Stories by Stacy Collett

Network monitoring in the hybrid cloud/multi-cloud era

Most enterprises now use two or more cloud service providers, and 35% use up to five monitoring tools to keep tabs on hybrid cloud and multi-cloud environments. What’s the best approach to full network visibility?

Five new threats to your mobile device security

Attacks that proved successful on PCs are now being tested on unwitting mobile device users to see what works -- and with the number of mobile devices with poor protection soaring, there are plenty of easy targets. "Attackers are definitely searching after the weakest point in the chain," and then honing in on the most successful scams, says Lior Kohavi, CTO at CYREN, a cloud-based security solutions provider in McLean, Va.

Four of the newest (and lowest) Social Engineering scams

Your computer files are being held for ransom. Pay up, or lose them. Your bank account is being emptied, so click here to stop it. Your friend has died, click on this funeral home site for more information. Social engineering thugs have reached new lows.

How security is using IAM to manage BYOD

What do smartphones and corporate credit cards have in common? Very soon, both will be monitored by employers in an effort to detect abnormal or otherwise suspicious patterns of activity. In the age of bring-your-own-device (BYOD) policies, companies are turning to techniques like these to manage access from smartphones and tablets to their internal systems and to confirm the identities of the people using them.

Who Holds the Keys?

Encryption can make up for a litany of security snafus -- from a bad firewall to an unrelenting hacker to a lost laptop. Once data is encrypted, criminals can't use or sell it. Plus, if encrypted data goes missing, companies are protected from disclosure requirements in most states. No wonder 38% of companies surveyed by Forrester Research have already adopted full-disk encryption technology. But data protection doesn't stop there. Encryption keys and digital rights also must be well orchestrated and secured, or else encryption protection goes out the window.

Five indispensable IT skills of the future

In the year 2020, technical expertise will no longer be the sole province of the IT department. Employees throughout the organization will understand how to use technology to do their jobs.

5 indispensable IT skills of the future

In the year 2020, technical expertise will no longer be the sole province of the IT department. Employees throughout the organization will understand how to use technology to do their jobs.

Will storage admins be automated out of a job?

