TechJournal South Header

Posts Tagged ‘IT’

Global talent shortage impacts business bottom lines

Tuesday, May 28th, 2013

ManpowerManpowerGroup (NYSE: MAN), the world leader in innovative workforce solutions, revealed today that the global talent shortage is intensifying, negatively impacting companies’ performance.

Thirty five percent of employers of nearly 40,000 surveyed globally report difficulties in finding staff with the right skills – the highest shortage since the start of the recession.

Of those, over half (54 percent) of employers believe this will have a high or medium impact on their ability to meet client needs. This is an increase from 42 percent in 2012.

“Our survey reveals a collective awakening of employers to the impact of talent shortages to their business,” said Jeffrey A. Joerres , ManpowerGroup Chairman and CEO.

This study echoes numerous others we’ve reported at the TechJournal showing that while unemployment remains a problem globally, so does filling many skilled jobs. The lesson is clear for job seekers: better your skills. But there are lesson for employers, as well, this study notes.

“Globally employers are reporting the highest talent shortages in five years, and our results show that although many companies recognize the impact these shortages will have on their clients and bottom line, more than one in five are struggling to address the issue. The good news is solutions do exist, and HR leaders have the power and expertise to reshape their company’s future.

Act now to succeed

Those who act now to put in place new strategies to attract and retain talent will be those who successfully navigate this uncertain environment.”

The research reveals that talent shortage is endemic across the world – but most acute in Japan (85 percent of employers), Brazil(68 percent) India (61 percent), Turkey (58 percent) and Hong Kong (58 percent).

Employers in Ireland (three percent), Spain(three percent), South Africa (six percent), and the Netherlands and Czech Republic (nine percent) are the least likely to face shortages.

The research shows that globally the roles most difficult to fill are Skilled Trades Workers, Engineers and Sales Representatives – unchanged from last year. Employers are reporting that Accounting and Finance and Management/Executive positions are also increasingly hard to fill.

Despite acknowledging the impact talent shortages have on their business, a significant 22 percent of employers are not changing course to identify new ways to address these shortages.

ManpowerGroup today also launched a new insight paper, The Great Talent Shortage Awakening: Actions to Take for a Sustainable Workforce, which examines several strategies HR leaders can pursue to fuel their organization’s competitiveness for years to come.

These include identifying and attracting untapped talent, creating a culture of talent development, implementing a Teachable Fit framework to “manufacture” talent aligned with business needs, and improving collaboration with education institutions to ensure graduates are work ready.

Hardest Jobs to Fill
The hardest jobs to fill globally are Skilled Trades Workers, Engineers and Sales Representatives. Skilled Trades and Engineers continue to top the list globally due to demand outstripping supply. Meanwhile, Sales Representatives’ continued presence in the top 10 is a result of companies continuing to seek out experienced sales people who can help drive revenue growth.

Jobs most in demand in 2013 Jobs most in demand in 2012
1. Skilled Trades Workers 1. Skilled Trades Workers
2. Engineers 2. Engineers
3. Sales Representatives 3. Sales Representatives
4. Technicians 4. Technicians
5. Accounting & Finance Staff 5. IT Staff
6. Management/Executives 6. Accounting & Finance Staff
7. IT Staff 7. Drivers
8. Drivers 8. Management/Executives
9. Secretaries, PAs, Administrative 9. Laborers
Assistants & Office Support Staff 10. Secretaries, PAs, Administrative
10. Laborers Assistants & Office Support Staff


In the Americas 39 percent of employers report hiring challenges, with one in three employers in the US, Mexico and Costa Ricastruggling to fill vacancies; in Brazil, that increases to a staggering 68 percent.

“Finding the right talent to meet business needs remains a critical challenge to employers in the Americas; those businesses which indicate talent shortages as having a significant impact on their abilities to serve stakeholders have grown significantly from 41 percent in 2012 to 52 percent in 2013,” said Jonas Prising , ManpowerGroup President.

“Employers in the region are awakening to the impact of shortages, but many are struggling to take action. The region has some of the youngest populations globally. Utilizing technology to connect with young people, and building talent acquisition strategies based around where young people are today, will hand organizations a competitive advantage.”

Technicians are the role employers struggle most to fill – a position these roles have held every year since 2008 with the exception of 2012 when Engineers topped the poll. Technicians top the list of most hard to fill roles in six of the 10 countries surveyed in this region.

Cloud benefits exceeding expectations, report says

Wednesday, May 22nd, 2013

cloud computingCloud computing is exceeding expectations. According to The TechInsights Report 2013: Cloud Succeeds. Now What? commissioned by CA Technologies (NASDAQ:CA), respondents indicate the cloud has moved beyond adolescence and is on the path to maturity in the enterprise.

Survey participants—IT decision makers that have implemented cloud services for at least one year—reported they are achieving better results, faster deployments and lower costs than expected as a result of cloud computing implementations.

Luth Research and Vanson Bourne conducted the survey on behalf of CA Technologies to learn how cloud computing is being used, problems or successes encountered, and how its use changed as IT teams gained more experience.

The report confirms that cloud computing is not only delivering on its major promises of saving money and speeding time-to-market, but also exceeding expectations.

This somewhat contradicts some other reports we’ve seen at the TechJournal that suggest some firms are having troubles implementing cloud solutions – often due to lack of in-house expertise.

Meeting or exceeding expectations

The vast majority of respondents reported their cloud implementations met or exceeded expectations across service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Experienced cloud users also shed light on the evolving nature of the cloud, and how their objectives and requirements for success change as they advance along the cloud adoption curve.

“Going in, we expected the results to be much more balanced between successes and challenges across a variety of deployments and service models,” said John Michelsen, chief technology officer, CA Technologies. “Surprisingly, survey respondents were pleased with their cloud computing initiatives, which validates that the cloud is not just a fad, and instead they are focusing on making the most of it to drive innovation, speed and performance.”

Though the overall study results were generally consistent across US and Europe, the length of experience and overall intended objectives for cloud differ. The US leads Europe in terms of years of experience, with 55 percent reporting three or more years of cloud use, compared to only 20 percent of European respondents.

The majority (79 percent) of European IT decision makers have implemented cloud computing for one to two (41 percent) or two to three (38 percent) years.

