Search This Blog

Showing posts with label Updates. Show all posts
Showing posts with label Updates. Show all posts

Tuesday, July 6, 2021

Creating a Sample file in Intuit QuickBooks Desktop

Sample company file already contains customers, invoices and other transactions so whatever you test will have no impact on your own company’s data. To get started:

    Click the Open a sample file drop-down menu and click to select the sample business that most closely matches your own. Note that the number and type of sample data files installed will depend on the version of QuickBooks you purchased.blog-img-quickbooks-open-sample-company
  1. Launch QuickBooks.
  2. If your own company file opens up automatically, go to the File menu, choose Close Company and the 'No Company Open' window will appear.
  3. To get back to your own company file, simply close the sample file (following the directions from above) and select Open or restore an existing company.

Friday, January 19, 2018

Multiple desktops in Windows 10

Multiple desktops in Windows 10
Multiple desktops are great for keeping unrelated, ongoing projects organized, or for quickly hiding from the boss that browser game you can't stop playing. To create multiple desktops: 
  • On the taskbar, select Task view > New desktop .
  • Open the apps you want to use on that desktop.
  • To switch between desktops, select Task view again.

Saturday, March 5, 2016

Intuit sells Quicken to private equity firm in management buyout

33-year-old personal finance software will be bolstered by more Mac development, improvements in reliability on Windows, says current Quicken manager

Credit: Intuit
Intuit yesterday said it had sold its Quicken personal finance software unit to H.I.G. Capital, a Miami-based private equity firm.
Financial terms of the deal were not disclosed.
The announcement put an end to a sales process that went public last August, when Intuit told customers it was unloading three parts of its business -- Quicken, QuickBase and Demandforce -- to focus on its most profitable software and services, the QuickBooks small business accounting division and the seasonally-skewed TurboTax tax preparation group. In January, Intuit sold Demandforce to Internet Brands for an undisclosed amount.
Last summer, Intuit's CEO explained that Quicken, which unlike QuickBooksand TurboTax lacked a cloud-based service or subscription offer, was essentially a dead end for the company. "Quicken is a desktop-centric business and it doesn't strengthen the small business or tax ecosystems," said chief executive Brad Smith in a conference call with Wall Street last year. "Our strategy is focused on building ecosystems and platforms in the cloud."


Quicken's contributions to Intuit's bottom line have been minuscule: In the 12 months preceding the August announcement, Quicken, which starts at $35.10 (Amazon price), contributed just $51 million to the firm's total revenue of nearly $4.2 billion, or slightly more than 1%.

But the company pledged to find a buyer who would invest in the 33-year-old Quicken software. That buyer turned out to be H.I.G. Capital, a global private equity firm that manages some $19 billion.
Eric Dunn, the head of Quicken, announced the sale in amessage and video posted to Intuit's website.
"[H.I.G. is] confident, as am I, that Quicken will thrive with increased investment, leading to product improvements and advances that will allow Quicken to continue to serve you well for decades to come," Dunn said.


The sale, said Dunn, will allow Quicken to double the number of engineers working on the Mac version -- which has long lagged behind the Windowsedition in features and functionality -- and devote more resources to improving the program on the dominant platform, Windows.
"We all know that Quicken could use some TLC, some tender loving care, to be as great as it can be. I'm very aware that Quicken isn't perfect," said Dunn. "Quicken [for Windows] could probably use some attention to the fit and finish, the polish, usability, resilience and reliability."
Dunn has his work cut out for him.
In many ways, Quicken is software that users love to hate. With years of data in the company's proprietary format -- and few alternatives -- they not only feel trapped but also regularly rail about the product. Quicken's listing on ConsumerAffairs.com, the consumer advocacy organization's website, makes for dismal reading: The overall satisfaction rating is one star out of a possible five.

