Thursday, November 28, 2019

9 ways to ruin your resume in the eyes of hiring managers

9 ways to ruin your resume in the eyes of hiring managers9 ways to ruin your resume in the eyes of hiring managersThere are a zillion ways to go wrong over emailand in conversation at work,so it would only make sense for there to be a bunch of ways to mess up your resume as well. Buckle up.Simply Hired surveyed more than 850 current and former hiring managers in the U.S., showing that the most popular way to ruin your resume is by having a few or more grammatical errors in the mix, at 84%.While were here, this is what else you should avoidA few or more spelling errors (82%)Fabrication or invention (82%)Missing employment history (68%)Inappropriate font (67%)One or two spelling errors (60%)One or two grammatical errors (57%)A resume three pages or longer (55%)Colored font (53%)Ladders is now on SmartNewsDownload the SmartNews app and add the Ladders channel to read the latest career news and advice wherever you go.Do this on your resume insteadBut the research also included four thing s that current and former hiring managers actually like to see while looking over resumes.A graduate degree (81%)A bachelors degree (80%)Having an area on the document for your skills (71%)Degree from an Ivy League school (66%)Since it only takes a recruiter six seconds to reject your resume, keeping yours in top shape might just give you more of a fighting chance at scoring the job.

Saturday, November 23, 2019

Protect your Staffing Company and Clients from Data Theft

Protect your Staffing Company and Clients from Data TheftProtect your Staffing Company and Clients from Data TheftProtect your Staffing Company and Clients from Data Theft Berkowitz, Esq.Think your staffing companys data isnt of interest to hackers? Think again, warn the experts.When it comes to cybercrime, hackers thrive on opportunity says Bill Carey, vice president of marketing for the Roboform password manager. If hackers have the chance to get into your system, they will take it.The task can be doubly tricky for staffing companies that manage millions of individual pieces of confidential data about potential placements and must keep track of who sees each one. Many staffing companies also offer comprehensive onboarding and other HR services that require them to have access to their clients computer systems.The good news is that protecting your business from security threats and the confidential information of your clients and their placements doesnt have to cost a fortune.It d oes however require some effort up front and on an ongoing basis. Here are five things to do to protect your staffing company from cyber-hacks1. Know What to ProtectKnow what you need to protect and why that information is at risk, says cyber security expert Ray Cavanagh, member of the American Society for Industrial Security and its cloud computing subcommittee.He suggests sitting down with employees in dienstgrad of HR, IT, operations and security and identifying how your business transfers data or shares information and the person or department responsible for protecting it. This list will form the basis of a cyber security plan.Of particular importance for staffing companies is that they have access to their clients computer systems to know who has authority to log-in to each system, the IP address of the computer being used and the scope of the data being viewed or transferred.2. Create a Written PlanBoth Carey and Cavanagh agree that any cyber security plan should be written o ut. It should list every step required to keep information secure. Free resources on the Internet can help you develop a plan, which should cover protections from both external and internal threats includingFirewallsAnti-virus software (and updating)Malware protectionPassword managersSocial media controlsEmployee trainingAuthentication protocolsIn cases where a certain employee or group may regularly work with a clients computer system or data, a comprehensive plan might also address limiting log-ins to certain IP addresses. Controls can also be put in place regarding the amount of time thata particular staffing employee is given access to a specific client.3. Be Diligent About Due Diligence How are smaller companies managing this effort? Brandon Metcalf, founder of staffing and recruitment software as a service company Talent Rover completed a lengthy review and due diligence process before deciding to build the companys business on Salesforce.coms cloud-based platform.The decision means that Salesforce.com, not Talent Rover, is responsible for protecting all of the companys zugnglich activities, including log-ins, data management, information storage and transfer, IP address tracking and password protection.Thus when a Talent Rover employee works with a client to implement a comprehensive staffing plan, or logs into a clients system, these activities take place thorugh Salesforce.com.But Metcalf warns its not enough to rely on a buzzword such as cloud-based as assurance that a service provider truly incorporates sufficient cloud protections.Ray Cavanagh agrees. Make sure you investigate every company or provider who will handle your data or interact with your servers. Just because a provider says they have migrated their services to the cloud or take security seriously doesnt mean they offer comprehensive cyber protections.4. Train Employees Carey, Cavanagh and Metcalf all stress the important of proper employee training around issues of cyber security.Do no t assume your employees will always use common sense when it comes to protecting against security breaches, warns Carey. He suggests having in-person meetings to explain the companys cyber policy including examples of threats, risky behaviors and the companys bring your own device (BYOD) policy.Cyber safety best practices for employees are similar to those for personal computer use. They includeTeaching employees how to create strong, memorable passwords when creating accountcredentials. These should be based on things other than family or pet names and dates that can easily be gleaned from social media.Instructing employees that they should never click on a link to access a clients website or to enter a work or customer system. Better to type the new address themselves.Providing specific examples of phishing language or malware that can trick employees into infecting computer systemsProhibiting downloads of anything onto a work computer or network without explicit authorization5. K now What to Do if Your ordnungsprinzip is BreachedIf, despite your best efforts, you find yourself the victim of a cybercrime, Ray Cavanagh recommends unplugging your servers and going offline as quickly as possible until the threat is located and isolated.Bill Carey also suggests immediately changing the passwords for all hacked systems and communicating openly and honestly with employees and customers about what happened and what is being done to fix the situation.Such a scenario may require that you call in an outside expert to help find the source of the leak and fix it, both experts say.Legal Disclaimer None of the information provided herein constitutes legal advice on behalf of Monster.

