Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Definition: Information security refers to protecting information and information systems from unauthorized access, use, disclosure, disruption,

modification, or destruction. The goals of information security include protecting the confidentiality, integrity and availability of information. All organizations, including governments, military, financial institutions, hospitals, and private businesses, gather and store a great deal of confidential information about their employees, customers, products, research, and financial operations. Most of this information is collected, processed and stored on electronically and transmitted across networks to other computers. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. For the individual, information security has a significant effect on privacy and identity theft. The field of information security has grown significantly in recent years. There are many areas for specialization including Information Systems Auditing, Business Continuity Planning and Digital Forensics Science, for example. There are also specific information security technical certifications that can assist getting started in this field. More information about Information Security and the Information Technology industry can be found here: Project Manager Overview A Project Manager is responsible for managing the resources of large projects. For Tech Careers, can mean managing large Software Development projects, Networking projects, IT installations or conversions, or any other function where business and technology needs have to be managed and resources have to be coordinated. The Project Manager is responsible for making sure a project is completed within a certain set of restraints. These restraints usually involve time, money, people and materials. The project must then be completed to a certain level of quality. Project Managers usually use Project Management Software to help keep track of resources and project deliverables (or outputs). This software helps document the project objectives, status, time lines and expected outcomes. Current popular project management software products include: Microsoft Project 24Seven Office OmniPlan AtTask

y y y y

Education Project Managers usually have a degree and several years of experience in their field of expertise. Ideally, a Project Manager will have additional Project Management Training, such as a certification through the Project Management Institute. Becoming a Project Manager In Technology Careers, a Project Manager is often promoted from the individual contributor ranks. Most technical companies prefer to hire Project Managers that have worked in a similar technical environment and can appreciate the complexities that are usually involved. Becoming a project manager can be a good way to take on management responsibilities while staying current in development. Taking classes or becoming certified in project management is a good way to branch into this field.

Project Manager Career Path There are various levels of Project Management, and differences between the size and scope of projects to manage. A Project Manager may be promoted to larger projects. A good project manager will often, given enough experience, be eligible for promotion to a senior role, such as a Group Manager or a Group Director. Companies Hiring Technical Project Managers: What is Cloud Computing? Cloud Computing is a relatively new term that conveys the use of information technology services and resources that are provided on a service basis. According to a 2008 IEEEpaper, Cloud Computing is a paradigm in which information is permanently stored in servers on the internet and cached temporarily on clients that include desktops, entertainment centers, table computers, notebooks, wall computers, hand-helds, sensors, monitors, etc. History of Cloud Computing In network diagrams, resources that are provided by an outside entity are depicted in a cloud formation. In the current (but still evolving!) model of cloud computing, the cloud computing infrastructure consists of services that are offered up and delivered through data centers that can be accessed from anywhere in the world. The cloud, then, in this model, is the single point of access for the computing needs of the customers being serviced. In the cloud computing definitions that are evolving, the services in the cloud are being provided by enterprises and accessed by others via the internet. The resources are accessed in this manner as a service often on a subscription basis. The users of the services being offered often have very little knowledge of the technology being used. The users also have no control over the infrastructure that supports the technology they are using. Pros and Cons of Cloud Computing In cloud computing models, customers do not own the infrastructure they are using, they basically rent it, or pay as they use it. The loss of control is seen as a negative, but it is generally out-weighed by several positives. One of the major selling points of cloud computing is lower costs. Companies will have lower technology-based capital expenditures, which should enable companies to focus their money on delivering the goods and services that they specialize in. There will be more device and location independence, enabling users to access systems no matter where they are located or what kind of device they are using. The sharing of costs and resources amongst so many users will also allow for efficiencies and cost savings around things like performance, load balancing, and even locations (locating data centers and infrastructure in areas with lower real estate costs, for example). Cloud computing is also thought to affect reliability and scalability in positive ways. One of the major topics in information technology today is data security. In a cloud infrastructure, security typically improves overall, although there are concerns about the loss of control over some sensitive data. Finally, cloud computing results in improved resource utilization, which is good for the sustainability movement (i.e. green technology or clean technology.) Cloud Computing Companies to Watch There is a big push for cloud computing services by several big companies. Amazon.com has been at the forefront of the cloud computing movement. Google and Microsoft have also been very publicly working on cloud computing offerings. Some of the other companies to watch for in this field are Yahoo!, IBM, Intel, HP and SAP. Several large universities have also been busy with large scale cloud computing research projects. Cloud Computing - Also of Interest y Information Technology y Information Security

yptography is the practice and study of hiding information. In todays environment, cryptography is considered a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security,

and engineering. Cryptography is used in technologically advanced applications, including areas such as the security of ATM cards, computer passwords, and electronic commerce, which all depend on cryptography. Cryptography has long been of interest to intelligence gathering and law enforcement agencies. There has historically been a history of controversial legal issues surrounding cryptography. In some countries the use of cryptography is restricted. Until 1999, France significantly restricted the use of cryptography domestically. In China, a license is required to use cryptography. Many countries have tight restrictions on the use of cryptography. In the United States, cryptography is legal for domestic use, but there has been much conflict over legal issues related to cryptography, export controls and civil liberties. Cryptography - Also of Interest Information SecurityInformation Security CertificationsCloud Computing

