Category Archives: IT Infrastructure

Depending on Goggle Risky

Depending on Goggle Risky

Depending on Goggle Risky

Independence is  a core requirement for IT Governance and Infrastructure definition.

Depending on Goggle Risky – Depending on Internet, hardware, and software companies is a mistake. Enterprises  are impacted as they drop product support, are purchased by other companies, and/or have security breaches and system failures of their own.

For example, Google – Customer who installed Haiku ceiling fans, which were supported  with the Nest thermostat device via the “Works with Nest” program were left out in the cold. This was driven by Google’s decision to end the program and go with the “Google Net”.  They said this was to focus on supporting its own hardware business.  As a result, there was a loss of support for any device on that program. Not a good omen for people who installed them in their homes.

Another similar situation occurred for Comcast email users. Users who had comcast.net email accounts were not made aware of the limitation of services that Comcast’s spam protection process effected. What happens is as an email is sent to a comcast user email account, if the email has multiple recipients, the email is placed on hold (based on the comcast user’s usage). The user is NOT notified that the email was held and not delivered. It is up to the sender to contact the user and re-send it with the email going to a single recipient.

The less that you depend on Internet companies for proprietary offerings, the more you can be assured that you can continue to operate when they change their corporate strategy.

How long will it be before a company like Goggle decides to charge for their free email services. Wait a minute they already do that with their offering G Suite.

Order IT Governance Infrastructure Strategy Download Selected Pages

Read on:

 

Please follow and like us
error

DevOps Job Descriptions

DevOps Job Descriptions Released

DevOps Job Descriptions were just released as a bundle. Both HR and IT have a critical role in addressing the expectations that the Executive Management has in the movement towards DevOps applications.

DevOps Job Descriptions

DevOps is a process which allows for the constant and evolving development of applications with new features and functionality added over time. This is without the traditional legacy SDM process of traditonal IT development and implementation.

The jobs descripions that are included in the bundle are:

  • Chief Digital Officer – CDO
  • Chief Experience Officer – CXO
  • Digital Brand Manager
  • Manager DevOps
  • DevOps Application Designer
  • DevOps Quality Control Specialist
  • DevOps Software Engineer
  • DevOps Version Control Specialist

There are more positions that will be added to this bundle as we continue to evaluate the roles that must be played in: planning, coding, building, testing, releasing, deploying, operating, and monitoring process of DevOps.

Read On   Order

DevOps Job Descriptions add to IT Job Family Classfication

In the bundle contains the full IT job family classification for all of these positions.  They have been added to the DevOps, Blockchain, and DLT job family.

DevOps Job FamilyRead On  Order IT Job Family Classification Download Selected Pages

See also:

Please follow and like us
error

IT Job Market Explodes

IT Job Market Explodes – Now over 3.6 Million Job in the United States

IT Job Market Explodes – IT Job Market had grown by 34% since 2010.  This year Janco forecast that the number of new IT jobs will expand by approximately 100K.

IT Job Market Explodes

As of July 2019, 56,800 new IT jobs were created YTD. The forecast for the reaming 5 months of the year is that on average 8,400 jobs will be added each month resulting in 42K new IT jobs

CIOs and CTOs continue to be optimistic and do not see the hiring trend slowing.  The only downside to this is the contraction in the number of telecommunication jobs. In the past ten (10) years the number of Tel-comm jobs has shrunk by 20% from 890K to 712K.

Historic Number of Jobs in the IT job marketTele-comm jobs are being eliminated as organizations automate the function and fewer individuals are need to accomplish the same tasks.  This is the same type of job elimination that occured in that industry when it automated switchboard operaters to electronic swithes.

IT Job Market Explodes – As economy improves IT jobs lead the way in job creation.

Demand for IT Professionals is now focused at the interface between the end user of the data and the data stored on the cloud or in secured legacy systems.  Blockchain, cyber-currency, security, and compliance skills are the one highest in demand.

Janco has updated its IT Governance book to reflect the impact of this.

Read On Order IT Governance Infrastructure Strategy Download Selected Pages

Read also

Please follow and like us
error

10 Easy Steps to Stop Robocalls

10 Easy Steps to Stop Robocalls – or at least reduce the number

10 Easy Steps to Stop Robocalls

10 Easy Steps to Stop Robocalls -The policy that will improve the security of mobile devices and stop robocalls

10 Easy Steps to Stop Robocalls that every cell phone and text messaging user can follow to kill the call and stop calls and text messages from coming in the future.

