For Space Booking in
FITAG ITAG TIMES
fitagtimes@fitag.in Dhaval: 9824066111
www.fitag.in
01 10 2015
Vol. 3, Issu No. 2, Page 8
Thursday
Ahmedabad, Gujarat
Monthly Edition
ITAG
For Space Booking in
FITAG ITAG TIMES
fitagtimes@fitag.in Dhaval: 9824066111
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION Editorial on Page-2
10 THINGS YOU SHOULD DO TO BECOME SUCCESSFUL
7ways social media can improve customer satisfaction
A
s many organizations already know, social media can be a powerful customer relationship tool, driving traffic to your brand. It can also damage your brand when not used properly. “Many brands have been severely damaged by not respecting social media, either by engaging on an ad hoc basis or simply having the wrong team or individual [or strategy to] manage it,” says Mark Harrington, vice president of marketing at Clutch, a customer loyalty program provider. So how can your brand successfully leverage social media? Here are seven proven customer engagement strategies for Facebook, Twitter and Instagram. 1. Use social media to answer customer questions and solve problems. “You can improve your customer relations [by regularly monitoring Facebook and Twitter and] answering customer questions, replying, as they come [up],” says Avi Levine, the executive director of the Digital Professional Institute, a digital skills training school based in Chicago. “This gives you the opportunity to connect with customers as they are experiencing problems, have questions or just want to share feedback.” Moreover, by posting answers to questions on Twitter, Facebook or Instagram, “they will then be available for anyone to read.”
Social media and customer relationship experts share tips on how to use Facebook, Twitter and Instagram to enhance customers’ experience with your brand.
“Because we are a parking company, when our customers have issues, they need help right away,” says Megan Bubley, customer hero at SpotHero, an on-demand parking app. “Twitter is immensely helpful because it enables us to interact with our customers in real time. When issues arise, customers can tweet at our Twitter handle to receive immediate support,” she says, which often leads to positive comments (and feelings) about the company. “We noticed that two siblings were having a conversation on one of our Instagram photos, saying they wanted to purchase a watch for their dad, but just couldn’t afford it,” says Esti Chazanow, cofounder and brand manager, LIV - Swiss Watches. “We piped in saying we would pitch in by offering a coupon
code. Their response: ‘Wow now that is impressive @livwatches awesome customer awareness and service!!!’” “We have a customer in the home goods space who proactively listens for people tweeting about problems with competitor products, then offers to help them fix the problems they’re having with competitor products,” says Jordan Enright-Schulz, a product marketing manager for Adobe Social. “Unsurprisingly, this outreach has resulted in high rates of new customer conversion.” 2. Use social media to keep customers informed/alert them to problems or promotions. Use social media to “be proactive,” says Davina Kristi Brewer, consultant, 3Hats Communications. “When something’s going on, get out
in front [of it]. If your website is down, let people know via social that you’re aware of the problem, that you’re working on it [and] when you expect it to be corrected,” she advises. “The when the website is back, [let people know that] you’ll honor whatever sales or promotions [they] might have
missed as a result of the glitch.” Another way companies can make a positive impression on customers is to use social media to advertise sales or promotions – and provide discount codes to their social media followers.
continued on page 2...
ITAG Times
itag
Team
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Thursday
01 10 2015
2
10 THINGS YOU SHOULD DO TO BECOME SUCCESSFUL Dear Fitagians, Greetings!!! A formula on success is the most wanted thing for everyone to understand and adopt. I am proposing a formula comprising 10 points which are very easy to adopt in your day to day life, without any major shift or shuffle required. I myself have prepared this and the crux of the same is derived to benefit you. Expecting your feedback on the same.
Everyday, millions of people work their hardest to achieve their goals and turning their dreams into a reality. But only a few of them succeed. Why is it so? Is there something they have which the others don’t? The only advantage that successful people possess is that of their unique working style, grit and determination. This list explores those ten things that are important for every person to become successful. Continued from page 1...
“We connect with our current customer base by offering our newsletter subscribers exclusive JUST4ME discounts,” says Claudia Montez, founder of Isabelle Grace Jewelry. “Every week, we put one of our pieces on a special JUST4ME discount and advertise it in our newsletter and to our social media followers,” she says. “Not only has this resulted in new purchases from existing customers, but it has also helped us really grow our social media and newsletter following!” 3. Use social media to turn a neutral or negative experience into a positive one. “From a customer service point of view, it is important to acknowledge each and every customer's point of view [or comment], even if we disagree with it,” says Prantik Mazumdar, managing partner, Happy Marketer. “On social media, if a brand publicly acknowl-
slightly over deNot believing in liver because nofailure; the glass body else is doing isn’t half empty, it). Try it and you but half full: THE MORE MISwill see the results. TAKES YOU It’s amazing. MAKE THE BETStop giving exTER YOU GET. cuses and start Pandya Why is this? Its Mr. Kaushik planning: When Editor someone consisbrain science: when you make a mistake, tently has a lot of excuses for you repeat and repeat until why something has gotten you get it right. This repeti- done, I know they are not tion is “practice”. Practice ready for the next step. makes perfect. People who But every day: just get it right the first time 8 Move, Eat, and Sleep… never learn all the subtleties Well you learn with practice. So 8 Improve your relationthey get fooled into thinking ships (Call a friend, surthat “luck” equals “good” prise a spouse, be kind to when actually “mistakes + your kids) repetition = good”. 8 Be creative (only you Over Promise and Over know how to do this but Deliver: There are at least write 10 random 3,000,000,000 employees on ideas a day) the planet and they are all 8 Be grateful for where you under promising and most of are. (And this is the them are under delivering. “Now” that people brag You have to: OVER PROMabout) ISE AND OVER DELIVER. Taking it to the next level: Over-promise sets you apart Gandhi took it to the next from the people who under- level. Every revolution bepromise. Over-deliver sets fore him was done with vioyou apart from people who lence. He experimented. He just delivered. It’s not that had a vision. He felt that 300 hard to do both. (It’s easy to million Indians didn’t need slightly over promise and to do violence. He was right,
despite everyone disagreeing with him. Take the advice of everyone around you, and then take it to the next level. Practice taking it to the next level (because at first you won’t be good). Come up with your ideas but then think, “What has never been done before”. Give others credit all the time!: When people want more credit, who do they go to? They go to you! Just like they would go to the bank when they need more money. Credit is like currency. If you’re the bank, then in the long run you will end up with all the real credit. Integrity: You give advice and help people when you sincerely want them to do better. Do this every day thinking It adds up!! No, it doesn’t add up. It multiplies. It compounds. Money management: There are three rules to money: = Making it. = Keeping it. = Growing it. These rules will produce desired result only and only when all of them are applied together and in the same order in the desired time period.
