Welcome!

@BigDataExpo Authors: Kevin Benedict, Liz McMillan, Pat Romanski, John Basso, Dana Gardner

Blog Feed Post

Seven Shapers Of Technology in 2013

By

future-of-internet What will our collective technological future be like in 2013? The answer, of course, depends a great deal on what actions we take to make our future.

But the answer also depends on many other factors, including mega trends that are transforming entire industries.

We recently reviewed and updated our assessments on all the IT megatrends we track at CTOvision.com, and dove deep into the hot topics of our reporting over the last year, including our research into Big Data, Cloud Computing, Cybersecurity, Analytical Tools (especially Model Enabled Analysis) and issues of Mobility (especially Mobile Risk Management).  The result has led to some interesting conclusions.

In short, we assess the year will see a continuation of a fast pace of technology delivery. We look forward to writing about disruptive technologies for the entire year.

As for the trends in 2013, we believe:

1) Big Data solutions will show a decided shift towards user-focused solutions. There is plenty of room for continued innovation on the infrastructure too, but in 2013 expect very positive developments in user facing solutions, enabling self-service analytics in degrees not seen before.

2) Enterprises will expect analytical tools that enable users to create and iterate over their own models. The state of the art of analytical tools has evolved significantly over the last 2 years but most enterprises have not kept up. Capabilities that let analysts create, modify, share and iterate over their own models, without involving developers or the IT department, will explode into enterprises today. Users will access these enterprise capabilities through a piece of software they already have on their computer– a web browser.

3) Cloud computing security will see significant enhancements due to new distributed storage solutions that disrupt old security models. There are many other factors at play in cybersecurity, and we are keenly aware that for decades every improvement in a technological approach to security has been met with counters from adversaries. But the virtues of new distributed storage methods (like those here) are powerful and can significantly improve how data is defended and backed up and accessed.

4) The “Internet of Things” will accelerate networking technologies into more household devices than most of us imagine. This will drive great functionality, but will come with security risks. You can now buy Internet connected garage door openers, front door locks and entire home automation suites, all of which can be controlled from any Internet device (and many of which can be connected to the popular Internet connector IFTTT). All also come with mobile apps. In each case we have seen that security has been given at least some consideration in these devices, but in no case have we seen what we believe to be acceptable risk. This is important for enterprise technologists since the same technologies will infiltrate the workspace.

5) Mobile Risk Management solutions aimed at mobile devices will expand their functionality and utility and will reduce risk in the world of the “Internet of Things.” As cases of unauthorized access lead to physical break-ins we believe new risk management tools and increased security will be added to these systems and 2013 will probably be the year this happens.

6) Technologists in developed countries will be expected to be experts on technological ethics. Citizens will increasingly expect us to help them think through the ethical dimensions of their choices, and businesses that want to survive will consider how their technology serves the community. This trend will be seen everywhere where policy has not kept up with technology, so this is especially important in government.

7) In 2013 software will begin to”eat” the federal contractor industry, with more cuts to contractor workforce from this factor than through budget cuts. This concept of software “eating” industries was highlighted by Marc Andreessen in an August 2011 essay titled “Why Software Is Eating The World.”  As he noted in that essay, there has been dramatic positive change in the national security world because of software. But to fed watchers it is pretty clear that this shift is about to accelerate. The accelerants of the shift in the federal space include significant downward pressure on budgets and the impact this is having on concepts the government is putting in place.  The combination of budget pressures and incredibly compelling capabilities will definitely make this a year of change in the government contracting space.  As software eats our world we will all have some decisions to make. If you want to stay mission focused, do you want to be on the side of the eater or the eaten? And if you are a technologist in the workforce do you want to align yourself with a company that has a forward thinking strategic approach to the market or one that tries to stay with old models? These are all important questions to think through.

Bottom line of all the above: Disruptive IT will disrupt this space. Brace yourself!  And stay connected to us here at CTOvision.com as we track the technologies that will be changing our world in 2013.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

@BigDataExpo Stories
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
The competitive landscape of the global cloud computing market in the healthcare industry is crowded due to the presence of a large number of players. The large number of participants has led to the fragmented nature of the market. Some of the major players operating in the global cloud computing market in the healthcare industry are Cisco Systems Inc., Carestream Health Inc., Carecloud Corp., AGFA Healthcare, IBM Corp., Cleardata Networks, Merge Healthcare Inc., Microsoft Corp., Intel Corp., an...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
"Avere Systems is a hybrid cloud solution provider. We have customers that want to use cloud storage and we have customers that want to take advantage of cloud compute," explained Rebecca Thompson, VP of Marketing at Avere Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring and assigning risk. Security requires a multi-defense approach, and an in-house team may only be able to cherry pick from the essential components. In his session at 19th Cloud Expo, Vlad Friedman, CEO/Founder o...