IDG Contributor Network: Will new technologies put us out of work? A peek into the future

Over the past year, questions about how emerging technologies will impact employment have taken on a new tenor. Will robots take over our jobs? One thing is indisputable: automation and artificial intelligence (AI) will displace workers in the IT and business process outsourcing services industry.But this is not a new trend.+ Also on Network World: The 6 hottest new jobs in IT +Such tectonic shifts have occurred every few decades over the last two centuries. With each wave of new technology and each accompanying paradigm shift, jobs have disappeared. During the Industrial Revolution, people feared the loss of farm jobs. When industrial jobs went away, people flocked to the service sector. Then computers, telecom networks, ATMs and the internet made their way into the world, and people feared massive job loss in this sector. Manufacturing work moved to low-cost countries, such as China and Taiwan, and service-sector jobs soon moved to India and the Philippines.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Will new technologies put us out of work? A peek into the future

Over the past year, questions about how emerging technologies will impact employment have taken on a new tenor. Will robots take over our jobs? One thing is indisputable: automation and artificial intelligence (AI) will displace workers in the IT and business process outsourcing services industry.

But this is not a new trend.

+ Also on Network World: The 6 hottest new jobs in IT +

Such tectonic shifts have occurred every few decades over the last two centuries. With each wave of new technology and each accompanying paradigm shift, jobs have disappeared. During the Industrial Revolution, people feared the loss of farm jobs. When industrial jobs went away, people flocked to the service sector. Then computers, telecom networks, ATMs and the internet made their way into the world, and people feared massive job loss in this sector. Manufacturing work moved to low-cost countries, such as China and Taiwan, and service-sector jobs soon moved to India and the Philippines.

To read this article in full or to leave a comment, please click here

Apple surprise: iOS 10 preview’s kernel unencrypted

While new iOS 10 features like improved Maps, Siri integration and Photos were expected during Apple's Worldwide Developers Conference last week, the company stunned developers by leaving the kernel unencrypted in the preview edition of its new iPhone and iPad software.MIT Technology Review first reported on this revelation, discovered by security researchers and iOS developers, who were left wondering whether Apple did this on purpose or goofed up big time. To read this article in full or to leave a comment, please click here

Microsoft plugs Edge browser as power miser

Microsoft yesterday claimed its own tests show that Edge, the default in Windows 10, used 27% less power than the No. 1 browser, Chrome, and 35% less than the slowly-sliding-into-obscurity Firefox.The Redmond, Wash. company's Edge-eats-less campaign may have been motivated by Edge's poor performance in the marketplace, where it has been adopted by less than 30% of the Windows 10 population.In a pair of blog posts, a director of Edge's platform team and an Edge program manager touted the results of Microsoft's in-labs tests.To read this article in full or to leave a comment, please click here

Tech jobs report: Security, devops, and big data stay hot

If you're wondering what IT skill sets to acquire, security and devops are doing well in the job market. Pay for cloud skills, however, is eroding.Research firm Foote Partners' latest quarterly IT Skills and Certifications Pay Index determined that the market value for 404 of the 450 IT certifications it tracks had increased for 12 consecutive quarters. Market values rose for noncertified IT skills for the fifth consecutive quarter.[ Don't get left behind -- download the Devops Digital Spotlight, and learn all about the game-changer in app development and deployment. | Get a digest of the day's top tech stories in the InfoWorld Daily newsletter. ] Foote's report is based on data provided by 2,845 North American private and public sector employers, with data compiled from January to April 1. (Noncertified skills include skills that are in demand but for which there is no official certification, Foote spokesman Ted Lane noted.)To read this article in full or to leave a comment, please click here

Tech jobs report: Security, devops, and big data stay hot

If you're wondering what IT skill sets to acquire, security and devops are doing well in the job market. Pay for cloud skills, however, is eroding.Research firm Foote Partners' latest quarterly IT Skills and Certifications Pay Index determined that the market value for 404 of the 450 IT certifications it tracks had increased for 12 consecutive quarters. Market values rose for noncertified IT skills for the fifth consecutive quarter.[ Don't get left behind -- download the Devops Digital Spotlight, and learn all about the game-changer in app development and deployment. | Get a digest of the day's top tech stories in the InfoWorld Daily newsletter. ] Foote's report is based on data provided by 2,845 North American private and public sector employers, with data compiled from January to April 1. (Noncertified skills include skills that are in demand but for which there is no official certification, Foote spokesman Ted Lane noted.)To read this article in full or to leave a comment, please click here

How computer modeling built the 2016 Cadillac CT6

The automotive world is becoming much more dependent on modeling than ever before. Automakers are now using more aluminum parts; vehicles have complex computers on board, often working with each other; and there's an increasing need to make cars safer in the age of the distracted driver.To read this article in full or to leave a comment, please click here(Insider Story)

How to hire for the right big data skill set

Data science is a hot new industry, but what skills and background do you need to break into the field? Essentially, data science, data engineering and data analytics are broad -- and sometimes ambiguous -- terms that describe a litany of skills and job titles in the world of data analytics. "The title of 'data scientist' is broadly applied within different organizations, making it difficult to provide a complete and noncontroversial list of required skills. At a high level, a data scientist needs a mastery of the tools and techniques to access, transform, analyze and leverage the data of their organization," says Kyle Polich, principal data scientist at DataScience. If your company is looking to hire data scientists or analysts, it's important to know what you're hiring for. Data jobs often encompass a lot more than just data; there are people specifically dedicated to each stage of the process from collecting, to warehousing, to analyzing and to using that data to transform the business. Ultimately, a good data strategy relies on a number of qualified individuals who can write algorithms, manage and collate data, interpret the data and communicate it to key stake holders. Data warehousing Warehousing data is a Continue reading