When it comes to job stability and pay, storage administrators had it made in 2009.
In a volatile economy, as salaries for other IT positions were whittled down or saw little or no increases, the average salary for a storage administrator with 10 to 20 years' experience averaged more than US$100,000 last year, up 3.2% from 2008, according to Computerworld US' 2009 Salary Survey.
With their Fibre Channel mastery and a personal fiefdom of equipment, protocols and activities that nobody else touches, storage administrators enjoy a unique degree of job stability. But now there's a crop of new storage automation technologies that promise to change the way these IT professionals do their jobs and may even require them to share control of the storage kingdom.
"Storage is definitely at a point of change right now," from both a networking and organisational perspective, says Andrew Reichman, a storage analyst at Forrester Research. Fibre Channel-centric storage is slowly moving toward shared Ethernet, and automated storage technologies allow data and application managers to store data themselves. Add to the mix automated data tiering, thin provisioning and information life-cycle management technologies, and suddenly the once iron-clad position of storage administrator appears to be showing signs of rust.
Dave Willmer, executive director of IT staffing firm Robert Half Technology, says based on what he sees in the market today, networking administrator skills will be in higher demand than storage administrator skills for the next 18 to 24 months.
Over the past two or three years, he says, storage administrators had been in high demand because it was a time of heavy IT investment and a number of storage implementation projects were underway at large companies. "Fast-forward to today, and most companies are in maintenance mode versus implementation mode, mostly for budgetary reasons," he says. That means there should be an uptick in demand for networking administrators. What's more, companies will be highly focused on connectivity over the next 18 months, he adds. "It's all about access. That's more related to a networking administrator than a storage administrator," he says.
As companies become more virtual and demand access through different modes of communication, they will require more network administrators, Willmer adds.
Application-centric storage is one of the biggest threats to today's storage administrator role, Forrester's Reichman says.
In essence, application-centric storage allows storage administrators to revert to basic disk systems while the advanced management of data happens in the application. Reichman cites Oracle as a vendor with application-centric storage capability via its Exadata product.
"The big difference is, you wouldn't have the entire company's storage sitting in one group," Reichman says. "I predict that each major application stack would have its own storage experts sitting side by side with DBAs and the network team to make it all happen. So the reporting structure would change, and the storage director would be one of the most at-risk positions."
Automated tiering technology could also lead to a decrease in reliance on storage administrators, industry watchers say.
Today, only a few vendors offer automated storage tiering, which allows data volumes to be automatically moved between tiers of storage, depending on business performance requirements.
Right now, tiering requires storage administrators to figure out the criticality of application data, test the performance of configurations, plan the move, test the ramifications and execute the move. All of that is time-consuming. If it were automated, there would be less reliance on storage administrators.
The move the Ethernet-based storage networking also threatens the role of storage administrators.
Scottrade CIO Ian Patterson sees the online financial services company dabbling with a converged infrastructure in 2010, driving a need for people with a mix of server, software and networking skills to support networked storage and server devices contained in a single chassis.
"This will change the market for the type of people we need," he says. "It won't be just a guy who knows EMC and Hitachi storage, but [one] who knows server, storage and networking all in one device."
The upshot: Networking professionals who are experienced in Ethernet could elbow in on the storage administrator's territory.
All is not bleak for storage administrators, analysts agree. "Jobs don't go extinct in IT, they just change," says David Foote, CEO and chief research officer at Foote Partners. Just as storage administrators had to brush up their skills and certifications with the arrival of storage-area networks earlier in the decade and, later, virtualisation, they will have to prepare themselves for the coming wave of automation.
What's more, a converged network doesn't necessarily mean a convergence of storage and network positions, says Wayne Adams, chairman of the Storage Networking Industry Association. "A storage administrator is going to be making sure data is always available, accurate and can be restored. A network administrator focuses on connectivity and bandwidth. We don't see an über skill set" with both roles combined in the future, says Adams.
Storage administrators should pay close attention to the application teams whose data they store, in order to understand the businesses uses of that data. "They may someday report to those database teams," Reichman says. But storage administrators will still need to provide data protection, replication and provisioning, he adds. "So their skill set is going to remain valuable."

Five steps to evaluating business continuity services

In the past, most enterprises defined a disaster as an act of nature--a hurricane, tornado, flood or fire that wipes out their ability to conduct business as usual. Today, with worldwide networks, 24/7 customer call centers and Web applications, a common electrical failure could spell disaster when communication is interrupted in the supply chain, online transactions are halted or networks are down. Online resource has even added "business failure" to the list of calamitous events that define a disaster.

Best 100: Round-the-clock IT

When Ron DeCanio joined FedEx Services' IT staff right out of college six years ago, he knew it wasn't going to be a 9-to-5 job. "The thought of working weekends just sickened me," says the 27-year-old senior program analyst, who's based in Orlando.

Outsourcing guide: Singapore

The tiny island of Singapore is considered one of the most wired countries in the world. In fact, Singapore recently leapt into first place in the global IT economy rankings produced by nonprofit, surpassing the US and Sweden. Singapore earned top marks for its free-trade policies and "visionary government."

Outsourcing guide: The Philippines

It's Tuesday morning at 8:30. The five members of a project team at Ondeo Nalco in Naperville, Ill., assemble in a conference room around the speakerphone while business-side project manager John Ostberg dials up their software development counterparts half a world away.

Outsourcing guide: Vietnam

As an outsourcing location, Vietnam is about 10 years behind India. It has attracted attention because its education systems are good, but its graduates lack adequate English proficiency. Telecommunications, power and buildings need improvement, and uncertainty about the region's stability remains.