Date post: | 16-Dec-2015 |
Category: |
Documents |
Upload: | tamara-chown |
View: | 219 times |
Download: | 3 times |
8002Trends for 2008
And Trivia from 2007Terry Bledsoe
January 17, 2008
Trends for 2008And trivia from 2007
http://money.aol.com/special/hot-products-2007
Surfing Will Slow
digital picture frames
http://www.economist.com/science/displaystory.cfm?story_id=10410912http://flickr.com/ http://www.digiframes.com/related/1017-4820/WiFi-Digital-Picture-Frames-Sungale-AW15B-WF.html
WIFI.
IPIPTV
IP SurveillanceIP MonitoringIP GPS LocatingIPIPIPIPIPIPIPIPIP….
Implications……• Management of end-user devices– Training– Storage– Security (information and device)
• Clear expectations for usage• WAN Optimization• Proper planning and programming for
applications
Surfing Will Detach
700
MHz
Channels 52 to 69
Reserve Bid $4.6 Billion
Bidders: AT&T, Google, and Verizon
“open access”
Public Safety Access
Needs on and off Ramps to the Knowledge Sources and Knowledge Users
Needs on and off Ramps to the Knowledge Sources and Knowledge Users
“open access”
“to everything”
The new personal computer…..
The simple cell phone is a relic
Laptops replace desktops
personal use / business use
Implications……• The Public will expect more services from government
online• Management of end-user devices is an accelerating
challenge.– Support– Cost– Security (information and device)
• Clear polices on the use of personal devices for business• Proper selection of resources
– Desktop vs laptop• Expected Life• Participate in planning future of Public Safety spectrum
Surfing – and everything else computer
related – will open
Linux
VistaGutsey Gibbon
“open applications”
https://wiki.ubuntu.com/GutsyGibbonhttp://www.pidgin.im/ http://www.openoffice.org/ http://www.mozilla.com/ http://www.mysql.com/ http://www.evolutionemail.com/http://www.alfresco.com/https://www.google.com/a/
Gutsey Gibbon
Implications……• More vendors building on open platforms• Better applications available to more people• Could be support issues• Movement to an open standard
Applications Still Job One
http://www.economist.com/science/displaystory.cfm?story_id=10410912https://wiki.ubuntu.com/GutsyGibbon
Hardware
Software
Peripherals
Capacity
Users
External
Internal Applications Linked to
PeopleSoft Portal
XMLODFPDF
MARS project
Implications……• Realize program and data may reside anywhere
in the world• Web 2.0 applications• Skills needed in Internet application development
and interactive user interface• Collaboration – the network indispensible • Be careful choosing applications – must be able
to integrate – standards• Be aware of formats
IT Job Skills for 2008
What’s hot• Project management skills and
certifications• Security experience• Business process
understanding• Communication skills,
especially writing and teaching expertise
• The ability to manage remote workers and virtual teams
What’s not• Software development and
programming• Quality assurance• Technical certifications
http://www.networkworld.com/etm/2007/122007-etm-jobs-matter.html
Skills in highest demand
• VoIP• Unified Communications• Convergence• Virtualization• Security
12 IT Skill That Employers Can’t Say No To
• Machine learning• Mobilizing applications• Wireless networking• Human-computer interface• Project management• General networking skills• Network convergence• Open-source programming• Business intelligence systems• Embedded security• Digital home technology integration• .Net, C #, C++, Java – with an edge
http://www.networkworld.com/news/2007/071107-12-it-skills-that-employers.html?page=1
Attack Trends from 2007• Attacks today are often aimed at a smaller target – with the
goal of monetary gain.• Increased professionalization and commercialization of
malicious activities• Threats are increasingly tailored for specific regions.• Increase in multi staged attacks. • Attackers targeting victims by first exploiting trusted
entities.• Attackers are rapidly adapting new techniques aimed at
circumventing the constant improvements in protection.• The effort to find and fight these malicious techniques and
strategies must also evolve.
www.symantec.com/ISTR2007
Government Attack Trends from 2007
• Government accounted for 26 percent of data breaches that could lead to identity theft.
• Of the potential infections by the top 50 malicious code samples, 65 percent were threats to confidential information.
• The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting , such as a USB key.
• Hacking was responsible for 73 percent of identities exposed during the period.
• 36% of the top attacks were SMTP-based.
• 46% of malicious code that propagated did so in email attachments
www.symantec.com/ISTR2007
Adaptive Security
• More than the endpoints• Decisions everywhere• Virtual environments
Implications……• Government records are a big source of identity
threat and we must recognize that fact.• Good policies and procedures are needed for all
devices. Mobile devices offer additional security challenges.
• Mobile devices require special security training.• Training in security practices needs to be
ongoing.• Security practices will at times be a burden but
users must understand the importance.
Going Green• Energy Efficient machines• Machine disposal• Consolidation of equipment using VM• ON/OFF Switch• Think before you print• Archiving solutions• Be honest: This is more about cutting cost
than saving the planet
What really matters…..
• Networks matter– Metcalfe’s Law
• Security matters• Technology advances matter• Consumers really matter• Sense of purpose
Sellers from the Future……..
BIG
Big Sellers from the Future
Pharma Fruit
http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
Big Sellers from the Future
http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
RFIDBlocker
Big Sellers from the Future
http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
Glacier Water
Big Sellers from the Future
http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
Reputation Accounts
Big Sellers from the Future
http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
Social Network Movie Tickets
Tagged and Shared• BoingBoing http://www.boingboing.net/• Catawba County http://www.catawbacountync.gov/ • Symantec Government Internet Security Threat Report
www.symantec.com/ISTR2007• The Economist
http://www.economist.com/science/displaystory.cfm?story_id=10410912
• Facebook http://www.facebook.com/ • Flickr http://flickr.com/ • My Space http://www.myspace.com/
• YouTube http://youtube.com/ •
Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.
Research
• IP Surveillance: Prepare for New Demands on Network Operations, Info-Tech Advisor: Research Note, Published: January 08, 2008
• 2008: Leveraging the Valuable, Rejecting the Hype, Info-Tech Advisor:
Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.