A new way to get a coding job

I am now working as a consultant for a non-profit that, if successful, will change the way programmers and other tech types will get hired in our industry. It is an exciting time and I wanted to share with you who they are, what they are doing, and how you can help the effort.

launchcode-logoThe organization is called LaunchCode, and I have written about them here. The idea is to improve the way job candidates get screened for open positions, and to improve the supply chain of candidates, at the same time lowering the risk of a new hire for an organization.

Finding coders is hard, especially in those parts of the country outside the traditional tech hubs. It is hard to recruit them because hiring managers are busy, or they delegate the task to recruiters who don’t understand who is needed or the skills that are required. Some of the best programmers are people from non-traditional backgrounds, making them hard to evaluate. Many positions often go unfilled for months.

Enter LaunchCode. Last year they got started here in St. Louis by finding opportunities for people who had programming skills but hadn’t been hired because of a lack of typical credentials. They later expanded their reach by helping people take the introductory Harvard computer science class, CS50.In the year or so that they have been around, they have managed to get more than 160 people hired in dozens of companies in town, ranging from the largest IT shops to brand new startups. It is an impressive track record.

But that isn’t enough and they aren’t satisfied. They are trying to do several things at once to expand their reach:

  • First, create a large ecosystem of educational providers that offer coding instruction, to help people who need to brush up on their skills get better. While they started with Harvard and have a great partnership there, they have since expanded into more than 20 different providers that are teaching coding classes.
  • Second, develop a better way to vet people who are ready to enter the workforce by testing practice coding knowledge and how well a candidate will work in a team. That is their real secret sauce: if you can have something akin to a SAT but to predict coding prowess rather than just college performance, hiring managers are going to take notice. Years ago I remember a friend of mine had his own coding test that worked well for him when he was looking for programmers. LaunchCode is trying to do this on a broader scale.
  • Finally, expand to other cities that have programming jobs aplenty but have had trouble hiring coders. So far they have opened an office in Miami and one is planned for Kansas City and a few other places.

That last point is where I come in. LaunchCode wants to go nationwide, and to do so they need to first find the companies that are willing to support their effort and receive coding applicants for their open positions. I am helping them with this expansion drive, and trying to enlist as many companies as I can, based on my contacts in our industry. Here is where you help. If your company is in a position to hire coders, or if you know of someone in your circle that is in this position, email or call me and let’s chat.  I think we can help them succeed and really change the way tech hiring is done.

VMware blog: Simplifying Storage Solutions

Storage has seen its share of technology changes in recent years, but the most significant breakthrough isn’t higher capacity arrays, it’s the shift to software-defined storage. One of the reasons many enterprises are embracing this new paradigm is that in recent decades, managing storage has been a specialized skill set which has fostered organizational silos among other issues.

In this free e-Book that I wrote for VMware, I explore:

  • How virtualization and cloud management impact storage management
  • Implications of the control plane transitioning from hardware-centric to app-centric
  • The role of VMware hypervisor in managing storage

ITworld: Enterprise Mobility: Enabling the Mobile Worker

aaa2

We are in love with our mobile devices – especially those of us who rely on them at work.  They keep us connected, informed, and with a smart mobile strategy in place, they enable us to work efficiently at the highest possible productivity level.

Companies, in turn, are aware of the demands created by mobilizing employees. Gone are the days where IT controlled the endpoint computing device. Today’s users expect IT to support their device choices and to help them thrive in a rapidly changing mobile environment.  But with freedom of choice comes consequences. IT must prepare for better mobile management and security measures, building custom apps, deploying and supporting a range of devices, and transitioning from the task of selecting hardware to becoming a mobile systems integrator.

Momentum around mobile in the enterprise plays out in the numbers. 81% of companies surveyed by IDG have mapped out a mobile strategy, 47% have deployed mobile apps beyond email, but for most, security lags behind – only 7% say they are secured across all areas.  (See chart for survey details).  Links TK

While the mobile end game is different for every company, the ultimate destination for some businesses is to convert aging desktops into a 100% mobile-only population, where users can approach a level of productivity that they previously had with their Windows and Mac desktop applications. Some have already made that transition. For others, it can be years away.

