{"id":157,"date":"2011-01-28T07:30:57","date_gmt":"2011-01-28T12:30:57","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=157"},"modified":"2011-01-28T07:41:54","modified_gmt":"2011-01-28T12:41:54","slug":"the-changing-face-of-the-it-tech","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2011\/01\/the-changing-face-of-the-it-tech\/","title":{"rendered":"The Changing Face of the IT Tech"},"content":{"rendered":"
For those of us who have worked in organisations with IT Techs on staff, we tend to have a grudging respect for them. We are thrilled they are around to solve our IT problem, and to perform system maintenance activities at times convenient to us. On the other hand, we are somewhat suspicious about all the time they sometime seem to have on their hands \u2013 to play solitaire, download music and movies, etc. However, times have been changing, even in the Caribbean, and the role of the IT Tech is not what is used to be.<\/em><\/p>\n With the continuing advancement and convergence of computing, networking and telecoms, the role of the IT (or perhaps now ICT) Technician has been changing. The term \u201cIT Tech\u201d is used here in a generic sense to represent the broad range of positions, expertise and functions, and to persons working in-house and in an outsourced capacity. Nevertheless, in the past, IT personnel were often regulated to obscure and cramped back offices, usually stealing space in the server or telecoms room. Their primary purpose was seen as facilitating the work of other employees. As a result, their workdays frequently revolved around servicing and repairing equipment, installing and upgrading software, and attending to ad hoc malfunctions experienced by other staff members. Now, this is not often the case.<\/p>\n Considerably less focus on equipment repair and maintenance.<\/strong> The drastically decreasing price of computing and electronic devices has made equipment repair less cost effective. For example, the price of a new motherboard, sound card or hard drive can rival the price of a brand new desktop PC. It is usually cheaper to purchase and replace a defective piece of equipment than it is to repair it, or even to replace a faulty component. \u00a0Consequently, the hours or even days that the Tech used to spend troubleshooting and trying to rectify equipment problems have been whittled down to practically no time. The objective now is simply to determine the source of the failure and to have all systems restored to normal operation as soon and as efficiently as possible.<\/p>\n Greater involvement in operations and strategy.<\/strong> The ease and capability with which information can be shared and updated over networks and over the Internet has had a significant impact on business processes and productivity. Additionally, the importance of information and our ability to access and protect it have become critical considerations in today\u2019s world. To that end, Techs have become integral to the operations and strategy aspects of organisations. Increasingly, they are being invited into management circles to discuss matters such as productivity, efficiency and optimisation, and the role that the organisation\u2019s computing and communications systems can play to realise its objectives.<\/p>\n More data security responsibility.<\/strong> Coupled with our increasing dependence on information networks, the infrastructure in which data is stored and transmitted is subject to a broad range of threats. Within organisations there is a considerable and growing emphasis on network and data protection and security. In many respects, this task, of ensuring adequate security and redundancy in voice and data networks, has become one of the primary duties of the modern Tech.<\/p>\n Broader knowledgebase required.<\/strong> In recent years, businesses have more direct control over all of the infrastructural elements that comprise their voice and data networks.\u00a0 As a result, Techs must be increasingly aware of the equipment and technologies available in the industry. Furthermore, they should be actively keeping abreast of trends and new developments in order to better manage their organisation\u2019s risks and to promote its goals and objectives.<\/p>\n Broader skill base required.<\/strong> The IT Tech\u2019s widening duties, as per the preceding points, has also broadened the range of skills that he or she must possess. A Tech may now be required, in addition to being proficient in networking, to be able to build websites and to programme in a variety of languages. For example, it is not unusual for a Tech to be asked to build a small programme or application (such as a database), or to customise and existing one to better suit the needs of the organisation.<\/p>\n Based on these five points, the power and role of the IT Tech should not be underestimated. They have become highly valued and highly regarded, and the field is a very lucrative area for employment. Information and network security are critical considerations across all levels of the society, and is reflected most strongly in the workplace. Techs are frequently considered the chief guardians of all computing, communications and networking operations within the organisations they serve.\u00a0 However, since their expertise allows them to influence and manipulate all areas of operation within organisations, they also wield considerable control over their ultimate success and wellbeing.<\/p>\n Do you think that the role of the IT Tech still under appreciated?<\/em><\/strong><\/p>\n How have you seen the role of the IT Tech change within your workplace?<\/em><\/strong><\/p>\n __________<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":" For those of us who have worked in organisations with IT Techs on staff, we tend to have a grudging respect for them. We are thrilled they are around to solve our IT problem, and to perform system maintenance activities at times convenient to us. On the other hand, we are somewhat suspicious about all the time they sometime seem to have on their hands \u2013 to play solitaire, download music and movies, etc. However, times have been changing, even in the Caribbean, and the role of the IT Tech is not what is used to be.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[27,11,33,28],"tags":[38,39,40,35,15],"class_list":["post-157","post","type-post","status-publish","format-standard","hentry","category-computing","category-ict-tech","category-lists","category-networking","tag-data-protection","tag-equipment-security","tag-expertise-hr","tag-it","tag-trends","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-2x","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=157"}],"version-history":[{"count":14,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/157\/revisions"}],"predecessor-version":[{"id":172,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/157\/revisions\/172"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}