Severe flaws in widely used archive library put many projects at risk

In a world where any new software project is built in large part on existing third-party code, finding and patching vulnerabilities in popular open-source libraries is vital to creating reliable and secure applications.For example, three severe flaws in libarchive, recently found by researchers from Cisco Systems' Talos group, could affect a large number of software products.Libarchive is an open-source library first created for FreeBSD, but since ported to all major operating systems. It provides real-time access to files compressed with a variety of algorithms, including tar, pax, cpio, ISO9660, zip, lha/lzh, rar, cab and 7-Zip.The library is used by file and package managers included in many Linux and BSD systems, as well as by components and tools in OS X and Chrome OS. Developers can also include the library's code in their own projects, so it's hard to know how many other applications or firmware packages contain it.To read this article in full or to leave a comment, please click here

Severe flaws in widely used archive library put many projects at risk

In a world where any new software project is built in large part on existing third-party code, finding and patching vulnerabilities in popular open-source libraries is vital to creating reliable and secure applications.For example, three severe flaws in libarchive, recently found by researchers from Cisco Systems' Talos group, could affect a large number of software products.Libarchive is an open-source library first created for FreeBSD, but since ported to all major operating systems. It provides real-time access to files compressed with a variety of algorithms, including tar, pax, cpio, ISO9660, zip, lha/lzh, rar, cab and 7-Zip.The library is used by file and package managers included in many Linux and BSD systems, as well as by components and tools in OS X and Chrome OS. Developers can also include the library's code in their own projects, so it's hard to know how many other applications or firmware packages contain it.To read this article in full or to leave a comment, please click here

10 top-ranked tech-focused MBA programs

Top-ranked tech-focused MBA programsImage by ThinkstockThere's a looming executive leadership crisis in today's IT companies, but there's certainly no shortage of excellent, rigorous programs designed to help build the next generation of great leaders. If you're looking for a resume boost or considering a career path that leads to the C-suite, consider an MBA with a technology focus. Based on the 2016 rankings from U.S. News and World Report, here are the top 10 technology-centric MBA programs, their costs and full-time enrollment statistics. Massachusetts Institute of Technology (MIT)Image by Vitor Pamplona/Wikipedia To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hello, world: Welcome to the agile data center

Some of the best technology in the world has begun with a simple "Hello World." I wanted to do the same and introduce myself, along with this new blog entitled "The Agile Data Center." With this blog, I will focus on some of the latest technologies around modernizing data center software and hardware, as well as aligning skill sets and introducing new roles in the IT space. So, what defines an agile data center and why should you care? Growing up in the technology space, I've worked for companies such as VERITAS, Symantec, SAP and EMC. During that time, and especially now, I can see and realize that most companies have not aligned business and IT. While this has "worked" for a number of years, companies are now becoming quickly disrupted by startups that have successfully aligned IT and can keep up with the rapid pace of business.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hello, world: Welcome to the agile data center

Some of the best technology in the world has begun with a simple "Hello World." I wanted to do the same and introduce myself, along with this new blog entitled "The Agile Data Center." With this blog, I will focus on some of the latest technologies around modernizing data center software and hardware, as well as aligning skill sets and introducing new roles in the IT space. So, what defines an agile data center and why should you care? Growing up in the technology space, I've worked for companies such as VERITAS, Symantec, SAP and EMC. During that time, and especially now, I can see and realize that most companies have not aligned business and IT. While this has "worked" for a number of years, companies are now becoming quickly disrupted by startups that have successfully aligned IT and can keep up with the rapid pace of business.To read this article in full or to leave a comment, please click here

Physical Security in a Virtual World – NSX Securing “Anywhere”

blog2-pic1This is the second blog post in our Micro-segmentation Defined – NSX Securing “Anywhere” blog series. This blog post walks through security requirements that exist in environments with mixed workload deployment types. A mixed workload environment is one utilizing multiple application deployment models, including applications deployed on both virtual machines and legacy physical servers. We demonstrate how the necessary security requirements for mixed workload environments can be met through using VMware NSX as a platform for micro-segmentation and advanced security services. This blog focuses on the following:

  1. Defining security requirements based on application deployment model or environment type
  2. Understanding methods of protection in modern data centers
  3. How NSX provides micro-segmentation for both physical and virtual workloads
  4. How integration with ecosystem security and network controls functions

Security Requirements Differ in Heterogeneous Environments

Due to the evolving threat landscape and growing sophistication of cyber-attacks and threat actors, a single static policy or blanket approach to securing modern data centers is no longer adequate. These types of policies are difficult to manage and take a narrow-focused approach to what needs to be a much broader solution. Today’s private cloud environments are comprised of a variety of workloads and deployment models, whether it be Continue reading

Apstra comes out of stealth, solves the multi-vendor SDN challenge

Earlier this month I wrote a post asking the question: “Who speaks for multi-vendor environments?” Since then, I’ve had a few vendors reach out to me about their solutions that could indeed meet the needs of a vendor-agnostic data center. One of the most interesting, Apstra, came out of stealth mode this week and has a solution that’s certainly up to the challenge that I laid out in my blog.Apstra’s solution automates the data center operations across the lifecycle of the network—from the design/build phase through deployment/operate. The Apstra Operating System (AOS) takes an integrated approach to managing the data center that starts with business intent and is fed into a closed loop system. The data center operator then selects a pre-configured, and a validated template applies any constraints to it, which creates a blueprint for deployment.To read this article in full or to leave a comment, please click here