Take 35 hours of PMI accepted online, gamified, interactive Project Management training – Start Today!
GogoTraining announced yesterday that it will offer ISO/IEC 20000 Foundation and Associate Bridge Courses beginning in June 2013, rounding out it’s curriculum in the ISO/IEC 20000 topic area.
The ISO/IEC 20000: IT Service Management Foundation Bridge course offers you an expedited method of learning about ISO/IEC 20000, the international family of standards around Service Management, by recognizing your ITIL® Foundation certificate. Learn what needs to be in place to manage the Service Management processes and initiatives, and the contents, requirements and use of a Service Management System (SMS). Explore the fundamental concepts around what you ‘must’ do in an adapt and adopt initiative in Service Management.
The Associate Bridge course focuses on the Service Management System (SMS) – internationally accepted requirements for managing Service Management initiatives. These requirements, briefly covered in ITIL, are clearly documented and supported in the standard. Additionally, this course will focus on the similarities and differences between ISO/IEC 20000 and ITIL processes as well as the benefits of deploying the PDCA model.
The Associate Bridge course allows one to fast-track into the study of ISO/IEC 20000. Recognizing the student who has already gained a Foundation Certificate in ISO/IEC 20000 and who has earned at least two (2) ITIL® Practitioner (v2) or Intermediate (2007/2011) certificates, the requirements of the Associate certificate in ISO/IEC 20000 have been reduced.
This week in Network World there is a great article on Datacenter Transformation. The rapid transitions occurring require people to really understand (1) the basics of data center equipment, from power to cooling to IT, (2) the impact of changes on energy efficiency, cost, and data center uptime, and (3) what can be done to facilitate and manage these changes. Dave Cole has consolidated more than 20 years of experience into 18 hours of training that will allow you to understand how a data center works and specific steps you can take to improve energy efficiency, reduce costs, and improve operational efficiency in the data center. Everyone from a new data center manager to experienced professionals will benefit from this training.
Excerpts taken from The White House, Office of the Press Secretary on Monday, April 29, 2013.
Today, speaking at the White House Forum on Military Credentialing and Licensing, First Lady Michelle Obama will announce the IT Training and Certification Partnership, a new public-private partnership that will enable thousands of service members to earn industry-recognized information technology (IT) certifications before they transition from military service. Today’s announcement builds upon President Obama’s June 2012 announcement of partnerships with the manufacturing sector that enable service members to earn high-demand advanced manufacturing certifications, and the establishment of the Department of Defense’s Military Credentialing and Licensing Task Force. Additionally, the event is an extension of the First Lady’s challenge to our Nation’s Governors in February 2013 to take executive or legislative action to help our troops get the credentials they need to successfully transition to the civilian labor market by the end of 2015.
Industry leaders include Cisco Systems, Microsoft Corporation, Oracle, CompTIA, NetApp, HP, Futures Inc., Global Knowledge, GogoTraining and SANS Institute and Global Information Assurance Certification
GogoTraining is providing access to their online self-paced Information Technology training platform to help transitioning military personnel prepare for careers in the private sector. With the help of GogoTraining’s learning platform, experts bring their classroom courses to life online enabling service members to fit training into their schedule while still receiving the same high quality classroom content and support. GogoTraining courses and programs will help exiting personnel prepare for careers in computer programming, database administration, software and mobile application development, and obtain key certifications in areas such as CompTIA and Oracle.
Buckminster Fuller created the “Knowledge Doubling Curve”; he noticed that until 1900 human knowledge doubled approximately every century. By the end of World War II knowledge was doubling every 25 years. Today things are not as simple as different types of knowledge have different rates of growth. For example, nanotechnology knowledge is doubling every two years and clinical knowledge every 18 months. But on average human knowledge is doubling every 13 months. According to IBM, the build out of the “internet of things” will lead to the doubling of knowledge every 12 hours.
In a recent lecture at Harvard University neuroscientist Jeff Lichtman, who is attempting to map the human brain, has calculated that several billion petabytes of data storage would be needed to index the entire human brain. The Internet is currently estimated to be 5 million terabytes (TB) of which Google has indexed roughly 200 TB or just .004% of its total size. The numbers involved are astounding especially when considering the size of the human brain and the number of neurons in it.
A transition from the linear growth of human knowledge to the exponential growth of human knowledge has taken place.. According to researchers dealing with this information will necessitate the development of vastly more complex software, shareability, and artificial intelligence.
Author Clem Chambers, in a Forbes article on Amazon’s “Mechanical Turk” believes leading edge computer technology will be combined with artificial intelligence allowing collective problem-solving on a larger scale and the creation of vast amounts of data.
Industry Tap Into News, April 2013.
Revenge of the nerds?!
A report ranking the best jobs in 2013 is chock full of IT roles, with database administrator, systems analyst, software developer and Web developer achieving rare air.
