Select Page
Cybersecurity Challenges in the Age of IOT

Cybersecurity Challenges in the Age of IOT

In a recent blog, I took the time to explain what the IoT (internet of things) is and how it has changed the landscape of technology. The internet of things, or the connection of devices to the internet, is a double-edged sword that both simplifies and complicates our lives. These connected devices are accessed through the internet and can identify themselves to other devices, using embedded technology to interact with their surroundings. Some may argue that change and progress are inevitable, so there will always be new technologies, and while there may be no stopping the dawn of an age where our lives are inextricably bound to the internet, we should at least be prepared to manage it.

The connection of so many objects to the internet makes our world more vulnerable to hackers. If so many things all connect back to a shared database, it raises some alarming questions. Does that mean our watches could be hacked? Our cars? Even our homes? “Paradoxically, the very principle that makes the IoT so powerful- the ability to share data instantly with everyone and everything- creates a huge cybersecurity threat,” the Harvard Business Review reports.

Hackers are already clever, devising new methods to access personal information and confidential data. The Internet of Things could make it even easier for hackers, because all it would take is one flaw in the security chain to open the gate to a wealth of exploitable data. Here are some stats on how authoritative the Internet of Things has become and why we should be concerned:

Some stats

  • A survey from Cisco predicts that 50 billion devices will be connected to the internet by 2020
  • A Hewlett Packard study revealed that 70 percent of IoT devices contain serious security flaws.
  • IoT is becoming a leading topic of conversation in the information technology sector; at the 2014 Black Hat Conference, many discussions were centered around it.


One of the major threats the Internet of Things poses is terrorism attacks. It’s not just data and personal information at stake, but national security. The Internet of Things gives hackers the ability to craft attacks not just from public networks, but also from private sources such as cars, smartphones, voice-activated devices like the Amazon Echo, and even appliances. As entire cities embrace the power of the internet to become “smart,” it also opens to door to large-scale attacks.

In order to derive the full benefits of the Internet of Things and prevent cyber attacks, the technology industry must actively take measures to leverage its best security practices and be vigilant about keeping systems updated with the most advanced antivirus software.

AI is the Key to Data

AI is the Key to Data

The Internet is truly all-present today. It contained 4.4 zettabytes of data as of 2013, and by 2020 is expected to hit 44 zettabytes. However, a huge portion of that data –an estimated 70% to 80%– is unstructured, and therefore not useful for companies that process and analyze data. This unstructured data, known as “dark data” includes things such as images and text.

Recently, companies have begun exploring how to use AI, or artificial intelligence, to unlock some of the information contained in this dark data. AIs would be able to find useful information and convert it into more useful formats. To this end, computer scientists at Stanford created DeepDive, a tool that could extract dark data.

Then, in 2015, MacArthur Genius Grant recipient Christopher Ré, along with Michael Cafarella, Raphael Hoffmann, and Feng Niu, founded Lattice, a company dedicated to the concept of data extraction with AI. Lattice was recently acquired by Apple, which hopes to expand into the artificial intelligence market. Prior to its acquisition, Lattice went largely unnoticed by the general public, although it certainly didn’t escape the gaze of tech companies. Lattice is at the forefront of AI development, and has even been talking with companies like Amazon and Samsung about how to improve their own artificial intelligence programming.

Why is it so important to be able to analyze dark data? Today, data is a multibillion dollar industry, and everyone from start-ups to world governments are trying to get in on it. It can be used in everything from advertising and medicine to international policing and paleontological research. The net has become a place where major financial transactions take place, where global market trends become apparent, and where crimes are committed and solved. More data means that the companies that analyze this data can see patterns more easily, and see these patterns on a broader range of subjects. Structuring dark data would make analyses much more effective.

Meanwhile, more and more companies are investing in artificial intelligence. The AI market value is expected to double this year, from 6.43.7 million dollars in 2016. The increased accessibility of data likely to result is bound to raise concerns about internet privacy, but also a slew of exciting possibilities for the coming years.

Inspiring Quotes from Female Technology Leaders

Inspiring Quotes from Female Technology Leaders

It used to be that technology was a man’s field- women could busy themselves with the housekeeping and childrearing and leave the math and science to the men. The modern workforce has seen some drastic changes since the days of the doting housewife. Women now dominate 56% of the professional workforce, for the first time in history surpassing the number of men holding professional jobs. While men continue to dominate the technology sphere, the paradigms have largely shifted. Women may only hold 28% of software jobs and 25% of IT jobs, with 11% of executive positions at Fortune 500 companies being held by women and 5% of tech startups owned by women, but they have made significant gains in a relatively short span of time.

