Connect with us

Featured

How 2015 predictions ended – and what to do about it

Published

on

At the beginning of 2015 some major predictions where made. DAN MATTHEWS & MARTIN GUNNARSSON of IFS look at these and comment on whether they will still hold water in 2016.

At the beginning of 2015 we saw some attention-grabbing predictions that suggested major changes were afoot in the IT industry. There have been some notable developments over the course of the year, but it will be interesting to see whether all of the predictions still hold water as the days grow shorter and we begin to look at what 2016 and onwards may hold in store.

We took some of the key predictions made at the start of the year and looked at them under the microscope to see whether the developments they suggest are likely to come true.

“Hybrid cloud is the future”

From tools to enable group decision on where to place the coffee machine in an office, all the way up to using Office 365 exchange and enterprise CRM systems, cloud services are being used today in a vast array of ways across different environments.

However, very few organisations have adopted full cloud services. Usually only very small and/or new start-ups that don’t have a legacy setups or the funds to purchase infrastructures will go fully into the cloud. Most will operate using a hybrid cloud model because they already have existing business critical infrastructure in place, and this architecture is likely to continue for the foreseeable future.

As cloud continues to play a bit-part role, many predict the hybrid setup will become an ever greater part of the ecosystem. Gartner, for example, believes that hybrid enterprise resource planning (ERP) environments will be the norm within five years, and it looks like this will be the case as businesses look to mix third party solutions with their in-house cloud architectures.

Trust in cloud services is growing as more people begin using it in their personal and professional lives. And this isn’t just happening in the general public cloud, the so-called ‘mega cloud’ environments are becoming more trustworthy too, as the likes of Amazon and IBM have developed services that can match the needs of large enterprises. This is leading to this architectural evolution.

Over time, onsite services require replacement or updating. When this happens it’s time for organisations to consider whether to invest in their own services, and the competence requirements that go with it, or to buy that solution as a service within the cloud. As companies often have hundreds of different solutions used by different people, cloud can be a more effective way of delivering business critical services.

A hybrid infrastructure enables an organisation to try things out in pockets, ring-fencing a particular development to test it first before instigating a full rollout. The ability to test updates and solutions within a small environment before full implementation can make the end result more effective and less susceptible to bugs that may only be spotted within a live environment.

So if you’re planning updates, what should you do? There are three key things to think about:

1)    Maintain a continuous inventory on what cloud services your people are using – try and catch up with people and what they’re doing to try to pre-empt them. For example, if they’re using Google Docs a lot, make it an official service to use, then you can manage it more effectively

2)    As you’re updating, renovating, replacing legacy systems – consider whether to instead use the cloud – carry out a full cost/benefit analysis of every service

3)    Go and use the big public cloud services where possible as they have solutions around the world, and the best communications backbone to support them

“Mobility is the new normal”

The growth of hybrid cloud solutions is also helping to create a new normal for a mobile workforce, where business smartphones are a core part of business implementation and delivery. At the start of the year some predicted mobility would become a much more dominant factor within the business landscape. While it is true that enterprise mobility is on the rise, we should not lose sight of the fact most of what we do and achieve is done at a desk.

The fact is that mobility really means more than just the device that fits in your pocket. Technology development means that bulky laptops are being replaced by powerful tablets. The Microsoft Surface Pro, for example, has the power of a laptop but the mobility of a tablet that enables an interface where the user can work anywhere in the same way that they would in a traditional office environment.

What does this mean for companies? It means that when selecting software, flexibility is key. It simply has to work across a wide range of devices. This is particularly important when you consider that there are three main groups of users; casual, professional and general.

Casual users are driven by what works best for them, and will choose devices to match this wish. This is where you will find the widest array of devices and platforms. Professional users, such as a mobile workforce, are usually more open to being supplied with a certain device to fit with their needs, but remember they also double up as casual users too as they will want to do simple tasks like checking email. General office users are those based in the office with little mobile movement.

When considering an organisation’s mobility policy businesses need to:

1)    Decide whether to try and control the devices and apps people use, or let people choose for themselves? But bear in mind not everyone will agree with your policy (particularly if it impinges on their freedom) and may opt to use their own devices

2)    Be platform agnostic, especially if you choose not to control the devices people choose. Services need to operate across all three major mobile operating systems, because people will choose what works best for them, not necessarily what works best for you.

“Underwhelming wearables”

A major buzzword in mobility is wearables. It’s an area where there has been disappointment in 2015 as it hasn’t come true in the way many had hoped it would – Google Glass was arguably one of the highest profile wearable flops on the consumer market. While it’s still a very interesting avenue the scale simply hasn’t happened in 2015. What’s interesting is that others are now looking at this differently. Sony, for example, is designing smart glasses that will be used by professionals, not consumers as Glass originally was due to be.

