Tuesday, 18 November 2014

DreamHost Spins Out Akanda NFV Platform--More Networking Abstraction Happening

The short version of this post is that DreamHost is spinning out a new entity to commercialize a networking tool it built for its own use.
The longer version is more interesting and speaks to some big changes in the networking world as customers and vendors start to see the parallels between what server virtualization did for compute, and what Software Defined Networking (SDN) can deliver for the networking world. If you’re a traditional networking vendor like Cisco or Juniper, this scares you to your core. Your once cozy view of the world, full of tightly coupled and proprietary software/hardware stacks, is no longer. If you’re a new startup, an organization with a big networking requirement, or someone who simply likes to watch disruption happen, this is a cool time to be in the industry.
DreamHost falls into the middle category. The company built its own networking virtualization platform to run thousands of compute instances, and has decided to spin that product out into its own entity, Akanda. The team behind Akanda know a thing or two about software disrupting legacy industries – they were also behind not only DreamHost but also Inktank, a Software Defined Storage vendor now owned by Red Hat RHT +1.03%.
Akanda is coming out of stealth after a lengthy time delivering Layer 3+ networking virtualization for DreamHost’s, OpenStack-powered DreamCompute platform.
Henrik Rosendahl, a virtualization industry veteran, will lead Akanda as CEO. Simon Anderson, DreamHost’s CEO, will Chair the Akanda Board, and Jonathan LaCour, VP Cloud at DreamHost, will serve as a Director and technical advisor. A high-caliber bunch indeed!
In terms of funding, DreamHost is seeding the company, but Akanda has flagged future outside investment.
As to the current state of the Akanda project, it provides Open Source L3+ NFV Functions supporting IPv6 on VMware NSX. OpenDaylight Support and Linux Bridge will be announced in the coming months. Akanda provides interfaces to OpenStack REST APIs, Neutron, Nova and has an integrated NFV Management and Orchestration Platform.

Is Dell Opening Networking's Pandora's Box?