  1. Put a do not disturb after normal work hours except for people already in your contact list
  2. Do not answer calls from blocked or unknown numbers.
  3. Do not answer calls identified as spam by your carrier
  4. Don’t answer calls from numbers you don’t recognize.
  5. For Text spams, forward them to 7726 (spells SPAM) and your carrier will be made aware of them and stop them
  6. If someone calls you and claims to be with XYZ company, hang up and call the company yourself. Use the company’s website to find an official number.
  7. If you answer a call an no one is on the line immediately hang up
  8. If you do answer a call and hear a recording such as “Hello, can you hear me?” just hang up.
  9. The same goes for a call where you’re asked to press a number before being connected to a representative.
  10. Do not engage as soon as you answer the call – i.e. Goggle’s Call Screening feature is cool but still identified you number a real person

In addition you shoul check with your carrier to see the services they provide – all of them soon will provice FREE services to support FCC requirements

See also:

Please follow and like us
error

Comcast.net

Comcast.net Killing email Account

I recently discovered that Comcast.net email account are not getting all of the mail that is sent to them.

concast.netIn January of this year comcast.net has started to meter and REJECT emails to people who have a comcast.net email address.  Bud has a comcast.net email account and he Is not getting all of his emails.

Comcast says:

RL000002 :: Mail to Comcast is queued and I see RL000002 in my email logs. What does this mean?

Comcast has instituted rate limiting on all inbound email traffic. This step was taken to protect our customers and our email system from unwanted spam and malicious attacks. Any systems affected by this rate limit will receive a 4xx message (temp-fail) during the SMTP transaction. This message is designed to instruct the sending server to try again at a later time to deliver its email.

Our rate limiting policy is based on sender reputation and volume metrics, provided by Cloudmark, regardless of the number of domains from that server.

New IP addresses that are expected to send significant amounts of email to Comcast subscribers should start by sending low volumes of mail, increasing as time goes on. As your IP sends more email, its limit will increase daily.

If the rate-limit is impacting your ability to deliver email, shortening your server’s delivery retry interval should resolve the issue.

Translated the  reason why this is happening is one of the following

  1. He is on a distribution list (multiple recipients)
  2. There are more than 3 or 4 links to a web site in the email
  3. He has exceeded the number of emails he is allowed to receive based on the number of emails he got last month.

If you have any people in your address book that has a comcast.net email account the same is occurring to them as well.

The one suggestion that I have is that you tell them this is occurring.  All of the vendors want to charge for the services provided.  If you do not pay for your email account is some way you are at risk of losing connectivity.

Find a provider that gives you the email account for “life” and meets your security and privacy standards to protect t your own information.

Please follow and like us
error

Taxable fringe benefits

Taxable fringe benefits

Taxable Fringe Benefits

Fringe Benefits need be included in the calculation of total compensation

Taxable fringe benefits are benefits an employer provides to any employee, partner, or independent contractor. A recipient of any taxable fringe benefits, must include the benefit’s fair market value in their annual taxable income calculation. Taxable fringe benefits are subjected to all federal income taxes, as well as FICA and FUTA.

Employees who currently use their own car for business-related driving must take care not to exceed the IRS stated mileage rate as any payments for the excess amount would be considered taxable income.

The following are examples as taxable fringe benefits:

  • Any reimbursement for any employee job-related moves of fewer than 50 miles
  • Clothing that is suitable for street wear that has been given to employees
  • Educational assistance payments that do not relate to the employee’s job or exceed the allowable IRS threshold
  • Cash awards and non-cash awards are taxable unless given to charity
  • Expense reimbursements lacking an adequate accounting is taxable

Order Salary Survey Download Sample

See Also:

Please follow and like us
error

HIPAA changes

HIPAA changes for 2019

HIPAA Compliance Management

Compliance Kit – head start on meeting all mandated requirements. Everything from an Industry-standard White Paper to a detail audit program.

HIPAA changes proposed for 2019 are getting closer. The Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has favored issuing HIPAA guidelines to clear up misunderstandings with HIPAA compliance requirements, but we are now at a point when changes to HIPAA Rules are about to be made.