So what should the IT department do when considering a wearable policy?

1)    Wait. Watch the market and monitor for interesting innovations but don’t necessarily invest yet, there’s probably still more to come

2)    Don’t think that they will necessarily replace established methods. Using a warehouse as an example, many already have audio instructions delivered by an earpiece and workers use finger-mounted barcode scanners. Make sure you’re thinking through the real difference wearable technology will make, and the value it will add

“Internet of Things will become about software not hardware, platforms not devices”

The Internet of Things (IoT) has spawned a wide variety of quirky ideas, from smart fridges that can tell you when you need more milk to smart homes that ‘know’ you’re home and can control the heating accordingly. In truth though we’re some way from seeing IoT in the mainstream.

Industrial examples of IoT do crop up, though they are hardly commonplace – it’s a slower game. This is largely because examples of IoT in the field tend to be unique solutions to a given challenge, and so standardisation is limited. The benefits and techniques of IoT are not commonly understood and it is a broadly unproven technology, so it takes a far-sighted business to see how it could best use IoT. Then, from a practical standpoint, that business would need to investigate and install the various components required to make a solution work, and it would have to learn how to go about doing business in a way that takes advantage of the technology and either reduces costs or drives revenue growth.

With that in mind it’s important to consider the following when debating whether to roll out IoT:

1)    Do you have the money to invest in it now and will it actually deliver a return on your investment?

2)    Start at the end. Think about what your end goal will be before you think about whether it’s worth that initial investment

“Investment in Software-as-a-Service will grow”

Software-as-a-Service (SaaS) is now a commonly used phrase, with many predicting a rapid uptake by business. PriceWaterhouseCoopers (PwC), for example, has predicted $78 billion will be invested by 2016.

There are a range of options when purchasing SaaS solutions. The cheaper and potentially easier – at the start – is buying a solution off the shelf that someone else controls. While this may be useful in some situations, in a context where a degree of control is required this can cause pain for the organisation – having an update forced upon your team when they’re in the middle of a big project isn’t going to help the company. In some instances, you will require more control over the solution, and need to be able to make special requests and time updates to fit with the company demands.

This is, of course, in contrast to the growth of a hybrid cloud infrastructure, because the SaaS model often relies on third party architecture. Deploying software platforms into the cloud can be fast, secure and cost-effective, but only if it fits with the company. SaaS won’t work for every business, because every business is different. If, for example, you’re a startup that doesn’t want to or isn’t able to build out its IT team, a SaaS model makes sense. But if your company is security heavy with multiple firewalls and restrictions, it may be that a private cloud infrastructure without SaaS is a better direction – it really depends on the context as to whether this is a good model and will help to decide if this growth really will continue at this level.

There are two alternatives to this model that organisations could implement. Multitenant and single tenant. Multitenant works where you have lots of companies operating within the same database system, for example a large multinational with many brands with the parent company, and this can work for them. However, it does mean you are restricted as to what type customisations and configurations you can make.

The other primary alternative is single tenant, which can be much more effective. Organisations pay on a subscription basis with access to a hybrid cloud solution that incorporates a degree of SaaS and security through the private cloud partition. This enables the individual business to choose what it wants according to its needs, without constraints, and is much more secure.

Choosing a SaaS model to fit your organisation’s needs therefore requires thought and you should consider the following before diving in:

1)    Think about the level of control you need. If you’re running a mail server then you won’t need much, but if you’re developing a business critical solution you need as much control as possible, and this affects the investment decision

2)    Seriously consider the single tenant option, as it can create a more secure environment that is able to adapt to the needs of the business

There’s no doubting we’re on course for more impressive developments within IT, and the next few years will be an exciting time to work in the industry. What will be interesting to see is what the ‘next big thing’ is and if, under scrutiny, predictions around it are actually likely to come true.

Featured

How we use phones to avoid human contact

A recent study by Kaspersky Lab has found that 75% of people pick up their connected device to avoid conversing with another human being.

Published

on

Connected devices are becoming essential to keeping people in contact with each other, but for many they are also a much-needed comfort blanket in a variety of social situations when they do not want to interact with others. A recent survey from Kaspersky Lab has confirmed this trend in behaviour after three-quarters of people (75%) admitted they use a device to pretend to be busy when they don’t want to talk to someone else, showing the importance of keeping connected devices protected under all circumstances. 

Imagine you’ve arrived at a bar and you’re waiting for your date. The bar is busy, and people are chatting all around you. What do you do now? Strike up a conversation with someone you don’t know? Grab your phone from your pocket or handbag until your date arrives to keep yourself busy? Why talk to humans or even make eye-contact with someone else when you can stare at your connected device instead?

