IT Innovation Many Forms
IT Innovation Many Forms
IT Innovation Many Forms
Consider, for example, voice over I.P. (V.O.I.P.) such as is being used by Skype, or the most recent
announcement from I.B.M. on their new memory system called racetrack, or Googles cloud
computing. Each of these is changing the game and can be measured by the degree they transform
the core competencies required to make, service, and deliver them and the degree they disrupt
current business models. Perhaps V.O.I.P. is the clearest example of such.
Disruptive innovations are perhaps the most interesting, at least from a societal point of view.
Many students of innovation question if something can even be called a real innovation if it doesnt
end up altering social practices.
Consider, for example, how the cell phone, digital camera or the personal computer, as products or
the world wide web, as a service have slowly but surely transformed how we live, work, learn, and
socialize. These innovations cause us to see and interact with the world differently.
Metrics for such innovations are tricky, since social practices evolve slowly and surround us
continuously, and thus become our frame of reference. It is not until we are abruptly forced to put
them aside that we become aware of how much they have been shaping our lives.
But the types of innovation we have mentioned thus far miss perhaps the most fundamental kind
and the least appreciated kind of innovation perhaps precisely because these innovations are so
fundamental.
Lets call these institutional innovations, because they actually enable society to function.
In periods of stability they are barely noticed since they are simply considered the way things are.
Ask yourself this question:
What innovation over the last several hundred years has led to the most wealth creation?
I was once asked this by a group that was hoping I would say it was the microprocessor. But no, my
guess was that it was the creation of the modern corporation (Ltd. in the U.K., Inc. in the U.S.).
The great innovation in the modern corporation was ownership without liability. This allowed shares
to be sold on an open market and, unlike other forms of ownership, limited a shareholders liability
to the price paid for the shares and nothing more. This made it possible for ordinary people to
become investors.
My goal here is not to argue that I was right, but rather to suggest that institutional innovations tend
to have pervasive and subtle influences on our lives. And in periods of great change, like now, they
may well have more impact on us than any other kind.
For example, consider the impact that open source software license B.S.D. used for Linux is having,
or the copyleft (institution) used by Wikipedia, or the creative commons licensing regimes, or the
global process networks of Li & Fungs apparel operations around the globe.
These institutional innovations are just the tip of the iceberg of what we will see and need in our age
of accelerating change.
----------------------------------------------------------------------------------------------------------------------------------------- The Internet of Things, big data, cloud and cyber security will continue to
dominate the IT landscape in 2015 but what effect will they have?
Technology was dominated by several prevalent trends in 2014 from the Internet of Things (IoT)
and big data to the cloud and cyber security, it seems like there was barely a day without one of
these trends creeping up in the news.
Now we have entered 2015, these trends are still at the forefront of discussion, with many exciting
opportunities, innovations and iterations being predicted for this year.
2014 is now being dubbed the year of the breach and it is not difficult to see why. Last year sensitive
data was being leaked at Google, Apple and most recently at Sony, to name but a few leading tech
giants. Security weaknesses have been marked down to a number of key areas such as
misconfiguration issues, third party providers, lack of network diversity and most worrying of all, lack
of qualified security talent.
The cyber security skills gap is perhaps the underlying issues behind the the year of the breach
having a knock-on effect on industry and the economy. Cyber security skills are a global priority but,
with a lack of consistency in accepted career definitions, organisations are experiencing difficulties in
attracting new talent and progressing existing professionals. To offset the skills deficit, talent from the
gaming industry are being brought into the security sphere and their skills adapted for this arena.
Now in 2015, the information security industry has an opportunity to re-define itself and build on the
negative global coverage it observed last year to attract new talent. Investment, employment
branding and clearly defined career paths are essential if organisations are to reduce the deficit in
the skills gap and avoid seeing their own brand in the papers due to the latest leak.
The Internet Systems Security Association (ISSA) identified the need for an internationally accepted
framework that would define the cyber security career for individuals in the profession. To attract new
entrants and so that pros can advance in their career, ISSA have developed the Cybersecurity
Career Lifecycle (CSCL). This pro-active approach to industry development could go a long way to
help fill the estimated 300,000 to 1,000,000, and rising, currently vacant global cyber security
positions.
- See more at: http://www.information-age.com/it-management/strategy-andinnovation/123458793/2015s-most-critical-information-technology-trends#sthash.T8nRoEJc.dpuf
As we look forward to the year ahead there are many fantastic opportunities in IT to look forward to
from the existing trends of 2014 to the emerging technologies yet to be discussed. The IT industry is
growing at an exponential rate, with demand, investment and technological capability the three pillars
of support driving the sustainability in growth.
However, the barriers to the industry are clear and present dangers. The shortage in skills and talent
capable or realising the expectations for these pressing technologies must be addressed on an
educational, cultural and organisational level.
Nurturing computing skills must be as core to the UK syllabus as English, Math and Science to
provide the next generation with the tools that they will need in their future careers, no matter the
profession.
Culturally, there appears to be a strong requirement to make a career in IT more attractive to young
women. A study by the Joint Council for Qualifications found less than 8% of last years A' Level
computing students were female and declining still. From a total of 4,171 students studying
Computing, only 314 were female. That's a 75% decrease over the last 10 years. These figures are
concerning to say the least with the skills gap in this sector increasing.
