Académique Documents
Professionnel Documents
Culture Documents
M A G A Z I N E
F O R
T H E
I T
P R O F E S S I O N A L
WINTER 2011
FIT FOR
iT
bcs.org/itnow
T
I
F
FOR IT
INFORMATION SECURITY
06
10
12
14
16
19
26
28
30
32
34
BAKED IN SECURITY
SECURE SOFTWARE
WAR ON CYBERCRIME
DEVILS IN THE MICROCODE
MALWARE RESPONSE
THE REST
HEALTH INFORMATICS
54
55
56
58
59
60
62
64
66
LEGAL
GAMING
HEROINES OF IT
BEST OF THE BLOGS
COMPUTER JOURNAL
BOOK REVIEWS
COMPUTER ARTS
PCG VIEW
LEFT OF INSIDE BACK COVER
EDITORIAL TEAM
Henry Tucker Editor-in-Chief
Justin Richards Multimedia Editor
Brian Runciman Publisher
PRODUCTION
Florence Leroy Production Manager
Advertising
E chris.bean@tenalps.com
T +44 (0) 20 7878 2415
Keep in touch
Contributions are welcome for
consideration. Please email:
editorialteam@hq.bcs.org.uk
ITNOW is the membership magazine of
BCS, The Chartered Institute for IT.
It is sent to a wide variety of IT
professionals, from systems developers
to directors, consultants to training and
education specialists. A subscription to
ITNOW comprises four issues.
MEMBER NEWS
THE IT AWARDS
WINNERS ARE...
AGM 2012
BCSs 2012 annual general meeting
will take place on 14 March at the BCS
London office, starting at 2pm.
In January 2012 Professional
Members will receive details of how to
vote at the 2012 AGM. All Professional
Members will continue to be given a
choice of how they vote, online or on
paper. However, to vote by post you will
need to opt-in during January 2012.
If BCS does not hold a valid email
address for you, you will receive a
postal voting pack. Look out for an
email from the Electoral Reform
Services with more details.
Please ensure we have current
contact details for you by logging into
the Members Area.
www.bcs.org/agm
MEMBERNEWS
MEMBER
BENEFITS
Save time and money with
new, extra member benefits.
BATTLE OF THE
MILIBANDS
The winners of the fourth annual MP Web Awards have been
announced at a special event in the House of Commons.
David Miliband, MP has won the Social
Media category in the BCS MP Web Awards
2011 run by BCS, The Chartered for IT,
narrowly defeating his brother, Labour
leader Ed Miliband, MP.
Hosted by the Rt Hon Alun Michael
MP, the awards were presented during a
reception at the House of Commons on 23
November.
The standard for this years social
media award was exceptionally high and
there was a marked improvement by MPs
using social media to engage with their
constituents in a two-way conversation,
said David Clarke, MBE, CEO of BCS.
We are delighted that David Miliband
has won this award. His use of social
media is well integrated across his website
and our judges felt Davids diverse use of
social media made him a clear winner.
Narrow margin
Other finalists in the MP Web Award for
social media included Labour Leader Ed
Miliband, MP for Doncaster North, and
James Morris, MP for Halesowen and
05
FIGHTING
FOR IT
FIT
This issues focus looks at how fit we are for
IT, from a UK perspective with the teaching of
computer science in schools and the role of
professional bodies, to the personal perspective of
the entrepreneurial spirit and what it takes to do
some big IT roles. Its about careers and skills.
06
07
STRESS
IN PROJECT MANAGEMENT
09
THE FUTURE OF
COMPUTER SCIENCE
IN SCHOOLS
What next?
The panel agreed that computer science
should be an option in the science part
of STEM and that education needs to be
reformed in schools and universities.
Computer science needs to be seen as an
essential discipline and on the school
curriculum from early stages.
Bill Mitchell concluded: Every child
should be experiencing computing
throughout their school life, starting at
primary school, through to age 16, even
18.
11
THE RELEVANCE OF
PROFESSIONAL
BODIES
doi:10.1093/itnow/bwr051 2011 The British Computer Society
12
business picture.
Sustained investment in people is
needed. A professional body that promotes
lifelong learning can support the right
person for decades.
We all believe in a blend of experience
and qualifications, so what should a person
who belongs to professional body bring to
an organisation? Is it tangible?
Simon: Its tangible experience that
would not have been gained in that role
alone; engaging with their peer group;
understanding at a more fundamental level
the parts of their role. And qualifications
cover basics that need to be covered, so
issues.
Simon: A professional body can help
move the IT mindset from a technical to
So are professional bodies still relevant? a business perspective, which is a huge
Professional bodies are even more important opportunity for BCS.
now, says Simon, especially for CIOs, as
Christine The days of trust me, Im a
the role is moving so quickly. They need
professional are gone. But bodies can give
help to stay ahead of curve and profesthe public confidence. The public duty of
sional bodies help there.
care is part of a professional bodys remit.
