Welcome to the Monday edition of the IP news roundup, where you will find the latest headlines in big data, BYOD, cloud and network security:
- Big data will drive $28 billion of worldwide IT spending in 2012. A new report by Gartner predicts that this number will increase to $34 billion next year. “In 2011, big data formed a new driver in almost every category of IT spending”, says Mark Beyer, research vice president at Gartner. “However, through 2018, big data requirements will gradually evolve from differentiation to ‘table stakes’ in information management practices and technology. By 2020, big data features and functionality will be non-differentiating and routinely expected from traditional enterprise vendors and part of their product offerings.” For more findings, see the Big Data Drives Rapid Changes in Infrastructure and $232 Billion in IT Spending Through 2016 report.
- Investments in big data start-ups are on the rise. While Gartner stated that big data spending is expected to increase through 2016, an article on TechCrunch predicted that funding for big data start-ups will also increase. The article cited examples of big data start-ups that have recently received large investments, such as Splice Machine and MongoHQ. It also stated that these increases are due to a huge disruption in the market, along with “the rise of the big data app and the need for a new data infrastructure.”
- Yes, it’s true … BYOD can make your cloud more secure. While many IT managers worry about the security implications of allowing employees to use their personal devices for work, Wired.com reported that BYOD can actually lower your cloud security risks. This is because BYOD reduces the odds of user error, which is “the greatest threat to data residing in cloud services”. The article states, “If employees are able to choose the device with which they are most comfortable, it stands to reason they will also commit fewer errors when using that device. Moreover, if employees use the same BYOD hardware for personal and professional tasks, they will develop additional competence with the devices that will further reduce the likelihood of user error.”
- Confused about your cloud brokerage options? An article on the HP Cloud Source Blog offers insight into the three different types of cloud brokers, referring to “an entity that manages the use, performance and delivery of cloud services and negotiates relationships between cloud providers and cloud consumers.” According to the article, the three types of cloud brokers include those providing service intermediation, service aggregation and service arbitrage. Please see the article for a full definition of each option, along with info on the CIO’s role as a strategic service broker.
- And finally, when it comes to hackers, most people worry about keeping their networks and data safe. However, ITworld recently reported that even pacemakers can be hacked. According to research from IOActive, several brands of pacemakers can be accessed remotely and programmed to deliver a deadly 830-volt shock. Previously, medical technicians would have to wave a wand within a few metres of a pacemaker to reprogram it. However, new wireless technology has made it possible to reprogram a pacemaker from as far away as 50 feet.
What is your take on today’s news? Feel free to share your opinions below.