"Like many other Quicken users, I ran into problems with Quicken 2016," complained someone identified only as "John" last month on ConsumerAffairs.com. "Quicken has the worst customer service of any major company with which I have had to deal. Their representatives are uninformed and untrained in the most simple issues."
The sale was a management buyout: Dunn confirmed that he was a "significant personal investor in the transaction." How that will work out over the long term was, not surprisingly, unclear.
Typically, a private equity firm that has partly financed a management buyout -- in such deals, managers are required to make personal investments to guarantee that they have a vested interest in success -- wants out after several years to recoup their investment and, assuming the transition has worked, to take a profit. At that point, the firm may be in the hands of management; or the equity firm's stake could be sold to another buyer or investor.
H.I.G Capital has invested in other software or software-based services recently. In January, H.I.G. was among the investors that bankrolled the purchase of Salary.com, a Wellesley, Mass. firm that focuses on employee compensation data, software and services. That was a management buyout as well: Salary.com's founders bought the company from IBM, which had acquired it in 2012 as part of a larger purchase of Kenexa.
The Quicken sale is expected to close by April 30.

Ubuntu convergence finally impresses me

Image: Jack Wallen
It's taken me a long time to get on board the Ubuntu convergence train. I've been very pessimistic about the whole platform, based on the terrible state of Ubuntu Phone (as run on the Bq Aquaris handset).
But then, I happened to watch a video, by the wonderful people of XDADEVELOPERS, from Mobile World Congress, in which John Lee (of Canonical) demonstrates convergence with Ubuntu Phone running on an older Nexus 4 handset.

This video came just a week or so after Canonical made the first official announcement of a Ubuntu tablet to be released. This table will be manufactured by Bq and will be a part of the same Aquaris line as is their Ubuntu phone. The specs for the tablet aren't too shabby:
  • Display: 10.1-inch IPS touch display (1920×1200 pixel resolution at 240 ppi)
  • CPU: 64-bit MediaTek MT8163A 1.5GHz quad-core processor
  • RAM: 2GB of RAM
  • STORAGE: 16GB (micro SD memory card is included, adding storage expansion of up to 64GB)
All of this is fine and good...but up until now everything I have seen from Bq has been less than impressive

Let me explain.
However, after digging around a bit (and watching the above video from WMC), I realize that all the criticism tossed at Ubuntu Phone has been premature.
First and foremost, we get what convergence is. You use a single device for all your needs:
  • You carry your phone with you all day
  • You work on your phone
  • You plug your phone into a monitor and switch it to desktop mode
  • You work at your desk with your phone
  • You unplug your phone, switch it to phone mode
  • You go home
  • You plug your phone into your monitor at home and switch it to desktop mode
  • You play on your phone at home
  • Wash, rinse, repeat
For some of us, this doesn't make sense. Why? Because we're of an older mindset that precludes us from making a smartphone or tablet our only device. I do things that require some serious power (rendering videos and audio). But the truth of the matter is, a large percentage of people (especially of the millennial generation) have forsaken the tried and true form factor for their mobile devices. So when you consider this, convergence makes perfect sense. And, after watching the Canonical demo, the light goes off over my head and I can finally shout, "Ah ha!"

But what about...

The first question that comes to mind, when you consider this relative newcomer to the mobile space, is that of apps. As it stands, there are very few apps available for the Ubuntu Phone platform. To settle that issue, there is one thing you must consider:
Ubuntu Phone is still very much in development.
In fact, I would go so far as to say Canonical was quite premature in the releasing of devices. You see, this whole schmear isn't going to spread properly until Unity 8/Mir is released. At that point, everything changes. Once the Ubuntu desktop is in conjunction with the phone/tablet space, everything will be running the same platform, the same code. That is when things get interesting. When we finally see phone/tablet/desktop running the same release of Ubuntu, we'll see convergence finally work as it should. Why? Because all those apps we depend upon (LibreOffice, Audacity, Gimp, etc) will run on the convergent platform.
It should be noted, however, that the Bq Aquaris M10 will ship with LibreOffice, Mozilla Firefox, The GIMP and Gedit pre-installed. That's right, full-blown legacy apps running on the mobile platform. The current release date of the M10 is set for March, 2016.