Always follow through: Have follow through of your own ideas. Ideas will not work if planning is not done and pains are not taken to implement the same, they will remain as an idea. To make your idea successful and in turn you a success, one needs to have follow through of your ideas. Use pen and paper, go old school; jot things down: How many times do you think of a great idea and you think, “this is so GREAT I will never forget it.” And then you forget it. Listen: When you listen, you learn. When you learn, you get better. When you get better you start to have a vision, you start to over deliver, you get more creative, and all the other good things above. Listening is a form of improving relationships with others. Listening is a way to outsource good ideas since if you let many others talk, some of them will give you good ideas you might not have thought of. Buddha didn’t start a major religion by talking. It started because he sat under a tree and listened. <
edges someone, half the battle is already won since every customer rightfully demands your attention.” “If a customer tweets something nasty about your company, view it as an opportunity rather than an insult,” says Gina Broom, marketing assistant, Affilorama, an affiliate marketing training portal. “Let them know you're sorry they've had this experience, and ask how you can help them have a better one,” she advises. “This will douse the fire, demonstrate that you care about quality experiences for customers and potentially even save your relationship with an existing customer.” “When you're faced with negative reviews on social media, apologize publicly and follow up privately,” says Adi Bittan, cofounder and CEO of OwnerListens, a customer service app. “Your apology to the original post lets viewers know you're addressing the
With social media, feedback about a product or service, the purchasing experience or customer service “can be gathered as simple as tweeting or posting a question about [it on Facebook],” says Levine. “You no longer have to go through the hassles of creating a survey. It’s short and sweet and customers can tweet/comment what their experiences have been.” Though if you go this route, be prepared for negative comments. You can also use your Twitter or Facebook channel to “ask your audience what they'd like to know about [or see] next,” says Broom. “If you're using Facebook, you can even give them options in a poll, so it's easy for them to respond, e.g., Would you like to know more about A, B or C? This gives you two bonuses: Your audience feels heard, and you know exactly what content to deliver to keep them happy.”
6. Use social media to humanize your brand. Customers like to feel they know a company, or can relate to it. So by giving your company a human face, that is, assigning an individual or several people to manage each of your social media channels, who customers can get to know by name (and posts and photos), you help build the customer relationship. “We use Facebook and Instagram to show our users that we are more than just a voice on the phone or a Twitter handle,” says Bubley. “We are real people who are passionate about what we do and who we do it for.” 7. Don’t use your social media channels to sell or pressure customers. “Customers aren’t looking for sales pitches and press releases,” says Brewer. “They want help, support, to get the most they can from your products, services [or] brands.” <
issue, and [the] followup makes your response more personal for the customer.” 4. Use social media to highlight your customers. Use social media to “spotlight customers who have done cool and interesting things with your product or service,” says Rani Mani, director, customer success and social strategy at Adobe. “Not only does it shine a spotlight on your customers, but it humanizes what you are offering the world. Lead with the success of the person and make it secondary that some of that success was powered by your company,” she says. “The public is inspired by stories and the people behind those stories. So make it a point to tell compelling stories about ordinary people who are achieving extraordinary results [with your product or service].” 5. Use social media to get feedback from customers.
ITAG Times
itag
Team
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Thursday
01 10 2015
3
You might experience it in waves or spurts, but we’ve all had those days where it simply feels like our brains have decided to go on holiday. There are usually a few telltale culprits to blame and it helps to know what they are and what we can do to prevent them. And then there are additional tips and activities that you can put to practice to make your brain function as optimally as possible – at all times.
The secret to brain power
Arouse your mind
H
it the brain gym for a round of mentally stimulating exercises. Now, doing mental exercises might seem obvious, but it’s important to set aside time for thought-provoking activities. And with our smartphones, building muscle is easier than ever. Apps and online resources such as BrainHQ and Luminosity offer fun challenges to help improve memory, speed and attention. These resources are based on the idea of neuroplasticity, which refers to the brain's ability to change and adapt. Just 15 minutes a day can help boost your neurological health. And if you want to put the smartphone down for a few minutes, a crossword puzzle is tried and true way to boost your cognitive abilities.
