© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.

Slides:



Advertisements
Similar presentations
3. Introduction to Strategic Information Systems Planning (SISP)
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Internet Applications
IBM Corporate Environmental Affairs and Product Safety
Discovering Computers Fundamentals, 2012 Edition
Supporting New Business Imperatives Creating a Framework for Interoperable Media Services (FIMS)
© Robert G Parker – UW-CISA 2010 S-1 New and Emerging Technologies 3 - New and Emerging Technologies.
1 Functional Strategy – IS & IT Geoff Leese November 2006, revised July 2007, September 2008, August 2009.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Barriers to Digital Education Michael Bispo. 2.NO Selling Advertisers on Digital.
NEMA. 2 Utility Metering vs. Submetering 10/11/2014 New PowerPoint Template Utility Meter Meter provided by utility with the purpose of measuring.
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
By Adam Balla & Wachiu Siu
IBM SPSS Solutions A SELECT INTERNATIONAL COMPANY.
GREEN CLOUD By Sphoorthy. LOGO WHAT IS CLOUD COMPUTING? Cloud computing is a model for enabling convenient, on- demand network access to a shared pool.
1 Case Study ESTABLISHING NATIONAL CERT By Saleem Al-Balooshi Etisalat - AE.
1 Knowledge Management. 2  Knowledge management (KM) is a process that helps organizations identify, select, organize, disseminate, and transfer important.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
Windows 7 & Office 2010 Glenn Osako Partner Territory Manager West Region SMB Microsoft Corporation Best productivity on a modern foundation.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Building Sustainable MIS Infrastuctures
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Management Information Systems
Introduction to Computers. Objectives Overview Describe the five components of a computer Discuss the advantages and disadvantages that users experience.
Smart Buildings Srirangarajan Kadaba National Manager – Energy Edge Buildings Business Schneider Electric 21June 2010.
Partnerships and collaboration Working together: good for business, good for research I work for business.gov.au but also thought it would be a good opportunity.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Dell Connected Security Solutions Simplify & unify.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Brought to you by ince, an integrated communications agency Powered by intralinks SECURE ENTERPRISE COLLABORATION IN THE CLOUD.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Increasing Manufacturing Uptime Is Made Easier with RtTech’s Industrial Facilities Application RtDuet, Powered by the Microsoft Azure Cloud MICROSOFT AZURE.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
 Abstract of Green Computing  Green computing, green IT or ICT Sustainability, refers to environmentally sustainable computing or IT. In the article.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Fundamentals of Information Systems, Sixth Edition Chapter 1 Part A An Introduction to Information Systems in Organizations.
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
Saasabi’s Analytical Processing Engine in the Cloud Makes Business Intelligence Affordable for Everyone COMPANY PROFILE: Saasabi Saasabi is a BizSpark.
 TECHNOLOGIA is a startup company in Bangalore in 2007 which is completely owned by emirates telecommunication corporation- ETISALAT.  It has helped.
Internet of Things. Creating Our Future Together.
Internet of Things Business Case Template. Powered by InfoTech, provided by Atlantic BT Summarize the business case for analyzing the Internet of Things.
BIG DATA. The information and the ability to store, analyze, and predict based on that information that is delivering a competitive advantage.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Internet of Things, Are You Ready?. Contents ●Introduction ●IoT Examples? ●IoT Benefits ○For Industries ○The Internet of Things In Organizations ○The.
Information Technology Acceptable Use An Overview
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Office 365 is cloud-based productivity, hosted by Microsoft.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Emerging Trends in Information Technology
MIGRATING TO NEW TECHNOLOGY
Basic Introduction to Computers
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Home Internet Vulnerabilities
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 Business Intelligence TOP TECHNOLOGY TRENDS Business intelligence encompasses the processes, tools and techniques designed to harvest critical information from the large volumes of data within the organization. This is a long-established concept but what brings it into the foreground as a 2012 trends is the increasing ease of the technology and the degree to which analysis has left the central IT department and moved to the control of revenue generating businesses. The latest versions of Microsoft’s SharePoint and the success of visualization technologies like Tableau enable the businesses demand for analytical insights without the perceived delays associated with formal development methodologies. What is it?

