Search This Blog

Thursday, December 8, 2016

MICROSOFT'S VISION FOR LINKEDIN IS ABOUT TYING ITS BUSINESS DATA INTO OFFICE AND OTHER SERVICES


Source: www.itnews.com
Now that Microsoft’s massive $26.2 billion acquisition of LinkedIn has officially closed, it’s time for the next step: figuring out how its massive store of business information can best be used by Microsoft and its customers. 
Building upon the company’s integration plan outlined earlier this year, Microsoft chief executive Satya Nadella laid out a set of plans for short-term integration with LinkedIn (in a blog post on LinkedIn, natch), with advantages for both consumers and business customers.
Perhaps the most interesting will be closer ties between resume functions in Word and in LinkedIn, so that users drafting resumes in Word will be able to update their LinkedIn profiles automatically. Nadella suggests that LinkedIn updates will propagate through Windows 10’s Action Center, and that your LinkedIn identity will be used in Outlook and in Office.
Business customers will be able to benefit from LinkedIn Learning online education, available as a feature of the paid Office 365 subscription. LinkedIn Lookup—a competitor of sorts to Microsoft’s Delve, which aggregates information about your colleagues and contacts—will be integrated into Office 365, Nadella wrote. LinkedIn’s Sales Navigator will be tied to Dynamics 365, as an aid to what Nadella called “social selling” to customers.
Finally, there’s the content angle. Interestingly, Nadella said Microsoft plans to open a “business news desk” across its content ecosystem and MSN.com, possibly providing its own branded media content. Unfortunately, there’s a downside, too: “extending the reach of Sponsored Content"—read: advertisements—"across Microsoft properties.” 

Why this matters: Microsoft clearly bought LinkedIn with the goal of adding to its store of digital intelligence, specifically business intelligence. Some of that will bubble up fairly quickly to consumers, such as the Word-LinkedIn integration. But the deeper, more powerful goals involve analyzing business trends and providing Office 365 subscribers the knowledge they need to get their jobs done. That’s more difficult to achieve and measure, but will probably be the true test of whether that $26 billion was worth it in the end. 

This story, "Microsoft's vision for LinkedIn is about tying its business data into Office and other services" was originally published by PCWorld.

Tuesday, April 5, 2016

Banks commit to Azure cloud as blockchain platform

Distributed ledger venture moves forward.

Microsoft looks set to to gain a foothold in the global financial market through a formalised partnership with the R3 consortium of banks to develop open source blockchain ledger applications, the company said today.
Blockchain emerged from the digital cryptocurrency Bitcoin, and provides a transparent, distributed ledger to record financial and other transactions, including asset management, contracts and settlements.
Financial institutions are interested in blockchain as it is cheaper to operate than clearing houses and similar third-parties currently required to verify transactions. The technology is also more secure and substantially faster than legacy financial processes.
The partnership means the R3 partner banks will use the Microsoft Azure cloud platform to build blockchain-as-a-service applications.
The R3 consortium now has 45 member banks, the company said. Among these are the National Australia Bank (NAB), which joined the project in October last year; Macquarie Bank; Commonwealth Bank; and Westpac.
Globally, other R3 member banks include Nordea, JP Morgan, Citibank, Deutsche Bank, HSBC, Mizuho Bank, Royal Bank of Scotland, Credit Suisse and Morgan Stanley.


Read more: http://www.itnews.com.au/news/banks-commit-to-azure-cloud-as-blockchain-platform-417761#ixzz44xGMmkDj
Source: online news

Google plugs 15 critical security holes in Android update


Google plugs 15 critical security holes in Android update

Media handling continues to cause headaches.