In terms of intended benefits, while cost savings continues to be a priority, increased speed of innovation rose to the top for more experienced organizations. When asked to name their top three objectives across IaaS, PaaS and SaaS deployments, Europeans most often selected “reduced total costs,” while US respondents noted “increased speed of innovation” and “superior IT performance/scalability/resiliency.”

In fact, cost reduction did not even make the list of the top three objectives in the US. One cloud provider told the TechJournal that often costs go up with cloud use because companies use it more than they expected to.

“As enterprises advance in their adoption of cloud, the desired outcomes evolve, as well,” said Michelsen. “Cost is often considered an early benefit – or even a required result – in order for IT teams to justify moving in the direction of the cloud. Once they show that cloud computing improves the bottom line, they can shift their focus to innovation and other objectives, such as increased performance and enhanced security.”

Additional notable results include:

  • Larger organizations are leading the way:
    • They have been in the cloud longer (93 percent that report using cloud for four or more years have revenues of $1 billion or more), and;
    • They are more likely to be using all three types of cloud services (79 percent of those using IaaS, PaaS and SaaS together in their organizations have revenues of $1 billion or more).
  • Security remains a contradiction:
    • Nearly all respondents (98 percent) agree that the cloud met or exceeded their expectations for security across IaaS, PaaS and SaaS.
    • Nearly one-third indicated “security has been less of an issue than originally thought” when asked to share their primary reasons for success with cloud computing.
    • Yet, security was cited as the number one reason that an application is not moved into the cloud by nearly half of respondents (46 percent).
  • Cloud spending plans increase at a faster rate for IT decision makers with more experience:
    • Companies using cloud computing for four or more years are almost six times more likely (34 percent compared to 6 percent) to report that they are increasing cloud spending by more than 30 percent in 2013.
    • US respondents plan to increase spending on cloud at a higher rate than their European counterparts, with 48 percent planning to increase spending up to 30 percent, and 17 percent more than 30 percent; versus 42 percent and 4 percent for European respondents, respectively.
    • Overall cloud spending is expected to stay about the same or increase for the majority of respondents (95 percent across US and Europe).
  • Experienced cloud users recognize the need for IT management to ensure future success:
    • Respondents that have been using cloud computing for longer, or have used multiple types of cloud, identified the following IT management capabilities as critical to their success:
      • End-to-end service automation,
      • Service-level management across both cloud and non-cloud environments, and,
      • The ability to switch between cloud service providers.

Checking email nights and weekends is the new norm

Wednesday, May 15th, 2013

email graphicThe conventional, 9 a.m. to 5 p.m., five-day work week is a thing of the past for the overwhelming majority of workers at small to mid-sized businesses (SMBs), according to a new survey on work-related email habits. Due to the widespread availability and use of smartphones and tablets, email is more accessible than ever and, as a result, it has become deeply embedded in the daily workplace and personal lives of most employees.

The independent, blind survey of 503 employees in SMB workplaces in the U.S. was conducted by Opinion Matters on behalf of GFI Software. The results highlight employee habits around email usage, including response frequency during the work day as well as after hours.

The new 24/7 paradigm

  • Based on the reported email habits of survey respondents, the line between work and home life has become blurred. More than three-quarters of respondents (81%) said they check their work email on weekends, 55% check email after 11 p.m. and 59% keep on top of their work email while on vacation.
  • Outside of regular work hours, more than six in 10 (64%) check email at least once a day. 12% of employees said they check work email in real time beyond the standard workday.
  • One in 10 respondents admitted to checking work email at a child’s school event, 9% at a wedding, and 6% at a funeral. An additional 6% said they logged into their work email while they or their spouse was in labor.
  • On the flip side, nearly one-third (30%) of employees also said they send personal emails from their work account.

Email used at the office more than any other form of communication

  • Despite the growing use of instant messaging platforms, email dwarfs other forms of office communication.  44% of respondents use email at work more than any other communications format, with 28% relying primarily on the phone, 22% on face-to-face, and 6% on instant messaging.
  • Email is a constant presence in the lives of SMB employees during the workday. More than three-quarters (76%) of respondents said they typically reply to emails within one hour during work hours, with nearly one-third of them (32%) replying within 15 minutes.

An organizational and business intelligence tool

  • Many employees use email for more than just communicating. Well over half (58%) use it as a means of storing and retrieving information.
  • Nearly two-thirds (62%) of respondents use specific folders to organize their email for easier access, and 29% of employees archive their email.
  • The oldest saved email by a survey respondent was received back in 1994.
  • Less than one-quarter (24%) of SMB employees said they use their email as a business intelligence tool, identifying a massive missed opportunity to extract value from email data.

Differences among regions and professions   

  • Employees in the Southwest are the quickest to respond to email, with 42% replying within 15 minutes of an email arriving. Only 27% of residents in the Midwest respond as quickly.
  • Residents of the Southwest are most likely to have checked their email while they or their spouse was in labor (14%). Just 3% of employees in the Northeast have done so.
  • Professionals who say they have checked email at a funeral are more likely to work in IT and telecommunications (14%) and finance (13%). People working in sales, media and marketing and health care said they have never checked email at a funeral.
  • Legal (38%), IT and telecommunications (32%), and manufacturing (34%) professionals are more likely to respond to emails within 15 minutes. Professionals who think that responding to an email within one working day is sufficient are more apt to work in education (23%), retail, catering and leisure (20%) and arts and culture (20%).
  • Employees at larger companies are more likely to check email during off hours.  Two-thirds (66%) of respondents who work at companies with fewer than 10 employees  check email outside of regular work hours, while 75% of those who work at large companies said the same.
  • During vacations, 74% of sales, media and marketing professionals said they check their email. In contrast, less than half (46%) of manufacturing and utilities employees do so.

Overwhelmingly, email is viewed positively, not negatively   

  • Workers overwhelmingly appreciate the value of email, despite its omnipresence in daily life.
    90% of respondents said email is a “blessing,” with just one in ten (10%) considering it a “curse.” Regardless of all the stresses and strains that a deluge of email can bring, it is still preferred to the way we used to work.

Effective management needed

GFI“Email has transformed the way we do business globally, but it has also had a fundamental impact on the work/life balance for many employees, especially in smaller organizations where speed of response to orders and queries is critical in retaining a competitive advantage against larger competition,” said Phil Bousfield , general manager of IT operations at GFI Software.