© 2012-Robert G Parker May 24, 2012 Page: 2 © 2012-Robert G Parker May 24, 2012 Page: 2 © 2012-Robert G Parker May 24, 2012 Page: 2 © 2012-Robert G Parker May 24, 2012 Page: 2 Business Intelligence TOP TECHNOLOGY TRENDS Why is it Important? Business intelligence traditionally affords management the opportunity to gain additional insight into the performance of an organization, and the use of that information to achieve corporate goals. The new technologies accelerate the businesses abilities to take advantage of the vast amounts of data available 104 Flavours Mix Your Own Captures Significant Business Intelligence

© 2012-Robert G Parker May 24, 2012 Page: 3 © 2012-Robert G Parker May 24, 2012 Page: 3 © 2012-Robert G Parker May 24, 2012 Page: 3 © 2012-Robert G Parker May 24, 2012 Page: 3 Business Intelligence TOP TECHNOLOGY TRENDS Issues and Risks While there are enormous advantages to businesses, there are some control issues that need to be considered. Probably the most important risks are associated with the quality of the insights. Quality will depend on the integrity of the data and the relevance and accuracy of the analysis. As it becomes easier to put together data from multiple sources, the risks of inappropriate aggregations increases. The lack of common data definitions will easily become an impediment. While business units can now more easily create analyses, multiple analyses may have the unfortunate side effect of increasing the need for reconciliations or rationalizations.

© 2012-Robert G Parker May 24, 2012 Page: 4 © 2012-Robert G Parker May 24, 2012 Page: 4 © 2012-Robert G Parker May 24, 2012 Page: 4 © 2012-Robert G Parker May 24, 2012 Page: 4 Business Intelligence TOP TECHNOLOGY TRENDS Issues and Risks Two groups may even use the same data but create analyses that on the surface look inconsistent. The ability to quickly rationalize differences will be important in maintaining trust in the information presented. Data loss and quality entropy become more likely as control of the data moves into the hands of “end-users.” Typically the analysis means the data is held closer to the business and beyond the reach of the central controlled environments. Clumsy analysis based on non-causal relationships that randomly appear relevant may cause incorrect decisions

© 2012-Robert G Parker May 24, 2012 Page: 5 © 2012-Robert G Parker May 24, 2012 Page: 5 © 2012-Robert G Parker May 24, 2012 Page: 5 © 2012-Robert G Parker May 24, 2012 Page: 5 Security TOP TECHNOLOGY TRENDS What is it? Security encompasses the protection mechanisms that protect an organization’s IT systems and data from unauthorized access, use, disclosure, manipulation or destruction, and enables organisations to take advantage of new technologies responsibly Security touches on all the other trends we are seeing such as cloud computing, virtualization, mobility, social networking, big data, legislative compliance and IT Governance. The security challenge today is how to define and enact effective security in a rapidly changing technical, business and user environment

© 2012-Robert G Parker May 24, 2012 Page: 6 © 2012-Robert G Parker May 24, 2012 Page: 6 © 2012-Robert G Parker May 24, 2012 Page: 6 © 2012-Robert G Parker May 24, 2012 Page: 6 Security TOP TECHNOLOGY TRENDS What is it Important? Secure use of personally owned technology for business purposes (i.e. Bring your own device Enterprise owned devices are configured and maintained to perform business functions, are connected to an enterprise network and typically have controls over their Internet and usage. Personally owned devices generally lack these kinds of controls. The usage and controls of personally owned devices and enterprise owned devices tend to be very different

© 2012-Robert G Parker May 24, 2012 Page: 7 © 2012-Robert G Parker May 24, 2012 Page: 7 © 2012-Robert G Parker May 24, 2012 Page: 7 © 2012-Robert G Parker May 24, 2012 Page: 7 Security TOP TECHNOLOGY TRENDS What is it Important? In addition to being used for business purposes, they enable owners to connect to the Internet directly or through a home router and to use their computers for entertainment purposes, such as playing games, watching videos, shopping, and communicating with friends through social media. Owners freely download and install application software and transfer files between external sources. These different usage patterns mean that personally owned devices tend to be exposed to a different mix of computer threats than enterprise owned devices.

