Telecom drag on IT Job Market

Telecom drag on IT Job Market – 39,200 jobs eliminated in last 12 months

Telecom drag on IT Job Market – telecommunications hiring has been suffering this year. The industry dropped 700 jobs in June, making a total of 39,200 jobs lost in 2017. That comes as no surprise considering the whirlwind of telco mergers and acquisitions. Verizon’s acquisition of Yahoo’s Internet properties led to a massive cut, Windstream’s purchase of EarthLink eliminated hundreds of employees, and Vonage recently laid off 90 people due to acquisition redundancy.

Telecom drag on IT Job Market
48,800 IT jobs have been added to the IT Job market despite a loss of 39,200 telecom jobs in the last 12 months.

Janco has just completed its analysis of the first six months of the IT job markets growth and adjusted its forecast for IT job market growth the remainder of this year.  In summary, the IT job markets should grow at the about the same rate as it did in 2016 even though IT job market growth currently is behind what occurred in the first six months of 2016.

The CEO of Janco Associates, Inc., Mr. M. Victor Janulaitis said, “There continues to be a shrinking of telecommunication jobs.  In the last 12 months alone, there as been a loss of 39,200 telecommunication jobs while the rest of the IT job market is expanded by 88K new jobs in the same period.  This is a trend that we think will continue for the next few quarters.”

The CEO added, “In the last 3 months over 14,600 jobs have been added in the Computer System Design and Related Services sector of the IT job market. Based on our conversations with scores of CIOs, CFOs, and CEOs; we see that trend continuing. As a result, we forecast that the overall IT Job market will grow by over 60,000 jobs in the next six months. This would result in the creation of 72,000 new IT jobs in 2017. That should equal the rate of IT job market growth that was seen in 2016.”

Janco interviewed 113 CIOs, CFOs, and CEOs in the last several weeks as part of it’s IT Salary Survey process ( https://www.e-janco.com/salary.htm ).  Janco’s CEO said, “C-Level executives interviewed after the election were optimistic that there will be more incentives for increased IT spending and hiring.  It seems the tide has turned and they now feel there will be  less growth in IT budgets for the remainder of this year.” He added, “Hiring prospects are marginal at best, except for IT Staff at the worker level in the latter part of this year.”

Janulaitis added, “There is little demand for new executive and senior management positions over the next few quarters.  On the bright side there looks to be an increase the headcount for IT staff towards the end of this calendar year.  The trend to IT job creation is up and if a  tax reform is implemented one would expect that IT jobs would be the first ones that were opened to be filled.”

More information can be found on Janco’s analysis of overall labor picture and the IT job market on Janco’s website.

Janco is an international consulting firm that follows issues that concerns CIOs and CFOs and publishes a series of IT and business infrastructure HandiGuides® and Templates including a Disaster Recovery/Business Continuity Template, Security Template, IT Job Descriptions, and its semi-annual IT Salary Survey.

eCommerce obsoleting traditional retail

eCommerce obsoleting traditional retail – Infrastructure needs to change

eCommerce obsoleting traditional retail
One of the best ways to communicate and understand a company and its operating culture is through its policies. Designing and writing policy and communicating it effectively is an essential skill for professionals to have. By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy.

eCommerce obsoleting traditional retail with brick and mortar businesses impacted the most.

eCommerce is changing the way both business and consumers shop. Retailing is changing at lightning speed coupled with an ever-tightening decision horizon, changing consumer expectations and an unrelenting flood of data. eCommearace is disrupting classic retail models.

Traditional infrastructure models for merchandising, supply chain, and store operations are now triggered autonomously by novel and unexpected sources that are facilitated by artificial intelligence, machine learning, and voice and IoT sensors connected to a digital core.

Consumer wearables, smart appliances and homes, driverless vehicles, drones, virtual reality headsets, and online games are becoming points of brand interactions – from demand to execution. What has served retailing well in the past now is a serious liability with it being unable to drive business success.