Names like Sheryl Sandberg, Virginia Rometty, Marissa Mayer, and Arianna Huffington would not be in circulation today if it were not for the combined efforts of female leaders in business and technology around the world. Women have made some pretty incredible contributions to some of the biggest names in business, so it’s about time they be recognized for their accomplishments. I’ve compiled some of my favorite quotes from women in technology that demonstrate the meaning of “girl power” and remind me why the work I do as a woman IT executive is so important and inspirational. Here are a few that stand out from female tech leaders both past and present, and well-known and less-recognized:

1. “If there is something that you really want to do, if you believe in it…simply keep forging forward because success will come.”– Cassandra Sanford, Co-Founder and CEO of KellyMitchell Group.

2. “A ship in port is safe, but that is not what ships are for. Sail out to see and do new things.”– Rear Admiral Grace Hopper, U.S. Navy’s oldest active-duty officer at the time of her retirement and developer of the first compiler for a computer programming language. She coined the terms “computer bug” and “debugging.”

3. “Leadership is about making others better as a result of your presence and making sure that impact lasts in your absence.” –Sheryl Sandberg, Chief Operating Officer (COO) of Facebook.

4. “I always did something I was a little not ready to do. I think that’s how you grow. When there’s that moment of, ‘Wow, I’m not really sure I can do this,’ and you push through those moments, that’s when you have a breakthrough.”


“If you can find something that you’re really passionate about, whether you’re a man or a woman comes a lot less into play. Passion is a gender-neutralizing force.” — Marissa Mayer, CEO of Yahoo since 2012 and Google’s first female engineer.

5. “Most engineers like to proceed from A to B to C in a series of logical steps. I’m the rare engineer who says the answer is obviously Z and we will get on with that while you guys work out how to do all the intermediate steps. It makes me a dangerous person to employ in IT but a useful one.” –Sophie Wilson, designer of the Acorn Micro-Computer and its programming language, BBC BASIC.

#IoT: The Internet of Things, Explained

#IoT: The Internet of Things, Explained

The hashtag is consistently trending on Twitter and tossed around in business jargon. You may have even used it in your own tweets, but do you really know what “the Internet of Things” is and what it means? You know what the internet is (obviously) but do you know how to properly use the term and understand it as more than just a concept?

The Internet of Things, as it’s defined, actually seems quite simple but there is a lot that goes into it, from the devices and platforms it encompasses to how it’s implemented in various industries. The Internet of Things refers to the connection of devices to the internet beyond the obvious players like cell phones and computers. Business Insider defines it as “a network of internet-connected objects able to collect and exchange data using embedded sensors.” Think appliances with voice command technology, wearable devices, and personal assistants like Alexa. But that’s just the most basic definition. In order to really understand the Internet of Things, you’ll have to understand everything that goes into it, and the internet is essentially its own galaxy. It’s important to have at least a basic understanding of the Internet of Things because this interconnected network of things that we have come to call the IoT runs our lives. According to Gartner, by 2020 there will be over 26 billion connected devices.

Because there are so many pieces at play, it helps to break it down into categories. Here are the main devices, platforms, industries, and trends you should know about that make up the Internet of Things.


It’s important to realize that the devices that comprise the IoT are not themselves “smart”; it’s the sensors they contain that are intelligent. Devices are just the instruments through which sensors operate. Without the sensors gathering, measuring, and evaluating data, these machines that can communicate with each other would be useless. “The internet of things really comes together with the connection of sensors and machines,” says Wired. These devices can include anything from wearables like smartwatches to smart street lights to smart coffee machines to smart cars- even smart cement to prevent infrastructure problems! Really, nothing is off limits.


As Business Insider explains, you can think of platforms as the bridges between devices’ sensors and the data networks that they tap into to connect to the internet and each other. You probably already have a general understanding of platforms as the software and hardware that support application functions; however, in the specific context of the Internet of Things, “platforms are designed to deploy applications that monitor, manage, and control connected devices,” according to McKinsey & Company. Some of the most popular platforms today, to name a few, are Amazon Web Services, Cisco IoT Cloud Connect, and Microsoft Azure.


