Unfortunately there was no blogs that matched your keyword search criteria. Please try again or try searching for blogs by Category, Tag or Type instead
by Gareth Streefland
We have experienced remarkably high volatility over the past three years, including supply chain disruptions, historically high inflation,...
We have experienced remarkably high volatility over the past three years, including supply chain disruptions, historically high inflation, geopolitical unrest, and of course an unprecedented worldwide pandemic and the ensuing lockdowns.
It has never been more difficult for many business leaders and entrepreneurs to navigate this environment. Fortunately, new technological solutions are being developed in concert with these issues to support forward-thinking executives in positioning their firms to succeed in the tumultuous years to come.
Knowing the top tech trends expected for 2023 is probably the most important step you can take to make sure your company is prepared for near-term success. After all, if you don't start preparing your business for the newest technological advancements as soon as the year starts, you'll already be behind!
In light of this, let's examine some of the major technological trends for 2023 as identified by Gartner Research, and consider how you may use them to prepare your company for a better, more prosperous future.
1. Digital Immune System
The past few years have seen an unparalleled focus on risk, both in the physical and digital world. Cybersecurity concerns are increasingly acute, as data breaches and other cybersecurity concerns are becoming increasingly sophisticated.
Fortunately, methods for protecting against online criminals, spammers and other unwanted online pests are improving in sophistication as well. Through observation, automation and the latest developments in design, a robust digital immune system can significantly mitigate operational and security risks.
As the utility of these tools becomes more established, expect to hear many more questions about the health of your organization’s digital immune system in the year to come, and what you’re doing to strengthen and protect it.
2. Applied Observability
The 2010s saw an abundance of tools and methods of capturing more data than anyone knew what to do with. Thus, with seemingly endless quantities of client data now available, it’s likely that the next step will be toward creating new uses for data that’s been collected.
Applied Observability uses Artificial Intelligence to analyze and make recommendations for greater efficiency and accuracy based on an organization’s compiled data. It optimizes data implementation by placing more value on use of the right data at the right time for rapid response based on confirmed stakeholder actions, rather than intentions. This can lead to real-time operational improvement, and a tangible competitive advantage for your business.
3. AI Trust, Risk and Security Management (AI TRiSM)
We’ve all heard a lot about AI over the past several years, but believe it or not, many industries are still in the early stages of AI implementation.
With the focus on risk throughout every industry post-pandemic, it’s no surprise that AI Trust, Risk and Security Management (AI TRiSM) will be a major focal point in the tech space next year. AI TRiSM combines methods for explaining AI results, new models for active management of AI security, and controls for privacy and ethics issues, all in support of an organization’s governance, reliability, security, and overall health.
4. Industry Cloud Platforms
Cloud adoption has been a major component of digital transformation for over a decade, and 2023 will almost certainly prove to be another year for more sophisticated, industry and organization-specific cloud adoption strategies. By combining SaaS, PaaS and IaaS with customized functionality, Industry Cloud Platforms may prove to be the most consequential step toward cloud adoption to date.
5. Platform Engineering
As adoption grows and digital platforms mature, expect to see an increased emphasis on customization. That’s what platform engineering offers: a set of tools and capabilities that are developed and packed for ease-of-use. For development teams and end-users alike, this could mean increased productivity and simplified processes.
6. Wireless-Value Realization
We’re still only beginning to scratch the surface of the value gained by the integration of wireless technology through a broad, interconnected ecosystem.
In the coming years, we’ll see wireless endpoints that are able to sense, e-charge, locate and track people and things far behind traditional endpoint communication capabilities. Another step towards optimization of collected data, wireless-value realization networks provide real-time analytics and insights, as well as allowing systems to directly harvest network energy.
Combining the features of an app, a platform and a digital ecosystem within a single application, superapps offer a platform from which third parties can develop and publish their own miniapps. An end user can activate micro or minapps within the superapp, allowing for a more personalized app experience.
8. Adaptive AI
Using real-time feedback to new data and goals, adaptive AI allows for quick adaptation to the constantly evolving needs of the real-world business landscape. The value provided by adaptive AI is apparent, but implementing these systems requires automated decision-making systems to be fully reengineered, which will have a dramatic impact on process architecture for many companies.
As noted above, you’re likely familiar with the term “metaverse” by now thanks to Mark Zuckerberg. However, if the lackluster performance of Meta’s stock is any indication, you’re one of the many who has yet to be sold on the benefits of the metaverse.
Regardless, metaverse technologies that allow for digital replication or enhancement of activities traditionally done in the physical world should certainly not be dismissed. There is far too much at stake, and the possibilities are far too intriguing for too many people to write off metaverse technologies quite yet, even if the pilot versions fail to impress.
10. Sustainable Technology
Until recently, the tech world has been single-mindedly fixated on boosting the power of new technologies. But as tech becomes increasingly integrated into every facet of our lives, we’re seeing new investments in energy efficient tech and tech that promotes sustainable practices.
Emissions management software and AI, traceability and analytics for energy efficiency are all allowing both developers to build sustainability-focused tech, and allowing business leaders to explore new markets and opportunities for sustainable growth.
by Heather Wilkins
Even though the split between women and men in the tech industry has become a lot more diverse, there is still an obvious divide. The main cause of...
Even though the split between women and men in the tech industry has become a lot more diverse, there is still an obvious divide. The main cause of this is a lack of diversity, awareness, and unconscious biases. The awareness of the IT profession among students and unconscious biases are just the start of a deep-rooted issue. This issue must be overcome before women's representation in software development teams can improve.
Discussions about diversity in the IT industry, include the challenges to greater gender diversity, and how having role models, and support systems, and building both competence and confidence is vital for women to succeed in the tech industry.
The lack of role models is a key challenge that has to be focused on to increase the number of women in Tech. There are many successful and respected male software developers and men in IT. Seeing the lack of women makes one think, are there even actual career paths for women that will last 20 or 30 years? Especially when you look at company hierarchy, and how the amount of women in positions decreases drastically when moving higher up the cooperate ladder, it is shocking how few women you find. Archana Manjunatha, executive director and head of platform transformation and DBS Bank, explains that it gets lonelier at the top because there are even fewer women as you climb the corporate ladder. Having more role models means that other females won't feel so lonely and don’t feel that they can’t do it. To some extent, it is hard to become what you cannot see. Because that is how people choose careers and paths – when they see somebody, then it's easier for them to say “I want to become like this person”.
At the moment, when you think of an engineer or a similar role, most of the time you will think of a male in such positions. This mindset needs to be replaced with more female images so that women entering the industry are not deterred at all. However, even though this backward mindset is still very much present, there are a lot more movements and initiatives today to highlight female role models and encourage women to enter the IT industry.
Another challenge is an unconscious bias that sets in early, where even primary school children view math and science-related fields as being more suited for men. Through changing education by families and schools, this mindset could be changed. A lot of people also identify the path to a tech career as exciting and sudden. This is because most people don’t think of this field from an early age. If it is implemented properly, it can become an extremely rewarding field for several women.
Have support systems
Another challenge for women is to thrive in their careers through the different life stages, where they have to juggle bringing up children and work, or even taking some time off for family before re-entering the workforce. Support systems in these instances will help women through these difficult stages. Most of the time, people are also very open to giving you the help and support that you need. Just have the courage to ask for it and you’d be surprised how much help you will be given. This will help you be able to not drop off entirely, but give you the opportunity to make a comeback at a certain point in time.
Key elements to succeed
Regardless of gender, it all comes down to competence and confidence. Building competence is extremely important, and with that competence comes confidence. When someone is an expert in a subject matter, the agenda is almost invisible at the table because people are listening to you for your expert opinions, and your knowledge in the area. In return, respect will be gained. This means that women still are encouraged to upskill themselves. Technology is constantly evolving. What may have gotten you into technology, will not be there the next day. So one always has to keep themselves up to date. The growth mindset and the ability to want to keep learning are very important in the IT industry.
To show skills and benchmarks, certification can be completed which will help not only secure a position but also required to show your acquired skills.
Through the further integration of women into the tech industry, it is noted that there will not only be a more balanced gender representation in tech teams, but there will also be better delivery of code, products, and technology. We are definitely living in much better times, but there is still a long way to go. If there are only 20% of women are trying to solve the problem, it won't be solved or will take longer. The remaining 80% must become part of the solution. Otherwise, it's just women talking about needing equality and not taking any action.
While challenges exist, many opportunities exist for women in the tech industry. It is understandable that a lot of women feel unsure about getting into the industry due to self-doubt. But instead of asking if you are smart enough, put in the hours, be willing to learn, really try, and give it a go!
by Lauren Greene
When you, as an IT leader, are able to foster innovation, it not only benefits IT itself, but the business it serves and you personally. It...
When you, as an IT leader, are able to foster innovation, it not only benefits IT itself, but the business it serves and you personally. It shows that you are an internal agent of change and a valuable asset. Companies that recognize this build their culture and processes in a way that encourages innovation. You have realized that waiting for prompting is not the right way to move forward.
Put simply, innovation is what your business needs to bridge the gap between where it is now and the future you envision in which it will thrive. So how can you encourage this innovation and drive it forward in the workplace? Below we give you some tips on how to do just that and increase the success of your teams and your company in the innovation process.
1. Define your definition of IT innovation and recognize the opportunities
First, you need to determine if there is a culture of innovation in your company. Whether your employees can come to you with new ideas or whether suggestions are perceived as annoying. When employees have the opportunity to innovate and contribute to your organization's mission and goals, their engagement increases. They feel part of a whole and see how their work advances the company. That's a great motivator.
