Monthly Archives: January 2016

Database Security Course

Database Security Course

Another protection layer of a more sophisticated nature contains real-time data source action tracking, either by examining protocol traffic (SQL) over the system, or by monitoring local data source action on each server using software providers, or both. Use of providers or local logging is required to capture actions implemented on the data source server, which usually include the actions of the data source manager. Agents allow this information to be taken in a fashion that can not be impaired by the data source manager, who has the ability to turn off or modify local review records.

Database_security_course

Analysis can be performed to recognize known uses or policy breaches, or baselines can be taken over time to build a normal pattern used for recognition of anomalous action that could be a sign of attack. These techniques can offer a comprehensive data source review pathway along with the attack recognition systems, and some techniques can also shield you by ending customer sessions and/or quarantining users indicating suspicious behavior. Some techniques are designed to support separating of responsibilities (SOD), which is a typical requirement of auditors. SOD needs that the data source directors who are generally supervised as part of the DAM, not be able to turn off or alter the DAM functionality. This needs DAM review pathway to be securely stored in a separate program not applied by the data source administration group.

Native audit

In inclusion to using external tools for tracking or audit, local data source review abilities are also available for many data source platforms. The local review paths are produced on consistently and used a designated protection program where the data source directors do not connect. This ensures a certain degree of segregation of responsibilities that may offer proof the local review paths were not customized by authenticated directors. Turning on local effects the performance of the server. Generally, the local review paths of data source do not offer adequate manages to implement separating of duties; therefore, the system and/or kernel component stage host based tracking abilities provides a higher degree of confidence for ‘forensics’ and maintenance of proof.

Process and procedures

A good data source protection program contains the standard review of rights granted to customer records and records used by computerized procedures. For individual records a two-factor verification program improves protection but adds complexity and cost. Accounts used by computerized procedures require appropriate manages around password storage such as adequate security and accessibility manages to prevent compromise.

In conjunction with a sound data source protection program, an appropriate disaster recovery program can ensure that service is not disturbed during a burglar occurrence, or any occurrence that results in an failure of the main data source environment. An example is that of duplication for the main data source to sites located in different geographical regions.

After an accident occurs, data source ‘forensics’ can be employed to determine the opportunity of the violation, and to recognize appropriate changes to techniques and procedures. You can join our database security course to make a wonderful career in this field.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

Data Mining Projects

Data Mining Projects

Data Mining, the removal of invisible predictive information from huge data source, is an effective new technological innovation with great potential to help organizations focus on the most important info in their data manufacturing facilities. Data Mining resources predict future trends and actions, allowing businesses to make practical, knowledge-driven choices. The automated, potential studies offered by data exploration move beyond the studies of past events provided by retrospective resources typical of decision support techniques. Details exploration resources can answer company concerns that typically were too time intensive to eliminate. They search data source for invisible styles, finding predictive information that experts may miss because it lies outside their objectives.

Data_Mining

Most organizations already gather and improve bulk of data. Data Mining methods can be applied rapidly on current software and hardware platforms to enhance the value of current web resources, and can be incorporated with new products and techniques as they are brought on-line. When applied on top rated client/server or similar processing pcs, data exploration resources can evaluate huge data source to provide answers to concerns such as, “Which clients are most likely to respond to my next promotional emailing, and why?”

This white paper provides an introduction to the standard technological innovation of data exploration. Examples of profitable programs demonstrate its importance to today’s company environment as well as a fundamental description of how data factory architectures can develop to provide value of data exploration to end customers.

