10 Things to Avoid in your resume. The market is competitive and your resume has to stand out or you will not even be phone screened.
10 Things To Avoid In Your Resume – Top 10 Resume mistakes that many IT Professionals make.
Keep it short – Keep your total resume to 2 pages or less.
Resume that does not represent you in the best first impression. Make sure that the resume looks good.
Resume that is not structured well. Bullets, limited bold text, and a summary at the top are key directions to take.
Eliminate spelling errors. This is direct path to the circular file.
Resume that contains grammatical and tense errors – Do not user complex sentences and avoid starting with prepositions.
Resume that does not agree with your “social profile”. Resume needs to be in agreement with what the rest of the world see about.
Photo is a bad idea. Do not include anything that shows your age, race, or appearance.
100% accurate. Everything needs to be truthful and accurate.
Resume that is the same for each job and company. With word processors and email you should at least have a custom cover letter that address the “specific” job or company that you are sending the resume to.
Not following up. If you do not hear back from a company and have sent a resume in, it is a must to follow up and see if the job is still open.
Formal media and incident communications plan needs to be in place before an event occurs.
Top 10 Press Release Best Practices – Whenever enterprises are impacted by negative (cyberattacks) or positive events communication with the media is critical – Press Releases should be the first source for factual and informational communication with the media.
Top 10 best practices are:
Perform extensive research – get your facts straight
Don’t assume anything – double check everything
Don’t belittle or talk down to anyone
Don’t oversell your product or service
Don’t over-write or bloat the release
Create a clever subject line
Don’t jump the gun when sending your release
Optimize the Press Release for Internet Search Engines
Maintain an internal list of trusted reporters and editors
Be available and responsive right after a press release is issued
BYOD Best Practices to ensure the security of enterprise sensitive an confidential information
BYOD Best Practices – BYOD (Bring Your Own Device) now is standard practice for most individuals working for companies. Device include everything from laptop computer to tablets and smartphones. 10 Best Practices to secure BYODs – More employees and enterprise associates are bringing their own iPhones and tablets to the office. How sure are you that they are secure. While these oersonal devices are great for employee productivity, they can introduce security risks to your organization.
Implement a formal written BYOD policy that clearly states which devices and applications are supported.
Set up a locking password on each device. Integrate password usage with wipe the phone after x number of invalid tries. At the same time have a way to restore the phone if the phone is wiped.
Implement a phone locater on all SmartPhones. In the case of the iPhone use the “Find My Phone” application.
Protect the access point of your network so that only devices that meet your stringent security requirements are allowed access to you network and data.
Implement anti-virus where possible. In the case of iPhone there is not anti-virus. That means that you email service provider needs to do the scan BEFORE emails are sent to the device.
Manage authorized applications so the contact and other sensitive data is not extracted from the device by the applications.
Utilized data encryption on e-mails and enterprise data
Utilize the cloud as a back up source
Be wary of applications like QR coder readers. They can direct the user to sites that can take control of the device.
Monitor access and data usage by device and by user. Have processes in place that actively inform management of any potential ares were the network and data can be compromised.
Top 10 Reasons Disaster Recovery Fails have been identified by Janco.Over 90% of all mid-sized to large enterprises have disaster recovery and business continuity plans in place — that is not enough to avert disaster as only 40% of those plans have not major defects. The top 10 causes for those failures are:
Disaster Recovery and Business Continuity are necessary enterprise infrastructure processes that have correctable defects that can make plans fail.
Backups do not work
Not identifying every potential event that can jeopardize the infrastructure and data that the enterprise depends
Forgetting or ignoring the cross-training of personnel in disaster recovery and business continuity
Not including a communication processes which will work when your communication infrastructure is lost
Not having sufficient backup power – both capacity and durations
Having a recovery plan in place but not listing priorities of which resources need to be restored first
No physical documentation of your Disaster Recovery and Business Continuity plan
Disaster Recovery and Business Continuity plan that has not been tested adequately
Passwords are not available to the Disaster Recovery and Business Continuity team
Disaster Recovery and Business Continuity plan is not up to date
Best practices for Cloud Processing include rules for successful ERP projects
Cloud based ERP,projects typically increase costs, take a long time to implement and require large and specialized staffs. Add to that the operational management needs to buy into the process. Needless to say the canned reporting that comes with the typical ERP system often does not meet the needs of management and users.
An Enterprise Resource Planning (ERP) solution integrates and organizes an enterprises’ data into a single comprehensive platform. ERP systems enable organizations to integrate all business management functions: accounting and finance, human resources, manufacturing, supply chain management, project management, customer relationship management and more. Implementing an ERP system allows you to access the required information needed in real-time to make informed decisions, with the accuracy of precise data from across your organization.