But you can't just go to your employees with a vague idea to innovate. That's too broad a spectrum to give to anyone. You will not feel motivated or encouraged. Asking a team to innovate is like asking an athlete to play better. So if you want your employees to innovate and encourage that culture, you first need to define what IT innovation means for your business. It can be anything: the successful development, implementation, extension, or improvement of a technical process, a business process, or a software or hardware product. It can even revolve around cultural factors that reduce costs, increase productivity, increase the company's competitiveness or bring any other business benefit. As you may be able to tell, the range of IT innovations is very wide. So we encourage you to expand your goal and pitch this idea to your IT teams.
2. Know the difference between project management and research and development
IT projects are inherently very project management oriented. This means they are clearly defined by deadlines, specific cost estimates, deliverables, and calculated/expected returns on investment. However, with research and development, you cannot plan into your plan that the big discovery and breakthrough will happen on a specific day. Instead, the big breakthrough will come when it does, or possibly not at all. Therefore, it is difficult to calculate the return on investment for this type of project. As an IT executive, you must decide whether the project is worth investing in or whether you want to use project management techniques instead.
3. Building an innovative/productive pipeline
Building an innovative culture is not only people-oriented but also process-oriented. You need to develop a formalized process that identifies, collects, evaluates, and implements innovative ideas. Without this process, great ideas and potential innovations die in the bud. It must also be recognized and understood that innovative ideas can come from many directions, e.g. B. from your employees, internal business partners, customers, suppliers, competitors, or through accidental discoveries. The reason it is important to define the most likely sources of innovative ideas is that you can develop idea-collection processes for each source.
4. Accept the unfair expectations of others of IT
Any software or service you develop will be compared to purchased software and services. It's not fair, but people do it anyway. Consequently, the evaluation of new processes and software must be done in this unfair sense and expectations must be set accordingly. Incorrect or excessive expectations can damage the IT team's overall reputation and make it difficult for the business to agree to fund the team's innovative ideas.
5. Note form and content
This doctrine states that all outcomes, no matter how large or small, must have both form and content. The shape means how it looks. The content is what it says or how it works. This applies to documents, systems, processes, and everything else that is shared with others. A form with no content is a new system that looks perfect but doesn't do what people want it to do. Content without form shows that the person or group delivering it offers too little and doesn't take pride in their work to make it look good. From the point of view of promoting innovation, all implemented ideas must follow this doctrine, otherwise, the new innovations will not be well received by your department and thus jeopardize your entire innovation goal.
6. Create a safe environment when innovation fails
When you are presented with an innovative idea, good or bad, commend the person's effort, interest, and initiative. When good ideas are presented, they are included in the aforementioned innovation pipeline. Less attractive ideas can become lessons in which you explain to the employee why they won't work and give them hints about which ideas are more likely to win. And should you approve an idea and allow the employee to spend time implementing it, and it fails, praise the effort and don't blame the employee, or they may never propose an innovative idea again.
But how do you get your employees to be creative, innovative, and risk-taking? And what exactly does it mean to be creative or innovative? These terms are thrown around so often that it can be difficult to keep track. As a result, many leaders don't know how best to encourage their employees to look at problems and processes differently. Here are some tricks to motivate your employees throughout the innovation process.
- Be clear about what you want
- Show employees that it's worth taking the risk
- Celebrate successes and learn from failures
- Provide mentoring and training
- Create a culture where people care about each other.
If you have experience in the IT industry or are new to this field and want to explore possible ideas, you can get in touch with us and have a confidential interview with one of our recruiters! If you are looking for new vacancies, follow the link to the current vacancies page.
by Gareth Streefland
Today, cyberattacks are attempted every 40 seconds, and the number of ransomware attacks is increasing by 400% annually. That's why it's...
Today, cyberattacks are attempted every 40 seconds, and the number of ransomware attacks is increasing by 400% annually. That's why it's imperative that companies and businesses take cybersecurity very seriously. But have you checked off all the boxes on the checklist to make sure you are truly secure? Do you know which data assets/systems are most vulnerable, and do you know the potential financial cost of a security breach? These are questions that need to be asked in a business of any size. That's why every company should conduct an IT risk assessment.
What is an IT risk assessment?
A risk assessment is about identifying the threats to which your information systems, networks and data are exposed. By assessing the potential consequences a company could face, it is able to prepare in advance in the event of a security breach. These assessments should be conducted on a regular basis, such as annually or when the company experiences a major change.
Cyber or IT risk can be defined as any risk of financial loss, disruption, or damage to an organization's reputation due to a failure of its information technology systems. Examples include theft of confidential information, hardware damage and resulting data loss, malware and viruses, compromised credentials, corporate website failure, and natural disasters that can damage servers.
Why do you need to conduct an IT risk assessment?
Smaller businesses in particular may think that conducting an IT risk assessment would be too big a task. But in reality, it is something that should not be missed. In order to ensure the well-being of a business, it is always good to take extra measures and make sure that it is protected. Some reasons to conduct a risk assessment are:
- It gives you a detailed list of vulnerabilities that need more attention and resources.
- It increases productivity because your security team can respond directly to problems, rather than just reacting to random issues that arise. Risk assessments also show you which areas your team should focus more on and which can be completed at a later date.
- It improves communication across the organization because the security team has to interact more with other employees in different areas. Not only does this foster collaboration, but it also creates an understanding among other employees of the importance of cybersecurity and how they can contribute to security and compliance goals.
How to conduct an IT risk assessment: a comprehensive overview
To start, you can conduct either a quantitative or qualitative risk assessment. However, it is most effective if you use both to achieve the best results.
1. Identify and prioritise assets
First, create a comprehensive list of all the company's information assets. This includes servers, customer data, sensitive documents, trade secrets, etc. As a technician, you must communicate effectively with upper management to determine which assets are important and which are not. After creating a list, gather all the necessary information about software, hardware, data and other relevant information for each asset. This will create a detailed list of all the items to focus on.
2. Identify threats and vulnerabilities
A threat is something that can cause harm to your organization. There are 3 types of threats:
- Natural disasters.
Some natural disasters can destroy data, servers and devices. Pay attention to whether any of these risks apply to your assets and whether they need to be changed to ensure security.
- Hardware failure
No matter how large or small your business is, hardware failure should be considered. Make sure all assets are up to date and not at risk of crashing.
- Malicious behavior
Disruption, interception and impersonation can target your data and servers. Determine which areas are most at risk from outside malicious behavior.
3. Analysis of technical and non-technical controls and determination of the probability of an incident.
Technical controls include encryption, intrusion detection mechanisms, and identification/authentication solutions. Security policies, administrative measures, and physical/environmental mechanisms must also be analyzed and fall under non-technical controls. These controls must be used to assess the possibility that a vulnerability can be exploited. This can be assessed using simple categories that rank the potential occurrence from high, medium, and low.
Assessing the impact the threat could have also helps prioritize your security risks across teams. You are now able to delegate which issues require immediate action and which can wait until they are resolved.
4. Design controls
Once you have prioritized and detailed all of the potential risks, you can begin to create a plan to mitigate the most pressing risks. Senior management and IT should be heavily involved in this part of the assessment to ensure that the controls address the risks and align with the overall plan and goals of the organization. You may also need to engage professional services to develop a new set of controls. Don't be afraid to enlist the help of IT and security experts!
5. Document the results
Risk assessment reports can be very detailed and complex, or they can be a simple overview of risks and recommended controls. Ultimately, your report will reflect both your audience and your organization's information security posture. Documenting all findings and their analysis is intended for senior management to communicate the issues and methods to address them in a clear and concise manner.
It should also be noted that a risk assessment as such should not be a one-time exercise, but an ongoing process. As your system environment changes, so do the chances for potential security breaches, data loss, etc.
by Ben White
The Chancellor of the Exchequer, Jeremy Hunt, has chosen to scrap the plans to repeal the Off-payroll IR35 Reforms, which Kwasi Kwarteng previously...
The Chancellor of the Exchequer, Jeremy Hunt, has chosen to scrap the plans to repeal the Off-payroll IR35 Reforms, which Kwasi Kwarteng previously announced in his mini-budget on 23 September 2022.
The Growth Plan had set out steps to take the complexity out of the tax system and identified the necessity of repealing the 2017 and 2021 off-payroll working rules (IR35 Reforms).
The Conservatives Growth plan indicated that repeal would "free up time and money for businesses that engage contractors, that could be put towards other priorities." And that it "also minimises the risk that genuinely self-employed workers are impacted by the underlying off-payroll rules."
The Chancellor of the Exchequer, Jeremy Hunt, has chosen to scrap the plans to repeal the Off-payroll IR35 Reforms, which Kwasi Kwarteng previously announced in his mini-budget on 23 September 2022.
The Growth Plan had set out steps to take the complexity out of the tax system and identified the necessity of repealing the 2017 and 2021 off-payroll working rules (IR35 Reforms).
The Conservatives Growth plan indicated that repeal would "free up time and money for businesses that engage contractors, that could be put towards other priorities." And that it "also minimises the risk that genuinely self-employed workers are impacted by the underlying off-payroll rules."
Hunt, who took up the role of chancellor on Friday, said this morning that the IR35 reforms would be going ahead. “The government has today decided to make further changes to the mini-Budget,” the Chancellor said. “We will reverse almost all the tax measures announced in the growth plan three weeks ago that have not started the Parliamentary process.
“We will no longer be proceeding with the reversal of off-payroll working reforms [IR35] introduced in 2017 and 2021.”
In moves announced via a pre-recorded video instead of parliament in a bid to calm markets, the newly installed chancellor announced that most of its financial plans had been dropped. This includes the planned lowering of the basic rate of income tax from 20 to 19 per cent, set for introduction in April. Hunt said this will now not be introduced until “economic conditions allow”.
It had already been announced that planned increases to the rate of corporation tax and abolishing the highest rate of income tax would be dropped.
