Boys aspire to work in IT, girls find it boring


The Internet organization Nominet, best known for running the .uk infrastructure, has compiled new research on the dream jobs of today’s students that shows how male students have begun to aspire for careers in technology while female students find the field less interesting.
The top three dream jobs of young boys all pertain to the tech industry, with computer game developers being number one, app developers being number two and website developers being number three. Twenty-four point eight percent of school aged boys would like to develop computer games while 17.2 percent envision themselves developing apps and 15.1 percent hoping to build websites. A sportsman is the fourth most popular dream job for boys at 14.6 percent followed by entrepreneur at 13.4 percent.
IT pros feel overworked and underappreciated


A new poll from Kensington, which produces computer accessories, has found that IT professionals feel undervalued and overworked in their organizations.
Enterprises are under increasing strain to keep pace with the digital world and 32 percent of the IT decision makers that participated in the poll were frustrated that they were not provided with enough time to increase employee productivity and well-being through the use of technology.
IT pros would switch jobs for better training opportunities


More than a third of IT professionals in the UK (36 percent) haven’t gotten any professional training through their employers in the last three years.
At the same time, pretty much everyone (97 percent of IT pros everywhere) says that knowing the latest skills is essential to them getting their work done. Those are the results of a new survey conducted by the global freelancing site Upwork.
IT workers will not put up with pirated software


Workers in the IT and telecoms industry are more prepared to blow the whistle on illegal activities in the office than any others, a new report suggests.
The report, released by BSA | The Software Alliance, looked at unethical and illegal practices in the office, relating mostly to the use of unlicensed and pirated software.
Global IT spending will reach $3.49 trillion in 2016


IT spending, worldwide, will decline 0.5 percent this year, Gartner forecasts. The market analyst firm says this year’s forecast totals $3.49 trillion, down from $3.50 trillion which were spent in 2015. Last quarter’s forecast was 0.5 percent growth, and these new changes are mainly due to currency fluctuations, Gartner says.
"There is an undercurrent of economic uncertainty that is driving organizations to tighten their belts, and IT spending is one of the casualties", said John-David Lovelock, research vice president at Gartner. "Concurrently, the need to invest in IT to support digital business is more urgent than ever. Business leaders know that they need to become digital businesses or face irrelevance in a digital world. To make that happen, leaders are engaging in tough cost optimization efforts in some areas to fund digital business in others".
IT pros have bad security habits


Double standards, double standards everywhere. Our IT bosses might force us to change our passwords every so often, but they rarely change their own credentials, even though theirs offer administrative privileges.
Those are the results of a new survey conducted by cyber security vendor Lieberman Software. The company had asked 200 IT professionals at RSA Conference 2016 about their password changing habits.
Reducing costs is a growing priority for IT departments


IT departments in businesses across Europe are still focused on saving money, and not on adding value to the company, or innovating to support further growth. Those are the results of a new survey by Vanson Bourne on behalf of Claranet.
Polling 900 European IT leaders, it was unveiled that despite growing IT budgets, these departments are still looking to cut costs and save money. Today, 46 percent said reducing cost was the top priority, compared to 34 percent a year before. For 29 percent, new revenue streams were their core activity, and for 25 percent, that was increasing customer loyalty.
The monitoring problems of IT pros


Recently an IT friend of mine told me that for the past five years he has been longing for a tool which could alert him when non-routable interfaces went down. To be perfectly honestly my heart went out to the guy -- that’s such a basic monitoring request, why hasn’t it been fulfilled I thought. But when I thought about other monitoring requests I’ve heard over the years it made me realize there is a major contradiction when it comes to IT pros and monitoring.
On the surface no IT professional will accept sub-optimal performance or functionality for any technology. IT pros overlock their systems, exploit back doors, root phones to get the latest (or un-supported) version, memorize complex key combinations to access god-mode -- we won’t settle for anything but the best and do our upmost to support it.
Pedants revolt -- the Internet is dead, long live the internet


In a move that's likely to prove somewhat divisive -- old-fashioned stick-in-the-muds on one side, sensible people on the other -- the Associated Press is dropping the capitalized Internet from its widely-adopted style guide.
For what seems like far, far too long, the internet has been treated by the AP and countless websites, magazines and newspapers as a proper noun, driving those of a sensible bent mad. But now it's only a matter of weeks before Internet is consigned to history and 'internet' will become the norm.
Enterprises should prioritize availability, not backups


With today being World Backup Day 2016, many companies are rightly preaching the importance of regular backups. However, Veeam is bucking the trend by saying that -- in the enterprise space -- just backing up is no longer enough.
The company thinks that the most important question for enterprises now should be "are we always available?" and has thus declared today as "World Availability Day". The argument is that for consumers, just having backups in place is sufficient, but enterprises are expected to be up and running 24/7 and downtime is no longer tolerated in today’s fast-paced world.
Two key challenges of using open source in the enterprise


A myriad point-tools are involved in every organization's software production. Some of our enterprise customers report using over 50 tools along their pipeline, from code development all the way to releasing into production. For the majority of development organizations today, these tools are comprised of a mix of commercial and open source technologies.
Existing open source tools can be found throughout your software development and operations teams -- from programming languages, infrastructure and technology stacks, development and test tools, project management and bug tracking, source control management, CI, configuration management, and more.
How to mitigate ransomware risks


Ransomware has already caused businesses real trouble this year and recently, security firms have warned about a sudden surge in junk mail messages containing this kind of malware. It seems that organized criminals are now increasingly targeting businesses, which can offer them bigger returns than going after individuals.
The first wave of ransomware started in 2005 and was called Trojan.Gpcoder. Now the security industry (and many unfortunate users) are discovering new variants almost every day. For example, a strain called Locky, discovered only two weeks ago is now the second most prevalent form. Currently, it asks for three Bitcoins (about £885) as payment for the decryption key.
The biggest barriers to adopting BYOD


Thanks to the benefits that it offers in terms of productivity and employee satisfaction, BYOD remains a popular option for many companies and the market is predicted to be worth $360 billion by 2020.
But a new report from Crowd Research Partners in conjunction with some leading data security vendors -- including Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, SnoopWall and Tenable Network Security --provides a conflicting portrayal of BYOD security barriers and adoption trends in the workplace.
IT budgets will mostly go towards buying mobile devices, security


IT budgets for businesses in the US will be mostly spent on security, and mobile devices allowing employees remote working, a new survey has shown.
According to a new survey by Wakefield, 30 percent of US businesses will spend most of their IT budgets on network and data security, and 28 percent will spend it on mobile devices allowing employees to work remotely.
Is IBM guilty of age discrimination? -- Part one


Is IBM guilty of age discrimination in its recent huge layoff of US workers? Frankly I don’t know. But I know how to find out, and this is part one of that process. Part two will follow on Friday.
Here’s what I need you to do. If you are a US IBMer age 40 or older who is part of the current Resource Action you have the right under Section 201, Subsection H of the Older Worker Benefit Protection Act of 1990 (OWBPA) to request information from IBM on which employees were involved in the RA and their ages and which employees were not selected and their ages.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.