cioinsight.com
Home > RSS Feeds > News
  • The vast majority of technology-focused human resources and recruitment professionals plan to boost hiring efforts in 2015, according to a semi-annual survey from Dice. Most companies surveyed are planning to increase IT staffing by significant margins, and they're also looking for highly experienced candidates. Due to these factors—plus lengthier time-to-hire rates in filling tech positions—IT professionals have the advantage, and they're making good use of it.  Tech workers are asking for more money when accepting a new job, and they're seeing more counteroffers from existing employers when they disclose that they're getting wooed by a competitor. In addition, managers are seeing a surge in voluntary departures within IT, and fewer of them are anticipating layoffs this year. "The year ahead looks bright for tech professionals," says Shravan Goli, president of Dice. "They're in high demand and—with managers looking to hire a substantial number of new employees—they really have strong negotiating power." More than 775 U.S. HR managers, recruiters, consultants and staffing company representatives who hire or recruit tech professionals took part in the research.

  • Having Websites just reachable via IPv4 is not enough anymore. Companies need to adopt IPv6, which will enable them to successfully grow their business.

  • Information security, applications software and systems analytics are emerging as white-hot niches within an already booming IT employment market, according to recent research from Sologig.com. While the overall U.S. workforce is projected to grow by 1.2 percent in 2015, the following tech specialties are expected to expand by at least twice that rate, creating more than 70,000 new jobs. Each pays more than the current $20 in median hourly earnings, and four pay more than $40 an hour. Considering the demand for these positions and the shortage of talent available to fill them, you can expect that such compensation will increase in the year ahead. "The IT sector can expect healthy headcount expansion next year," says Rob Morris, director of Sologig.com, which is CareerBuilder's job site for tech professionals. "However, many of the fastest growing occupations are the very ones recruiters are already having a hard time finding candidates to fill existing positions. As companies' tech needs grow and as competition for top talent heats up, we expect starting compensation to continue its climb for the most qualified tech professionals." The research was based on labor market analysis from Economic Modeling Specialists International, which uses databases compiled from more than 90 federal and state employment sources.

  • The coming year promises to introduce significant disruption and challenges for business and government. These key trends will reshape IT and the enterprise.

  • Over the last few years, news about data breaches and breakdowns has reached pandemic levels. In many instances, the culprit is the ubiquitous password, which is increasingly ineffective in protecting digital identities and securing digital devices. A new study conducted by identity and credential management firm Intercede U.S. offers insights into the problem—and the way consumers, employees and others think about and approach digital identities. Part of the problem, according to the report, "The Rise of the Identity Centric Economy," is that workers are put off by logging into secure business apps due to the perceived weakness of their network security, and many are frustrated by long, complicated passwords. What's more, "Many employees are oblivious to their employer's BYOD policy, unnecessarily putting sensitive corporate data at risk," points out Richard Parris, CEO of Intercede. "Fears about long, complex passwords and insecure network connections are hampering the growth of BYOD. The best approach is to turn mobile devices into secure authentication devices, which act as the first line of defense to protect corporate data. Companies must act quickly and robustly to employ effective BYOD policies while protecting their own data, or risk major security incidents." The following slides provide some highlights from the study.

  • With the number of exploitable browser vulnerabilities growing, many IT decision-makers surveyed said this made security more difficult than any other issue.