Click here to close now.

Welcome!

Cloud Expo Authors: Liz McMillan, Elizabeth White, Pat Romanski, Roger Strukhoff, Yeshim Deniz

Blog Feed Post

Seven Shapers Of Technology in 2013

By

future-of-internet What will our collective technological future be like in 2013? The answer, of course, depends a great deal on what actions we take to make our future.

But the answer also depends on many other factors, including mega trends that are transforming entire industries.

We recently reviewed and updated our assessments on all the IT megatrends we track at CTOvision.com, and dove deep into the hot topics of our reporting over the last year, including our research into Big Data, Cloud Computing, Cybersecurity, Analytical Tools (especially Model Enabled Analysis) and issues of Mobility (especially Mobile Risk Management).  The result has led to some interesting conclusions.

In short, we assess the year will see a continuation of a fast pace of technology delivery. We look forward to writing about disruptive technologies for the entire year.

As for the trends in 2013, we believe:

1) Big Data solutions will show a decided shift towards user-focused solutions. There is plenty of room for continued innovation on the infrastructure too, but in 2013 expect very positive developments in user facing solutions, enabling self-service analytics in degrees not seen before.

2) Enterprises will expect analytical tools that enable users to create and iterate over their own models. The state of the art of analytical tools has evolved significantly over the last 2 years but most enterprises have not kept up. Capabilities that let analysts create, modify, share and iterate over their own models, without involving developers or the IT department, will explode into enterprises today. Users will access these enterprise capabilities through a piece of software they already have on their computer– a web browser.

3) Cloud computing security will see significant enhancements due to new distributed storage solutions that disrupt old security models. There are many other factors at play in cybersecurity, and we are keenly aware that for decades every improvement in a technological approach to security has been met with counters from adversaries. But the virtues of new distributed storage methods (like those here) are powerful and can significantly improve how data is defended and backed up and accessed.

4) The “Internet of Things” will accelerate networking technologies into more household devices than most of us imagine. This will drive great functionality, but will come with security risks. You can now buy Internet connected garage door openers, front door locks and entire home automation suites, all of which can be controlled from any Internet device (and many of which can be connected to the popular Internet connector IFTTT). All also come with mobile apps. In each case we have seen that security has been given at least some consideration in these devices, but in no case have we seen what we believe to be acceptable risk. This is important for enterprise technologists since the same technologies will infiltrate the workspace.

5) Mobile Risk Management solutions aimed at mobile devices will expand their functionality and utility and will reduce risk in the world of the “Internet of Things.” As cases of unauthorized access lead to physical break-ins we believe new risk management tools and increased security will be added to these systems and 2013 will probably be the year this happens.

6) Technologists in developed countries will be expected to be experts on technological ethics. Citizens will increasingly expect us to help them think through the ethical dimensions of their choices, and businesses that want to survive will consider how their technology serves the community. This trend will be seen everywhere where policy has not kept up with technology, so this is especially important in government.

7) In 2013 software will begin to”eat” the federal contractor industry, with more cuts to contractor workforce from this factor than through budget cuts. This concept of software “eating” industries was highlighted by Marc Andreessen in an August 2011 essay titled “Why Software Is Eating The World.”  As he noted in that essay, there has been dramatic positive change in the national security world because of software. But to fed watchers it is pretty clear that this shift is about to accelerate. The accelerants of the shift in the federal space include significant downward pressure on budgets and the impact this is having on concepts the government is putting in place.  The combination of budget pressures and incredibly compelling capabilities will definitely make this a year of change in the government contracting space.  As software eats our world we will all have some decisions to make. If you want to stay mission focused, do you want to be on the side of the eater or the eaten? And if you are a technologist in the workforce do you want to align yourself with a company that has a forward thinking strategic approach to the market or one that tries to stay with old models? These are all important questions to think through.

Bottom line of all the above: Disruptive IT will disrupt this space. Brace yourself!  And stay connected to us here at CTOvision.com as we track the technologies that will be changing our world in 2013.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley, former CTO of the Defense Intelligence Agency (DIA), is Founder and CTO of Crucial Point LLC, a technology research and advisory firm providing fact based technology reviews in support of venture capital, private equity and emerging technology firms. He has extensive industry experience in intelligence and security and was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by GovFresh.