According to the recent U.S. News and World Report findings, reported on recently in InfoWorld, those positions took up nearly half the “top ten” spots on the list. Computer programmer, IT manager and systems administrator roles cracked the top 25.
The ranking of 100 jobs was based on the hiring demand using U.S. Bureau of Labor Statistics findings and scored out through salary, job prospects, growth potential and other factors.
Though these factors don’t universally grade out at the high end for each and every IT job on the list (for example, IT manager roles rank high for stress level, but also top out on potential with a projected 18 percent employment growth rate in the next decade), the “in-your-face” presence of so many IT roles among the upper echelon of this list signals that, indeed, techies are in high demand these days.
Are you behind in newer technologies, or need a fresh career in IT? Look at GogoTraining’s curriculum offerings. Training can move your career in new directions.
Source: CompTIA IT Career Blog
Whether you’re an active job seeker in the ever-changing IT industry or an entrenched veteran in need of new challenges, your New Year’s resolutions are ready-made.
A clear takeaway from the recent article in CIO.com offering career resolutions is all IT pros need to evolve along with the industry. As organizations gear up to add staff in an IT job market expected to hit the ground running in the year to come, your organized competitors for those jobs are already doing much of the following:
- Expand your sphere of influence to understand the big-picture business side of the industry you target
- Chart out a career map which includes a skills analysis, plan to bridge skills gaps and network of peers and mentors
- Build a current, dynamic personal website to market your “brand”
- Keep on top of your social profile by searching for yourself to see what comes up, much like your prospective hiring manager would
- Proper interview follow-up can pay under-appreciated dividends
- Get out of the comfort zone with new classes, seminars and industry introductions
Check out GogoTraining’s expansive list of video based courses and try something new – shake it up!
Source: CompTIA IT Careers Blog
Today is December 12, 2012. If you’re a Facebook, Twitter or another social network user, you’ve seen “12-12-12” documented heavily for the last week. The fascination with this date is that we’ll never experience another set of all three – the day, the month and the year being the same in our lifetime (if you’re throttling yourself wondering why, there is no 13th month). The next occurrence will be the year 2112, and I think I can safely say that anyone who has the capability to read this article will not be around then.
So I thought it would be interesting to look at what are some other things that we will never see again: Blockbuster – once the king of VHS and DVD in-store rentals; Hostess brands – you remember Twinkies?; MySpace – one of the first social networking sites.
Innovation at all levels impacts how long a company can stay in business. It’s needed in product updates, packaging, updating applicability, communication and audience. We live in a interesting times, where word of mouth means more than ever before thanks to Facebook and Twitter; where advertising has moved from the printed page to Google Ad Words (Google’s advertising program); and where we learn about the products and services we’ll buy looking at screens that minimally measure 2.5 X 4. Constant innovation is needed. Incorporating new technologies can give you access to a new audience, improve your product or service above your competition or provide a much desired feature. Staying on the “in business” list requires innovation and inspiration. 2013 is waiting…..
Are you old enough to remember when the IT department was made up of mainframe computers, and users had to file requests for reports they wanted? The IT department had “kingdom” control over information. The penetration of PCs into that arena caused a huge paradigm shift, as control shifted from the IT department to the user. With that came a new set of business rules, and the first signs of computer security as we know it today. Mind you, the mainframe never left the scene; its functionality shifted to tasks that were best suited for that environment instead of the overly dynamic environment of the user request. But the PC forever changed the way information is commmunicated within organizations. And here we are again looking down the long barrel of another shift – this one caused by multiple technologies, the Cloud and smart mobile devices.
The Cloud is the source of the shift up, but not because it’s new exciting technology; this technology has been around for a long time. We just haven’t needed it till now. As companies handle increasingly large amounts of data and face the hard economics of enlarging data centers and adding servers, the Cloud is starting to look “mighty fine” as an alternative. Company IT departments are grappling with security and privacy issues. Security plays an important role but is in the best interest of the supplier to have the latest security measures since this is the number one concern of clients. Privacy is currently being handled through authentication involving limited to full access based on usernames and passwords, and job roles defined around that. There are many ramifications including impact or shift to jobs, and will become evident as the trend continues.
Smart phones and tablets are causing a shift out for IT, as more and more employees are conducting business from these devices, and the devices are achieving networking and computing abilities similar to the PC. Security and privacy as in the Cloud, have bubbled up to the surface as the key concerns. As organizations adopt their use for their employees, concerns with security have increased with such things as information-stealing applications. The variety of phones and operating systems also poses a challenge for organizational support, along with the additional training needed. Business rules are popping up to deal with such issues as what information should and shouldn’t be stored on the device; who owns the information that is stored, how frequently the syncing of that data occurs and many others.
Here we go again….
Source: Intel.com, Intel’s Vision of the Ongoing Shift to Cloud Computing white paper.
http://computer.howstuffworks.com, Cloud Computing Concerns, Jonathan Strickland
http://www.spsm-workshop.org, 2nd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)