We also believe there will be a move by large industry players such as Amazon Web Services, Azure, and Heroku who have all experienced significant growth this year, to create cloud offerings. However, they'll need to have sufficient amounts of capital behind this move to provide an effective and secure solution. Rushing to get the services to market means they could lack substance and be extremely vulnerable to breaches.
3. Together we are stronger
2015 saw a surge of mergers and acquisitions within the tech industry. According to an EY research study, the percentage of technology executives expecting to pursue acquisitions more than doubled in 2015, and is set to continue to grow into 2016. Shrinking margins are pushing IT companies to buy, sell, and grow in order to meet the challenges of an innovative and efficient business.
Looking forward into 2016, deals in the technology space are being driven by a number of desires; greater access to valuable IP, talent procurement, product enhancement, disruption, and expansion are just some of the primary motivators. As M&As increase, particularly amongst leaders, the boundaries between tech and other industries are blurred by advances towards disruptive innovations such as healthcare IT, mobile payments, and cybersecurity.
4. The security of things
With everything now being connected in some way to the Internet, and even the network, the IoT trend is becoming every hacker's dream, creating a pathway to potentially harmful data when in the wrong hands. These threats don't just affect the workplace, but personal and public space too. Gartner recently stated that "by year-end 2018, 20 percent of smart buildings will have suffered from digital vandalism" such as plunging buildings into darkness and defacing digital signage. These hacks may just seem like only nuisances at the moment, but there are potential safety threats such carjacking which could compromise protection and security.
According to FireEye and SingTel, Southeast Asian companies regularly attract the interest of cyber spies and criminals looking to steal information about the region's growing industry sectors-energy, telecommunications, high-tech, transportation, and finance which could lead to potential security treats, some of which could threaten the very foundation of human safety.
It's therefore predicted that hacks, which affect personal safety, will continue to emerge. Whether it is a stove turning itself on in the middle of the day, controlling a car remotely, or a hospital device hack, the dangerous lack of security within IoT will make the need for human intervention and network management a much higher priority.
5. Containing the future
Containers, from tech players like Google, Docker, CoreOS, and Joyent, have become a key area of discussion in the cloud computing space. Organizations across all major industries, from finance to e-commerce, want to better understand what containers are, and how they can best be used for IT operations scenarios. This growth in awareness, and the success of disruptive webscale companies like Google, Amazon, and Netflix® have led to increased evaluations in IT organizations to try and glean some differentiated value from integrating containers.
Sign up for Computerworld eNewsletters.