The power of the IoT can be harnessed and applied to virtually all industries. It only makes sense that some of the major players are the huge tech companies like Apple, Google, Amazon and Comcast. However, according to Business Insider, there are three primary groups that will benefit from the IoT: consumers, governments, and ecosystems. Among those groups, a variety of industries including manufacturing, infrastructure, oil/gas, mining, utilities, transportation, insurance, retail, hospitality, defense, logistics, connected home, health care, agriculture, banks, food service, and smart buildings will be the most affected. The IoT is not off-limits to anyone. Virtually no industry is left untouched.


The IoT is a fluid, dynamic entity that is subject to the rapidly-changing tides of technology. As such, it can be difficult to predict precisely what the future of IoT looks like. One area that seems to have immense potential for growth is smart cities. Smart devices could tap into transportation networks, helping us to reduce waste and increase efficiency for energy use. Sensors could be used to improve infrastructure as well as driving safety, alerting drivers to hazards. Stoplights could be equipped to streamline traffic. As you can see, the impact here is huge. According to Wired, “When we start making things intelligent, it’s going to be a major engine for creating new products and new services.” However, with great power comes great responsibility (forgive me for the cliche). The IoT creates both opportunity and challenges. With so many devices containing sensitive information connected to the internet and each other, it raises security concerns. Another challenge for IoT will be the massive amount of data that these devices must be equipped to store and process.

The Internet of Things still has some challenges to sort through before it becomes a fully-functioning force, but as we can see, it is already well on its way to becoming just that. Until that day when our lifestyles are completely defined by the IoT, it pays to at least be educated on what it is and how it could impact your life.

International Women’s Day Celebrates Women in Technology

International Women’s Day Celebrates Women in Technology

International women’s day was celebrated by women all around the world this Wednesday, March 8. Google’s doodle of the day featured 13 inspiring women who made history. Women changed their profile pictures on Facebook to have a red frame, red being the color of the movement. Marches, strikes, and lectures took place across the globe. Snapchat even changed some of its filters to include famous women from history. Here are just a few of the demonstrations that were held around the world: In Tbilisi, Georgia women stood under a symbolic “glass ceiling”; thousands of women (and men) marched through Rome to protest wage inequality, discrimination, and violence against women; women in Buenos Aires left work for a one-hour strike, women in Paris staged a rally for gender equality beginning at 3:40pm (the time of day when Frenchwomen symbolically stop being paid as a result of the 26 percent pay gap with men), and women in the U.S. took to the streets in Washington DC and New York City.

This annual celebration, which has officially been in existence since 1911, is a celebration and recognition of all women throughout history. It both celebrates the accomplishments made by women and also acknowledges that major disparities still exist and gender equality, even 106 years after the event’s founding, has not yet been achieved. While International Women’s Day is a day to celebrate all women from all fields and walks of life, this year in particular had an emphasis on women in science and technology.

Women in science and technology fields have been grossly underrepresented and under-appreciated since first occupying these traditionally male-occupied roles. According to the Department of Labor, women represent only 26 percent of all computer and mathematics jobs in the United States. Furthermore, according to Forbes less than 5% of women are tech leaders yet in the best-performing tech companies, more than a quarter of the leaders are female.  However, if the recent marches and demonstrations are any indication, women are acutely aware of their unequal status in society and are energized and motivated to take action by it, so perhaps times really are a changin’.

Case in point: four of the 13 women featured in Google’s doodles of influential women held technology jobs and accomplished major milestones in their professions. Ada Lovelace, born in 1915, was the world’s first computer programmer. Olga Skorokhodova came from humble and trying beginnings; she was born into a poor Ukrainian family in 1911 and lost both her sight and hearing by the age of five. In spite of these obstacles, she rose to hold several positions over her lifetime, one of which was a researcher where she established scientific works on the advancement of education for deaf-blind children.  Sally Ride, an astronaut and physicist who joined NASA in 1978 after gaining her PhD, was the first American woman and the third woman ever to go into space. Lastly, Cecilia Grierson was a physician who made significant contributions to Argentinian healthcare. Born in Buenos Aires in 1859, she became the first woman in Argentina to obtain a medical degree at a time when women were not allowed to enroll in medical school.