Google's April collection of security updates for its Android mobile operating system takes care of no fewer than 15 vulnerabilities rated as critical, the company said.
As with past security alerts, the mediaserver component of Android has emerged as one of the most vulnerable.
Since mediaserver is a privileged Android operating system feature that can be reached during video playback, while viewing images and audio, and while sending multimedia text messages, attackers can use the vulnerabilties in the component to remotely execute code on user devices.
Five more mediaserver flaws have been rectified in the April security update, along with a related remote code execution vulnerability in media codecs used by the operating system component.
A remote code execution flaw in the libstagefright library has also been plugged by Google.
Elsewhere, security researchers have uncovered three remote code execution flaws in Android's implementation of the dynamic host configuration protocol daemon background process, which is used to automatically configure devices with internet protocol addresses and gateways.
All three are rated as critical as the DHCP client runs as a privileged process with extensive system access.
The April security update also takes care of two privilege escalation bugs in the Android kernel that could allow malicious apps to run code with the potential to permanently compromise devices, which would require reflashing of the operating system to repair them, Google said.
Qualcomm modules used in Android for the system processor and radio-frequency component can also be abused to permanently compromise devices, again requiring a reflash to fix the problem.
A further 13 vulnerabilities rated as high and another eight said to be moderate, were also patched in the April update.
Last month, Google was forced to issue an out-of-band update to address the CVE-2015-1805 rooting vulnerability in the Linux kernel, which was discovered last year but remained unpatched in Android.
The April patches are delivered to Nexus devices as an over-the-air update, and Google has also made new firmware images available on its developer website. Patches will be released as source code to Google's Android partners over the coming few days, the company said.


Read more: http://www.itnews.com.au/News/Article.aspx?id=417760#ixzz44xFjYjjD

Source: online news

Monday, April 4, 2016

UN Broadband Commission to government leaders: broadband can be your most powerful development catalyst

UN Broadband Commission to government leaders: broadband can be yourmost powerful development catalyst

High-speed networks and services essential to meet
UN Sustainable Development Goals

The Broadband Commission for Sustainable Development’s 13th full meeting, held in Dubai, United Arab Emirates, yesterday, reached consensus on the need for a new set of connectivity targets to help governments more effectively harness broadband networks and services to drive progress towards the 17 Sustainable Development Goals.

Commissioners agreed that broadband networks, services and applications have enormous potential to deliver dramatic results in education, health and socio-economic growth. A recent informal meeting of Commissioners at the World Economic Forum in Davos emphasized that connecting the unconnected and generating sufficient investment opportunities for the universal deployment of broadband networks, services and applications will be a key factor in achieving all 17 global goals.
Debate in Dubai around potential new targets focused on the importance of adding targets to measure the utilization of selected broadband-enabled public services, the choice of statistical indicators to accurately gauge broadband access at the country and community levels, as well as the choice of data sources and methodologies for generating accurate, reliable measurement. The Commission also agreed on the importance of developing National Digital Scorecards to measure national progress towards achieving broadband targets.

The Commission’s 60+ leaders and experts from government, UN agencies, civil society and a broad spectrum of business sectors will now work to formulate concrete, measurable broadband connectivity goals that could be agreed by the next full meeting of the Commission in New York in September.

“Agreement on new targets in September would serve as the next stepping stone to the Commission’s vision of ‘broadband for all’, said ITU Secretary-General Houlin Zhao, who serves as co-Vice Chair of the Commission alongside UNESCO Director-General Irina Bokova. “Broadband represents a powerful way to accelerate progress towards the attainment of the 17 SDGs, and new broadband networks and services will play a key role in the delivery of education, healthcare and basic social services, particularly for chronically disadvantaged communities.”

ITU already tracks broadband deployment in the Commission’s annual State of Broadband report, which includes rankings of nations worldwide in terms of broadband policy, affordability and uptake.
“The world is going through a staggering confluence of emerging technological breakthroughs that can open vast new horizons for growth and development,” said UNESCO Director-General Irina Bokova. “There remain 1.3 billion people without electricity today, and over four billion people without access to the Internet. Access and connectivity are absolutely crucial for societies across the world. This is why the message of the Broadband Commission for Sustainable Development is so important.”

The latest edition of the Commission’s State of Broadband report, released last September, showed that broadband Internet is failing to reach those who could benefit most, with 57% of the world’s people still offline and unable to take advantage of the enormous economic and social benefits the Internet can offer.
Established in 2010, as a top-level advocacy body promoting broadband as an accelerator of global development, the Broadband Commission is chaired by President Paul Kagame of Rwanda and Mexico’s Carlos Slim HelĂș.