“The research results have affirmed how critical it is for organizations to manage the use of email effectively, not only to prevent employees from being overwhelmed by a deluge of data, but also to ensure that email is exploited as a revenue generator and benefit to the business, rather than an inconvenience.”

“The research also revealed some worrying trends, including that many organizations are failing to efficiently use their collected email archives for customer relationship management and other business intelligence functions, and that many users are putting their email at risk by maintaining unnecessarily large Outlook PST repositories in order to use their inbox as a living database.

This is inefficient and puts the organization at risk of substantial data loss from email archive corruption,” Bousfield added.

A copy of the full survey results is available upon request.

How businesses can find big IT cost savings

Tuesday, May 14th, 2013

ForresterDespite an overwhelming effort by businesses to reduce unnecessary IT costs, many organizations miss out on big IT cost savings each year by prematurely upgrading networking infrastructure and insufficiently scrutinizing ongoing maintenance contracts.

A new commissioned study conducted by Forrester Consulting on behalf of Network Hardware Resale[1], revealed that although an overwhelming number (76 percent) of IT decision-makers are concerned about the pressures to reduce costs, many are unaware of the available options that exist for alternative maintenance contracts and are unduly influenced by vendors regarding hardware refresh cycles.

Once not too many years ago, we were responsible for overseeing the IT costs of a local organization and reviewing the very first cost sheet found half a dozen areas in which we could save. The first thing we had to do was challenge vendor agendas that didn’t match our needs.

You might want to do the same sort of scrutiny.

According to the study:

  • Up to 79% of organizations refresh their wired networking infrastructure every one to five years guided by industry averages that originate from the vendors.
  • Vendors set the end of life agenda resulting in the sometimes unnecessary and expensive replacement of IT equipment — that still carries market value and has 20 plus years mean time between failures.

“After surveying 304 IT decision-makers, Forrester found that even though IT budgets are under constant scrutiny, businesses have defaulted to vendor influence which has blinded them to the rewards of extending hardware lifecycles and third-party maintenance solutions,” according to the Forrester Consulting study.

Forrester study findings:

  • End of Life (EoL) equipment is prematurely retired:  85 percent of respondents admitted that they would have kept their legacy networking equipment if the vendor continued to support it.
  • OEM maintenance services have little return on investment:  More than 80 percent of organizations buy maintenance contracts from their equipment manufacturer even though they see little value in what they are purchasing and express discontent over misrepresented cost savings, new fees, and inflexible pricing models.
  • Third-party maintenance options are widely unknown:  Only 21 percent report that they have leveraged competitor third-party bids when negotiating service and maintenance contracts, while 80 percent claim they would leverage third-party maintenance if they found it to be more affordable than their current contract [see Figure 1].

“Every CIO should make it a priority to read this report,” said Mike Sheldon , President and CEO of Network Hardware Resale.

“Businesses of all sizes need to know that there can be incredible value and cost savings with a reliable third-party maintenance service provider — helping to ease worries about tightening IT budgets without sacrificing quality.”

To achieve greater value and maximize the ROI of network infrastructure they have purchased, Forrester Consulting suggests organizations implement the following key recommendations:

Keep what’s working within an existing infrastructure to avoid premature and unnecessary upgrades.

  • Don’t pay for software updates if there are none, or if they are available for free. Organizations should carefully scrutinize ongoing maintenance contracts in order to find valuable Operational Expenditure (OPEX) savings.
  • Put maintenance contracts out for competitive bid, not just to different resellers, but also include third-party options.
  • Put metrics in place to reward value, quality, and longevity, not just resiliency.
  • The study and its findings are explored in further detail in the Forrester study, Challenging the Status Quo on Maintenance Contracts and Refresh Cycles to Lower CostsClick to download PDF.

IT and energy sites rack up most security holes

Thursday, May 2nd, 2013

lockNow here’s a paradox – while most industries saw fewer security vulnerabilities in 2012, IT web sites actually had the highest number ov vulnerabilities per site. You would think that IT would be on the forefront of best practices, but that doesn’t appear to be so.

That’s according to  WhiteHat Security, the Web security company, in the 2013 edition of the WhiteHat Security Website Security Statistics Report.

“Website security is an ever-moving target, and organizations need to better understand how various parts of the SDLC affect the introduction of vulnerabilities, which leave the door open to breaches,” said Jeremiah Grossman , co-founder and CTO of WhiteHat Security.

“This report – comprising survey and website vulnerability data – is the first time we can correlate various software security controls and SDLC behaviors to vulnerability outcomes and breaches. The results are both insightful and complex.”

The Current State of Website Security

In 2012, the average number of serious* vulnerabilities per website continued to decline, going from 79 in 2011 down to 56 in 2012. Despite this, 86 percent of all websites tested were found to have at least one serious vulnerability exposed to attack every single day of 2012.

Of the serious vulnerabilities found, on average 61 percent were resolved and only 18 percent of websites were vulnerable for fewer than 30 days in 2012. On average, resolving these vulnerabilities took 193 days from the first notification.

WhiteHat Security designated each tested site by industry, and a closer look revealed that:

  • With the exception of sites in the IT and energy sectors, all industries found fewer vulnerabilities in 2012 than in past years.
  • The IT industry experienced the highest number of vulnerabilities per website at 114.
  • Government websites had the fewest serious vulnerabilities with eight detected on average per website, followed by banking websites with 11 on average per website.
  • Entertainment and media websites had the highest remediation rate (the average percentage of serious vulnerabilities resolved) at 81 percent.
  •  In years past, the banking industry had the fewest vulnerabilities and fixed the most vulnerabilities of any industry. This year, banking came in second with 11 average serious vulnerabilities found per website and a below average remediation rate of 54 percent (average is 61 percent across all industries).

Top Ten Vulnerability Classes

The two most prevalent vulnerability classes in 2012 were Information Leakage and Cross-Site Scripting, identified in 55 percent and 53 percent of websites respectively.

The next eight most prevalent include: Content Spoofing – 33 percent; Cross-site Request Forgery – 26 percent; Brute Force – 26 percent; Fingerprinting – 23 percent; Insufficient Transport Layer Protection – 22 percent; Session Fixation – 14 percent; URL Redirector Abuse – 13 percent; Insufficient Authorization – 11 percent.