The truth is, our use of devices is making it much easier to avoid small talk or even be polite to those around us, and new Kaspersky Lab research has found that 72% of people use one when they do not know what to do in a social situation. They are also the ‘go-to’ distraction for people even when they aren’t trying to look busy or avoid someone’s eye. 46% of people admit to using a device just to kill time every day and 44% use it as a daily distraction.

In addition to just being a distraction, devices are also a lifeline to those who would rather not talk directly to another person in day-to-day situations, to complete essential tasks. In fact, nearly a third (31%) of people would prefer to carry out tasks such as ordering a taxi or finding directions to where they need to go via a website and an app, because they find it an easier experience than speaking with another person.

Whether they are helping us avoid direct contact or filling a void in our daily lives, our constant reliance on devices has become a cause for panic when they become unusable. A third (34%) of people worry that they will not be able to entertain themselves if they cannot access a connected device. 12% are even concerned that they won’t be able to pretend to be busy if their device is out of action.

Dmitry Aleshin, VP for Product Marketing, Kaspersky Lab said, “The reliance on connected devices is impacting us in more ways than we could have ever expected. There is no doubt that being connected gives us the freedom to make modern life easier, but devices are also vital to help people get through different and difficult social situations. No matter what your ‘connection crutch’ is, it is essential to make sure your device is online and available when you need it most.”

To ensure your device lifeline is always there and in top health – no matter what the reason or situation – Kaspersky Security Cloud keeps your connection safe and secure:

·         I want to use my device while waiting for a friend – is it secure to access the bar’s Wi-Fi?

With Kaspersky Security Cloud, devices are protected against network threats, even if the user needs to use insecure public Wi-Fi hotspots. This is done through transferring data via an encrypted channel to ensure personal data safety, so users’ devices are protected on any connection.

·         Oh no! I’m bored but my phone’s battery is getting low – what am I going to do?

Users can track their battery level thanks to a countdown of how many minutes are left until their device shuts down in the Kaspersky Security Cloud interface. There is also a wide-range of portable power supplies available to keep device batteries charged while on-the-go.

·         I’ve lost my phone! How will I keep myself entertained now?

Should the unthinkable happen and you lose or have your phone stolen, Kaspersky Security Cloud can track and protect your device from data breaches, for complete peace of mind. Remote lock and locate features ensure your device remains secure until you are reunited.

 

Continue Reading

Featured

Five key biometric facts

Due to their uniqueness, fingerprints are being used more and more to quickly identify and ensure the security of customers. CLAUDE LANGLEY, Regional Sales Manager, for Africa at HID Global Biometrics, outlines five facts about the technology.

Published

on

How many times in a day are you expected to identify yourself? From when you arrive at work you are required to sign in, visiting your bank, receiving healthcare services… The list is endless. When a system knows who you are, you are able to do any number common, everyday activities. Your identity is unique and precious. It is also easily stolen and the target of many hackers across the globe. Technology is constantly evolving alongside the criminal element, always looking for ways to protect data and identity. One such solution happens to be biometrics and it is rapidly gaining traction in our increasingly complex modern world.

Reliable, secure and fundamentally YOU, unique biometric traits such as fingerprints are being used by banks, enterprises and consumers to verify identity. Biometric solutions offer significant identity protection because they use unique biological details to ensure an account is only accessed by the account holder, a door only opened by the owner. Here are five things that are little known about this technology…

  • The uncut identity. Your fingerprint is unique to you. Nobody can use a copy of it to impersonate you. Good technology is capable of scanning down into the layers of the fingertip to differentiate unique elements of a person’s fingerprint, this data is then encrypted and used as a key to unlocking whichever physical or virtual door that the biometric system protects.
  • The living proof. No, there is nothing to the stories of fingerprints being used without their owner’s knowledge or permission. Biometric solutions can use specific variables to determine if the finger used to access the system is that of a present, living person.  A copy or a fake cannot be used to access a cutting-edge biometric solution.
  • Easy and convenient. Queues and documents and paperwork may well be a thing of the past should biometrics take a firmer grip of government and banking systems. The process of registering is easy, and access to identity documents and records is yours alone.
  • Security blanket. A thousand passwords and a hundred post-it notes stuck on walls and drawers.  An excel file with a list of sites and applications and their corresponding passwords, all a thing of the past.  Nobody needs to remember their password with biometrics, they only need to show up.
  • Anywhere is cool. Schools, airports, networks, offices, homes, toilets, banks, libraries, governments, border controls, immigration services, call centres, hospitals and even clubs and pubs – knowing “who” matters and biometrics can quickly and conveniently confirm your identity where needed.

Continue Reading

Trending

Copyright © 2018 World Wide Worx