Cloud Computing – What have we Learned?

Cloud-Computing-What-Have-We-Learned-Image-Blog

Cloud computing has evolved through a number of phases which include grid and utility computing, application service provision (ASP), and Software as a Service (SaaS). 

But the overarching concept of delivering computing resources through a global network is rooted in the sixties. The idea of an "intergalactic computer network" was introduced in the sixties by J.C.R. Licklider, who was responsible for enabling the development of ARPANET (Advanced Research Projects Agency Network) in 1969. 

His vision was for everyone on the globe to be interconnected and accessing programs and data at any site, from anywhere, explained Margaret Lewis, product marketing director at AMD. "It is a vision that sounds a lot like what we are calling cloud computing." Other experts attribute the cloud concept to computer scientist John McCarthy who proposed the idea of computation being delivered as a public utility, similar to the service bureaus which date back to the sixties. 

Click here to see what we have learned about Cloud Computing since then »

ITIL Practitioner FAQs

ITIL Practitioner FAQ's, The New Qualification:



Earlier this year AXELOS announced that they had formed a global team of IT Service Management (ITSM) professionals to develop the new ITIL Practitioner qualification. The Practitioner Architects Team lead the development of the syllabus and exam questions for the new qualification, which will be available globally by the end of 2015. ITIL Practitioner will equip ITSM professionals with skills to successfully adopt and adapt ITIL to improve the Service Management capabilities in line with their organizations’ business goals.

1. Why are you introducing this new qualification?

The qualification aims to demonstrate that IT Service Management (ITSM) professionals are equipped with the skills to apply ITIL concepts in their organization, ensuring maximum business value by delivering fit-for-purpose and fit-for -use services. At the same time, it’s designed to give confidence to managers that the members of their team are ready to initiate and successfully carry out required improvement initiatives.

2. What is the ITIL Practitioner exam based on?

The exam is based on various elements of ITIL, with a strong focus on Continual Service Improvement (CSI), a fundamental lifecycle stage in ITIL; as well as additional guidance covering the practical elements in more detail.

The Importance of Employee Training

If you were given the choice between two different pilots—one was trained, the other not—which one would you choose? But what if there was no “up-front” cost for the untrained pilot? You still wouldn’t do it? Yet many business owners do not recognise the importance of employee training. 

Employee-Training-Image-SureSkills-Blog

According to a recent survey by go2HR, 40% of employees who receive poor job training leave their positions within the first year. 

Training presents a prime opportunity to expand the knowledge base of all employees, but many employers find the development opportunities expensive. Employees also miss out on work time while attending training sessions, which may delay the completion of projects. Despite the potential drawbacks, training and development provides both the company as a whole and the individual employees with benefits that make the cost and time a worthwhile investment.

Click here to see how effective employee training can be the key to a successful business »

30 Years of Technology in Ireland

What has been the biggest change in IT over the last 30 years? 

As Told by SureSkills CTO, Kevin Reid for TechPro's 30 year retro edition. 

Easy, the internet and growth of information. In a little over 30 years the internet has gone from being the ultimate secret to being the ultimate public tool through which many people choose to live their lives. Beginning as a top secret research project to enable underground US nuclear sites to communicate with each other in the event that the Russians finally pressed the big red button, the internet today is not only a valuable business tool but it has also become a social requirement. 

SureSkills-Kevin-Reid

Facebook, Twitter, LinkedIn, SnapChat and countless other social media tools are used by people to extend their social circles and share more of what’s happening in their lives. Over 12 billion messages sent daily by Facebook users alone, a huge explosion in information that the electronic world is facilitating.

While much of this is a positive thing, where do we draw the line on privacy issues? Or is this an issue? Is it a generational thing and the children of the internet see sharing as normal; privacy is not their default setting. What about the Internet of Things though? 

By 2020 it’s anticipated that there will be 50 billion objects connected this way which will be fabulous for getting your lights and heating turned on just in time for your arrival home on a cold night. Your average family home already probably has upwards of seven-eight smart devices & smart phones are great but they constantly report where a person is. A smart burglar can drop a sensor outside a front door to learn about a person’s habits, build a pattern over what they do.