I love Pandora , the music service that lets me customize my music stations to what I want to hear, letting me design my stations around my actual needs.  If you remember the Pandora story, she was the first woman created by the gods, and she opened the box that needed to remain closed.  Very fitting as companies like Cisco Systems CSCO +0.49% are trying to keep the networking box closed and others like Juniper Networks JNPR +1.62% and Alcatel-Lucent are trying to walk the fine line between open and closed systems.  For years networking has been a “black box”, a tightly integrated piece of hardware and software that not only performed the functions but also trapped users in a world of proprietary lock-in.  At the same time that dynamics are shifting on the vendor side, customers are starting to stand up, with marquee companies like Citigroup C +0.36%, Federal Express EXPR -0.95% and Pfizer PFE -0.07% participating in the Open Networking User Group to demand change. Some vendors, like Dell , are tackling this black box problem and opening a whole Pandora’s box to the industry.  But unlike the myth, where it unleashed all of the evils into the world, when this Pandora’s box is opened, it is unleashing flexibility and huge cost savings for businesses that are clamoring for change. We look at Dell’s opportunity in open networking in our latest white paper.
The problem with today’s networking is that it is designed around proprietary architectures and management tools.  There is still too much hard wiring of functionality.  Changes are costly and take a long time.  For businesses trying to move quickly in today’s business world, the networking is usually the thing that holds them back. With business models changing quickly and customers clamoring for “agility” (the new buzzword for the most recent business cycle), systems and networks need to move quickly and efficiently.  Why is the cloud business growing so quickly?  Sure, it’s cheaper (in most aspects) but the real reason is the speed at which it can be deployed.  Customers who need to move quickly can often find that cloud-based services can be deployed faster than trying to do it in-house.  If networking can accelerate quickly, businesses will have more options for expanding their business, and that ultimately drives down the cost of doing business. A new trend called “open networking” is emerging, allowing IT to take more control of their networking and knock down some of the barriers that prevented them from acting quickly.Networking Z9500 Switch
An unlikely leader in this trend is Dell, a company that is a leader in both servers and the clients connected to the servers.  For years, Cisco Systems was the glue between these components, but as companies are clamoring for a different way of networking, Cisco Systems represents the old guard and companies like Dell and Hewlett-Packard HPQ +1.33%, who both have nascent networking businesses have an opportunity to grow quickly.
But why would the tides quickly turn to server vendors and not stay in the camp of the networking vendors?  There are two key reasons; the first is a business reason and the second is a technical reason.
On the business side of things, companies like Juniper Networks, Alcatel-Lucent, and most importantly Cisco Systems, all have market share to protect.  For the past 20 years they’ve done their best to lock customers in; now should be the time that they should be reaping their benefits.  But like a dictator that holds their population down, eventually there is a revolt.  This week I will be speaking at the Open Networking User Group, discussing the business needs for open networking.  When the largest companies in the market like Bank of America BAC -0.29%, Gap GPS -0.61% and Cigna CI +1.02%, who spend billions in the market each year, are standing up to make their voices heard, it’s clear that the natives are already restless.  The status quo of networking is not acceptable and these companies want a more open approach.  In the pitted battle between vendors and customers, it’s pretty clear who has the advantage.  When customers have the ability to dictate where they spend their precious IT budget dollars, the market will come around to their way of thinking. This says that companies like Dell who are embracing the open networking trend have the upper hand.  Companies like Cisco that are waving their hands a lot instead of providing true open solutions face a tougher challenge.
One the technical side, the other thing that will drive server vendors forward into networking has to do with what networking products look like these days. For years, networking products were far more specialized.  That “black box” was vertically integrated and customers had little choice in what they bought.  But today, the world of networking looks far less specialized, it looks far more standardized.  In fact, it looks more like a server or PC than ever before from the CPUs and memory to other components.  So the people with the best computer supply chains are suddenly advantaged.  On top of that, the trend towards software defined networking (SDN) is pushing much of the functionality off of specialized (proprietary) devices onto more standardized devices, in some cases even running directly on servers.  Combine this will the first open networking operating systems that give customers a choice in which OS they run on their networking devices and you can start to see how customers might start to get back to a level playing field.  Openness in both the hardware and software is really shaking things up.
Dell is actually one of the first major vendors to offer customers the choice in networking operating systems, direct from their factory.  History has proven that choice and flexibility help drive down cost in the market, and as customers save more with Dell networking products, this opens up the IT budget for completing more projects – a compelling advantage in a world that is looking for more agility.
As customers start to use groups like ONUG to make their message known, and vendors like Dell start delivering more of what they are asking for, the dynamics of the networking market can shift quickly.  Enterprise customers are starting to become more empowered through the options in the market and this is good news for everyone – except the incumbents that are still pushing a proprietary agenda.  It looks like this Pandora’s box is letting customers customize their enterprise networking just like I can customize my music choices.  This leads to more agility and more choice, making the Pandora’s box far more powerful than the black box of the past.

