Adam's 2012 Tech Predictions

Editor’s note: We have asked each of our researchers to pull together considerations meant to help in your planning for 2012. We solicit your feedback on all these predictive posts. bg 
 

Prediction is a messy game. Especially in a field that is often characterized by a state of punctuated equilibrium—long periods of stasis and then rapid disruptions. However, I will toss my hat into the ring. 

The geopolitics of cybersecurity will take center stage. Certain visitors from the Land of the Pandas have been stealing a lot of our things. We’ve known they are stealing our things for a while. So what’s going to change? The increasingly aggressive nature of cyber-reconaissance and cyber-theft by geopolitical competitors is coming at a time of growing tension in the non-tech world. DOD’s concern over cyberwarfare is propelled by its larger anxiety over the anti-acccess/maritime denial challenge and a shift in the dynamics of the power game in the Pacific. Expect cyber to become more of a diplomatic and strategic issue, seen largely through the lens of Pacific geopolitics.

Mark Zuckerbeg will continue to build a user-populated total information awareness engine, and users will complain vigorously–but let him do it anyway. With every Facebook upgrade, the company moves closer towards the Platonic ideal of a complete database of one’s personal life. But no reasonable alternative exists–and users will complain without actually taking any steps to seriously deter the company from continuing to erode privacy. Expect more invasive platform changes.

A high-profile mobile device security breach will occur. Given the panoply of security problems with the introduction of networked mobile devices into the workplace, an truly embarrassing security breach may be one of the unavoidable growing pains. Within the federal or defense industry world such a breach may temporarily retard the growth of the mobile federal ecosystem.

Single-author blogs will continue their slide into the abyss. Unless you are a recognized figure in a certain community of practice or have a corporate sponsor (such as a magazine or think-tank), you are unlikely to generate much value out of your blog. Multiple-author blogs generate high page views and provide an interplay that keeps unique visitors coming back for more. The professionalization of blogging and the rise of sponsored content further hurts single-author blogs. Of course, there is a “long tail” effect that some can exploit.

Swarms will continue to grow as important as networks. The dominant metaphor for the information age is the network. But swarming will increasingly be enabled by technologies that allow one human to control masses of autonomous machines. As John  notes, this is true of both drones and botnets.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.

 

solid
About AdamElkus

Adam Elkus is a PhD student in Computational Social Science at George Mason University. He writes on national security, technology, and strategy at CTOvision.com and the new analysis focused Analyst One, War on the Rocks, and his own blog Rethinking Security. His work has been published in The Atlantic, Journal of Military Operations Foreign Policy, West Point Counterterrorism Center Sentinel, and other publications.

Trackbacks

  1. [...] Up Call” and the Snooze Button (ctovision.com)The PC is Changing Before Our Eyes (bobgourley.com)Adam’s 2012 Tech Predictions (ctovision.com) /**/ Article source: [...]

  2. [...] Adam’s 2012 Tech Predictions (ctovision.com) [...]