OCR asked 54 different questions in its RFI. Some of the main aspects being considered are in relation to:

  • Patients’ right to access and obtain copies of their protected health information and the timeframe for responding to those requests (Currently 30 days)
  • Removing the requirement to obtain written confirmation of receipt of an organization’s notice of privacy practices
  • Promotion of parent and caregiver roles in care
  • Easing of restrictions on disclosures of PHI without authorization
  • Possible exceptions to the minimum necessary standard for disclosures of PHI
  • Changes to HITECH Act requirements for the accounting of disclosures of PHI for treatment, payment and healthcare operations
  • Encouragement of information sharing for treatment and care coordination
  • Changing the Privacy Rule to make sharing PHI with other providers mandatory rather than permissible.
  • Expansion of healthcare clearinghouses’ access to PHI
  • Addressing the opioid crisis and serious mental illness

All if these are addressed in Janco’s Compliance Management toolkit.

Compliance Kit Options

Order Industry Standard Compliance Kit

See Also

Please follow and like us
error

Top 10 BYOD Security Best Practices

Top 10 BYOD Security Best Practices Implemented  by “World Class” CIOs

Top 10 BYOD Security Best PracticesTop 10 BYOD Security Best Practices have been implemented by almost all “World Class” CIOs and CTOs.  The importance of these is only magnified by the implementation of Blockchain and DLT applications.

The Best Practices are:

  1. Implement a formal written BYOD policy
  2. Set up a locking password on each device
  3. Implement a phone locater on all devices
  4. Protect the access point of your network
  5. Implement anti-virus – utilize VPNs
  6. Manage authorized applications.
  7. Utilized data encryption on e-mails and enterprise data
  8. Utilize the cloud as a back up source
  9. Be wary of applications like QR coder readers
  10. Monitor access and data usage by device and by user

Read  BYOD Security  Order BYOD Policy BYOD Policy Download Selected Pages

Top 10 Security Best Practices take effort to implement

Too many companies have found out the hard way that their most valuable assets are exposed and vulnerable to hacker attracts, theft and destruction. They now have learned a very expensive lesson, a company’s valuable information cannot be undone, and also often leads to significant damage to your company’s reputation.

See Also:

Please follow and like us
error

Employment Still Strong — But

Employment Still Strong — But it may be slowing

Employment Still Strong — But not as strong as earlier.  In the past month one state dropped out of full employment status – Ohio.  Full employment as defined by Janco Associates is 4.0% or less.

Employment Still Strong -- But

There are 35 full employment states in May 2019. That is one less with Ohio’s unemployment rate going to 4.1%

In addition to this, there still are only two states with high unemployment defines as 5.5% percent or higher.

States with high unemployment rates May 2019

As a not of caution, there are 3 states that are edging close to the high unemployment rates. Mississipi – 5.0%, New Mexico – 5.0%, and Arizona – 4.9%

Except for the Distrist of Columbia, none of these regions have high concentrations of IT employment.  As such they do not materially impact the IT job market.

Employment Still Strong — But some concerns

Hiring demand remains high for IT professionals with the United States.

Hiring Demand for IT Professionals

Based on data gathered by Janco Associates, hiring demand for IT Middle Management and IT Staff positions remain high. In addition demand for contractors an consultants is high as well.

Order Salary Survey Download Sample Provide Data

See Also:

 

Please follow and like us
error

Blockchain DLT career path

Blockchain DLT career path included as a job family

Blockchain DLT career path has been added to the IT Job Family Classification System.  Not only is it included as an individual job family, it is also linked to all of the other IT job families in that offering.  Having clearly defined job paths a the first step in long-term career planing.  That is true for the individual as well as the company employing them.

Blockchain DLT career path

Blockchain DLT career path is defined in the classification system. In addition point of entry and exit to the other functions within IT have bee identified

The ways to migrate to and from the Blockchain DLT job family have been identified and documented by Janco.  With this tool it is now easy to:

  • Define career development opportunities within a Blockchain DLT job family and movement into and out of the job family to the other job families.
  • Discuss career planning, clarify specific training needs, and consider course enrollment and career advancement
  • Track job applicants and analyze data for reporting
  • Set pay grades and get accurate salary requirements by understanding jobs and their requirements better
  • Evaluate jobs more consistently by comparing similar jobs in the same job family

Read on Order IT Job Family Classification System Download sample

See Also:

 

Please follow and like us
error