How to manage IT contractors
- 18 July, 2012 15:19
As companies ramp up projects postponed by the recession and attend to delayed maintenance, they're beginning to fill in the IT ranks -- with full-time staffers, to be sure, but also with a breed of worker who once lurked at the edges of the organization: the IT contractor.
Proponents say contract IT workers -- meaning those engaged on a temporary basis for either in-house or remote work -- allow companies large and small to access skills not currently available on staff; quickly round out project teams without a lengthy, costly hiring process; and offload routine tasks for which low cost is the primary consideration.
Jack Cullen, president of IT staffing firm Modis, says companies view contract labor as a smart way to find the exact skill set they need for as long as they need. "Employers are relying on contractors in every aspect of IT," he reports, "from network engineers to web developers to call center professionals and business analysts."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Deploying Flash in the Enterprise
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches-including hybrid storage arrays, server flash, and all-flash arrays-that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.