CCMSE)Prerequisites: CCSE certification R75 or later and 6 months to 1 year of experience with Check Point products.
This advanced-level credential is aimed at those seeking to learn how to install, configure and troubleshoot Check Point's Multi-Domain Security Management with Virtual System Extension.
Professionals are expected to know how to migrate physical firewalls to a virtualized environment, install and manage an MDM environment, configure high availability, implement global policies and perform troubleshooting.
Source: Check Point CCMSE
Check Point Certified Security Master (CCSM)Prerequisites: CCSE R70 or later and experience with Windows Server, Unix, TCP/IP, and networking and internet technologies.
The CCSM is the most advanced Check Point certification available. This credential is aimed at security professionals who implement, manage and troubleshoot Check Point security products. Candidates are expected to be experts in perimeter, internal, web and endpoint security systems.
To acquire this credential, candidates must pass a written exam.
Source: Check Point CCSM Certification
Certified SonicWall Security Professional (CCSP)Prerequisites: Attendance at an advanced administration training course.
Those who achieve this certification have attained a high level of mastery of SonicWall products. In addition, credential holders should be able to deploy, optimize and troubleshoot all the associated product features.
Earning a CSSP requires taking an advanced administration course that focuses on either network security or secure mobile access, and passing the associated certification exam.
Source: SonicWall CSSP certification
IBM Certified Administrator -- Tivoli Monitoring V6.3Prerequisites: Security-related requirements include basic knowledge of SSL, data encryption and system user accounts.
Those who attain this certification are expected to be capable of planning, installing, configuring, upgrading and customizing workspaces, policies and more. In addition, credential holders should be able to troubleshoot, administer and maintain an IBM Tivoli Monitoring V6.3 environment.
Candidates must successfully pass one exam.
Source: IBM Tivoli Certified Administrator
Master Certified SonicWall Security Administrator (CSSA)The Master CSSA is an intermediate between the base-level CSSA credential (itself an intermediate certification) and the CSSP.
To qualify for Master CSSA, candidates must pass three (or more) CSSA exams, and then email email@example.com to request the designation. There are no other charges or requirements involved.
Source: SonicWall Master CSSAConclusion
Remember, when it comes to selecting vendor-specific information technology security certifications, your organization's existing or planned security product purchases should dictate your options. If your security infrastructure includes products from vendors not mentioned here, be sure to check with them to determine if training or certifications on such products are available.
About the author:Ed Tittel is a 30-plus year IT veteran who's worked as a developer, networking consultant, technical trainer, writer and expert witness. Perhaps best known for creating the Exam Cram series, Ed has contributed to more than 100 books on many computing topics, including titles on information security, Windows OSes and HTML. Ed also blogs regularly for TechTarget (Windows Enterprise Desktop), Tom's IT Pro and GoCertify.
3COM [8 Certification Exam(s) ]
AccessData [1 Certification Exam(s) ]
ACFE [1 Certification Exam(s) ]
ACI [3 Certification Exam(s) ]
Acme-Packet [1 Certification Exam(s) ]
ACSM [4 Certification Exam(s) ]
ACT [1 Certification Exam(s) ]
Admission-Tests [13 Certification Exam(s) ]
ADOBE [93 Certification Exam(s) ]
AFP [1 Certification Exam(s) ]
AICPA [2 Certification Exam(s) ]
AIIM [1 Certification Exam(s) ]
Alcatel-Lucent [13 Certification Exam(s) ]
Alfresco [1 Certification Exam(s) ]
Altiris [3 Certification Exam(s) ]
Amazon [2 Certification Exam(s) ]