With the emergence of a secure clouds, moving to a new ERP solution is not as high-risk an event as it once was. There are some critical benefits that make a cloud based ERP a solution that should be looked at:
Vendor packages are available
Metrics can be defined up front
The staffing requirements for scores of ERP specialists is significantly reduced
A cloud based solution eliminates the need for most of the on-site data center resources
There is much less of a requirement to “re-invent” the wheel
Business continuity objectives are more easily managed
Development and and implement cycles are reduced
With the cloud the ERP is more easily sized for both features and number of users supported
New technologies and equipment is more easily supported
Top 10 Disaster Recovery Best Practices every organization needs to follow
DR / BC planning requires a robust program that is constantly updated and monitored
Top 10 Disaster Recovery Best Practices as defined by over three decades of DR and BC practice by Janco Associates. Experience is based on having operated in earthquake zones, hurricanes, and terrorist attacks.
Janco’s principles created the Disaster Recovery Plan that was implemented by Merrill Lynch (ML) on 911. The plan was activated within minutes of the attack and only 52 seconds of transactions were lost. The top 10 best practices that are followed in all DR/BC plans that have been created by us are.
Focus on operations – people and process that drive the enterprise are the primary issues that DR and BC are controllable. Implementing a planning and recovery environment is an ideal time to define an approach based on best practices that address the process and people issues effectively. In the case of ML the plan was activated in the computer room while the CIO was on a plane over the Atlantic.
Have at least one recovery site in place – Before an event there need to be plans in place for not only operation of computer but also for location of operations staff. Cloud managed computer operations can work when a disaster is in a limited ares. However it is is wide ranged like a hurricane the issues can be problematic.
Train everyone on how to execute the DR and BC – People are the front line when it comes to supporting the enterprise. A staff that has not been properly trained in the use of the DR and BC when an event occurs will we hindrance. Everyone must have the knowledge and skills to provide the right support. The primary focus is to reduce downtime, it also delivers better performance and a faster ROI through better and wiser use of IT assets.
Have a clear definition for declaring when a disaster or business interruption occurs that will set the DR and BC process into motion – There needs to be a clear processes for allocating resources based on their criticality and availability requirements. This will define the “rules of the road” for who does what and when while minimizing the factors that can negatively impact enterprise operations.
Integrate DRP and BCP with change management – Changes are inevitable in any sizable environment. It is difficult to keep up with the flood of new applications, technologies, and new tools. That is why it is essential to design, implement, and continuously improve change and configuration management processes.
Focus on addressing issues BEFORE they impact the enterprise – When you are aiming to operate at the speed of business, after-the-fact fixes do not make the grade. These days, you need to anticipate trouble and head it off before it happens. It is important to identify risks across people, process, and technology so that appropriate countermeasures can be implemented. You should also make sure that vendors provide an appropriate level of support including proactive features such as critical patch analysis and change management support.
Have an Incident Communications Plan in place – The incident communication plan should cover all interested parties from customers to employees and investors.
Validate that all technology is properly installed and configured right from the start – a technology solution that is properly implemented in terms of its hardware, firmware, and software will dramatically reduce problems and downtime in the future. Proper initial configuration can also save time and reduce issues with upgrades, hot patches, and other changes.
Monitor the processes and people to know what critical – many of today’s enterprises are experiencing a capacity crisis as they reach the limits of reduced budgets, older facilities and legacy infrastructures. Space is tight. Power and cooling resources are over-burdened. Implementing new solutions in inefficient environments may limit their ability to recover from an event. An assessment that examines and analyzes the enterprises environment’s capabilities and requirements can provide valuable information to help improve efficiency.
Test often – a DR BC plan is not a static document. Things change and new individuals are involved as staff changes.
Top 10 Net Neutrality advantages for the general public are all centered around the factor that without it the Internet will not longer be a universally accepted standard infrastructure.
Only way to keep the internet open for small to mid-sized companies.
If net neutrality is not made the basis for connectivity and access, the large companies like Google, Amazon and Twitter will have a complete monopoly in their markets. Also the large carriers like AT&T and Verizon will have no incentive to create better and faster access to the Internet.
Net Neutrality is a core requirement for IT Governance and Infrastructure definition.
Creates an open playing field.
With net neutrality in place, Internet Service Providers (ISP) have do not control what passes through the devices that are used by customers to access the Internet. This means an ISP under net neutrality cannot block access, change services, or alter the flow of data simply because there is something that goes on which they don’t like.
Remain as an international channel without governmental interference.
Recently whenever there has been civil unrest, governments have taken over or eliminated access. Without small players in the space, there can be no alternative sources for access. Add to that the recent moves by the Russian government to to close down all connectivity to the general Internet in “troubled political” situations will only be enhanced without net neutrality.
Innovation is encouraged and protected with the internet remains neutral. Big companies still have the same access as SMBs or freelancers and this allows everyone come with new and creative solutions. Just look at companies that started with a video and audio attached to door bells. Now and entire new segment of the security industry has been created with “self-service” security. No longer do companies like ADT have a monopoly on that sector of the industry.
Freedom of expression is fostered.
Blogs, services, businesses, and any website that can operate legally is able to do so and be available because of net neutrality. There isn’t any censorship available as long as the content being offered meets legal obligations. If illegal content is discovered, it can be immediately reported to law enforcement officials. Without this freedom of expression, it could become easier for illegal content, such as child pornography, to become more available. If a small ISP blocked access to all and approved of such a thing, it could hamper keeping our communities safe.
