On November 7, China’s top legislature adopted a cybersecurity law to safeguard the sovereignty on cyberspace, national security, and the rights of citizens. The law has seven chapters that define specific regulations in various areas, such as network …
The rise of mobile networks, improved wireless tech, and rapid sensor innovation over the past 10 years has enabled companies to use internet-connected sensors and actuators to improve business operations and transform products. The ever-increasing num…
I’m pleased to announce that Forrester’s cloud computing predictions for 2017 published this morning!
Check out Predictions 2017: Customer-Obsessed Enterprises Launch Cloud’s Second Decade. Our cloud team has gathered ten key developments in cloud computing that will shape this industry in 2017 — and what you should do about them today.
Cloud computing has been the most exciting and disruptive force in the tech market in the last decade, and it will continue to disrupt traditional computing models at least through 2020. Starting in 2017, large enterprises will move to cloud in a big way, and that will super-charge the market. We predict the influx of enterprise dollars will push the global public cloud market to $236B in 2020, up from $146B in 2017.
Cloud platforms from the global megacloud providers like Amazon Web Services, Microsoft, IBM, Google, Salesforce, Oracle, Centurylink and SAP will set the pace, accelerating adoption of private cloud and hosted private cloud as well. In 2017, you need to:
- Get your private cloud and SaaS strategy in shape in 2017 — start now!
- Educate yourself about exciting developments in hyperconverged infrastructure, security, networking, and containers.
- Take a fresh look at your regional and industry-specific cloud providers — specialization is afoot.
In the full report, we break down the 10 things you need to know about cloud computing in 2017, and actions to take for each. This essential reading highlights these 10 trends:
Some CIOs and enterprise architecture (EA) pros believe that business process management (BPM) is on the opposite side of agility — but they don’t realize that BPM technology itself is also evolving. Agility-oriented BPM platforms are the foundation o…
Continuing on the theme of predictions, here are a few more, which focus on global IT trends, business architecture, OTTF and Open Group events in 2013. Continue reading →
Joel Brenner, the author of “America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare,” discusses how corporate data and supply chains remain vulnerable to cyber crime attacks in a podcast with Dana Gardner. Mr. B…
The core dilemma in public cybersecurity: Balancing boundarylessness and data security. The solution isn’t easy, but long-term, it lies in not relying on the security of the pipes or the perimeter, but improving the trust and security of the data itself. Security needs to be associated with data and people; not the connections and routers that carry it. Continue reading →