SQL Injection continued its downward slide from 11 percent in 2011 to 7 percent in 2012, no longer making the Top 10.

Best Practices May Not Result in Better Security

In correlating the survey results with vulnerability data, WhiteHat Security could see how software security controls, or “best practices” impacted the actual security of organizations. Some of the findings include:

  • 57 percent of organizations surveyed provide some amount of instructor-led or computer-based software security training for their programmers. These organizations experienced 40 percent fewer vulnerabilities, resolved them 59 percent faster, but exhibited a 12 percent lower remediation rate.
  • 39 percent of organizations said they perform some amount of Static Code Analysis on their websites underlying applications. These organizations experienced 15 percent more vulnerabilities, resolved them 26 percent slower, and had a 4 percent lower remediation rate.
  • 55 percent of organizations said they have a Web Application Firewall (WAF) in some state of deployment. These organizations experienced 11 percent more vulnerabilities, resolved them 8 percent slower, and had a 7 percent lower remediation rate.

Best practices may not be enough

Some of this data implies that best practices such as software security training are effective, yet some of the statistics clearly show that following best practices does not necessarily lead to better security.

The correlated data revealed that compliance is the primary driver for organizations to resolve vulnerabilities, but also the number one reason organizations do not resolve vulnerabilities. In other words, vulnerabilities are fixed if required by compliance mandates; however, if compliance does not require a fix, the vulnerability remains, despite possible implications to the overall security posture of the site.

“This collective data has shown that many organizations do not yet consider they need to proactively do something about software security. It is apparent that these organizations take the approach of ‘wait-until-something-goes-wrong’ before kicking into gear unless there is some sense of accountability,” said Grossman.

“This needs to change, and we believe there is now an opportunity for a new generation of security leaders to emerge and distinguish themselves with an understanding of real business and security challenges. Our hope is that they will address these issues we have identified and base their decisions on a foundation of data to improve the state of Web security over time.”

To view the complete report, visit

Top 10 markets and occupations for IT workers

Monday, April 29th, 2013

Monster.comA “Recruiting for IT Talent” survey of U.S. companies conducted by Monster, the worldwide leader in successfully connecting people to job opportunities and flagship brand of Monster Worldwide, Inc. (NYSE: MWW), revealed a large majority of employers who hire for IT professionals are likely to hire in the next 60 days.

Their hiring activity is primarily driven by staff increases (60%) and company expansion (45%).

Employers of all sizes are focused on IT roles that support aligning business and technology goals with primary hiring needs; this includes application development (72%), database analysis and development (58%), web design/development (57%), networking (56%), and business intelligence/analytics (55%).

IT demand remains stable

“The demand for IT expertise remains relatively stable with employers confident that they will look to fill these types of roles in the near-term,” said Jeffrey Quinn, Vice President of Monster’s Global Insights. “Meanwhile, on the job seeker side, the IT jobs viewed on Monster see millions of views each month, indicating high interest by, if not volume of potential candidates seeking employment in this field.”

While the survey revealed nearly one-half (49%) of employers were confident in their ability to find the talent they need for all these roles, some hiring challenges remain, including:

  • A skills gap, with 70% of employers reporting the number of qualified candidates available to fill all the opportunities as smaller than the total opportunities, creating increased competition for talent;
  • Specialized requirements, with 52% of employers reporting many of these technical roles are increasingly defined by highly specific skills further limiting the number of qualified candidates;
  • An inability to attract talent due to compensation. 52% of employers report they are unable to compete on salary alone.

More than one-half (53%) of employers responded that there are fewer IT Professionals searching for jobs in the U.S. And, nearly half of employers (48%) believe IT jobs continue to be outsourced to other countries, a contributing factor to a shrinking number of U.S.-based IT jobs to be available.

For those who may be seeking employment in the IT fields, it’s important to note that the majority of employers (92%) feel that careers in IT are promising and rewarding.

Additionally these companies believe academic training is not enough (40%) while certifications provide an advantage (85%). Employers also report that qualifications beyond technical skills that are critical to the assessment of IT talent include: communication skills, personality/cultural fit, type of work experience and interpersonal skills.

Here are the top occupations and markets for IT jobs by volume1:

Top 10 Occupations:

1. Software Developers, Applications
2. Web Developers
3. Computer Systems Analysts
4. Network and Computer Systems Administrators
5. Computer User Support Specialists
6. Information Technology Project Managers
7. Computer Programmers
8. Software Quality Assurance Engineers and Testers
9. Computer Systems Engineers/Architects
10. Database Administrators

Top 10 Markets for IT:

1. New York
2. Washington DC
3. Boston
4. Los Angeles
5. Dallas-Fort Worth
6. Chicago
7. Atlanta
8. San Francisco
9. San Jose
10. Philadelphia

For a copy of the full report, visit the Monster Resource Center.

IT business confidence rises for three quarters running

Monday, April 22nd, 2013

ComptiaFor the third consecutive quarter the CompTIA IT Industry Business Confidence Index recorded a positive gain in Q2. The Index is a measurement of technology business sentiment produced by CompTIA, the leading non-profit association for the information technology (IT) industry.

The CompTIA IT Industry Business Confidence Index is now at 58.0 on a 100-point scale, up from 56.1 in the first quarter.

Positive gains over the last three quarters represent the longest period of upward momentum in the history of the index, which is comprised of three metrics: opinions of the U.S. economy, opinions of the IT industry and opinions of one’s company.

Additional increase in confidence expected

Looking ahead, survey respondents project a two-point increase in confidence over the next six months, driven primarily by expectations of a strengthening macro economy.

“The data suggests that IT companies are feeling better about business conditions,” said Tim Herbert , vice president, research, CompTIA. “Generally, demand for technology has been consistent in many areas and among many customer segments. Technology has never been so accessible and affordable for businesses of all sizes.”

Thirty-eight percent of IT companies plan to increase their investment in new products or business lines over the next six months, an indicator of both the desire to capitalize on emerging technologies, as well as an expectation for future revenue opportunities.

Causes for concern noted

This figure is down slightly from the Q1 reading, but still rates highest among business investment IT companies plan to increase.

Herbert cautioned, however, “a number of factors are still cause for concern, such as the stubbornly high unemployment rate, the unknown effects of the federal government sequestration cuts or turmoil overseas. Business sentiment can quickly deteriorate with bouts of volatility.”