Exercise your body In addition to exercising your brain, physical activity is critical in keeping a sharp mind. So, amid your busy day, find time to squeeze in a workout. You could start your day with simple stretching, take a 30minute walk during lunch, or head to the fitness center for a highimpact workout when the day is done. These kinds of activities give you physical and neurological benefits and it’s a chance to use your
mind to pay attention to the movements of your body and the surrounding environment. So, when you’re working out, put your senses to work, too, and experience every move, sound and touch. If you’re not engaging your mind during physical activity, it’s a lost opportunity for improvement.
human contact to develop his or her mind, adults need interaction to continually develop cognitive sharpness. It can be as simple and fun as a party with close friends, or a professional
both. By focusing on one task, you’re able to complete it more competently, while also boosting your memory.
diet that consists of healthy “brain foods”, along with physical exercise, plays a vital role in shaping and maintaining one’s Eat smart cognitive capacity, You already know including concentration and working memory. In short, smart food equals energy for your brain.
Live smart, stay sharp
Learn new skills Have you always wanted to play a musical instrument? Paint? Speak a foreign language? Become a ping pong champion? Now you’ve got an added reason to pick up a sixstring or brush. By learning new skills, you’re continuously challenging yourself, and that means you’re giving yourself ample opportunity to stretch your cognitive capacity. Some activities, such as ping pong, test and improve your reactions. Others, such as puzzles or pottery, demand and boost adaptive memory and working memory skills. Similarly to physical workouts, take each activity seriously by engaging your senses and paying attention to everything that you’re doing.
Get social Social interaction – the real kind, not the Facebook kind – is brain food for everyone. Just as a young child needs
seminar discussing topics related to your job. Either way, the brain is being stimulated, which allows its power and abilities to grow.
Focus on one task While multi-tasking is a daily demand in today’s world, this activity of dividing our attention might actually be more problematic than productive. When you multi-task, you’re not able to fully get “in the zone” and focus on completing that task to the best of your ability. Multi-tasking, in fact, can also lead to more mistakes. Instead, focus on one task at a time, so your brain and all your senses can become fully engaged. Here’s one simple way to look at it: if you’re trying to read a book and watch a TV show at the same time, you’re going to miss details of one or probably
that eating healthy is good for your physical health, but it can do wonders for your mental health, too. Your brain needs nutrients and energy just like your body does, so stock up on foods such as wholegrains, nuts, berries, green vegetables and fish, which is especially rich in the powerful omega-3 fatty acids. A
Training isn’t just for physical muscles. The more you stimulate your brain, the stronger it will perform on a daily basis. Smartphones and new technologies provide fun and innovative ways to boost cognitive capacity, while social interaction and hands-on activities are just as vital. With a strong mind, you can help avoid those occasional mental lapses, learn new skills much faster and help protect yourself against the effects of old age.<
ITAG Times
News CORNER
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Thursday
5 KEY FINDINGS Managing disparate solutions and services can result in high costs, inefficient operational processes and mean threats remain undetected across the business. Security can’t afford to rely on organizations’ strained IT resources. Companies need a unified advanced threat protection solution to prevent, detect and remediate threats quickly across their network, endpoint and email without the headache of managing disparate technology.
ADVANCED THREATS AND DATA BREACHES ARE ON THE RISE Why? INCREASE OF ADVANCED ATTACKS Large companies saw a 40% increase of advanced attacks in 2014 over the previous year
OF VICTIMS DISCOVERED DATA BREACHES THEMSELVES With all internal discovery methods combined, only 9% of victims discovered data breaches of their own accord
MORE TECHNOLOGY DOES NOT EQUAL BETTER DETECTION Why? Data is often not connected to and aware of what is happening inside different parts of the environment and coming from disparate vendor solutions. With all the data to sift through, companies are trying to determine where to spend their time. Many companies today are already compromised and don’t even know it. Continued On page 6...
Cybercriminals are employing stealthy, persistent methods to bypass traditional security defenses. Many companies are already compromised by advanced threats and don’t even know it.
4
CURRENT PREVENTION AND DETECTION METHODS FALL SHORT
ON ADVANCED THREATS Companies are dealing with growth in data and an expanding number of endpoints, servers and mobile devices.
01 10 2015
OF MALWARE WAS VIRTUAL MACHINE AWARE
Why?
28% of malware was virtual machine aware in 2014
When current prevention methods fail, the time it takes to detect and respond to threats have significant impact to the business. Companies are struggling to limit breach impact and contain exposure.