Hunt said today that a Treasury-led review will be carried out into the government’s support package for household and business energy bills beyond April next year.
Reforms to IR35, introduced in April 2021, require operatives routinely working with the same contractors to be counted as PAYE staff, or face action from HMRC.
The changes were introduced as a crackdown on tax avoidance, but critics claimed they would force many out of self-employment and reduce incomes.
They were also linked to a Whitehall drive to increase the number of direct employees in the construction sector, driven by the government and the Construction Leadership Council.
However, they were criticised for hitting the income of the self-employed and adding to the burden on employers.
Reversing the reform was one of the leadership campaign promises made by prime minister Liz Truss. The 2021 reforms will now remain in place.
Hunt said the government changed its tax plans “to ensure the UK's economic stability and to provide confidence in the government's commitment to fiscal discipline”.
He added: “Instability affects the prices of things in shops, the cost of mortgages and the values of pensions. There will be more difficult decisions, I’m afraid, on both tax and spending as we deliver our commitment to get debt falling as a share of the economy over the medium term.”
Departmental spending will be cut, he added, in order to “protect the most vulnerable” and help the government deliver “our mission to go for growth”.
Andy Chamberlain, director of Policy at the Association of Independent Professionals and the Self-Employed (IPSE), slammed the “spineless decision”.
“Today’s announcement will be a huge blow to thousands of self-employed contractors and the businesses they work with,” he said. “The reforms to IR35 have created a nightmare for businesses seeking to engage talent on a flexible basis, while simultaneously forcing individuals out of business altogether.”
He added: “Businesses that were looking forward to an era of less complexity and less cost will have had those hopes dashed today. Our fear is this decision will lead to yet more work being offshored to other territories and more people being forced to work through unregulated umbrella companies. The supposedly pro-business Conservative government has sent out a clear message today – it does not support people who work for themselves.”
We currently have contract roles on our website. Please click here to find out more.
by Jack Brameld
In May, Microsoft announced large-scale changes to what has been a staple among service providers reselling Microsoft services. Specifically,...
In May, Microsoft announced large-scale changes to what has been a staple among service providers reselling Microsoft services. Specifically, we’ll see the end of “Silver” and “Gold” status, to be replaced by the new Microsoft Cloud Partner Program (MCCP), which comes into place on October 3rd 2022.
This drastic change will impact nearly half a million service providers, the company said, “This deep relationship between Microsoft and our partners spans more than 30 years and, in that time frame, our partners have provided unique solutions across numerous industries, helping countless customers succeed in an ever-changing world. They especially have played a pivotal role in helping businesses adapt amidst the pandemic. As things continue to change and evolve, we are committed to investing in and delivering what partners need to innovate, grow their businesses, and deliver on the promise of digital transformation for customers across organizations and industries.”
The Microsoft Partner Network (MPN), was formed in 2009 and was replaced by the Microsoft Partner Program (MPP), although it has always been changing and upgrading the transition to MCCP is a huge step for all partners, most notably MSPs who have already been reselling Azure and other cloud services.
One of the fastest growing cloud marketplace companies in the world stated how so many companies have begun to rely on Microsoft for this service. Microsoft has since issued this as a response; “we have been preparing for this re-alignment throughout 2022 with a focus on ensuring our partners, who rely on our consolidated billing, automated provisioning, and PSA integrations, can take full advantage of Microsoft’s new approach, with no disruption to operations, and opportunities to attract more customers who are increasingly relying on cloud services.”
Meyer, an ex-senior executive at Microsoft explained that this is about much more than a name change:
“MCCP is a reflection of Microsoft’s vision and investment in cloud services, and their recognition of the overall modernization of IT across the entire digital supply chain,” Meyer said. “Way beyond the end-of-life for MPN Gold and Silver status, the MCPP is truly about driving new proficiencies in a cloud-first world as more discovery, procurement, delivery and management of technology is happening online, through marketplaces like ours.”
The new Microsoft Cloud Partner Program will aim to drive and promote partners' development in six technology areas:
This will further impact partners’ license in how they internally use and distribute Microsoft’s products from a ‘’Solutions Partner level’’ to ‘’specialisations and expert programs’’.
This is Microsoft’s response to accommodate for the rapidly expanding market, do you think it was the right decision?
by Gareth Streefland
The onset of the pandemic accelerated global firms’ plans to redefine how their businesses operated, in particular how they managed their wide...
The onset of the pandemic accelerated global firms’ plans to redefine how their businesses operated, in particular how they managed their wide area networks (WANs), with software-defined WANs flourishing and secure access service edge (SASE) emerging.
Software-defined WANs deliver clear benefits and have reached a maturity level that warrants consideration for customers with branch offices. However, enterprises must also weigh the challenges and have an accurate anticipation of SD-WAN advantages and disadvantages before they decide to adopt this technology.
Advantages of SD-WAN
Users always enjoy long term cost savings when using SD-WAN. Compared to a MPLS deployment, SD-WAN allows cost savings of almost 50%. Except for critical data, all the low priority tasks can be assigned to expensive links. And for the important tasks, expensive connectivity links can be used.
Whatever application that is used in SD-WAN, it is able to improve its performance. Each of the network traffic works differently. All the traffic those are critical and real time can be automatically routed to links with higher bandwidth. This ensures that there is less latency issues and packet loss which eventually leads to improved application performance.
Most of the networks are subjected to additional layers through the process of digital transformation. This often leads to poor network performance. SD-WAN is able to reduce this concept by simplifying the infrastructure. Moreover, it is necessary to consider looking for the right SD-WAN service provider with less capacity.
SD-WAN comes with various transport mediums all which can provide alternate paths. For an example, if the SD-WAN is two or more mediums. Imagine Fiber, DSL and LTE. In case of a failure, SD-WAN is able to use other two mediums.
One of the reasons why many companies prefer adopting to SD-WAN is its cloud access. Even if a branch is located remote, the employees can still access cloud applications. This too with improved application performance. When there is business critical applications, the traffic can be directed through the data center.
Disadvantages of SD-WAN
SD-WAN lacks when it comes to on-site security features. Although SD-WANs are equipped with some standards and methods for security, still it is not adequate enough. Therefore, a data breach in one single machine could affect the entire organization.
Businesses have a problem adapting to SD-WAN solutions. The existing staffs may find it difficult to understand this technology which rises the need to have skilled staffs. Now this can be expensive for companies with low budget. This is one of the reasons why business are still depending on old connections.
Not all the SD-WAN solutions are able to support WAN routers. If a SD-WAN configuration is used in a WAN router, its ethernet connection will probably interfere with WAN architecture. For preventing this, it is advisable to use methods like time-division multiplexing.
All the units and connections are centralized in SD-WAN. As a result, having a SD-WAN always creates new errors. In some instances, small errors resulting from incorrect configuration can cause major errors. Besides that, SD-WANs also experience jitters and packet loss.
On default, routers are equipped with the functionality to work without updates. But for routers those with SD-WAN configuration requires regular firmware updates.
If the updates are not provided, the routers may eventually experience failures or even stop working. These updates make sure that the routers are bug free and their functions are fastened.
by Dominik Bart
According to a report published by Dell Technologies and authored by the Institute For The Future (IFTF) and a panel of 20 tech, business...
According to a report published by Dell Technologies and authored by the Institute For The Future (IFTF) and a panel of 20 tech, business and academic experts from around the world, states that 85 per cent of the jobs that will exist in 2030 haven't even been invented yet.
"The pace of change will be so rapid that people will learn 'in the moment' using new technologies such as augmented reality and virtual reality. The ability to gain new knowledge will be more valuable than the knowledge itself," Dell Technologies said in the report Given the rapid pace of change in the workplace, particularly when we consider all of the things that have changed over the last ten years, such as social media, artificial intelligence, and automation, it, it doesn’t seem an unlikely statistic.
The work human beings do will continue to shift as some jobs become obsolete and new jobs emerge as technological advancement will replace outdated positions and produce new ones that combine human and machine collaboration. Moreover, the expertise and skill set we'll require in the future varies greatly from those we currently require. Soft skills will grow in importance as the demand for the thing’s machines can’t do continues to increase. However, the ability to understand and work confidently with technology will still be critical.
With that in mind, here are four digital skills you need to cultivate to thrive in the new world of work:
Digital Literally refers to the abilities required to learn, function, and get around in an increasingly digital world. We are able to interact with technology effortlessly and confidently when we possess digital literacy skills. This entails abilities like:
● Keeping on top of emerging new technologies
● Understanding what tech is available and how it can be used
● Using digital devices, software, and applications – at work, in educational settings, and in our everyday lives
● Communicating, collaborating, and sharing information with other people using digital tools
● Staying safe and secure in a digital environment
The fourth industrial revolution, which is presently underway, is characterised by numerous waves of new technologies that merge the digital and physical worlds. Consider the abundance of "smart" everyday items like watches and internet-connected thermostats that are available on the market.
Data literacy is one of the crucial talents we'll need in the future because all of that new technology is based on data.
A fundamental understanding of the significance of data and how to transform it into insights and value is known as data literacy. You'll need to be able to access the right data, work with it, interpret the results, share your findings with others, and, if required, challenge the data in a business setting.
Today, "technical talents" encompasses a wide range of abilities; future employers won't just require IT and engineering expertise. A wide range of technical abilities remain of utmost value even as the nature of work changes and processes become more automated.
Technical skills are essentially the practical or physical abilities required to do a task successfully. Although it is true that coding, AI, data science, and IT skills are in high demand, there is a far wider market for these skills. Being a plumber requires technical expertise. The same is true for truck drivers, nurses, carpenters, and project managers.
As new technologies emerge, we will require increasingly specialised technical skills in every business. As a result, you should be ready to constantly learn and concentrate on your professional development through a combination of formal education, training, and on-the-job training.