Premature release of the platform

Lots of work still must be undertaken before this will come to fruition. That is why I believe Canonical was premature in releasing any devices. So far everyone has been less than kind to the Ubuntu Phone platform. What we really didn't understand (even though it was staring us in the eyes) was that we were seeing software very much in beta...maybe even alpha. It's a very rare occasion that a piece of beta software is ready for release. That was the disconnect. Ubuntu Phone has not (and is still not) ready for release.
The good news is that Unity 8/Mir are just around the corner. Canonical has given us every indication that Ubuntu 16.10 will ship with the new platform. I will, however, offer up this piece of advice. When Ubuntu 16.10 does ship (October, 2016), make sure Ubuntu Phone is ready to deliver on the promise of convergence...completely. If Canonical can pull off the full blown convergent experience (as in all legacy apps run on the platform), then they will have a major victory on their hands (as well as a platform ready for public consumption).
I hope this happens. Canonical and the Ubuntu Phone developers have been working tirelessly on this project and it needs (nay, deserves) a win of this magnitude.
Do you think Canonical's take on convergence will succeed? If not, why?

Trump says ‘I’m changing’ H-1B position -- then says he isn’t

During Detroit GOP debate, Trump says one thing and then clarifies it after

Credit: Gage Skidmore/Flickr
Early in his quest for the Republican nomination for president, Donald Trump promised major H-1B reforms. But Thursday night, at a debate in Detroit with his fellow Republican candidates, Trump said he was "softening" his position.
The move created an instant mess for Trump. So early this morning, his campaign issued a statement condemning the H-1B program and stressed the need to "hire Americans first."
But the damage was done.
Norm Matloff, a computer science professor at the University of California at Davis and a leading critic of the visa program, noted in a post-debate blog post: "I'm getting e-mail messages from some absolutely furious supporters of Donald Trump — who are now FORMER supporters of Trump."


The trouble began with a question from Fox News Reporter Megyn Kelly about inconsistencies in Trump's statements. Said Kelly: "Mr. Trump, your campaign website to this day argues that more visas for highly skilled workers would, quote, "decimate American workers." However, at the CNBC debate, you spoke enthusiastically in favor of these visas. So, which is it?" (see transcript)

"I'm changing. I'm changing," said Trump, in response. "We need highly skilled people in this country. In Silicon Valley, we absolutely have to have."
He also said: "I'm changing it, and I'm softening the position because we have to have talented people in this country."
Trump's post-debate statement suggested that Kelly's question wasn't specific to the H-1B program: "Megyn Kelly asked about highly-skilled immigration." Then the statement goes to attack the visa program:


"The H-1B program is neither high-skilled nor immigration: these are temporary foreign workers, imported from abroad, for the explicit purpose of substituting for American workers at lower pay. I remain totally committed to eliminating rampant, widespread H-1B abuse and ending outrageous practices such as those that occurred at Disney in Florida when Americans were forced to train their foreign replacements. I will end forever the use of the H-1B as a cheap labor program, and institute an absolute requirement to hire American workers first for every visa and immigration program.
"No exceptions," wrote Trump.
Trump's statement appears to argue that he was discussing green cards, permanent immigration, for university graduates and not H-1B visas.
But Kelly was asking Trump about the H-1B program. She used the word "decimate," in her question, citing the same word Trump's platform uses in its criticism of the higher H-1B visa caps sought in the I-Square bill, co-sponsored by Sen. Marco Rubio (R-Fla.), one of Trump's GOP presidential rivals.