Part of the challenge is how mission-critical enterprise applications translate to devices. Do they offer a viable mobile experience? Some corporations are making sure they do.  The percentage of companies that wrote internal apps for mobile devices first is up: 14% in 2014 versus 5% in 2013, according to a recent survey.  (Source: Consumerization of IT in the Enterprise survey, 2014, 1,155 respondents) [Link TK]

 

Pain points

There are many different fronts to address, seemingly at once, that enabling a mobile team is very complex. It isn’t as easy as replacing a desktop with another device: almost everything will need replacement, including applications, the network infrastructure, security models and potentially Internet bandwidth may need adjustments.

Organizations that invested heavily in wired networks for many years may find that they need to rework these networks to handle wireless connections for mobile devices. And while the vast majority (76%) of firms said they are expanding their Wi-fi networks in Network World’s 2015 State of Network survey [Link TK], than means more than just deliver more ubiquitous wireless signals.

Applications built with new agile tool sets and development environments will be required, but businesses are lagging behind in this area. According to this data [Linke TK: Source: Mobility Management, IDG Enterprise/IGS, 2014], organizations do not have a set model when developing custom mobile applications:  38% said mobile apps are most commonly developed on an “as needed” basis, while 21% said they conduct internal audits of existing internal applications and then develop the most relevant mobile version.

 

Finally, IT departments will have to carefully understand how to secure their mobile devices and the content that resides on them.

 

How are companies addressing the challenges?  IT leaders from four large enterprises share their mobile deployment strategies:

 

American Red Cross

What they did: Kept existing mainframe apps in place, built web-based front-ends to access those apps from mobile devices

Devices: Various

 

Traditional organizations with deep roots in a mainframe culture have an interesting journey to mobility.  The American Red Cross, for example, was one of the more conservative IT shops around a few years ago. Most applications ran on its own mainframes or were installed on specially provisioned PCs that were under the thumb of the central IT organization based in Washington, D.C.

 

This changed when disaster response teams started to bring their personal devices to the field. The IT group attempted to standardize the devices initially, but eventually allowed employees to use their own, instead changing how applications were delivered – making them accessible from the Internet, and more browser-friendly. Translated, this means that instead of having a terminal connection to its mainframe, running an old fashioned application, they designed a new mobile app or a web interface that talks to the mainframe piece to make the experience easier. The American Red Cross still has its mainframe apps, just a different way to get to them. Throughout the process, setting user expectations was critical.  “We worked with our HR department to put a few ground rules in place on using personal mobile devices, such as it is your responsibility to get good connectivity, not ours,” said John Crary, CIO for the American Red Cross.  [CUT: “You have to be able to adapt to the changing mobile environment. It is moving rapidly. Businesses are going towards being more mobile-centric, and we need to be much quicker and much more adaptable.” ]

 

 

Wessex Water

What they did: Created a secure environment to access and share documents including video footage from mobile devices.  The project replaced aging file transfer servers, provided tighter centralized control around who can share content and generated a full audit trail for that content.

Devices: Various

 

Wessex Water is a regional water and sewer utility in the UK.  Its goal was to create a secure environment to access and share documents from a wide range of mobile devices including iPads, Windows tablets and smartphones.  It deployed a SaaS-based secure file transfer solution, and was able to put it to multiple uses across the organization – one being to collect video footage from remote locations. Contractors hired by the utility use robotic video cameras to capture imagery inside its pipeline generating several videos each week around its water network.  Prior to the SaaS solution, videos were recorded to DVDs, mailed to Wessex Water, and were manually uploaded to their servers. Now, using the vendor’s APIs, Wessex Water built automated apps that transferred these videos into its SharePoint content management system. The apps support other business workflows as well, helping the utility company “quickly meet compliance obligations while saving hundreds of work hours per week,” said John Willis, Enterprise Architect at Wessex Water.