Illegal activities are monitored.
ISPs, are like utilities as they provide everyone with the services they need. For example , illegal file sharing, due to the fact that each ISP is treated as a regulated common carrier.
Unlimited data is available to everyone equally.
In the 1990s, internet users had a good time being online in AOL chat rooms or waiting 20 minutes for a cool website to load. Today, there are real-time video calls. Companies like Netflix providing legal streaming. YouTube has grown into an educational and entertainment network.
Income from internet uses has moved to a subscription base.
There are certain businesses and high-use individuals who consume large amounts of bandwidth every month. Entire industries have been created that generate revenue based on service provided not access. It is like the Interstate Highway System, everyone benefits.
Competition thrives. There are numerous online streaming services that offer live TV today: Hulu, PlayStation Vue, and Sling by Dish Network are just three examples. If a customer must choose Comcast as their ISP, then these streaming services could be given a lower priority because they are rival organizations. Comcast could choose to offer the highest speeds to the networks and services it owns and slow down the signals provided by the competition. This would effectively limit consumer choice.
Free internet access is Free.
When the internet becomes a place where profitability is the primary concern, the idea of providing free internet access to those who cannot afford it goes away. Providers could charge whatever they wanted and restrict access to whomever they please. This could lead to demographic discrimination, socioeconomic discrimination, or prioritize content to the wealthiest who are willing to pay high prices for the fastest data streams.
This is an ever evolving area as Net Neutrality is not in the area of political influence. Time will only tell what will happen.
CIOs Management Focus Janco conducted a survey of C-Level executives to get a clear understanding of what CIOs are focusing their management talents
AnyConnect Windows 10 An example of a best practice for patch management and version control. An issue arose after an update by a major vendor and how to implement a best practice to have a solution in place for a critical application.
This tool kit has been updated to meet all of the EU’s GDPR mandated requirement. In addition, it now reflects all of the requirements of the newly enacted California Privacy Act and contains the Privacy Compliance Policy with its associated electronic forms and job descriptions.
Top 10 in Demand IT Skills to drive median IT Salaries up
Top 10 in Demand IT Skills are primary drivers for the increase in IT Median Salaries. A secondary factor is the limited supply of IT professionals as the economy continues to boom.
Median Salaries for IT professionals now are $93,077 and foretasted to be around $98,000 by 2020.
There are a number of skill that the booming economy places a high value on. Janco’s analysis of the IT job market concurs with this list of in demand skills.
Java (SE and EE) is significant expansion of the skills required and programming language that has been around since the introduction of Java.
Lawson ERP software which has a focus on HR, customer service, and manufacturing needs unique application knowledge to implement is in high demand.
SAP for manufacturing industrial use – With manufacturing companies increasingly undergoing digital transformation and compliance on the rise, SAP are in high demand.
Compliance expertise – CaCPA and GDPR skills have an increased value as companies scramble to hire qualified professionals who could help them meet compliance mandates
SAP Forecasting and Replenishment is designed to help retail and food companies automate forecast and replenishment planning.
SAP Point-of-Sale Data Management is a point-of-sale management solution that allows sales data to be quickly transferred from the cash register to a back-office system automatically throughout the day
SAP FS (Insurance) is designed specifically for the insurance industry. It helps organizations streamline operations, improve customer engagement and gain deeper insights on potential risks.
Microsoft VISIO – a big data tool that is a data visualization program that lets users take complex data and turn it into easy-to-read charts, graphs and flow charts
Data Visualization are growing in demand as more companies turn to data analytics and business intelligence for decision-making, risk assessment and process improvements.
Quantitative analysis and regression analysis are quantitative research methods that are used for modeling and analyzing large amounts of data with several variables. They’re important skills as businesses try to make sense of all the data they’ve collected over the years.
CIOs Management Focus changed with he improved economy and the resulting increase in budgets.
Janco Associates conduct a survey of CIO and senior IT Managers in large and mid-sized corporations. 156 individuals participated in the study.
The top ten areas of management focus that we identified are listed below along with the percentage of participants who listed that as an area of their focus.
New Security Threats – identification, remediation and protections.
Data Protection / Compliance – The EU’s GDPR regulation and California’s data privacy legislation are driving this.
Staff Skill Gaps – Many enterprises have not invested enough into staff development in the past several years.
Multi Platform Security – With the move towards disparate operating environments away for the core data center to multiple cloud platforms security and data protection are more of a priority.
Innovation / Digital Transformation – New ways of doing things and the move away from traditional ways of doing everything towards a digital environment are driving top level IT Pros to rethink how they can provide value to the enterprise.
Revenue Stream Improvement – IT now is viewed more as an additional source of operational revenue.
Agility of IT – For most companies, projects with a 3 year development life cycle no long exist.
Outsourcing Risks – In outsourcing your work, the quality of the deliverable is at the mercy of the firm you outsourced to.
Business Results – IT value is now tied to the results of the operation units.
Tools for Digital Workers – With more remote users who operate on tablets and smartphones remotely instead of an office environment with direct connection to the processing center, productivity tool are more critical.