ITAG Times
Articals
www.fitag.in
5
MkkÞçkhMkVh ™ux õ™ufþ™ rð™k [u®x„ Thursday
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
01 10 2015
s\rhÞkŒ þkuÄ™e s™™e Au! „Þk …¾ðkrzÞk™e yþktrŒ Ëhr{Þk™, {kuƒkR÷ RLxh™ux …h «rŒƒtÄ ykðe „Þku yux÷u xuf™ku÷kuS™ku Úkkuzku ðÄkhu …™khku ÄhkðŒk ÷kuõkuyu ykR…e yuzÙu‚ ƒË÷ðk suðk y¾Œhk õhe™u ‚kurþÞ÷ õ™ufþ™ SðtŒ hk¾ðk™e õkurþþ õhe.
n
õeõŒ yu …ý Au õu RLxh™ux™ku W… Þku„ VfŒ ‚kurþÞ÷ {erzÞk …qhŒku ‚er{Œ ™Úke, yku™÷kR™ …u{uLx õhŒk ½ýk ÷kuõku™u …ý yk «rŒƒtÄÚke ½ýe nk÷kõe ¼ku„ððe …ze y™u yuÚke …ý yk„¤, ½ýe RLzMxÙeÍ{kt, {þe™he™wt ykuxku{uþ™ …ý nðu f÷kWz ‚rðo‚eÍÚke yku…hux ÚkE þõu Au, su ƒÄwt …ý XÃ… ÚkE „Þwt. yk Œku ‚hõkhe «rŒƒtÄ nŒku, …ý yk‚{k™e ykVŒ ‚{Þu ™ux õ™ufþ™ õu Rð™ {kuƒkR÷ ðkuR‚ õBÞwr™õuþ™ …ý X… ÚkE òÞ Œku? ykðk ‚tòu„ku{kt M{kxoVku™ ¾hu¾h M{kxo ‚krƒŒ ÚkE þõu Au. Œ{™u òýe™u ™ðkE ÷k„þu õu yuðe …ý yuõ yu… Au, su™e {ËËÚke RLxh™ux™kt ðkR-VkR r‚„À÷ rð™k y™u {kuƒkR÷ zuxk Ã÷k™ rð™k …ý ÷kuõku yuõƒeò™k ‚t…õo{kt hne þõu Au! yíÞkh ‚wÄe {kuƒkR÷ õt…™eyku™u yu ðkŒu …ux{kt Ëw:¾Œwt nŒwt õu ðkuxT‚yu… suðe yku™-Ä-xku… ({kuƒkR÷ zuxk ™uxðõoÚke [k÷Œe, …ý ÷kuõku {kxu {VŒ) ‚rðo‚Úke Œu{™e ykðõ{kt {kuxkt „kƒzkt …zu Au. …htŒw yk ƒÄe ‚rðo‚ ytŒu Œku {kuƒkR÷
{wt
ƒE ç÷kMxT‚ …h ykÄkrhŒ yV÷kŒq™ rVÕ{ ðu™‚zu Œ{u òuE nŒe? Œu{kt, ykŒtõðkËeyku ‚k{u yõ¤kÞu÷k õku{™{u™ ™‚eÁÆe™™ku yuõ zkÞ÷ku„ õtEõ ykðku Au...{wtƒEðk÷k ½h ‚u ykurV‚ òŒk ni Œku ƒeðe ƒkhƒkh Vku™ õhŒe ni, [kÞ …e ÷e? xerV™ ¾k ÷eÞk? Ëhy‚÷, ðku ò™™k [knŒe ni, Œw{ rsLËku Œku nku? õ{™‚eƒu, yk…ýk Ëuþ{kt yk ÂMÚkrŒ VfŒ {wtƒE …qhŒe ‚er{Œ ™Úke. ðkŒ õwt¼{u¤k õu s™yktËku÷™{kt „Þu÷k Mðs™™e nkuÞ õu …Ae {kuze ‚kts ‚wÄe ½uh …hŒ ™ Vhu÷e Ëeõhe™e nkuÞ, ½hu nksh ÔÞrfŒ ‚ŒŒ ®[Œk{kt hnu Au, Mðs™ nu{¾u{ Œku nþu™u? ‚Ë™‚eƒu, yk ÂMÚkrŒ{kt …ý xuf™ku÷kuS yk…ýe ‚khe yuðe {ËË õhe þõu Au. ‚kurþÞ÷ {erzÞk þu®h„ nðu yux÷wt ‚k{kLÞ ƒLÞwt Au õu yk…ýu su Œu ‚kRx™kt ‚u®x„ ƒhkƒh ‚{ßÞk ™ nkuEyu Œku yk…ýu fâkhu, fâkt y™u þwt õÞwO yu Ëwr™Þk yk¾e òýe þõu Au. yk s ¾kr‚ÞŒ, rðþu»k ‚tòu„ku{kt yk…ýk {kxu {ËËY… …ý ÚkE þõu Au. òu Mðs™ …k‚u M{kxoVku™ nkuÞ