Digital Threat Awareness
The world is becoming increasingly digital, and cybercriminals are becoming more sophisticated and smarter This implies brand-new dangers that could significantly affect both our personal and professional lives.
Digital threat awareness refers to being aware of the risks associated with utilising digital devices and the internet, as well as having the tools necessary to protect your company and yourself.
Our digital fingerprints are bigger than ever since so many of our activities—from scheduling doctor visits to placing takeaway orders on Friday nights—take place online.
Digital threat awareness means understanding the biggest threats in our everyday lives, including:
● Digital addiction
● Online privacy and protecting your data
● Password protection
● Digital impersonation
● Data breaches
● Malware, ransomware, and IoT attacks
In order to reduce the dangers posed by these cybersecurity threats, we should all strive to have healthy relationships with technology and educate people on how to get the most of technology without letting it take over our lives.
by Lewis Andrews
According to Gartner, Inc., enterprise IT spending on public cloud computing will surpass investment on traditional IT in various market segments in...
According to Gartner, Inc., enterprise IT spending on public cloud computing will surpass investment on traditional IT in various market segments in 2025.
Only those enterprise IT categories within the markets for application software, infrastructure software, business process services, and system infrastructure are included in Gartner's "cloud shift" research. By 2025, traditional solutions will account for only 41% of IT investment in these four areas, while 51% will have moved to the public cloud. In 2025, cloud technologies will account for over two-thirds (65.9%) of application software investment, up from 57.7% in 2022.
As organisations adjusted to a new business and social dynamic during the past two years, the transition to the cloud has further intensified as a result of COVID-19. The risk of technology and service providers becoming obsolete or, at best, being relegated to low-growth areas is increasing, according to Michael Warrilow, Research Vice President at Gartner.
Traditional products will make up 58.7% of the addressable revenue in 2022, but their growth rate will be substantially slower than that of cloud. Long-term digital transformation and modernization activities will be accelerated until 2022, which will further accelerate the migration to the cloud due to demand for integration capabilities, agile work processes, and composable architecture. Technology product managers should use the cloud shift as measure of market opportunity.
According to Gartner, the migration to the cloud will affect enterprise IT investment of more than US$ 1.3 trillion in 2022 and approximately US$ 1.8 trillion in 2025. The development of new technologies, such as distributed cloud, will amplify the ongoing disruption of the IT industry by cloud. The distinction between traditional and cloud products will increasingly become hazy.
Enterprise adoption of distributed cloud has the potential to hasten the cloud transition since it expands the addressable market by bringing public cloud services into traditionally non-cloud domains. Due to its capacity to satisfy location-specific needs including data sovereignty, low-latency, and network bandwidth, organisations are examining it.
Gartner advises technology and service providers to actively target market segments where the move to the cloud is occurring in addition to looking for new, high-growth cloud possibilities in order to benefit from it. Infrastructure-related categories, for instance, are likely to grow more quickly than enterprise applications, a segment that has a high level of cloud penetration. With their go-to-market strategies, providers should also focus on certain personas, adoption profiles, and use cases.
by Lauren Greene
Who, what, where, when, why?
Despite common misconception, the concept of a metaverse isn’t a new one. First introduced in 1992,...
Who, what, where, when, why?
Despite common misconception, the concept of a metaverse isn’t a new one. First introduced in 1992, sci-fi writer Neal Stephenson coined the term 'metaverse' to describe a 3D virtual space. This idea was then realised for the first time in 2003 through an online multimedia platform called “Second life”.
Since then, there have been numerous examples of gaming platforms exploring the potential applications of this concept. For example, in 2020 the immensely popular video game Fortnite conducted a virtual Travis Scott concert within the game, and 12.3 million people worldwide tuned in. A more general example is any game within the MMORPG (Massively Multiplayer On-line role-playing game) genre such as World of Warcraft, where thousands of players can inhabit the same virtual space, with players logging in and out continually, and able to interact in various ways.
The Covid 19 pandemic has been a large extrinsic motivator for the growth of this industry, accelerating and driving the convergence of physical and digital. Companies invested heavily within collaboration and messaging technologies such as Teams, Zoom and Skype, and have now created a digital hiring, onboarding, and remote working world.
Meta, the rebrand of Facebook, and Microsoft, are leading the path for the metaverse alongside other large names in the tech industry which are all racing towards securing their name and real estate in the 3D VR world that will soon become a reality.
The evolution of emerging technology and digital transformations will see a huge transition for the main 3 pillars of human activity: Work, Education and Entertainment.
Over the years, Retail as an industry has taken a huge, and successful move onto online platforms, saving money for physical resources, allowing mediation of our activities remotely, and putting products in the hands of consumers worldwide. The metaverse could be the next evolution of this journey, allowing consumers to get that physical feel whilst they shop online from the comfort of their own homes.
Many companies are already looking at being a part of this virtual world and benefiting from a dedicated virtual space in which they can conduct interviews, doctors’ appointments and try on clothes without moving a muscle.
On a larger scale, geopolitics will see an impact, which could be both a help and hinderance to have present governing bodies for smaller counties but to also create communities transcending borders in reality.
Understanding how the Metaverse will be accessed
To first give a broad understanding of how the metaverse will be accessible, you first need to understand the different tech behind it. Extended Reality (XR) covers both Virtual Reality (VR) and Augmented Reality (AR) where VR enables you to fully immerse yourself in a 3D platform with the use of a headset whilst AR will overlay images onto the real world.
Whilst the metaverse doesn’t have to exclusively exist in XR, it’s the version of it that does that’s getting the most attention. This is because more immersive, experiential environments are central to the whole concept – something that XR interfaces lend themselves to very well.
Meta is focusing heavily on the VR aspects through its well renowned and recently bought hardware brand Oculus. 3D environments, avatars, and gamification – three fundamental aspects of the concept – all fit well with VR interfaces. And AR, too, with its potential to blur the distinction between virtual and real worlds, is another idea that meshes well with the metaverse concept.
2022 should see the release of Meta’s Horizon platform as an expanded VR world, this will be the first step into giving people a sensation of what the metaverse could become, and VR will be the window through which they experience it.
How will it ‘feel real’?
As a running trend for technology becoming smaller and more powerful, over the next few years we will also see this for VR which is a huge benefit for lighter headsets.
First seen in CES 2022 was the rebrand of the chunky VR sets to sleek and easily wearable AR devices which will be made available to buy over this coming year. HTC also made a device called the flow which is a slimmer stand-alone model making this device easier to use which focuses on entertainment and mental health.
AR devices will get lighter, too – California start-up Mojo-Vision has already demonstrated the potential for AR contact lenses that project information directly onto the retina.
Other innovations will attempt to solve the problem of enabling realistic movement within virtual environments (which will always be a problem if your actual environment doesn’t match the size and proportions of your virtual one and isn’t free of hazards that might cause you to trip over!). Proposed solutions to this problem include both boots, as offered by Ekto VR, and treadmills, like the one developed by Virtuix.
Another technology known as haptic feedback will attempt to solve the problem of providing sensations of touch in XR environments. One example is the Teslasuit that provides tactile feedback through electrostimulation. The suit currently costs around $20,000 and, among other uses, is used by NASA for astronaut training, but we can expect to see smaller-scale consumer versions on the market in 2022.
We can also thank the 5G rollout which is picking up pace in 2022 to become a mainstream proposition with speeds 20 times quicker than existing networks for data transmission. In addition to increasing this differential, the benefits also include different types of data and services. This is likely to include the large data volumes needed to run XR, making wireless and cloud-based VR and AR a possibility. Plutosphere, for example, and other start-ups offering similar services, let users stream VR games from cloud servers. This will dramatically lower the barriers to entry for many businesses wanting to deploy XR solutions without making large infrastructure investments.
How will this impact us?
Within education, XR technologies make it easier for students to visualize concepts – from the numbers used in accounting to historical events or even the inner workings of reality exposed through quantum physics – in interesting and engaging ways. Evidence suggests that when we learn through experiencing in this way, rather than simply reading dry facts, we can improve our knowledge retention by 75 to 90%.
Examples in a working environment include VR being used for training and to simulate operations in dangerous situations, such as the FLAIM system used to train firefighters to tackle wildfire and aircraft fires. AR is increasingly being used to provide real-time inputs to trainees during on-the-job learning, such as using computer vision-equipped glasses and headsets to recognize and warn of potential dangers in the work environment.
For businesses, AI will be able to inform target audience creation, creative optimization, and inventory forecasts.
In the agricultural world we have seen a ‘bovine’ matrix for happy cows testing in Turkey, where cows will experience a virtual open field and sunny setting rather than cooped up in a milking parlour which has proved results in higher quantity and quality of milk. Despite the positive results for farmers, the process raises serious questions about ethical farming. Would more milk be worth putting animals in a bovine matrix where they have no perception of the real world (a cooped-up milk farm with tens of other cows)?
Complexities and challenges of a new reality
Regulators will need to be put in place with facial expressions, blood pressure etc. being tracked for digital rights. On top of this if this is a pixelated replica of our universe, will this face balkanization as seen in our world where the internet already operates in different parts of the world.
Even more of a frightening thought is with a Metaverse containing so much private information, what risk is there for digital espionage and how much technical support will the Infrastructure and Security of a platform of this size need?
Control of data will also be the control of market. The opening advantage in the metaverse will go to those with the data to make the new virtual activities relevant to the user. The result is no different from the present online world in which those with the data hoard it to control the market.
