Skip to content

State of IT: Employment Recap of 2010

TPS Reports for Everyone!

Peter, I need you come in on Saturday...

I have been pontificating a bit over the last few months regarding the issues I see with the information technology job market going forward.  I’ve taken a cautious tone with the employment picture and believe that we have at least two more years of slow to almost no growth in the IT.

Let’s pull back a bit and look at the job market as a whole to get a bit more perspective.  One article on CNN states that 84% of American workers are chomping at the bit to leave their current position.  This not really all that surprising considering how stretched the labor force is in corporate America.  Long hours, stagnant wages, less benefits, and the constant fear of losing your job has taken a heavy toll.  One can see this quite clearly if you are working within multiple organizations as a consultant.  Most employees are frightened to take vacations or sick days, since they believe that will mark them as just another expendable resource, easily replaced by one of the many out of work. Read more…


How to Weather the Outsourcing Storm

Outsourcing Hurricane

IT has been hit long ago. How will you adapt and thrive?

Before the Great Recession of 2007, which is still ongoing no matter what the pundits say, IT employment had already suffered setbacks.   The IT profession started taking on water after the Dotcom implosion and a few more bulkheads were blown in 2007.  Those of us who have consulted across the industry have seen demoralized workforces whose compensation has fallen dramatically.  What opportunities exist is mostly short term contract work that is shoveled out by dubious staff augmentation firms.  From there the IT contractor goes through the “Burn & Churn” cycle of three to six month contracts, always on the hunt for another gig.  I wrote about this trend back in June in my “IT Job Market in Limbo” piece. Read more…

Personal Branding

Self promotion
Standing out from the Crowd is Good

I’ve been working steadily on my “Personal Brand” over the last few years.  But this year I have made a concerted effort in publishing articles, both online and in print, within my fields of expertise. 

I have had some very good successes on this front.  I have contributed to articles on Information Technology Capability Maturity Framework (IT-CMF), Voice Over IP (VoIP) and Smart Grid vulnerabilities.  To read these articles, just hop over to my “Media Mentions” page.  I have also authored quite a few articles that are directly posted here after they have been published.  Read more…

IT Job Market in Limbo

Now where did I put those jobs?

A recent eWeek report on the IT Job market was relatively uninspiring.  Based on a Robert Half survey, over 90 percent of CIO’s polled stated that they will not be bringing on additional IT staff this year (emphasis mine).   However, in the same study, only 4 percent of CIO’s felt that they would be further reducing head count. 

Like most corporate disciplines, Information Technology has been cut to the bone over the course of the Great Recession.  It is therefore unsurprising that most firms are now reluctant to chop additional staff to cut costs.  Read more…

Marketing and Selling: There’s No App for That

The basics.....

For the average information technology professional, the concept of marketing & selling is an alien skill set; like under-water bagpipe playing.  In the eye of the IT pro, this skill is composed mostly of excessive hair-gel, pointless presentations and flim-flam.

However, several new research studies have identified a sea change, once again, heading for information technology professionals.  Recently, eWeek released an article that gave a broad outline of a much more in-depth study by the Corporate Executive Board.  At a high-level, it outlines a near-future (2015) where fewer than 25 percent of current IT employees will remain in the discipline.  This will be due to IT functions being integrated with standard business practices, rolled into central corporate functions (HR) or outsourced.  Added to the mix are a far more technologically literate workforce, virtualization and the move toward Technology as a Service (outsourcing again). Read more…

PCI DSS Overview

Pile O' Regulation

A light-hearted romp through PCI DSS

As a consultant, you get to view the grim expanse of industry regulation more than most.  Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA) and of course the topic of this article, Payment Card Industry Data Security Standard (PCI DSS).  A relatively new addition to the regulatory flak that targets businesses, the goal of these standards is to push merchants and service providers to tighten their security and move toward a global security standard.

PCI was pulled together by Visa and MasterCard with JCB, Discover and American Express joining forces later on in 2006.  What is refreshing about PCI DSS is it’s disconnect from a government mandate.  The standards derive their authority from the big service providers (Visa, MasterCard, etc.) that enforce the PCI DSS with a mix of “carrot and stick” incentives. Read more…

RSA March 2010 Intelligence Report

March 2010 RSA Intelligence Report

Cue the Generic Computer map!


I’ve been ramping up with client projects over the last month so I haven’t been schedule some serious writing time. Excuses aside, I’m being lame it seems. 

However, the latest RSA Intelligence Report has crossed my virtual desk. I’m posting it on the widget and inserting it in this post for good measure. It has timely info for security professionals and the businesses they are protecting 

For those folks in the financial community, it would behoove you to read this report and take note that U.S. Regional Banks are still target number one for the black hat community. Also, the Rock Phish gang has been exclusively targeting financials via various schemes for the past quarter. 

As always, the US is the top target for attacks. But the US remains the top perpetrator for hosting phishing attacks.