Feeds

Editor's Blog: SEEDing graduates

Soft skills in IT

3 Big data security analytics techniques

One really goes to conferences like Microsoft TechEd to meet people you didn’t know you were going to find interesting… One such serendipitous conversation I had at TechEd this Autumn was with Iain Kelwick of the University of Hull, about SEED Software.

This is an EU- and Microsoft-sponsored initiative for unemployed Comp Sci graduates. Thought there weren’t any? Well, don’t most job opportunities ask for experience, and even business domain experience, these days? Some inexperienced graduates have trouble getting that all-important first job.

SEED delivers high-quality software solutions, professionally project-managed and backed up with the expertise and experience available in Hull’s Computer Science Department. Those inexperienced graduates are managed by SEED, and their experience or lack of it, is irrelevant to the end customer (and SEED gets repeat business, so presumably this model works)

However, what interested me was the nature of the extra level of training the scheme offers to graduates – not in the technical IT skills people usually think are important but largely, it seems to me, in the soft people skills that make technically competent people actually useful to the business. These range from estimating skills and the ability to negotiate a compromise between the delivery of business functionality on a specified date and the resources available; to the simple ability to talk to business people without using IT jargon...

But SEED is only one initiative, and quite a small one in the context of the IT industry as a whole. There are other approaches to ensuring that you get the “soft skills” needed to complement the technical knowledge of your IT staff. Some computer science courses have an “on the job” training component and industry sponsored competitions, such as Microsoft’s Imagine Cup, give favoured students a chance to escape from the academic ivory tower.

More enlightened employers actually assess communications and other people skills during selection. One good way of assessing employees for more than just their claimed qualifications is to put the “short list” to work for a day, in a pair-programming team. This is expensive in the short term, possibly – but in the long term, how much will technical gurus that can’t work effectively as part of the team cost you?

Top three mobile application threats

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.