Click here to close now.

Welcome!

Cloud Expo Authors: Pat Romanski, Elizabeth White, William Schmarzo, Liz McMillan, Dana Gardner

Related Topics: Cloud Expo, Wireless, Microservices Journal, .NET, Web 2.0, Apache

Cloud Expo: Article

The Data Explosion. Are We Ready? (or Not)

Cloud, social, and mobile: accelerating a world of Bigger Data

Since the very beginnings of trade and commerce, it has been a commonality that most information exchange between buyer and seller, customer and business, was treated as a discrete, confidential, and almost intimate affair. Trust was earned, not given.

Consider the not so distant history of the local American bank. Banks have been collecting personal information about their customers for decades, harkening back to consultations over a notepad, paper deposit slips, and hand-written applications. The reputations of applicant and banker, buyer and seller, were local reputations, with personal and professional references limited to the confines of the community and the reality of proximity.

Banks large and small managed piecemeal, disconnected snapshots of personal information in random, unstructured, and ultimately inefficient processes that took place without fanfare over the lifetime relationship between client and local banker. "Data collection" was nowhere to be found in the strategic plan, yet banks were the recipients of valuable information regarding their clients: income, investments, payment history, business and family relationships that involved money. Most customers relied only on their local bankers to know them personally and therefore to be capable of making recommendations and offering personalized financial advice. Customer-to-computer interactions, later known as "self-service," were still a fantasy in the minds of fiction writers like George Orwell.

For over a hundred years banks stored their data locally, first in secured filing cabinets, then safes, and as time progressed, on local computers backed up centrally, just as a precaution. By and large the customer relationship and treatment of privacy was based on local proximity and personal discretion. If a breach of confidentiality occurred, it was entirely local in nature, usually involving only a handful of individuals, with minimal impact to the wider community and certainly little impact on the overall banking institution. The relationship was personal, much like the one embodied by George Bailey, the beleaguered banker in the Christmas classic film It's a Wonderful Life. But the landscape of customer information was unique also for cultural reasons and societal norms. Individuals owned their personal information, not banks. This distinction is significant given the incredibly electronic world that now surrounds us.

Today, this data scenario and concept of "confidentiality" is as outdated as the black-and-white movie. Client confidentiality is no longer parsed out in handfuls among consenting and trusting individuals with personal and community ties. Few bank customers today live in the world of George Bailey and his town full of customers he knew by their first names. In fact, it is just the opposite. This is not merely the emerging era of data exchange; it is the beginning of the largest personal data explosion the world has ever seen.

What explosion? Consider this: the average company doubles its amount of data every year, adding more data to our cyber economy than pennies in the Treasury.  Data is not the newest asset, it is the pivotal one.  And cloud computing is making that data aggregation cheaper and easier than ever, with APIs creating new capture nets across a multitude of mobile devices.

The explosion of data is also going international and isn't anywhere near over. Personal data aggregation is only expanding as more health, financial, and social information elements find their way from individuals and businesses into the "clouds" of networked computers, handheld devices, and massive data warehouses. Not only does the business and professional world know how to collect more data, it is also capable of storing it at lower and lower costs. The old days when confidentiality and personal privacy were held in trusted cocoons of discrete individual relationships are over. Data, the lubricant of automating modern commerce, is essentially loose in the digital ecosystem. It is flowing without interruption across physical and legal borders, feeding the data-hungry environment we have created.

Company reputation, personal privacy, and business risk have new meaning and unprecedented exposures. Knowing how to succeed, or fail, in such a cyber world gives cause for a better understanding of the technology blind spots, for individuals and businesses alike. But how did we get here so quickly, and have we fully evaluated the unintended consequences of our technology addiction and Internet openness?

Given that we now have the benefit of looking backward, we can see a convergence of three key forces that accelerated the data explosion: information economics, information technology, and information culture. All three factors have occurred so quickly and in such a parallel fashion that it is difficult to determine which came first or which caused the other.   Each of these factors will be discussed in sequential articles from the published book, Unseen Liability, the Irreversible Collision of Technology and Business Risk.

More Stories By Drew Bartkiewicz

Drew Bartkiewicz is founder of Apinomic, a NY agency that specializes in the business of data platforms and digital channels that leverage managed API's. As a former VP Strategy Services at Mashery, and alumnus of salesforce.com, BroadVision, and The Hartford, Drew has helped build over 25 successful data platforms (3 he founded) and was selected for several Future of the Internet initiatives with the World Economic Forum. Drew has previously founded two successful companies in NYC, CyberFactors and CloudInsure, and is often sought as a speaker and writer on technology trends and their impact on culture and business.

Drew possesses a Bachelors of Science in Aerospace Engineering from the United States Military Academy at West Point and an MBA from the Yale School of Management. He speaks four languages and is an advisor to several early stage NYC start ups. In addition to consulting brands for API Strategy, he is also the Founder of wwww.lettrs.com, the cloud platform for letters, after spending time with youth organizations, technophiles, and his kids discussing ways to elevate their impact in life through the thoughtful fusion of technology and letter writing as a timeless and necessary craft.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
Over the years, a variety of methodologies have emerged in order to overcome the challenges related to project constraints. The successful use of each methodology seems highly context-dependent. However, communication seems to be the common denominator of the many challenges that project management methodologies intend to resolve. In this respect, Information and Communication Technologies (ICTs) can be viewed as powerful tools for managing projects. Few research papers have focused on the way...
As the world moves from DevOps to NoOps, application deployment to the cloud ought to become a lot simpler. However, applications have been architected with a much tighter coupling than it needs to be which makes deployment in different environments and migration between them harder. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, Netflix and so on is at the heart of CloudFoundry – a complete developer-oriented Platform as a Service (PaaS...
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. The DevOps Summit at Cloud Expo – to be held June 3-5, 2015, at the Javits Center in New York City – will expand the DevOps community, enable a wide...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding bu...
Cloud Expo, Inc. has announced today that Andi Mann returns to DevOps Summit 2015 as Conference Chair. The 4th International DevOps Summit will take place on June 9-11, 2015, at the Javits Center in New York City. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at ...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enter...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers ...
Software Development Solution category in The 2015 American Business Awards, and will ultimately be a Gold, Silver, or Bronze Stevie® Award winner in the program. More than 3,300 nominations from organizations of all sizes and in virtually every industry were submitted this year for consideration. "We are honored to be recognized as a leader in the software development industry by the Stevie Awards judges," said Steve Brodie, CEO of Electric Cloud. "We introduced ElectricFlow and our Deploy app...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data...