…e‚e{kt …ý [k÷u Au, Œu õuðe heŒu? ðkRVkR r‚„À÷Úke. yuõ M{kxoVku™™u nkuxM…kux ƒ™kðe™u xuƒ÷ux õu ÷u…xku…{kt yk…ýu ™ux õ™ufþ™ {u¤ðe þõeyu Aeyu Œu õuðe heŒu? ðkR-VkRÚke. …nu÷k
Au. {k™e ÷ku õu „ýuþrð‚so™ Ëhr{Þk™ {wtƒE™e [ku…kxe …h rðþk¤ s™{uË™e yuõXe ÚkE nkuÞ y™u õkuE õkhý‚h RLxh™ux ‚uðk ƒtÄ nkuÞ y™u íÞkt nksh ‚tÏÞkƒtÄ ÷kuõkuyu yk yu… …kuŒk™k M{kxo V ku ™ {kt
M{kxoVku™™u RLxh™ux™kt rMkøLkÕMk™e sYh …zu Au, …ý ƒeswt rzðkR‚ VfŒ ðkR-VkR™e {ËËÚke ™ux ‚kÚku õ™ufx ÚkkÞ Au. ™ux õ™ufþ™ õu zuxk Ã÷k™ rð™k [u®x„™e ‚wrðÄk yk…Œe yu… yk s ¾qƒe™ku W…Þku„ õhu Au. yk yu… sux÷k M{kxoVku™{kt RLMxku÷ ÚkÞu÷e nkuÞ yu ƒÄk M{kxoVku™ òu yuõ{uõÚke 210 Vqx õhŒkt ykuAk ytŒhu nkuÞ Œku VfŒ ðkRVkR rMkøLkÕMk™e {ËËÚke …kuŒk™wt yk„ðwt ™uxðõo h[e þõu Au. yux÷u s yk yu… ™u õux÷kõ ÷kuõku yu… Vkuh ¢kWzT‚ õnu
RLMxku÷ õhe nkuÞ Œku Œuyku ™ux r‚„À÷ rð™k yuõ{uõ™k ‚t…õo{kt hne þõu Au. yíÞkh ‚wÄe yk yu…{kt „úq… [u®x„ þfâ nŒwt, sux÷k ÷kuõku Œu™k ™uxðõo{kt ‚k{u÷ nkuÞ Œu ƒÄk yk {u‚uS‚ òuE þõu. …htŒw nðu Œu{kt «kRðux {u‚us™e ‚wrðÄk …ý W{uhkE Au. yuõ M{kxoVku™ …hÚke ðnuŒku ÚkÞu÷ku {u‚us ðå[u™k swËk swËk M{kxoVku™ …h xÃ…ku ¾kE™u yk„¤ ðÄu y™u Œu™e {trÍ÷ ‚{k M{kxoVku™ ‚wÄe …nkU[u, Œu{kt ðå[u™k ƒÄk M{kxoVku™ yktĤk x…k÷e suðe ¼qr{õk ¼sðu. Ëu¾eŒe ðkŒ yu Au õu yk yu… su{ ðÄw ÷kuõku RLMxku÷ õhu Œu{ Œu ðÄw
(y™u òu yu Vku™{kt S…eyu‚ ð„uhu yku™ hk¾Œk nkuÞ) Œku yk…ýu nhnt{uþ, Mðs™ yíÞkhu fâkt Au yu òýe þõeyu Aeyu y™u yk ðkŒ VfŒ, yk…ýe … ‚tË„e™k Mðs™ …qhŒe s ‚er{Œ hnu yuðwt õhe þõkÞ Au. „q„÷, {kR¢ku‚kuVTx, yu…÷ y™u yk ºkýuÞ {nkhÚke W…hktŒ ƒeS ‚tÏÞkƒtÄ
õkuE yuõ (õu yuõÚke ðÄw, su{ õu Vur{÷e ‚õo÷{kt™k ÷kuõku)™kt ™k{ W{uhe, z™ õhe Ëku. yuõ ‚wrðÄk yuðe …ý Au õu Œ{u …rhðkh W…hktŒ, …‚tË„e™k yLÞ ÷kuõku™u Œ{kÁt [ku¬‚ MÚkk™ ™nª, …ý õÞk þnuh{kt Aku yux÷wt sýkððwt nkuÞ Œku yuðe „kuXðý …ý õhe þõkÞ Au. yk heŒu, yk…ýu yk…Ûšt ÷kuõuþ™
…h [k÷u Au. ßÞkhu Œ{u ykRf÷kWz{kt Vur{÷e þu®h„™kt …nu÷e ðkh ‚u®xø‚ õhku íÞkhu s Œ{™u …qAðk{kt ykðu Au õu Œu Œ{khk …rhðkh™k yLÞ ‚ÇÞku ‚kÚku Œ{kÁt ÷kuõuþ™ þuh õhðk {k„ku Aku? òu íÞkhu nk õne ™ nkuÞ Œku …Ae „{u íÞkhu Œ{u ‚u®xø‚{kt ykRf÷kWz õuxu„he{kt sE™u þuh {kÞ ÷kuõuþ™™u R™uƒ÷ õhe,
