Welcome!

@BigDataExpo Authors: Elizabeth White, Matthew McKenna, John Basso, Liz McMillan, Christopher Harrold

Blog Feed Post

Tech Trends in 2014: Actionable Insights For Your Career

By Ryan Fahey

There are many reasons to study tech trends, but one that really hits home is to consider the impact trends may have on your career.

Intense School recently spoke with Tracy Lenzner, founder and chief executive officer of LenznerGroup, a New York-based executive search firm, about this very subject. Lenzner is a thought-leader in the enterprise security, technology risk, privacy, and compliance arenas. Drawing from her 20+ years of recruitment experience across financial services, technology, healthcare, biotech, professional services, and the Internet space, Lenzner has some interesting perspectives about top trends.

What follows is an interview in which Lenzner comments on trends in the year that was, elaborates on trends for the year that is, and provides tips on how professionals and businesses can take full advantage of the trends that will unfold in 2014.

Q: Looking back at the year that was, what were some of the more prominent tech trends of 2013?

A: Last year marked an avalanche of game changers, from physical and digital worlds fusing, to tech innovation becoming mainstream by both business and consumers. At the same time, a nascent digital ecosystem increasingly became a platform for cyber criminals and terrorists around the world. As data breaches brought the U.S. and others countries much publicized and unwanted attention, network defenses proved vulnerable to a new breed of highly targeted and sophisticated cyber-attacks.

Q: In your opinion what are the Top 5 anticipated tech trends for 2014?

A: Cyber-security is now a global concern and key risk factor across most industries and organizations. 2014 marks a decade of major shifts within the tech and cyber security industry, fueled by Big Data, mobile, cloud computing, BYOD, and interconnected communities, bringing with it exponential change, complexity, advancement and risk.

According to Gartner’s recent IT Spending Forecast in 2014, IT spending will see a modest rebound to $3.8 trillion from 2013′s 3.7 trillion. Gartner predicts key IT spending will include:

  1. Gadgets—Device spending will increase to $697 billion from $669 billion.
  2. Big Data—Data center systems spending will rise to $143 billion from $140 billion.
  3. Global enterprise software spending will reach $320 billion from $300 billion.
  4. IT services spending will increase to $963 billion, compared to $922 billion from last year.

Based on the global IT spending forecast, world events, and cyber-trends, LenznerGroup’s top five InfoSec predictions are:

I. Consumerization—The cloud is expected to grow to $121 billion by 2015. Mobility, cloud, and BYO will dominate the technology and global marketplace. Security, interoperability, and user interface will be a major focus. Devices linked to Wi-Fi will be targets for exploitation, with Android and iPhone malware expected to rise. Digital security—and privacy to follow—will provide a new metric for products and services, and a competitive advantage or disadvantage.

II. ID and access management—Global awareness of data breaches, metadata, and advanced threats will require new encryption technologies, data classification initiatives, greater compliance, and enhanced controls. As consumers and organizations move to the cloud enterprise, there will be further dependence on apps. App quality and security access will become dominant, versus the device itself. Biometrics—voice, finger, and eye—will replace traditional passwords. Third-party cloud service providers (CSP), as well as provider relationships, will be scrutinized for their ability to safeguard data.

III. Enterprise collaboration—Enterprise software systems will continue to increase worldwide. Predictive analytics, data intelligence, and monitoring systems will be a tremendous growth market within the supply chain, as will front-end and embedded security systems. Software-defined everything is moving beyond technology, as organizations apply the concept to business models, including people, structure, and data.

IV: Global frameworks—New regulations, compliance, and risk frameworks, such as the new NIST Framework, will play a key role in most organizations. There will be a move from state privacy to federal privacy law. Consumer privacy, Internet law, education, and global policy will trend in-line with EU. In the U.S and sovereign nations, there will be serious discussion about updating rules of engagement concerning cyber-warfare, global policy, and related areas.

V. New delivery models—Established and start-up organizations will race to launch a range of new products and solutions, focused in-cloud security, mobile security, advanced threat detection, advanced behavioral detection, web and app security, to name a few. Security managed services will increase significantly this year, particularly as boards and companies seek 24/7 security operations, continuous monitoring, incident response, next-gen threat capability, and enterprise-wide strategy and delivery. Security domains [will] be established, with segregated and hybrid specializations among digital security professionals … Intelligent systems, aka “The Internet of Things,” will grow and create a major shift by year-end. Internet-connected devices will hit 25 billion by 2015 and reach 50 billion by 2020, predicts Cisco Systems’ Internet Business Solutions Group.

Q: How can IT/IS professionals and businesses best take advantage of these trends?

A: Today and [for the] foreseeable future, the transformation to centric interconnected systems, coupled with an emerging and advancing threat landscape, requires a highly trained, relevant, and secure workforce to protect us from today’s challenges and tomorrow’s unknowns. Resources to effectively identify, attract, train, and retain cyber-security leadership, management, and technical workforce remain limited, and will continue to escalate and [to be] sought worldwide.

Choose an area and become an expert across multiple venues, industries, and platforms. Keep expanding your qualifications and contributions, along with your CV. Regardless of your tenure, stay relevant and keep moving forward. Here are some absolutes: Stay abreast of your industry, including trends, business-technology changes, regulations, legislation and standards; meet business and technical leaders, peers, innovators, up and comers; mentor, become certified, earn an advanced degree or license; learn new technologies as well as skills to translate, communicate, and drive initiatives; become involved in projects, committees and media; implement new programs, systems, frameworks; be an enabler vs. a dinosaur. Set your plan; create a real-time strategy and goals. Continuously learn, grow, read, speak, write, collaborate, contribute… [G]et out there to meet, greet, and network with internal and external stakeholders – both in your personal life and career. At the end of the day, work harder, play, learn diplomacy, give back, and enjoy the journey.

As Lenzner explains, 2014 promises to be quite the journey for IT/IS professionals and businesses. Whether or not it’s a positive one, however, will depend on how they adapt to, and take advantage of, the trends.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

@BigDataExpo Stories
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t. Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...