The Commission recently welcomed ten new high-level members:
      - Abdulaziz Salem Al Ruwais, Governor, Communication and Information Technology Commission, Saudi Arabia
     - Jean-Yves Charlier, CEO, VimpelCom
     - Scott Gegenheimer, CEO, Zain Group
     - Mats Granryd, Director-General, GSMA
     - Ramin Guluzade, Minister of Communication and High Technologies, Azerbaijan
     - Baroness Beeban Kidron, award-winning filmmaker and 5Rights Campaign champion
     - Philipp Metzger, Director-General, Swiss Federal Communications Office
     - Catherine Novelli, US Under-Secretary for Economic Growth, Energy & Environment
     - Rupert Pearce, CEO, Inmarsat
     - Rajeev Suri, CEO, Nokia

The new members bring the total number of Commissioners to 62, including the four principals.
This latest meeting of the Commission was held at the invitation of UNESCO Goodwill Ambassador and Broadband CommissionerSunny Varkey, and was held alongside the Varkey Foundation’s Global Education and Skills Forum. The gathering welcomed a number of special guests, including leading international journalist and commentator Fareed Zakaria.

The meeting also complemented a joint ITU/UNESCO Policy Forum held during UNESCO Mobile Learning Week, which brought together governments ministers of ICT and education to examine ways the role that policies and cross-sectoral collaboration can play in fostering innovation and the use of mobile technology to improve the quality, equity and accessibility of education.
Source: online news ITU

Sunday, April 3, 2016

Apple attack sidesteps safeguards to threaten iPhones

Apple attack sidesteps safeguards to threaten iPhones

A new attack on iPhones requires theft, deception and the planning of a chess grandmaster.
Check Point, a cybersecurity firm, says it's found an attack that could trick iPhone users into downloading a malicious app. The attack, which they're calling SideStepper, takes advantage of specialized corporate software known as enterprise apps.

It also needs thievery, a setup and poor decision-making by the iPhone user, said Check Point researcher Avi Rembaum. "What we've seen, however, is that the enterprise program has nevertheless become a target for attacks."

That said, there's no indication this exact attack has been carried out by hackers.
SideStepper, which Check Point will present at the Black Hat cybersecurity conference in Singapore on Friday, relies on attackers getting hold of a stolen enterprise certificate. Those certificates are bits of software on enterprise apps -- you know, your company's annoying corporate benefits or sales apps -- that prove they're legitimate.

To get a malicious enterprise app on your phone, an attacker would sign a malicious app with a stolen or otherwise illegitimate enterprise certificate. The attacker would text or email you a link and try to convince you to click on it and go to a website to create an account from your phone.

You might think only someone clueless would do that. But imagine if the hacker spoofed your boss's email account and told you to set up the new account. You might do it without thinking if you're blasting through your email on the train before your morning coffee.

Once you've created the account, the attacker can install the malicious app on your phone.
Apple says the attack doesn't count as a flaw in iOS, the software that runs iPhones.
"We've built safeguards into iOS to help warn users of potentially harmful content like this," an Apple spokesman said in a statement. Apple also encourages iPhone users to only download from a trusted source, like the App Store.
Check Point's Rembaum says Apple's system has a lot of safeguards, but it's still vulnerable.

Apple re-issues iOS 9.3 after crippling older devices, confusing customers

Apple re-issues iOS 9.3 after crippling older devices, confusing customers


Apple today replaced the iOS 9.3 update with a new version after the original crippled some older devices last week, and confused large numbers of unaffected customers when their iPhones and iPads told them that they weren't connected to the Internet when in truth they were.

The initial version of iOS 9.3, which Apple issued a week ago, threw owners of older hardware -- iPhone 5S and earlier, and iPad Air and earlier -- for a loop when it asked them for their Apple ID and password, normally not a step in the iOS update process.
Apple published a support document that acknowledged the problem and provided solutions.
Last week, Apple pulled iOS 9.3 from its servers in an effort to prevent more people from seeing the demand for an ID and password. Today, the Cupertino, Calif. company re-released iOS 9.3.
In the meantime, however, users whose devices had already downloaded iOS 9.3, but whom had not authorized the upgrade, began seeing a message when they got around to updating. "Unable to Verify Update," the on-screen message read. "iOS 9.3 failed verification because you are no longer connected to the Internet."
But those devices -- including an iPhone 6 owned by a Computerworld staffer -- were connected to the Internet.
A thread on Apple's support forum spelled out the problem, and the likely cause.
"I suspect this is really Apple's way of blocking you from installing the update you have already downloaded, until they fix the known activation issue with the update," wrote someone identified as "AndreTheGeek" on March 25. "Wait for the update to the update."
Apple probably dropped or changed the digital "signature" of the update on its end, creating a mismatch that resulted in the "Unable to Verify Update" message.
Although the thread contained fewer than 30 message, it had been viewed more than 10,000 times, a very large number for such a small collection of reports. In other words, lots of users had seen the same no-Internet error, searched the Web using a string such as "ios 9.3 verification failure," as did Computerworld, and were directed to Apple's support forum.
Computerworld's device successfully downloaded and installed the revised iOS 9.3 today.
This story, "Apple re-issues iOS 9.3 after crippling older devices, confusing customers" was originally published by Computerworld.