Five Technology Tools To Boost Your Networking

If you read my posts on why career changers don’t get interviews or why your job interview don’t lead anywhere, you can see how important networking is to fix or avoid these problems altogether. But unless you automate your networking, it will be difficult to do enough of it. You’ll have to remind yourself to do it and then motivate yourself to take the next step each and every rime. However, technology can help ease your networking burden. Here are five technology tools that are free to use, that do not require programming or special skills and that can help automate your networking right away. I am not a paid affiliate of any of these tools.
Email signature
You probably already have an email signature template at your job. But your personal email needs one as well. At a minimum you should have your full name, phone number and email address. You can also turn every email into a networking push by adding your LinkedIn URL or website, encouraging people to learn more about your background. If you blog, you can add your latest title with a hyperlink to the post. If you have an event, you can hyperlink to the registration details. I create my email signature templates right within my email provider (e.g., Outlook, Gmail). Or you can use a custom tool, such as WiseStamp, to create more elaborate options. (I discovered WiseStamp when someone emailed me a signature with hyperlinked buttons, graphics, even a photo, which she had created using WiseStamp.)
Scheduling tool
You mean to network but it takes several back and forth emails just to get a time on the calendar. If you use an online scheduling tool you can cut down on the time and aggravation (which encourages you to initiate more networking and encourages recipients to say Yes). Doodle and TimeTrade are two that I have used both to initiate appointments and to respond to invitations. Both have free options.
Alert system
A great way to network naturally is to reach out when there is news – someone gets a promotion and you congratulate them, a company is mentioned in the news and you acknowledge this to your friend who works there. Facebook and LinkedIn both provide updates around professional moves like promotions or personal news like birthdays and anniversaries. You can also use Google Alerts (which combs the Internet for content containing a specific keyword) to follow companies or specific people for breaking news. Newsle is another example of an alert service that links to your social media or address book contacts and then sends you a summary email with links for when they are mentioned online. Both Google Alerts and Newsle are free.
Social media dashboard
Another great way to network naturally is to share news when you think of it but spread out the timing of when you share it. If you use a social media dashboard to track and post to your different social media profiles, you can schedule your shares in advance. This ensures that you don’t need to visit each social network each and every time you want to share, and you avoid the temptation of just checking out a few cat videos while I’m there….I use Buffer and HootSuite, both of which have free options. I post my content but also interesting articles I see in areas relating to my expertise. For a career changer who wants people to see a whole new angle to their expertise, curating regular content relating to their new target area is a great way to send that message out regularly but unassumedly.
CRM system
A CRM, or customer relationship management, system is more than just how you will track your contacts’ informatiion. If you are going to network properly, you will need to follow up over time and therefore you will need to track when you first met, subsequent meetings, and any follow-up action items promised. If you’re simply using your phone or an online address book, you won’t be able to easily make notes and highlight action items. A CRM system allows you to tag contacts by different categories (e.g., people you need to call v. people you are already in talks with). It enables you to include comments and notes about the person and your interactions. I use an Excel spreadsheet as my home-grown CRM tool. I have a column for how I met someone, when I first contacted them, what the next follow-up action should be, and ad hoc notes I want to capture about the person. I find that Excel enables me to track just what I want in a searchable way. Other examples of CRM systems are SuccessHawk for job seekers or PipeDrive for entrepreneurs (both of which are paid solutions, not free).

Networking Tips for the Holiday Office Party

The holiday office party is a wonderful time to mingle with colleagues in a less pressured setting.
Which makes it a great time for networking.
Never thought of an office party as a networking event? Then you are missing a key opportunity to develop or deepen relationships with co-workers, to personally thank those who have been helpful or supportive throughout the year, and to introduce yourself to senior executives.
But if you have any level of anxiety when it comes to networking (and who doesn’t?), here are a few tips to keep in mind:
Gayle Hallgren-Rezac and Judy Thomson, networking masters and the co-authors, WORK THE POND! Use the Power of Positive Networking to Leap Forward in Work and Life, advise you to work the room in pairs. The role of each “tag teammate” is to keep an eye on the other person, to make introductions, and to make sure that both of you are comfortably engaged in conversations.
Another of their networking tips is to give yourself a challenge by seeking out the person who would be considered the ‘host’ of the party. (This is probably the most senior person.) Thank him or her for sponsoring the event. You don’t have to go overboard with praise but acknowledge that you “appreciate the chance to connect with some new people you wouldn’t have met otherwise.” If this senior person is open to continuing the conversation, mention something positive that your team is doing. (Prepare one or two examples ahead of time.)
They’d also advise you to “create good karma” by rescuing the individual who is standing alone clutching a drink in one hand and a plate of food in the other or who is walking around with “the look” – scanning the room to find a friendly face. (This may be a new employee or someone who is more of an introvert.) Approach that person and introduce yourself.
When it comes to body language tips for networking at the office party, here’s what I’d advise:

