Standing Out in an Inbox Full of Resumes

Resume Improvement

Searching for a job is challenging even in a good economy. Today, jobs seekers are competing against an increased pool of candidates for a limited number of positions posted online.   If your executive resume doesn’t articulate a clear value within seconds, an opportunity can be lost.  While it’s difficult to differentiate in an email, follow a few of these tips to increase your job results:

Represent a Clear Value

As a job seeker, it is your responsibility to concisely articulate your relevance to the position you are applying to.  Be sure to highlight what you can do for the company and how you will stand out from the pool of applicants.

Be Consistent

Consistency is critical when writing an executive resume.  Whether a potential employer or professional staffing firm is reviewing your resume, be sure that the information is presented consistently from a printed resume to an employment history on LinkedIn.

Back it Up

Validate your professional expertise and performance by incorporating testimonials from previous employers, colleagues, or clients, who can intelligently speak to your professional performance.

Format & Spell Check

Even at the executive level, format and spelling errors count.   It can be the smallest detail that creates doubt or a misperception at first glance.

Follow these tips and increase your ability to standout in an employers inbox!

HP Shoots for the Moon

HP Moonshot

With over 10 billion devices connected to the Internet every day there is no longer enough energy or space to control and handle this amount of data. HP has found a decrease in energy use and cost with their launch of the HP Moonshot. First revealed as a concept last summer, the HP Moonshot is ready to show the world its 80% smaller carbon footprint.

The HP Moonshot was created to help IT departments manage big data. Normally, these types of servers would be considered very costly and energy inefficient; but the HP Moonshot contradicts all. It relies on its unique microserver architecture. The entire system works off of server cartridges with low energy cores and contain no unnecessary components. Because of this, each of the cartridges can be packed into processing clusters that share power, cooling and network infrastructure.

CEO Meg Whitman says that the HP Moonshot “marks the beginning of a new style of IT that will change the infrastructure economics and lay the foundation for the next 20 billion (connected) devices.” What sets the Moonshot apart is not how powerful it is but its density, efficiency, and cost. HP claims that the Moonshot uses one-ninth the power and takes an eight the space at about a quarter of the cost of conventional servers.

The need for technological evolution is forcing companies like HP to react and create incredible hardware like the HP Moonshot. There is simply not enough power on the planet to handle the technology that has been created. Therefore, servers like the HP Moonshot will reign supreme because of the fact they are energy efficient and inexpensive. The information superhighway is being paved and renovated; the HP Moonshot is only the beginning of sustainable and efficient technology.


Infinite Resource Solutions, Infinite, is proud to announce the launch of a new brand, this on the heels of its recent acquisition of Armada Data Solutions.  With the new brand, Infinite introduces a new website, thought leadership blog, and a presence on social media. 

Daveenia Beller, Founder and Managing Partner, Infinite, commented, “We believe in providing solutions that work and services that shape places for the future.  This is the value we have been providing to our clients since the beginning. With the acquisition and renewed strategic brand initiative, we will be positioned to respond to a demand for resource management solutions and professional service offerings.  This new business focus includes, but is not limited to: Infrastructure/hardware Services, Network Security, Staffing, and IT Transformation/Professional Services.

Infinite is a partner who provides solutions and services to achieve short-term goals while executing against the long-term vision of its clients. As a value added partner, Infinite is focused on increasing its foot-print as the leader in resource management and professional services.

Infinite has become the go-to provider for resource management solutions as well as professional services. To learn more about Infinite, visit

Making Better Hiring Decisions

Hiring Decisions

In today’s competitive job market, getting good employees depends on a number of important factors that are unrelated to wages, benefits, work-environment and employee growth opportunities.  Hiring good employees depends more on a hiring manager’s ability to make a good hiring decision and finding the right “fit” for a job opening.  No one sets out to hire the wrong person, but some of our hiring practices and delegation of recruitment can make us vulnerable to hiring the wrong candidate and it can cost a company up to five times the employee’s salary–when a bad hiring decision is made.  Even when we hire what we feel is the perfect employee, nearly 50% of them leave at the end of a year!

Finding the right people for the team is the key variable in the success equation for companies but most companies spend only about three percent of their resources on the hiring decision process.  The other seventy percent of the time is spent managing their poor hiring decisions.  Here are some basic questions to ask to improve the odds of making great people decisions:

Is the applicant qualified to perform the job?  Think twice before setting yourself up for failure by placing an applicant into a job that is outside of his or her own knowledge, skills and abilities. Settling for a candidate that closely meets the requirements is often a very poor and expensive decision.

Does the applicant have employment goals?  Employers should be cautious when hiring people who don’t know what they want from a career opportunity.  If the applicant shows no indication of mutual goals and objectives, they probably have no clear direction for success.

Does the applicant present a professional appearance?  A poor personal appearance can be the first and most tell-tale clue about the ambitions of your prospective applicant. First impressions really count, so if the applicant doesn’t represent the company’s persona and appearance, they may not fit in with your team.

