Welcome!

@CloudExpo Authors: Elizabeth White, William Schmarzo, Ram Sonagara, Pat Romanski, Liz McMillan

Blog Feed Post

Seven Shapers Of Technology in 2013

By

future-of-internet What will our collective technological future be like in 2013? The answer, of course, depends a great deal on what actions we take to make our future.

But the answer also depends on many other factors, including mega trends that are transforming entire industries.

We recently reviewed and updated our assessments on all the IT megatrends we track at CTOvision.com, and dove deep into the hot topics of our reporting over the last year, including our research into Big Data, Cloud Computing, Cybersecurity, Analytical Tools (especially Model Enabled Analysis) and issues of Mobility (especially Mobile Risk Management).  The result has led to some interesting conclusions.

In short, we assess the year will see a continuation of a fast pace of technology delivery. We look forward to writing about disruptive technologies for the entire year.

As for the trends in 2013, we believe:

1) Big Data solutions will show a decided shift towards user-focused solutions. There is plenty of room for continued innovation on the infrastructure too, but in 2013 expect very positive developments in user facing solutions, enabling self-service analytics in degrees not seen before.

2) Enterprises will expect analytical tools that enable users to create and iterate over their own models. The state of the art of analytical tools has evolved significantly over the last 2 years but most enterprises have not kept up. Capabilities that let analysts create, modify, share and iterate over their own models, without involving developers or the IT department, will explode into enterprises today. Users will access these enterprise capabilities through a piece of software they already have on their computer– a web browser.

3) Cloud computing security will see significant enhancements due to new distributed storage solutions that disrupt old security models. There are many other factors at play in cybersecurity, and we are keenly aware that for decades every improvement in a technological approach to security has been met with counters from adversaries. But the virtues of new distributed storage methods (like those here) are powerful and can significantly improve how data is defended and backed up and accessed.

4) The “Internet of Things” will accelerate networking technologies into more household devices than most of us imagine. This will drive great functionality, but will come with security risks. You can now buy Internet connected garage door openers, front door locks and entire home automation suites, all of which can be controlled from any Internet device (and many of which can be connected to the popular Internet connector IFTTT). All also come with mobile apps. In each case we have seen that security has been given at least some consideration in these devices, but in no case have we seen what we believe to be acceptable risk. This is important for enterprise technologists since the same technologies will infiltrate the workspace.

5) Mobile Risk Management solutions aimed at mobile devices will expand their functionality and utility and will reduce risk in the world of the “Internet of Things.” As cases of unauthorized access lead to physical break-ins we believe new risk management tools and increased security will be added to these systems and 2013 will probably be the year this happens.

6) Technologists in developed countries will be expected to be experts on technological ethics. Citizens will increasingly expect us to help them think through the ethical dimensions of their choices, and businesses that want to survive will consider how their technology serves the community. This trend will be seen everywhere where policy has not kept up with technology, so this is especially important in government.

7) In 2013 software will begin to”eat” the federal contractor industry, with more cuts to contractor workforce from this factor than through budget cuts. This concept of software “eating” industries was highlighted by Marc Andreessen in an August 2011 essay titled “Why Software Is Eating The World.”  As he noted in that essay, there has been dramatic positive change in the national security world because of software. But to fed watchers it is pretty clear that this shift is about to accelerate. The accelerants of the shift in the federal space include significant downward pressure on budgets and the impact this is having on concepts the government is putting in place.  The combination of budget pressures and incredibly compelling capabilities will definitely make this a year of change in the government contracting space.  As software eats our world we will all have some decisions to make. If you want to stay mission focused, do you want to be on the side of the eater or the eaten? And if you are a technologist in the workforce do you want to align yourself with a company that has a forward thinking strategic approach to the market or one that tries to stay with old models? These are all important questions to think through.

Bottom line of all the above: Disruptive IT will disrupt this space. Brace yourself!  And stay connected to us here at CTOvision.com as we track the technologies that will be changing our world in 2013.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

@CloudExpo Stories
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
The competitive landscape of the global cloud computing market in the healthcare industry is crowded due to the presence of a large number of players. The large number of participants has led to the fragmented nature of the market. Some of the major players operating in the global cloud computing market in the healthcare industry are Cisco Systems Inc., Carestream Health Inc., Carecloud Corp., AGFA Healthcare, IBM Corp., Cleardata Networks, Merge Healthcare Inc., Microsoft Corp., Intel Corp., an...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
"Avere Systems is a hybrid cloud solution provider. We have customers that want to use cloud storage and we have customers that want to take advantage of cloud compute," explained Rebecca Thompson, VP of Marketing at Avere Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring and assigning risk. Security requires a multi-defense approach, and an in-house team may only be able to cherry pick from the essential components. In his session at 19th Cloud Expo, Vlad Friedman, CEO/Founder o...