A professional body is always changing
Codes of conduct and ethics frameworks
and that is helpful for a member. For
are a very important function.
CIPD, says Christine, 135,000 members
represent a collective brainpower the
The tipping point
added value of support. You can find
The building blocks are in place for IT to be
lessons from your peer group and bring it
recognised as a profession. So what do we
back into the business.
need to do to get to the tipping point?
A professional body can be a friend it
Simon: Its not about driving recruitment
hones feedback, which is really important, companies to insist on membership, but
adds Richard.
to make sure individuals see value in
membership, so it becomes a de-facto
Yet recruit adverts dont often feature
requirement. Theres a lot of space to
professional body membership as a
communicate the benefits of membership
requirement. Is that a problem? What can more widely to demonstrate that this is
be done?
not a dry area.
Richard: Im not too concerned. There are
Richard: Sometimes bodies come
desirable experiences and expertise, that
across as staid. But in ARM, IT is viewed as
membership requires, but we also want
fun, meaningful and interesting and that
creativity, so making membership a mustneeds to be reflected by BCS. A sense of
have could exclude good people. But
fun, interest, care and responsibility.
membership of a body is desirable, and
suggests that people can add value to an
The full video is at www.bcs.org/video
organisation.
December 2011 ITNOW
13
DO IT
YOURSELF?
GENOME MAPPING
With the increase in the seriousness
and utility of what can be derived
from genomics, getting the approach
right has implications for all of us.
The life sciences require very
computer intensive applications.
Demands in the testing environment
have led some to set up in-house
operations to address this need, but
often these self-made server farms
are unsupported.
This complication, taken in tandem
with the fact that reducing time taken
to develop a drug can reduce costs
by 300 million with better computer
modelling (meaning less time being
wasted at the clinical trial end) has
led to Constellation Technologies
cloud computing service.
Data from a sequenced human
genome is used to determine new
targeted therapy treatments, i.e.
medicines that work for ones own
genome. Constellations software
as a service can turn large amounts
of data into economically and
socially important information with
the potential to lead to life saving/
enhancing medicines.
Constellation Technologies is a UK
based high technology start up using
technology and expertise developed
as part the UKs particle physics
research programme. Based at the
Rutherford Appleton Laboratories
near Harwell, Oxfordshire, the
company also uses, when necessary,
technologies and expertise developed
under the European particle physics
programme at CERN, Geneva. Its
clients include some of the largest
pharmaceutical companies. The other
consortium members are Microsoft,
Active Web Solutions and STFC.
15
GREAT CIO
The BCS and Computing UK IT
Industry Awards took place on
10 November 2011. Some of the
finalists in the CIO of the Year
category, and the eventual
winner, give an insight into
their careers and the achievements that have brought them
this far.
Best advice?
A previous mentor suggested I attend
London Business School to do a corporate
finance course so that gave me a good
understanding of how business works
from a corporate and financial
perspective.
Youve got to have a good technology
background, but youve also got to
understand how the business works.
Youve got to be able to describe the
technology and solutions in a way that
business people understand them and
show the link between technology and
what the business outcomes are.
Biggest achievement?
Creating a new platform, so we can win
new work. Weve come from being behind
our competitors to winning work because
of our technology.
Biggest achievement?
For the last five years Ive been working
in the NHS and the focus that comes from
making something better for a clinician or
nurse is phenomenally rewarding.
One of the big biggest achievements in
the last couple of years was that I inherited
17
BIG JOBS 2
What online resources are valuable in
your area?
There is a phenomenal amount of online
resource available in such a wide range
of areas too, it would be impossible to list
them all. Sites like support.microsoft.com
and experts-exchange.com are invaluable
resources for people in IT providing
technical support. Google alone can be such
a powerful tool too. Outside of that are the
various industry bodies, of which BCS is one,
which will help you advance your career by
providing the resource and help needed.
ONLINE
WELLBEING
FOR CHILDREN
19
Privacy settings
Should privacy on social networking sites
be set at the highest level by default to
help protect all users?
Privacy settings are vital, says Jeremy,
but behaviour is equally important.
Social networking can have a competitive
element to it the number of friends or
followers children have. This can lead to
foregoing privacy.
Social networking is based on sharing
and being open so expecting sites to
automatically set privacy at the highest
level is unlikely and in many ways going
against the philosophy of the idea. Its
also not just about Facebook. Theres also
Twitter, uploading photos to Flicker and so
on. Even iTunes has an age limit of 13.
So how rigorously should we enforce
age limits on social networks?
Dave: There are 194 countries in
the world and they all have differing
legislation. Over the last few years its
changed. Five years ago there was a fixed
PC, in a public room, but now networking
is on games consoles, smartphones and
the like its broken the fixed idea. At
school age there has to be a conversation
between the parents and children about
this rather like the sex conversation. At
that point you can share in the positives
and find out how children use technology
and celebrate the creativity. Then discuss,
secondarily, risks and security at a level
relevant to their age.