The Fundamentals of Data Mining

Data mining methods are the result of a long procedure of research and service. This progress began when company data was first stored on pcs, continued with improvements in data accessibility, and more lately, generated technological innovation that allow customers to cross their data in real-time. Details exploration takes this transformative procedure beyond retrospective data accessibility and routing to potential and practical information delivery. Details exploration is ready for application in the world of company because it is sustained by three technological innovation that are now sufficiently mature:

  1. Massive data collection
  2. Highly effective multiprocessor computers
  3. Details exploration algorithms

Commercial data source are growing at unmatched rates. A recent META Group survey of data factory projects found that 19% of participants are beyond the 50 gb level, while 59% expect to be there by second quarter of 1996.1 In some sectors, such as retail, these numbers can be much larger. The associated with need for improved computational engines can now be met in a cost-effective manner with similar multiprocessor computer products. Details exploration methods incorporate methods that have persisted for at least 10 years, but have only lately been applied as older, reliable, easy to understand resources that continually outshine older mathematical methods.

In the progress from company data to company information, each new step has built upon the previous one. For example, powerful data accessibility is very important for drill-through in data routing programs, and the ability to store huge data source is necessary to data exploration. Oracle dba jobs would help you make your career in this field.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

What Are The Basic Terms Of Oracle For Beginners?

What Are The Basic Terms Of Oracle For Beginners?

To be able to become a completely fledged DBA, you need to have an knowing of the fundamental ideas. This information is designed to deliver primary principles of what a DBA is and what a DBA does in their everyday part.

basic_terms_of_oracle

The database manager manages all of the protection, data control and efficient operating of an organizations database. Back-up and restoration are also an important part of the function. Regularly the DBA has to work out of time in purchase to keep the organizations database functional. The DBA must frequently make ideas for enhancement and upcoming technique. The DBA must liaise frequently with co-workers and other divisions who depend on the database for information. Designers depend on the database for their working system. Therefore it not only impacts customers but developers of products and programs.

There are certain conditions that DBAs should be aware of and know what they mean. We cover a few of these here:

Oracle Instance:

When an Oracle database is operating, it is associated with what is known as an “instance”. This develops when a database begins on a server. The type of computer the database operates on is unrelated. Oracle allocates storage to an place known as the System International Area (SGA). The procedures needed to function the database are also began. An “instance” signifies mixture of Oracle procedures and the SGA. The example storage and procedures are used to handle the database data effectively and provide one or more several customers of the database.

Parameter Files:

Parameter data files are used to give initialisation directives for a particular set up. There are two kinds of parameter data file. These are Server Parameter Files, which are in binary structure and chronic across and example i.e. continue to persist across example shut down and start-up, and Initialization parameter data files, which are written text based and can be modified. Example editions of the parameter data files are transferred to use as an example and so they can be modified with appropriate factors for a particular set up. The sample data file is usually excellent for a fundamental installation, but can be modified to enhance efficiency and other configurations. Once modified, the configurations take impact once the database is re-booted.

System Global Area (SGA):

While the database is in function, a storage place is needed for all customers to discuss such as a shield storage cache and a distributed discuss of SQL claims. This is known as the System International Area (SGA). The SGA is described in storage once an Oracle example begins. Changes to the SGA become efficient the next time the database begins up.

Program Global Area (PGA):

Moreover somewhere global place there is another place which comes into the formula, and is designed for the handling of SQL claims and short-term places for organizing and short-term computations. This region is assigned for each personal database period. As for it global place the developer place can also be modified and new configurations would take impact on a new database start-up.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

What Is The Operations Of a DBA?

What Is The Operations Of a DBA?

It’s been said that the Database Administrator (DBA) has three primary projects. In reducing order of importance, they are: secure the information, secure the information, and secure the information.

Although information reliability is clearly the #1 job (who likes you if the information source is available or quick if the information isn’t good), the DBA has many other jobs as well. Here’s a list of the actual projects that a DBA works. (Some responsibilities are common to all DBAs, and others are only needed in some information source surroundings.)

General tasks

Set up, settings, update, and migration Although program directors are generally accountable for the components and os on a given server, establishing the information source application programs are typically up to the DBA. This job role needs knowledge of the components requirements for an efficient information source server, and interacting those specifications somewhere manager. The DBA then sets up the information source application and chooses from various options in the item to set up it for the objective it is being implemented. As new produces and areas are developed, it’s the DBA’s job to decide which are appropriate and to install them. If the server is a replacement for a preexisting one, it’s the DBA’s job to get the information from the old server to the new one.

