Your search did not yield any results.

Feel free to contact us in the event that the training you require is not listed. We may be in a position to offer this training by way of our partners or by creating a tailored class.

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Blog Entries publications that: entertain, make you think, offer insight

Like me, I believe most people go about their business never to give a serious thought about their assumed private correspondence when using Gmail to email friends, colleagues and business associates.  As it turns out, your daily banter may not be so private after all.  A recent article in Fortune Magazine, “Judge Rejects Google Deal Over Email Scanning” caught my attention and an immediate thought dominated my curiosity…Google email and scanning scam.  

 

In essence, the article describes Googles’ agreement to change the way it scans incoming messages so that it no longer reads emails while they are in transit, but only when they are in someone's inbox! So, what exactly does that mean? Judge Koh, a San Francisco federal judge, said she's not so sure about that. Her ruling claims the settlement does not provide an adequate technical explanation of Google's workaround, which involves scanning in-transit emails for security purposes, and then later parsing them for advertising data. The judge also proposed a legal settlement to pay $2.2 million to lawyers, but nothing to consumers.

My interest in this story is not so much about the proposed settlements or the specific details about how Google or any of the web giants settle claims based on vague legal language. It is however, more about the naiveté of myself and perhaps many others that never question how the email scanning process really works. I wonder, do most of us really care that Gmail uses contents of our mail to display targeted ads?

When eCommerce companies want to optimize information security, password management tools enable users to create strong passwords for every login.

Better than a Master Pass
A two-factor authentication, a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code can drastically reduce online fraud such as identity theft . A common example of two-factor authenticationis a bank card: the card itself is the physical item and the personal identification number (PIN) is the data that goes with it.

LastPass 3.0 Premium and RoboForm, security downloads offer fingerprint-based authentication features that can be configured to any computer PC or mobile application.  Both are supported by the Google Authenticator mobile app for smart phone and device integration.

LastPass 3.0 is most powerful on-demand password manager on the market. LastPass 3.0 Premium includes mobile support and more features. Dashlane 2.0 is is not as robust, but includes a user-friendly interface. F-Secure Key is a free, one-device version of these top competitors. F-Secure Key is for exclusive use on an installed device, so password safe retention is dependent on proprietary use of the device itself. The application can be upgraded for a small annual fee.

Password Manager App Cross-Portability
F-Secure Key syncs with Mac, PC Android, and iOS devices simultaneously. A transient code is generated on mobile devices, in addition to the two-factor authentication default of the F-Secure Key master password security product.

Password capture and replay in case of lost credentials is made possible with a password manager. Integration of a password manager app with a browser allows a user to capture login credentials, and replay on revisit to a site. Dashlane, LastPass, Norton Identity Safe, Password Genie 4.0 offer continuous detection and management of password change events, automatically capturing credentials each time a new Web-based, service registration sign up is completed.

Other applications like F-Secure Key, KeePass, and My1login replay passwords via a bookmarklet, supported by any Java-equipped browser. KeePass ups the ante for would be keyloggers, with a unique replay technology.

Personal Data and Auto-Fill Forms
Most password managers fill username and password credentials into login forms automatically. Password managers also retain personal data for form fill interfaces with applications, and other HTML forms online. The RoboForm app is one of the most popular for its flexibility in multi-form password and personal data management, but the others also capture and reuse at least a portion of what has been entered in a form manually.

The 1Password app for Windows stores the most types of personal data for use to fill out forms. Dashlane, LastPass, and Password Genie store the various types of ID data used for form fill-in, like passport and driver's license numbers and other key details to HTML acknowledgement of discretionary password and personal information.

The Cost of Protection
LastPass Premium and Password Box are the lowest monthly password manager plans on the market, going for $1 a month. Annual plans offered by other password manager sources vary according to internal plan: Dashlane $20, F-Secure Key $16, and Password Genie, $15.
All password manager companies and their products may not be alike in the end.

Security checks on security products like password managers have become more sophisticated in response to product cross-portability and open source app interface volatility. Norton, RoboForm, KeePass, generate strong, random passwords on-demand. Some security procedures now require three-factor authentication, which involves possession of a physical token and a password, used in conjunction with biometricdata, such as finger-scanningor a voiceprint.

 

What are the best languages for getting into functional programming?

Computer Programming as a Career?

Disruptive technologies such as hand-held devices, cloud computing and social media are rattling the foundations upon which traditional businesses are built. Enterprise customers have grown smarter at ensuring the latest technological trends work in their favor. Everyone is trying to zero in on their core competencies by employing commodity services to run their business.

Likewise, enterprise application vendors need to zero in on their core competencies and enhance more value to the businesses of their clientele by leveraging standards-based commodity services, such as IaaS and PaaS, provided by leaders in those segments (e.g. Amazon EC2, Google Cloud Platform etc.).

What else enterprises need to do is learn to adopt new and emerging technologies such as cloud, utility and social computing to build on them to penetrate new market avenues.

New small and medium-sized entrants into the market are constantly challenging enterprises given their ability to rapidly turnaround and address the requirements of the customers in a cost-effective manner. Additionally, these new advancements also affect how enterprises create, deploy, and manage solutions and applications. If you take the example of Force.com, for instance, you find that it’s a common war zone for enterprise application vendors to furnish SME markets with their applications, with the new entrants mostly having an edge.

Checking to see if a directory exists and then creating it if it is not present requires a few lines of code.  Isn't Python great. enlightened  Begin by importing the os module and use the exists and makedirs functions.

 

import os

if os.path.exists(somedirectory):
   os.makedirs(somedirectory)



training details locations, tags and why hsg

the hartmann software group advantage
A successful career as a software developer or other IT professional requires a solid understanding of software development processes, design patterns, enterprise application architectures, web services, security, networking and much more. The progression from novice to expert can be a daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A common experience is that too much time and money is wasted on a career plan or application due to misinformation.

The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:

  • Learn from the experts.
    1. We have provided software development and other IT related training to many major corporations since 2002.
    2. Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
  • Discover tips and tricks about programming
  • Get your questions answered by easy to follow, organized experts
  • Get up to speed with vital programming tools
  • Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
  • Prepare to hit the ground running for a new job or a new position
  • See the big picture and have the instructor fill in the gaps
  • We teach with sophisticated learning tools and provide excellent supporting course material
  • Books and course material are provided in advance
  • Get a book of your choice from the HSG Store as a gift from us when you register for a class
  • Gain a lot of practical skills in a short amount of time
  • We teach what we know…software
  • We care…
learn more
page tags
what brought you to visit us
nstore/product,  , nstore/product,  Classes, nstore/product,  Courses, nstore/product,  Course, nstore/product,  Seminar
nearsourcing, reshoring and insourcing
developing talent and expertise at home
Companies are beginning to realize that talent and skills developed within the United States are exceedingly more important for the growth of an organization than the alternative: outsourcing. Considerations include: security, piracy, cultural differences, productivity, maintainability and time to market delays.
In the past, the reason for outsourcing centered on cost savings, lack of resources at home and the need to keep up with market trends. These considerations are proving to be of little merit as many organizations have, consequently, experienced productivity declines, are now finding considerable talent within their immediate location and have realized a need to gain more control over product development.
As strong advocates of Agile/Scrum development, HSG whole heartedly embraces this new entrepreneurial spirit because we know it works and because we believe our country's future weighs in the balance.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.