Download presentation
Presentation is loading. Please wait.
Published byTamara Chown Modified over 3 years ago
1
8 0 02 Trends for 2008 And Trivia from 2007 Terry Bledsoe January 17, 2008
2
Trends for 2008 And trivia from 2007 http://money.aol.com/special/hot-products-2007
3
Surfing Will Slow
4
Email 90% Spam User generated content
5
digital picture frames http://www.economist.com/science/displaystory.cfm?story_id=10410912 http://flickr.com/ http://www.digiframes.com/related/1017-4820/WiFi-Digital-Picture-Frames-Sungale-AW15B-WF.html WIFI.
6
IP IPTV IP Surveillance IP Monitoring IP GPS Locating IPIPIPIPIPIPIPIPIP….
7
Implications…… Management of end-user devices – Training – Storage – Security (information and device) Clear expectations for usage WAN Optimization Proper planning and programming for applications
8
Surfing Will Detach
9
700 MHz Channels 52 to 69 Reserve Bid $4.6 Billion Bidders: AT&T, Google, and Verizon “open access” Public Safety Access
10
G Phone Open Handset Alliance ??? Core Business
11
Needs on and off Ramps to the Knowledge Sources and Knowledge Users
12
“open access”
13
“to everything”
14
The new personal computer….. The simple cell phone is a relic Laptops replace desktops personal use / business use
15
Implications…… The Public will expect more services from government online Management of end-user devices is an accelerating challenge. – Support – Cost – Security (information and device) Clear polices on the use of personal devices for business Proper selection of resources – Desktop vs laptop Expected Life Participate in planning future of Public Safety spectrum
16
Surfing – and everything else computer related – will open
17
Linux Vista Gutsey Gibbon “open applications”
18
https://wiki.ubuntu.com/GutsyGibbon http://www.pidgin.im/ http://www.openoffice.org/ http://www.mozilla.com/ http://www.mysql.com/ http://www.evolutionemail.com/ http://www.alfresco.com/ https://www.google.com/a/ Gutsey Gibbon
19
Implications…… More vendors building on open platforms Better applications available to more people Could be support issues Movement to an open standard
20
Applications Still Job One http://www.economist.com/science/displaystory.cfm?story_id=10410912 https://wiki.ubuntu.com/GutsyGibbon
21
Hardware Software Peripherals Capacity Users
22
External Internal Applications Linked to
23
PeopleSoft Portal
24
XML ODF PDF MARS project
25
Implications…… Realize program and data may reside anywhere in the world Web 2.0 applications Skills needed in Internet application development and interactive user interface Collaboration – the network indispensible Be careful choosing applications – must be able to integrate – standards Be aware of formats
26
IT Job Skills for 2008 What’s hot Project management skills and certifications Security experience Business process understanding Communication skills, especially writing and teaching expertise The ability to manage remote workers and virtual teams What’s not Software development and programming Quality assurance Technical certifications http://www.networkworld.com/etm/2007/122007-etm-jobs-matter.html Skills in highest demand VoIP Unified Communications Convergence Virtualization Security
27
12 IT Skill That Employers Can’t Say No To Machine learning Mobilizing applications Wireless networking Human-computer interface Project management General networking skills Network convergence Open-source programming Business intelligence systems Embedded security Digital home technology integration.Net, C #, C++, Java – with an edge http://www.networkworld.com/news/2007/071107-12-it-skills-that-employers.html?page=1
28
Attack Trends from 2007 Attacks today are often aimed at a smaller target – with the goal of monetary gain. Increased professionalization and commercialization of malicious activities Threats are increasingly tailored for specific regions. Increase in multi staged attacks. Attackers targeting victims by first exploiting trusted entities. Attackers are rapidly adapting new techniques aimed at circumventing the constant improvements in protection. The effort to find and fight these malicious techniques and strategies must also evolve. www.symantec.com/ISTR2007
29
Government Attack Trends from 2007 Government accounted for 26 percent of data breaches that could lead to identity theft. Of the potential infections by the top 50 malicious code samples, 65 percent were threats to confidential information. The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting, such as a USB key. Hacking was responsible for 73 percent of identities exposed during the period. 36% of the top attacks were SMTP-based. 46% of malicious code that propagated did so in email attachments www.symantec.com/ISTR2007
31
Adaptive Security More than the endpoints Decisions everywhere Virtual environments
32
Implications…… Government records are a big source of identity threat and we must recognize that fact. Good policies and procedures are needed for all devices. Mobile devices offer additional security challenges. Mobile devices require special security training. Training in security practices needs to be ongoing. Security practices will at times be a burden but users must understand the importance.
33
Going Green Energy Efficient machines Machine disposal Consolidation of equipment using VM ON/OFF Switch Think before you print Archiving solutions Be honest: This is more about cutting cost than saving the planet
34
What really matters….. Networks matter – Metcalfe’s Law Security matters Technology advances matter Consumers really matter Sense of purpose
35
Sellers from the Future…….. BIG
36
Big Sellers from the Future Pharma Fruit http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
37
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm RFID Blocker
38
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Glacier Water
39
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Reputation Accounts
40
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Social Network Movie Tickets
41
Tagged and Shared BoingBoing http://www.boingboing.net/http://www.boingboing.net/ Catawba County http://www.catawbacountync.gov/http://www.catawbacountync.gov/ Symantec Government Internet Security Threat Report www.symantec.com/ISTR2007 www.symantec.com/ISTR2007 The Economist http://www.economist.com/science/displaystory.cfm?story_id=104 10912 http://www.economist.com/science/displaystory.cfm?story_id=104 10912 Facebook http://www.facebook.com/http://www.facebook.com/ Flickr http://flickr.com/http://flickr.com/ My Space http://www.myspace.com/http://www.myspace.com/ YouTube http://youtube.com/http://youtube.com/ Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.
42
Research IP Surveillance: Prepare for New Demands on Network Operations, Info-Tech Advisor: Research Note, Published: January 08, 2008 2008: Leveraging the Valuable, Rejecting the Hype, Info-Tech Advisor: Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.
Similar presentations
© 2018 SlidePlayer.com Inc.
All rights reserved.
Ppt on principles of object-oriented programming in java Ppt on networking related topics on meteorology Ppt on knowledge management Ppt on job evaluation and merit rating Team based pay ppt online Ppt on australian continent flags Ppt on content development manager Ppt on inhabiting other planets like ours Ppt on unity in diversity symbol Ppt on nanocomposites