Microsoft is putting Windows 10, Cortana at the center of smart homes

Microsoft is putting Windows 10, Cortana at the center of smart homes

A display for the newly formed Open Connectivity Foundation at Mobile World Congress 2016 shows a model smart home, in a file image captured on Feb. 25, 2016. Credit: Stephen Lawson

Windows 10 will be able to support more IoT devices with new standards coming in 2017

Are you too lazy to open the door or switch on a light? Let Windows 10 and its Cortana voice-activated digital assistant do the job for you.
Microsoft's vision is to make home automation a breeze in Windows 10, and the company featured several related Internet-of-things announcements at its ongoing Build conference.

The FBI has promised to help local law enforcement authorities crack encrypted devices, in a letter
Read Now
Windows 10 will work with a wider range of devices and appliances by integrating new Open Connectivity Foundation (OCF) protocols, scheduled to be released in 2017. Additionally, Cortana will allow users to easily automate tasks using a Windows PC, mobile device, Xbox console or Raspberry Pi 3.
Users will be able to program "actions" so Cortana can be used to switch on lights, air conditioning or even unlock cars. For example, users will be able to speak, "lights" to their smartphones, and the bulbs will turn on.
Or even better, users can tell Cortana to "unlock home door," which will open the door and trigger a series of additional actions like switching on the lights and the air conditioning. A command like "party" could switch on the music and the disco lights.
Actions can also be based on the time of day or on information from connected sensors. The actions can be attached to specific profiles in Cortana like "activate smart home." The connected devices will need to be discovered by Windows 10 and be on a list of approved devices, much like how the OS discovers and lists wireless printers and other hardware.
But Windows doesn't support all devices right now, and the OS works with only those based on the AllJoyn protocol. Support for a wider range of devices will come with the integration of protocols established by the OCF, which will unite the disparate IoT standards under one umbrella.
OCF unites AllJoyn, which boasts Microsoft and Qualcomm as members, with the competing Open Interconnect Consortium (OIC), with key members including Intel, Samsung and Dell. The companies are working together to converge device discovery, security and connectivity tools under the OCF banner.
End users will benefit from this union. For example, they will be able to use Windows 10 and Cortana to switch on a Samsung Smart TV, which is currently compatible with OIC protocols.
OCF will provide the common language for most of the smart devices to interact, Jason Farmer, principal program manager lead for Windows IoT at Microsoft, said during a presentation at Build.
"Fragmentation is the enemy of IoT," Farmer said.
Support for OCF tools and standards will be integrated into Windows 10 by 2017, Farmer said.
The OCF standard, like existing standards, will support several types of connectivity, including Ethernet, Wi-Fi, Bluetooth and Zigbee.

Until the integration is complete, Microsoft released an "open-source" bridge to connect OIC tools, called IoTivity, with the AllJoyn APIs. It will help AllJoyn devices talk to OIC-compatible IoT devices.

Microsoft also announced a new open-source project called Open Translator for Things, which will help define schemas to create a common classifier of devices. The common classification will make it easy to identify devices, and will be a big tool in the process of converging AllJoyn and IoTivity into OCF. The translator will be available Tuesday through Github. 

FBI will help US agencies with tools to unlock encrypted devices

FBI will help US agencies with tools to unlock encrypted devices

iPhone 5C phones await sale at the Apple Store in Palo Alto, California, on September 20, 2013 Credit: Martyn Williams

The FBI did not commit on using the method tried on the San Bernardino iPhone

The FBI has promised to help local law enforcement authorities crack encrypted devices, in a letter that refers to the federal agency’s success in accessing the data on an iPhone 5c running iOS 9 that was used by one of the San Bernardino terrorists.