Facebook algorithms are programmed to maximize user time on the site to maximize the number of advertisements that can be sold. As the algorithms are programmed to maximize engagement this means the algorithms send to each user news that is in line with their pre-established views, not news that creates a shared foundation. Even worse, is that one of the best ways to hold engagement is to create conflict and outrage, regardless of the veracity of the claim. This brings us around to the development of government-overseen behavioural standards protected consumer, workers, and competition in the industrial revolution—while simultaneously enabling a vibrant and growing economy. Where the digital revolution requires similar government-overseen standards. Facebook is currently discussing behavioural standards for the metaverse, but it is not sufficient. Many people are looking to distract from our current challenges with the shiny new metaverse, however we have yet to resolve the challenges in the current online universe—problems that will simply metastasize into the metaverse if not dealt with.
by Charlotte Robinson
Microsoft launched Windows 11 on the 5th of October 2021 as a free upgrade. Throughout the previous 3 months, I have had many interesting discussions...
Microsoft launched Windows 11 on the 5th of October 2021 as a free upgrade. Throughout the previous 3 months, I have had many interesting discussions with candidates on whether Windows 11 is as good as it has been made out to be. Throughout this article post, I will discuss some of the benefits and disadvantages of Windows 11 and everything you need to know to make the decision on whether it's time to upgrade.
Microsoft has made it clear that Windows 11 is available to all. There is no additional cost associated with installing Windows 11. However, it is not available to everyone because the update is only compatible with a Trusted Platform Module 2.0 and an Intel Core 8th generation processor that was released in 2017. As a result, most PCs older than four years will be unable to download the update. Since Windows 10 will only receive one upgrade per year until 2025, when it will be retired, this is a major issue for businesses using older technology. Companies have only three years to change their computer hardware as a result of this.
Despite the fact that the update is difficult to obtain, it has its advantages. For gamers, it features automatic HDR, which enhances the vibrancy of game pictures, and direct storage, which allows the graphic card and the Solid State Drive (SSD) to communicate more quickly.
Additionally, given Microsoft has chosen a new MacOS-style taskbar, it should be easier for MacOS users to navigate Windows 11. Unlike MacOS, which allows you to pin the task bar to any of the four corners of the screen, Windows 11 only allows you to pin it to the bottom, which could be inconvenient. Furthermore, customers have been perplexed by the fact that they are unable to see their live programmes on the task bar, making navigating more difficult.
As well as the new tool bar, Windows 11 will also come with a “Microsoft Chat” App, very similar to iMessage and Facetime from Apple. The Chat App uses the users Phone Number or Email-ID to enable the chat feature.
One of my favourite new features will be the various Window Sizes; by that, I mean that Windows 11 has "Snap Layouts" that allow you to have multiple applications or documents open on your screen at the same time. As someone who works in a second language, I find that online dictionaries are my closest friend. Having a dictionary and a document open on the same screen at the same time will help tremendously. Individuals will be able to get more work done as a result of this feature, as they will be able to view a greater variety of jobs they are working on. Home office plays a key part in our working lives at the moment with not all of us having access to multiple screens, “Snap Layouts” provides us with an alternative. On the other hand, having more tabs open may lead to more distractions because you are not focused on a single job.
"Edge Browser" is the preferred browser for Windows 11. Sleeping tabs are available in this browser, allowing you to save memory and Central Processing Unit (CPU) usage. This means you have the ability to re-open the apps you had the previous time you turned on your computer. This has the advantage of allowing you to pick up just where we left off, but it also implies that if we want to start fresh the next day, we must ensure that all apps are closed at the end of the day.
I am really excited to be able to use the new Windows 11. I look forward to using the new taskbar, the “Snap Layouts” and the setting to have my last opened applications open again when I start in the morning.
by Chris Burnett
When it comes to IT, companies must make critical strategic decisions all the time. In doing so, it is essential to keep an eye on industry trends...
When it comes to IT, companies must make critical strategic decisions all the time. In doing so, it is essential to keep an eye on industry trends and developments. Looking ahead to 2022, there are several themes that have emerged because of the pandemic, as well as some that come up year after year.
In this article, we've compiled a list of our top IT trends for 2022, as well as looking at the overall direction in which the information technology market is moving.
With more staff working remotely and the cloud becoming the norm, it's critical for businesses to start thinking about network security in new ways. Cybersecurity mesh is a flexible architecture that combines best-of-breed, stand-alone security solutions to improve overall protection. It enables organisations to separate policy decision-making from policy enforcement: a cybersecurity mesh creates security perimeters around individuals rather than just the company. Organisations will be better equipped to protect data and information using this mesh technology, including what's inside the facility walls as well as what's on the outside.
Data is one of a company's most valuable assets. To be able to carry out operational and transactional activities reliably and cleanly, it is vital to maintain excellent data quality. The "cleaner" the data, the more accurately, solidly, and confidently it may be examined and used to make business decisions."Data fabric," according to Gartner, is a design idea that acts as an integrated layer, or fabric, of data and processes. Data fabric makes use of both human and machine skills to access data that is already in place or to facilitate data consolidation when necessary. It allows for the flexible and reliable integration of data sources across platforms and business users, ensuring that data is available wherever it is needed, regardless of its location.
Gartner defines PEC as featuring three technologies that protect data while it is in use. These technologies include:
- A trusted environment where sensitive data can be processed or analyzed.
- Performs processing and analytics in a decentralized manner.
- Encrypts data and algorithms before analytics or processing.
With this trend, organizations are empowered to conduct research securely across regions and with competitors without betraying their confidentiality.
According to Forbes, PEC allows different parties to extract value and achieve significant results from data in untrustworthy environments, letting them to interact without disclosing personal or sensitive data. According to Helpnet Security, as privacy and data protection legislation become more prevalent, more breakthroughs in data privacy have been created. PETs uses privacy-protection to extract value from data in a safe manner without jeopardising confidentiality, using a data-driven approach to security and privacy.
For a long time, Hyper Automation has been spoken about in aspirational terms, with the technology being dubbed '"the next frontier for organisations globally" by Deloitte. It's been featured on Gartner’s top 10 key technology trends for 2020 and 2021 and according to Gartner, during the next year, 85 % will enhance or maintain their hyperautomation investment strategy. Hyper automation is a method for quickly identifying, vetting, and automating as many business and IT activities as possible. The faster provisioning and utilisation of IT infrastructure saves time, people resources, and money. Employees will be able to focus on more critical / strategic duties as a result. Additional benefits include reduced error rates and faster scaling of various IT infrastructures, whether on-premises, in the cloud, or hybrid.
Cloud computing surged in 2020 and 2021 as businesses turned virtual to adapt to the worldwide pandemic by focusing on digital service delivery. In 2022 we will undoubtedly witness further rapid acceptance and growth in 2022, with predictions from Gartner, global spending on cloud services is expected to reach over $482 billion in 2022. Cloud-native platforms take advantage of cloud computing to provide enterprises with elastic and scalable capabilities that allow them to respond quickly to digital change. Cloud-native solutions are an improvement over the typical lift-and-shift approach to cloud, which loses out on the benefits of cloud and adds complexity to maintenance.
Every day, the world generates approximately 2.5 quintillion bytes of data, and this figure is growing at an exponential rate. However, the effectiveness of that data is limited by the processes in place to manage, control, and assess it. Because this massive effort is practically impossible to complete manually, businesses therefore turn to artificial intelligence (AI). To make AI delivery more efficient, AI engineering automates data, model, and application upgrades. AI engineering, when combined with robust AI governance, will operationalize AI delivery to assure its long-term economic value.
By addressing common business challenges, the top strategic technology trends will advance digital capabilities and generate growth. Different trends will have different impacts on people organisations. Because most of the trends are tightly intertwined, different combinations of technology are likely to be necessary to compete at different stages of the company growth cycle.
by Matthew Bell
At nearly 18 months into the pandemic, numerous lockdowns, multiple vaccinees and a completely new way of working – it’s safe to say that...
At nearly 18 months into the pandemic, numerous lockdowns, multiple vaccinees and a completely new way of working – it’s safe to say that the world has changed quite drastically.
Technology has been a huge enabler of this change. Microsoft’s Brad Smith said two years of digital transformation took place in the first two months of the pandemic.
As England emerges from lockdown with a promise of a return to “normality”, which of these tech innovations will stick?
Perhaps the most notable “new tech” is the increased use of video calling, not only as a work tool, but also to stay connected to our loved ones. So much so that Zoom became a verb.
While Zoom-fatigue did hit hard and the thought of another virtual pub quiz is a little sickening, it’s clear that video calling is is a welcomed tool in the workplace, if not in our personal lives.
Unsurprisingly, in-person interactions with friends and family are preferred to virtual ones, but the use of Zoom, Teams and other video conferencing tools have facilitated the new era of flexible working. It’s safe to stay that Zoom is here to stay, whether we like it or not.
Cyber-criminals have had a field day since the pandemic started. Businesses globally were forced to adopt a remote working model where employees were often working from personal PCs, laptops and phones with limited antivirus software.
The ever-growing amount of data breaches means an ever-growing demand for cyber-security professionals. The unemployment rate in cybersecurity has been at 0% since 2011, so the responsibility lies with businesses, organisations and educational programmes to upskill people in the skills needed to fill the gap.
There will always be people looking to exploit a situation. As users of tech, we must remain diligent to phishing attacks, while keeping our devices updated and secure.
Fitness and wellness apps
As gyms remained closed for large parts of the pandemic, people looked for new ways to remain fit and healthy. Apps such as Strava and Nike Run Club were downloaded in mass.
Strava went from just over 2 million sessions each week pre-pandemic, to over 6 million sessions by May 2020. This figure remained even with the reopening of gyms.
While the gym isn’t going anywhere yet, it’s clear that people’s exercise habits have changed. Perhaps it was the efficiency of a home workout vs going to the gym that has kept the momentum going.
