When LinkedIn bought online training company Lynda.com in April 2015, a lot of people wondered what was really going on behind the scenes. A recent post from Steve Weiss, Content Manager for Business and Data Science at Linked (formerly at Lynda.com), helps put such speculation to rest: in a self-referential bow toward data mining/Big Data/Data Science, LinkedIn has been mining the heck out of its 400-million-plus user base and watching hiring decisions made under its purview to help the company target hot education topics. What's at the top of the list for 2016?
As that inimitable and always sly soothsayer, Yogi Berra, once said: "It's like deja vu, all over again," when it comes to chart-topping IT skills and technical areas for 2016. There are some recurring themes here to be sure, but also some newer technologies that promise to take up residence on the short list of what's hot for next year.
In my line of work, I get asked to listen to countless product pitches and watch oodles of demonstrations. It can be informative and sometimes even mildly interesting, but I seldom find myself saying "I've got to see more of this stuff, and use it myself." A rare exception to this general trend hit me over the head earlier this week when I finally got together with members of the Spanish-based company Panda (a name many readers will recognize thanks to their long-standing and highly regarded anti-malware product offerings) to walk through the company's Adaptive Defense product instead.
A recent flurry of reports via Experian, through its data breach resolution arm, in tandem will well-known security research firm the Ponemon Institute, paint a depressing portrait of the data breach landscape -- especially for firms involved in handling customer credit and other sensitive data. The moral of the story turns out to be a combination of ongoing education for security firms and data handlers alike, along with a profound need for preparation in advance of data breaches before they occur.
Over the past month, the folks over at Certification Magazine (who also own and run the excellent GoCertify.com site) have been mining their recently published end-of-year (2014) salary survey. As I chew over the numbers they report and the implicit career guidance they can dangle in front of current and aspiring IT professionals, I'm reminded of that old aphorism, often erroneously attributed to American humorist Samuel Clemens/Mark Twain: "There are three kinds of lies: lies, damn lies, and statistics." Read on for further musings on what CertMag found and what it can, but doesn't have to mean, when it comes to crafting career plans.
Train effectively – train immediately with Video Courses from Pearson IT Certification.
Expert author and presenter Sander van Vugt takes certification candidates on a two week journey in a new virtual workshop series on RHCSA and RHCE exam essentials.
Topics range from creating advanced Apache configurations to troublehsooting, and setting up an iSCSI environment with target and initiator.
Next session begins Feb 26th and runs every week through end of April!
Register now for these new online February and March 2015 webcast & workshop events, offered in conjuction with our Pearson Authors and our technical partners.
Join us for Lesson 1 of “Tips for passing the Red Hat RHCSA and RHCE exam”, on Jan. 23rd, at 12:00pm EST, exploring “Understanding external authentication,” presented by Pearson IT Certification Author Sander van Vugt.
When executive editor Brett Bartow at PITC occasionally suggests a blog topic, I'm always all ears. This time, he pointed me at a recent Network World story entitled "10 Hottest IT Skills for 2015," a November 18, 2014 story from Mary K. Pratt of sister publication Computer World. I'm always curious to know what's on the radar, so I read the story with some interest, and will share some high points with you here.