CompTIA’s IT Industry Business Confidence Index for Q2 of 2013 is the result of an online survey of 309 IT companies conducted in late March. The full report is available at no cost to CompTIA members. Visit or contact for details.

Developer program membership up to 80 percent

Friday, April 5th, 2013

evansdataEighty percent of developers belong to a developer program, according to Evans Data’s recently released Developer Relations Program survey, an annual survey of over 500 software developers conducted in February.

That’s an increase of 57% since 2008, which was the first year that more developers belonged to programs than did not and an increase of 156% since 2002, when the survey series was first introduced.

While a significant number, 34%, belong only to free programs, 23% belong exclusively to programs that charge a fee, and 23% belong to both paid and free programs. Both paid and free program membership has increased significantly during the last year. Total membership has increased sharply each year since 2011 when only 55% were in a program.

Programs becoming even more important

“Developer programs are highly important today and getting even more so,” said Janel Garvin, CEO of Evans Data Corp.

“Not only do developers expect to be supported by anyone who offers a platform or even an API for adoption, but the number and types of companies that are offering APIs is increasing rapidly as the world becomes more interconnected and software becomes ubiquitous.”

The Developer Relations Program Survey is an annual survey now in its eleventh year, which examines developer program acceptance, attitudes about program features, including support, app stores, training, community and social aspects, tools and SDKs, and more. See complete Table of Contents here:

Targeted cloud initiatives prove most effective, study says

Thursday, March 28th, 2013

CLOUDA step-by-step approach to cloud adoption focused on specific service areas or functions is most effective for large organizations, according to a new whitepaper from nformation Services Group.

The analysis, jointly authored by ISG and HCL Technologies, examines how organizations are integrating cloud-based services into traditional operational environments, assesses industry- and company-specific objectives, and employs case studies to illustrate various cloud scenarios and client priorities.

“As enterprises take a gradual approach to cloud adoption, traditional IT delivery models remain highly relevant,” said Stanton Jones , Analyst, Emerging Technology at ISG, and one of the report’s authors.

Most effective cloud developments

“The most effective cloud deployments tend to be discrete initiatives focused on specific business requirements and workloads.”

The analysis also found that clients are becoming savvier about cloud offerings – and more leery of vendor claims.

“Market hyperventilation regarding the potential benefits of cloud computing is giving way to a more reasoned approach,” saidKalyan Kumar , VP & Chief Technology Architect, HCL Technologies – ISD, and the report’s co-author.

“Clients perceive correctly that implementing cloud solutions is not as easy as cloud suppliers suggest, and are picking and choosing specific business problems, then identifying the appropriate cloud service and deployment model to adopt.”

The analysis includes the findings of a survey conducted by HCL of over 40 of its global clients during the past 12 months.

Clients were asked to prioritize from among four potential outcomes from a cloud initiative: cost reduction; scalability; consolidation; and service improvement.  The results are shown below, by geography.

Cost reduction a dominant objective

“Cost reduction – always an imperative – remains the dominant objective driving cloud adoption globally,” said Kumar. “In addition, cloud platforms provide the option to cost efficiently pilot new processes and applications, freeing up critical capital to invest in growth areas.”

Case studies included in the analysis detail how both ISG and HCL have worked with clients to define objectives and achieve results from cloud initiatives.

In many instances, the projects delivered a range of benefits, such as, for example, significant cost savings coupled with process improvement and increased agility through moving to a standardized environment.

The analysis also examined the constraining impact that business requirements, industry regulations and poorly defined standards have had one cloud deployment.

Constrained by regulations

“Cloud options and benefits are limited for customers requiring hardware-based separation of critical data,” said Jones.

“Moreover, in many industries regulatory requirements have failed to keep up with technology advances. As a result, many IT organizations seeking to adopt cloud-based services are currently constrained by outdated regulations.”

The complete white paper, titled “Adding Cloud to the Service Delivery Mix: Business Drivers and Organizational Considerations,” can be downloaded at

Five tips for capacity management in the cloud

Wednesday, March 27th, 2013

cloud computingDelivering services through cloud computing is a high priority objective for many IT departments, even though nearly 4 of 10 IT managers say they’ve experienced a cloud outage.

“With nearly one-third of respondents spending $1 million or more on cloud services annually, unplanned outages in the forty percent range won’t be tolerated by business leaders or their customers,” said TeamQuest Director of Product Management Scott Adams .

Many survey respondents believe the reported outages could have been prevented.

Capacity management minimizes risks

Capacity management is sighted as one way to minimize the risks associated with cloud computing, according to respondents in a survey from Kelton Research, commissioned by TeamQuest Corporation.

“Cloud, whether it’s internal or external, is here to stay and it has great benefits, but IT managers need to know whether there is sufficient service capacity to support growth or peaks in their workloads and still meet required SLAs, for example,” said Adams.

“The IT team must play a larger role with the emergence of today’s dynamic environment. You have to ask the right questions and provide expertise and advice to a variety of constituents to mitigate risks.”

To help decrease the number of outages, Adams suggests a diligent business capacity management analysis.

Adams provided a short to-do list for business capacity management in the cloud:

  • Evaluate cost/performance trade-offs for alternative infrastructure deployment strategies
  • Determine the best mix of sourcing options to best meet business service needs
  • Monitor service levels on cloud deployments
  • Size and optimize cloud infrastructure to meet SLAs
  • Understand how costs grow with increased volumes and workload growth

Adams advised that companies familiarize themselves with more than just the business side of capacity management. “You have to look at capacity management from the component, service and business levels to improve cloud implementation, for example.”

According to the survey, 65% of IT managers agree with Adams on the importance of capacity management in the cloud. Adams said proper capacity management is more important now as IT and the business rely on cloud computing to house business critical services.

Are your employees ignoring security rules?

Wednesday, March 27th, 2013

security1More than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by the IT department.

The survey, which looked at the attitudes of nearly 250 IT security professionals, also discovered that more than half of those who think that workers deliberately ignore IT security directives do not believe end-users would listen more even if these mandates were issued by executive management.

These findings are despite the fact that more IT security professionals and vendors are insisting that in order to improve IT security within organizations, strategic guidance must be issued from the board level.

