IT careers and IT skills

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Five top UK tech startup clusters outside London

    Tech City UK has moved towards promoting the entire UK, rather than just the capital

  • Skills shortages identified as key risk to government digital strategy

    Government Digital Service says skills shortage is one of the biggest risks to delivering more than £1.4bn of annual savings in Whitehall

  • IT Specialist Certification (ITSC) accreditation requirements

    The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. The Program is skills and experience-based and goes beyond validating the mastery of any specific knowledge base. The Program includes a framework for accreditation of third parties to establish IT Specialist certification programs affiliated to The Open Group. The framework of accreditation and certification is specifically intended to standardize the process and criteria for IT Specialist professional certification and establish a foundation for the required skills and experience necessary to achieve such a distinction. The Program has been designed to be flexible and extensible so that the framework may be adopted by any industry, country, or organization.

  • UK government must do more to harness home-grown IT talent, says Digital Skills Taskforce

    UK Digital Skills Taskforce reveals recommendations for UK government ahead of general election

  • Ten startups selected for London FinTech accelerator

    Startupbootcamp, a provider of three-month accelerator programs, announces its top 10 startups for its London based financial sector technology (fintech) accelerator

  • Open Group technical document: IT Specialist Certification Accreditation Policy

    Clearly “book learning” is a critical first step to becoming effective at anything. But the effectiveness, potential, and the degree and value of contribution rise to a new level as relevant skills and experience are gained in a topical area. It is clearly important to “know” a subject, but it is more valuable to have applied that knowledge. It is for this reason that The Open Group IT Specialist Certification (ITSC) program is based on an assessment of people skills, technical skills, and experience, not just tests of knowledge.

  • FDM Group receives SaBRE award for supporting ex-forces

    MOD SaBRE programme awards service provider FDM Group for its work employing UK reservists and ex-forces

  • CWwomen: Undergraduate and under-represented – Aberystwyth University

    In this video from Computer Weekly’s Women in IT event, Hannah Dee talks about undergraduate women, the current skills crisis in the technology industry, and recruiting skills for a more diverse base into enterprises.

  • Ocado Technology readies primary school teachers with code initiative

    Ocado Technology launches code initiative as teachers reveal they’re underprepared for computing curriculum

  • C4DI’s 3Gbps broadband set to attract startups to Hull

    As London tech startups struggle with copper infrastructure, the co-founder of Hull-based tech hub C4DI says superfast broadband has been vital in getting his alternative project off the ground

  • VIEW MORE ON : Jobs
  • Practical Data Migration: PDMv2

    In this chapter from the second edition of his book, Morris outlines PDMv2 and show how it overcomes common data migration problems by using a set of integrated modules that cover the whole scope of a data migration from project start-up to legacy decommissioning and beyond. The chapter also gives a brief overview of the types of software technology available to support data migration.

  • Five top UK tech startup clusters outside London

    Tech City UK has moved towards promoting the entire UK, rather than just the capital

  • Technology value matrix: Human Resources solutions

    Most small and medium businesses (SMBs) and all large enterprises employ human resources (HR) functionality to manage their employees. Even though many vendors offer HR solutions, these solutions may require integration with other HR software or with enterprise resource planning (ERP) to cover the functionality companies need. Some vendors differentiate themselves from their competitors by providing HR solutions built on new technologies, often times delivered in the cloud, and which can also be accessed on mobile devices.

  • The Banking Industry Architecture Network and TOGAF

    Financial institutions are facing significant changes of the environment in which they operate. For example, the financial crisis, changing customer behavior, increased risk awareness, focus on cost reduction, and the entrance of new financial players in the market-place have structurally changed the financial industry. Not only the operations, but also the supporting IT required a challenging transformational change. Given the close inter-dependency of operations and IT in financial institutions, a carefully planned and guided integrated approach to change is required. Enterprise architecture is key to enabling such change initiatives.

  • Skills shortages identified as key risk to government digital strategy

    Government Digital Service says skills shortage is one of the biggest risks to delivering more than £1.4bn of annual savings in Whitehall

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

  • Overview of the Open Group Security Forum

    The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations. We identify information security business requirements and develop standards and guides that respond to them. Our global scope looks across all industries towards what is common to all, benefiting IT suppliers and consumers alike. Our security strategy is focused on Security Architectures and Security Management – see our current list of projects, overleaf. We host quarterly Security Practitioners Conferences, where invited expert speakers address strategic issue within our interest areas.