How can we simplify privacy policies for
young people?
Alan: I dont think we can. But they can
understand what they are putting online
and that what they are doing has some
parameters.
Dave: The different platforms do
RESOURCES
BCS has launched e-safety, a Level
1 qualification that maps to parts of
the National Curriculum for PSHCE Personal Wellbeing, Citizenship, ICT
and Every Child Matters.
It aims to help teachers raise
the issue of online safety with their
students and covers the potential
risks associated with being online,
how to protect yourself and your
personal information online, as
well as how to behave responsibly
and within the law whilst using the
internet.
Information is at www.bcs.org/
category/14422 The full video is at:
www.bcs.org/careers
Risks and safety on the internet:
The perspective of European
children. Livingstone et al:
www.eukidsonline.net
A PDF of the survey results is
available from The i in online :
www.chis.org.uk/file_download/49
Stephen Carrick-Davies piece:
www.guardian.co.uk/society/
joepublic/2011/jul/19/mobilephones-young-people-vulnerablethree-rs
21
THE FATE OF
EMPIRES
BCS, The Chartered Institute for
IT, recently responded to the
HEFCE teaching funding and
student number controls
consultation. Parts of this
response follow, the full report
is available via:
BCS RESPONSE
23
BIG JOBS 3, 4, 5
Kevin Johns
Head of Professional Services, BT Global
Services UK
Brief description
Responsible for the development and
delivery of consulting and professional
services to BT Global Services UK clients
across private and public sectors.
Type of organisation
B2B IT and telecommunications
outsourcing and managed services.
What do you love about your job?
Our customers the opportunities and
challenges that our customers face across
their various industries fascinate me and I
relish finding ways in which IT and
telecommunications can help them.
Kate Craig-Wood
Chief Executive,
Entrepreneur
Managing Director,
Entrepreneur
www.bcs.org/content/conWebDoc/41427
INFORMATION SECURITY
SECURE
SOFTWARE
Welcome to Information Security Now (ISNOW) in its new home in ITNOW. Since security and IT
are often inseparable neither should be ignored, says Gareth Niblett chair of BCS ISSG.
Tier 1 risk
In 2010, the UK National Security Strategy
identified 15 priority risks, including a Tier
1 risk of hostile attacks upon UK cyber
space, potential shortcomings in the UKs
cyber infrastructure and the actions of
cyber terrorists and criminals: reduction of
this risk is inherently linked to
improving software security, dependability
and resilience.
The Software Security, Dependability
and Resilience Initiative (SSDRI
www.ssdri.org.uk/), which is a UK
FURTHERINFORMATION
25
BAKED IN
SECURITY
Ian Bryant, Technical Director at the Software Security, Dependability and Resilience Initiative
(SSDRI), explains some of the challenges involved in securing software.
At first sight, it would be easy to assume
that we understand what we mean by the
term software: it is the element of
information and communications technology
that sits between physical hardware and
what is often referred to as the wetware
(the human operator).
But this boundary is becoming
increasingly blurred, with hardware
such as field-programmable gate arrays
and integrated circuits being designed
using VHDL (VHSIC hardware description
language), and autonomic systems being
developed which mean software processes
are taking on roles previously carried out
by human operators.
And the degree on which we as a society
rely on IT, and software, is growing all the
time. It is difficult to conceive of any major
sector of the economy in the developed
world that is not dependent, often critically
so, on IT and software. This dependence
extends into our private lives, with figures
for the UK in October 2011 showing that
26
control systems;
the pressure for IT consolidation for
energy efficiency (the low carbon
imperative), relying on software
virtualisation.
INFORMATION SECURITY
education sector;
awareness for all specifiers,
producers and consumers.
Independent verification
For market segments where a degree
of assurance as to software security,
dependability and resilience is desirable,
independent verification is a preferred
technique. Yet this is only currently
adopted in niche communities such as
safety and security, and is typically
targeted as high assurance needs. Initial
stakeholder feedback is that a widely
applicable independent black box
testing approach is also needed for due
diligence needs.
International collaboration
Although there should be measurable
benefits from national level initiatives
to genuinely improve software security,
dependability and resilience the
challenges implicit in globalisation of
the supply chain cannot be ignored. A
need for international collaboration is
therefore implicit, and SSDRI is engaged
with European, North American and
Australasian partners to explore how
this can be achieved.
Standards contribution
Noting Henry Fords maxim that
Standardisation can be thought of as
the best that you know today, but which
is to be improved tomorrow, and that
standards have a market-shaping effect,
it is highly desirable that approaches
established by SSDRI and international
partners be formalised through a widely
recognised standards development
organisation such as ISO/IEC.
Further information on SSDRI can be
found at www.ssdri.org.uk, or through
Dr Adele-Louise Carter and the BCS
Security Community of Expertise, which
provides the link to SSDRI from the
Institute.
www.bcs.org/security
27
N
IS
E
R
A
W
W
T
F
?
O
E
S
R
U
HY
C
E
S
Why ?