 

 

Needham Bank

What they did: Made document workflow part of an overall mobile workspace experience; transitioned to a 100% mobile organization. 

Devices: iPads and iPhones

 

Needham Bank, a New England financial institution, was one of the first banks to go all mobile. In 2007, they began buying iPhones. In 2010, they equipped executives with iPads when they first came on the market. “We don’t have any laptops at the bank, anyone who is out in the field has an iPad or an iPhone,” said James Gordon, the CIO at the bank. He uses a combination of apps to enable these mobile devices, including remote desktop, file transfer and mobile device management tools. “Our biggest problem is that we do more than just email on our mobile devices, and email was never designed to be a true document management tool or a file revision system. People need to have the right tools for the job, and we have built a whole suite of services both for our customers and our employees to make them more productive,” he said.

 

Gordon is also a big fan of reducing the number of app choices for his users and feels this is an important role for his IT department to play. You might think that a major bank would have issues with using all mobile devices, but Gordon says he did not have any push back from his auditors. Through the various security tools he uses, “we can revoke a user and they no longer have access rights. We also have extensive logs to tell who did what with which file. This can come in very handy. We had a senior executive who thought he had been hacked because one of his staffers had gotten a file. Turns out he had forgotten when he sent it. We examined our logs and found the file transfer, and pinpointed which office he was in at the time. When you can prove stuff like that, you have pretty good controls on your information, more controls than you can put on paper files that are placed in a copier.”

 

Organization: Revera Home Health

What they did: Used mobile devices to integrate scheduling and reporting for its field caregiver force.

Devices: BlackBerries

 

Mobile devices can also come into play in that time-honored tradition of automating tasks that involve massive amounts of paperwork and manual processes. This is what Halifax-based Revera Home Health faced with its field force of more than 4,000 home healthcare workers. Until a few years ago, they relied on manual methods to schedule and track which workers visited their clients’ homes and less than a tenth of them used any smartphones. “We found that a single worker calling in sick would result in more than 60 different transactions to fill that person’s shift,” said Jo-Anne Stone-Burke, a National Director at Revera Home Health.

 

Revera implemented a mobile-based management application based on BlackBerry smartphones that has helped improve its field communication and reporting of various home care visits.  They were able to reduce missed appointments and cut down on travel time with automated GPS-based directions too. “Now we can reschedule sick calls with a touch of a button, and we have eliminated two thirds of our missed appointments, saving the company $25,000 [Canadian dollars] a month too.”

 

 

Network World review: Portnox, Extreme lead NAC pack

portnox NAC overview2Remember when network access control (NAC) was all the rage? Remember the competing standards from Microsoft, Cisco, and the Trusted Computing Group? Back around 2006, there were dozens of NAC products, many of which turned out to be buggy and difficult to implement.

But NAC hasn’t disappeared. In fact, NAC products have evolved and improved as well. I reviewed Enterasys/Extreme Networks Mobile IAM, Hexis Cyber Solutions NetBeat NAC, Impulse Point SafeConnect NAC, Pulse Policy Secure, and Portnox NAC. Overall, Portnox (above) was tops.

You can read my full review in Network World here.

Faking Internet comments and reviews

Chances are if you have read commentary and reviews of products and services online, you are reading lots of fakes. Various estimates put this at a third or more, either outright fakes or paid-to-post by organizations looking to game the system. In other words, buyer beware.

“There is a reason comments are put on the bottom half of the Internet,” says one post from the once active Twitter account AvoidComments. The account also includes this one: “The problem with internet comments is that you can never really know who’s saying them.” — Winston Churchill. Yeah, I bet he really did say that, and probably to Al Gore just after the Internet was created.

But enough snarky anecdotes. A communications professor has attempted a semi-scholarly work entitled Reading the Comments, and it is actually an interesting book despite this description. Joseph Reagle knows his subject and sprinkles enough curse words throughout his book to make it almost NSFW if you were going to read it aloud — which mirrors some of the online comments that he quotes from as you might suspect.