Social media was the main powerhouse for International Women’s Day, with Facebook, Twitter, and Snapchat all serving as engines through which women came together to express their support. Last year, Facebook launched the #SheMeansBusiness program last year to “support, celebrate and empower women entrepreneurs and women-owned businesses.” The social network also hosted a 24-hour live broadcast on Wednesday featuring women all around the words sharing their ideas and inspiration. The theme for this year’s International Women’s Day, #BeBoldForChange was trending on Twitter. Even Snapchat got involved, featuring filters of Frida Kahlo and Marie Curie.

I’ll be blunt: women still have a long way to go before obtaining total equality with men, especially in the science and technology sectors. Although schools are gradually starting to implement more advanced technology programs encompassing women, women are rarely encouraged to pursue careers in technology, with only 16% of women reporting to The Mirror they’ve had a career in technology suggested to them compared with 33% of men. The World Economic Forum predicts it will take until 2186 for the gender gap to close completely.

These statistics may appear to be grim, but I am inspired by women every day. As the Senior Client Director at Gartner, I represent one of the few women leaders in technology and I credit my own drive and determination for getting there. Women have the tools at the their disposal to achieve great things. We may not always receive the support we should, but together we can create change.

Tips for Starting a Career in Consulting

Tips for Starting a Career in Consulting

As the Senior Client Director of Gartner, the world’s leading information technology research and advisory company, I bring over 20 years of consulting experience to the job, driving IT initiatives for Fortune 500 companies. At Gartner, I help businesses understand IT at an executive level to solve internal and external needs utilizing data and analytics.

That probably sounded like a whole lot of tech talk, without explaining exactly what I do. Consulting is a vital aspect of many businesses and you’ve probably heard of it before and know it has something to do with giving advice in a certain field. Some consultants are self-employed, while others (like myself) were hired into a consulting position for a company. As important as consulting work is for companies across all fields to help them increase revenue and cut costs, consulting can be somewhat difficult to define because it encompasses different industries. It also, as Forbes explains in the example of a beauty consultant contestant on The Bachelorette, sometimes gets a bad rap. There’s a famous saying: “Consultants take your watch and tell you what time it is.”

I can assure you, consulting work is much more complex than the stereotypes make it seem, and it’s also one of the most important and lucrative professions in the United States. A survey from the Association of Management Consulting Firms reported that entry-level consultants earn an average annual salary of $58,000 while senior consultants can earn up to $259,000, on average. Even when the economy is in decline, there will always be a need for consultants.

So, how does one become a consultant? Consulting isn’t one of those jobs that perfectly aligns with a given college major. There is no one, straight path to becoming a consultant. However, if you think you want to get into consulting, here are a few tips to help you get started:

  1. Evaluate if this is the right field for you. I have found consulting to be a rewarding and fulfilling career path, but it’s not for everyone. Consulting is a lot of work, but if you really enjoy what you do, it won’t feel like work. You should be aware of the demands of the job though. Consulting will most likely require you to travel often, and you will need to have a flexible schedule and work ethic to adapt to whatever the job requires. As Forbes explains, “ The job also requires you to share ideas, explain concepts, and present findings almost on a daily basis.” So you should be an excellent communicator. In consulting, you shouldn’t shy away from an occasional late night at the office. If you want to get ahead in the field, you’ll have to do whatever it takes to get the job done. If you’re someone who enjoys challenging yourself and pushing yourself to new limits, consulting could be your key to a successful and happy life.
  2. Make sure you have the required skills and attributes. I’ve touched on some of these already, but certain personalities are better suited for consulting work than others. You don’t need an MBA to break into consulting; skills and ambition are the most important factors when it comes to getting the job. You should have demonstrated leadership skills, an ability to work well under stress, and excellent problem-solving, management, communication, and computer skills.
  3. Know what to expect and become an expert in the industry. You should come across as informed and invested in this field if you want to ace your interview for a consulting job and begin a career. Read up on the typical trajectory for consulting jobs, the job titles and descriptions, the responsibilities, and how to prepare sample proposals for clients.
  4. Decide if you want to work as a consultant for a firm or company, or be self-employed. Plan accordingly. There are two main paths to a career in consulting- you can either apply directly to a consulting firm or a consulting position within a company, or if you’re an entrepreneurial type, you may want to offer your own services on a freelance basis. Your strategy will be different depending on which path you decide to take; for instance, you should familiarize yourself with the interview process if your goal is to work for a firm, and you’ll need to come up with a gameplan if you plan on going solo, such as advertising and pricing your services.