Commenting on the research, Philip Lieberman, CEO of Lieberman Software, said: “These figures highlight the fact that most end-users are still not taking IT security seriously and are unnecessarily putting corporate data — and potentially customer information — at risk.

And these behaviors are continuing even after it has been proven that human error is the leading cause of data breaches. Organizations need to implement better cyber security training that properly instructs staff about the consequences of data breaches.

“IT groups must also look beyond conventional security products and invest in technology like privileged identity management (PIM),” continued Lieberman. “PIM products ensure that powerful privileged accounts found throughout the enterprise in large organizations are available only to authorized IT personnel with limited-time, audited access. This ensures that end-users are not able to accidentally or maliciously change configuration settings, access systems with sensitive data, or perform other actions that are not required of their jobs.”

The survey was conducted in February at RSA Conference 2013 in San Francisco.

For more information on the survey,

Developers spending more time on these apps

Wednesday, March 20th, 2013

mobile devicesMore than 30 percent of developers are spending more time developing mobile and cloud-based applications, according to data from a new joint study from Dr. Dobb’s and Forrester Research.

TheGlobal Developer Technographics Survey, Q3 2012 analyzes results from a survey of more than 500 platform-agnostic, programming-language-independent developers from Dr. Dobb’s audience base that collectively represent the full software development community.

Respondents were queried about the types of applications they are writing and how they are writing them and about the state of application development.

The survey turned up trends that could have major implications:

  • cloud computing35% of developers surveyed are spending more time developing mobile and cloud-based apps. This growing number shows that mobile and cloud are rapidly getting traction in all businesses and that developers are increasingly being asked to adapt their software to new client front ends and cloud back ends. This trend demonstrates how much IT will change in the future — with both ends of its processing pipeline shifting to new platforms — and how organizations’ reliance on developers will only increase.
  • 84% of developers use open source software (OSS) products. The greatest adoption rate was in infrastructure, such as operating systems (56%), web servers (52%), and relational databases (47%). Development tools were the next largest categories, with IDEs (41%), SCM (33%), and build tools (22%) being the most popular categories.
  • Surprisingly, open-source NoSQL databases (such as Apache Hadoop and MongoDB) were used by 13% of developers, suggesting that the NoSQL phenomenon is real and not just hype. With nearly one in seven developers currently using NoSQL, it’s likely to become a standard part of enterprise software development going forward.
  • 75% of developers program outside of their work responsibilities. This not only proves that programmers have a genuine love for programming, but indicates that their motivation for programming on their own time is to explore new technologies.
  • Developers must continually learn about cutting-edge technologies and the new ways to use existing products because the rate of change in their industry continues at a rapid pace.

A third of IT departments preparing networks for March Madness

Wednesday, March 13th, 2013

march-madness With the March Madness basketball tournament less than a week away, IT professionals around the country are preparing for the office network issues that often accompany it, according to a 2013 survey from Modis, a leading provider of information technology staffing.

The survey shows that 34 percent of IT professionals will take some action to prepare for March Madness, including banning March Madness video, throttling video feeds, or simply blocking content altogether. More broadly, 48 percent of IT professionals say their company takes action to block, throttle or ban the streaming of all non-work related content in the workplace.

This comes on the heels of other studies that showed allowing employees to watch March Madness events together can be a powerful team and morale building activity. See: Tips for keeping employees on the ball during March Madness

Interestingly enough, it seems the rules on content streaming may not be the same for all employees. Even though companies may have a policy banning streaming content during March Madness, more than half – 66 percent – of those surveyed indicated they would make an exception for the head of the company (i.e. CEO or president) and 52 percent would do the same for senior employees.

Content policies becoming the norm

Content policies are becoming the norm in corporations — and it looks as though they aren’t going to ease up anytime soon. Of the 48 percent of IT departments currently taking action against streaming content, including March Madness, 29 percent believe their company’s policies will become stricter over the next two years. Only 4 percent believe they will become more relaxed.

The March Madness tournament is a month-long series of college basketball games that draw attention from sports fans across the country. Because many of the games are played during traditional work hours, many people attempt to watch them streaming live from their office computers.

March Madnessv”March Madness is one of the most popular sporting events in the country, so many fans don’t want to miss a minute of it — even if they’re at work,” said Jack Cullen , president of Modis. “However, streaming content can put a significant burden on networks and the IT professionals responsible for maintaining them. Instituting systems and policies to block or reduce access is really the most logical option.”

Among those companies that don’t completely block content, there are different ways IT professionals manage the effect of content streaming events, like March Madness. Of those surveyed 30 percent resort to monitoring for violators of content policies. Twenty-four percent of respondents say they remind employees about the company’s content streaming policy, while 23 percent ask employees not to visit sports sites, relying solely on the honor system.

Other findings include:

  • IT professionals are just like everyone else. Despite admitting to giving their bosses special treatment, IT professionals put themselves in the same boat as everyone else with only 12 percent of those surveyed making an exception for themselves as far as content streaming policies.
  • Bans aren’t exclusive to March Madness. A majority (68 percent) of IT professionals restrict employee access to various social networking and content streaming sites. At the top of the list are Facebook (44 percent) and Netflix/Hulu (40 percent).
  • IT professionals burn the midnight oil. To help prepare for potential network burdens, survey respondents said they are putting in extra hours on the job. For example, nearly half (46 percent) of IT professionals said they have worked overtime either on the weekend or during the week due to situations that cause network strain, while 45 percent have had to skip lunch breaks to prepare for upcoming problems. Even worse, 34 percent have had to work during vacation and 39 percent have put in time overnight.

“IT professionals around the nation work hard to keep office networks from slowing despite a growing array of employee web habits that may impact them,” said Cullen. “In an era where network disruption means potential loss of real business dollars, it’s not an issue that IT professionals can afford to treat lightly.”

How many IT pros does it take to fix an issue?

Wednesday, March 6th, 2013

TeamquestHow many IT professionals does it take to fix an issue? The answer is five, working a combined average of 100 hours a week to fix unexpected IT issues, proving why IT continues to focus on IT efficiency.

One IT professional averages 20 unexpected issues per week, putting out fires such as dealing with network slowdowns/outages, poor performing applications, unanticipated change requests, or equipment failures according to a survey by independent market research firm Kelton Research commissioned by TeamQuest Corp.