Is the applicant enthusiastic?  An applicant should express some enthusiasm for the job they are applying for. If not, it might signal poor work performance issues, poor work ethic, or other issues that you cannot afford.

Has the applicant established and communicated the value they will bring to the job?  If your applicant gives the impression that they are only interested in “what’s in it for me”, you may want to think twice about hiring. Ask questions about what it is the applicant has to offer for your business and look for specific qualities in their answers.   If the applicant cannot bring value to the company, they are probably not qualified.

How does the applicant talk about past employers?  Sometimes, applicants will want to tell you something bad, negative or some other horror story about a current or past employer.   If the applicant persists on bad-mouthing a former employer, listen politely and then gracefully end the interview.

Is the applicant prepared for the interview?  Preparing includes practicing your answers to possible interview questions as well as researching the company.  Ask questions such as, “What do you know about this company”? If the applicant stumbles with answers, it will be obvious that they are unprepared.

What about the applicant’s people skills?  If  you aren’t impressed or their personal people skills are significantly lacking it may signal a problem with working together in a team environment..

Did the applicant communicate their strengths?  An applicant should know what his or her strengths are before they interview. If they have no idea of their strengths, they will likely have no idea of what value they can bring to the job.

Did the applicant really sell him or herself?   Applicants should be convincing as to why you should choose them over someone else.

And remember, don’t overlook the importance of character and integrity in the valuation process of the hiring decision.  Mike Myatt, author of  “The Secret to Making Better Hires” writes, “absence of character and integrity will eventually lead to some type of disconnect or debacle.  Put it another way, if you can’t trust someone to do the right thing, it doesn’t matter how likable, passionate or talented they are. You can teach many things, but altering the hardwiring of an adult’s character is best left to a therapist or the clergy – not an employer.”  Your success in making the right hiring decision may be dependent on quality preparation, practice, persistence and some cases, some old fashioned good luck.


United by a common business culture, Infinite Recruiting Resources announces the recent acquisition of Armada Data Solutions.  The acquisition will introduce the new brand, Infinite Resource Solutions (Infinite), the forerunner in the resource management and professional services industries, enhancing the company’s future growth and performance. Armada Data Solutions brings in excellent consulting talent and expertise to Infinite’s existing resource management and professional staffing solutions.

“IRR has grown consistently year over year – establishing itself as a leader in the staffing and resource management space, comments Daveenia Beller, Founder and Managing Partner, IRR.  “Over the last 5 years, we have been listening to the changing needs of our client base.  With the acquisition, we are able to deliver on the professional services component allowing us to provide comprehensive or plug-and-play solutions.”

The acquisition is part of a larger business objective to become the end to end resource for companies looking to grow through human capital.  Paul Turner, former CEO of Armada Data Solutions, said,” Armada and Infinite share a mission and a common vision. With both companies now represented under one umbrella, Infinite Resource Solutions, we can now provide the right solutions to support the life cycle of the client relationship.

Daveenia Beller, CEO of Infinite Resource Solutions, in announcing the name change said, “Infinite Resource Solutions better reflects our newly expanded service offerings.  The transition has been seamless.  With offices located in the United States and Canada, Infinite is positioned to become known for redefining the industry for our domestic as well as international clients.”

For more information on the acquisition, visit

How Does IT Handle Big Data?

Big Data

Data comes from everywhere: traffic to social media sites, purchase transactions, and even GPS satellites. Companies such as Google and Facebook rely on consumers to create this data and make their business models work effectively. IBM explains that every day 2.5 quintillion bytes of data is created—so much that 90% of the data in the world today has been created in the last two years alone. All of this “Big Data;” it comes from people.

With the increase in the amount of data, IT departments are searching for a way to control and manage it effectively in a secure and safe way that will not intrude on every day business functions.  Big Data, often referenced by the advertising industry as a way to market more efficiently, can also help organizations boost revenues and even improve customer relationships.  The challenge is to understand how and where to use it. Every piece of data must have a place and designated function in business operations.

Companies like Microsoft, Oracle Corp., and IBM have started to implement specific services to manage their data such as the Hadoop Distributed File System (HDFS). This allows customers to store large amounts of unorganized information in clusters so that users can access content faster than ever before.

Microsoft took a huge step in the right direction by implementing its Windows Azure HDInsight. This allows users to locate Hadoop clusters in a matter of minutes. Eron Kelly, general manager for the Microsoft SQL Server group elaborates, “These clusters are scaled to fit specific demands and integrate with simple Web-based tools and APIs to ensure customers can easily deploy, monitor and shut down their cloud-based cluster.”

The need to organize this influx of data types is greater than ever before. IT leaders must find a way to not only store the data but use it as effectively as they can. Companies like Microsoft seem to be on the right track.  IT strategy around Big Data is critical. Afterall, big data is only going to get bigger.