Awareness around mental health rose in 2020 as months in lockdown took their toll. Mindfulness and meditation apps such as Calm, which raised new funding at a $2 billion valuation in December 2020, were downloaded globally to combat the lockdown-lows.
The fact that these apps have held on to their users throughout the past 18 months points to a shift in the way we manage our fitness and wellbeing.
With so much uncertainty around what the immediate future will look like, it’s difficult to determine whether the tech we use today will be relevant tomorrow. Certain habits from the past 18 months were indeed welcomed and here to stay – many of which were enabled by technology.
written by Evangeline Hunt
by Leonie Schaefer
Once again, social media platforms are facing calls to tighten regulations on their platforms, following the hurl of racial abuse to members of the...
Once again, social media platforms are facing calls to tighten regulations on their platforms, following the hurl of racial abuse to members of the England football team. After losing to Italy in the final of the Euro 2020, certain players received swarms of abuse on social media, which critics say lies in the hands of these platforms to regulate.
London Mayer Sadiq Khan directly called on social media platforms to ‘act immediately to remove and prevent this hate’.
What kind of responsibility do these platforms have to prevent the spread of hate? Is there a way to leverage automation and machine learning to make this job easier?
Traditional media in the UK has an agreement with regulator Ofcom that makes them accountable for any form of abusive response to content. For example – a racist comment left on a BBC News article – the BBC would be accountable.
Ofcom doesn’t have this agreement with social media platforms because they aren’t considered to be publishers or broadcasters. These platforms remain self-regulating, so the question of accountability remains a grey area.
The difficulty these tech giants face is the huge volume of user-generated content, which swamps the efforts of human moderators employed by these platforms. It’s not expected that human moderators can sift through every piece of content, as soon as it’s posted, to see if it contains hate. The solution has to be automation.
We can already see social media platforms utilising automation to prevent misinformation around COVID-19. For example, Instagram immediately fags any content that contains information about COVID, and points users to the World Health Organisation for accurate advice. Critics have suggested this same technology be used to detect racist and abuse content.
Automation is already built into the algorithm in this way, such as a blanket banning of certain hashtags and words. But it can only do so much. Automation is currently unable to understand context, nuance, different cultures, etc. A certain emoji may not be offensive if said to one person, but when the context is different, the intention also changes. Instances such as this is where automation fails.
So what is the solution? Stopping trolls from posting hate on these platforms is of course, the ideal solution. But alas, an impossible ask. The more likely solution will take time – develop automation technology that is intelligent enough to detect the context of hate. Until then, there remains some power in the hands of users to report hate content when they see it.
by Jamie Fitzgerald
Many people have been working remotely for over a year now. While it was initially seen as a temporary solution to lockdown, it is becoming clear...
Many people have been working remotely for over a year now. While it was initially seen as a temporary solution to lockdown, it is becoming clear that flexible working is here to stay.
For some organisations, the logistics of remote work was already set up. For others who previously had no remote workers, it was more of a challenge.
In this heavily candidate-driven market, employers need to offer flexible working to attract the best talent. Utilising IT Infrastructure can help businesses implement a successful remote working strategy, while also minimising security and cost issues associated with remote work. Below, we share our top tips on how this can be executed.
Keep security tight
Security threats are amplified when employees are working remotely. Networks operate from beyond the firewall, making them difficult to secure. Some employees are working from their personal devices, which may not have any kind of antivirus software installed.
According to CIO.com, 20% of organisations have fallen victim to a security breach since the start of the pandemic that was directly linked to remote working. An unsurprising statistic, given the new open-door that hackers were gifted with when people started working from home.
To prevent potential security threats, businesses will need to secure the infrastructure and software used by employees when working remotely. One way to do this is to use a centralised desktop environment through the cloud. Working inside a secure cloud environment means that all data remains within the cloud, reducing the chance of potential cyberattacks.
Invest in collaboration tools
Keeping employees connected while working remotely is essential for a happy and engaged workforce. Remote work can sometimes feel lonely, so investing in a business-wide communication tool, such as Teams or Slack, makes collaboration easy and efficient.
Given that remote working is here to stay, scheduling time for virtual coffee breaks can help keep company culture thriving.
Offering a user-friendly way to work remotely is essential to ensure that employees can connect to IT resources when out of the office.
Using a cloud desktop rather than a virtual desktop infrastructure (VDI) means that a service provider will host your applications in the cloud, reducing any downtime from a weak network connection. A cloud desktop will make it easier for employees to access everything they need on any device, from any location.
Reduce unnecessary hardware using the cloud
Maintaining the hardware of remote employees can be a big challenge. If laptops need maintenance when employees are working from home, it can be difficult to facilitate this.
This goes hand in hand with IT issues in general – any form of hardware/software issue is more time consuming to solve remotely.
Employers can combat this by minimising the amount of physical equipment that their employees need to work from home. As previously mentioned, using a cloud desktop is an easy way for workers to access files and applications from their own devices, while still ensuring everything remains secure. The only resource needed to log onto a cloud desktop is a web browser, making it an accessible option for most.
Reducing the amount of hardware needed can also work to keep costs down. Trying to recreate the whole IT infrastructure of the office in each employee’s home can be costly. The cloud desktop will enable employees to access their workstations without the need for expensive equipment.
The future of the office remaining relatively uncertain, but one thing that we can be sure about is that most employees are keen to keep some aspect of remote working in their schedule.
With the help of IT Infrastructure, businesses can successfully implement a productive remote working strategy to meet these needs, while remaining secure and cost-effective.
We partner with businesses globally to deliver top IT Infrastructure talent that is essential for enabling a post-covid workplace. Are you looking to grow your IT Infrastructure team? Get in touch today to find out how we can assist you!
by Anthony Ham
The Internet of Things (IoT) is growing rapidly, as more and more devices become connected each year. IoT is powering many areas of our lives –...
The Internet of Things (IoT) is growing rapidly, as more and more devices become connected each year. IoT is powering many areas of our lives – from lightbulbs, wearable tech, to the creation of complex Smart Cities – automating day-to-day processes.
Besides consumer advances, IoT is becoming an essential component of successful and cost-effective business transformation.
Given the consistent growth of IoT, Business Wire predicts that the global IoT market will reach $1.1 trillion in revenue by 2024, with 80 billion connected devices.
How are we using IoT in our daily lives? And where do we expect it to take us looking forward?
What is IoT?
IoT is the connection of multiple appliances/objects to each other and the internet, which are monitored remotely. These devices are interconnected and track and receive data, which is then processed in the cloud.
A smart home is an example of IoT – appliances such as the thermostat, doorbell and security system can sense their surroundings and interact with one another, which can be monitored over a mobile app.
This involves complex communication between devices and accurate processing of data. Sensing devices are used to monitor things such as temperature, humidity and water level.
IoT in the world
Complex uses of IoT already exist in today’s world. Amazon’s fully automated supermarket where you can “just walk out” uses IoT technology to fully automate the whole shopping experience. You scan a barcode when you walk in and then there is no need to scan or pay for any items.
Smart Cities are being created across the globe, where IoT tech is used to monitor everything from traffic, recycling and energy use. Citizens interact with a smart city through their smartphones, connected cars and homes. The smart city can do things such as cut costs of energy, improve sustainability and manage traffic flows.
Like with many industries, the Covid pandemic highlighted the true potential of the IoT, as it was used for things such as enabling remote operations to manage distancing policies.
One example of this is the NFL, who used wearable connected sensors to manage the safe return of players and staff. Connected through IoT, these sensors provided real-time data on the movements of everyone in the stadium – meaning if someone tested positive for COVID-19, the data could determine who needed to isolate.
As with all growing technologies, there will always be potential problems and setbacks. IoT relies on a speedy and reliable connection as it often analyses data in real-time, meaning network issues can impact how well IoT performs.
As more and more devices are connected, some networks are unable to manage the increased traffic. The ability to scale as demand grows will be essential if businesses want to continue to digitally transform.
Perhaps the most obvious problem is the security issues that come with numerous connected devices. Poorly secured IoT devices are a common target of hackers, as one unsecured device can act as a portal to the whole network.
Organisations can manage this by delivering security functions through the cloud, to ensure that all devices will receive the same level of security.
Looking forward, it’s clear that the potential of IoT is exponential. Smart living and smart cities are already embedded in society, and will only continue to grow.
Where else do you see IoT being utilized in the future?
by Steven Ewer
Video calls and online chats are important social tools for many of us, so why not use them for business too? At a time when meeting face-to-face is...
Video calls and online chats are important social tools for many of us, so why not use them for business too? At a time when meeting face-to-face is being discouraged in a bid to contain the outbreak of Covid-19, many firms are doing just that and using virtual methods, such as video conference calls, to encourage business continuity.
In the recruitment business, interviews are key. They are the chance for candidates to meet their potential employer, get a feeling for the people and the business, and also to showcase who they are and what they can do. For employers, they are the chance to meet the potential employee, get a feeling of whether they would fit in with the office culture and obviously, to quiz them about their skills and experience. Doing this over the phone or by video link rather than face-to-face is a very different proposition.
Remote interviews can save time and stress
“Remote interviewing is nothing new,” says Steven Ewer, head of Franklin Fitch’s UK and US operations, adding that many of his clients have been using it for the initial interview stage for a long time. “Collaboration tools are so strong that actually there is no reason why the quality of your interview process needs to change.”
In reality, remote interviews can save time and stress both for the candidate and the company. Individuals need to set aside less time as they don’t have to travel and can fit a video call into a lunch break or even before work. Similarly, companies can schedule more interviews if they don’t need to spend time showing each person into the office.
That however, is a concern for some people. Steven says he has clients who are concerned that candidates want to see what the office environment is actually like and there is also the issue of how you check technology knowledge that would normally be tested in the confines of a controlled environment. In actual fact, he believes the company culture is the people and you can get a good feeling for that from a video call.
