Agile development projects are succeeding, but when they fail, it's often due to staffing and teamwork issues
Information Technology Careers - News, Features, and Slideshows
It's not a myth. The technology industry is in the midst of a hiring surge stronger than any we've seen since the days of the dot-com boom. InfoWorld's interviews with economists, technology executives, job seekers, and hiring board managers indicate that <a href="http://www.infoworld.com/t/information-technology-careers/the-it-job-outlook-5-questions-answered-175265">employment in the tech sector is up</a> a solid 10 percent this year -- by some bullish estimates, closer to 20 percent. And despite the tendency of the media to fixate on California's Silicon Valley, the hottest job markets are in places like New York and Washington, D.C., where firms in financial services and the federal government hire droves of IT hands.
Before tablets, smartphones, and PCs became prominent, "big iron" mainframes led down the path to computing, becoming a staple of enterprise business worldwide several decades ago.
Macs may be a minority of PCs in any business, but these days they are used by most businesses. And as more companies roll out "choose your own PC" and "bring your own PC" policies, IT will only need to be more familiar with managing Mac OS X systems.
It's the biggest shift in IT in years: the consumerization-of-IT trend that gained major traction with the advent of the iPhone and other modern mobile devices, causing most businesses to let employees bring -- or at least choose -- their own smartphones and tablets, all in fewer than two years.
We're back again for our annual survey of your certifiable geek cred, so dust off your pocket protector, suck face with your closest Ewok doll, and dig into your Bag of Holding to bring forth the answers to our nerdiest set of 20 questions yet. Answer enough correctly, and you may don the geek sherpa guru label, to guide the unwashed to geek heaven. Answer too many wrong, and find your inner geek flatlining.
Too many projects, too little time: That's the sad lament of many IT professionals who must constantly balance the needs of the enterprise against the desires of business users -- all while keeping a close eye on the newest technologies coming at them from every direction.
It's not the Windows you know and love. Microsoft has revealed a "reimagined" Windows -- code-named Windows 8 -- that boasts a very different, tile-centric user interface called Metro taken from Windows Phone that is touch-savvy, runs on ARM processors as well as Intel x86 chips, takes fewer system resources so it can run on a wider variety of hardware platforms, and works on both tablets and traditional keyboard-and-mouse PCs. It's not mobile versus desktop, it's mobile and desktop together.
If the Internet is the new Wild West, then hackers are the wanted outlaws of our time. And like the gun-slinging bad boys before them, all it takes is one wrong move to land them in jail.
With more than 30 years in technology consulting, I feel I can safely make a few observations about the field. The first is, alas, I'm growing old with the industry. The second is that I've had quite a lot of experience with customer/consulting relationships over the years, both good and bad, from my early days in statistical consulting to my current position in professional services management at OpenBI.
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- See Your Traffic for What It Really Is
- The Future is Encrypted. Manage It.
- Caution: That SSL Blind Spot is Growing
- New Destination Gigamon Security Resources IS HERE
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat
- Test Your Knowledge of Network Encryption
- Ransomware explosion is the latest security wakeup call for CxOs
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- Next-generation SIEM turns low-level security monitoring for high-level business goals