Sourced from Mark Braund, CEO, InterQuest Group
In 2015 the proliferation of devices, big data, and the digital native generation will shape the cyber
security concerns of enterprises
With the New Year fast approaching, all businesses are looking ahead to their priorities for 2015, and
if this past year has taught IT departments anything, its that data security needs to be high up on the
agenda. Weve seen business such as eBay and Adobe, and even celebrities like Jennifer Lawrence,
learn the hard way the harm a data breach can cause.
For businesses looking ahead to 2015, a security mishap, or even a potential data breach, can derail
even the most important of projects. So what has 2015 got in store that could impact business data
security? Take a look below to find out:
EU general data protection regulation
Businesses may think they have a future proof IT strategy in place, but substantial regulation
changes on the horizon will force a considerable rethink. The EU Data Protection Regulation which
should come into force in 2017, will ramp up businesses' responsibility for data security, increasing
sanctions for mishandling it. In short, this means fines of up to two per cent of a businesss annual
global turnover and possibly a requirement to report a breach within 24 hours.
> See also: Is 2015 the year cyber security shows its human side?
This has ramifications for any strategy that is based around data - like BYOD, storage, internet of
things and cloud. Because the changes in law are radical, organisations will have to work hard in
2015 to have a chance of complying and avoiding substantial fines when the new laws come in.
Big data innovation
2015 will see even more businesses take advantage of the power of the data they hold. From using
analytics to gain greater business insight, to schemes such as the NHS care.data initiative,
organisations are doing more with their big data. However, due to the numerous data breach stories
in the press, many organisations are unwilling to engage in innovative data schemes for fear of it
increasing the chances of a data leak, as demonstrated by the difficulties care.data has run into. For
many, theres a lot at stake if this goes wrong: reputation, the risk of heavy fines from the ICO, and
public outcry that could put a halt on any progress already made.
What we could see in 2015 is innovation being stifled by data leak worries, and to avoid this
organisations should think about data security at the start of the project, and ensure it is incorporated
throughout its life cycle. This needs to take into account every aspect of the project, from the devices
being used to the platform that is accessing this data.
(Even) more mobile
While this has been a trend for the last couple of years, the increased use of mobile devices by
employees is not slowing down. Whether an employee-owned (BYOD) or corporately owned and
personally enabled (COPE) device, the growth in devices means a corresponding increase in
endpoints, all of which are potential security vulnerabilities.
With the proliferation in device types, form factors and operating systems, its even more important
that whatever security solution is in place is device agnostic, and able to cope with any type of new
technology. That way firms are able to take an employee rather than device centric approach to data
security and device management.
Changing devices
In 2014 we saw mobile devices starting to do more, with the contactless payment and fingerprint
recognition technology in Apples latest devices an example of this. What were going to see in 2015
is an increase in what mobile devices are capable of doing. For example, Apple's Touch ID
fingerprint scanner has so far been used to unlock the handset itself and as a verification tool when
making purchases through Apple's App store. However, now that iOS8 has made this functionality
available to third party developers, users will soon have the ability to unlock a greater range of apps
via their fingerprints.
While this example could have additional security benefits, its an example of device features rapidly
expanding beyond what IT departments are comfortable with. In the wider business environment,
firms need to be on their guard, and consider exactly what impact these new features will have on
the way corporate data is stored and accessed. Contactless payment, face scanning and interaction
with wearable devices are all features well be seeing in 2015, but could be easily circumvented by
hackers, or leave data open to leaks if theyre not made part of the wider device security strategy.
Generation Z
The recent iCloud hack and subsequent leak of intimate photos of Hollywood celebrities has made it
clear that even the young, rich and famous arent immune to data loss. The fatal mistake these stars
made was to forget that data, be it an email or photo, isnt static. More often than not it goes straight
to the cloud, where in theory it can be accessed from anywhere. The question for 2015 is how savvy
the next generation of digital youngsters are going to be. They may know how to use the latest apps
and devices, but they havent had the training and experience to consider what happens to this data
in the cloud.
> See also: 2015: the year of the exploit
The next few years will reveal the impact of these digital natives on sensitive corporate data. If they
take a laissez-faire attitude to corporate data and dont consider what might happen to it when it is in
the cloud, firms will end up facing serious data breaches. When businesses start realising this, well
see them taking a more serious approach to training their younger staff about data security so that it
keeps up with their wider digital skills.
The corporate IT environment is changing faster than ever, fuelled by wider changes in consumer IT.
Businesses clearly want to take advantage of the benefits that they can offer, but now more than ever
data security needs to remain at the heart of these initiatives.
With upcoming laws like the EU General Data Protection Regulation making the consequences of
data breaches more serious than ever, lets hope 2015 sees data security move up the list of
priorities.
Stephen Midgley, VP Global Marketing, Absolute Software
- See more at: http://www.information-age.com/technology/security/123458768/2015-technologytrends-what-are-security-implications#sthash.e2lpAk7j.8a8coVHk.dpuf