Treat it the same as any interview
“You need to treat a video interview in the same way you would a face-to-face interview,” says Steven, adding that many people forget they can be seen and can become easily distracted. He believes a video interview is preferable to a phone-only interview as it not only helps concentration and focus but you also get a better sense of the individual’s character. He does point out however, that it can be harder to gauge reaction and that body language is hyper-exaggerated on screen – not a big issue, but something to be aware of.
“And if you really want your candidates to see the office, the technology is there,” he says. “You can do virtual walkthroughs if you want and thanks to Google it is now even possible to see into buildings.”
“You don’t miss much by interviewing remotely,” he says. “It’s more of a mental issue.”
Companies need to adapt their hiring processes
Given the current situation – many European countries and much of the US is on lockdown and the majority of office-based staff are working from home, face-to-face interviews are a no go for the time being. Companies that want to hire – and there are still plenty of them – will have to change their recruitment processes and adapt.
There are signs this is already happening. Global downloads of business apps that facilitate remote interviews and working such as WeChat Work, Zoom, Microsoft Teams and Slack have risen nearly five-fold since the start of the year, according to data from app analytics firm Sensor Tower. In the first week of March there were 6.7 million new users across the App Store and Google Play, compared with 1.4 million in the first week of January.
So, gone are the days of being judged on your pre-interview handshake. Now, if you get it wrong, it’ll be the quality of the video backdrop that you’re remembered for. So don’t forget to move away from the drying washing!
We're still hiring
For anyone looking for a position in IT infrastructure or companies with roles to fill, we are still here and busy making the most of the technology on offer to continue hiring both for ourselves and clients as normal. Give us a call on 0203 696 7950 or email firstname.lastname@example.org.
Remote interview advice for candidates:
Remote interview advice for interviewers:
by Claire Shoesmith
by David Annable
It’s official, the coronavirus is here. Yesterday the UK Prime Minister advised people to avoid non-essential travel and where possible to work...
It’s official, the coronavirus is here. Yesterday the UK Prime Minister advised people to avoid non-essential travel and where possible to work from home to help slow the spread the of the Covid-19 virus that has already killed thousands of people around the world. Many European countries and parts of the US are already on lock-down. At Franklin Fitch we are heeding the advice and from today, most of us are working from home.
Thanks to technology such as Skype, Microsoft’s Teams and Zoom Video Communications, to name but a few, remote working is relatively simple. Provided you have access to a computer and an internet connection, most people can continue doing their job in the same way they would in an office. Meetings, document sharing and even interviews (we will return to this in a separate blog) can all be done remotely online – it just requires a bit more planning and perhaps a little more discipline from the individual workers to ensure they remain engaged and motivated.
It's about collaboration and communication
Some companies had already made the decision for their employees to work remotely before yesterday’s announcement, but it was one that was not taken lightly at Franklin Fitch. Ultimately we are a business built on collaboration and communication, and while this can be successful at a distance, it is something that David Annable, the firm’s founder, believes is even better done face-to-face.
“We are all about collaborative working,” says David. “And what’s the easiest way to achieve that? – to sit at a desk with other people.” For him, there are huge benefits to sitting in an open-plan office surrounded by colleagues doing a similar job. As well as the collaborative aspect, he believes the learning and emotional support provided by nearby colleagues is very important.
“Being present in the office means you are more aware of what is going on with your colleagues and are able to see the visual clues to help you provide the right emotional support at the right time,” he says.
People can work just as well remotely
Still, the government advice is very clear and we fully support the move to reduce close contact in the office, especially when our employees can do their job just as well remotely. We will continue to offer the same level of training and support to our staff and engagement with our candidates and clients via email, phone and video conferencing.
For many, flexible working is nothing new – in fact, according to a study by business payment advisers Merchant Savvy, 61% of global companies already allow their staff to work remotely for at least some of their working week. But for those who usually travel into an office each day and not only enjoy the company of, but also learn from, the colleagues sitting around them, the isolation of home working can be difficult. We at Franklin Fitch are very aware of this and will be keeping in close contact with all our employees, candidates and clients to ensure that not only business continues as usual, but also that their health, both mental and physical, remains strong .
We are open for business
Contact us on 0203 696 7950 or email email@example.com
by Anthony Ham
Since the advent of Uber’s cheap ride-hailing service in 2009, fears over the replacement of traditional jobs with technology have been...
Since the advent of Uber’s cheap ride-hailing service in 2009, fears over the replacement of traditional jobs with technology have been steadily increasing. Whilst Uber’s rise doesn’t wholly depend on automation (one-tap-app wizardry notwithstanding), it brings into focus the important question of whether the evolution of technology, and with-it self-healing networks, comes at the cost of well-established jobs.
At first glance, the idea of a ‘self-healing’ network seems to logically imply that fewer engineers are needed; after all, if it can fix itself, what’s left for the engineer to do? According to Michael Bushong, Vice President of Enterprise and Cloud Marketing at Juniper Networks writing in NetworkComputing.com, the answer isn’t quite so simple. “Automation is about growing, not cutting,” he says, adding that the goal of automation is to grow and support scalability. As the company grows, it will in turn need to increase its headcount, not reduce it.
Technology is changing, and engineers need to change with it
David Mihelcic, the Federal Chief Technology and Strategy Officer for Juniper Networks writing in Nextgov.com, says the move to automation will redefine a network specialist’s remit to focus on software programming rather than network management. In effect, technology is changing, and engineers need to change with it, he says. This might not be palatable to everybody though, for the obvious reason that many specialists are happy with their role as it is. But network engineers, of all people, are used to technology constantly adapting - obsoletion is a core part of the industry, so they should be happy to go with it.
It goes without saying that the shift to a software focus is massive. Those who wish to remain more hands-on and hardware focused will still obviously have a place, however, as these upgrades can’t be performed by AI. The competition for these roles will arguably be lower, too – network specialists who wish to pursue a more software-defined track, and even those on the fence, will be won over by the inevitably higher rates and salaries on offer. SDN and machine learning specialists are in high demand, and understandably companies are willing to pay more for such skillsets.
Somebody still needs to automate the job
So, the answer to the question of whether engineers will still have a job once networks are fully automated is most likely yes, they will. As Bushong points out, a business’ ultimate goal is to scale up, and when the business scales the network will too – and that’s something that can’t be automated. The goal of automation is to aid scalability, and scalability entails more jobs. Another factor is risk: in an enterprise-scale network, there are a lot of variables that can and will go wrong. According to Gartner, network downtime can cost on average $5,600 per minute. 10-20 minutes of downtime, and a fully automated company will likely be rethinking whether it was a good idea to cut back on network engineers.
With all that said, the spectre of automation is not unique to IT. A study by PwC estimates that 30% of jobs are at potential risk of automation by the mid-2030s. This only suggests that the job could be automated, however. Somebody still needs to automate the job, and to remain on hand to make sure the automation goes smoothly - lending more fuel to the fire that an engineer may need to shift their focus, not necessarily be replaced.
To date, we’ve managed to keep Skynet (the fictional AI supercomputer from the Terminator movies) at bay. It seems that, at worst, engineers will be forced to adapt and take a more software-centric approach to networking, picking up some programming along the way. Fears of automation are spread across every industry, but perhaps the theories of job replacement can be mitigated by adaptation.
by Dafydd Kevis
Cyber crime is impacting users across the globe. As individuals and businesses increasingly rely on internet-connected devices, malicious attackers...
Cyber crime is impacting users across the globe. As individuals and businesses increasingly rely on internet-connected devices, malicious attackers continue to take advantage. Now, more than ever, we need to be on high alert. The UK is far from immune to the impacts of cyber crime and is feeling the effects of various threats such as ransomware attacks, data breaches, and online fraud.
The CyberEdge 2022 Cyberthreat Defense Report (CDR) provides a breadth of insight into cyber security in countries all over the world. It found that in the UK, 81.4 percent of organizations had experienced at least one cyber attack in the year prior to the study, compared to 71.1 percent in the previous annual findings.
CyberEdge also investigated the rate at which companies were hit with ransomware attacks. Well over half (73 percent) of UK organizations dealt with a ransomware attack, a 15 percent rise on the previous year.
UK organisations experienced an average of 788 weekly cyber attacks across 2022, marking a 77% increase from 2021. New figures from Check Point highlight the growing severity of cyber threats in 2022, with attacks surging by 38% compared to the previous year. The global volume of cyber attacks also reached an all-time high in the fourth quarter of the year with an average of 1,168 weekly attacks per organisation. “Cyber attacks are increasing worldwide, with 38% more cyber attacks per week on corporate networking in 2022 compared to 2021,” said Omer Dembinsky, data group manager at Check Point. “Several cyber threat trends are all happening at once.”
So, what should businesses be doing about this? Cyber security is one of our focus areas at Franklin Fitch and as a recruiter, I am frequently asked by service providers and large enterprises to find people with experience in multi-context firewalls. Quite often when I ask candidates if they have used them, the response is: “what is that? “or “I’ve never heard of it”.
For me personally, a lot of my technical knowledge is gained from in-depth conversations with my candidates about how they use a specific piece of hardware and what benefits it brings. So, if you, like me, are wondering what multi-context firewalls are, read on and find out more.
Cisco ASA supports multiple firewall contexts, also called firewall multimode or multi-context mode. Multi-context mode divides a single ASA into multiple virtual devices, also known as security contexts. Each context operates a single device, independently from other security contexts. In routers, this is similar to Virtual Routing and Forwarding (VRF).
When would you use multiple security contexts?
A network that requires more than one ASA
A service provider that needs to offer a different security context to each customer
An enterprise that needs to provide distinct security policies for each individual department or users and require a different security context for each one
When wouldn’t you use multiple security contexts?