Back-up and restoration DBAs are accountable for developing, applying, and regularly examining a backup and restoration plan for the data source they manage. Even in large shops where a individual program manager works server back-ups, the DBA has final liability for creating sure that the back-ups are being done as planned and that they include all the files needed to create information source restoration possible after a failing. When problems happen, the DBA needs to know how to use the back-ups to return the information source to functional position as soon as possible, without dropping any dealings that were dedicated.

There are several ways the information source can fail, and the DBA must have a strategy to restore from each. From a business viewpoint, there is a price to doing back-ups, and the DBA makes management aware of the cost/risk tradeoffs of various backup methods.

Database protection Because data source centralize the storage space of information, they are attractive objectives for online hackers and even curious workers. The DBA must view the particular protection model that the information source item uses and how to use it effectively to manage access to the information. The three primary protection jobs are verification (setting up user accounts to manage logins to the database), permission (setting authorizations on various areas of the database), and audit (tracking who did what with the database). The audit task is particularly significant currently, as regulating laws and regulations like Sarbanes-Oxley and HIPAA have confirming specifications that must be met.

Storage and potential preparing The primary objective of a knowledge source is to store and restore information, so preparing how much hard drive storage space will be needed and monitoring available hard drive space are key DBA obligations. Watching growth styles are essential so that the DBA can advise management on long-term potential plans.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

What Does Oracle Do and Its Purpose?

What Does Oracle Do and Its Purpose?

Oracle offers both application and components. The components is both web servers and storage; the application varies right from the os up through techniques store, data source and information control, middleware, company intellect and company efficiency store, through general-purpose company programs such as financial records, pay-roll and HR, up to industry-specific promotions for sectors such as Retail, Economical Solutions, Resources and Telecoms.
what_oracle_do

I believe that Oracle is unique in this detail and detail of promotions. IBM provides application and components but not applications; Microsoft and SAP provide programs but no relevant components.

As well as items, Oracle provides a extensive support ability for its products; and it has a company arm whose main purpose is to accomplish Oracle implementations (i.e. it is not a common talking to ability as you might find in a Systems Integrator such as Accenture).

Oracle items can be found in organizations of any size, both public and private industry, across most sectors and geographies. Oracle has a network marketing team which involves mainly with its larger clients, as well as a network of associates who engage with clients of any size – a significant slice of Oracle’s revenue comes through its parter route, Oracle Partner Network.

Oracle has revealed a trend of next-generation reasoning services such as Internet of Things and big information statistics tools.

Oracle professional chair Lewis Ellison declared 24 new reasoning services, such as Database Cloud – Exadata, Database Storage space Cloud, Big Data Cloud, Incorporation Cloud and Mobile Cloud, underlining the firm’s focus on the reasoning.

Database Cloud – Exadata guarantees to let clients run Oracle data source in the reasoning “with the same performance, efficiency and accessibility to on-premise Oracle Exadata-based production databases”.

Oracle statements that the solutions best suited for clients seeking a multiple reasoning strategy.

Archive Storage space Cloud is a “deep cloud” support for clients requiring storage space for rarely utilized big information supplies.

Oracle described it as perfect for companies managing information sets like “corporate financial information, medical and drug records, social maintenance content, insurance information and digital film masters”.

Big Data Cloud and Big Data SQL Cloud aim use a secure system for big information control clients running workloads on Hadoop and NoSQL data source.

Integration Cloud is designed to make simpler the integration process between reasoning and on-premise Oracle and third-party programs.

Oracle is increasing really quick. We marketed $426m price of business in SaaS and platform-as-a-service last one fourth, a 200 % improve over the same one fourth a season ago. That’s a market history. No organization has ever marketed that much in just 1 / 4,” he said. Oracle dba jobs would help you make your career in this field.

 

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

What Should a Junior DBA Know?

What Should a Junior DBA Know?