* Develop an inclusive, welcoming attitude. Pretend that your job is to make others feel welcome and at ease. Approaching people with this attitude (and a genuine smile) will immediately resonate in a positive way.
* Stand tall. When you pull your shoulders back and hold your head high, you assume a posture of confidence and self-esteem.
* Reach out and touch someone – but don’t go overboard. The way you greet your fellow party-goers can have a huge impact on their perception of you. A warm, but firm handshake is a business skill worth developing, and a light touch on the arm or shoulder can create an instant bond. But if you hang on people or touch them too frequently, you send unintended signals of neediness or flirtation.
* Let your body show that you are at ease. If you want people to see you as comfortable and approachable, assume an open position with your legs about shoulder width apart and your arms loosely at your side or held waist high. Don’t cross your arms and legs or use objects (your drink or plate of food) as a barrier. It looks as if you are closed off or resistant.
* Mirror the other person’s gestures and expressions. When we interact with others, subconsciously we scan the other person’s body to see if they move or gesture in a similar way to us. When you subtly mirror the person you are speaking with, it is a way of silently saying, “We have something in common.”
* Make positive eye contact. Looking at someone’s eyes transmits energy and indicates interest and openness. (This is a great time to improve your eye contact by making a practice of noticing the eye color of everyone you speak with at the party.)
* Lean in slightly. Leaning forward shows you’re engaged and interested, but also be respectful of other people’s space. Although this varies by culture, in North American business situations, even in a party setting, that means staying at least 18 inches away.
* Dress for success. Remember, this is a business event not a date. Festive and stylish is great, but flashy or too revealing looks unprofessional.

* Leave your smart phone home. Or, at least, keep it out of sight. Don’t text or check email while talking with your fellow party-goers.
* Limit your alcohol. It will make following these tips so much easier!
If lucky enough to be invited, you definitely should attend the office holiday party. When you go, don’t pass up this wonderful opportunity to expand your network and build your personal brand.

Sunday, 3 August 2014

Top 10 Highest Paying Jobs in Computers and IT

Top 10 Highest Paying Jobs in Computers and IT

top 10 highest paying jobs in computers and it
As technology advances and evolves, individuals with formal training and skills will find themselves in a position to take advantage of the best opportunities the field of computers and information technology has to offer.
Here are the Top 10 Highest Paying Jobs In Information Technology and Computers.

1. Business Continuity Analyst

Business Continuity Analysts are the disaster relief experts in the IT industry. Business continuity analysts ensure that companies recover data and resume normal operations following blackouts or disasters. Business continuity analysts research and prepare recovery strategies based upon possible risks and potential losses. Business continuity analysts are leaders with an extensive knowledge of information security and risk management who also train employees within businesses to execute recovery plans in the event of a disaster. Business continuity experts generally must obtain a minimum of a bachelor’s degree in business, information management, or computer science to gain employment earning $95,000 to $105,000 annually.

2. Computer and Information Scientists And Researchers

Computer and Information Scientists And Researchers develop and devise solutions to computer hardware and software issues. As expert theorists and inventors in the field of computer science and information technology, computer and information scientists and researchers are considered the innovators of invention and delegators of responsibility. Computer and information scientists and researchers have an in-depth understanding of business, engineering, scientific, and technological fields and lead governmental agencies, engineering firms, academic institutions, and private software publishers as integral members of research teams.
Training to qualify as a computer and information scientist and researcher involves completing studies within a PhD program within disciplines like: information systems, computer science, information technology, software engineering, and computer engineering. Salaries for computer and information scientists and researchers are $77,000 to $125,000 yearly.

3. Data Modeler

Data modelers are systems analysts who work closely with teams of architects developing conceptual, logical, and physical data models for the binary processes of computers. Data modelers devise the processes which separate mass amounts of data in computer systems to reduce inessential or redundant data to improve data transfer between systems. Data modelers generally complete studies within bachelor or master degree programs in applied mathematics, information systems management, or computer or information science. Earnings for data modelers range from $75,000 to $103,000 yearly.

4. Systems Software Engineers

Systems software engineers apply the principles and theories of computer science combined with mathematical analysis to design, test, and maintain the software systems that run computers. Software application engineers are the IT industry’s experts who develop operating systems, middleware, computer games, business applications, databases, and network control systems. Software application engineers work closely with teams of other IT professionals who specialize in developing the multiple layers of computer software to collaborate and contribute to the evolution of the rapidly changing IT industry. Software applications engineers are required to complete a minimum of a bachelor degree in software, computer systems, or mathematics combined with work experiences in computer systems and applications. Software application engineers earn salaries of $73,200 to $114,000 annually.