The FBI has promised to help local law enforcement authorities crack encrypted devices, in a letter
The agency did not, however, explicitly promise investigators that it would deploy the same tool, said to have been developed by an outside organization, on other iPhones.
The FBI had earlier demanded in court that Apple should assist it in its attempts to crack by brute force the passcode of the iPhone used by the terrorist, without triggering an auto-erase feature that could be activated after 10 unsuccessful tries.
It changed its stance and informed the court that it was trying out a technique from an external organization that could possibly help it access the data on the phone. It later informed the court that it was able to access the data on the phone and that Apple’s help would not be required. The order on Apple was vacated by the U.S. District Court for the Central District of California last week.
The FBI  did not disclose in court the method it had used to access the data and whether it was device specific or could be used on other iPhones.
The letter by the FBI to local investigators appears to be a response to requests for help from local agencies after the hack of the phone used by the San Bernardino shooter, Syed Rizwan Farook, but does not make commitments.

“We know that the absence of lawful, critical investigative tools due to the 'Going Dark' problem is a substantial state and local law enforcement challenge that you face daily,” according to a copy of the letter obtained by BuzzFeed News and some other news outlets. The FBI has previously said that even when law enforcement has the legal authority to intercept and access communications and information, backed by court orders, it faces a 'Going Dark' problem to technically access the data in motion or at rest in devices.
“As has been our longstanding policy, the FBI will of course consider any tool that might be helpful to our partners,” it added. “Please know that we will continue to do everything we can to help you consistent with our legal and policy constraints. You have our commitment that we will maintain an open dialogue with you. We are in this together.”
Apple had said that helping the FBI would require it to create a new version of the iPhone operating system that would weaken its security, besides being dangerous if such a method was out in the wild.
The FBI could not be immediately reached for comment on the letter.
Advocacy group Fight for the Future has argued that by not telling Apple about the hack, the FBI is putting lives at risk. “If they really care about public safety, they must disclose the vulnerability they used to Apple to prevent criminals, hackers, and terrorists from exploiting the same security flaw and using it to do harm,” it said in a statement last week.

The Electronic Frontier Foundation has recommended a "very strong bias" in favor of an FBI disclosure to Apple, citing the Vulnerabilities Equities Process, a government policy for disclosing security vulnerabilities.

Source: online news

Computerworld's 2016 Premier 100 Technology Leaders: Highlights and stats

Computerworld's 2016 Premier 100 Technology Leaders: Highlights and stats


Computerworld's Premier 100 Technology Leaders, class of 2016, control IT budgets exceeding $50 million on average and directly supervise an average of more than 400 IT employees. In this special four-page package of honoree highlights, find out which projects these elite tech executives are tackling in the year ahead, and where they're placing their tech investment bets. Also, see stats on their use of contractors and regular staff to deliver successful projects.

Source: online news

IT Salary Survey 2016: 10 tech specialties with rising salaries

On the whole, the financial news has been good for IT professionals. Data from the U.S. Bureau of Labor Statistics shows that IT employment grew 3.1% in 2015, and 44% of IT managers who participated in Computerworld's 2016 IT Salary Survey said they expect to expand their IT staffs this year.
Salaries are growing, too. Computerworld survey participants reported an average compensation increase of 3.9% this year, the highest year-over-year pay hike we've seen in our survey results since 2001.
Other industry watchers have seen similar gains: Research firm Foote Partners reports a 3.3% overall rise in IT skills and certification pay premiums for 2015, and IT staffing firm Robert Half Technology predicts that starting salaries for tech pros will rise 5.3% in 2016.

But pay raises are higher in some IT disciplines than they are in others. "The competition for some niche skills is driving up salaries for those positions. In some areas for some skills there are rapid gains; in other areas the gains are more modest or flat," says Tim Herbert, senior vice president of research and market intelligence at the nonprofit trade organization CompTIA.
According to Computerworld's 2016 IT Salary Survey, these are the 10 IT specialties seeing the biggest salary increases.