Understanding of SQL

It might seem apparent, but a junior DBA should have a really excellent understand of both SQL DML (Data Adjustment Language) and DDL (Data Meaning Language). DML includes products such as Choose, Upgrade, Place and Remove. You should comprehend all of the conditions such as WHERE, GROUP BY, HAVING, and ORDER BY. In inclusion you should be relaxed with sub concerns and connects. DDL includes products such as CREATE TABLE and ALTER TABLE. A younger DBA should know how to develop and change platforms and indices and know the distinction between removing information, truncating a table, or losing it! And… don’t ignore views!
junior_dba
Operating System

As a DBA you need to be acquainted with the OS (Operating System) your DBMS lifestyles within. You should comprehend technicalities of your os, such as protection configurations, incorporation with Effective Listing, LDAP (Lightweight Listing Accessibility Protocol), and labeling conferences. Also, how is your DBMS started? What programs are used to begin, shut down, or secure customers out of your database?

Scripting

To become effective it is very essential know when OS scripting, such as PowerScript, can help you handle your web servers. Consider having ten or more DB servers? If you had to close down all the DBMS on them, would you independently log in and personally closed them down or use a script? In my opinion, if you want to get an advantage on other younger DBA’s you understand scripting. This will only create you more effective at your job.

How to understand a question plan

As a younger DBA you should know how to obtain and look a primary question strategy. I wouldn’t anticipate you know completely comprehend all vocabulary, but several key words, such as “Full Desk Check out,” and “Nested Loops” should leap out as red banners. Also, you should comprehend, when the optimizer suggests a change become, why that change would perform, and what the trade-offs are to make it. For example, the optimizer may suggest a catalog be developed. It this to complete inadequate programming? Also, if you add it, could something else experience, such as a way to insert or update data?

Knowledge of normalization

Normalized platforms are the basis of a well-designed relational information source, yet they can also be its scourge. A junior DBA should comprehend and know how to put information into 1st, 2nd, and 3rd regular type. Why is normalization essential and when can it become a liability? Knowing the distinction between a Main, International, and Exclusive key is essential. Also is knowing and learning to implement one-to-one, one-to-many connections. Oracle Course would help you make your career in this field.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

Complete Guide To Oracle

Complete Guide To Oracle

This is a brief launch to Oracle Ideas for the DBA. Conceptually, you can think of an Oracle information source as nothing more than a large digital processing cupboard, a place to store and recover information. At the pc level, Oracle is a software program that controls searching for processing cupboard.

complete_guide_oracle

Oracle System Concepts

One reason that Oracle has become the globe prominent information source is because it operates on just about every platform possible, from a mainframe to a Apple.

Today, most shops run Oracle in UNIX, A linux systemunix, and Ms windows.

Oracle operates on almost every pc ever made, with over 60 different systems such as Apple (like your PC does), Sun Solaris, old IBM mainframes, and many, many others.

Conceptually, Oracle is the world?s most effective, versatile and effective information source. Along with this power comes complexness.

Oracle versatility concepts

Oracle has become the world?s most versatile information source and it shops much more than published text and figures. An Oracle information source assistance video, sound and complicated spatial programs that are used to develop jet competitors and submarines.

Unlike easier data source, you can control every part of Oracle?s actions. You can control how series are placed on the information prevents and you can control how Oracle works countless figures of source control problems.

Oracle Database Management Concepts

Now that we have set up Oracle and developed a information source, we need to learn a thing or two about how to handle Oracle. First we will talk about the Oracle certification, and then we will talk about how to start-up and shut down the information source. Then we will talk about the information vocabulary information source parameter data files, wrapping-up with administration of the Oracle online upgrade records, UNDO sections, and the administration of Oracle tablespaces.

Oracle Database Documentation

Oracle is a big product, and it is extensively recorded with countless figures of webpages of certification. That much certification can be really difficult to find your way though, but Oracle does a great job of assisting you. Oracle provides a web site found at tahiti.oracle.com that has all the current Oracle documentation and you can also look for the Oracle documentation at look for.oracle.com.

