2008 Trends

Preview:

DESCRIPTION

 

Citation preview

8002Trends for 2008

And Trivia from 2007Terry Bledsoe

January 17, 2008

Trends for 2008And trivia from 2007

http://money.aol.com/special/hot-products-2007

Surfing Will Slow

Email90% Spam

User generated content

digital picture frames

http://www.economist.com/science/displaystory.cfm?story_id=10410912http://flickr.com/ http://www.digiframes.com/related/1017-4820/WiFi-Digital-Picture-Frames-Sungale-AW15B-WF.html

WIFI.

IPIPTV

IP SurveillanceIP MonitoringIP GPS LocatingIPIPIPIPIPIPIPIPIP….

Implications……• Management of end-user devices– Training– Storage– Security (information and device)

• Clear expectations for usage• WAN Optimization• Proper planning and programming for

applications

Surfing Will Detach

700

MHz

Channels 52 to 69

Reserve Bid $4.6 Billion

Bidders: AT&T, Google, and Verizon

“open access”

Public Safety Access

GPhone

Open Handset Alliance

??? Core Business

Needs on and off Ramps to the Knowledge Sources and Knowledge Users

Needs on and off Ramps to the Knowledge Sources and Knowledge Users

“open access”

“to everything”

The new personal computer…..

The simple cell phone is a relic

Laptops replace desktops

personal use / business use

Implications……• The Public will expect more services from government

online• Management of end-user devices is an accelerating

challenge.– Support– Cost– Security (information and device)

• Clear polices on the use of personal devices for business• Proper selection of resources

– Desktop vs laptop• Expected Life• Participate in planning future of Public Safety spectrum

Surfing – and everything else computer

related – will open

Linux

VistaGutsey Gibbon

“open applications”

https://wiki.ubuntu.com/GutsyGibbonhttp://www.pidgin.im/ http://www.openoffice.org/ http://www.mozilla.com/ http://www.mysql.com/ http://www.evolutionemail.com/http://www.alfresco.com/https://www.google.com/a/

Gutsey Gibbon

Implications……• More vendors building on open platforms• Better applications available to more people• Could be support issues• Movement to an open standard

Applications Still Job One

http://www.economist.com/science/displaystory.cfm?story_id=10410912https://wiki.ubuntu.com/GutsyGibbon

Hardware

Software

Peripherals

Capacity

Users

External

Internal Applications Linked to

PeopleSoft Portal

XMLODFPDF

MARS project

Implications……• Realize program and data may reside anywhere

in the world• Web 2.0 applications• Skills needed in Internet application development

and interactive user interface• Collaboration – the network indispensible • Be careful choosing applications – must be able

to integrate – standards• Be aware of formats

IT Job Skills for 2008

What’s hot• Project management skills and

certifications• Security experience• Business process

understanding• Communication skills,

especially writing and teaching expertise

• The ability to manage remote workers and virtual teams

What’s not• Software development and

programming• Quality assurance• Technical certifications

http://www.networkworld.com/etm/2007/122007-etm-jobs-matter.html

Skills in highest demand

• VoIP• Unified Communications• Convergence• Virtualization• Security

12 IT Skill That Employers Can’t Say No To

• Machine learning• Mobilizing applications• Wireless networking• Human-computer interface• Project management• General networking skills• Network convergence• Open-source programming• Business intelligence systems• Embedded security• Digital home technology integration• .Net, C #, C++, Java – with an edge

http://www.networkworld.com/news/2007/071107-12-it-skills-that-employers.html?page=1

Attack Trends from 2007• Attacks today are often aimed at a smaller target – with the

goal of monetary gain.• Increased professionalization and commercialization of

malicious activities• Threats are increasingly tailored for specific regions.• Increase in multi staged attacks. • Attackers targeting victims by first exploiting trusted

entities.• Attackers are rapidly adapting new techniques aimed at

circumventing the constant improvements in protection.• The effort to find and fight these malicious techniques and

strategies must also evolve.

www.symantec.com/ISTR2007

Government Attack Trends from 2007

• Government accounted for 26 percent of data breaches that could lead to identity theft.

• Of the potential infections by the top 50 malicious code samples, 65 percent were threats to confidential information.

• The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting , such as a USB key.

• Hacking was responsible for 73 percent of identities exposed during the period.

• 36% of the top attacks were SMTP-based.

• 46% of malicious code that propagated did so in email attachments

www.symantec.com/ISTR2007

Adaptive Security

• More than the endpoints• Decisions everywhere• Virtual environments

Implications……• Government records are a big source of identity

threat and we must recognize that fact.• Good policies and procedures are needed for all

devices. Mobile devices offer additional security challenges.

• Mobile devices require special security training.• Training in security practices needs to be

ongoing.• Security practices will at times be a burden but

users must understand the importance.

Going Green• Energy Efficient machines• Machine disposal• Consolidation of equipment using VM• ON/OFF Switch• Think before you print• Archiving solutions• Be honest: This is more about cutting cost

than saving the planet

What really matters…..

• Networks matter– Metcalfe’s Law

• Security matters• Technology advances matter• Consumers really matter• Sense of purpose

Sellers from the Future……..

BIG

Big Sellers from the Future

Pharma Fruit

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm

Big Sellers from the Future

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm

RFIDBlocker

Big Sellers from the Future

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm

Glacier Water

Big Sellers from the Future

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm

Reputation Accounts

Big Sellers from the Future

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm

Social Network Movie Tickets

Tagged and Shared• BoingBoing http://www.boingboing.net/• Catawba County http://www.catawbacountync.gov/ • Symantec Government Internet Security Threat Report

www.symantec.com/ISTR2007• The Economist

http://www.economist.com/science/displaystory.cfm?story_id=10410912

• Facebook http://www.facebook.com/ • Flickr http://flickr.com/ • My Space http://www.myspace.com/

• YouTube http://youtube.com/ •

Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.

Research

• IP Surveillance: Prepare for New Demands on Network Operations, Info-Tech Advisor: Research Note, Published: January 08, 2008

• 2008: Leveraging the Valuable, Rejecting the Hype, Info-Tech Advisor:

Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.