Thursday, November 21, 2019

Robots Tighten Their Grip

Robots Tighten Their Grip Robots Tighten Their Grip Robots Tighten Their GripThe old set-up line, How many robots does it take to screw in a light bulb? has a new answer, thanks to a team of engineers at the University of California, San Diego.The team has created a robotic gripper capable of picking up and manipulating fragile objects. Unlike previous grippers, it can twist objects, sense them, and build models of what it manipulates, enabling it to operate in low light or with poor visibility. The robots embedded tactile sensing can discern an objects shape to complement its other sensing modes.A close-up of the gripper manipulating a 3D printed square. Image University of California San DiegoThe gripper contains three fingers, each consisting of three soft, flexible pneumatic chambers that move when air pressure is applied, enabling the manipulation of objects it holds. Each finger is covered with a skin made from silicone rubber with embedded sensors comprised of conducting carbo n nanotubes. The rubber is rolled up, sealed, and slipped onto the fingers for a skin-like covering.Many other soft robotic grippers exist, but ours is unique because of its exclusive use of soft materials for the fingers, the ability to twist objects, and the sensing layer to both help with control of the hand and to allow modeling of the objects it handles, says Michael T. Tolley, assistant professor and roboticist at the Jacobs School of Engineering who led the engineering team that presented the device at the International Conference on mit anspruch Robots in September 2017. The device mimics what happens when someone reaches into their pocket and feels around for their keys.More for You Read about the latest in robotics technologyIn fact, the main goal for the project welches to design a soft robot that could achieve complete motions and the integration of the embedded sensing abilities for feedback control and integration, Tolley says.We chose a three-chambered design because it enabled us to cover a hemispherical workspace, he adds. We went through many iterations on the geometry and the soft material. Sensor integration is a particular challenge, as our sensors must be distributed over the actuators as opposed to the discrete joints of traditional robots, leading to challenges with fabrication, integration, and durability.Testing the gripper on a Fetch Robotics arm, the team was able to demonstrate that device could pick up, manipulate, and model items as varied as light bulbs and screwdrivers. Indeed, one gripper deployed by one robot can apply just enough force and dexterity to tighten and loosen a light bulb.We believe this type of gripper would be useful for agricultural applications such as picking fruit, and for robots capable of direct interaction with humans such as home assistance robots, Tolley says.Neil Cohen is an independent writer. For Further Discussion Sensor integration is a particular challenge, as our sensors must be distributed over the actuators as opposed to the discrete joints of traditional robots.Asst. Prof. Michael T. Tolley, University of California San Diego