Daily business hiccups affect the efficiency and productivity of IT. Dynamic IT environments demand that IT use its resources wisely as business leaders focus on exploiting the benefits of cloud computing and virtualization to better serve customers and boost profitability.

Growing service demand

One of the presumed benefits of the cloud is freeing IT staff to work on strategic initiatives such as planning for cloud initiatives or understanding the risks associated with BYOD.

However, with 30% of an IT organization’s time spent on maintenance and mundane tasks, companies too often compensate by over-provisioning, wasting energy and money. IT is faced with a growing service demand from the business and consumers.

“From a service delivery view, IT staff deal with differing capacity requirements from different business units,” said Director of Product Management Scott Adams . “And the only constant is that those requirements are always changing.”

Efficiency has been a battle cry for IT and the business for years. IT services and business processes are measured and audited for efficiency and effectiveness.

“To increase efficiency, IT needs to institute mature capacity management processes that will protect against over-provisioning and reduce or eliminate the number of IT issues,” said Adams.

IT execs struggling to manage security, compliance, performance

Thursday, February 21st, 2013

ProtivitiThe 2013 IT Priorities Survey, designed to help IT departments classify areas in need of attention in order to better execute the function’s strategic mandate, found that IT executives are struggling to manage the wide variety of technology risk, regulatory compliance and performance challenges that now face them.

When asked to assess their competency in key areas of IT technical knowledge on a scale of one to five, with one being the lowest and five being the highest, nearly 200 CIOs, chief technology officers, chief security officers, and IT vice presidents/directors reported a 2.8 average rank for social media security, social media integration, mobile commerce security, mobile commerce integration, and mobile commerce policy.

“The continued rapid global expansion of the smart phone and mobile applications marketplace reflects the strong demand from business leaders and consumers for access to information anytime and anywhere, which presents exciting opportunities for delivering value. However, it also creates greater technology risk potential,” said Kurt Underwood , a managing director with Protiviti and leader of the firm’s global IT consulting unit.

“The result is significant pressure on IT departments and business leaders as they are asked to deliver more mobile technology-enabled services. This pressure forces them to take on considerably more risk than they’re prepared for – especially in terms of policy, integration, data management, security and data privacy related to mobile commerce and social media proliferation and innovation.”

Social media, mobile security need improvement

Among 21 areas of technical knowledge, survey respondents identified social media security and mobile commerce security as the areas needing most improvement.

CIOs and their staffs indicated that they intended to strengthen their cyber security capabilities in order to tackle the growing threat of breaches ‑ and potential incident response procedures ‑ as well as ensuring their compliance with the increasing number of state and federal information security requirements.

Executive-level respondents also rated mobile commerce security, policy and integration among their top five priorities in the new survey’s technical knowledge section, which contrasts strongly with the 2011 survey in which none of these areas made the top of the list.

Interestingly, challenges related to virtualization and cloud computing receded in the rankings compared to 2011, suggesting IT departments have a higher level of confidence in managing these areas.

Additional Survey Highlights

Survey results also highlighted the following findings related to IT processes and capabilities:

  • Managing and classifying enterprise data is the number one security and privacy area in need of improvement, and remains a major challenge for IT departments.
  • The IT function’s top priorities are related to strategy and organization, reflecting a need to enhance the clarity and precision with which IT performance is measured, monitored and reported internally and externally, as needed to customers.
  • In terms of IT infrastructure, platform performance planning and storage management and planning are listed as top concerns, with respondents ranking their competency level in these categories at 2.8 on a scale of one to five.
  • Three primary priorities in the “ensuring continuity” category are developing and maintaining business resumption plans; developing and maintaining IT disaster and recovery plans; and developing and maintaining crisis management plans.

In the survey’s “managing IT assets” category, monitoring and accounting for IT assets are listed as the top two areas that require improvement. According to Tom Andreesen , a managing director in Protiviti’s enterprise application practice, “This concern about IT assets is driven by an increasing volume of small computing devices coupled with their mobility ‑ factors that make verification of location, condition and value difficult, especially if they are off-air or dark assets.”

Complexity of security driving shift to managed security services

Thursday, February 7th, 2013

Frost & SullivanThe increasing complexity of both IT and physical security requirements for commercial and government organizations will drive a shift towards outsourcing security to managed security service providers (MSSPs). Adopting an outsourced model reduces the need for in-house provision and can provide the most cost-efficient approach to an organisation’s security.

New analysis from Frost & Sullivan (, Analysis of the Global Managed Security Services Market, finds that the market will be around $66.25 billion in 2012 and estimates this to increase to $139.10 billion by 2021. The research covers two key service segments: physical and IT security.

“In current times, many organisations remain highly cost-conscious, motivating them to outsource their security requirements and reduce operating costs,” noted Frost & Sullivan Aerospace, Defence & Security Research Analyst Anthony Leather. “Even while security remains a priority for organsiations, chief decision makers are looking to the industry to provide them with the most advanced security solutions at the most competitive prices.”

Growing complexity of attacks spurring investment

The growing threat and complexity of attacks, especially in the IT segment, is spurring greater investment in new and existing solutions to ensure both physical and network security. Shifting security operations to MSSPs enables organsiations to outsource progressively more complex security requirements to the experts, while focusing on their own core business processes.

While there are cost-efficiencies to be gained through a security outsourcing model, some organisations still prefer to keep security in-house. This allows them to address issues immediately, without relying on outside companies.

“A common concern among security managers is the wide range of companies that MSSPs have to monitor,” added Leather.  “This might result in the untimely handling of security breaches or incidents.”

Focusing on the larger markets, such as North America and Europe where outsourcing security services is a more accepted practice, will help build market share and a strong customer base for companies. This trend is expected to spread to other regions, with Asia Pacific anticipated to experience the highest growth in the next ten years.

“As MSSPs become more established and demonstrate high levels of security with excellent customer service, organisations will become more comfortable with outsourcing security services,” concluded Leather.

Social media drives business technology buying decisions

Friday, February 1st, 2013

social mediaSocial media not only influences IT purchase decisions, it drives many of them, according to UBM Tech‘s annual Social Media @Work research. The study found that social media now plays a critical role in the business technology market.

