Skip to main content

Computer Science (CS) and Information Technology (IT): Part 2

Are they one and the same thing?
Terry Critchley

Part 1 of this blog dealt briefly with the differences between CS and IT in their applicability to computing needs in today's workplace. This was the reason I developed a list of topic names, which represent the modern IT, for comparison with practically any CS course curriculum worldwide.

Start with Computer Science (CS) and Information Technology (IT): Part 1

This I expanded into a Glossary, aimed at introducing topics and indicating where simple further reading can be found, aiming it much more than a simple expansion of acronyms or 1-line description. Thus, I feel it is useful as a learning tool and a reference document.

View a sample list of Glossary topics at the Glossary link(173 pages):

I have added a small additional selection here dealing with more than just the letter "a" to show its scope and depth:

bi-modal IT

Bimodal IT is the state where organizations need two speeds of IT — often called traditional IT (business as usual) and agile IT (Gartner calls them mode-1 and mode-2). Traditional IT is focused on "doing IT right", with a strong emphasis on efficiency and safety, approval-based governance and price-for-performance.

Agile IT is focused on accelerated development and implementation, supporting prototyping and iterative development, rapid delivery, continuous and process-based methodology. Its role is to support and add value to business initiatives to generate value and/or revenue earlier that would otherwise be the case.

business continuity planning (BCP)

Sometimes used in place of BCM although some people may interpret them differently. In essence they both mean "keeping the business show on the road" when disaster strikes the IT setup and is much broader than IT disaster recovery. It includes, for example, temporary premises for displaced staff, transport activities and other non-IT considerations after the event.

Related links:
Business continuity planning
Business continuity planning steps to keep your organization running
High Availability IT Services

converged infrastructure (CI)

"Converged infrastructure, sometimes known as converged architecture, is an approach to data centre management that packages compute, networking, servers, storage and virtualization tools on a prequalified turnkey appliance. Converged systems include a toolkit of management software."

Converged infrastructure is an approach to data centre management that seeks to minimize compatibility issues between servers, storage systems and network devices while also reducing costs for cabling, cooling, power and floor space. A converged infrastructure can be implemented with a CI reference architecture, with standalone appliances or with a software driven hyper-converged approach.

A CI is the IT equivalent of an off-the-peg suit from a tailor, that is, a premade suit but not made to measure for a particular person. It is unlikely that the vendor will supply such a ready-made suit with a 50 in. chest coat and trousers of 22 in. length, unless there is big demand for such a very odd requirement or he wants to go out of business. Vendor longevity and trustworthiness are required here.

Related links:
Converged Infrastructure

DevOps

DevOps is a term emerged from the combination of Development and Operations. The role of a DevOps engineer is to automate all the operational work in the way that a developer would do. The idea is to encourage frequent releases to increase quality and get early feedback. See the entries "continuous delivery" and "continuous testing" (q.v.).

DevOps is not a technology but a way of doing things, or methodology, according to Webtorials.

"Hence, according to me [author of the article below; Nilesh Kanawade], the main two objectives of DevOps are increasing the speed and quality of the deliveries."

Related links:
DevOps Management: New Teams, New Processes
What is DevOps?
10 Things Your CIO Should Know About DevOps
DevOps Glossary

encryption algorithms

There are lots of encryption algorithms and NIST has approved some of them: Advanced Encryption Standard (AES), TripleDES, and Skipjack. On the asymmetric side, approved algorithms are DSA, RSA and ECDSA [NIST, 2013].

Related links:
AES
Triple-DES
Triple Data Encryption Algorithm (TDEA)
DSA [digital signature]
RSA
ECDSA
Skipjack
NIST Encryption Algorithm Approval Source

erasure codes

"Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces and stored across a set of different locations or storage media." [see link below]

One key point about erase coding is its ability to recover from corrupted storage faster than RAID configurations, especially involving very large data sets (databases etc.) and storage volumes.

Related links:
Erasure Coding
Erasure Codes for Storage Systems
Erasure Coding vs. RAID
Erasure Coding vs. RAID

intent based networking (IBN)

Although not a totally new concept, IBN has been pushed by Cisco as a way forward in function-effective and cost-effective networking. It is a subset of automated or even autonomic (q.v.) computing where intelligence is used to monitor and manage resources.

Related links:
What is intent based networking

There are also articles by Cisco and Gartner, the latter with risk and other cautionary factors about IBN.
Cisco DNA
FAQ

I hope I have made my "CS is not IT" point without malice and introduced the discerning reader to a source on information on "modern computing" aka "workplace IT." Until this nettle is grasped, bodies will continue to imagine that boosting CS teaching will solve the IT Skills shortage. It will not.

The UK Government has recently shelled out £ 100 m. to increase the UK "digital skills" … to academia, in the form of five Universities' CS faculties! I have asked each one of the five what their planned topics are and received one reply – they are doing 2 very specific, very narrow topics which I believe will solve little of the problem.

Hot Topics

The Latest

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ... 

In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...

In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...

In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...

In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...

Image
Broadcom

From growing reliance on FinOps teams to the increasing attention on artificial intelligence (AI), and software licensing, the Flexera 2025 State of the Cloud Report digs into how organizations are improving cloud spend efficiency, while tackling the complexities of emerging technologies ...