Oracle certification comes in the form of guides, each published on different subjects. There is certification about Oracle concepts, information source administration, back-up and restoration and there is also referrals certification that contains information on factors and SQL control format.

The certification change with almost every launch, but the standard subjects stay the same. Oracle Training would help you make your career in this field.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

What Is The Concept Of SQL Databases?

What Is The Concept Of SQL Databases?

SQL guide gives unique learning on Structured Query Language and it helps to make practice on SQL instructions which provides immediate results. SQL is a language of information source, it includes information source creation, removal, getting series and changing series etc.

SQL is an ANSI (American National Standards Institute) conventional but there are many different versions of the SQL language.
sql_databases

What is SQL?

SQL is Structured Query Language, which is a computer language for storing, adjusting and accessing information held in relational information source.

SQL is the common language for Relation Database System. All relational database management techniques like MySQL, MS Accessibility, Oracle, Sybase, Informix, postgres and SQL Server use SQL as conventional information source language.

Also, they are using different ‘languages’, such as:

  1. MS SQL Server using T-SQL,
  2. Oracle using PL/SQL,
  3. MS Accessibility version of SQL is called JET SQL (native format) etc.

Why SQL?

  1. Allows customers to get access information in relational information source control techniques.
  2. Allows customers to explain the information.
  3. Allows customers to define the information in information source and operate that information.
  4. Allows to include within other languages using SQL segments, collections & pre-compilers.
  5. Allows customers to develop and drop data source and platforms.
  6. Allows customers to develop view, saved procedure, functions in a information source.
  7. Allows customers to set authorizations on platforms, procedures, and views

SQL Commands:

The conventional SQL instructions to communicate with relational data source are CREATE, SELECT, INSERT, UPDATE, DELETE and DROP. These instructions can be categorized into categories centered on their nature:

DDL- Data Definition Language

Command Description
Create Create a table
Alter Modifies an existing database object
Drop Deletes an entire table

DML- Data Manipulation Language:

Command Description
Select Fetches records from one or more table
Insert Creates a record
Update Modifies record
Delete Deletes record

DCL- Data Control Language:

Command Description
Grant Gives an access to user
Revoke Takes back the access granted from user

What is RDBMS?

RDBMS is short for Relational Data source Control Program. RDBMS is the foundation for SQL, and for all contemporary database techniques like MS SQL Server, IBM DB2, Oracle, MySQL, and Microsof company Accessibility.

A Relational database management system (RDBMS) is a database management system (DBMS) that is dependant on the relational design as created by E. F. Codd.

What is field?

Every desk is damaged up into more compact organizations known as areas. The areas in the CUSTOMERS desk involve ID, NAME, AGE, ADDRESS and SALARY.

An area is a line in a desk that is developed to keep specific information about every history in the desk.Oracle dba jobs would help you make your career in this field.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

10 Strengthen Your Database by Our Remote DBA

10 Strengthen Your Database by Our Remote DBA

Databases are very important for companies today. There is not a individual company that can perform excellently without a strong information source in today’s world. This is because the facts that is saved in these platforms is very useful for decision making purposes. It is difficult for making decisions without the necessary information. This is why you should store as many information as possible. You are intending for making excellent returns from this endeavor.

Sadly, designing a knowledge source is not easy either. There is a need to get in contact with information source experts who will help to set up the system for you. The process of creating a knowledge source will involve storage space, incorporation of data and control of this information. Storage has been a massive problem for many organizations for a long time. However, now with cloud storage space it should not be hard at all. You can get huge space facilities to store your information easily. Therefore this should not be a cause for worry.

The biggest challenges in issues of data come from incorporation and control. Developing information from different resources is a task on its own. The compatibility of those resources is one of the factors that must be considered when integrating your business’ information. There is also the issue of data control.

