Gartner’s Guesses—Predictions for IT in 2018

As another year begins to draw to a close, industry experts are already looking to the future. The IT industry has been dynamic over the past few years, with innovations such as improvements in cloud computing, machine learning, and even IT management propelling it forward. At the recent Gartner Symposium/ITxpo 2017 in Orlando, FL, Gartner took a shot at the future of IT, painting a picture of the industry as being more integrated with business than ever. IT is now so central to operations that businesses can no longer afford to isolate their departments, and Gartner knows this.

Since IT is often a means of improving products/services and generating additional revenue, Gartner’s central point was that professionals in the industry will need to have a working grasp of business tactics and company goals. From there, they can set up IT departments that maximize technology usage to meet these goals. CIOs, Gartner believes, will become more integrated than ever into business operations and become important collaborators for the companies they work for.

One trend that Gartner discussed was cryptocurrency. Starting as a technological curiosity, cryptocurrencies such as Bitcoin have since attracted significant interest for their value in facilitating swift and secure transactions. While working cryptocurrency into business models has proved to be slow going, Gartner predicts that over $1 billion in business value will be derived from it by 2020. They were also optimistic about the future of IoT-enabled devices, predicting an upsurge in these products with smartphone integration.

However, there were other trends that Gartner was less bullish about. The aforementioned prediction of IoT devices came with the caveat that that billions of dollars will be necessary for companies to safely harness this technology. IoT devices are almost famously difficult to completely secure given network decentralization, and their usage would divert funds that would otherwise be spent to improve cybersecurity.

The use of AI was also the subject of controversy for Gartner, with the company citing it as a potential contributor toward a future age of digital mistrust. While they praised the ability of AI to help inform business decisions, they also believe that its use on the web will hasten the spread of false information. This has social and financial implications, with Gartner stating that a major fraud as a result of these prolific falsehoods will occur by 2020. Commercial projects to detect and halt fake news have already begun, and a tenfold increase in these projects is predicted in the coming years.

Still, IT is slated to prosper. As its role in business changes and it becomes more integral to operations, the industry is expected to grow, with a predicted 2.3 million jobs being created as opposed to 1.8 eliminated. Early adoption is, as always, important in the IT sector, and one of the latest trends, visual and voice search, may be the next big investment. Both are growing quickly, and large tech companies are expected to invest in improving their visual and voice query offering through the use of AI.

There is a lot on the horizon for IT. While these improvements will undoubtedly be a boon for the companies and individuals that harness them, a level of caution is necessary. Much of this technology is relatively untested, posing security and operational concerns for businesses. Now more than ever, a need for skilled professionals is arising to ensure that companies are able to adopt in an efficient and safe manner.

IoT and Cloud Computing: A Revolutionary Relationship

When tracing the taxonomy of breakthroughs in modern technology, two concepts stand as major stems in terms of progressive innovation: the cloud and the internet of things (IoT). The former has revolutionized the ways in which we store, share, analyze, and manage data across a large user base, speeding up the efficiency and productivity of many industries worldwide. The latter, a concept referring to the connectivity of devices across a potentially widespread network, as changed our perception of interactivity, and it too has revamped many aspects of the working world, from interconnected law enforcement resources to evolving possibilities surrounding smart cities.

Both the cloud and IoT, in themselves, are exciting and reflective of a seemingly limitless array of uses. However, what’s even more fascinating are the ways in which the two concepts are being utilized simultaneously, creating a relationship of vast potential.

Cloud complements

Cloud computing acts as a natural complement to IoT initiatives, mainly since both concepts strive to “increase efficiency in everyday tasks.” In simple terms, IoT’s basic functionality creates a large amount of data, and cloud computing essentially gives this data a “pathway” to travel upon. In an office with a growing dependence on connected technology, for instance, the cloud’s presence can help to facilitate stronger collaboration and quicker data accessibility, allowing workers to access this data both remotely and on location.

Symbiotic security

Both the cloud and IoT have been criticized in the past for potential security concerns, leading some to question their functionality and safety. Respective security debates aside, the IoT/cloud relationship is undeniably fruitful in terms of increased security and privacy measures. The basic nature of IoT has led to an increased emphasis on several aspects of functional infrastructure, namely connectivity, reliability, and computing power. The cloud, in turn, can act as a “backbone” of sorts, helping companies to address these points of interest by means of application programming interfaces (APIs) and backend databases.

Improved functionality

Since IoT is still technically a fledgling technological movement in several regards, its general handling has presented a lack of standards, which has subsequently led to breakdowns in manufacturer communication as well as device integration. However, the cloud can help to sharpen pre-existing IoT systems in terms of their fluidity and architecture. Often, data sets within current IoT systems are “siloed on separate servers,” and their accessibility suffers as a result. Cloud implementation can allow these servers to connect in a more seamless manner, cutting back on data stagnation and ultimately providing these servers with more value. In short, the cloud is able to make the already speedy IoT even faster, all while strengthening its functionality.

Forecast of Fog: How Fog Computing Could Make an Impact

When it comes to the Internet of Things, connectivity is the name of the game.

Connectivity is, in fact, the appeal of a related technology that could represent another evolution in the same vein as the cloud. In fact, it even has a similar weather-based name to go along with it.

