Welcome!

Java IoT Authors: Liz McMillan, Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Pat Romanski

Related Topics: @ThingsExpo, Mobile IoT, Agile Computing, @CloudExpo, @DXWorldExpo, SDN Journal

@ThingsExpo: Article

What’s In and What’s Out for IT in 2014

A thought-provoking look at what’s out and what’s in for Information Technology

Here’s a quick look at what’s out and what’s in for IT in 2014.

What’s out: Mobile, especially Mobile First. What’s in? Experience First. Mobility has become a means to an end now. People now demand compelling, engaging, context-aware experiences that catch them in the moment, that deliver services when they most need or want them. People want an emotional connection to the companies they do business with, and mobility is definitely one tool that can be used to deliver that. Certainly, mobility is going to continue to grow, people are still catching up in certain areas. and it will be a critical delivery channel, but it’s not only about mobility any longer. It’s really about the experience. And it’s a multi-channel experience, that will grow to include wearables.

What’s out: general-purpose wearables -- Segway for your face? No, thank you.  What’s in, use-specific wearables like the new hearing device using mobile tech and Bluetooth. It’s a tiny computer that uses advanced audio algorithms. It’s got a wireless radio built in, and there’s a smart phone app you can use to adjust frequencies and preferences. It comes from an entrepreneur who is coming from the Bluetooth headset space rather than from the medical device space. The goal was to be attractive from a cosmetic point -- it’s not hidden. It looks good, instead.

What’s out: Introverted IT and what’s in, IT sharing more. There was a great article on this by Pete Waterhouse recently in Information Week. It’s the end of the IT as a gatekeeper and the beginning of IT as an orchestrator. It’s related to cloud and consumer-driven IT, but all of this is just a start. It is critical that IT act as an advisor and an enabler. Or, to put it another way, “IT as a service.” IT must open up and become more of a collaborator with customers and business partners. It’s all about “embracing your inner rogue.”

Another IT gatekeeper that’s out: Security as a fence. What’s in? Security as an enabler. Applied correctly and creatively, security can enable teams to take advantage of mobile and cloud. The bottom line for security is to help the business deliver compelling, engaging experiences that customers are demanding. This is no longer a leading-edge approach to security. It’s becoming a sort of table stake. Teams that adopt a “how can we make this possible” approach to security will be the ones that succeed.

What’s out? Cloud. Cloud is gone. So what could possible replace cloud you might ask? Cloud. What’s in is cloud. Cloud is still a key enabling technology especially in key growth areas, like mobile, multi-channel app development and Big Data or analytics, if you will. And make no mistake, many are still very early in their adoption of cloud services. Cloud adoption is going to continue to rise, of course, because cloud is now much better understood and it’s definitely proven its worth. Even though its role is more critical than ever, and even though it will deliver more value than ever, we’ll probably hear a lot less about it.  Cloud is no longer the new shiny thing. We don’t talk about server virtualization as anything special anymore. It’s just what we do. Maybe cloud goes the same way.

Check out this recent TechViews Unplugged video on YouTube for more on what’s new, hot, and thought-provoking in IT.


More Stories By Jeffrey Abbott

Jeff is part of Tata Consultancy Services Digital Software and Solutions group, as a lead evangelist for its IoT analytics platform solutions for smart cities, smart retail, smart banking, smart comms, and other areas.

Prior to TCS, Jeff was part of EMC’s Global Services division, helping customers understand how to identify, and take advantage of opportunities in Big Data, IoT, and digital transformation. Jeff helped build and promote a cloud-based ecosystem for CA Technologies that combined an online community, cloud development platform, and e-commerce site for cloud services and spent several years within CA’s Thought Leadership group, developing and promoting content and programs around disruptive trends in IT. Prior to this, Jeff spent 3 years product marketing EMC, as well as a tenure Citrix, and numerous hi-tech marketing firms – one of which he founded with 2 former colleagues in 1999. Jeff lives in Sudbury, MA, with his wife, 2 boys, and dog. Jeff enjoys skiing, backpacking, photography, and classic cars.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...