Trump, in response to Kelly's question, spoke about how foreign students will go to Harvard, Stanford and Wharton and "as soon as they're finished they'll get shoved out. They want to stay in this country. They want to stay here desperately, they're not able to stay here.
"For that purpose, we absolutely have to be able to keep the brain power in this country," said Trump.
Pressing for clarity, Kelly asked Trump: "You are abandoning the position on your Website?"
Trump's H-1B position has two main features. It raises the pay of visa workers to keep employers from paying entry-level wages. Higher salaries "will force companies to give these coveted entry-level jobs to the existing domestic pool of unemployed" workers "instead of flying in cheaper workers from overseas."
A second major feature is the campaign's "hire American workers first" edict. Trump wrote that H-1B "petitions for workers should be mailed to the unemployment office, not USCIS (U.S. Citizenship and Immigration Service)."
During the debate, Kelly also quizzed Sen. Ted Cruz (R-Texas) about his inconsistencies on the H-1B program. She pointed out that Cruz supported a major hike in the visa cap, and did not join the group of bipartisan Senators seeking an investigation of the program following Southern California Edison's layoff last year.
"The abuse of the H-1B program has been rampant," said Cruz, in response.
Cruz is co-sponsoring legislation with Sen. Jeff Sessions (R-Ala.) tosubstantially hike H-1B wages, tighten program rules and eliminate non-disparagement clauses that serve to keep IT workers from speaking out.
As president, Cruz said he would impose a 180-day moratorium on the H-1B program and "implement a comprehensive investigation, because "you got U.S. companies that are firing American workers, bringing in foreign workers, and forcing them to train their replacements."
Trump recently received the endorsement Sessions, who also heads the Senate immigration subcommittee. Two former IT workers, who each said they had to train a foreign replacement, spoke at a recent Trump rally.

Saturday, November 15, 2014

Tips To Become A CEO Before You are 30


my smart leap
Connect with us fb twitter
Career Tips
Humor
Job Search
Resume
6 Tips To Become A CEO Before You are 30
ceo
Posted on Career Tips | October 27, 2014
Ever wondered why names like Mark Zuckerberg, Richard Branson, Larry Page and Sergey Brin are denoted as synonym to success? Because other than enjoying an overdose of success today, they all had an early-age successful career. Read More>>
How To Fix Your Derailed Career And Change It Into Something You Love To Do
derailed career
Posted on Career Tips | October 27, 2014
Believe it or not, all of us are at some point in our life and  feel that the kind of job we have fortunately or unfortunately bumped into may not Read More>>
9 Deadly Resume Mistakes That Can Cost You A Job And How To Avoid Them
deadly resume
Posted on Career Tips | October 27, 2014
Resume writing is easy, right? After all, all it demands is to dump your achievements and past experiences in a word document and voila! Read More>>

Tuesday, October 29, 2013

Extend your Wi-Fi network throughout the house

                                         Extending a Wi-Fi network can be as easy as playing with cardboard and tape, or as difficult as rewiring your house. It all depends how big a boost you need, and how much time and money you're willing to devote to the task.
Here are three ways to increase your signal's range.

Boosters

You know those little antennas that screw onto your router? You can improve the signal by replacing them with bigger antennas, or more directional ones.
You can also improve the existing antenna, making it directional. All you need is a few minutes and some common household materials. See Extend Your Wi-Fi Range With a Parabolic Reflectorfor detailed instructions.
If you're not the do-it-yourself type, or if you need to boost the signal in all directions, you can buy a generic antenna for a few dollars. I've seen this same antenna (see image to the right) sold under different brand names--priced from $2 to $7. And yes, I've tried it and it helps…a bit.
For a more powerful boost than either of those, try the directionalTP-Link TL-ANT2409A. You can get it for $25 if you shop around.

Extenders

You plug one of these devices, also called repeaters, into a wall socket as far from the router as you can get and still receive a good signal. The extender picks up the signal and rebroadcasts it.
In general, I find these more effective than boosters. But they're also more expensive, and are trickier to set up, since you have to find the best location and connect them to the network.
The best one I've tested (and I haven't tested all that many) was theAmped Wireless REC10. If you look around, you can buy one for $70.In general, I find these more effective than boosters. But they're also more expensive, and are trickier to set up, since you have to find the best location and connect them to the network.