Click here to see whats coming in the next 30 years »

What's New - PRINCE2® Agile

Since its formation, AXELOS has sought to engage with the user community through workshops and online surveys. The strong message they heard through these channels was that they needed to demonstrate how their products remain relevant and fit with other approaches and frameworks. This new development is a natural extension from those early engagements. PRINCE2-Peoplecert-Logo

PRINCE2 Agile is a new extension module tailored for forward-thinking organisations and individuals already benefiting from PRINCE2 that would like further guidance on how to apply agile methods to the world’s most recognised project management method. PRINCE2 Agile will facilitate the ability to change direction, maximize Return-On-Investment (ROI), while retaining proven ‘best practice’ governance and management methods. 

Click here to see how PRINCE2 Agile can kick start your future »

What's New - Resilia Cyber Security

As the range and complexity of cyber threats and vulnerabilities has increased, the approach to managing the associated risks has also evolved and matured. RESILIA™ is a complete, collaborative risk-based approach driven by the Board but involving everyone across the organisation and extending to partners, supply chain and customers. 

Resilia-Cyber-Security-Logo

It requires moving away from strategies that seek solely to protect the business to an approach that includes preparing for, and recovering from, a cyber-attack. Our belief is cyber security is an issue for a whole organisation, from board to staff and from customers to suppliers. AXELOS' RESILIA™ best practice and certification will be aimed at everyone who has an influence on cyber resilience, including information security, IT development, product owners, customer operations and business support (including finance and risk).  

The AXELOS RESILIA™ range of tools and simulations are aimed at more specific groups including board management, information security and risk management. AXELOS RESILIA™ is aimed at all types and sizes of organisation, both in the public and private sectors. 

Click here to see how Resilia can protect you and your business »

AWSome Day Dublin 16th of July

AWSome Day Dublin Marker Hotel | 16 July 2015  

Amazon-Web-services-cloud-image

Join Amazon Web Services (AWS) for the AWSome Day taking place in Dublin. This free, one-day event is delivered by AWS Education's technical instructors and are ideal for IT pros, developers and technical managers who would like to learn about how to get started in the AWS Cloud.  AWSome Days are based on the AWS Essentials Course and will take you through a step-by-step deep-dive into AWS core services such as Compute, Storage, Database and Networking. At the end of the session, you will be able to build scalable and secure applications on the AWS Cloud.  

Click here to see full agenda and secure your registration »

How Is Your Role Impacted by the Cloud?

Cloud-Jobs-Image-Blog

You can’t have avoided the word “cloud” in recent years nor its predominance in all of our lives, both business and personal. Cloud computing is not only a game-changer for companies, but it is also changing the nature of jobs, both in information technology departments and in other departments as well. 

“Cloud computing solutions will reduce the number of IT hardware jobs in the marketplace, increasing competition for new job seekers who lack cloud skills and expertise.” 

Click here to see how your role is impacted by the cloud and how you can make the most of it »

Your Journey To A Secure Cloud - Post Event

Cloud-Security-Event-SureSkills

A recent Cloud survey* found that 73 percent of respondents cited security concerns as the top challenge holding back cloud projects. Therefore companies need to put time and effort into fully investigating the many Cloud security options that are available to enable them to choose the right one to fit their chosen Cloud strategy. On June 10th SureSkills ran “Your Journey to a Secure Cloud“ event where SureSkills’ SME’s and industry experts gave an overview of the various Cloud strategy options and the importance of ensuring the security of your data. 

Half of Irish Businesses Fear a Cyber Attack

A new survey by Data Solutions has found that half of IT decision makers within Irish businesses are concerned that nation state cyber warfare, such as the SonyCyber-Security-Image hack, may become a threat to their business. 

Furthermore, 22% of IT professionals believe operations and production departments pose the biggest information security concern. The sales department and IT department were next at 20% and 19% respectively. Forty per cent of respondents blamed a lack of IT security knowledge or information for cyber security risk. About one third said the internal use of social media, personal devices or applications by employees was an information security risk to the business. 

Click here to see how you can protect your business from a Cyber Attack »

Archive

Archive by Years
CS.Categories

This site uses cookies to help deliver an engaging user experience.
To learn more about what cookies are and how to manage them visit AboutCookies.org
// SureSkills Start // SureSkills End"