Articles about Information Technology

Boys aspire to work in IT, girls find it boring

boy girl laptop students

The Internet organization Nominet, best known for running the .uk infrastructure, has compiled new research on the dream jobs of today’s students that shows how male students have begun to aspire for careers in technology while female students find the field less interesting.

The top three dream jobs of young boys all pertain to the tech industry, with computer game developers being number one, app developers being number two and website developers being number three. Twenty-four point eight percent of school aged boys would like to develop computer games while 17.2 percent envision themselves developing apps and 15.1 percent hoping to build websites. A sportsman is the fourth most popular dream job for boys at 14.6 percent followed by entrepreneur at 13.4 percent.

Continue reading

IT pros feel overworked and underappreciated

sad sorry puppy dog

A new poll from Kensington, which produces computer accessories, has found that IT professionals feel undervalued and overworked in their organizations.

Enterprises are under increasing strain to keep pace with the digital world and 32 percent of the IT decision makers that participated in the poll were frustrated that they were not provided with enough time to increase employee productivity and well-being through the use of technology.

Continue reading

IT pros would switch jobs for better training opportunities

waving dog goodbye

More than a third of IT professionals in the UK (36 percent) haven’t gotten any professional training through their employers in the last three years.

At the same time, pretty much everyone (97 percent of IT pros everywhere) says that knowing the latest skills is essential to them getting their work done. Those are the results of a new survey conducted by the global freelancing site Upwork.

Continue reading

IT workers will not put up with pirated software

Pirates can upgrade to Windows 10 for free but they won't be supported by Microsoft

Workers in the IT and telecoms industry are more prepared to blow the whistle on illegal activities in the office than any others, a new report suggests.

The report, released by BSA | The Software Alliance, looked at unethical and illegal practices in the office, relating mostly to the use of unlicensed and pirated software.

Continue reading

Global IT spending will reach $3.49 trillion in 2016

walking_through_money

IT spending, worldwide, will decline 0.5 percent this year, Gartner forecasts. The market analyst firm says this year’s forecast totals $3.49 trillion, down from $3.50 trillion which were spent in 2015. Last quarter’s forecast was 0.5 percent growth, and these new changes are mainly due to currency fluctuations, Gartner says.

"There is an undercurrent of economic uncertainty that is driving organizations to tighten their belts, and IT spending is one of the casualties", said John-David Lovelock, research vice president at Gartner. "Concurrently, the need to invest in IT to support digital business is more urgent than ever. Business leaders know that they need to become digital businesses or face irrelevance in a digital world. To make that happen, leaders are engaging in tough cost optimization efforts in some areas to fund digital business in others".

Continue reading

IT pros have bad security habits

risk jigsaw piece

Double standards, double standards everywhere. Our IT bosses might force us to change our passwords every so often, but they rarely change their own credentials, even though theirs offer administrative privileges.

Those are the results of a new survey conducted by cyber security vendor Lieberman Software. The company had asked 200 IT professionals at RSA Conference 2016 about their password changing habits.

Continue reading

Reducing costs is a growing priority for IT departments

Reducing costs

IT departments in businesses across Europe are still focused on saving money, and not on adding value to the company, or innovating to support further growth. Those are the results of a new survey by Vanson Bourne on behalf of Claranet.

Polling 900 European IT leaders, it was unveiled that despite growing IT budgets, these departments are still looking to cut costs and save money. Today, 46 percent said reducing cost was the top priority, compared to 34 percent a year before. For 29 percent, new revenue streams were their core activity, and for 25 percent, that was increasing customer loyalty.

Continue reading

The monitoring problems of IT pros

businessmen laptop notebook

Recently an IT friend of mine told me that for the past five years he has been longing for a tool which could alert him when non-routable interfaces went down. To be perfectly honestly my heart went out to the guy -- that’s such a basic monitoring request, why hasn’t it been fulfilled I thought. But when I thought about other monitoring requests I’ve heard over the years it made me realize there is a major contradiction when it comes to IT pros and monitoring.

On the surface no IT professional will accept sub-optimal performance or functionality for any technology. IT pros overlock their systems, exploit back doors, root phones to get the latest (or un-supported) version, memorize complex key combinations to access god-mode -- we won’t settle for anything but the best and do our upmost to support it.

Continue reading

Pedants revolt -- the Internet is dead, long live the internet

internet_word

In a move that's likely to prove somewhat divisive -- old-fashioned stick-in-the-muds on one side, sensible people on the other -- the Associated Press is dropping the capitalized Internet from its widely-adopted style guide.

For what seems like far, far too long, the internet has been treated by the AP and countless websites, magazines and newspapers as a proper noun, driving those of a sensible bent mad. But now it's only a matter of weeks before Internet is consigned to history and 'internet' will become the norm.

Continue reading

Enterprises should prioritize availability, not backups

Backup key

With today being World Backup Day 2016, many companies are rightly preaching the importance of regular backups. However, Veeam is bucking the trend by saying that -- in the enterprise space -- just backing up is no longer enough.

The company thinks that the most important question for enterprises now should be "are we always available?" and has thus declared today as "World Availability Day". The argument is that for consumers, just having backups in place is sufficient, but enterprises are expected to be up and running 24/7 and downtime is no longer tolerated in today’s fast-paced world.

Continue reading

Two key challenges of using open source in the enterprise

open source

A myriad point-tools are involved in every organization's software production. Some of our enterprise customers report using over 50 tools along their pipeline, from code development all the way to releasing into production. For the majority of development organizations today, these tools are comprised of a mix of commercial and open source technologies.

Existing open source tools can be found throughout your software development and operations teams -- from programming languages, infrastructure and technology stacks, development and test tools, project management and bug tracking, source control management, CI, configuration management, and more.

Continue reading

How to mitigate ransomware risks

Ransomware

Ransomware has already caused businesses real trouble this year and recently, security firms have warned about a sudden surge in junk mail messages containing this kind of malware. It seems that organized criminals are now increasingly targeting businesses, which can offer them bigger returns than going after individuals.

The first wave of ransomware started in 2005 and was called Trojan.Gpcoder. Now the security industry (and many unfortunate users) are discovering new variants almost every day. For example, a strain called Locky, discovered only two weeks ago is now the second most prevalent form. Currently, it asks for three Bitcoins (about £885) as payment for the decryption key.

Continue reading

The biggest barriers to adopting BYOD

BYOD key

Thanks to the benefits that it offers in terms of productivity and employee satisfaction, BYOD remains a popular option for many companies and the market is predicted to be worth $360 billion by 2020.

But a new report from Crowd Research Partners in conjunction with some leading data security vendors -- including Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, SnoopWall and Tenable Network Security --provides a conflicting portrayal of BYOD security barriers and adoption trends in the workplace.

Continue reading

IT budgets will mostly go towards buying mobile devices, security

Business mobile devices

IT budgets for businesses in the US will be mostly spent on security, and mobile devices allowing employees remote working, a new survey has shown.

According to a new survey by Wakefield, 30 percent of US businesses will spend most of their IT budgets on network and data security, and 28 percent will spend it on mobile devices allowing employees to work remotely.

Continue reading

Is IBM guilty of age discrimination? -- Part one

agediscrimination

Is IBM guilty of age discrimination in its recent huge layoff of US workers? Frankly I don’t know. But I know how to find out, and this is part one of that process. Part two will follow on Friday.

Here’s what I need you to do. If you are a US IBMer age 40 or older who is part of the current Resource Action you have the right under Section 201, Subsection H of the Older Worker Benefit Protection Act of 1990 (OWBPA) to request information from IBM on which employees were involved in the RA and their ages and which employees were not selected and their ages.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.