HomePlug

I used to be a fan of this technology, which carries network data over your house's electric wiring. The adapters are basically power bricks with Ethernet ports. Some also have Wi-Fi Antennas.
You won't have much trouble adding HomePlug to your network--you just plug it in and it works…if it works.
All sorts of things can interfere with HomePlug signals--wiring, the location of the washing machine, the type of light bulbs you use.
I used HomePlug happily for years. It didn't give me Ethernet speed or even 802.11n speed, but it was faster than my Internet connection and that was all that I needed. Then it just stopped working.




Friday, September 27, 2013

Daily Technotips: How to Implement Group Policy Security Filtering?

The most misleading thing about Group Policy is its name—Group Policy is simply not a way of applying policies to groups! Instead, Group Policy is applied to individual user accounts and computer accounts by linking Group Policy Objects (GPOs), which are collections of policy settings, to Active Directory containers (usually OUs but also domains and sites) where these user and computer accounts reside. So the newbie’s question concerning Group Policy is usually, “How can I get this GPO to apply to this group?” The answer to this question is: by implementing security filtering.

Understanding Security Filtering

Security filtering is based on the fact that GPOs have access control lists (ACLs) associated with them. These ACLs contain a series of ACEs for different security principals (user accounts, computer accounts, security groups and built-in special identities), and you can view the default ACL on a typical GPO as follows:
  1. Open the Group Policy Management Console (GPMC)
  2. Expand the console tree until you see the Group Policy Objects node.
  3. Select a particular GPO under the Group Policy Objects node.
  4. Select the Delegation tab in the right-hand pane (see Figure 1).

Figure 1: Viewing the ACL for the Vancouver GPO using the Delegation tab
For a more detailed view of the ACEs in this GPO ACL, click the Advanced button to display the familiar ACL Editor (Figure 2):

Figure 2: Viewing the ACL for the Vancouver GPO using the ACL Editor
An obvious difference between these two views is that the ACL Editor displays the Apply Group Policy permission while the Delegation tab doesn’t. This is because the Delegation tab only displays ACEs for security principles that actually process the GPO, and that implicitly means those security principals have the Apply Group Policy permission set to Allow. More specifically, if you want a GPO to be processed by a security principal in a container linked to the GPO, the security principal requires at a minimum the following permissions:
  • Allow Read
  • Allow Apply Group Policy
The actual details of the default ACEs for a newly created GPO are somewhat complex if you include advanced permissions, but here are the essentials as far as security filtering is concerned:
Security PrincipalReadApply Group Policy
Authenticated UsersAllowAllow
CREATOR OWNERAllow (implicit)
Domain AdminsAllow
Enterprise AdminsAllow
ENTERPRISE DOMAIN CONTROLLERSAllow
SYSTEMAllow
Note that Domain Admins, Enterprise Admins and the SYSTEM built-in identity have additional permissions (Write, Create, Delete) that let these users create and manage the GPO. But since these additional permissions are not relevant as far as security filtering is concerned, we’ll ignore them for now.
The fact that Authenticated Users have both Read and Apply Group Policy permission means that the settings in the GPO are applied to them when the GPO is processed, that is, if they reside in a container to which the GPO is linked. But who exactly are Authenticated Users? The membership of this special identity is all security principals that have been authenticated by Active Directory. In other words, Authenticated Users includes all domain user accounts and computer accounts that have been authenticated by a domain controller on the network. So what this means is that by default the settings in a GPO apply to all user and computer accounts residing in the container linked to the GPO.