1. ERP

People who work in enterprise resource planning reported a bigger year-over-year compensation gain — 5% —than survey respondents in any other area of IT.
Because ERP can refer to both a business process — automating and integrating key parts of an organization's business functions — and the software suites that facilitate that process, it's easy to assume that a role in enterprise resource planning is all about managing a software system. But Drew Moen, CTO at StratServ, a tech services firm in Browns Summit, N.C., says it's really about managing the business and understanding how technology supports that job.
"ERP is operations. It's process engineering, and it's what gives you a quantitative advantage. It's why your call center has 10 people and not 100 people," Moen says.
To do the job, Moen says, an ERP expert "has to be a master of many trades, and someone who can speak truth to power." In other words, an ERP pro needs to have the expertise and the strength of character to explain to executives what works — and what doesn't — in operational processes, how to improve them and where technology fits within those scenarios.
Those are traits that companies are willing to pay increasingly higher rates to get, recruiters say.

2. Cloud computing

As detailed in Computerworld's Forecast 2016 report, moving enterprise systems and applications to the cloud has become a top priority for U.S. businesses. As more organizations do more in the cloud, competition for people with cloud experience heats up, and that in turn has driven up salaries, says Herbert.
Pay for cloud experts is up 4.8% this year, according to our survey, and people who work in the field say they're feeling popular. Take Eric McDuffee, senior director for data and technology at the American Lung Association of the Northeast in East Hartford, Conn. The nonprofit no longer has on-premises applications, so McDuffee, a 16-year employee with the organization, has become a cloud expert. That gets him noticed. "I don't have people beating down my door, but there definitely has been an uptick in recruitment," he says.

3. Security

No surprise here: One of the most in-demand specialties today is information security expertise. Our survey shows an average pay gain of 4.6% over 2015 for those who work in security, and more than a quarter of IT managers who plan to expand their staffs this year cited security as an area in which they will be adding personnel.
In his more than 20 years in IT, Bob Riley says he has seen security move from a side role in everyone's job to a front-and-center function that's in demand. Riley is a mobile security architect at Duluth, Ga.-based NCR, and he says his employer's security team has grown from three people three years ago to 26 today.
"The average systems administrator can't keep up with the threats that are coming every day, so security became a new role," he says. "Now security has the CEO's focus. That means budgets are up."

Riley himself isn't looking for a new job, but based on what he sees in the job market and what he's hearing from colleagues, he says companies are offering higher salaries for top-notch security talent.

4. Web design/development

Companies continue to invest in their websites, so they still need skilled Web designers and developers, says Blake Angove, director of technology services at Chicago-based staffing and recruiting firm LaSalle Network. Computerworld's IT Salary Survey shows that pay was up 4.6% for these workers in 2016.
Job seekers with strong portfolios and broad sets of Web design and development skills can get multiple offers and command $70,000 to $90,000 or more annually, even if they have only a few years of experience, Angove says. Developers with Java and .Net programming skills are most in demand, he adds.

5. Business intelligence/analytics

The push to put data into the hands of workers at every level is driving demand for business intelligence and analytics systems — and IT professionals who support those systems and their users. Survey respondents who work in those areas reported an average pay bump of 4.2% in 2016.

Lauretta Ayers, a business analyst at the Turlock Irrigation District in California's Central Valley, says she sees that demand firsthand. In her part of the country, government agencies, farming operations and businesses of all kinds are using data to drive decisions related to everything from water requirements to livestock feed schedules.
With data playing such an important role in business today, IT workers who specialize in BI and analytics can command ever-higher salaries, recruiters say.

6. Networking

Pay in this field is up 4.2%, according to our data, with average compensation ranging from $62,000 for network administrators to $112,000 for network architects. CompTIA's Herbert notes that the number of job postings for network and computer systems operators increased 37% from 2014 to 2015, and postings for computer network architects jumped 44%.
"Demand for network engineering skills has remained consistently high," says Angove. "As the number of data centers in the country increases, we will see the demand for engineers grow." He notes that people with Cisco Certified Internetwork Expert certifications continue to command the highest salaries; network engineers with strong firewall and security knowledge are also up there.

7. Application development

Enterprise IT shops have a continuing need for application developers to deliver not only back-end software to help run their operations but also customer-facing apps, recruiters and IT leaders say. Companies are willing to pay a premium for experienced people with proven skills. Pay jumped 4% for developers who took our survey.
But a bigger paycheck alone isn't enough to draw in the most talented developers, says Ben Vesta, development manager at Aceyus, a Charlotte, N.C.-based maker of contact center management tools. Savvy developers are looking for companies that have more to offer than just generous pay. "Location, work environment, and the ability to grow skill sets and advance in the company are equally important," he says.