I always like to come at things from a
different angle, so rather than focus on the
difficulties of software development and
technical challenges, differing operating
systems and compilation conundrums,
which are of the utmost importance I
offer you.
Humans make mistakes
I am sure as you read this you are straight
away thinking, thats a bit nave, of course
they obviously do and a coder may make a
mistake when writing many lines of code.
That is true, but how many mistakes are
more importantly made in the conceptual
phase. On the project drawing board, or in
the perception of risk vs. reward as a
solution is under preparation.
28
29
THE WAR ON
CYBER
CRIME
Charlotte Walker-Osborn, Partner and Head of TMT Sector, and Jonathan Price, Associate Solicitor,
Eversheds LLP discuss the issue of tackling cybercrime.
A major international two-day
conference took place in London at the
start of November aimed at improving
global coordination of efforts to
combat the threat of cybercrime,
estimated by GCHQ to cost 600
billion annually worldwide. The London
Conference on Cyberspace was attended
by senior politicians from around the
world, including UK Prime Minister David
Cameron and Foreign Secretary William
Hague, as well as representatives of
leading IT industry players such as Cisco
and Facebook.
As the conference got underway,
opinions seemed to be divided on the best
course of action and whether government
intervention is part of the solution or part
of the problem. Some delegates advocate
a full-blown international treaty while
others (including Britain) prefer a less
30
trend of significantly escalating cybercrime globally in the last six years. Highprofile attacks have taken place in recent
months against the computer systems of
the Foreign Office and other government
departments. The frequency and
seriousness of such incidents have
prompted the UK government to pledge
an extra 650 million towards countering
cybercrime in the next four years.
Reports suggest that many such attacks
originate from Russia and China and the
international nature of these attacks is a
very common feature. The international
dimension can make cybercrime
extremely difficult to tackle and
necessitates a much more coordinated
international approach.
Despite criminal legislation in the UK
and many other jurisdictions, a question
remains as to the success of international
INFORMATION SECURITY
Cybertheft
There are clearly very important business
reasons to protect confidential
information and intellectual property
against such attempted cybertheft. There
are also numerous statutory and
regulatory requirements that oblige
organisations to take steps to ensure
protection of information and security of
computer systems.
For example, online retailers are often
required to comply with the Payment
Card Industry Data Security Standards
in respect of payment card details. In
addition, of course, the UK Data Protection
Act 1998 requires organisations to take
steps to safeguard individuals personal
information by having in place appropriate
technical and organisational measures
to protect personal information from
unauthorised use.
In the UK, as many of you will know, the
main law dealing with computer crime is
the Computer Misuse Act (CMA), which was
updated in 2006 by the Police and Justice
Act to better address current technologies.
Many types of cybercrime are likely to be
caught by some of the offences set out
in that Act; for example people who post
malware or distribute passwords on the
internet with a reckless disregard for its
31
THE
IS IN THE
DEVIL
MICROCODE
32
INFORMATION SECURITY
FURTHER RESOURCES
Microsofts guide to writing secure
code http://msdn.microsoft.com/
en-us/security/aa570401
Tools for static code analysis http://
en.wikipedia.org/wiki/List_of_tools_
for_static_code_analysis
OWASP testing guide https://www.
owasp.org/index.php/Appendix_A:_
Testing_Tools
Ruby on rails security guide
www.rorsecurity.info/
Open source testing tools
www.opensourcetesting.org/security.
php
33
MALWARE
RESPONSE
34
INFORMATION SECURITY
35
INFORMATION SECURITY
36
BCS, The Chartered Institute for IT, is the business name of The British Computer Society
(Registered charity no. 292786) 2011
MTG/AD/1100/1011
01129/P/AD/1111
Thats why weve aligned our certification portfolio to our IT skills and competency framework,
SFIAplus, and our membership grades and services so you benefit from additional career
development and support to help you achieve your professional goals.
ALL
CHANGE
When it comes to making secure software, John Mitchell believes it is more of an issue of change
management than anything else.
Software integrity is a security issue and
as such should fall in the CIAC domains
of confidentiality, integrity, availability and
compliance. Although we are primarily
interested in the capability of software to
do exactly and only what it is specified to
do, we ensure its integrity by having
excellent confidentiality, availability and
compliance processes in place or at
least we should have. I suspect that most
software integrity issues are not caused
maliciously, but are as a result of poor
change management processes. However,
poor change management does provide
an opening for malicious manipulation,
so, with my audit hat on I will attempt to
explain where I believe the main issues to
be.
Firstly, and most importantly, the
majority of change management
processes are based on trust. Trust in
the programmer to correctly make the
requested change; trust in the systems
people to adequately test the change and
trust in the user to accept the change after
suitable testing. Unfortunately, trust is not
a control mechanism, but an act of faith.