© 2012-Robert G Parker May 24, 2012 Page: 8 © 2012-Robert G Parker May 24, 2012 Page: 8 © 2012-Robert G Parker May 24, 2012 Page: 8 © 2012-Robert G Parker May 24, 2012 Page: 8 TOP TECHNOLOGY TRENDS What is it Important? Security in mobile technology New technologies such as smart phones, tablets, Wi-Fi hotspots and downloadable apps are becoming main stream. However, mobile technology is relatively recent and there has not been time for security to reach a satisfactory level of maturity. Security Security threats with social engineering Cybercriminals have long used social engineering to deceive users into disclosing personal information or to install software that performs malicious actions in addition to or instead of the software’s desired functions or that exploits vulnerabilities in already installed software

© 2012-Robert G Parker May 24, 2012 Page: 9 © 2012-Robert G Parker May 24, 2012 Page: 9 © 2012-Robert G Parker May 24, 2012 Page: 9 © 2012-Robert G Parker May 24, 2012 Page: 9 TOP TECHNOLOGY TRENDS What is it Important? Security Advanced persistent threats This type of computer attack differs from the opportunistic attack for financial, political or other gain that typifies most computer attacks. Some term it to be cyber-espionage. The objective of these attacks is to remain undetected in a system for a lengthy period of time in order to steal an organization’s intellectual property and use it themselves or hand it off to a competitor. Such an attack related to the proposed acquisition of the Potash Corp. of Saskatchewan by Australian company BHP Billiton Ltd. was reported in the December 6, 2011 edition of the Globe and Mail. The operators of these attacks are highly skilled, well organized and well-funded, allegedly by foreign states.

© 2012-Robert G Parker May 24, 2012 Page: 10 © 2012-Robert G Parker May 24, 2012 Page: 10 © 2012-Robert G Parker May 24, 2012 Page: 10 © 2012-Robert G Parker May 24, 2012 Page: 10 TOP TECHNOLOGY TRENDS What is it Important? Security Economic constraints of security The economic volatility of the past four years has resulted in budgetary restraint as organizations cut back expenditures and capital investment in almost all areas. Conversely, cybercriminals are becoming increasingly sophisticated and better funded by organized crime elements or, as recently reported in the media, state funded.

© 2012-Robert G Parker May 24, 2012 Page: 11 © 2012-Robert G Parker May 24, 2012 Page: 11 © 2012-Robert G Parker May 24, 2012 Page: 11 © 2012-Robert G Parker May 24, 2012 Page: 11 Green Computing TOP TECHNOLOGY TRENDS What is it? The use of “green initiatives” to make technology more environmentally friendly by reducing power consumption and encouraging responsible disposal/recycling of technology equipment Green computing or green IT, refers to environmentally sustainable computing or IT Green computing has been defined as the study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems — efficiently and effectively with minimal or no impact on the environment The goals of green computing are to reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote the effective recycling of the technology at the end of its useful life

© 2012-Robert G Parker May 24, 2012 Page: 12 © 2012-Robert G Parker May 24, 2012 Page: 12 © 2012-Robert G Parker May 24, 2012 Page: 12 © 2012-Robert G Parker May 24, 2012 Page: 12 TOP TECHNOLOGY TRENDS Green Computing Why is it Important? Apart from the benefits of consuming less electricity, green computing will establish the organization as environmentally conscious. With the growing trend for companies to embrace sustainable practices, stakeholders will view environmentally conscious business decisions favourably. Green IT can be tied to brand management Business Positives of Adopting Green IT

© 2012-Robert G Parker May 24, 2012 Page: 13 © 2012-Robert G Parker May 24, 2012 Page: 13 © 2012-Robert G Parker May 24, 2012 Page: 13 © 2012-Robert G Parker May 24, 2012 Page: 13 TOP TECHNOLOGY TRENDS Green Computing Issues and Risks Failure to establish appropriate systems may result in a lack of environment information and a loss of carbon credits The organization may incur more costs due to unfriendly environmental practices which lead to inefficient use of resources Carbon sensitive business partners may avoid the organization’s products or services Green computing initiatives will need to be sustainable in the long term and will require appropriate data measurement and capture systems Failure to address green computing could result in increased costs through carbon taxes and other fines and penalties