  • By 2020, 83% of mobile users globally will use their device to access the Internet
  • By 2020, there will be 75 billion connected devices
  • By 2025, the Internet of Things (IoT) will have potential economic impact of $4 trillion – $11 trillion a year, with impact in retail up to $1.2 trillion
  • By 2025, augmented reality (AR) and virtual reality (VR) will represent up to $182 billion market opportunity

Order IT Infrastructure PoliciesDownload Selected Pages

Top 5 Hot Jobs

Top 5 Hot Jobs

Chief Digital Office (CDO) & Chief Mobility Officer (CMO) Hot C-Level Jobs

Top 5 Hot Jobs – CDO & CMO Hot C-Level Jobs that are not only new but also hot.  In the case of Chief Digital Officer (CDO), we have found that one in five companies now have some in that role.  In addition, half of those enterprises hired the incumbent in the last 12 months. The case is not quite as strong for the Chief Mobility Officer (CMO) as we found that only one in ten organizations have an individual other that the CIO assuming those responsibilities.

Top 5 hot jobs
Chief Digital Officer is one of the hottest jobs in the technology arena. Other hot jobs are Chief Mobility Officer (CMO), Digital Brand Manager, Data Scientist, and Social Media Specialist.

Many of the hot new jobs often report to the operational side of the business, instead of the traditional IT organization under the authority of the CIO.  Part of the reason for that is that almost half of all IT functions report up thru the financial side of the enterprise, not the operational side.

The five hot new jobs are listed below and have links to pages describing the major roles and responsibilities they have:

All of these jobs have one thing in common.  They are addressing the issues, roles, and responsibilities of the new age marketplace.  Without the Internet, e-commerce, and mobile users there would be no need for these positions.

But, as it is these are the new jobs that have been created by these new technologies and changes that have taken place.

Order IT Job DescriptionSample job description

Women CIOs comprise over 20% of all CIO roles

Women CIOs  hold over 20% of all CIO roles according to data analyzed by Janco Associates

Women CIOs – In the process of capturing public data on CIO compensation, Janco has found that well over 1 out of 5 CIOs is a women.

Women CIOs and other C-Level positions

According to the CEO of Janco Associates, at least two thirds of large public companies doing CIO searches require the recruiter to include women in the candidate pool. Further, when “all else is equal”, between a male candidate and a female one, companies are tending to choose the latter specifically to enhance the diversity of perspectives on the management team.

Unfortunately, even with this data, there are still too few women in senior, experienced roles to populate the candidate pools of all diversity-minded companies. So it’s not enough to decide at the CIO level to hire a woman. The relevant decisions must be made and opportunities offered earlier, at the developmental stage of potential finance leaders.

Companies need to provide more mentors who can share wisdom about things like where to invest time and ways to be motivated.

For those with leadership potential who prioritize family and stability over always making the best career move, the path to the C-suite may be inherently more difficult in CEO and finance than in other functions, like IT and human resources.

10 point DR power checklist

10 point DR power checklist defined in Janco DR/BC Template

10 point DR power checklist — After an event that disrupts a network, availability of power to recover and run the network often is critical.  Below is a 10 item check list of what to consider in your disaster recovery – business continuity plan.

  1. Electricity, water, broken wires do not mix.  Before anything else validate that the power source and power distribution systems are dry and functional before power is turned on.
  2. Understand the minimum power requirements to be operational.   Have a clear understanding of a facility’s critical loads.
  3. Have an adequate fuel supply to operate backup power sources. Make smart fuel and technology choices, considering things such as if natural gas pipeline service were to be disrupted in your community. Make sure that you have sufficient fuel storage capacity onsite for an extended outage.
  4. Set reasonable response times for standby generator.  Frequent outages of a few seconds, a few minutes, or more, can have significant cost implications for businesses. While some other generators take up to two minutes to engage, diesel-powered generators are uniquely able to provide full load power within 10 seconds of a grid outage.
  5. Maintain your equipment and test it operations. Standby generators should be exercised periodically to ensure they will operate as designed in the event of an outage.
  6. Understand your environment and geography.  Even the best generators won’t work underwater when subjected to extreme flooding.  Check unit location for protection from flooding and ensure you use the proper gauge extension cord.
  7. Set up generators in an “open environment”. Use generators or other gasoline or charcoal-burning devices such as heaters in an open area or outside near an open window. Carbon monoxide fumes can build up and poison people.
  8. Quarterly review your load.  Know when there are any new demands or critical circuits to protect.  If you’ve added new computers or other power-hungry devices, consider updating switchgear.
  9. Meet all mandated compliance requirements. Make sure you have the proper permits and records on operations.
  10. Optionally contract for a rental power source.  Consider a rental generator power for use in the event of an extended outage.

Order Disaster Plan TemplateOrder Disaster Plan TemplateDisaster Plan Sample

Top 10 WYOD Best Practices

Top 10 WYOD Best Practices expand beyond BYOD

Tio 10 WYOD Best Practices - Policy
WYOD Policy that address all of the issues generated by this technology.