If you dont believe me, then please send
me a signed cheque made out to me with
a blank amount. I promise, not to insert a
large amount, nor to submit the cheque
for clearing. It will be interesting to see
how trusting you are by the number of
such cheques I receive. The problem with
trust is that you only find out that it is
misplaced after the event, so it is a pretty
useless prevention mechanism. Testing
is actually a trust substitute. You dont
really trust the programmer to get it right
so you go into detection mode via a test
mechanism. Now this is all well and good,
but unfortunately most test mechanisms
centre on the authorised change. If the
programmer inserts some other code at
the same time as the authorised change,
then the chances of it being detected
1. receive authorised change request;
2. security officer (or equivalent)
retrieves digitally signed source code
from once write-only media held in an
off-line store;
3. source code is made available to the
programmer;
4. programmer makes change, produces
executable and tests it;
5. programmer returns amended source
to the security officer;
6. security officer does an electronic
compare between original and
amended sources;
7. another programmer compares the
code changes against the change
request;
8. assuming that no illicit code is detected
by (7), then the security officer
produces a digitally signed executable
and promotes it to production;
9. the security officer stores a copy of
the amended source and executable
(both digitally signed) onto once writeonly media into the off-line store
mentioned in (2) above;
10. every time the program is now
executed its signature is checked;
11. on a regular schedule the production
executable is automatically compared
with the copy from the off-line store
to detect any really sneaky
manipulation of the production code
and signature.
www.bcs.org/security
39
GONG
CERFING
40
INTERVIEW
VINTON G. CERF
Wikipedia: Vint Cerf is known as one of
the fathers of the internet, sharing this
title with American computer scientist
Bob Kahn. In the early days, Cerf was
a program manager for the United
States Department of Defense Advanced
Research Projects Agency (DARPA)
funding various groups to develop TCP/
IP technology.
41
INTERPLANETARY INTERNET
Hows the interplanetary internet going?
At JPL we started out using TCP/IP and
they work just as well on Mars as on
Earth, but between planets the speed
of light is too slow. Its 20 minutes to
Mars, so round trip times are 40
minutes. And theres disruption with
planetary movement.
So we designed disruption and delay
protocols and have been tested by the
US military and here in Europe with the
support of the EC. This is very robust,
its running on the space station and
the spacecraft Deep Impact, which has
just completed a rendezvous with the
42
HEALTH INFORMATICS
DIGITISED
HEALTHCARE
With so many recent proposed changes to the NHS health care system, and so much criticism of
health informaticians from all quarters, Matthew Swindells, Chair of BCS Health, reports on how BCS
is involved with improving the standing of health informatics professionals.
In the weeks that have followed the
government announcing, yet again, the
termination of the National Programme for
IT, health care informatics professionals
have asked me whether informatics has
failed in the NHS and where the
profession goes from here. My answer has
been that far from failing, informaticians
have a great deal to be proud of and that
the NHS needs the information and IT
professionals to step forward now more
than at any point in the past.
Since the government statement in
September, which was splashed in the
national press, ministers have made a
number of more nuanced statements,
reflecting BCSs policy position, (as
mapped out in our response to the
information strategy consultation), that
the national programme has had some
great achievements like the Spine and
Choose and Book, but has failed to deliver
the integrated health record vision and
it is now time to move towards a more
devolved and flexible approach.
BCS Health has continued to try
to represent the best interests of the
informatics profession, the NHS and the
public by being critical when appropriate
but positive whenever possible.
We have criticised the Department of
Health for delays in the publication of the
information strategy and for the absence
of a CIO on the NHS Commissioning Board,
43
FOR
DESIGNED
AGEING
As the world has an ever more active, aging population, developments are being made to assist people by adapting the clothing that they wear to help keep them safe.
Trends in population growth show that the
proportion of persons over the age of 65
is increasing and in the United Kingdom,
this group now comprises over 16 per
cent of the population.
Paradoxically, advances in health
care and technology compound this
demographic trend by increasing the
survival rates of clinical procedures and
illness. As a result there is an increased
burden on pension provisions, health and
social care services as well as community
and family resources.
Liam Burns and Ian Cleland of the
Smart Environments Research Group,
University of Ulster (part of the Design
for Ageing Well Consortium), explain how
smart garments could make the ageing
process easier for all of us.
It is important that persons over 65
adopt a positive lifestyle approach to
44
HEALTH INFORMATICS
Walker %
Keep me in
contact with a
group
54.2
Tell me where my
group members
are
26.2
Keep me warm
88.1
Cool me
71.4
Help me navigate
54.8
52.4
Protect me if I fall
50
Tell me if I overexercise
4.8
Tell me distance
covered so far
54.8
Tell me where
the nearest bus
stop is
23.8
38.1
Monitor my health
16.7
Interact with my
mobile phone
35.7
Interact with my
portable music
player
2.4
References
1. Design for Ageing Well is funded by New
Dynamics of Ageing Research Programme,
www.newdynamics.group.shef.ac.uk
2. www.shimmer-research.com
3. http://fibretronic.com
www.bcs.org/health
45
SAFETY
FIRST
While IT is transforming healthcare practices and procedures throughout the UK, a significant
proportion of the NHS relies on outdated paper-based processes. These are not just wasteful and
inefficient, they are putting lives at risk, says Dr Paul Shannon FRCA MBA, Consultant Anaesthetist,
Doncaster and Bassetlaw Hospitals NHS Foundation Trust.
