Feeds

The Sun shines out of certified Java programmers

Papers chasing papers

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

The recession gathers apace, jobs are falling like nine pins, we're all doomed. Or maybe we dig in, work hard, brush up on old skills, read up on new stuff, do a bit of studying, sit an exam or two. Here's a couple of papers about IT exams from the Reg library for your perusal.

The Sun certification and team performance: The impact on Application Developers

Vendor qualifications are the last refuge of an incompetent scoundrel, a programmer's ability is in inverse proportion to the number of qualifications on his wall - you've heard the spiel. This paper from IDC, funded by Sun, seeks to persuade you otherwise. IDC travelled the globe to interview three hundred or so App development teams and assess the effect of vendor certification on their work

IDC measured their performance against 10 process metrics. Average performance was "relatively mediocre". Who let those analysts in the building?

On several metrics, IDC detected a gap in performance between teams with low and high concentrations of vendor certifications. The widest gap of all was in the willingness of teams to integrate new technologies. For instance, teams with high concentrations of Java certified programmers were far more likely to intgrate web services into their apps than teams populated by mostly untrained staff.

With the precision that only management consultants and IT analysts are capable of, IDC says: "Having 50 per cent of an application development team certified in Java (Sun certified) can improve performance in application development by more than 40 per cent."

So there's a little fudging in "can" and "more than". But surely it is hard to quarrel with IDC's thesis that "training, and ultimately certification, is critical to improving overall IT performance".

Or is "certification" a red rag to The Reg readers' bull?

ITIL qualifications explained

ITIL papers are always popular with Reg readers. But pity the poor people who have to take these courses. Reading this paper, from Focus on Training, a UK training company almost induced a panic attack. Learning about best IT practices is one thing, but taking exams in the subject? We'd rather resume the accountancy studies we abandoned a couple of recessions ago.

This paper is an efficient-enough check list of ITIL qualifications, with the emphasis on service management. The authors run ITIL qualification courses, but you knew that already. ®

Internet Security Threat Report 2014

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.