Using Security Filtering

Let’s now look at a simple scenario where you might use security filtering to resolve an issue in Group Policy design. Figure 3 below shows an OU structure I developed in a previous article. Note that the Vancouver top-level OU has three departments under it defined as second-level OUs, with user and computer accounts stored below these departments in third-level OUs:

Figure 3: Sample OU structure for Vancouver office
Let’s say that of the fifteen users who work in the Sales and Marketing Department in Vancouver, three of them are senior people who have special requirements, for example access to certain software that other people in the department shouldn’t have access to. Such software could be provided to them by publishing it in Add or Remove Programs using a user policy-based software installation GPO. The trouble is, if you link this GPO to the Sales and Marketing Users OU then all fifteen users in the department will have access to it through Add or Remove Programs. But you only want this special group of three users to be able to access the software, so what do you do? 
You could create another OU beneath the Sales and Marketing Users OU and call this new OU the Senior Sales and Marketing Users OU. Then you could move the user accounts for the three senior employees to this new OU and create your software installation GPO and link it to the new OU. While this approach will work, it has several disadvantages:
  • It makes your OU structure deeper and more complicated, making it harder to understand.
  • It disperses user accounts into more containers making them more difficult to manage.
A better solution is to leave your existing OU structure intact and all fifteen Sales and Marketing users in the Sales and Marketing Users OU, create your software installation GPO and link it to the Sales and Marketing Users OU (see Figure 4), and then use security filtering to configure the ACL on the software installation GPO to ensure that only the three senior users receive the policy.

Figure 4: Senior Sales and Marketing Users Software Installation GPO
To filter the software installation GPO so that only users Bob Smith, Mary Jones, and Tom Lee receive it during policy processing, let’s first use Active Directory Users and Computers to create a global group called Senior Sales and Marketing Users that has only these three users as members (see Figure 5):

Figure 5: Membership of the Senior Sales and Marketing Users global group
Note that you can store this security group in any container in the domain, but for simplicity you’ll probably want to store it in the Sales and Marketing Users GPO since that’s where its members reside.
Now go back to the GPMC with the software installation GPO selected in the left-hand pane, and on the Scope tab of the right-hand pane, remove the Authenticated Users special identity from the Security Filtering section and then add the Senior Sales and Marketing Users global group (Figure 6):

Figure 6: Filtering the GPO so it only targets the Senior Sales and Marketing Users group
That’s it, we’re done! Now when policy is processed for a user account residing in the Sales and Marketing Users OU, the Group Policy engine on the client will first determine which GPOs need to be applied to the user. If the user is a member of the Senior Sales and Marketing Users security group, the following GPOs will be applied in the following order (assuming we haven’t used blocking or enforcement anywhere):
  1. Default Domain Policy
  2. Vancouver GPO
  3. Sales and Marketing GPO
  4. Sales and Marketing Users GPO
  5. Senior Sales and Marketing Users GPO

The Power of Security Filtering

The power of security filtering is that it allows us to simplify our OU structure while still ensuring that Group Policy is processed as designed. For example, in my original OU structure for Vancouver (see Figure 3 above) I created separate OUs for three departments in that location, namely the IT Department, Management, and Sales and Marketing. In Toronto however I could have taken a different approach and lump all my users and computers together like this (Figure 7):

Figure 7: Toronto has a simpler OU structure than Vancouver
Then I could group user and computer accounts in Toronto into global groups like this:
  • IT Department Users
  • IT Department Computers
  • Management Users
  • Management Computers
  • Sales and Marketing Users
  • Sales and Marketing Computers
I could then create GPOs for each group of users and computers in Toronto, link these GPOs to the appropriate container, and use security filtering to ensure they are applied only to the desired security principals (Figure 8):

Figure 8: Using Group Policy to manage users in Toronto
The main downside of this approach is that as you flatten your OU structure you can end up with lots of GPOs linked to each OU, which can make it harder at first glance to figure out which policies are processed by each user or computer unless you examine in detail the security filtering setup

Microsoft: Financial Services: A Survey of the State of Secure Application Development Processes