Staggering numbers of people are
harmed and killed by medical errors, the
World Health Organisation said in early
2011, with mistakes having an impact on
one in ten patients. Little wonder that the
organisation is warning that patient safety is
an endemic concern.
This is not new. In 2004, the National
Patient Safety Alliance described the risks
that arise from our complex health care
system, warning evidence shows that
things will and do go wrong in the NHS;
that patients are sometimes harmed no
matter how dedicated and professional
the staff.
But while individual errors might be
found to be due to the mistakes of one
or more people, the tired doctor or the
overworked nurse, its invidious to blame
healthcare staff for the WHOs endemic
46
HEALTH INFORMATICS
www.bcs.org/health
47
MTG/AD/1113/1011
www.bcs.org/careerbooks
OPINION:
TRAINING OR
LEARNING?
49
OF THE
STAY AHEAD
CURVE
ITIL procedures have been adopted by a wide range of organisations and departments worldwide
to help enable improved skills and efficiency, quality assurance and business maturity. ILX Groups
COO, Eddie Kilkelly MBCS looks at how best to use this knowledge across the organisation to
improve the way companies work.
In todays tough economic climate,
organisations need to be increasingly
efficient with how they operate, to ensure
they dont get left behind in the storm.
We are all aware of the multitude of
business technologies that now exist
promoting increased productivity; from
document management and workflow
processes, to cloud-based applications
and back-end servers. Even smartphones
have sent the humble mobile phone to
the storage cupboard in the name of
efficiency.
A tech-savvy iWorker generation
is on the horizon whereby workforces
will begin to expect high specification
hardware, connectivity and 24-7 database
access, to allow them to work with ease
at any point in time and from all locations.
Some UK councils have installed iPads
in waste collection vehicles to help
reduce paperwork inaccuracies and
losses (1), and police officers can simply
load smartphone applications to identify
criminals on the spot (2). Technology really
is extending to all lines of work, and the
50
51
SHAKING UP
TRAINING
New research into training for enterprise resource planning (ERP) systems implementation found
that a different approach is needed to the way employees are trained to avoid potentially costly mistakes. With this in mind Christina Torrington, Optimum Technology Transfer, reports on research
conducted by Kingston Business School, which points to the fact that ERP systems are demanding a
shake up of traditional IT training methods.
doi:10.1093/itnow/bwr071 2011 The British Computer Society
53
LEGAL
infringement of their copyrights, the
applicants therefore needed to get an
order against BT (and then other ISPs).
It is hard to quantify the extent of online
copyright infringement. The court cited two
studies. One, by Ipsos MediaCAT, estimated
the overall loss from film piracy at 477
million and the overall loss from television
piracy at 58 million in the UK in 2009. A
study by Tera Consultants found that the
audio and audio-visual industries in the UK
lost almost 670 million revenues in 2008
to physical and digital piracy, significantly
more attributable to digital piracy.
WEBSITE BLOCKING
54
Infringed copyright
BT had to have actual knowledge and the
court found that BT did know that users of
Newzbin 2 infringed copyright, in particular
of the applicants copyrights, and that the
users included BT subscribers.
BT told the applicants that it did
not support or condone copyright
infringement, but to avoid business
exposure and potential liability, it required
a court order before it would block a service.
BT prefers this approach, where the
defendants have been found in breach
of copyright, rather than the approach
specified under the Digital Economy Act
2010 (an Act rushed through in the final
days of the last government).
One element of this act requires ISPs to
suspend individual users internet access
in circumstances where they are found
to be illegally downloading copyrighted
material (three strikes and out).
However, Ofcom, the UKs
communications regulator, has stated that
the procedure will not work. Meanwhile
the government has announced proposals
to legalise format shifting, that is, to allow
consumers to transfer content from CDs or
DVDs to a different format such as an iPod.
The actual judgment at http://bit.ly/
o9N0nw is interesting, as it sets out
the procedure adopted by the studio
claimants, the legal remedies available,
explains the background to the claim, the
law and the reasons for the judgment.
It shows that rights holders can prevent
proven online infringement, and have
the infringing material cut off at source.
Similar orders will be sought against the
other significant ISPs in the UK.
www.bcs.org/legal
GAMING
IN PRAISE OF
KINECT
Having been a keen gamer ever since my brother and I got a ZX Spectrum for Christmas in 1982, I am
really enjoying watching my children get the gaming bug says Henry Tucker MBCS.
All those years ago, when loading a game
meant connecting up your tape deck,
hoping you had the tape in the right
position, typing in the launch command
and then pressing play, I do remember
sitting down and playing the occasional
game of Hungry Horace with my mum, but
that was about all the gaming interaction I
had with my parents.
