With 2016 in full swing, its now more important than ever for the IT industry to evolve, but says SEBASTIAN ISAAC, Business Development Manager at Rectron, we still need to address the skills and awareness needed for us to excel.
With 2016 in full swing, it’s never been more important for the IT industry to evolve in order to remain relevant. From an increasing shift to the cloud and third platform technologies, to the development of the Internet of Things (IoT), the International Data Corporation’s (IDC) Worldwide IT Industry 2016 Predictions centre on digital transformation. In South Africa, while we are certainly seeing similar trends, we still need to address the skills and awareness necessary for us to excel.
Digital transformation at the heart of corporate strategy
According to the IDC, by the end of 2017, the majority of CEOs will have digital transformation at the centre of their corporate strategy, as they apply digital technology to all aspects of business. Linked to this an increased spend on third platform technologies and cloud-based infrastructure. Locally, digital transformation is becoming increasingly important as businesses are considering social and mobile analytics and the cloud to a greater extent, and we are beginning to see a transition.
That said, it is still a work in progress in South Africa. This is especially so when it comes to working in the cloud. We’re still seeing a large number of businesses focused on internal solutions. It is often the smaller businesses that have the capacity to move to the cloud more easily, with the larger enterprises having to follow a process when it comes to transitioning. However, the businesses that can make the shift or partner with industry cloud platforms are in prime position to offer their customers a more complete, packaged solution to meet their needs.
Changing the way we think about software, data and customers
As we continue down the digital transformation road, it stands to reason that businesses will ramp up their software development capabilities as they shift their focus to the creation of digital apps and services. A lot of software development is starting to focus more on extracting specific information and understanding who the customer is to have a more targeted approach. In addition, the embedding of cognitive services into apps is also beginning to gain ground, although there is still a lot of room to fine tune these according to the information that is actually needed.
In the spirit of extracting information, the IDC also predicts that businesses will expand their external data sources significantly. Businesses certainly need to be drawing from multiple data sources to consolidate and verify their information. We’ve seen this trend growing as several of our customers that work with multiple service providers are making use of the information from each of those sources to better analyse what is going on in their industries.
Of course, as we better understand our customers through these various means, it also stands to reason that businesses need to overhaul their digital front door to support the volume of customers coming from a variety of touch points. There is a growing trend for businesses to find inventive ways of getting in touch with their customers by making use of the data they extract to understand how to be relevant in their communications.
The Internet of Things continues to grow
When thinking about how to connect with customers to gain real-time insights into their behaviours and needs, IoT provides the answer. It has the potential to cut out the middle man and allows businesses to connect directly with their customers. In the IT space, it’s possible to embed IoT technology into a printer, for example, so that the manufacturer has control over the sales of consumables and repairs, as well as the opportunity to improve the product based on direct customer feedback. This changes the role of IT vendors as we know them.
However, there are still challenges in the IoT space, especially when it comes to the infrastructure being put in place. IoT is not entirely open platform yet, and for proper drive into this space we need more collaboration between different entities. As long as everyone continues to have their own protocols and standards, we are still a few years away from having a proper working solution to focus on IoT devices.
Innovation and relevance key in 2016
While we still have a way to go, South Africa is keeping up with global IT trends. As a country, we have a lot of innovation to offer and we have the potential to take giant leaps especially in the IoT space. Our challenge in the coming years is to ensure that we upskill and encourage people to be part of the IoT ecosystem and the IT sector in general. We also need to educate other sectors about the value that working in the cloud and using remote monitoring and management of data can add to business.
From Rectron’s perspective, we see the necessity of remaining relevant for our customers. We believe the way to achieve this is to look beyond products themselves and offer a total solution that adds real value to business and acts as a central point across warranty, servicing, and support. It’s an evolving model, but with digital transformation it is inevitable that those succeeding in the IT sector will make the shift.
Samsung unfolds the future
At the #Unpacked launch, Samsung delivered the world’s first foldable phone from a major brand. ARTHUR GOLDSTUCK tried it out.
Everything that could be known about the new Samsung Galaxy S10 range, launched on Wednesday in San Francisco, seems to have been known before the event.
Most predictions were spot-on, including those in Gadget (see our preview here), thanks to a series of leaks so large, they competed with the hole an iceberg made in the Titanic.
The big surprise was that there was a big surprise. While it was widely expected that Samsung would announce a foldable phone, few predicted what would emerge from that announcement. About the only thing that was guessed right was the name: Galaxy Fold.
The real surprise was the versatility of the foldable phone, and the fact that units were available at the launch. During the Johannesburg event, at which the San Francisco launch was streamed live, small groups of media took turns to enter a private Fold viewing area where photos were banned, personal phones had to be handed in, and the Fold could be tried out under close supervision.
The first impression is of a compact smartphone with a relatively small screen on the front – it measures 4.6-inches – and a second layer of phone at the back. With a click of a button, the phone folds out to reveal a 7.3-inch inside screen – the equivalent of a mini tablet.
The fold itself is based on a sophisticated hinge design that probably took more engineering than the foldable display. The result is a large screen with no visible seam.
The device introduces the concept of “app continuity”, which means an app can be opened on the front and, in mid-use, if the handset is folded open, continue on the inside from where the user left off on the front. The difference is that the app will the have far more space for viewing or other activity.
Click here to read about the app experience on the inside of the Fold.
Password managers don’t protect you from hackers
Using a password manager to protect yourself online? Research reveals serious weaknesses…
Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study by researchers at Independent Security Evaluators (ISE).
“100 percent of the products that ISE analyzed failed to provide the security to safeguard a user’s passwords as advertised,” says ISE CEO Stephen Bono. “Although password managers provide some utility for storing login/passwords and limit password reuse, these applications are a vulnerable target for the mass collection of this data through malicious hacking campaigns.”
In the new report titled “Under the Hood of Secrets Management,” ISE researchers revealed serious weaknesses with top password managers: 1Password, Dashlane, KeePass and LastPass. ISE examined the underlying functionality of these products on Windows 10 to understand how users’ secrets are stored even when the password manager is locked. More than 60 million individuals 93,000 businesses worldwide rely on password managers. Click here for a copy of the report.
Password managers are marketed as a solution to eliminate the security risks of storing passwords or secrets for applications and browsers in plain text documents. Having previously examined these and other password managers, ISE researchers expected an improved level of security standards preventing malicious credential extraction. Instead ISE found just the opposite.
Click here to read the findings from the report.