Thursday, October 28, 2010

Jobs available @ datagear

Location : Egypt
Write the Subject of the mail with the job Code any other Subject will be discarded


- Experience with Data stage IBM is must.
- Experience 1 Years in SQL.
- DWH Experience is a plus.
- Ability to work in team.
- Ability to Work under Pressure.
- Ability to research and learn new technologies.

Send CV ON jobs@...


ETL specialist (ETL45)

Job Vacancies

Location : Egypt
A reputable multinational IT company requires experienced qualified candidates
to join its work force as
Senior SharePoint Developer (3+ years of experience)
Candidates must have high experience in the following areas:
• SharePoint Object Model.
• SharePoint Designer.
• ASP.NET Custom Development
• SharePoint Administration and Configuration.
• SQL Server
Senior .Net Developer (3+ years of experience)
Candidates must have high experience in the following areas:
• ASP.NET
• HTML
• CSS
• JavaScript
• SQL Server

Senior Web Designer (3+ years graphic design web UI experience)
Candidates must have high experience in the following areas:
• Experience/comfort working in a team environment
• Strong knowledge of web and Internet technologies
• Expert knowledge of client side user interface technologies: HTML/XHTML, CSS
• Expert at web standards for CSS-driven layouts
• Experience with formal usability testing and knowledge of usability principles
• Expert knowledge developing cross platform/browser compatible front end User
interfaces
• knowledge of Javascript/jquery and AJAX
• Design talent with a good eye for aesthetics and details
• knowledge of Flash design and action script
• Candidates must have a ready portfolio of previous work to show upon request
The selected candidates will work in small groups on multiple software
development projects, and will work closely with the assigned Project Managers
to deliver quality solutions to our client companies

Additional Skills & Competencies:
• Building and facilitating effective project development teams or integrated
project teams.
• A self-starter who requires minimal supervision.
• Excellent interpersonal and organizational skills, ability to handle diverse
situations, multiple projects and rapidly changing priorities.
• Ability to communicate with clients at all levels.
• Ability to come up with the best solution for given requirements.
• Ability to provide reasonably accurate estimates for projects, based on
client-provided technical and functional requirements.
Resumes to be sent toT.Jobs.Opportunity@...

The XMLHttpRequest Object

The XMLHttpRequest Object

All modern browsers support the XMLHttpRequest object (IE5 and IE6 uses an ActiveXObject).

The XMLHttpRequest object is used to exchange data with a server behind the scenes. This means that it is possible to update parts of a web page, without reloading the whole page.

Create an XMLHttpRequest Object

All modern browsers (IE7+, Firefox, Chrome, Safari, and Opera) have a built-in XMLHttpRequest object.

Syntax for creating an XMLHttpRequest object:

xmlhttp=new XMLHttpRequest();
Old versions of Internet Explorer (IE5 and IE6) uses an ActiveX Object:

xmlhttp=new ActiveXObject("Microsoft.XMLHTTP");
To handle all modern browsers, including IE5 and IE6, check if the browser supports the XMLHttpRequest object. If it does, create an XMLHttpRequest object, if not, create an ActiveXObject:

Example

if (window.XMLHttpRequest)
{// code for IE7+, Firefox, Chrome, Opera, Safari
xmlhttp=new XMLHttpRequest();
}
else
{// code for IE6, IE5
xmlhttp=new ActiveXObject("Microsoft.XMLHTTP");
}

Top 25 Programming Errors Highlight Application Security Challenges

The SANS Institute and nearly 30 other organizations joined together to release an updated list of the 25 most common programming errors. The list underscores the need to inject more security into the application development process, experts say.
Roughly 30 national and international cyber-security organizations released Feb. 16 an updated list of the 25 most dangerous programming errors as part of an effort to inject security into the development process
In addition to the most common programming errors, the group settled on a standard for contract language between software buyers and developers to ensure
the buyers are not held liable for buggy code. Such code is at the heart of many breaches, including the recent Google attacks, the group noted.

“The CWE/SANS Top 25 Programming Errors list provides critical inputs every software organization needs to incorporate into their quality and security processes,” said Bill Curtis, director of the Consortium for IT Software Quality (CISQ), in a statement. “CISQ will be working to incorporate defined patterns for recognizing these weaknesses into its standardization for security measurement."

The list was put together by representatives from various vendors and government agencies, including the SANS Institute, McAfee and the National Security Agency. The programming errors are separated into three general groups: insecure interaction between components, risky resource management and porous defenses. Much of the list will sound familiar—failure to preserve SQL query structure (SQL injection), buffer overflow and failure to preserve Web page structure (cross-site scripting).

Also included in the report is the "Focus Profiles" section, which features rankings of the top 25 errors and 16 others according to criteria such as programming language or technical impact. The new list also adds a small set of the most effective "Monster Mitigations" to help developers eliminate entire groups of bugs.

“Developers and security testers will find more value in the 2010 list,” Veracode CTO Chris Wysopal told eWEEK. “The focus profiles allow the list to be more useful from different perspectives, and the Monster Mitigations give great prescriptive advice for eliminating many of the Top 25 from software.”

Developers are becoming more aware of security flaws, Wysopal continued. Still, there is a long way to go to improve adoption.

“The impediment is getting security processes and technology embedded in the software development lifecycle,” he said. “It’s adoption and usage. … Training needs to be adopted more. I am hopeful that computer-based training tailored to a developer’s language and platform can up the pace of awareness