vendredi 16 janvier 2015

Industry voice: IT industry trends for 2015: cheap storage and a multi-tier internet

As we are now in 2015, we have been looking into the crystal ball to see what the biggest IT trends for the coming year will be – including the price of storage, the multi-tier internet, and the security worries surrounding the Internet of Things.


Storage matters


Remember when storage was expensive? Now they're giving it away. What's that all about?


In 2015, personal and data privacy laws will enter uncharted territory as even more of the world's data will be moved, and entrusted, to the cloud. Vendors such as Google, Microsoft and Amazon are now practically giving away cloud storage to both businesses and consumers.


What do they have to gain by holding onto your data? Who keeps track of what you store and what can they learn from the various files you store? And what obligations do these vendors have to keep your data private? Even data bound by specific privacy laws, such as HIPAA, can be successfully subpoenaed by law enforcement.


So by offering free storage, this year it will be interesting to see what organisations will learn from your data, how they will use it, and with whom they'll share it.


The app strikes back!


There will never be 100% security on the internet. Cyber-criminals will continue to steal passwords and confidential information, and identity theft will continue to be rampant. This is a reality and it won't change in 2015.


Risk-based security measures which adapt in line with the current threat level will become more important. In light of the fact that smartphones and tablets are pretty much a given in most companies today, we expect to see an increasing number of apps with integrated security features. This approach will remove the reliance on a singular app such as an antivirus utility to provide blanket detection and defence across a device against attacks such as malware, key logging and tracking.


Instead, individual apps will contain their own antimalware technologies and predictive detection capabilities built in to help spot attacks targeted against them specifically. These intelligent apps will be developed to proactively recognise security risks and be equipped to fight back against attacks.


This means that even in a BYOD scenario, handheld devices will always have a certain level of security rooted to the applications being used for whatever purpose – whether personal use or work.


The multi-tier internet


In 2014, we saw the end of the notion of net neutrality. As organisations such as Netflix agreed deals with major mobile and fixed line network operators to ensure end users received fast and free-flowing access to streaming video content without throttling, so the first mainstream seeds of a two-speed internet were sown.


The year ahead will only see more of these deals, the establishment of which will solidify a fast lane and slow lane for internet service providers and for the user experience.


Businesses and consumers have benefitted in recent years from rock-bottom broadband prices as service providers engaged in a senseless race to the bottom, believing that customer retention was more important than profitable bandwidth services. In 2015 we will see prices climb back up, either directly through higher service fees or indirectly through subsidies from major application and service vendors, while those on the lowest tariffs find themselves ring fenced in the slowest band of internet traffic.


Those prepared to pay a premium for their connection or for value-added services will find they enjoy Quality of Service (QoS) improvements, higher throughput caps and less aggressive traffic shaping – fast lane refinements to their online experience that will ensure users can fully enjoy bandwidth-intensive activities such as video streaming, Voice over IP, remote access and conferencing – while the providers of these services can maintain service delivery that keeps support calls down and customer retention up.


The year of cyber-retaliation


Last month's disruptive and highly embarrassing cyber-attack against Sony Pictures raises a frightening spectre for US businesses: the escalating use of malicious software that can harvest, leak and destroy data as retaliation for political and business activities deemed offensive or inconvenient by subversive organisations and governments.


Russia, China and the US, all three of which have in the past been suspected of low-scale cyber-attacks against Western and Eastern targets have now been joined, it is believed, by North Korea in the cyber-warfare league.


One thing is for sure, regardless of whether these governments, or dissident groups within these countries, view data erasure and other cyber-attacks as effective retaliation when offended, businesses worldwide should make 2015 the "year of backing up sensitive files", as cyber-attacks as a form of industrial sabotage look set to continue and grow.


We need to secure the Internet of Things


At this stage, it's hard to imagine that the growing Internet of Things (IoT) marketplace will suddenly collapse given the insatiable appetite for internet-connected everything.


However, there remain concerns about what could hinder its growth, such as cyber-hacking and a general lack of security, as IoT device makers focus on functionality rather than security which could hinder the ability to freely and easily connect.


Nonetheless, the market is roaring and I expect that companies involved with the IoT will implement workarounds to mitigate security issues – largely after incidents happen – in order to keep alive the enormous market and revenue potential for this industry.


What that does mean is privacy concerns will grow as people will become more aware of just how easy it is to see what's happening inside other folks' homes and businesses. Weak security in 2015 will play its part in allowing privacy to slowly fade away for everyone. As IoT users share more details it will be critical to find solutions that are trustworthy as well as functional.







from TechRadar: All latest feeds http://ift.tt/1zmecHl

via IFTTT

Related Posts:

  • 5 easy ways to destroy your career in techThe rise of social media might provide an open platform for conversation, but it also means that businesses can have unfiltered insight into what their employees are doing during their workday.Usually, social networking sites… Read More
  • Industry voice: Storage trends in 2015: Death of the disk, and the importance of agilityLast year, we saw the continued transformation of enterprise IT infrastructure towards the next-generation data centre model. Fuelled by advances in compute, network and storage virtualisation, businesses are seeing the advan… Read More
  • Today is your last chance to buy Google GlassLast week we brought you news that Google Glass as we know it is done, with Google confirming it will end its Explorer program so it can "focus on what's coming next."Google will stop producing the wearable in its current for… Read More
  • Review: Garmin Forerunner 920XTIntro, design and field testingThe idea that we should just "know" our fitness abilities is outdated: the technology exists to rebuild us, though it isn't necessarily cheap. There are a plethora of lower-cost fitness-tracking… Read More
  • Download of the day: TeamViewerNever worry about forgetting important files again thanks to TeamViewer, which lets you remotely access your computer and much, much more.Why you need itSimple put, TeamViewer can be a life saver. Because if you've ever left … Read More

0 commentaires :

Enregistrer un commentaire