õt…™eykuyu ykðe yu rðf‚kðe Au. yk…ýu {wÏÞ yu™e ðkŒ õheyu. òu Œ{khk …rhðkh{kt yuLzÙkuRz y™u ykRVku™ ƒt™u nkuÞ Œku Œ{khk {kxu „q„÷ Ã÷‚™wt ÷kuõuþ™ þu®h„ ‚kÁt hnuþu, VfŒ ƒt™u ÔÞrfŒ …k‚u „q„÷ Ã÷‚ yuõkWLx nkuðwt s\he Au (y™u ÷kuõuþ™ þu®h„ {kxu yuõ{uõ™e ‚t{rŒ nkuðe sYhe Au!). nðu Œ{khk M{kxoVku™{kt „q„÷ Ã÷‚ yu… yku…™ õhku. yuLzÙkuRz{kt, {u™w ƒx™™k hMŒu ‚u®xø‚{kt òyku y™u íÞkt ÷kuõuþ™ þu®h„™u R™uƒ÷ õhku. nðu Œu{kt r…™…kuRLx ÷kuõuþ™™u yurzx õhe, Œ{u
…rhðkh™e yLÞ ÔÞrfŒ ‚kÚku þuh õÞwO, yu heŒu, …rhðkh™e su ÔÞrfŒ™wt ÷kuõuþ™ Œ{u òýðk RåAŒk nku Œu™k {kuƒkR÷{kt …ý yk heŒu, Œ{khk ™k{ ‚kÚku ÷kuõuþ™ þu®h„™wt ‚u®x„ õhðwt …zþu (yk ÔÞðMÚkk yuõŒhVe …ý nkuE þõu Au). ykðwt ‚u®x„ õÞko …Ae, yk…ýu yk…ýk M{kxoVku™{kt „q„÷ Ã÷‚ yu…{kt sE™u …rhðkh™k yLÞ ‚ÇÞku™kt ÷kuõuþL‚ {u… …h òuE þõeyu Aeyu. ykRVku™{kt yk ‚„ðz VkRLz {kÞ £uLzT‚ ™k{™e yu… MðY…u W…÷çÄ Au, su ykRVku™, ykR…uz y™u ykR…kuz x[
Œ{u su™e ‚kÚku ÷kuõuþ™ þuh õhðk RåAŒk nku Œu ÔÞrfŒ …‚tË õhe þõku Aku. yk ‚u®x„ ÚkÞwt nkuÞ Œku …Ae, VfŒ VkRLz {kÞ yu… yku…™ õhe™u ™fþk …h Œ{khe ‚kÚku su{ýu ÷kuõuþ™ þuh õÞwO nkuÞ Œu{™wt MÚkk™ òýe þõku Aku. òuõu Vur{÷e þu®h„™ku ÷ktƒku hMŒku ÷uðk™u ƒË÷u, VkRLz {kÞ £uLzT‚ yu…{kt Œ{u yLÞ ÷kuõku™u Œu{™wt ÷kuõuþ™ þuh õhðk RLðkRx õhe þõku Aku. yk ‚„ðz™k ykÄkhu s, ykurV‚uÚke ½hu ykððk ™eõ¤u÷e ÔÞrfŒ ytËksu fâkhu ½uh …nkU[þu Œu yuf‚…ufxuz xkR{ ykuV yuhkRð÷
õt…™e™k zuxk Ã÷k™Úke s [k÷u Au yux÷u xur÷õkuB‚™e ykðõ yuõ ™nª Œku ƒeò hMŒu [k÷w Œku hnu s Au. ßÞkhu yk su yu…™e yk…ýu ðkŒ õhe hÓkk Aeyu yu VkÞh[ux (http://opengarden.com/firechat/) yku™-Ä-xku… …ý ™Úke, yu {kuƒkR÷ ™uxðõo™ku W…Þku„ ‚ËtŒh õhŒe ™Úke. RLxh™ux™kt ðkR-VkR rMkøLkÕMk õu {kuƒkR÷ zuxk Ã÷k™ rð™k {u‚u®s„ õuðe heŒu þfâ ƒ™u nðkÚke? yuðku òu ‚ðk÷ Œ{™u ÚkÞku nkuÞ Œku Œ{khk ‚ðk÷{kt s sðkƒ Au rƒ÷õw÷ nðk™k {kæÞ{Úke s yk þfâ ƒ™u Au. yk…ýu {k™eyu Aeyu õu M{kxoVku™ VfŒ RLxh™uxÚke yuõƒeò ‚kÚku õ™ufx ÚkE þõu Au y™u RLxh™ux {kxu ðkR-VkR õu zuxk Ã÷k™ òuEyu, …ý yu ðkŒ yk…ýu ¼q÷e sEyu Aeyu õu M{kxoVku™ …kuŒu yuõ «õkh™ku hurzÞku Au, su rMkøLkÕMk {kuõ÷e þõu Au. ƒu M{kxoVku™ ðå[u yk…ýu „eŒku õu ®h„xkuL‚™e yk…÷u õuðe heŒu õheyu Aeyu? ç÷wxqÚkÚke. hkRx? yuhzÙkuRz suðe yu…™e {ËËÚke, …e‚e y™u M{kxoVku™ ðå[u VkRÕ‚™e yk…÷u ÚkkÞ y™u ðkuxT‚yu…
õnwt Awt, fâkt Aku Œ{u?