@CloudExpo Stories
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
The cloud is everywhere and growing, and with it SaaS has become an accepted means for software delivery. SaaS is more than just a technology, it is a thriving business model estimated to be worth around $53 billion dollars by 2015, according to IDC. The question is - how do you build and scale a profitable SaaS business model? In his session at 15th Cloud Expo, Jason Cumberland, Vice President, SaaS Solutions at Dimension Data, discussed the common mistakes businesses make when transitioning t...
Are your Big Data initiatives resulting in Big Impact or Big Mess? In her session at Big Data Expo, Penelope Everall Gordon, Emerging Technology Strategist at 1Plug Corporation, shared her successes in improving Big Decision outcomes by building stories compelling to the target audience – and her failures when she lost sight of the plotline, distracted by the glitter of technology and the lure of buried insights. The cast of characters includes the agency head [city official? elected official?...
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial C...
Big Data is amazing, it's life changing and yes it is changing how we see our world. Big Data, however, can sometimes be too big. Organizations that are not amassing massive amounts of information and feeding into their decision buckets, smaller data that feeds in from customer buying patterns, buying decisions and buying influences can be more useful when used in the right way. In their session at Big Data Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positi...
Storage administrators find themselves walking a line between meeting employees’ demands to use public cloud storage services, and their organizations’ need to store information on-premises for security, performance, cost and compliance reasons. However, as file sharing protocols like CIFS and NFS continue to lose their relevance, simply relying only on a NAS-based environment creates inefficiencies that hurt productivity and the bottom line. IT wants to implement cloud storage it can purchase a...
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developmen...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, discussed how developers are extremely well-poised to perform tasks critical for securing the application – provided that certain key obstacles are overcome. Arthur Hicken has been involved in automating various practices at Parasoft for almost 20 years. He has worked on projects including database dev...
Software-driven innovation is becoming a primary approach to how businesses create and deliver new value to customers. A survey of 400 business and IT executives by the IBM Institute for Business Value showed businesses that are more effective at software delivery are also more profitable than their peers nearly 70 percent of the time (1). DevOps provides a way for businesses to remain competitive, applying lean and agile principles to software development to speed the delivery of software that ...
“Oh, dev is dev and ops is ops, and never the twain shall meet.” With apoloies to Rudyard Kipling and all of his fans, this describes the early state of the two sides of DevOps. Yet the DevOps approach is demanded by cloud computing, as the speed, flexibility, and scalability in today's so-called “Third Platform” must not be hindered by the traditional limitations of software development and deployment. A recent report by Gartner, for example, says that 25% of Global 2000 companies will b...
JFrog on Thursday announced that it has added Docker support to Bintray, its distribution-as-a-service (DaaS) platform. When combined with JFrog’s Artifactory binary repository management system, organizations can now manage Docker images with an end-to-end solution that supports all technologies. The new version of Bintray allows organizations to create an unlimited number of private Docker repositories, and through the use of fast Akamai content delivery networks (CDNs), it decreases the dow...
More organizations are embracing DevOps to realize compelling business benefits such as more frequent feature releases, increased application stability, and more productive resource utilization. However, security and compliance monitoring tools have not kept up and often represent the single largest remaining hurdle to continuous delivery. In their session at DevOps Summit, Justin Criswell, Senior Sales Engineer at Alert Logic, Ricardo Lupo, a Solution Architect with Chef, will discuss how to ...
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises a...
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
Move from reactive to proactive cloud management in a heterogeneous cloud infrastructure. In his session at 16th Cloud Expo, Manoj Khabe, Innovative Solution-Focused Transformation Leader at Vicom Computer Services, Inc., will show how to replace a help desk-centric approach with an ITIL-based service model and service-centric CMDB that’s tightly integrated with an event and incident management platform. Learn how to expand the scope of operations management to service management. He will al...
In this scenarios approach Joe Thykattil, Technology Architect & Sales at TimeWarner / Navisite, presented examples that will allow business-savvy professionals to make informed decisions based on a sound business model. This model covered the technology options in detail as well as a financial analysis. The TCO (Total Cost of Ownership) and ROI (Return on Investment) demonstrated how to start, develop and formulate a business case that will allow both small and large scale projects to achieve...
The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver new features and capabilities needed to make your organization competitive. As your application and business needs change, data repositories and structures get outmoded rapidly, resulting in increased work for applica...
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...