Feeds

It's now or never for old sysadmins to learn new tricks

Watch out for your jobs, says Trevor Pott

Application security programs and practises

Follow the rocky road

Instead of trying to find some niche in IT that hasn't yet been commoditised and hiding out there until they come for that job too, I have decided to embrace the dark side.

Instead of running one shop I run 20. I use software and technologies that allow me to automate the businesses and charge a small retainer to monitor the systems and be there in case of emergency.

There is a lot of risk in becoming a managed service provider. It means going into business for yourself and that is always a rough road. Yet if you have a desire to do more than hold your financial ground this may be the only realistic path for many admins.

When one SME can no longer be expected to support your salary in a software-defined, cloud as-a-service world, you have to look to multiple companies to fill that function.

If you aren't already doing DevOps, then you are probably dead and you just don't know it yet

The closest thing to a true evolutionary path for sysadmins is the transition to DevOps. If your company qualifies as commercial midmarket and you aren't already doing DevOps, then you are probably dead and you just don't know it yet.

I work with companies with as few as 15 staff that have custom, in-house software. Many others need to beat software-as-a-service (SaaS) solutions into some semblance of utility, often involving building custom parsers (which usually evolve into middleware stacks) that pull information out of one SaaS app and insert it into another.

Even as I see these smaller companies pulling away from managing their own in-house infrastructure, I see their demand increase for software tools that bind various bits of infrastructure together into a cohesive whole.

It is not quite development, it is not quite operations, but it is in demand.

Find the exit

Positioned at the heart of the DevOps movement, Puppet has done a lot of research on the subject. The company has done surveys for years and certainly talked to people from all over the industry.

At first blush I found some results hard to swallow, but it is hard to poke holes in its methodology. After nearly an hour on the phone with their survey team the best I managed was to convince them to add a couple questions for next year.

The future of IT is pretty clear: we won't be administering systems as we do today. Configurations will be dynamic, states imposed based on responses rather than pre-determined conditions.

We are still a long way from that for most places – but the world changes fast. It takes years to reskill an individual and in those years our entire industry will have reinvented itself at least once.

Traditional administration jobs will become fewer and farther between. Picking an exit path is looking more important with each passing month.

Which path will you choose? Why? What options have I missed? The comments section is below; you know what to do. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.