But then multiplayer gaming hadnt
really been invented; it would have been
impossible for two people to try and control
our famished friend when you consider all
you had was keyboard controls and how
small the Spectrums keyboard was. Then
there was the size of the TV that we used;
14-inch sets arent really very good for
single-player, let alone two-player games.
Now though gaming is very much a
living room, family-orientated past time.
With larger TVs and controllers that even
55
HEROINES
OF
TECHNOLOGY
WOMEN
57
Below are some extracts from BCS, The Chartered Institute for ITs eminent academic monthly
The Computer Journal, published with Oxford University Press.
Recognising Algorithms Using Language
Constructs, Software Metrics and Roles
of Variables: An Experiment with Sorting
Algorithms.
Ahmad Taherkhani, Ari Korhonen, Lauri
Malmi
This paper focuses on algorithm
recognition (AR) where the problem is
to recognise and classify algorithms to
obtain an abstract understanding of the
source code. The main goal is to extend
the application of program comprehension
(PC) in automatic assessment tools, and
to develop methods that can automatically
recognise algorithms from source code.
Since AR is undecidable, the problem
and the scope are reduced to a particular
group of algorithms and the matching
is not required to be exact, but simply
to be statistically reasonable. First, the
concepts of PC and AR are introduced
and compared. Then, the AR method is
introduced, based on the static analysis
of the source code using statistics of
language and software complexity metrics.
Algorithms are converted into vectors
of characteristics which are identified
and extracted from these algorithms.
These vectors are then processed by
the recognition process. This proposed
method has been applied to five commonly
used sorting algorithms and a prototype
analyser is developed to automatically
compute and convert algorithms into
characteristic vectors.
Learning data from 70 different
versions of the five sorting algorithms
was collected and passed to the analyser
and it is shown how the algorithms can be
differentiated by their characteristics. An
experiment has been carried out on all five
sorting algorithms in order to evaluate the
performance and accuracy of the method.
A total of 217 different algorithms were
tested and the results analysed.
Blind Watermarking of Colour Images
Using Karhunen-Loeve Transform Keying
Alessandro Basso, Davide Cavagnino,
Victor Pomponiu and Annamaria Vernone
Digital watermarking is an embedding of
Finally, a discussion of
security considerations
is given.
59
REVIEWS
BOOKOF
THEMONTH
Business Model
Generation
Alexander
Osterwalder & Yves
Pigneur
Wiley
288pp
ISBN
9780470876411
23.99
10/10
60
Windows Small
Business Server 2011
Administrators Companion
Charlie Russel and Sharon
Crawford
Microsoft Press
832pp
ISBN 9780735649118
45.99
10/10
Windows Small Business Server (SBS) is
available in standard and essential
editions. The authors cover the standard
edition, which is designed for small
businesses with up to 75 users.
SBS 2011 is a 64-bit architecture with
the administrative task performed within
an integrated console. The move towards
a 64-bit architecture is heavily influenced
by memory management, improved
performance, security enhancements and
capitalising on virtualisation. There are
concerns including driver issues, hardware
and software compatibilities.
Before progressing to installing SBS
the authors explore planning the network
infrastructure, surveying the business
9/10
This book is useful as an
introduction to the
official Prince2 manual
for preparation for the Prince2 examinations,
for those playing a part in Prince2 projects
and for those looking for real world examples
of using Prince2. It may also prove useful
to those who are new to project management
and looking for an off-the-shelf project
management framework, as well as those
who want a detailed understanding or
overview of Prince2 in action.
The four elements of Prince2 are
well covered. There are ten chapters,
with a chapter on each of the basics,
the principles and the processes, and a
separate chapter on each of the seven
themes. This does seem bizarre at first, but
tailoring is discussed throughout the book
8/10
The typical IT professional
finds themselves faced with
constant work demands, large amounts of
information to absorb, a constant need to
learn new things and a limited amount of
time to do it.
This constant need to take in information
as well as the desire to learn new things
results in a number of productivity books
like this one, aimed largely at the IT
professional.
The book combines a lot of good ideas
for working more productively with
ideas around using technology in a more
effective manner to manage time. The
book is not aimed at a hardcore technical
readership, but has tasks that are ranked
at easy, medium and advanced to allow
the less technical reader to use the tips
best suited to their skillset.
There are sections on controlling
9/10
This book is a guide for students to the
history of healthcare informatics, current
issues, basic concepts and management
applications.
Dee McGonigle is professor of the
Online-MSN Programme at Chamberlain
College of Nursing and Editor-in-Chief of
the Online Journal of Nursing Informatics.
Kathleen Mastrian is associate professor
and programme coordinator for nursing at
Pennsylvania State University and senior
managing editor of the online journal.
There are contributions from, mainly US,
experts but also some from the UK.