I guess I was pretty much naive when I began reading his book. I didn’t think much about the various reviews that I read about restaurants, hotels, or particular products. But I can see how things have gotten out of control in the past decade especially. Now you can pay someone a buck or so to write a review and have it look like it is coming from someone that actually used the product or service. Yelp is apparently infested with this sort of thing, and just recently a restaurant in the bay area rebutted a negative review with video footage of the reviewer and how he spent literally seconds inside the restaurant, mostly standing around.

Reagle states that “Online discussion of sexism or misogyny quickly results in disproportionate displays of sexism and misogyny.” He cites several now well-known cases of where women were buried in negative comments just because they were female.

He describes an entire universe of fakers, haters, and takers and how they have flourished online. That was both eye-opening and depressing. Then there is a whole sub genre of intentionally funny reviews. Computer scientists are using them to train natural language processing to detect irony. Think of them as Sheldon’s answer to the Turing test.

As someone who still writes product reviews for a living (mostly now for Network World, where you can read my collection here), this pains me. Most of the pubs that I once wrote reviews for have folded their tents, and it is getting harder to recruit vendors to support these reviews as of late.

Yes, I have posted some comments on Amazon, TripAdvisor and AirBnB, but only out of some loyalty to the books I read or places I stayed or ate at. AirBnB has this interesting log-rolling ethos built-in to their site. Once you stay at a place, you rate your host and your host rates you. That takes some of the snark out of your comments, but it also helps to improve the descriptions of each place and the expectations you have when you are choosing where to stay. And help to make sure that you are on your best behavior too.

Still, comments can tell us much about the human condition, and the social fabric of our lives. Perhaps too much, as many Gen X’ers are prone to oversharing. But that is for another column and another day. In the mean time, you can pre-order Reagle’s book, which will be available in May, here. And remember, as our Twitter friends have posted: Nobody on their deathbed ever said, “I wish I had spent more time reading Internet comments.”

Ricoh blog: Is Directory as a Service Right for Your Business?

One of the core components of any modern is its directory service. It usually operates behind the scenes, authenticating users and devices without much fanfare until something goes wrong. Typically, you employ Microsoft Active Directory, LDAP or a Radius server to provide this function. In the past year a number of cloud providers have begun offering directory as a service or DaaS, moving something else to the cloud.

Currently there are three DaaS providers: Amazon has its own Directory Service,Microsoft has its own for Azure, and a startup called JumpCloud.com. Why bother when there are dozens of on-premises directory service software vendors, including what comes built-in to a Windows Server already? A few reasons: First, you may want to scale up your enterprise or move more of your servers and services to the cloud already and want something more capable from your directory services. Second, you may want to make use of a hybrid cloud environment, and this is the enabling step. Next, managing the directory requires some specialized skills, and as you organization grows it may be more than what your existing staff can handle. Finally, it can be cost effective and provide more features too, such as the ability to provide a single sign-on user authentication portal.

Which of the three you might use, if any, depend on your circumstances. If you are already using either AWS or Azure, then you should look at their DaaS offerings first. If you use a local LDAP server, then JumpCloud might be the ticket.

Here are some other questions on how to choose the right DaaS system:

Do you currently have your own on-premises directory service, either LDAP, Radius, or AD? If so, you will have to consider how to migrate to the cloud DaaS or run a hybrid DaaS. If you are starting from scratch it might be easier to implement one of these cloud-based services.

What else besides Windows PC users can authenticate to it? Macintoshes, Smartphones, and apps are the usual kinds of things that you would want to authenticate to a DaaS. All of these cloud-based services offer this.

Is the cloud provider offering it across different geographies? You want your cloud directory to operate at scale and be up across the world. AWS has it running in 5 of its availability zones.

