- 2008. 2008. 2008. 2008. Personnel Trends Terry Bledsoe March 31, 2008.
2008. 2008. 2008. 2008. Personnel Trends Terry Bledsoe March 31, 2008.
2008.2008.2008.2008.Personnel Trends Terry BledsoeMarch 31, 2008Terry BledsoeChief Information OfficerCatawba County Tbledsoe@CatawbaCountyNC.govhttp://www.slideshare.net/tbledsoehttp://www.linkedin.com/in/terrybledsoehttp://del.icio.us/TerryBledsoehttp://www.facebook.com/people/Terry_Bledsoe/1061492979 Terry BledsoeChief Information OfficerCatawba County What is my role? What do I do?What is the role of the Technology Department?IT Job Skills for 2008Whats hotProject management skills and certificationsSecurity experienceBusiness process understandingCommunication skills, especially writing and teaching expertiseThe ability to manage remote workers and virtual teamsWhats notSoftware development and programmingQuality assuranceTechnical certificationshttp://www.networkworld.com/etm/2007/122007-etm-jobs-matter.html Skills in highest demandVoIPUnified CommunicationsConvergenceVirtualizationSecurityIts not about PeopleSoft..What is Technology About?Its not about Programs..Its not about Email..Its not about the Internet..Its not about the Phones..Its about how they interact..What is Technology About?Its about empowerment..Its about People..Its about how they work..Systems of PeoplepartnerstrustaggregatecentralizedcollaboratorsspecializedadaptreputationSelf-organizingoutliersWeb 2.0Wikis, Blogs, Social NetworksGov 2.0Kid 2.0Citizen 2.0Are you already there and just dont know it?Voter 2.0Worker 2.0Disruptive TechnologyAre you left behind?Web 2.0, is disrupting everything. Web 2.0 is not just adding to the communication mix. It requires a completely new way of thinking Peter Debreceny, chair of the Institute for Public Relations.Is not black and white!Personnel 2.0Defining Web 2.0 Core Tenets Shared contentShared toolsUnbounded dialogueCooperate, dont controlUsers add valueImagine That!Defining Web 2.0 Perpetual Beta StateAllows for self organizing groups/ systems ( the long tail)Todays internet makes the citizen an active participant. Will government adapt to Web 2.0 by design or by default?http://www.go2web20.net/ Average Age - 43 YearsMillennialsGenerational Use of TechnologyBoomersThose who have chosen to embrace technology, use e-mail, as they are exposed to new technology, if they see value to it, they may embrace it. They still like paper.Gen XUse e-mail, text-messaging, blogs, instant-messaging, and rely on a combination of Boomer old-fashioned socializing and Millennial social networking.MillennialsIts the air they breathe. To be human = to be a digital native (for many of us, this is a paradigm shift)Generations Help Understand Web 2.0Millennials 1977 to 2000Gen X 1965 to 1976Boomers 1945 to 1964Matures Before 1945 Average Age of Catawba County Worker - 43 YearsTechnology is not a Tool for Millennials, it is the very Foundation for everything they do.Web 2.0 is a reflection of the Millennial Generation.ExternalInternal ApplicationsLinked toHardwareSoftwarePeripherals Capacity Users ???Lets hire someoneMatures (65+) are biggest audienceBoomers 2ndAge 18 34 lowest and decreasingMinorities have the lowest readershipBefore 1965 most households took 2 newspapers, now less than half of the households take 1 newspaper.Online readership growingRecruit in the newspapers and you will mainly attract the Boomersand will completely miss the Millennials EY LISTENS AND TALKS WITH COLLEGE STUDENTS ON FACEBOOKONLINE VIDEO ADS AND DESCRIPTIONS OF JOBShttp://www.careertours.com/ Digital Resumes.PortfoliosWeb PagesThumb drivesNow that you got their attention, are you ready for.???What about online applications and online assessments?........ Are you ready OLD RECRUITING METHODS WILL NOT WORK.REACH OUTDo Your Homework, Check Them OutWarning : Check With Legal!!!!!Expectations Have ChangedEmailOffice SuitesUnified CommunicationsWeb AppsSecurityPublic Records/retention/e-DiscoverySecurityAppearanceEnvironmentFLSAErgonomicsWhereOnline TrainingServicesManage Life?BLOGAre you brave enough toEmployee InformationRSS FeedsRecord of NotificationFeedback (if you want it)Important announcements like benefit enrollmentsChanges in policiesPhysical and certificate renewal remindersReminders of County EventsSecuring resources for an event/emergencyText Messaging = Powerful ToolISSUES MOVING TO THE FOREFRONTISSUES.ISSUES.ISSUES.ISSUES.The new personal computer..The simple cell phone is a relicLaptops replace desktopspersonal use / business use No Well Defined SlotsWork is an Activity, Not a PlaceOld Rules Become UnrealisticNew Tax LawsIPIP/AVLIP SurveillanceIP MonitoringIP GPS LocatingIPIPIPIPIPIPIPIPIP. What is attached to the network?What is the employee really doing?Programs?Stored Data?Government Attack Trends from 2007Government accounted for 26 percent of data breaches that could lead to identity theft.The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting , such as a USB key.www.symantec.com/ISTR2007???What about your service providers?........ Insurance/benefitsAre they carrying your employees around on a laptop?... digital picture frames http://www.economist.com/science/displaystory.cfm?story_id=10410912http://flickr.com/ http://www.digiframes.com/related/1017-4820/WiFi-Digital-Picture-Frames-Sungale-AW15B-WF.html WIFI.Shut down accountsEmailNetwork AccessPhone SystemSecure equipmentSecure data stored on remote/mobile equipmentMake sure public record files are obtainedSigned statement that all data has been returnedTerminationImplicationsRealize program and data may reside anywhere in the worldWeb 2.0 applications/concepts are here to staySkills needed in Internet application development and interactive user interfaceCollaboration the network indispensible Be careful choosing applications must be able to integrate standardsBe aware of static forms and formatsImplicationsApplicants and employees will expect more services from government onlineMust reach out to the world to get the best employeesFlexibility for all types of resumes and portfoliosRedefine work as an activity not a placeSchedules will need to be flexiblePolicies may need to changeChange is accelerating, expected life of devices and skills are unknownTermination may require new processesImplicationsGovernment records are a big source of identity threat and we must recognize that fact.Good policies and procedures are needed for all devices. Mobile devices offer additional security challenges. Mobile devices require special security training.Training in security practices needs to be ongoing.Security practices will at times be a burden but users must understand the importance.CHANGE.2008.2008.CHANGE.Be the change you want to see in the World Ghandi???Questions? 2008.2008.2008.2008.Personnel Trends Terry BledsoeMarch 31, 2008Tagged and SharedCareertours http://www.careertours.com/Catawba County http://www.catawbacountync.gov/ Symantec Government Internet Security Threat Report www.symantec.com/ISTR2007Facebook http://www.facebook.com/Google Images http://images.google.com/imgres/Linked in http://www.linkedin.com/ Mashable : 70+Tools for Job Hunting 2.0 http://mashable.com/2007/07/21/job-hunt/Springwise.comhttp://www.springwise.com/marketing_advertising/new_job_for_online_video_recru/index.phpState of the News Media http://www.stateofthenewsmedia.org/2008/narrative_newspapers_audience.php?cat=2&media=4Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.**The air they breathe Off the Grid story