- 14 January, 2013 11:58
Change is a given in this business, but 2013 promises to be particularly interesting because of the convergence of multiple, transformative developments, none of which are new, per se, given we have been tracking them in depth for some time, but each of which is forcing us to rethink long held conventions.
2013 IT OUTLOOK: Innovation trumps cost-cutting
Cloud computing tops the list of course, giving us totally new ways to think about how to deliver IT services. At this point, every IT decision seems to include some consideration of cloud. And we're certainly still in the midst of the consumerization craze, trying to piggyback on worker enthusiasm for these mobile productivity tools while still safeguarding the company jewels. Lots of questions remain, but many opportunities stretch out before us.
Newer to the scene is software-defined networking, but SDN momentum going into this new year is huge and we are sure to see important advances. The big question for 2013 is whether the movement progresses as a whole, or is subverted by the established providers as they scramble to protect their installed base by offering SDN-like tools but without adhering to the emerging standards.
There are other promising new techs too (big data, for example), so strap in and hold on. IT in the new year promises to be one for the record books.
Read more about infrastructure management in Network World's Infrastructure Management section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- OAIC releases privacy impact assessment guide for consultation
- Some Australian businesses 'unlikely' to be ready for Privacy Act changes: survey
- BYOA 'shadow IT' grows in the enterprise: Telsyte
- Cost of a Privacy Act breach could extend to ongoing audits: legal expert
- How Hunter Water is saving $50k a year in software licences
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Implementing an Effective Vulnerability Management Program
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.
CMO's Customer Engagement in a Multi-Channel Marketing World
In CMO’s inaugural customer engagement report, we look at how Australian marketers and customer relationship managers are responding to the needs for cross-channel engagement, where the barriers still lie and the importance being placed on these activities by their wider organisation.
Bell Gully Law Firm Success
Read this whitepaper to find out how one of New Zealand’s oldest leading law firms was able to remove tangible risk to the business and enhance productivity by rapidly deploying an improved fundamental Unified Communication solution.