Feeds

Editor's Blog: SEEDing graduates

Soft skills in IT

Security and trust: The backbone of doing business over the internet

One really goes to conferences like Microsoft TechEd to meet people you didn’t know you were going to find interesting… One such serendipitous conversation I had at TechEd this Autumn was with Iain Kelwick of the University of Hull, about SEED Software.

This is an EU- and Microsoft-sponsored initiative for unemployed Comp Sci graduates. Thought there weren’t any? Well, don’t most job opportunities ask for experience, and even business domain experience, these days? Some inexperienced graduates have trouble getting that all-important first job.

SEED delivers high-quality software solutions, professionally project-managed and backed up with the expertise and experience available in Hull’s Computer Science Department. Those inexperienced graduates are managed by SEED, and their experience or lack of it, is irrelevant to the end customer (and SEED gets repeat business, so presumably this model works)

However, what interested me was the nature of the extra level of training the scheme offers to graduates – not in the technical IT skills people usually think are important but largely, it seems to me, in the soft people skills that make technically competent people actually useful to the business. These range from estimating skills and the ability to negotiate a compromise between the delivery of business functionality on a specified date and the resources available; to the simple ability to talk to business people without using IT jargon...

But SEED is only one initiative, and quite a small one in the context of the IT industry as a whole. There are other approaches to ensuring that you get the “soft skills” needed to complement the technical knowledge of your IT staff. Some computer science courses have an “on the job” training component and industry sponsored competitions, such as Microsoft’s Imagine Cup, give favoured students a chance to escape from the academic ivory tower.

More enlightened employers actually assess communications and other people skills during selection. One good way of assessing employees for more than just their claimed qualifications is to put the “short list” to work for a day, in a pair-programming team. This is expensive in the short term, possibly – but in the long term, how much will technical gurus that can’t work effectively as part of the team cost you?

Security and trust: The backbone of doing business over the internet

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.