Feeds

IT chiefs in cloaks and sashes gets Queen's mark of approval

Surrounded by men with pikes and muskets

Internet Security Threat Report 2014

The Worshipful Company of Information Technologists received its Royal Charter yesterday - its mark of approval from the Queen.

The Livery Companies were originally proto-trade unions or professional standards bodies, depending which you look at it, based in the City of London. The first, the Worshipful Company of Mercers, got its Royal Charter in 1394 but was in existence for an unknown time before that. Although some retain a regulatory role - assay marks to show the purity of gold and silver are still overseen by the Company of Goldsmiths - most are now social and charitable bodies.

Yesterday's ceremony was part of Evensong at London's most beautiful building, St Paul's Cathedral. The actual Royal Charter - a large vellum certificate - was blessed before freemen and livery men walked to Mansion House escorted by a ceremonial guard of Pikemen and Musketeers for a banquet with the Lord Mayor.

Charles Hughes, Master of the Company, told The Reg: "This is the culmination of three years' work. It is a great honour and prestige to be awarded the Royal Charter and recognition of the importance of what we do. I hope it will encourage us all in our endeavors."

pikemen

The ceremonial guard awaits

cermonial guard

Fearsome fellows

livery men information technologists

Master of the Company Charles Hughes, clutching the Royal Charter. To his right deputy master Jo Connell is talking to senior warden Ken Olisa.

overtaking a bus

The guard overtakes a bus while leading the company to Mansion House

The Information Technologists Company (ITC), established in 1985, works to promote the industry as a whole but is not a lobby group for specific issues. It is working with another company to set up a technology-focused school in Hammersmith and also works with Lilian Baylis Technology School in Lambeth.

The ITC set up the IT4Communities awards scheme now run by AbilityNet, which finds IT professionals to do pro-bono work for charities. It also runs IT4Arts, which provides a similar match-making service for theatres and other arts organisations.

Information Technologists Company members include Bill Gates and Tim Berners-Lee. It is supported by donations - the largest being £5m from Dame Stephanie Shirley, founder of F-International, now Xansa. ®

Beginner's guide to SSL certificates

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.