y y

verview of Linux Linux is a Unix-like computer Operating System (or OS) that uses the Linux kernel. Linux started out as a personal computer system used by individuals, and has since gained the support of several large corporations, such as Sun Microsystems, HP and IBM. It is now used mostly as a server operating system, with some large organizations using an enterprise version for desktops. Linux is a prime example of open-source development, which means that the source code is available freely for anyone to use. History of Linux Linus Torvalds, who was then a student at the University of Helsinki in Finland, developed Linux in 1991. He released it for free on the Internet. Due to the far reach of the Free Software Foundation (FSF) and the GNU Project, Linux popularity increased rapidly, with utilities developed and released for free online. A commercial version of Unix was released by RedHat in the early 1990s (combining the OS with technical support and documentation) and the popularity of Linux continued to skyrocket. A system is termed UNIX only if it complies fully with (and is certified by) the Single Unix Specification (SUS) standards. Similar systems that do not comply fully or are not certified, such as Linux, are termed Unix-like operating systems. Overview of Unix Operating System Unix is a computer Operating System (or OS) used most commonly in servers and workstations. Unix was originally released by Bell Labs to various government and educational institutions. This popularity led to the adaptation of Unix by many start up companies; as a result, Unix helped fuel the growth of the internet in the 1990s. History of Unix Unix was originally developed in the 1960s and 1970s by a group of AT&T employees at Bell Labs. Today, Unix systems are split into different branches which have developed over time by AT&T and by commercial vendors and non-profit organizations. Many variations (usually called flavors) of Unix and Unix-like Operating Systems were released during the dot com boom of the 1990s. The dot com bust caused many of these to consolidate. As a result, of the dozens of commercial variations of Unix that were developed in the 1980s, only Solaris, HP-UX, and AIX are still doing relatively well in the market. Of these, Solaris currently holds the highest market share. A system is termed UNIX only if it complies fully with (and is certified by) the Single Unix Specification (SUS) standards. Similar systems that do not comply fully or are not certified are termed Unix-like operating systems. Examples of popular Unix-like systems include Linux and Xenix. Learning About Unix

Information Technology A Definition: We use the term information technology or IT to refer to an entire industry. In actuality, information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary. History of Information Technology: In relative terms, it wasn't long ago that the Information Technology department might have consisted of a single Computer Operator, who might be storing data on magnetic tape, and then putting it in a box down in the basement somewhere. The history of information technology is fascinating! Check out these history of information technology resources for information on everything from the history of IT to electronics inventions and even the top 10 IT bugs. Modern Information Technology Departments: In order to perform the complex functions required of information technology departments today, the modern Information Technology Department would use computers, servers,database management systems, andcryptography. The department would be made up of several System Administrators, Database Administrators and at least one Information Technology Manager. The group usually reports to the Chief Information Officer (CIO). Popular Information Technology Skills: Some of the most popular information technology skills at the moment are: Computer Networking Information Security IT Governance ITIL Business Intelligence Linux Unix Project Management For more information about technical skills that are popular in the job market, check out theIT Career Skills List.. Information Technology Certifications: Having a solid education and specific specialty certifications is the best way to progress in an information technology career. Here are some of the more popular information technology certifications: Information Security Certifications Oracle DBA Certifications Microsoft Certifications Cisco Certifications PMP Certification

y y y y y y y y

y y y y y

Jobs in IT:

There can be a lot of overlap between many of the job descriptions within information technology departments. In order to clarify the descriptions, skills and career paths of each, I have put together a Jobs in IT listing. The jobs in IT listing includes information on education and training required for each position. It also includes lists of companies that typically have IT jobs open, as well as links to IT-specific resumes, cover letters and IT interview questions. Information Technology - Trends: Information Technology Departments will be increasingly concerned with data storage and management, and will find that information security will continue to be at the top of the priority list. Cloud computing remains a growing area to watch. The job outlook for those within Information Technology is strong, with data security and server gurus amongst the highest paid techies. Check out the Information Security Certifications and Highest Paying Certifications for more information. In order to stay current in the Information Technology Industry, be sure you subscribe to top technology industry publications. Information Technology - Find a New Job y Resume Tips y Cover Letters y Job Search Sites Information Technology - Also of Interest y Job Interviews y Salary Calculators y Professional Information Security Organizations Information Technology - Other Job Search Information y Resignation Letters y Thank You Letters y Job Fairs Related Articles

y y y y y

IT Outsourcing - Information Technology Outsourcing and Your Career Information Technology - Careers in Information Technology HR Information Technology - How to Select Human Resources Information Techn... Information Technology - Information Technology Maintenance - Information T... Blaming Technology For Human Error
Advertisement

Video

Hide Information in Microsoft Excel

David Kirkpatrick, Senior Editor, Internet and Technology


More Videos

Sponsored Links IT Diploma - CMC Academyfor students pursuing Graduation CMC, A TATA Enterprise. Enroll Now!grad.cmctraining.in/IT_Diploma Information securityClear, concise, educational and strategic information security.www.ITsecurity.be Computer Jobs - FreshersMost of the MNCs require no Exp Submit Your Resume Free. Now!MonsterIndia.com Tech Architecture JobsView Open Tech Architecture Jobs in India & Submit Your CV Now.www.accenture.com Related Searches Information Technology Departments Information Technology Skills Information Technology Manager Information Technology Department

Explore Tech Careers


Must Reads

y y y y y y y y y y

What is Information Technology? Highest Paying IT Certifications IT Resume Examples Get the Raise You Deserve How to Resign From Tech Jobs Most Popular Resignation Letters Letter of Resignation Sample Letter of Resignation Interview Thank You Letters Sample

You might also like