Top 10 WYOD Best Practices – Employees bringing their own smartphones into the workplace started the BYOD trend requiring enterprises to deal with the serious security implications that come from these devices. The decision for employees to wear their own device (WYOD), such as an apple watch that can link to your Wi-Fi; capture audio, video and data; store; and transmit poses similar problems for IT departments.  Employees and individuals outside of the enterprise can use these devices, sometimes discretely, to access and share business content.

This puts corporate data and infrastructure at risk, and reinforces the need for IT managers to focus on securing the content, rather than the device that’s in use. Wearable devices simply add another level of access and security concern to what we’ve already seen with the BYOD trend.

Here are top 10 best practices for WYOD:

  1. Have a strategy for how, when and why WYOD devices can be used
  2. Implement an acceptable use policy
  3. Identify the connectivity options that are available to both internal and external users
  4. Approved devices should be easily connected to the available secure access points
  5. Define a management process for the WYOD devices
  6. Plan for the activity WYOD devices will add to the network
  7. Make collaboration tools a priority
  8. Secure the end points and isolate sensitive/confidential information and locations
  9. Be prepared for little to no advance notice on upgrades
  10. Formalize your 7 x 24 support

For more information on this go to WYOD Policy.

IT Job Market to expand

IT Job Market to expand as CIO and CFO confidence is high

Year to year comparisons show IT Jobs increased at double the rate of 2017 – Janco’s forecast of 136,500 new IT jobs stays firm

Information Technology job market spiked up with double the number new jobs in January of this year versus January of last year.  The CEO of Janco Associates said, “This increased demand for Information Technology professions remains firm with more hiring on tap for at least the next several months.  From our conversations with many CIOs, CFOs, and CEOs we feel this is the start of a boom in demand for IT professionals. Janco’s forecast of 136,500 new Information Technology jobs for 2017 is on track with 11,800 new jobs added in January. ”

Projected IT job market growth
Janco forecasts that over 124,700 new Information Technology Jobs will be added in the remaining 11 months of 2017
YTD IT Job Market growth
January 2017 had double he number of Information Technology jobs created than January 2016
Order Salary SurveyDownload Selected PagesDownload Selected Pages

Walmart denies hack occurred

14,600 emails addresses and passwords posted – Walmart denies hack occurred

Walmart denies hack occurred
Incident Communication Plan

Walmart denies hack occurred after email address and passwords were posted.   – Over 14,600 email addresses and plain-text passwords associated with Sam’s Club’s online store were dumped on Pastebin, a text sharing site. Walmart denied a hack occurred.

The title of the password dump said that the accounts listed belonged to the retail giant. The company which has over 650 locations across the US and tens of millions of members.

Walmart said “.. looked into this issue and there is no indication of a breach of our systems. It is most likely a result of one of the past breaches of other companies’ systems. Because customers often use the same usernames and passwords on various sites, bad actors will typically test the credentials they obtain across many popular sites. Unfortunately, this is an industry-wide issue,” said a Walmart spokesperson.

Order PolicySample Policy

That is no way to inspire confidence in the security of an enterprise’s website.

To survive an incident such as a business interruption, security breach, or a product recall, organizations need more than a successful communication strategy – they need an incident communication plan.

The overall objectives of a incident communications plan should be established at the outset. The objectives should be agreed upon, well understood, and publicized. For example, will the primary objective of the communications plan be for communications only to employees, and only during a disaster? Or is the intent to advise customers of interruptions to service? Or is it for investors and stockholders? Or regulatory agencies? Or is it some combination of these?

eReader versions of the DR Plan and IT Job Descriptions

eReader version of DR/BC Plan and IT Job Descriptions – 273 jobs

eReader version of DR Plan and IT Job Descriptions have just been released by Janco.  Both of these offering now can be put in an enterprise’s catalog of electronic documents which can be shared across the network.

eReader books by Janco
eReader books by Janco

The .epub version can be read by most (if not all mobile devices) including iPad, Surface, generic tablets, SmartPhones, and computer desktops.  With this step forward a great collaboration tool is now in the hands of individuals who can review, write notes on, share, and utilize as a handy set of reference tools.

The eReader version are fully indexed, have a hot link table of contents and meet industry standards for mobility.

Over the course of the next several months Janco will be adding .ePub options to most of its product line.  Products that are next in line for this include.