The Ongoing Challenges to Network Security

Network Security

It was Einstein who once said, “Technological progress is like an axe in the hands of a pathological criminal.” The German-born theoretical physicist who is best known for developing the general theory of relativity and his mass–energy equivalence formula, E = mc2, most certainly possessed an elevated perception of human nature and an understanding that technologies that produce a wealth of good for many, will also be used by a few to advance mayhem and criminality.  Einstein may have envisioned a network of communication technology and its many benefits to world science and commerce, but even he may have underestimated the extent those few would go to spread mayhem and misadventure to so many.

All computers, connected to networks, are exposed to potentially damaging access by unauthorized “hackers” and an ever, more persistent criminal element.  Protecting a company’s sensitive data and providing a stable business computing environment is an ongoing, never ending challenge.  Often, meeting the challenge requires rethinking and tweaking the traditional methods of network security.

Simple or Weak Network Access Passwords

One of the ways many system administrators have been lulled into a false sense of security is their use of CAPTCHA Technology, user typed letters or digits from a distorted image that appears on screen, which is commonly used to prevent unwanted internet bots from accessing websites and networks.  This barrier is becoming less effective in preventing intrusion by “brute force” exploits.  A more effective approach to this threat is for network administrators to deploy a more complex set of requirements for user passwords, those which contain seven or more characters with at least three numbers and one upper case character and one special sign, such as @,#,&,$, etc.  A policy of password expiration and how often a previous password can be reused should be implemented to increase protection.

Outdated Software

System software must be constantly reviewed and updated on a regular basis in order to insure that a system is not vulnerable to new threats and exploits.  Replacing frequently patched software with newer updated versions will eventually produce significant benefits to a networks security.

Web Cookies

Ensure that all of your network cookies are encrypted and have an encoded expiration time.  In an “Open Cookies” environment a hacker could gain access to any saved password sessions on the network, resulting in a major vulnerability on the network security system.

Shared Hosting versus the Cloud

Shared hosting provides economic benefits for many company networks but like the old telephone “party lines” of the past, hosting partners may have an opportunity to listen in on your data’s conversations.  Dedicated server hosting or hosting your data in a secure Cloud will be a better solution to network security.

One of the most common paths hackers take to invade a network is by securing the aid and assistance of the computers user.  “Phishing” attacks send an official looking email requesting account or personal identity information to solve a problem or prevent supposed account closure.  Other “phishing” attacks send emails with links or attachments promising something interesting or important to look at, but in reality, clicking the link or opening the attachment runs a program that probes your computer for weaknesses so the hacker can take control of it.

Network security administrators must instruct system users to never hand over the keys to the company network to unwanted intruders by responding to suspicious emails requesting private or personal information, or to open links imbedded in unexpected emails even if they appear to be from a friend or colleague.

Successfully protecting a vital and proprietary company network, in 2013 and beyond, will dictate a need for ever changing solutions to network security issues.  A company must act to avoid placing new technological weapons and ammunition of unwanted intrusion and destruction in the hands of hackers and the cyber-criminal element.

Einstein also once said, “You cannot solve problems by using the same kind of thinking that we used when we created them.”

#BYOD to Work?

BYOD To Work

“Bring Your Own Device” (BYOD) has been a trending topic that has quickly moved from conversation to reality. Businesses across industry are starting to uncover the business impact of BYOD on its employees and processes.  By 2014 the number of devices being utilized by employees is projected to be 3.4, accelerating the need for organizations to adopt a BYOD strategy.

During the development of the strategy, organizations must:

Establish the Policy

Utility, productivity, and price are importance considerations. However, IT leaders must investigate overall risk, manageability, and security.

  • Utility:  For many employees, using a device that is more familiar can offer “ease of use.”
  • Productivity:  Studies have shown that workforces with access to more than one device can actually increase productivity.  However, in some cases, employees were using applications for personal use as opposed to only focusing on work applications.
  • Price: Although BYOD offers significant benefits on price, it can potentially lead to increased cost in the event of security breach or a stolen or lost device.
  • Risk:  It can add risk if a device is wiped or if the information on a device is seized for legal examination in conjunction with litigation or other legal issue.
  • Manageability: In small organizations, the implementation of a strategy may be easier to manage.  With larger organizations, the strategy must be implemented across the organization which can be time intensive and costly.
  • Security:  In situations where more than one device is being used to store confidential information and applications, security must be integrated.

Educate the Workforce

Once the policy is established, the workforce must be educated.  Employees need to understand the organizations’ policies on usage, security, and accountability.  IT must communicate the potential for mobile threats so that employees are careful to protect business-critical information that employees are accessing remotely.

Monitor and Maintain

IT leaders must consistently monitor the implementation across the organization to insure the highest level of security.

The driver with implementing a strategy is to satisfy business function and employee needs for a productive work environment.  How is your organizations preparing for BYOD?