5. Network Security Administrator

Network security administrators are important members of IT teams who maintain and secure computer systems and data within firms and organizations. Systems administrators perform a number of far ranging duties including installing, supporting, and maintaining computer systems and servers. Network security administrators also perform light programming, project management, training to those who operate computers, consulting and problem solving for operating issues, and supervisory skills to technical support and other staff.
System administrators also devise plans to respond to service outages, internal and external threats. Training to become a network systems administrator requires a minimum of a bachelor degree based in computer science, computer engineering, information technology, information system management, or system administration combined with work experience as few graduate level programs exist. Annual earnings for network security administrators range from $68,000 to $88,000.

6. Computer Systems Analysts

Computer systems analysts are the IT industry’s specialized planners, designers, installers, and developers. Computer systems analysts customize computer systems to meet the information technology needs of most firms and organizations. Computer systems analysts work closely with programmers, software engineers, network security specialists, and management teams to coordinate and customize computer systems, cost benefit and return reports, and other information management tasks. Computer systems analysts must complete a minimum of a bachelor degree in computer science, information science, information systems, management information systems, applied mathematics, business administration, or engineering. Present employment trends show employers prefer candidates with graduate degrees, particularly a Master’s in Business Administration with a specialization in information systems combined with work experiences. Computer systems analysts earn salaries of $58,000 to $96,000 annually.

7. Systems Security Administrator

Systems Security Administrators are specialized IT professionals who design and implement system structures, design and upgrade software, maintain server security, and oversees server activity. Systems security administrators also manage high volume web activity for organizations which accept online payments and advertising as well as well as resolve technical issues while maximizing the efficiency of network systems. Network systems administrators often complete certificate or associate degree programs in information security or computer science disciplines and gradually work their way up from entry level positions after gaining experience. Systems administrators generally have salaries of $52,000 to $ 84,100.

8. IT Auditor

IT Auditors are responsible for collecting information regarding the overall operations, practices, controls, and accounting within firms and organizations. IT auditors also ensure that businesses comply with organizational and governmental regulations to secure data and records by evaluating physical, business, and financial controls. IT auditors also investigate computer networks to uncover issues like mismanagement, fraud, and inefficiency while devising means of improving security, user interface, and processing capabilities. IT auditors are required to complete studies within master’s degree programs in accounting, business administration, or information technology management and either a certified public accountant or certified information systems auditor credentialing program to gain employment. IT auditors have salaries of $51,000 to $76,000 yearly.

9. Professional Hackers

Professional hackers are the IT industry’s “sneakers” who ethically prevent computer hacking, criminal computer activities, and other illicit attacks. Professional hackers are highly trained and vital members of all IT teams as they detect and prevent malevolent attacks on systems. Professional hackers are essentially expert computer programmers who utilize complex software and hardware to help public and private agencies, firms, and businesses in preventing attacks and exposing potential vulnerabilities. Professional hackers may use subtle techniques like phishing, keylogging, modification attacks, denial of service attacks, email address hacking, cookie stealing, website hacking, javascripts, and bruteforce methods to access, capture, or retrieve information, accounts, databases, and network systems. Professional hackers generally must complete a minimum of a certification program combined with gaining a full understanding of programming languages to qualify for employment earning yearly salaries of $57,000 to $81,000.

10. Computer Programmers

Computer programmers write programs, the software necessary for one aspect of computer programs or codes. Computer programmers work closely with computer software engineers and systems analysts converting software programs into logical instructions. Computer programmers utilize programming processing languages like C++ and Python to increase productivity, devise debugging functions, and a number of other functions.
Computer programmers also update, modify, repair, and expand existing programs using computer assisted software engineering tools for specific applications, computer programs, and other computer functions. Computer programmers are required to complete studies within associate or bachelor level computer programming degree programs combined with work experience and the most current technology information available to gain employment. Earnings for computer programmers range from $53,000 to $90,000 annually