Order Sensitive Information Policy

10 Point Checklist DR Power Requirements

10 Point Checklist DR Power Requirements

10 point checklist DR power requirements in Janco’s Disaster Recovery Business Continuity template.  The checklist addresses the issues associated with power after an event disrupts availability. It is:

  1. Electricity, water, broken wires do not mix.  Before anything else, validate that the power source and power distribution systems are dry and functional before power is turned on.10 Point Checklist DR Power Requirements
  2. Understand the minimum power requirements to be operational.   Have a clear understanding of a facility’s critical loads.
  3. Have an adequate fuel supply to operate backup power sources. Make smart fuel and technology choices, considering things such as if natural gas pipeline service were to be disrupted in your community. Make sure that you have sufficient fuel storage capacity on-site for an extended outage.
  4. Set reasonable response times for standby generator.  Frequent outages of a few seconds, a few minutes, or more, can have significant cost implications for businesses. While some other generators take up to two minutes to engage, diesel-powered generators are uniquely able to provide full load power within 10 seconds of a grid outage.
  5. Maintain your equipment and test it operations. Standby generators should be exercised periodically to ensure they will operate as designed in the event of an outage.
  6. Understand your environment and geography.  Even the best generators won’t work underwater when subjected to extreme flooding.  Check unit location for protection from flooding and ensure you use the proper gauge extension cord.
  7. Set up generators in an “open environment”. Use generators or other gasoline or charcoal-burning devices such as heaters in an open area or outside near an open window. Carbon monoxide fumes can build up and poison people.
  8. Quarterly review your load.  Know when there are any new demands or critical circuits to protect.  If you’ve added new computers or other power-hungry devices, consider updating switchgear.
  9. Meet all mandated compliance requirements. Make sure you have the proper permits and records on operations.
  10. Optionally contract for a rental power source.  Consider a rental generator power for use in the event of an extended outage.
Order Disaster Plan TemplateOrder Disaster Plan TemplateDisaster Plan Sample

10 step security

10 step security for third party access to enterprise systems

10 Setps for security in cloud Security plan10 step security for 3rd party access to enterprise systems are a must with the increased use of internet processing and use by day to day business operations.

Security and compliance are key to maintaining control of sensitive and confidential information. All of the product offerings of Janco are geared towards proving tools to help C-Level executives and top IT professionals maintain the privacy of its users and enterprise data.

Order Security ManualDownload Selected Pages

  1. Create an asset inventory and tracking to reduce the risk of network-connected assets being out of compliance with policy.
  2. Understand the cloud-based environment where all users are considered remote, and apply controls similar to how they have historically provided access to third parties.
  3. Make changes in how the organization manages and controls these various user-types by incorporating concepts such as zero-trust, network abstraction, extended identity validation and full-session recording to effectively reduce the overall risk and isolate any potential impact caused by third parties or remote user actions.
  4. Define a plan which meets the requirements for external contractors, employees, and B2B entities.
  5. Coordinate third party access plan in conjunction with their business units and develop a solid communications plan.
  6. Create rules for access using the appropriate level of controls commensurate with their given risk profiles, to include: isolation/segmentation, encryption, and federation integrations.
  7. Establish access points and rules for data availability to third parties
  8. Invest in ways to authenticate third-party users beyond simple username and password.
  9. Define metrics which address compliance variances and risks, and build an end-to-end security and risk view for the entire enterprise.
  10. Create a reporting system which track access, access violations, downloads and total usage. This should be real-time and have assigned individuals monitor and report and deviations.

Order Cloud Outsourcing TemplateDownload Selected Pages

Digital Brand Manager – Technology skills required for many mainstream roles

Digital Brand Manager hot new job

Digital Brand Manager commands a $130K to $140K starting salary

The Digital Brand Manager is responsible for the total digital image that a brand and/or enterprise presents to the outside world. They develop, implement and managing branding and marketing campaigns that promote a company and its products and/or services. He or she plays a major role in enhancing brand awareness within the digital and social networking space as well as driving website traffic and acquiring leads/customers.

As such is responsible for digital consumer experiences across the entire enterprise and its operations. The Digital Brand Manager helps a company drive growth in its brands and product lines by converting traditional physical brand management process to social media ones, and over-sees the rapidly changing digital sectors like mobile applications, social media and Internet based marketing. The Digital Band Manager is responsible for executing and evolving the enterprise’s Social Media Strategy based on performance & emerging company/consumer needs. This includes but is not limited to: channel roles, content strategy, and Social Persona Development.

