Trends for 2008

martencrushInternet and Web Development

Dec 8, 2013 (3 years and 11 months ago)

75 views

Trends for 2008

And Trivia from 2007

Terry Bledsoe

January 17, 2008

Trends for 2008

And trivia from 2007

http://money.aol.com/special/hot
-
products
-
2007


Surfing Will Slow

Email

90% Spam

User generated content

digital picture frames

http://www.economist.com/science/displaystory.cfm?story_id=10410912

http://flickr.com/


http://www.digiframes.com/related/1017
-
4820/WiFi
-
Digital
-
Picture
-
Frames
-
Sungale
-
AW15B
-
WF.html


WIFI

.


IPTV

IP Surveillance

IP Monitoring

IP GPS Locating

IPIPIPIPIPIPIPIPIP….

Implications……


Management of end
-
user devices


Training


Storage


Security (information and device)


Clear expectations for usage


WAN Optimization


Proper planning and programming for
applications

Surfing Will Detach

MHz

Channels 52 to 69

Reserve Bid $4.6 Billion

Bidders:

AT&T, Google, and Verizon

“open access”

Public Safety Access

Open Handset Alliance

??? Core Business

Needs on and off Ramps to the
Knowledge Sources and Knowledge
Users

Needs on and off Ramps to the
Knowledge Sources and Knowledge
Users

“open access”

“to everything”

The new personal computer…..

The simple cell phone is a relic

Laptops replace desktops

personal use
/

business use

Implications……


The Public will expect more services from government
online


Management of end
-
user devices is an accelerating
challenge.


Support


Cost


Security (information and device)


Clear polices on the use of personal devices for business


Proper selection of resources


Desktop
vs

laptop


Expected Life


Participate in planning future of Public Safety spectrum

Surfing


and
everything else computer
related


will open

Gutsey Gibbon

“open applications”

https://wiki.ubuntu.com/GutsyGibbon

http://www.pidgin.im/


http://www.openoffice.org/


http://www.mozilla.com/


http://www.mysql.com/


http://www.evolutionemail.com/

http://www.alfresco.com/

https://www.google.com/a/




Gutsey Gibbon

Implications……


More vendors building on open platforms


Better applications available to more people


Could be support issues


Movement to an open standard


Applications Still Job One

http://www.economist.com/science/displaystory.cfm?story_id=10410912

https://wiki.ubuntu.com/GutsyGibbon


Hardware

Software

Peripherals

Capacity

Users

External

Internal
Applications

Linked to

PeopleSoft
Portal

ODF

PDF

MARS


project

Implications……


Realize program and data may reside anywhere in
the world


Web 2.0 applications


Skills needed in Internet application development
and interactive user interface


Collaboration


the network indispensible


Be careful choosing applications


must be able
to integrate


standards


Be aware of formats



IT Job Skills for 2008

What’s hot


Project management skills and
certifications


Security experience


Business process
understanding


Communication skills,
especially writing and teaching
expertise


The ability to manage remote
workers and virtual teams

What’s not


Software development and
programming


Quality assurance


Technical certifications

http://www.networkworld.com/etm/2007/122007
-
etm
-
jobs
-
matter.html


Skills in highest demand


VoIP


Unified Communications


Convergence


Virtualization


Security

12 IT Skill That Employers Can’t Say No To


Machine learning


Mobilizing applications


Wireless networking


Human
-
computer interface


Project management


General networking skills


Network convergence


Open
-
source programming


Business intelligence systems


Embedded security


Digital home technology integration


.Net
, C #, C++, Java


with an edge


http://www.networkworld.com/news/2007/071107
-
12
-
it
-
skills
-
that
-
employers.html?page=1


Attack Trends from 2007


Attacks today are often aimed at a smaller target


with the
goal of monetary gain.


Increased professionalization and commercialization of
malicious activities


Threats are increasingly tailored for specific regions.


Increase in multi staged attacks.


Attackers targeting victims by first exploiting trusted
entities.


Attackers are rapidly adapting new techniques aimed at
circumventing the constant improvements in protection.


The effort to find and fight these malicious techniques and
strategies must also evolve.

www.symantec.com/ISTR2007

Government Attack Trends from 2007


Government accounted for
26 percent
of data breaches that could lead to
identity theft.


Of the potential infections by the top 50 malicious code samples,
65 percent
were threats to confidential information.


The primary cause of data breaches that could lead to identity theft was the
theft or loss of a computer or other medium
used for data
storage or transmitting , such as a USB key.


Hacking

was responsible for
73 percent
of identities exposed during
the period.


36% of the top attacks were SMTP
-
based.


46%

of malicious code that propagated did so in
email attachments

www.symantec.com/ISTR2007

Adaptive Security


More than the endpoints


Decisions everywhere


Virtual environments

Implications……


Government records are a big source of identity
threat and we must recognize that fact.


Good policies and procedures are needed for all
devices. Mobile devices offer additional security
challenges.


Mobile devices require special security training.


Training in security practices needs to be ongoing.


Security practices will at times be a burden but
users must understand the importance.




Going Green


Energy Efficient machines


Machine disposal


Consolidation of equipment using VM


ON/OFF Switch


Think before you print


Archiving solutions


Be honest: This is more about cutting cost
than saving the planet

What really matters…..


Networks matter


Metcalfe’s Law


Security matters


Technology advances matter


Consumers really matter


Sense of purpose

Sellers from the Future……..

Big Sellers from the Future

Pharma
Fruit

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm


Big Sellers from the Future

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm



RFID

Blocker

Big Sellers from
the Future

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm


Glacier
Water

Big Sellers from the Future

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm


Reputation Accounts

Big Sellers from the Future

http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm


Social Network
Movie Tickets

Tagged and Shared


BoingBoing

http://www.boingboing.net/


Catawba County
http://www.catawbacountync.gov/



Symantec Government Internet Security Threat Report
www.symantec.com/ISTR2007


The Economist
http://www.economist.com/science/displaystory.cfm?story_id=104
10912


Facebook

http://www.facebook.com/



Flickr

http://flickr.com/



My Space
http://www.myspace.com/




YouTube
http://youtube.com/








Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on t
his

page.
References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.

Research


IP Surveillance: Prepare for New Demands on
Network Operations
, Info
-
Tech Advisor:
Research Note, Published: January 08, 2008


2008: Leveraging the Valuable, Rejecting the
Hype, Info
-
Tech Advisor:




Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on t
his

page.
References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.