Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

2008 Trends

1,024 views

Published on

Trends for 2008 and implications for local government.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

2008 Trends

  1. 1. Trends for 2008 And Trivia from 2007 Terry Bledsoe January 17, 2008 8 0 0 2
  2. 2. Trends for 2008 And trivia from 2007 http://money.aol.com/special/hot-products-2007
  3. 3. Surfing Will Slow
  4. 4. Email 90% Spam User generated content
  5. 5. <ul><li>digital picture frames </li></ul>http://www.economist.com/science/displaystory.cfm?story_id=10410912 http://flickr.com/ http://www.digiframes.com/related/1017-4820/WiFi-Digital-Picture-Frames-Sungale-AW15B-WF.html WIFI .
  6. 6. IP IPTV IP Surveillance IP Monitoring IP GPS Locating IPIPIPIPIPIPIPIPIP….
  7. 7. Implications…… <ul><li>Management of end-user devices </li></ul><ul><ul><li>Training </li></ul></ul><ul><ul><li>Storage </li></ul></ul><ul><ul><li>Security (information and device) </li></ul></ul><ul><li>Clear expectations for usage </li></ul><ul><li>WAN Optimization </li></ul><ul><li>Proper planning and programming for applications </li></ul>
  8. 8. Surfing Will Detach
  9. 9. 700 MHz Channels 52 to 69 Reserve Bid $4.6 Billion Bidders: AT&T, Google, and Verizon “ open access” Public Safety Access
  10. 10. G Phone Open Handset Alliance ??? Core Business
  11. 11. Needs on and off Ramps to the Knowledge Sources and Knowledge Users
  12. 12. Needs on and off Ramps to the Knowledge Sources and Knowledge Users “ open access”
  13. 13. “ to everything”
  14. 14. The new personal computer….. The simple cell phone is a relic Laptops replace desktops personal use / business use
  15. 15. Implications…… <ul><li>The Public will expect more services from government online </li></ul><ul><li>Management of end-user devices is an accelerating challenge. </li></ul><ul><ul><li>Support </li></ul></ul><ul><ul><li>Cost </li></ul></ul><ul><ul><li>Security (information and device) </li></ul></ul><ul><li>Clear polices on the use of personal devices for business </li></ul><ul><li>Proper selection of resources </li></ul><ul><ul><li>Desktop vs laptop </li></ul></ul><ul><li>Expected Life </li></ul><ul><li>Participate in planning future of Public Safety spectrum </li></ul>
  16. 16. Surfing – and everything else computer related – will open
  17. 17. Linux Vista Gutsey Gibbon “ open applications”
  18. 18. https://wiki.ubuntu.com/GutsyGibbon http://www.pidgin.im/ http://www.openoffice.org/ http://www.mozilla.com/ http://www.mysql.com/ http://www.evolutionemail.com/ http://www.alfresco.com/ https://www.google.com/a/ Gutsey Gibbon
  19. 19. Implications…… <ul><li>More vendors building on open platforms </li></ul><ul><li>Better applications available to more people </li></ul><ul><li>Could be support issues </li></ul><ul><li>Movement to an open standard </li></ul>
  20. 20. Applications Still Job One http://www.economist.com/science/displaystory.cfm?story_id=10410912 https://wiki.ubuntu.com/GutsyGibbon
  21. 21. Hardware Software Peripherals Capacity Users
  22. 22. External Internal Applications Linked to
  23. 23. PeopleSoft Portal
  24. 24. XML ODF PDF MARS project
  25. 25. Implications…… <ul><li>Realize program and data may reside anywhere in the world </li></ul><ul><li>Web 2.0 applications </li></ul><ul><li>Skills needed in Internet application development and interactive user interface </li></ul><ul><li>Collaboration – the network indispensible </li></ul><ul><li>Be careful choosing applications – must be able to integrate – standards </li></ul><ul><li>Be aware of formats </li></ul>
  26. 26. IT Job Skills for 2008 <ul><li>What’s hot </li></ul><ul><li>Project management skills and certifications </li></ul><ul><li>Security experience </li></ul><ul><li>Business process understanding </li></ul><ul><li>Communication skills, especially writing and teaching expertise </li></ul><ul><li>The ability to manage remote workers and virtual teams </li></ul><ul><li>What’s not </li></ul><ul><li>Software development and programming </li></ul><ul><li>Quality assurance </li></ul><ul><li>Technical certifications </li></ul>http://www.networkworld.com/etm/2007/122007-etm-jobs-matter.html Skills in highest demand <ul><li>VoIP </li></ul><ul><li>Unified Communications </li></ul><ul><li>Convergence </li></ul><ul><li>Virtualization </li></ul><ul><li>Security </li></ul>
