Youngsters may look at the US, UK or Australia for career prospects in IT, but there’s no dearth of opportunities in India. There are around 2.2 million jobs in the offing is year.
Change in Job profiles:
The industry is looking for people with a really strong technical background. It’s time of the specialists. Techies seem to have a field day. There’s a demand for good technical leaders, technical architects, data modeling professionals, domain experts and processes experts. The subjects matter experts or business analysts too are sought after.
But product-oriented IT firms still swear by the need for good project managers. Good managers and developers will always be in demand. Nowadays, a lot of software products need graphic designing to give it a look and feel. But there’s a lack of good creative designers The domain requirement has also seen a shift and outsourcing is more in sectors like telecom, energy resources stability remote infrastructures management and travel and transportation.
In order to succeed develop skills in a particular technology. The idea of working for two years in .NET and then jumping to JAVA isn’t working anymore.
Professionals specializing SAP, Oracle, Microsoft technologies, JAVA, J2EE and other niche technologies like designing, animation and database management will find jobs relatively easily. However firms are hiring graduates instead of engineers Grads with degrees in BSc(IT), BSc (Maths) and BSc (Computer Science) are fitting up the entry level stats.
So guys, with so many jobs in the offing the prospects of a career in the IT looks bright.
When we talk of IT it is equally important to keep the e-mail ID of individuals particularly IT specialists to keep the ID secure so that competitors or vandals do not steal information or hack them.
During any cyber crime committed through your e-mail the onus is on you to prove your cyber innocence. If someone has used your email or computer to send any illegal communication, then the laws of the country put you in a bit of a spot.
As there is a recent episode of the email sent by terrorist from a stolen IP address has brought out, the information Act coupled with other legal provisions make you liable for any illegal activity occurring from your internet address email address or computer, unless you can prove otherwise.
It is a principle of common law extended to the cyber world, “if anything under my control is misused or causes harm or is involved in any criminal or illegal activity then I am held liable presuming I have sufficient control over it”.
So if your email ID or computer IP was hacked into and used to send a malicious message, then the actual owner would be held liable till proven otherwise.
Trouble is an average computer literate person is not a tech warrior. He or she is merely comfortable using internet and not really up to digging into the innards of their machines or the web. It could be an uphill task to fight and prove his or her innocence.
The technology does provide tools to track down who stole an IP address and which computer it was used from or what computer an email was sent from even of the email had been hacked to but this information lies with the Internet Service Providers of ISPs.
Each Internet user gets a unique IP address from his service provider. They cyber-world recognizes you from the IP address. But each computer, just like a mobile phone, has media access control address. Your IPO address as well as your email username and password can be stolen or hacked and can be used by another person but security experts or the policing agencies can easily track if the hacked IP address or email was used from a MAC number different from yours.
In some countries, there are provisions referred to as E-discovery which allows a user to ask his service provider for details of his account but such regulations do not exist in India.
The security protocols used by ISPs in India are 12-13 months behind the rest of the world. With the internet systems still maturing in India, the trace is easily lost at the local, city and town level though at a macro level, one can track down almost any communication.
The year 2007 is known within the IT sector as the year of botnets – malicious software that can sit in your machine and open it to cyber attacks allowing hackers to ferret out information residing on your machine to hack into others. So cases of cyber crime are increasing rapidly even been used by corporate players to snoop on their rivals to get what’s called over the shoulder information.