When VPN Services are required such as remote access or site-to-site VPN tunnels
If dynamic routing protocols are required
If QoS is needed
If multicast routing needs to be supported
If threat detection is required
Context configuration files
In multi-context mode, there are three types of configuration files:
The system configuration – a standard single-mode configuration where the network administrator adds and manages the security contexts
The admin context – no restrictions and can be used as any other security context
The context configurations/user context – for each individual security context. They contain the security policies and interface configurations specific only to that context
ASA Packet Classification
Packets are also classified differently in multi-context firewalls. In multimode configuration, it is possible for interfaces to be shared between contexts, therefore the ASA must distinguish which packets need to be sent to each context.
The ASA categorises packets based on three criteria:
Unique interfaces – 1:1 pairing with a physical link or sub-interfaces (VLAN tags)
Unique MAC addresses – shared interfaces are assigned Unique Virtual Mac addresses per virtual context, in order to alleviate routing issues, which complicates firewall management
NAT configuration – if the use of unique MAC addresses is disabled, then the ASA uses the mapped addresses in the NAT configuration to classify packets. This isn’t very common
In certain cases, you may need to assign a unique MAC address to a shared interface in order to alleviate routing issues, which complicates the firewall management.
Multi context mode offers active/active fail-over per context. Primarily forwards for an individual context and secondary for another. The security contexts divide logically into failure groups, with a maximum of two failure groups. There will never be two active forwarding paths at the same time.
Important to consider
In order to change from single mode to multiple mode or back, the commands must be done from the command line (CLI) and not via the ADSM GUI interface. When changing from single to multimode, the ASA will convert the running configurations into two files, creating a new system configuration file and an admin context file. The original system configuration file is not saved.
By default, all security contexts have unlimited access to the ASA resources. Depending on the environment, resource management may need to be configured to limit some contexts that may be starving other contexts. This is done by configuring resource classes when assigning to contexts.
Multimode offers advantages in certain situations particularly for service providers or an enterprise with multiple departments that require individual security policies. The requirements should be carefully considered before implementing the solution. However, there are also limitations and whilst the number of physical devices you manage may decrease, the complexity of those device configurations may increase.
by Charlotte Drury
A new year, a new you, or so the saying goes. For some this will mean a new job, for others it will be new resolutions, but for the remainder, it...
A new year, a new you, or so the saying goes. For some this will mean a new job, for others it will be new resolutions, but for the remainder, it will simply be a continuation of the same, picking up where they left off sometime before Christmas. Even if it’s the latter, there’s no room for complacency. The IT world is constantly changing, and so should you if you want to keep on top of your game and get the most out of 2020.
Whilst we at Franklin Fitch have many skills, unfortunately crystal-ball reading isn’t one of them. However, being involved in two of the fastest moving industries – IT Infrastructure and recruitment, we have no doubt that 2020 is set to be an exciting year. So, what do we expect the first year of the new decade to bring, and more importantly, what can you do to ensure you stay ahead?
Here we look at the five top trends we expect to be dominating the market over the next 12 months and how we believe you can use them to your advantage.
There are several reasons for this: unemployment is at its lowest rate for more than 40 years (the latest figures from the UK’s Office of National Statistics (ONS) released in December show the unemployment rate fell to 3.8%, its lowest level since 1974) and the ongoing uncertainty surrounding Britain’s departure from the EU. The upcoming change to the IR35 legislation is also having an impact, but we will examine this in more detail in another article.
Finding individuals with the required skills and experience to fill roles in cutting-edge sectors, such as serverless and cloud technology, DevOps, containerisation, networking and cyber security has never been easy, but it’s now harder than ever. Not only are there not enough Britons out there seeking these positions, but we are now faced with a likely shortage of skilled migrant workers thanks to the uncertainty around Britain’s future immigration policy. While there is much talk of an Australian-style point-based system, which would allow those with the necessary skills to take these roles, David Annable, Franklin Fitch’s founder, says that all the uncertainty is reducing the attractiveness of the UK as a place for non-Britons to work.
While the tight market makes it more difficult for businesses looking to hire highly-skilled security architects, network engineers or chief information (security) officers, it is also an opportunity for the UK’s top technology talent.
The knock-on effect of a shortage of candidates is obviously an increase in salaries. With fewer people to fill the roles, particularly in the highly-skilled areas of networks, servers, security or data, it goes without saying that those individuals capable of doing the job will need to be paid more to attract them to, and keep them in, the role.
Another feature of a tight employment market is that it places the power very firmly in the hands of the candidate. Employers will need to work harder to attract and retain the right people, says Annable.
Training and development will be key to ensuring employees remain engaged and hopefully prevent them being enticed away to other roles. In our 2019 Market and Skills Report, the opportunity to progress featured highly, just behind salary, in the rankings of what candidates consider to be most important when choosing a new job.
Getting the right work-life balance has long been a talking point. While no definitive solution to the age-old challenge has been found, organisations have become much more open to alternative ways of working, including flexible hours, job sharing and the option to work from home. This is understandably not an option for all roles, but in today’s tight job market, organisations are going to have to pay more attention to the requests of individual employees and seek to accommodate their demands to attract the top talent. Again this offers a great opportunity for job seekers.
Improving diversity and inclusion is not just a box-ticking exercise. Organisations are at last starting to realise the benefits of a diverse workforce. According to the latest figures from the UK’s Office of National Statistics (ONS), just over half of the 6.5 million Britons working in professional occupations are women. While this is indeed progress, it has unfortunately not filtered through to the IT and telecommunications’ sectors, where the ratio is just one in six.
However, the IT sector fares better when it comes to ethnic diversity, with the latest ONS figures showing that of the 1.84 million professionals who work in science, engineering and technology, 85.1% are white, compared with 87.6% across the UK workforce as a whole.
While the debate rumbles on as to how to achieve increased diversity in gender, ability, ethnicity and sexual orientation, you can expect organisations to try their own variations of quotas and targets to help achieve their goal. For some individuals, this will be an opportunity.
To conclude, there is no doubt that the tight employment market offers highly-skilled IT candidates the chance to shine and move ahead of the curve, but they aren't the only ones. The market situation also creates a significant opportunity for recruiters to face up to the challenge of finding the right person for the right role in a market where organisations themselves are likely to struggle.
If 2020 is looking like a good year for candidates, then it's also not looking too bad for recruiters.....
by Leonie Schaefer
Diversity and inclusion are very important topics for businesses across all industries. We want to shine a light on the topic specifically for those...
Diversity and inclusion are very important topics for businesses across all industries. We want to shine a light on the topic specifically for those working within IT Infrastructure.
We’ve seen a lot of women in tech initiatives over the years yet still only 10% of participants in this market and skills report were female. Although we were hoping that this is not a representative number, day to day conversations with industry specialist show a similar result.
We are supporting events like CYBERWOMEN 2019 in Germany and hope that initiatives like these will give women and girls the confidence to take on a career in IT Infrastructure.
Although we are huge fans of initiatives encouraging women and girls in tech, we think that this is not enough. Diversity & Inclusion is not only about the female-male divide. It is about tackling biases based on gender, race, religion, ethnicity, disability, sexual preference and age (just to name a few) and ending discrimination completely.
We would like to provide a platform for those working within or interested in IT Infrastructure to share their experiences with us and to come up with possible solutions together.
We are conducting interviews with industry experts who are willing to give us their opinions and insights on diversity and inclusion within IT Infrastructure.
Interested? Contact Leonie Schaefer for more information +44 203 696 7950, firstname.lastname@example.org.
by Charlotte Drury
Are you a Network Visionary?
The Network Architect
Do you want a thriving IT career? This is the roadmap to becoming a successful Network...
Are you a Network Visionary?
The Network Architect
Do you want a thriving IT career? This is the roadmap to becoming a successful Network Architect.
Compared to a traditional Network Engineer, who is focused on implementing and troubleshooting, a Network Architect designs computer networks. This means constructing layouts for the usage of hardware and software and creating models to predict future network needs, using network modeling tools such as Opnet, OMNeT++ and NS2. Furthermore, architects are involved in the analysis of business requirements, project planning and budgeting, and often require softer skills including stakeholder management to complement their technical abilities. This requires a lot of diplomacy and consultancy skills.
But, Network Architects are among the highest paid employees in the IT-world.
Skills & Certifications:
The role of a Network Architect usually requires a bachelor’s degree. Furthermore, several network certifications are highly recommended. These include Expert level certifications, such as Cisco Certified Design Expert (CCDE) or Cisco Certified Internet Expert (CCIE). Also beneficial are certifications such as ITIL and TOGAF or even the Cisco Certified Architect (CCAr).
Knowledge in key areas such as cloud computing, virtualization, programming, security and application design are also in high demand.
However, it should not be forgotten that building your experience is as important as having a degree.
If you put in the time and effort into gaining professional skills, certifications and experience in the networking field, the position of Network Architect could be the ultimate goal in your IT career.
We pride ourselves on trusted partnerships, whether you're looking for a new role in IT Infrastructure, talent for your team or considering joining Franklin Fitch. Why not start that partnership today?
Copyright © 2019 Franklin Fitch | All rights Reserved. Designed by Venn Digital
Please indiciate whether you would like us to hold onto your details in order to keep you up to date with relevant opportunities
Or if you prefer email your CV to email@example.com
Please indiciate whether you would like us to hold onto your details in order to keep you up to date with relevant opportunities
Franklin Fitch Newsletter
By subscribing to our newsletter, you can stay updated with Franklin Fitch-related news, hot employment opportunities, and current industry news from the tech and recruitment sectors.
I agree to receive your newsletters and accept the data privacy statement.