The financial services industry is one of the world’s largest industries by monetary value, and an industry which has a direct impact on the lives of billions of people around the world. Organizations in the financial services industry handle trillions of transactions each year involving sensitive information about individuals,companies, and other third parties. To help protect this sensitive information it is important that financial services organizations are developing, procuring, and using software applications that have been developed with security in mind.
Microsoft commissioned an independent research and consultancy firm, The Edison Group, to examine the current state of application development in the financial services sector from a security perspective. Their report – Microsoft Security Development Lifecycle Adoption: Why and How – is available today.
The paper was developed following in-depth interviews with Chief Security Officers and senior executives representing some of the leading banks and financial services companies in the United States. Some highlights from the paper:
  • The Edison Group examined the usage of the Microsoft Security Development Lifecycle (SDL) and how it has been integrated into the software design life cycles of financial services companies.
  • The study describes the business benefits of using the SDL, along with adoption approaches and integration methods.
  • The adoption maturity of the Security Development Lifecycle (SDL) in participating organizations ranged from highly refined through years of implementation, to a brand new adopter about to begin integrating the SDL into the development processes.
  • The paper also includes two case studies, one illustrating the use if the SDL in a Microsoft Windows based environment, and one illustrating the adoption of the SDL in an open source development environment.
In addition to these highlights, the Edison Group found that using a software development process, such as the SDL, to help developers build more secure software can also help address security compliance requirements. For example, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) recognized the need for standards around security development processes and developed ISO/IEC 27034-1. This international standard is the first of its kind to focus on the processes and frameworks needed to build a comprehensive software security program. Earlier this year, Microsoft announced through its Declaration of Conformity that Microsoft’s SDL conforms to ISO 27034-1. Organizations using the Microsoft SDL to develop more secure software may already be conformant to the standard.
In the United States financial services sector, many of the largest companies came together in 1996 to form BITS, a division of the Financial Services Roundtable. BITS is an organization that addresses threats and opportunities relevant to the financial services sector, particularly those related to cyber-security. In 2012, the BITS Software Assurance Framework was created to document the importance of secure development practices and to provide guidelines that financial services organizations can use to implement these practices more fully.  The Software Assurance Framework was developed to help financial institutions better follow secure development practices and avoid the risks outlined above.
The Framework is rooted in education, integration of security in design using standards and threat modeling, best practices for coding, focused and comprehensive testing and followed with important implementation and response practices.  The Framework was developed in collaboration with Microsoft, and integrates the Microsoft Security Development Lifecycle at the foundation.
According to Paul Smocer, BITS president, “Building safe software is a necessity, a priority and a complex process for financial institutions.  The BITS Framework offers a practical approach to software security through strong design, implementation and testing processes.”
If you are responsible for the development or procurement of software for companies operating in the financial sector, then I strongly encourage you to check out this new whitepaper and the many free security development resources available at www.microsoft.com/sdl.

Monday, September 23, 2013

A Bright Spot in Tech’s Gender Gap


The technology world is still run by men. They have more than 80 percent of the software developer jobs, according to the U.S.  Bureau of Labor Statistics. And they hold most of the leadership positions.
But there’s good news for the Marissa Mayers of the world. The rare woman who does manage to hack her way to a top technology job is paid the same on average as a man in that position, as long as they have the same experience, according to a report by Dice, which tracks corporate compensation. That’s been true since at least 2007, Dice found as part of historical research for Bloomberg.com.
The study, which examined information-technology jobs in various industries, found that while there’s equality for men and women in comparable positions, women tend to end up in less lucrative jobs. Women in those jobs make an average salary of $87,527, while men make $95,929, according to Dice. If only there were more ladies leading teams.
“It’s obviously very encouraging that women in the same position are making the same amount, but why do they end up in different positions?” Shelley Correll, a Stanford University professor who specializes in gender research, said in an interview.
Sheryl Sandberg, Facebook’s chief operating officer and “Lean In” author who is on a whirlwind media tour to promote her book about female business leadership, has said the gap is a result of a combination of factors. Many women leave the workforce before they have to, decide not to take on larger projects, or lack the confidence in their qualifications to apply for promotions, according to Sandberg. So she’s been advocating for women to be more assertive at the office.
Besides equal pay for men and women in the same jobs, there is another commonality between the genders: Dice found that nearly half of all male and female business professionals were not satisfied with how much money they made.