õkh„Œ ™eðzu. õt…™e õnu Au õu õkuE þnuh™k VfŒ …kt[ xõk ÷kuõku yk yu… RLMxku÷ õhu Œku „ýŒhe™e r{r™x{kt yk yu… …h, õkuE r‚„À÷ rð™k {u‚us ™uxðõo{kt™e ƒeS ÔÞrfŒ ‚wÄe …nkU[e þõu Au. nS yk„¤ ðkt[ku yk yu…™k zuð÷…h Œu{kt õku®÷„™e ‚wrðÄk …ý W{uhðk™ku «Þk‚ õhe hÓkk Au. …rhýk{u, ‚tÏÞkƒtÄ xkðh™wt ™uxðõo Q¼wt õhðk™k õkuE ¾[o rð™k, yk yu… £e xur÷õku{ ‚rðo‚ suðwt õk{ yk…þu! õux÷kõ™k {Œu, yk yuõ ƒeò RLxh™ux™e þkuÄ õhðk suðe {kuxe ðkŒ Au! yk yu… nS „Þk ð»kuo s ÷kuL[ ÚkE Au. „Þk ð»kuo nkU„õkU„{kt ÷kuõþkne ŒhVe yktËku÷™ku ÚkÞkt íÞkhu 24 õ÷kõ{kt yuõ ÷k¾Úke ðÄw ÷kuõkuyu yk yu… zkW™÷kuz õhe nŒe. ¼qõt… suðe {kuxe ykVŒ ‚{Þu RLxh™ux y™u õBÞwr™õuþ™™kt yLÞ {kæÞ{ ¾kuhðkÞ íÞkhu yk yu… {kuxe {ËË õhe þõu Au. nS n{ýkt s õk~{eh{kt ¼khu …qh ykÔÞkt íÞkhu yk yu…™ku W…Þku„ õhŒk õux÷kõ Þwðk™ku hknŒ õk{„ehe{kt {ËË\… ÚkÞk nŒk. rVr÷…kRL‚{kt ðkhtðkh rð™kþõ ðkðkÍkuzkt ºkkxõu Au y™u íÞkt {kuxkt y¾ƒkhe sqÚkku …kuŒu ÷kuõku™u ‚{Þ‚h {krnŒe y™u [uŒðýe …nkU[kzðk yk yu…™e {ËË ÷u Au. rð¿kk™™e Ëhuõ þkuÄ™e su{ yk yu…™ku …ý ƒuÄkhe Œ÷ðkh suðku W… Þku„ ÚkE þõu Au. yk…ýu yuðe ykþk hk¾eyu õu õkuE - {k™ð‚rsoŒ õu õwËhŒe - õkhý‚h „wshkŒ{kt yk…ýu yk yu… ™e fâkhuÞ sYh …zu ™nª. <
Rxeyu yk…ýu òýe þõeyu Aeyu! yuLzÙkuRz y™u ykRykuyu‚™e su{ rðLzkuÍ Vku™ ÄhkðŒk ÷kuõku Mfðkuz ðku[ ™k{™e {kR¢ku‚kuVTx™e …kuŒk™e yu…™ku W…Þku„ õhe þõu Au. yk yu… ƒkõe™e ƒu ykuyu‚™e su{ s [k÷u Au, …ý su{ ykRykuyu‚ yuf‚f÷wrÍð Au Œu{ yk yu… …ý VfŒ rðLzkuÍ Vku™ ÄhkðŒk ÷kuõku {kxu s Au. yk„¤ õÓkwt Œu{, yk «õkh™e ƒeS õt…™eykuyu zuð÷… õhu÷e ‚tÏÞkƒtÄ yu… …ý Au. yux÷t ¾Át õu õku÷us{kt ¼ýŒe Ëeõhe õu Ëeõhk™k M{kxoVku™{kt ykðe „kuXðý õhðk™wt ‚q[™, Mðk¼krðõ heŒu yu{™e MðŒtºkŒk …h Œhk… suðwt ÷k„þu, …ý …rhðkh™wt ðkŒkðhý yuõË{ nqtVk¤wt y™u MðMÚk…khËþeo nkuÞ Œku yk ‚„ðz, yýÄkÞko ‚tòu„ku{kt [ku¬‚ W…Þku„e ÚkE þõu Au y™u …Je ‚kÚku ÷kuõuþ™ þuh õÞwO nþu Œku yu ðkhuðkhu fâkt Aku Œ{u? yuðwt Œ{™u ™nª …qAu, M{kxoVku™™u s …qAe ÷uþu! yk ‚wrðÄk yuõ heŒu òuEyu Œku VkÞh yu®f‚Txøðeþh suðe Au. ½h{kt õu ykurV‚{kt {qõe hk¾u÷wt yu ‚kÄ™ fâkhuÞ ™ ð…hkÞ yu{kt s ‚ki™e ¼÷kE Au! <
ITAG Times
Events CORNER
www.fitag.in Thursday
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
01 10 2015
6
4th CONCLAVE FAIITA
IT CONSUMER SHOW ORGANIZED BY MANDVI COMPUTER DEALERS ASSOCIATION
{ktzðe-fåA {æÞu ykE.xe.fLÍÞw{h-þku Lkwt ykÞkusLk: {ktzðe þnuhLkk fkuBÃÞwxh rz÷h yuMkkuMkeyuþLk{kt fw÷ 26 sux÷k MkÇÞkuyu yk ykÞkusLk{kt ¼køk ÷eÄku níkku. yLku yk çku rËðMkLkk ykE.xeLkk ykÞkusLk{kt MÚkkLkef hneþkuyu Mkkhku yuðku «ríkMkkË ykÃÞku níkku. yk ykÞkusLkLke Mk{økú sðkçkËkhe MÚkkrLkf fkuBÃÞwxh yuMkku. yu Mkt¼k¤u÷e níke. íku{Lkku ¾qçk ¾qçk yk¼kh...
Continued from page 4...
4th CONCLAVE OF FAIITA was attended by FITAG President Mr. Amit Shah, FITAG IPP and FAIITA zonal V.P. Mr. Gaurang Vyas along with FITAG Founder President Mr. Kaushik Pandya. Photos showing our leaders in different sessions.
Massage from FAIITA President
INCIDENT RESPONSE IS TAKING TOO LONG
Shri Champakraj Gurjar
Why?
BREACHES TOOK MONTHS TO YEARS TO DISCOVER
66% of breaches took months to years to discover a breach, 3 months to find a breach and 4 months to resolve
IT struggles to cope with the massive amounts of incidents, investigating too many false positives. Companies need a better way to correlate all the data from the external and internal threat intelligence so they can react quickly and identify and address their most severe incidents before it’s too late.