With these tips in mind, you should be able to evaluate if a career in consulting is right for you, and if you find that it is, don’t be afraid to go for it! The first step to accomplishing any goal is having the drive and motivation to do so, and from there, you start planning for your future. 

Domenica Cresap Examines the Yahoo Hack

Domenica Cresap Examines the Yahoo Hack

On September 22, Yahoo announced that 500 million users’ email accounts had been hacked in 2014. The stolen information, according to, includes:

  • Names
  • Email addresses
  • Telephone numbers
  • Dates of birth
  • Hashed passwords (which is a way of taking a variable-length password and creating a cryptic, fixed-length password from it)
  • Encrypted or unencrypted security questions and answers

Rumors about the hack had surfaced in August, but it wasn’t until September that the company “admitted” to the security breach by what it believed to be a “state-sponsored actor,” which essentially implies culpability from a government who is financially supporting a third party engaged in non-violent cyberterrorism.

However, many are skeptical about Yahoo’s “state-sponsored” claims with one expert telling Computerworld that “This just doesn’t reek of nation-state activity. Nation-states are after intellectual property. They don’t give a damn about emails and passwords from a Yahoo account.”

On the other hand, though, a possible hypothesis could be that a “government might have been interested in targeting the email accounts of human rights activists.”

It seems that hypotheses is pretty much all the public has right now as Yahoo has been tightlipped about what, specifically, it knows about the hack and the hackers. For now, Yahoo is eschewing transparency; it has yet to provide evidence supporting its theory.

This week, Senator Mark Warner (D-VA) asked the U.S. Securities and Exchange Commission to “investigate whether Yahoo and its senior executives fulfilled obligations to inform investors and the public about a hacking attack affecting 500 million user accounts.” Furthermore, Warner wants the SEC to find out if Yahoo has been accurately representing the nature of the security breach. In a letter to SEC Chairwoman Mary Jo White, Warner said,“Disclosure is the foundation of federal securities laws, and public companies are required to disclose material events that shareholders should know about.”

Although the hacking incident happened in 2014, consumers might still want to take a few safety precautions, say the experts at  What precautions, you ask? First, change your password. Also, turn on Yahoo’s two-step verification process and/or take advantage of Yahoo’s account key.  Then, as always, be vigilant about watching out for fraudulent activity on your credit cards or bank statements.

Domenica Cresap is an Illinois-based expert in information technology whose career has spanned many years. Currently, Domenica serves as the Senior Client Director at Gartner, one of the country’s largest research and advisory firms providing information technology related insight.


Domenica Cresap: The Year’s IT Trends

Dell as of late supported a review, which was PBS led. More than 1,200 online meetings were finished amongst April and May with individuals in the U.S., U.K., Japan, Germany, China, Brazil, and India. Of those talked with, 500 were BDMs (business chiefs) and 700 were ITDMs (data innovation leaders). These two parts have a place with individuals in an organization who settle on choices about enhancing the business and what dangers might be worth taking. ITDMs particularly concentrate on the presentation and utilization of innovation into a business, while BDMs concentrate on more broad business rehearses.

Already, states of mind between the two gatherings did not adjust as to IT in their organizations. The objective of the study was to assess how these chiefs saw the future and significance of IT in connection to their organizations. Another objective was to make sense of the development of ITDM and BDMs sees toward innovation use in the business area. Dell then discharged the consequences of their overview in the most recent couple of weeks with some fascinating patterns appeared.

A standout amongst the most fascinating general aftereffects of the review is discovering that ITDMs and BDMs have much nearer sees toward IT in their organizations than is normally anticipated. As of late, it appears that these two gatherings have gone to a comprehension about present and future IT patterns.

Here’s a breakdown of the information, gave by Dell, where the two gatherings overwhelmingly concur:

ITDMs (62 percent) and BDMs (51 percent) concur that distributed computing is the most essential innovation pattern for their organizations

By 2:1 edges, both ITDMs and BDMs say they will utilize more open server farm advancements later on

Eighty-six percent of ITDMs and 85 percent of BDMs concur that process driven is the best way to deal with addition an adaptable, versatile and open server farm

In spite of the fact that the two gatherings concur, generally, there are still a few contrasts between their perspectives. For instance, these distinctions are:

ITDMs (84 percent) are significantly more prone to assert their business has a key IT arrangement than BDMs (70 percent)

ITDMs (86 percent) say that their business would advantage a great deal more from a custom fitted IT structure than BDMs do (77 percent)

BDMs (43 percent) will probably say their business has not started utilizing programming characterized arrangements than ITDMs are (57 percent)

How could these distinctions happen? It appears the two gatherings are in agreement in regards to the significance of future IT advancement and use in their organizations, however when gotten some information about current patterns, BDMs for the most part said IT was not being as used as the ITDMs claim it may be. It appears that this error could be primarily because of an absence of correspondence amongst ITDMs and BDMs. Rather than handing-off choices and current IT rehearses, the ITDMs step up and handle the new innovation themselves rather than additionally talking with the BDMs about it.

