Why does it surprise us that just when we think we're beginning to get a handle on what needs to be done, it changes?
Just when we think we're beginning to get a handle on what needs to be done, it changes. How come we didn't expect it to?
For instance, a while back I wrote a blog entry setting Microsoft straight on open source software, a topic Microsoft and I have agreed to disagree about. I don't remember exactly what I wrote, but it was probably a little bit snide -- I've been giving Bill Gates and Steve Ballmer the benefit of my wisdom for years, and frankly, they seem to take so little of it to heart. I do remember an e-mail I got from a reader who called my piece "Microsoft-bashing" and said something like, "don't waste my time with this stuff. I've got a data center to run."
I thought of that when I read the story about Palamida's new IP Amplifier, a search tool and database of, the company claims, more than 38 million of the most commonly used open-source code files. The point of the product is that companies may be incurring legal liability if they run software that includes code that has been wrongly identified as "open source," whether by mistake or with malice aforethought on the part of some developer.
So the reader who didn't want me to waste his time with open-source stuff is probably devoting a lot of his time to open-source stuff these days. Poetic justice, perhaps. But it's also symptomatic of business as usual these days in the IT department. Every time something new comes along, where does it go? Right on IT's plate.
A lot of the new stuff has to do with reporting. It's no longer enough to keep the database server up most of the time and the network running fairly well, users moderately happy and the firewall pretty bulletproof. Compliance means not only do we have to do all these things better, we have to document how much better. And compliance also means that we can't just do a good job of backing up, we've got to archive, and be able to produce on demand, virtually everything that crosses the company network, from documents to e-mail to IM traffic. And oh, by the way, put on this badge because you're also the new security guard for the enterprise: spam, spyware, phishing, trojans, and plain old stealing are all your responsibility.
So which one of your jobs is most important? Think carefully before you answer -- "Don't waste my time with this stuff. I've got a data center to run," is probably a career-limiting response, take my advice. Even if Bill and Steve won't.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.