THE COST OF A DATA BREACH IS SIGNIFICANT Why? = Breaches cost organizations time to identify, respond and resolve threats. = Investment in multiple technologies can be expensive and result in having to hire more staff to manage it all.
Dear FITAG Team, At the onset, let me congratulate you on your 25th issue of the newsletter, FITAG Times. This is definitely a huge milestone. As President of FAIITA, we have interacted with various associations but very few have a concept of a newsletter. Producing such a newsletter requires dedication as timely compilation, production and distribution are key. Furthermore, to do it with such frequency and regularity calls for excellent teamwork and co-ordination. Your team is doing a remarkable service to the thousands of SIs and other channel partners of Gujarat in disseminating information via this newsletter. The relevance of this is more in a industry as dynamic as ours. Please continue this great service and help your members integrate with the newer projects of our country viz, Digital India, Make in India, etc. This will lead to great value addition for your readers. I wish you all the best and may FITAG help its members scale greater heights and achieve more prosperity. Thanks and best regards Champakraj Gurjar President Faiita
ITAG Times Winter is a time when Mother Nature reminds us that even the best laid plans can go wrong. Protect your small or midsized business from the unexpected by implementing virtualization technologies to optimize resources, improve application availability and reduce downtime.
V
irtualization saves. Pooling server, storage, and network resources takes advantage of spare capacity and saves money on space, utility costs, and administrative effort. At the same time, virtualization provides opportunities for failover and load-balancing, resulting in greater application and data availability. Unfortunately, small and midsized businesses (SMBs) often forgo technology investments that dramatically reduce operational costs and improve IT efficiency because they are perceived to be too complex or expensive. But affordable servers, storage, and networking products with virtualization features are now available to your business. Through virtualization, SMBs can not only consolidate and optimize resources, but can also = reduce downtime by load balancing application availability = isolate problem areas = add resources at a moment’s notice to improve performance and capacity when required = reduce costs in software licensing, system management, real estate and utilities Maintain application availability Let’s face it. Things don’t always go as planned. Downtime, brought on by hardware or software failures, natural disasters, or even planned
Articals
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
maintenance, can wreak havoc on any business. People are accustomed to being online all the time, and it has become critical to ensure the least amount of downtime possible. While reliable technology
you prevent one application from affecting the performance of another. Thrive during peaks in demand One of the best ways to avoid bringing systems to a halt is ensuring they can
www.fitag.in Thursday
01 10 2015
7
offers low-cost storage arrays, such as the MSA 1040, to give you just the HP Just Right IT The HP Just Right IT right amount of storage to portfolio offers cost-effec- get started. Growth plattive servers designed for forms, like the MSA 2040, virtualization with its HP provide even more capabilProLiant Gen9 servers. ities and performance. To speed virtualization deployment at a really low cost by using existing hardware, take advantage of HP’s StoreVirtual VSA. HP also offers affordable These new, more powerful network switches, such as servers increase application the HP 5400R, that are SDN performance and improve (software defined networks) Virtual Machine density. enabled with OpenFlow. If you haven’t virtualThey can help you reduce downtime, reduce IT power ized yet, now is a good time and cooling costs, and con- to make sure you can stay solidate IT resources– lead- up and running in the ing to a reduction in overall months to come. To learn business costs and greater more about HP’s Just Right products and solutions, visit application availability. Storage and networks HP Just Right IT.< can also be virtualized. HP
add up to big cost savings.
HOW CAN VIRTUALIZATION SAVE YOUR BUSINESS? and backup and restore solutions are probably already part of how you plan to address the issue of uptime, you may not yet have considered how virtualization can also help. With virtualization, you can easily move applications, the data files associated with them, and network connections between devices. Should one device fail, resources in separate instances can immediately be brought online. Getting a set of services up and running from a library of pre-existing virtual machines can make a recovery from a total disaster much faster. Depending on how it’s set up, you can work it so that the virtualization spans across multiple sites. In the event of a disaster in one location, services can be brought online quickly from another. Enable continued use of legacy applications Many businesses use applications that are several years old. These applications may be the lifeblood of their business. But as the underlying operating environment changes, instability can creep in. Virtualized environments can help you isolate less stable, legacy applications and allow them to continue to function in spite of changes in the underlying infrastructure. By separating them,
handle the demands placed on them. As the holidays approach, now is a really good time to determine if your infrastructure can handle spikes in demand. Virtualization will allow you to use spare capacity on one server and put it on “standby” for the holiday rush of traffic that comes in. Reduce costs The most obvious benefit of using virtualization is how it saves in overall operating costs. Consolidating services on newer, higher performing servers helps reduce maintenance costs as well as software licensing fees. Making sure resource capacity isn’t going unused optimizes investments. Minimizing system footprint and utility bills all
Disclaimer: This Magazine is for private circulation only. The data published in this magazine is based on the inputs provided by various sources. The publisher, printer and the Editor do not guarantee the authenticity of correctness of the data published here in. Publisher : Gaurang Vyas, President, Fitag Editor: Kaushik Pandya Designer : Hardik Pancholi Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad - 380015. All rights reserved. No part of this publication can be reproduced without the prior permission from the publisher.
ITAG Times
Crtoon Corner
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Thursday
01 10 2015
8