Study highlights include:

  • Social media influences and drives IT purchase decisions: 66% of tech professionals say that they have used social networking sites to obtain information for a technology purchase.
  • 92% of IT respondents have taken one or more actions as a result of using social media, including visiting a vendor web site, or contacting a vendor directly for more information, and registering to download content such as research or a white paper.
  • Social media is gaining credibility among IT professionals:  42% of respondents say that social media is “productive” — an increase from 36% two years ago. The percentage of respondents who describe it as simply “fun” decreased by 6 points.
  • Social media has also gained credibility with tech marketers – the majority of tech marketers surveyed now have a business presence on all four of the major social networking platforms, with close to 90% maintaining a business presence on Twitter and Facebook, 84% who have a business presence on LinkedIn, and about three-quarters on YouTube.

“Social media is now completely ingrained into the workflow of business technology decision makers,” said Scott Vaughan , UBM Tech’s Chief Marketing Officer. “This poses challenges for tech marketers who lack resources to develop and execute effective, cohesive social media strategies. Our report incorporates practical tips to help even the most time-strapped tech marketers leverage social media as part of their overall marketing strategies.”

The full report, including strategies that marketers can use to maximize social media to engage IT decision makers, can be downloaded from, an online resource for technology marketing best practices, research and solutions.  Access the free report at; registration is required.

Cloud-related positions going unfilled due to lack of qualified workers

Wednesday, December 26th, 2012

CLOUDA new report from business intelligence firm IDC, published in Forbes  says that the IT industry had 1.7 million openings in cloud-related technologies this year that went unfilled. Job research website has also found 13,000 openings in the field.

The reason :companies could not find qualified workers. The lack of training and certification among jobseekers were given as the main reasons by IT hiring managers. Firms currently are struggling to fulfill the cloud-related positions.

The report concludes by stating that existing staff should be retrained for these new jobs and students encouraged to pursue related IT training and certifications. The overall outlook is also bright for the industry. The report predicts that almost 7 million new cloud-related jobs will be available worldwide by 2015.

Job research website has also found that among the 13,000 cloud-related job openings that it has tracked down, there are various skill sets and certifications required to get these jobs. Some of the actual job openings on the site are: Director of infrastructure and cloud operations architecture, cloud senior network engineer, cloud administrator, cloud storage engineer among others. The site also has managed to track down around 234,000 IT job openings overall.

Six areas of the economy offering job growth prospects

Wednesday, December 19th, 2012

apollo-research-institute-logo2Although more than 27 million (one out of every six) Americans are now out of work or underemployed,  Apollo Research Institute identifies six areas of the economy that offer job growth, particularly for women, and provide a snapshot of the new economy.

“We see job growth ahead in 2013 – and in some surprising places,” said Dr. Tracey Wilen-Daugenti , vice president and managing director, Apollo Research Institute.

Based on extensive environmental scanning and two years of research for its forthcoming book, Women Lead: Career Perspectives from Workplace Leaders, Apollo Research Institute identifies which fields will offer job opportunities, and four other career trends for 2013:

1. Six sectors will offer on-ramps to career growth

Six career areas provide a snapshot of the new economy: business services, education, healthcare, IT, nonprofits, and manufacturing. Healthcare, the fastest-growing sector in the nation, offers obvious opportunities, but less intuitive choices such as nonprofits—which will need a projected 80,000 senior managers a year by 2016—also offer attractive prospects.

2. Women’s career paths will zig and zag

Fifty-eight percent of women describe their career path as “nonlinear,” and nearly 90% of women executives and managers shift careers in midlife. As women and younger workers look for new ways to blend work, family and other life pursuits, the career ladder will gave way to a labyrinth of stops, starts, and lateral moves.

3. Career credentials will be under real-time scrutiny

Instant fact-checking and counter-claims on social media are not just limited to political scandals and natural disasters. Lying on your resume can hamper your job prospects, but some studies indicate more than 40% of employment applications contain false credentials. Today’s workers must present themselves factually and appropriately online, and provide proper attribution for their work.

4. Women will use their tech-savvy at work and home

A look at technology adoption among women, including in the over-50 age group, smashes the stereotype of men as the primary techies. Women spend 30% more time on social networking sites than men, and mobile social usage is 55% female. Women will increasingly lean on high-tech help to start businesses, enter STEM fields, and manage home-related tasks.

5. Work and education will intertwine

The competition for skilled workers provides an incentive to keep learning, on and off the job. Workers will pursue certifications, degrees, technical training, and leadership development to keep their skills current, and will look for internships, apprenticeships, and job rotations to gain hands-on experience.


Do company legal and IT teams speak the same language?

Friday, December 14th, 2012

DeloitteLegal and IT teams don’t communicate with each other all that well, a new Deloitte poll suggests. Only 8.1 percent of executives surveyed think their company’s IT and legal teams fully understand each other.

“Legal and IT teams have been working together more closely each year, responding to litigation or regulatory investigations.  These fast-paced, complex efforts to locate, collect, preserve and analyze electronic data—evidence, really—are crucial to defending corporate reputations, legal claims and more,” said Mark Michels , a director in the discovery practice for Deloitte Financial Advisory Services LLP.

Michels adds, “Unfortunately, each year there are cases that hit the headlines in which poor legal and IT cross-team communication and collaboration results in electronic discovery omissions.”

Not collaborating well

Nearly 1-in-5 respondents (19.3 percent) says their organizations’ IT and legal teams do not collaborate well.

“Sometimes the first step to improving legal and IT teams’ collaboration is simply to network within your organization,” continued Michels.

“In my experience, finance, risk and compliance teams who work with legal and IT separately can really help the two groups bridge the organizational gap between them. Teaming with other departments can be invaluable in shifting discovery efforts away from fire-fighting mode into a streamlined, repeatable process.”

CIOs and General Counsels sometimes bridge the gap

When asked whether the experience of a chief information officer (CIO) and general counsel (GC) enabled them to bridge the gap, 20.2 percent of respondents report that their company CIO and GC do not understand each other’s field.

However, 16 percent indicated they have experience in each other’s fields; 4.5 percent report their CIO has some knowledge of the law and 5.9 state their GC has some knowledge of technology.

“Industry aside, in-house legal teams commonly rely on IT leaders as expert witnesses in court or regulatory hearings to describe how electronic evidence was located, collected, preserved and analyzed,” continued Michels.  “Having these teams work together now can only benefit everyone involved.”