| |December 20164CIOReviewEditorialEditorialAs 2016 draws to a close we at CIOReview have witnessed technologies that have shed the trends tag and have donned the role of a prerequisite for everyday enterprise IT work methodologies Big data and the cloud, combined with the Internet of Everything, will showcase the true potential of Information Technology as they push the boundaries between sci fi and real life. Sensors are being embedded not only in cars, but in everyday devices, and are in turn leading to what Gartner refers to as the Digital Mesh. Embedded sensors have the potential to harness vast amount of data from seemingly lesser known sources which in turn will help us gather critical insights into everyday operations. The critical aspect of this would be to move away from silos and create a single point of information sharing, which would lead to greater insights. Gartner even goes on to mention that devices and sensors will become smart enough to be able to organize our lives without us even noticing that they are doing so. We at CIOReview are also excited so as to how the applications of 3D printing have caught the eye of enterprises and we might as well see them be useful in simulating working of engine components to understanding proper functioning of vital organs. All of the developmental procedures based on big data and IoT will translate to machines being able to learn at a rapid pace, and ultimately make smarter decisions than humans via a constant trial and error process of gathering data, and taking insights from the same. The level at which online entities can come closer to our private and professional lives have been exposed to be far greater than what anybody could have ever expected. The number of data endpoints to shore up has increased drastically as cyber criminals constantly change to swifter and more invisible methods. Another aspect that drives a majority of security trends in India is application security. Data resides behind the application and attackers have understood that in today's world, data equates to money! Hence the target is towards the same. Incidentally threat intelligence is also gaining traction with organizations expanding threat intelligence capabilities drastically. These capabilities are varied by providers, but mostly involve monitoring the Internet for indicators that a particular company, its products, services, websites or personnel are being targeted. Do let us know what you think Vignesh AnantharajManaging Editorvignesh@cioreviewindia.com2016 A Memorable year for CIOReview PublisherEditor-in-ChiefManaging EditorOffice Editorial queries editor@cioreviewindia.comAdvertising queriessales@cioreviewindia.comBangaloreTel 080 43112203DelhiTel 011 45992100 To subscribeVisit www.cioreviewindia.com/magazine-in or send email to: subscription@cioreviewindia.comCover price is Rs 150 per issueAshok KumarVirupakshi PattarSales & MarketingAmrit SinghKirankumar HLRavi KalgiAlok ChaturvediPradeep ShankarVignesh AnantharajCIOReviewGroup Art DirectorVP - Sales & MarketingMagendran PerumalCirculation ManagerEditorial TeamChitra MishraEmmanuel Christi DasSuchita GonsalvesVinisha Paiva CIOReview No. 124, 2nd Floor, Surya Chambers, Old Airport Road, Murugheshpalya, Bangalore-560017MaitreyeeCIOReviewVOL 4 · ISSUE 7 - 5 · DECEMBER 19 - 2016ManjunathSr. VisualizerVisualizerPrinted and published by Alok Chaturvedi on Behalf of BizprintMedia Technologies Pvt Ltd and Printed at Precision Fototype Services at Sri Sabari Shopping Complex, 24 Residency Road Bangalore-560025 and Published at No. 124, 2nd Floor, Surya Chambers, Old Airport Road, Murugeshpalya, Bangalore-560017. Editor Pradeep ShankarCopyright © 2016 BizprintMedia Technologies Pvt Ltd, All rights reserved. Re-production in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher.
<
Page 3 |
Page 5 >