  27. 27. 12 IT Skill That Employers Can’t Say No To <ul><li>Machine learning </li></ul><ul><li>Mobilizing applications </li></ul><ul><li>Wireless networking </li></ul><ul><li>Human-computer interface </li></ul><ul><li>Project management </li></ul><ul><li>General networking skills </li></ul><ul><li>Network convergence </li></ul><ul><li>Open-source programming </li></ul><ul><li>Business intelligence systems </li></ul><ul><li>Embedded security </li></ul><ul><li>Digital home technology integration </li></ul><ul><li>.Net, C #, C++, Java – with an edge </li></ul>http://www.networkworld.com/news/2007/071107-12-it-skills-that-employers.html?page=1
  28. 28. Attack Trends from 2007 <ul><li>Attacks today are often aimed at a smaller target – with the goal of monetary gain. </li></ul><ul><li>Increased professionalization and commercialization of malicious activities </li></ul><ul><li>Threats are increasingly tailored for specific regions. </li></ul><ul><li>Increase in multi staged attacks. </li></ul><ul><li>Attackers targeting victims by first exploiting trusted entities. </li></ul><ul><li>Attackers are rapidly adapting new techniques aimed at circumventing the constant improvements in protection. </li></ul><ul><li>The effort to find and fight these malicious techniques and strategies must also evolve. </li></ul>www.symantec.com/ISTR2007
  29. 29. Government Attack Trends from 2007 <ul><li>Government accounted for 26 percent of data breaches that could lead to identity theft. </li></ul><ul><li>Of the potential infections by the top 50 malicious code samples, 65 percent were threats to confidential information. </li></ul><ul><li>The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting , such as a USB key. </li></ul><ul><li>Hacking was responsible for 73 percent of identities exposed during the period. </li></ul><ul><li>36% of the top attacks were SMTP-based. </li></ul><ul><li>46% of malicious code that propagated did so in email attachments </li></ul>www.symantec.com/ISTR2007
  30. 31. Adaptive Security <ul><li>More than the endpoints </li></ul><ul><li>Decisions everywhere </li></ul><ul><li>Virtual environments </li></ul>
  31. 32. Implications…… <ul><li>Government records are a big source of identity threat and we must recognize that fact. </li></ul><ul><li>Good policies and procedures are needed for all devices. Mobile devices offer additional security challenges. </li></ul><ul><li>Mobile devices require special security training. </li></ul><ul><li>Training in security practices needs to be ongoing. </li></ul><ul><li>Security practices will at times be a burden but users must understand the importance. </li></ul>
  32. 33. Going Green <ul><li>Energy Efficient machines </li></ul><ul><li>Machine disposal </li></ul><ul><li>Consolidation of equipment using VM </li></ul><ul><li>ON/OFF Switch </li></ul><ul><li>Think before you print </li></ul><ul><li>Archiving solutions </li></ul><ul><li>Be honest: This is more about cutting cost than saving the planet </li></ul>
  33. 34. What really matters….. <ul><li>Networks matter </li></ul><ul><ul><li>Metcalfe’s Law </li></ul></ul><ul><li>Security matters </li></ul><ul><li>Technology advances matter </li></ul><ul><li>Consumers really matter </li></ul><ul><li>Sense of purpose </li></ul>
  34. 35. Sellers from the Future…….. BIG
  35. 36. Big Sellers from the Future <ul><li>Pharma Fruit </li></ul>http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
  36. 37. Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm RFID Blocker
  37. 38. Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Glacier Water
  38. 39. Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Reputation Accounts
  39. 40. Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Social Network Movie Tickets
  40. 41. Tagged and Shared <ul><li>BoingBoing http://www.boingboing.net/ </li></ul><ul><li>Catawba County http://www.catawbacountync.gov/ </li></ul><ul><li>Symantec Government Internet Security Threat Report www.symantec.com/ISTR2007 </li></ul><ul><li>The Economist http://www.economist.com/science/displaystory.cfm?story_id=10410912 </li></ul><ul><li>Facebook http://www.facebook.com/ </li></ul><ul><li>Flickr http://flickr.com/ </li></ul><ul><li>My Space http://www.myspace.com/ </li></ul><ul><li>YouTube http://youtube.com/ </li></ul>Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.
  41. 42. Research <ul><li>IP Surveillance: Prepare for New Demands on Network Operations , Info-Tech Advisor: Research Note, Published: January 08, 2008 </li></ul><ul><li>2008: Leveraging the Valuable, Rejecting the Hype, Info-Tech Advisor: </li></ul>Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.

×