American-College [2 Certification Exam(s) ]
Android [4 Certification Exam(s) ]
APA [1 Certification Exam(s) ]
APC [2 Certification Exam(s) ]
APICS [2 Certification Exam(s) ]
Apple [69 Certification Exam(s) ]
AppSense [1 Certification Exam(s) ]
APTUSC [1 Certification Exam(s) ]
Arizona-Education [1 Certification Exam(s) ]
ARM [1 Certification Exam(s) ]
Aruba [6 Certification Exam(s) ]
ASIS [2 Certification Exam(s) ]
ASQ [3 Certification Exam(s) ]
ASTQB [8 Certification Exam(s) ]
Autodesk [2 Certification Exam(s) ]
Avaya [96 Certification Exam(s) ]
AXELOS [1 Certification Exam(s) ]
Axis [1 Certification Exam(s) ]
Banking [1 Certification Exam(s) ]
BEA [5 Certification Exam(s) ]
BICSI [2 Certification Exam(s) ]
BlackBerry [17 Certification Exam(s) ]
BlueCoat [2 Certification Exam(s) ]
Brocade [4 Certification Exam(s) ]
Business-Objects [11 Certification Exam(s) ]
Business-Tests [4 Certification Exam(s) ]
CA-Technologies [21 Certification Exam(s) ]
Certification-Board [10 Certification Exam(s) ]
Certiport [3 Certification Exam(s) ]
CheckPoint [41 Certification Exam(s) ]
CIDQ [1 Certification Exam(s) ]
CIPS [4 Certification Exam(s) ]
Cisco [318 Certification Exam(s) ]
Citrix [48 Certification Exam(s) ]
CIW [18 Certification Exam(s) ]
Cloudera [10 Certification Exam(s) ]
Cognos [19 Certification Exam(s) ]
College-Board [2 Certification Exam(s) ]
CompTIA [76 Certification Exam(s) ]
ComputerAssociates [6 Certification Exam(s) ]
Consultant [2 Certification Exam(s) ]
Counselor [4 Certification Exam(s) ]
CPP-Institue [2 Certification Exam(s) ]
CPP-Institute [1 Certification Exam(s) ]
CSP [1 Certification Exam(s) ]
CWNA [1 Certification Exam(s) ]
CWNP [13 Certification Exam(s) ]
Dassault [2 Certification Exam(s) ]
DELL [9 Certification Exam(s) ]
DMI [1 Certification Exam(s) ]
DRI [1 Certification Exam(s) ]
ECCouncil [21 Certification Exam(s) ]
ECDL [1 Certification Exam(s) ]
EMC [129 Certification Exam(s) ]
Enterasys [13 Certification Exam(s) ]
Ericsson [5 Certification Exam(s) ]
ESPA [1 Certification Exam(s) ]
Esri [2 Certification Exam(s) ]
ExamExpress [15 Certification Exam(s) ]
Exin [40 Certification Exam(s) ]
ExtremeNetworks [3 Certification Exam(s) ]
F5-Networks [20 Certification Exam(s) ]
FCTC [2 Certification Exam(s) ]
Filemaker [9 Certification Exam(s) ]
Financial [36 Certification Exam(s) ]
Food [4 Certification Exam(s) ]
Fortinet [13 Certification Exam(s) ]
Foundry [6 Certification Exam(s) ]
FSMTB [1 Certification Exam(s) ]
Fujitsu [2 Certification Exam(s) ]
GAQM [9 Certification Exam(s) ]
Genesys [4 Certification Exam(s) ]
GIAC [15 Certification Exam(s) ]
Google [4 Certification Exam(s) ]
GuidanceSoftware [2 Certification Exam(s) ]
H3C [1 Certification Exam(s) ]
HDI [9 Certification Exam(s) ]
Healthcare [3 Certification Exam(s) ]
HIPAA [2 Certification Exam(s) ]
Hitachi [30 Certification Exam(s) ]
Hortonworks [4 Certification Exam(s) ]
Hospitality [2 Certification Exam(s) ]
HP [750 Certification Exam(s) ]
HR [4 Certification Exam(s) ]
HRCI [1 Certification Exam(s) ]
Huawei [21 Certification Exam(s) ]
Hyperion [10 Certification Exam(s) ]
IAAP [1 Certification Exam(s) ]
IAHCSMM [1 Certification Exam(s) ]
IBM [1532 Certification Exam(s) ]
IBQH [1 Certification Exam(s) ]
ICAI [1 Certification Exam(s) ]
ICDL [6 Certification Exam(s) ]
IEEE [1 Certification Exam(s) ]
IELTS [1 Certification Exam(s) ]
IFPUG [1 Certification Exam(s) ]
IIA [3 Certification Exam(s) ]
IIBA [2 Certification Exam(s) ]
IISFA [1 Certification Exam(s) ]
Intel [2 Certification Exam(s) ]
IQN [1 Certification Exam(s) ]
IRS [1 Certification Exam(s) ]
ISA [1 Certification Exam(s) ]
ISACA [4 Certification Exam(s) ]
ISC2 [6 Certification Exam(s) ]
ISEB [24 Certification Exam(s) ]
Isilon [4 Certification Exam(s) ]
ISM [6 Certification Exam(s) ]
iSQI [7 Certification Exam(s) ]
ITEC [1 Certification Exam(s) ]
Juniper [64 Certification Exam(s) ]
LEED [1 Certification Exam(s) ]
Legato [5 Certification Exam(s) ]
Liferay [1 Certification Exam(s) ]
Logical-Operations [1 Certification Exam(s) ]
