Computer Science (CS) and Information Technology (IT): Part 2
Are they one and the same thing?
September 28, 2018

Terry Critchley
Author of "Making It in IT"

Share this

Part 1 of this blog dealt briefly with the differences between CS and IT in their applicability to computing needs in today's workplace. This was the reason I developed a list of topic names, which represent the modern IT, for comparison with practically any CS course curriculum worldwide.

Start with Computer Science (CS) and Information Technology (IT): Part 1

This I expanded into a Glossary, aimed at introducing topics and indicating where simple further reading can be found, aiming it much more than a simple expansion of acronyms or 1-line description. Thus, I feel it is useful as a learning tool and a reference document.

View a sample list of Glossary topics at the Glossary link(173 pages):

I have added a small additional selection here dealing with more than just the letter "a" to show its scope and depth:

bi-modal IT

Bimodal IT is the state where organizations need two speeds of IT — often called traditional IT (business as usual) and agile IT (Gartner calls them mode-1 and mode-2). Traditional IT is focused on "doing IT right", with a strong emphasis on efficiency and safety, approval-based governance and price-for-performance.

Agile IT is focused on accelerated development and implementation, supporting prototyping and iterative development, rapid delivery, continuous and process-based methodology. Its role is to support and add value to business initiatives to generate value and/or revenue earlier that would otherwise be the case.

business continuity planning (BCP)

Sometimes used in place of BCM although some people may interpret them differently. In essence they both mean "keeping the business show on the road" when disaster strikes the IT setup and is much broader than IT disaster recovery. It includes, for example, temporary premises for displaced staff, transport activities and other non-IT considerations after the event.

Related links:
Business continuity planning
Business continuity planning steps to keep your organization running
High Availability IT Services

converged infrastructure (CI)

"Converged infrastructure, sometimes known as converged architecture, is an approach to data centre management that packages compute, networking, servers, storage and virtualization tools on a prequalified turnkey appliance. Converged systems include a toolkit of management software."

Converged infrastructure is an approach to data centre management that seeks to minimize compatibility issues between servers, storage systems and network devices while also reducing costs for cabling, cooling, power and floor space. A converged infrastructure can be implemented with a CI reference architecture, with standalone appliances or with a software driven hyper-converged approach.

A CI is the IT equivalent of an off-the-peg suit from a tailor, that is, a premade suit but not made to measure for a particular person. It is unlikely that the vendor will supply such a ready-made suit with a 50 in. chest coat and trousers of 22 in. length, unless there is big demand for such a very odd requirement or he wants to go out of business. Vendor longevity and trustworthiness are required here.

Related links:
Converged Infrastructure

DevOps

DevOps is a term emerged from the combination of Development and Operations. The role of a DevOps engineer is to automate all the operational work in the way that a developer would do. The idea is to encourage frequent releases to increase quality and get early feedback. See the entries "continuous delivery" and "continuous testing" (q.v.).

DevOps is not a technology but a way of doing things, or methodology, according to Webtorials.

"Hence, according to me [author of the article below; Nilesh Kanawade], the main two objectives of DevOps are increasing the speed and quality of the deliveries."

Related links:
DevOps Management: New Teams, New Processes
What is DevOps?
10 Things Your CIO Should Know About DevOps
DevOps Glossary

encryption algorithms

There are lots of encryption algorithms and NIST has approved some of them: Advanced Encryption Standard (AES), TripleDES, and Skipjack. On the asymmetric side, approved algorithms are DSA, RSA and ECDSA [NIST, 2013].

Related links:
AES
Triple-DES
Triple Data Encryption Algorithm (TDEA)
DSA [digital signature]
RSA
ECDSA
Skipjack
NIST Encryption Algorithm Approval Source

erasure codes

"Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces and stored across a set of different locations or storage media." [see link below]

One key point about erase coding is its ability to recover from corrupted storage faster than RAID configurations, especially involving very large data sets (databases etc.) and storage volumes.

Related links:
Erasure Coding
Erasure Codes for Storage Systems
Erasure Coding vs. RAID
Erasure Coding vs. RAID

intent based networking (IBN)

Although not a totally new concept, IBN has been pushed by Cisco as a way forward in function-effective and cost-effective networking. It is a subset of automated or even autonomic (q.v.) computing where intelligence is used to monitor and manage resources.

Related links:
What is intent based networking

There are also articles by Cisco and Gartner, the latter with risk and other cautionary factors about IBN.
Cisco DNA
FAQ

I hope I have made my "CS is not IT" point without malice and introduced the discerning reader to a source on information on "modern computing" aka "workplace IT." Until this nettle is grasped, bodies will continue to imagine that boosting CS teaching will solve the IT Skills shortage. It will not.

The UK Government has recently shelled out £ 100 m. to increase the UK "digital skills" … to academia, in the form of five Universities' CS faculties! I have asked each one of the five what their planned topics are and received one reply – they are doing 2 very specific, very narrow topics which I believe will solve little of the problem.

Share this

The Latest

April 18, 2019

A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77% of respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise, according to The 2019 Study on the Cyber Resilient Organization, a study conducted by the Ponemon Institute on behalf of IBM ...

April 17, 2019

People and businesses today make mistakes similar to Troy, when they get too enamored by the latest, flashiest technology. These modern Trojan Horses work through their ability to "wow" us. Cybercriminals find IoT devices an easy target because they are the cool new technology on the block ...

April 16, 2019

Software security flaws cause the majority of product vulnerabilities, according to the 2019 Security Report from Ixia's Application and Threat Intelligence (ATI) Research Center ...

April 15, 2019

The majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on — such as ERP and CRM systems — any differently than how low-value data, applications or services are secured, according to a new survey from CyberArk ...

April 12, 2019

While 97 percent of organizations are currently undertaking or planning to undertake digital transformation initiatives, integration challenges are hindering efforts for 84 percent of organizations, according to the 2019 Connectivity Benchmark Report from MuleSoft ...

April 11, 2019

Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient, according to The State of Public Cloud Monitoring, a report sponsored by Ixia ...

April 10, 2019

Without improvement in time and budget constraints, the majority of tech pros (75 percent) say they will be unable to confidently manage future innovations, according to IT Trends Report 2019: Skills for Tech Pros of Tomorrow, a new report from SolarWinds. This reality ultimately puts businesses at risk of performance and competitive advantage losses, making the prioritization of skills and career development for tech pros paramount ...

April 09, 2019

Tech pros have one foot grounded in today's hybrid IT realities while also setting their sights on emerging technology, according to IT Trends Report 2019: Skills for Tech Pros of Tomorrow ...

April 08, 2019

This Thursday EMA will be presenting a webinar — Automation, AI and Analytics: Reinventing ITSM — covering recent research. There were quite a few surprises. And in fact, many of the surprises indicated a yet-more-positive outlook than we expected ...

April 05, 2019

Almost three-fourths (69 percent) of organizations have plans to deploy 5G by 2020, according to a new 5G use case and adoption survey by Gartner. Organizations expect 5G networks to be mainly used for IoT communications and video, with operational efficiency being the key driver ...