According to a recent guest blog on CrainsDetroit.com, the top ten manufacturing job postings in the Southeast Michigan region are related to the information technology field, including positions such as software developers, computer programmers and system analysts. The Michigan auto and parts manufacturing jobs increased by 22,500 from November 2009-12, according to University of Michigan economist Dan Grimes.
High-tech jobs within the manufacturing industry are driven by demand and evolving auto technology – mobile software applications and energy management are powered by the advances in Internet radio and lithium-ion battery-powered engines. In order to effectively and efficiently support advancements, the industry has turned to cloud computing.
Cloud computing infrastructure allows companies to pay only for the services in use, with the ability to scale up and down quickly as demand changes. Supply chain management (SCM) applications have also contributed to the need for cloud computing; the adoption rates are highest in areas of collaborative sourcing and procurement, demand planning, global trade management (GTM) and transportation management systems (TMS), according to LogisticsManagement.com.
Unfortunately, the demand for candidates with high-tech skills is being met with an insufficient talent pool in Michigan. As I wrote about in Mobile App & Manufacturing Tech Fuel Michigan & Detroit Economy, the Michigan Economic Development Corp. (MEDC) created a training program in attempt to both cultivate and fund the development of in-state students and support current manufacturing businesses, called the Michigan Advanced Technician Training Program (MAT²). Employers pay a student’s tuition while they work and attend school with work contracts in place after graduation.
In addition to the auto industry, e-commerce and banking are also in need of tech-related talent in Michigan. Mobile banking allows users to access their banking services with their mobile devices, and online payments are the basis of the ecommerce industry. Even traditional retail is moving to mobile payments that allow consumers to check out with their devices, expediting the sales cycle and catering to consumer comfort. However, as these industries process, collect and store credit cardholder data, they also need to achieve PCI DSS compliance, the industry standards that dictate the security measures required to protect consumer information. Read our PCI Compliant Hosting white paper for more on PCI compliance with hosting providers.
As healthcare goes digital, the demand for tech skills increases as well. The government has incentivized the switch from paper medical records to electronic systems, allowing for health data exchange, patient-access portals, remote access via mobile devices, and more. While the cloud can support storage-intensive needs, such as that demanded by medical imaging, HIPAA compliance is a concern for those that must secure patient data. Read more about secure HIPAA compliant clouds and hosting in our HIPAA Compliant Hosting white paper.
Find out more about how cloud computing plays a role in the tech industry job growth:
Can a Private Cloud Benefit My Business? Private Cloud Computing Explanation, Benefits & Recommendations
Yan Ness, co-CEO of Online Tech, explains the benefits of private cloud hosting and his recommendations for other CEO’s thinking about moving to the cloud. … Continue reading →
State of Cloud Security: Vetting Applications and Cloud Providers for Compliance and Security
The latest report from the Ponemon Institute, located in Traverse City, Michigan, sought to analyze trends in cloud computing security among organizations that use software as a service (SaaS) and infrastructure as a service (IaaS). Only half of organizations are … Continue reading →
Tackling PCI Compliance Challenges in the Cloud
In addition to defining PCI cloud hosting providers’ roles and responsibilities when it comes to achieving compliance in conjunction with clients/merchants, the recently released PCI DSS Cloud Computing Guidelines from the PCI Security Standards Council, also covers a few examples … Continue reading →