Lotus [66 Certification Exam(s) ]
LPI [24 Certification Exam(s) ]
LSI [3 Certification Exam(s) ]
Magento [3 Certification Exam(s) ]
Maintenance [2 Certification Exam(s) ]
McAfee [8 Certification Exam(s) ]
McData [3 Certification Exam(s) ]
Medical [69 Certification Exam(s) ]
Microsoft [374 Certification Exam(s) ]
Mile2 [3 Certification Exam(s) ]
Military [1 Certification Exam(s) ]
Misc [1 Certification Exam(s) ]
Motorola [7 Certification Exam(s) ]
mySQL [4 Certification Exam(s) ]
NBSTSA [1 Certification Exam(s) ]
NCEES [2 Certification Exam(s) ]
NCIDQ [1 Certification Exam(s) ]
NCLEX [2 Certification Exam(s) ]
Network-General [12 Certification Exam(s) ]
NetworkAppliance [39 Certification Exam(s) ]
NI [1 Certification Exam(s) ]
NIELIT [1 Certification Exam(s) ]
Nokia [6 Certification Exam(s) ]
Nortel [130 Certification Exam(s) ]
Novell [37 Certification Exam(s) ]
OMG [10 Certification Exam(s) ]
Oracle [279 Certification Exam(s) ]
P&C [2 Certification Exam(s) ]
Palo-Alto [4 Certification Exam(s) ]
PARCC [1 Certification Exam(s) ]
PayPal [1 Certification Exam(s) ]
Pegasystems [12 Certification Exam(s) ]
PEOPLECERT [4 Certification Exam(s) ]
PMI [15 Certification Exam(s) ]
Polycom [2 Certification Exam(s) ]
PostgreSQL-CE [1 Certification Exam(s) ]
Prince2 [6 Certification Exam(s) ]
PRMIA [1 Certification Exam(s) ]
PsychCorp [1 Certification Exam(s) ]
PTCB [2 Certification Exam(s) ]
QAI [1 Certification Exam(s) ]
QlikView [1 Certification Exam(s) ]
Quality-Assurance [7 Certification Exam(s) ]
RACC [1 Certification Exam(s) ]
Real-Estate [1 Certification Exam(s) ]
RedHat [8 Certification Exam(s) ]
RES [5 Certification Exam(s) ]
Riverbed [8 Certification Exam(s) ]
RSA [15 Certification Exam(s) ]
Sair [8 Certification Exam(s) ]
Salesforce [5 Certification Exam(s) ]
SANS [1 Certification Exam(s) ]
SAP [98 Certification Exam(s) ]
SASInstitute [15 Certification Exam(s) ]
SAT [1 Certification Exam(s) ]
SCO [10 Certification Exam(s) ]
SCP [6 Certification Exam(s) ]
SDI [3 Certification Exam(s) ]
See-Beyond [1 Certification Exam(s) ]
Siemens [1 Certification Exam(s) ]
Snia [7 Certification Exam(s) ]
SOA [15 Certification Exam(s) ]
Social-Work-Board [4 Certification Exam(s) ]
SpringSource [1 Certification Exam(s) ]
SUN [63 Certification Exam(s) ]
SUSE [1 Certification Exam(s) ]
Sybase [17 Certification Exam(s) ]
Symantec [134 Certification Exam(s) ]
Teacher-Certification [4 Certification Exam(s) ]
The-Open-Group [8 Certification Exam(s) ]
TIA [3 Certification Exam(s) ]
Tibco [18 Certification Exam(s) ]
Trainers [3 Certification Exam(s) ]
Trend [1 Certification Exam(s) ]
TruSecure [1 Certification Exam(s) ]
USMLE [1 Certification Exam(s) ]
VCE [6 Certification Exam(s) ]
Veeam [2 Certification Exam(s) ]
Veritas [33 Certification Exam(s) ]
Vmware [58 Certification Exam(s) ]
Wonderlic [2 Certification Exam(s) ]
Worldatwork [2 Certification Exam(s) ]
XML-Master [3 Certification Exam(s) ]
Zend [6 Certification Exam(s) ]
Issu : https://issuu.com/trutrainers/docs/p8060-002
Dropmark : http://killexams.dropmark.com/367904/11373774
Wordpress : http://wp.me/p7SJ6L-cA
weSRCH : https://www.wesrch.com/business/prpdfBU1HWO000ZCQS
Scribd : https://www.scribd.com/document/356685069/Pass4sure-P8060-002-Practice-Tests-with-Real-Questions
Dropmark-Text : http://killexams.dropmark.com/367904/11997816
Youtube : https://youtu.be/SKkM9CETZpE
Blogspot : http://killexams-braindumps.blogspot.com/2017/10/real-p8060-002-questions-that-appeared.html
Vimeo : https://vimeo.com/239420036
RSS Feed : http://feeds.feedburner.com/Pass4sureP8060-002DumpsAndPracticeTestsWithRealQuestions
publitas.com : https://view.publitas.com/trutrainers-inc/p8060-002-ibm-p8060-002-dumps-and-practice-tests-with-real-questionspdf
Google+ : https://plus.google.com/112153555852933435691/posts/AXeEUDj623h?hl=en
Calameo : http://en.calameo.com/books/00492352604385b5e9c17
Box.net : https://app.box.com/s/b5ezsc81mn658j9qma0kv583p0uki6v3
zoho.com : https://docs.zoho.com/file/5bym2b8fcc0f04936416bb9b24f583eec7980
coursehero.com : "