Janco has created a full job description that is over 1,700 words and 6 plus pages.

The Digital Brand Manager also identifies and evaluates new digital technologies and uses Web analytics tools to measure site traffic to better optimize marketing campaigns, email marketing, social media and display and search advertising.

Order digital brand manager job description

 

 

Top 10 Wearable Issues

Top 10 Wearable Issues

Top 10 Wearable Issues – Over 33% of all organizations surveyed by Janco have revealed they have more than 5,000 connected devices. Add to that, Cisco predicts there will be more than 600 million wearable devices in use by 2020.

These facts present a set of challenges for CIOs and IT enterprises of all sizes.

  1. Easy physical access to Data
  2. Records management, retention, and destruction
  3. Business continuity is significantly more complex
  4. Photos, Videos and Audio can be captured without anyone knowing it
  5. Instant access to outside Wi-Fi and cellular systems facilitates rapid dissemination
  6. Insecure wireless connectivity
  7. Lack of encryption
  8. Lack of formal policies with limited regulation or compliance –
  9. Software and Firmware version control
  10. Current MDM Policies Don’t Cover Wearables

Read On…

Top 10 Wearable Issues Download Selected Pages

CIOs investment in Infrastructure is on the rise

CIOs investment in Infrastructure is on the rise

CIOs investment in infrastructure is going up despite ongoing economic uncertainties.  They are investing in IT to improve operations, reduce costs, and enable strategies. IT budgets, hiring, and salaries are increasing slightly (see https://www.e-janco.com/Salary.htm) and CIOs are cautiously optimistic that this trend will continue into next year.

CIOs five (5) concerns are:

  1. Alignment of IT with the Business
  2. Security and Privacy
  3. Business Agility and Flexibility
  4. Business Productivity
  5. IT Time-to-Market / Speed of Delivery

CIOs five (5) largest IT investments are:

  • Big Data and Business Intelligence
  • Data Center Infrastructure
  • Enterprise Resource Planning
  • Application Software Development
  • Cloud Computing

CIO IT Infrastructure Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable

  • Backup and Backup Retention Policy (more info…)
  • Blog and Personal Web Site Policy (more info…) Includes electronic Blog Compliance Agreement Form
  • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
  • Google Glass Policy Template (more info…) Includes electronic Google Glass Access and Use Agreement Form
  • Incident Communication Plan Policy (more info…) Updated to include social networks as a communication path
  • Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy (more info…) Includes 5 electronic forms to aid in the quick deployment of this policy
  • Mobile Device Access and Use Policy (more info…)
  • Patch Management Policy (more info…)
  • Outsourcing and Cloud Based File Sharing Policy (more info…)
  • Physical and Virtual Security Policy (more info…)
  • Record Management, Retention, and Destruction Policy (more info…)
  • Sensitive Information Policy (more info…) HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form
  • Service Level Agreement (SLA) Policy Template with Metrics (more info…)
  • Social Networking Policy (more info…) Includes electronic form
  • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
  • Text Messaging Sensitive and Confidential Information (more Info…)
  • Travel and Off-Site Meeting Policy (more info…)
  • IT Infrastructure Electronic Forms (more info…)

IT Infrastructure PoliciesDownload Selected Pages

10 best practices to retain millennials

10 best practices retain millennials

10 best practices retain millennials can be applied easily and favorable results will be seen quickly.

10 best practices retain millennials
10 best practices retain millennials
  1. Implement a mentoring programs – utilize social media to communicate frequently followed up with face to face time.
  2. Rotate work assignments to provide millennials with a broader range of exposure to the enterprise what is in store for them in the future
  3. Provide millennials with a flexible feed-back loop process so you know what their state of mind is. Minimize the chances for “unhappy” employees
  4. Give them time to develop their skills and career opportunities
  5. Encourage on-going education but technical and managerial.
  6. Define clear and achievable performance metrics so both you and they know what is expected
  7. Minimize stress and provide training to millennials on how to deal with stress.
  8. Balance work and personal time. Avoid situations where the 50-hour week is the norm
  9. Implement an open door policy and have managers, even the CIO, interact with all levels of employees. Manage by walking around and getting a feel for how everyone is doing.
  10. Provide opportunities for millennials to provide ideas and when one is implemented sound the praises of the employee.

Download Selected Pages