How much does it cost? AWS sells by the hour, JumpCloud and Azure by the connected user. AWS might be more cost-effective if you have a lot of users or devices to connect to and if you already make use of other AWS resources.

Can you integrate with other cloud-based apps? Azure comes with integrations for Salesforce.com, Box, and hundreds of other apps. If you are looking for a cloud-based single sign-on tool, you might consider what they have as a good start. AWS is more focused on integrating with its own cloud-based offerings. JumpCloud is more about migrating LDAP to the cloud.

Can you make use of multifactor authentication? This is useful if you want to provide for additional authentication security, such as with a one-time password. Both AWS and Azure offer this, with an extra charge with Azure.

If you own a Lenovo PC, read this asap!

Lenovo has been shipping its PCs with built-in malware that is a new level of insidiousness and nasty. Before I explain what it does, if you have a Lenovo machine, or know someone who does, go now to this site and see what it says.

What is going on? It turns out that Lenovo, either by design or by sheer stupidity, has included a piece of software called a root certificate, from this company Superfish. Now, if you aren’t a computer expert, this is probably meaningless to you. So let me break it down. With this Superfish certificate, every site that you go to in your browser using the HTTPS protocol is subject to being exploited by some bad guys. Chances are, it may not happen to you.

In any case, you want to remove this thing pronto. Here are the instructions from Lenovo.

Back in those innocent days of the early Web, we use to say add the S for security when you were browsing. This forces an encrypted connection between you and the website that you are visiting, so your traffic over the Internet can’t be captured and exploited.

But having a bad certificate turns this completely around: with it, you can decrypt this traffic, indeed, you can manipulate the web browsing session in such a way that you might not even realize that you are going to ThievesRUs.com instead of your trusted BankofWhatever.com. While no one has yet reported that this has happened, it is only a matter of time. There is a great article explaining this exploit on ArsTechnica here.

Certificates are the basic underpinnings of secure infrastructure, they are used in numerous other situations where you want to make sure that someone is who they say they are. By using a bad certificate, such as the one from Superfish, you throw all that infrastructure into disarray.

certs2To get an idea of how many certs you use in your daily life, open up your browser’s preferences page and click on over to the Certs section, there you will dozens if not hundreds of suppliers. (see screenshot at left)  Do you really trust all of them? You probably never heard of most of them. On my list, there are certs from the governments of Japan and China, among hundreds of others. You really have no way of knowing which of these are fishy, or even superfishy.

This isn’t the first time that bad certs have popped on on the Intertubes. There have been other situations where malware authors have signed their code with legit certs, which kinda defeats the whole purpose of them. And back in 2012, Microsoft certificates were used to sign the Flame malware; the software vendor had to issue emergency instructions on how to revoke the certs. And in 2011, the Comodo Group had issued bogus certs so that common destinations could have been compromised.

It is getting harder to keep track of stuff and stay ahead of the bad guys, even when they don’t have the auspices of a major PC manufacturer behind them.

Ricoh WorkIntelligently blog

I wrote a series of posts for this corporate blog in 2014-5. The site has been taken down but here are links to my stories. Note that some of this information is outdated or been eclipsed by events.

Network World: Uptime simplifies system and server monitoring

uptimeServer and systems management tools have long been too expensive and too complex to actually use without spending thousands of dollars on consultants. Uptime Software has been trying to change that with a product that can be installed and useful within an hour. I tested the latest version (7.3.1) on a small network of Windows physical and virtual machines in a review that was published on Network World today. 

The screenshot above is an example of Uptime’s dashboard, and is filled with all sorts of actionable information, and is completely customizable.

Masergy blog: How Cloud Computing Changes the Role of IT

We are experiencing a significant shift in how corporate IT departments deliver services to the business in this era of cloud computing. IT staffs are evolving beyond installing servers and software towards provisioning services, negotiating vendor relationships and collaborating with business users on application service delivery requirements.

I have some thoughts on what this means for IT staffs, skills and the resulting networking mix for Masergy, a broadband communications management vendor.

You can read my post on their blog here.