  • UK government must do more to harness home-grown IT talent, says Digital Skills Taskforce

    UK Digital Skills Taskforce reveals recommendations for UK government ahead of general election

  • Ten startups selected for London FinTech accelerator

    Startupbootcamp, a provider of three-month accelerator programs, announces its top 10 startups for its London based financial sector technology (fintech) accelerator

  • VIEW MORE ON : Technical skills
  • How to be influential online

    Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

  • How to embed innovation in the corporate culture

    Innovation often features high on CIOs’ agendas because it is recognized as being an important means by which information systems and technology can contribute positively to the evolution and performance of the business. However, in practice the execution often falls short of the ambition. Reasons for this range from the mundane, such as there being insufficient time or capacity to devote to it, to the more fundamental, such as organizational or cultural barriers, or insufficiently defined processes and governance for capturing ideas and seeing them through to fruition.

  • Stories That Move Mountains: Improve your presentation skills

    Anyone who has a business role to play in influencing others, needs to make their presentation stand out from the crowd and this extract from Stories That Move Mountains, published by Wiley, promises to help the reader do just that. Authored by three enterprise experts at Microsoft, Stories That Move Mountains, explains to readers how to use a process called CAST (Content, Audience, Story and Tell) to create effective stories and visualisations - known as ‘Story Mapping’ – and deliver persuasive presentations.

  • Five top UK tech startup clusters outside London

    Tech City UK has moved towards promoting the entire UK, rather than just the capital

  • The DNA of the CIO

    The DNA of the CIO provides fresh insight into what it is to be a Chief Information Officer (CIO) today. For many years, CIOs have been talking about becoming a true partner to the business and the executive management team. ut, as Ernsy & Young's report, The DNA of the CIO highlights, relatively few have broken out of their comfort zones to actually become one.

  • The Mindset of the Chief Information Officer

    This study evaluates the leadership role that Chief Information Officers performs in helping their organisations achieve their commercial goals. It examines the skills and behaviours that contribute to their success and considers the relationships the CIO has with the CEO, the executive team and other influential stakeholders. This study, which draws on interviews with leading CIOs, provides senior IT executives with insights to help them reflect on their leadership roles and to consider areas for their own professional development.

  • The next wave of digitisation: setting your direction, building your capabilities

    Technology, internet and telecommunications industries are undergoing a fundamental change towards near-complete digitisation, with redefinition of existing business models and value creation systems. This Booz & Company study estimates that by as early as 2015, IT and communications will account for 30-40% of companies' investment budgets, and the ongoing digitisation of every industry will affect global economic value by between $12trn and $15trn in 2020, including market share shifts, cost improve­ments, price decreases and new value pools.

  • TOGAF® and SABSA® Integration

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • The Open Group: Cloud buyers’ decision tree

    This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. Your business situation is either a problem or an opportunity for which you are seeking a solution that includes IT enablement. This Tree presupposes that the current and/or future state of the IT resources for your business situation does and/or will not meet requirements. If you are a Cloud seller, then use this Decision Tree in reverse to determine for which business situations your proposed offering would be a good fit.

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • VIEW MORE ON : Management skills
  • Stories That Move Mountains: Improve your presentation skills

    Anyone who has a business role to play in influencing others, needs to make their presentation stand out from the crowd and this extract from Stories That Move Mountains, published by Wiley, promises to help the reader do just that. Authored by three enterprise experts at Microsoft, Stories That Move Mountains, explains to readers how to use a process called CAST (Content, Audience, Story and Tell) to create effective stories and visualisations - known as ‘Story Mapping’ – and deliver persuasive presentations.

  • Five top UK tech startup clusters outside London

    Tech City UK has moved towards promoting the entire UK, rather than just the capital

  • The DNA of the CIO

    The DNA of the CIO provides fresh insight into what it is to be a Chief Information Officer (CIO) today. For many years, CIOs have been talking about becoming a true partner to the business and the executive management team. ut, as Ernsy & Young's report, The DNA of the CIO highlights, relatively few have broken out of their comfort zones to actually become one.

  • TOGAF® and SABSA® Integration

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • The Open Group: Cloud buyers’ requirements questionnaire

    This White Paper describes a questionnaire that will help you identify your requirements for Cloud computing in a structured way, so that you can more easily reach the best solution. It contains questions about your enterprise – not about the products and services that you might be considering. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises.

  • Skills shortages identified as key risk to government digital strategy

    Government Digital Service says skills shortage is one of the biggest risks to delivering more than £1.4bn of annual savings in Whitehall

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

  • Open Group: FAIR -ISO/IEC 27005 Cookbook

    This document discusses the different purposes of the two standards, how to reconcile the two with regard to terminology and process, and combine the best elements of both to produce a consistent, repeatable risk management process.

  • Governance in IT and Architecture - TOGAF

    The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

  • VIEW MORE ON : Training