As is to be expected, reference to
national organisations, legislation, reports
and most of the examples and case studies
are specific to the US, but the principles
7/10
61
COMPUTER ARTS
gaining a Masters in Fine Art from Leeds
Metropolitan. Coming from a mixed
background, she feels she never belonged
solely in either category (painting or
multimedia) and so looks for ways to
combine both. She does admit, however, that
this approach was an unusual one among
the students when she was at university.
DIGITAL
POST-POP
Credit: It Could Be You by Marina de Stacpoole, Lambda C-type print, 36 x 49cms, 2011, copyright the
artist, reproduced with permission
Popular culture
Marina has found that it can be more
acceptable to use imagery filtered through
popular culture to get across her
critical views and passivism. An earlier
work, Childs Play (2008), used an image of
a mass-produced green plastic toy
soldier to address the relationship
between childrens toys and war (such
as the violence inherent in many computer games). Childs Play can be seen as a
descendent of Random War (1967) a
plotter print by one of the great American
computer art pioneers Charles Csuri.
Random War was a comment on the
Vietnam War and featured graphics
(drawn by Csuris own coding) depicting
toy soldiers, now in the collection of the
Victoria & Albert Museum.
Marina explains, Socio-political themes
are intrinsic to all the projects I pursue. I
am currently exploring globalisation and
disconnectedness in a hyper-real world.
This point of enquiry, emerging through
collage, asks the viewer if entertainment
as art can be radical. These raise
questions of what constitutes the natural
in a postmodern world and how much
does cultural conditioning answer for.
Marinas art works are parodies of
the times we live in, the current political
landscape of credit crunch, public sector
cuts, phone hacking, rogue-trading,
tax-dodging and the ultimate effect that
such shady goings-on have on our society.
Catherine Mason is the author of A
Computer in the Art Room: the
origins of British computer arts 1950-80.
For more information on the
computer arts including events visit:
www.computer-arts-society.org/
More about this months artist:
www.axisweb.org/seCVPG.
aspx?ARTISTID=13663
A MANAGERS
GUIDE TO IT L
AW
2nd
Edition
WEEE regulations
Freedom of information
29.99
Available online at: www.bcs.org/itlawbook and at all major booksellers and ebook suppliers
Tel: +44 (0)1793 417 440 Email: bcspublishing@hq.bcs.org.uk
BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2011
BE MASTER OF
YOUR TIME
MTG/PROM/1038/0911
ISBN 978-1-906124-75-5
10% discount for BCS members
Time management is a
learned skill, and we can all
learn from this book.
John Sadowsky author and
leadership coach
www.bcs.org/books/timemaster
Available online at: www.bcs.org/bookshop
and in all good bookshops.
Tel: +44 (0)1793 417 440
Email: bcspublishing@hq.bcs.org.uk
FRIENDS IN
HIGH PLACES
The Rt. Hon Danny Alexander, Chief Secretary to the Treasury, tells PCGs Jim Cassidy
about his respect for the UKs freelancers.
The career of the present Chief Secretary to
the Treasury has always been about scaling
new heights. Just seven years ago Danny
Alexander had one of the highest placed
jobs in Britain working for the Cairngorms
National Park in charge of selling the rugged
beauty of Britains highest mountain range.
Today he has scaled the political heights
and holds one of the loftiest positions in
Britain, but he has left behind the granite
peaks and now sits on a mountain of debt
inherited from the economic downturn in
2008.
The likeable Oxford-educated Scot has
his feet firmly on the grounds when he
looks at the challenge before the nation and
believes with a passion that freelancers
have a vital part to play.
Danny Alexander is MP for one of the
UKs biggest constituencies, Inverness,
Nairn, Badenoch and Strathspey and is seen
by many as the glue that has helped the
coalition between Conservative and Liberal
Democratic parties bond so effectively.
64
PCG
65
PUZZLE
A BCS Member has sent in our first
puzzle. No prizes, but kudos will be
given to the first one to complete it!
Hailstones
The so-called hailstone sequence of
positive integers progresses according
to the following rules:
n (even) => n / 2
n (odd) => 3n + 1
For example, a starting value of 10 will
generate the following sequence:
10, 5, 16, 8, 4, 2, 1
In this case the sequence contains 7
terms; and, according to the Collatz
conjecture, will always reach 1.
Challenge: Write a program to calculate
the mean sequence length for all
starting values under 100,000. Answer
in the next issue of ITNOW
xkcd
www.openuniversity.co.uk/bcs
corporate-enquiries@open.ac.uk
0845 366 6053
Quote: LANAAB
INSPIRING LEARNING
The Open University is incorporated by Royal Charter (RC 000391), an exempt charity in England and Wales and a charity registered in Scotland (SC 038302).
RecognITion
Chartered IT Professional
status (CITP) sets you apart,
demonstrating that you possess
the knowledge, expertise,
business skills and dedication so
vital to the modern IT profession.
Apply for Chartered IT
Professional status today
The benchmark of IT excellence
www.bcs.org/citp