8. Data center management

As more companies move to private clouds, they need people who can manage the data centers that support those setups, Herbert says. And the vendors selling cloud services likewise need skilled professionals to manage their data centers. New business models, notably streaming services, also require significant data center capacity.
All that adds up to competition for data center managers, and that, in turn, has driven up compensation. Computerworld survey respondents who manage data centers reported an average

9. General IT

It might seem unusual to find general IT work in a list of hot specialties, but Andrew Ho isn't surprised. As vice president of technology at Global Strategy Group, he is the public affairs firm's sole IT staffer. Ho, who oversees consultants and vendors, says small and midsize companies increasingly want people like him who are capable of handling a range of IT duties.

"In that market, there's not enough money to pay for specialists," he says. "Companies see the value in people who can wear multiple hats." Computerworld's survey data backs him up: Nearly 20% of the IT managers who are looking to hire this year said they need IT generalists, and the general IT workers who took the survey said their pay is up 3.9%.

10. Help desk/IT support

With companies using a growing number of increasingly complex systems and devices, there's a need for more expertise in the tech support role — so it makes sense that help desk compensation is on the rise, Herbert says. IT Salary Survey respondents who work in tech support reported an average pay increase of 3.6%. And tech support is the second most sought-after skill among managers who plan to hire this year, 33% of whom said they were looking for people to work on the help desk.
Jean Everson, a Level 2 service desk specialist at rail freight company CSX in Jacksonville, Fla., has worked in tech support for nearly two decades and says she has seen demand for her services (and pay) steadily increase over the years.

She says the job keeps her and her colleagues busy, and she doesn't expect that to change anytime soon. "I'll have a job as long as I want one," she says.

Source: Computerworld's IT Salary Survey 2016. Right-click chart to view larger version or save to your computer.

Efficiency hacks for IT: 6 tips for getting things done

Everyone is busy these days, sure, but research shows that most people are wasting chunks of time throughout their day, whether it's fiddling with the latest tech toy or responding to every email that lands in their inbox.
For those in the technology field, time management is an even tougher task, says Laurie Gerber, co-president of Handel Group Life Coaching. "IT people have this added thing that people constantly need them. It's always an emergency," Gerber says.
More importantly, Gerber says these folks are spending precious time on tasks that don't match up with their priorities and responsibilities.
If that sounds like you, it might be time to get tough -- with yourself. To enhance efficiency, you must set personal ground rules and stick by them, Gerber says. Here are six simple workday hacks from other IT pros that can crank up your productivity.

Source: Online News
SSL Wireless Introduced “Multi-Channel Utility Bill Payment Service” for Mercantile Bank Limited

Mercantile Bank Limited with technical collaboration of Software Shop Limited (SSL Wireless), a leading Mobile Solution Provider of the country, has launched the “Multi–Channel Utility Bill Payment Service” for its account holders and also for walking customers. A signing ceremony was organized on the occasion at Mercantile Bank Limited’s Head Office Recently.
The account holders and general public will be able to pay the monthly bills of DPDC and DESCO in a very convenient process. This Multi-Channel Utility Bill Collection System will enhance the corporate image of Mercantile Bank Limited and will give them a competitive edge over competitors.

By the launching of the Multi–Channel Utility Bill Payment Service, Mercantile Bank Limited’s account holders along with the walking customers will get an intelligent system that will provide the following benefits.

  • Make timely bill payments and avoid late fines.
  • Make payment at anytime, from anywhere; even from outside the country.
  • No need to carry cash
  • Cost-effective and easy-to-use service.
  • Saves a lot of time and energy by eliminating the need to stand is queues at banks.
  • Receive electronic invoice for each transaction.


Mr. Kazi Masihur Rahman, Managing Director & CEO, Mr. Monindra Kumar Nath, Additional Managing Director & Mr. A. K. M. Atiqur Rahman, Executive Vice President & Head of Information Technology of the Bank were present at occasion. Mr. Sayeeful Islam, Managing Director of SSL Wireless, Mr. Ashish Chakraborty, General Manager of SSL Wireless along with other high officials of both organizations was also present in the ceremony.