Domenica Cresap: Predictions for the IT of Tomorrow

In a late report for, the tech news and investigation site, Bernard Golden condenses the “4 rule that will shape the fate of IT.”

Brilliant, named by as one the ten most compelling individuals in distributed computing, offers a far reaching review of the inclining scene in the business. In the article, Golden convincingly presents the defense that “IT is experiencing a significant change.”

Here, a few highlights from his gathering.

Knowledge #1: Don’t Get Ubered.

Your business “could be disturbed by a Silicon Valley startup that is reconfiguring an industry esteem chain and being energized by unending investment,” Golden composes. With the movement to digitization, customary enterprises (i.e. taxi organizations on account of Uber) are powerless. The charge? Try not to be caught unaware. Think computerized.

Knowledge #2: Keep Up with the Software Shift

As per Goldman:

“Inside the general twisting rebuilding of the economy, it’s not entirely obvious the huge change going in the innovation business itself. The movement to a product driven world ought to redound to the gigantic formal of the huge innovation firms, yet they’re stuck in an unfortunate situation, as well. Rather than procuring the addition of other people being compelled to concentrate on innovation, huge merchants are themselves experiencing the progressing movement to programming.”

In spite of the fact that it may be regardless of your better judgment, take after the open source trail.

Knowledge #3: Stop Trying to Netflix-ize Your Company

It comes down to restricted capacity, clarifies Goldman:

“In spite of the best expectations, the normal venture IT association doesn’t have the cash to draw in great ability. It’s unrealistic to be equipped for outlining its own application surroundings. Notwithstanding attempting to influence the Netflix devices is prone to be past its capacities, in light of the fact that the instruments require top ability to adjust and work them for an organization’s own surroundings.”

You can meet your future without re-graphing another organization’s past.

Understanding #4: Embrace Easy Implementation

Because of numerous organizations powerlessness to resemble Netflix, says Goldman, “new open source offerings will arrive that join critical segments into preconfigured stacks that can be executed as-seems to be, along these lines decreasing the capability required to utilize them.”

The Importance of Information Technology

Domenica Cresap on the importance of IT

Information Technology (IT) isn’t just for computer nerds anymore. No longer are the letters “IT” associated with the computer whiz who you reach via your employer’s help desk when your computer is acting wonky.

These days, “accurate business planning, effective marketing, global sales, systematic management, real time monitoring, instant customer support and long term business growth cannot be achieved at the optimum level without IT,” writes Abid Afzal Butt, a UK-based researcher and IT consultant.

Butt and other researchers attest that when companies “invest in technology and choose the path of innovation,” they set themselves up to be more competitive and have a greater market share. “Information technology is the only technology which provides you the opportunity to analyze specific data and plan your business journey accordingly,” writes Butt in “The Role of Information Technology in Business Success.”

IT is largely about problem-solving to achieve business goals, whether that’s managing (and promoting) business growth or utilizing software entities, cloud computing or the various tools of  modern communication that technology affords.

But “modern communication” also applies to facilitating internal communication and processes within a company. “It is very hard for the top management to manage all the resources manually,” writes Butt. So, IT resources bolster the efforts of human resources, financial and employee services and other tangible functions that keep organizations running smoothly.

Says Butt:

“A decade ago, most of the resource management solutions were desktop based. Thanks to the internet and cloud technology which enables software engineers to introduce cloud based ERP (Enterprise Resource Planning)

The emerging trends predict a future where IT will continue weaving its way into the fabric of our increasingly plugged-in and virtually-computing world. While those of us who work directly with IT departments can see these trends and changes up close and personal, the consumerization of IT will encourage more technologies to be widely adopted.

The world of IT is constantly growing and evolving; the next decade will surely bring a host of new changes, too.