In terms of purpose, this new concept, dubbed “fog computing,” is essentially identical to the cloud; it is still intended to allow users to store and retrieve files without the need for a costly server infrastructure. However, the difference lies in the way the data is handled. Fog computing creates a “fog” of data; scattered packets that don’t contain the whole of any file.

This approach makes it much more difficult for attackers to steal information. Any attempts to retrieve files illegitimately only allow for access to one part of the data, giving attackers a garbled, incomplete mess. This is because, unlike cloud computing, fog computing involves a network of smaller servers, called fog nodes, that distribute packets of data. Nowhere in the fog network is any file stored in its entirety.

The other advantage of fog computing is that the decentralized fog nodes enable data to be closer to the businesses that need to access it. The disadvantage of the cloud is that data still has to travel from servers to wherever it’s needed, reducing performance. Fog computing bypasses some of these concerns and enables faster data retrieval. In fog computing, data centers are smaller, easier to place, and ideally as widespread as possible.

In fact, some fog nodes are so small that they can be placed anywhere that they can connect to the network. Power poles, vehicles, and even oil rigs can host fog nodes and widen the network. Ideally, fog-enabled devices are situated at the edge, right where data is needed immediately. With this larger, less centralized network, doors open to monitor new types of data, particularly as it relates to machine to machine communications. Fog computing allows data to be analyzed and acted upon in seconds.

It’s the ideal marriage of the cloud and the Internet of Things, two concepts that have gained a lot of ground among technology and data experts in the last several years. Cloud computing, though certainly a disruptive technology, has faced scrutiny for the security issues associated with sending raw data over the Internet, particularly if sensitive data is subject to regulation. Its fog-based counterpart offers an approximation of cloud capabilities with the accessibility of IoT devices.

However, the cloud is not going away anytime soon. Fog computing is a great complement to the cloud, but does not process massive amounts of historical data the same way that the cloud does. Plus, with fog computing being an emerging technology, its capabilities may not surpass the cloud in many cases. For now, it offers businesses the opportunity to improve their data infrastructure without replacing any cloud services they might already be using.

In the future, we will see fog computing delivering valuable data that can help make business and technology more efficient and interconnected. The OpenFog Consortium is a collaboration between a number of high profile organizations, including Intel, Cisco, and Microsoft, with the intent of promoting widespread fog computing usage. After all, like other IoT devices, fog computing becomes much more effective the more devices that are integrated into the network.

Some Things Never Change—Security and the Internet of Things

There’s certainly been a lot of hype over the past few years about the Internet of Things (IoT); its potential to create a 360 view of data has many business analysts salivating. This is an appealing prospect, especially given the network effect gained from more and more enterprises and even households adopting interconnected devices. That said, before every company rushes to adopt this new technology, security concerns must be addressed first.

The problem lies in the lax security standards that most of these devices have. In an age where most individuals feel comfortable making transactions online, we think nothing of sending personal information through the web. The reason for this perhaps undue confidence in security measures is because small breaches are never newsworthy, whereas large breaches attract attention and are generally perceived as isolated incidents.

The truth is, many manufacturers, particularly those constructing IoT devices, know very little outside of the bare basics of cyber security, exposing countless sensors to potential attack. Also problematic is the lack of standards associated with devices under the overall umbrella of IoT.

One example of a problematic tendency is a lack of prompts to change passwords. Manufacturers seldom ask users to change login information from the default, and as a result, devices can be hacked en masse because few have bothered to update their information.

Of course, given how extensive these networks of devices can be, updated security may very well entail securing every single device, a process that is just as excruciating as it sounds. This is a new concern for companies that, until now, have managed to get by with a standard-issue IT department.

Until industry standards can be adopted, it becomes the responsibility of individual businesses to thoroughly vet where their devices are coming from, and study the results of previous companies that have used them. Wonderfully enough, the data is definitely there; though it may require some effort to find and interpret.

There is good news, though. As far as protecting devices goes, there are already proven tactics that IT departments can use to stay on top of things. Encryption, two-factor authentication, and vulnerability scanning can go a long way in ensuring that a company’s web communications are functional and secure.

Problematically, this issue works both ways; devices are being compromised by poor security which are in turn being used in DDOS attacks, two problems that companies will have to worry about.

As far as the defense side of things go, companies do have options in the form of DDOS detectors, as well as numerous websites detailing ways to combat these attacks and similar cyber threats. Companies will need to incorporate contingency plans into their policies for cyberattacks regardless of whether or not they make heavy use of IoT devices.

This may require spending some money to properly train your IT department in defensive best practices, but it’s worth it in the long run. The age of the IoT gives companies an ultimatum: adapt to the shifts in technology, or fall behind. That doesn’t necessarily mean completely integrating new gadgets into your workplace; just to familiarize your company with them and be prepared to incorporate them if your situation calls for it.

Caution is the name of the game. The issue with learning the technology is that it will inevitably change in the next few years. That said, it’s always worth investigating in order to stay on top of recent trends and even leverage new devices to gain a competitive advantage.

Because of these ongoing issues, IoT technology has not been widely adopted, despite the impact that it has already made. These security concerns will have to be addressed before businesses are willing to trust these devices, though, like the Internet before it, it has the potential to revolutionize business and bring a new level of data analysis to the workplace.