Tuesday, 22 July 2014 16:52

Training needs are changing

By

The type of training required by IT professionals is changing, according to the CEO of a major training provider.

The continuing trend to outsourcing and offshoring means employers are looking for different skill sets from employees, so training and certification in process and people skills are becoming important if you want to keep working.

DDLS CEO Mal Shaw (pictured) told iTWire that outsourcing and offshoring mean there is reduced demand for staff with systems and network administration skills, but organisations do realise that it is best to use IT staff with appropriate process skills to manage relationships with providers.

He described these people as 'T-shaped professionals' where the vertical stroke describes their IT skills and the horizontal represents soft skills, consulting and marketing expertise, and so on.

The role of such people isn't limited to provider relationship management, he said. With the growing tendency for IT expenditure to occur outside of IT departments, it's important that IT professionals are still involved in decision making.

Line of business and IT staff need to be part of the process in order to ensure that the organisation gets what it wants and manages the risks appropriately. To this end, training and certification in ITIL (practices for IT service management), PRINCE2 (project management), COBIT (enterprise IT management) and related best practices are increasingly sought by employers.

That said, DDLS still offers a wide range of training in traditional IT skills, and has been recognised by high-profile vendors including Cisco, Citrix, Microsoft and VMware.

There are also changes in the way IT-related training is being delivered, according to Mr Shaw. While traditional 'instructor in a classroom' delivery is still the mainstay, around half the students aren't in the same room as the instructor. Instead, they are participating via telepresence from rooms at other DDLS offices, thus reducing travel and accommodation costs.

The company is considering giving its clients the option of joining courses via telepresence from their own offices, but there is some concern that this would lead to an increase in the number of people failing to complete courses as it becomes so much easier to drag them away to deal with an 'urgent' problem that wouldn't be deemed sufficiently important to have them travel back from a remote location.

Although it is part of NTT-owned Dimension Data, DDLS operates as a separate business, Mr Shaw said, though it partners with Dimension Data and other companies "when training needs to be part of a project."

It has around 100 staff and 150 contract instructors, and operates from seven locations. Clients include major government departments and the country's largest companies.

DDLS's history goes back to 1991 when it was set up as Com Tech Education Services to provide training to Com Tech's resellers. South Africa based Dimension Data completed its acquisition of Com Tech in 2001, and Dimension Data was in turn acquired by Japan based NTT in 2010.

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.

REGISTER HERE!

LAYER 1 ENCRYPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

VENDOR NEWS & WEBINARS

REVIEWS

Recent Comments