Remote information source management services

Thanks to internet technology, it is possible to accessibility really reliable information source management solutions easily. There is always the option of hiring a knowledge source manager (DBA) for your company. However, this might be such a costly affair for you. You will not be able to keep them as busy as you would like them to be but you will still be paying them like other employees and giving them vacations like every other employee.

Tips for strengthening your database

You can strengthen your information source so that you increase the size of your contributor platform. Once you have the facts source administrators you can then proceed to do the following:

1. Standardize the facts accessibility procedures

This will help you to learn more quickly, create alterations with more ease, reduce confusion and also eliminate the risk of offending your contributors and volunteers.

2. Authorize specific individuals do information entry

You do not want everyone entering information into your platform. Minimize the number of data accessibility employees. Those that you have selected should undergo serious training in information accessibility.

3. Evaluation information periodically

It is important to take a look at business’ information regularly. Therefore, you should schedule a knowledge review moment. It will help a lot in order to keep your company performing well.

4. Set up a backup

When contributors ask for information and then you cannot find it because your information source collapsed the previous night, you will present a really nasty picture. Always have a back-up set up for your information source. You can also become a DBA by joining our training institute

5. Enter contributor and volunteer information in database

They should be accessible to you. When they change their contacts and other appropriate information, your information source should be updated with the new information. This will help a lot when you are reaching out to individuals to help out in certain activities related to your company.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr

IS DBA Cloud a Threat or An Opportunity?

IS DBA Cloud a Threat or An Opportunity?

In Dec, we distributed a 451 Analysis review taking notice of our new remedy offering, IBM Reasoning Security Enforcer and cloud DBAs are very much impressive to talk about. Presented last Sept, Reasoning Security Enforcer is the latest access into a quickly growing cloud accessibility security broker (CASB) item section. In addition to the 451 Analysis review, we’ve seen numerous market specialist reviews protecting Reasoning Enforcer, such as an “On the Radar” review from Egg Talking to.

More About Reasoning Security Solutions

IBM Security sat down with ovum Consulting’s Phil Kellet for a look at Reasoning Security Enforcer. Following our conversation, ovum considered in with its ideas on the security item in the review “On the Radar: IBM Reasoning Security Enforcer controls secure implementation of cloud solutions.”

In the review, Kellet outlined that the CASB section is created out of business needs to address new cloud management, management and security requirements. Reasoning Security Enforcer is IBM Security’s reaction to help clients looking to resolve these big-time difficulties.

Our cloud security remedy can:

Identify the cloud programs that are in use in companies, and also observe and management how they are being used;

Link customers to accepted cloud programs, reducing accessibility by using a front-page application collection approach;

Maintain protection against cloud-related risks and bad actions by users;

Improve protection using risk intellect from IBM X-Force; and

Allow businesses to restore management over cloud utilization.

The ovum review also provided some of Kellet’s ideas on this growing space. The fundamentals of CASB alternatives include exposure into cloud programs in use, whether approved by the business or employee-initiated darkness IT. Egg outlined that while the different CASB source techniques differ, IBM Security’s focus on simplifying and obtaining implementation of accepted applications with incorporated identification solutions is missing from other alternatives.

Well, we are now in the upcoming for those who are asking the concerns five decades back. Five decades have approved, and the trend of the reasoning is certainly occurring. Sadly. Actually, in my personal viewpoint, we are now in a extremely important interval in the reputation of technological innovation. We have just approved the crucial reason for huge adopting of reasoning solutions. Cloud solutions like Pink and AWS are older enough and business prepared. Many start-ups are considering the reasoning as the first option for web hosting their sites and programs. Many companies are looking at moving their present facilities to the reasoning. It’s occurring. It’s not a buzzword any longer, and there is undoubtedly about where this is going. Cloud DBAs do have a very good scope.

Don't be shellfish...Digg thisBuffer this pageEmail this to someoneShare on FacebookShare on Google+Pin on PinterestShare on StumbleUponShare on LinkedInTweet about this on TwitterPrint this pageShare on RedditShare on Tumblr