Computer Science (CS) and Information Technology (IT): Part 2

Are they one and the same thing?
Terry Critchley

Part 1 of this blog dealt briefly with the differences between CS and IT in their applicability to computing needs in today's workplace. This was the reason I developed a list of topic names, which represent the modern IT, for comparison with practically any CS course curriculum worldwide.

Start with Computer Science (CS) and Information Technology (IT): Part 1

This I expanded into a Glossary, aimed at introducing topics and indicating where simple further reading can be found, aiming it much more than a simple expansion of acronyms or 1-line description. Thus, I feel it is useful as a learning tool and a reference document.

View a sample list of Glossary topics at the Glossary link(173 pages):

I have added a small additional selection here dealing with more than just the letter "a" to show its scope and depth:

bi-modal IT

Bimodal IT is the state where organizations need two speeds of IT — often called traditional IT (business as usual) and agile IT (Gartner calls them mode-1 and mode-2). Traditional IT is focused on "doing IT right", with a strong emphasis on efficiency and safety, approval-based governance and price-for-performance.

Agile IT is focused on accelerated development and implementation, supporting prototyping and iterative development, rapid delivery, continuous and process-based methodology. Its role is to support and add value to business initiatives to generate value and/or revenue earlier that would otherwise be the case.

business continuity planning (BCP)

Sometimes used in place of BCM although some people may interpret them differently. In essence they both mean "keeping the business show on the road" when disaster strikes the IT setup and is much broader than IT disaster recovery. It includes, for example, temporary premises for displaced staff, transport activities and other non-IT considerations after the event.

Related links:
Business continuity planning
Business continuity planning steps to keep your organization running
High Availability IT Services

converged infrastructure (CI)

"Converged infrastructure, sometimes known as converged architecture, is an approach to data centre management that packages compute, networking, servers, storage and virtualization tools on a prequalified turnkey appliance. Converged systems include a toolkit of management software."

Converged infrastructure is an approach to data centre management that seeks to minimize compatibility issues between servers, storage systems and network devices while also reducing costs for cabling, cooling, power and floor space. A converged infrastructure can be implemented with a CI reference architecture, with standalone appliances or with a software driven hyper-converged approach.

A CI is the IT equivalent of an off-the-peg suit from a tailor, that is, a premade suit but not made to measure for a particular person. It is unlikely that the vendor will supply such a ready-made suit with a 50 in. chest coat and trousers of 22 in. length, unless there is big demand for such a very odd requirement or he wants to go out of business. Vendor longevity and trustworthiness are required here.

Related links:
Converged Infrastructure

DevOps

DevOps is a term emerged from the combination of Development and Operations. The role of a DevOps engineer is to automate all the operational work in the way that a developer would do. The idea is to encourage frequent releases to increase quality and get early feedback. See the entries "continuous delivery" and "continuous testing" (q.v.).

DevOps is not a technology but a way of doing things, or methodology, according to Webtorials.

"Hence, according to me [author of the article below; Nilesh Kanawade], the main two objectives of DevOps are increasing the speed and quality of the deliveries."

Related links:
DevOps Management: New Teams, New Processes
What is DevOps?
10 Things Your CIO Should Know About DevOps
DevOps Glossary

encryption algorithms

There are lots of encryption algorithms and NIST has approved some of them: Advanced Encryption Standard (AES), TripleDES, and Skipjack. On the asymmetric side, approved algorithms are DSA, RSA and ECDSA [NIST, 2013].

Related links:
AES
Triple-DES
Triple Data Encryption Algorithm (TDEA)
DSA [digital signature]
RSA
ECDSA
Skipjack
NIST Encryption Algorithm Approval Source

erasure codes

"Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces and stored across a set of different locations or storage media." [see link below]

One key point about erase coding is its ability to recover from corrupted storage faster than RAID configurations, especially involving very large data sets (databases etc.) and storage volumes.

Related links:
Erasure Coding
Erasure Codes for Storage Systems
Erasure Coding vs. RAID
Erasure Coding vs. RAID

intent based networking (IBN)

Although not a totally new concept, IBN has been pushed by Cisco as a way forward in function-effective and cost-effective networking. It is a subset of automated or even autonomic (q.v.) computing where intelligence is used to monitor and manage resources.

Related links:
What is intent based networking

There are also articles by Cisco and Gartner, the latter with risk and other cautionary factors about IBN.
Cisco DNA
FAQ

I hope I have made my "CS is not IT" point without malice and introduced the discerning reader to a source on information on "modern computing" aka "workplace IT." Until this nettle is grasped, bodies will continue to imagine that boosting CS teaching will solve the IT Skills shortage. It will not.

The UK Government has recently shelled out £ 100 m. to increase the UK "digital skills" … to academia, in the form of five Universities' CS faculties! I have asked each one of the five what their planned topics are and received one reply – they are doing 2 very specific, very narrow topics which I believe will solve little of the problem.

Hot Topics

The Latest

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ... 

In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...

In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...

In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...

In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...

Image
Broadcom

From growing reliance on FinOps teams to the increasing attention on artificial intelligence (AI), and software licensing, the Flexera 2025 State of the Cloud Report digs into how organizations are improving cloud spend efficiency, while tackling the complexities of emerging technologies ...