Sei sulla pagina 1di 40

5 Disruptors to Keep on Your Radar19| 10 Hottest Tech Skills for 201629

Computerworld
The Voice of Business Technology computerworld.com

December 2015

As IT transformation
accelerates, heres
where to focus
Your Essential To-Do List your resources.
for the Year Ahead
Volume 2, No. 5 Visit computerworld.com for breaking news, expert analysis and an archive of our digital magazines.

COMPUTERWORLD Table of Contents


P.O. Box 9171, 492 Old Connecticut Path, Framingham, MA 01701-9171 | (508) 879-0700

Editorial Senior Associate Editor


Rebecca Linke
Editor in Chief
Scot Finnie Office Manager
Editor Linda Gorgone
Ellen Fanning Contributing Editors
Executive Editors Jamie Eckle, Preston Gralla, JR Raphael
Sharon Machlis (online / data analytics)
Ken Mingis (news / strategy)
Contacts
Phone numbers, email addresses and
Managing Editors
Valerie Potter (features)
reporters beats are available online at 13 5 Fast-Track Trends: Analytics and the IoT are
Computerworld.com (see the Contacts
Bob Rawson (copy / production)
link at the bottom of the home page).
driving IT transformation. | 19 5 Disruptors: DevOps,
Senior News Editors Virtualization 2.0 and more will shake things up. |
Johanna Ambrosio (technologies) Letters to the Editor
Marian Prokop Send to letters@computerworld.com. 23 Security keeps IT leaders up at night. | 29 10 Hot
Include an address and phone number Tech Skills: IT architects and developers are in demand.
Art Director for immediate verification. Letters
April Montgomery will be edited for brevity and clarity.
Coverage begins on page 12
Senior Reviews Editor News tips
Barbara Krasnoff newstips@computerworld.com
Senior Features Editor Tech newsletters
Tracy Mayor News Analysis 3 IBM bets on data and the IoT in its Weather
Sign up now for breaking news and
Reporters more at: www.computerworld.com/ Company deal.|Opinions6Paul Glen: Auto-petulance can
Sharon Gaudin, Matt Hamblen, newsletters/signup.html. curtail career opportunities.|39Thornton A. May: IT must
Gregg Keizer, Lucas Mearian,
Patrick Thibodeau nurture entrepreneurship.|Departments8The Grill|
Editorial Project Manager
To unsubscribe from this Digital 35 Security Managers Journal|37Shark Tank
Magazine, CLICK HERE.
Mari Keefe
More on Computerworld.com
Copyright 2015 Computerworld Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission 2015 Holiday Gift Guide:Cool tech gear to suit every taste and budget.
of Computerworld Inc. is prohibited. Computerworld and Computerworld.com and the respective logos are trademarks of International Data Group Inc.

December 201 5 | Co m pute rwo r ld 2


assets from The Weather
Company for its Watson IoT
unit and its IoT Cloud platform.
Specifics of the deal, an-
nounced in late October, were
kept under wraps; its expected
be completed in the first quar-
ter of next year.
The move indicates that IBM
is serious about pushing into
the cloud and connecting the
data stored there with data be-
ing collected via the Internet of
Things. IBMs goal is to use the
combined technologies and
its Watson cognitive computing
system to provide useful data
to companies in real time.

Cloud data a draw

A
News AnalysisBuiness Intelligence
fter weeks of IBM is buying The Weather
rumors of an im- Companys mobile and Web-
IBM Bets Big on Data and pending deal, IBM based products, though not the

IoT With Weather Co. Buy has agreed to buy


Weather.com and other digital
TV-based Weather Channel.
(The TV channel will license
forecast data and analytics from
The deal shows that Big Blue is serious about beefing up its abilities to collect and synthesize data IBM under a long-term pact.)
and turn it into useful real-time information for companies. By Ken Mingis IBM is particularly interested

H a r r y C a m p b e l l i l lu s t r at i o n December 201 5 | Co m pute rwo r ld 3


News AnalysisBusiness Intelligence

in The Weather Companys their business and sensor data Theyve got to be good at under-
dynamic cloud data platform, with weather and other perti- standing questions, and they
which powers its mobile app nent information in real time, have to know about the world,
and can now handle 26 billion said John Kelly, senior vice pres- said Andrew Moore, the dean
inquiries a day. ident for IBM Solutions Portfo- of Carnegie Mellons School of
That platform is built to col- lio and Research. Computer Science.
lect data at massive speed and IBM envisions using a com- Moore, a onetime Google
scale and can analyze informa- bination of predictive weather vice president who worked on
tion from 3 billion weather analytics and real-time analy- several of the companys A.I.
sis of social media chatter to, projects, said he thought IBMs
for example, help retailers get acquisition was a smart one and
[A.I. systems] need two things: goods where they need to go added that other tech vendors
Theyve got to be good at before severe weather hits. will likely follow suit and move
understanding questions, and they To be truly effective, intelli- to enhance their own systems
have to know about the world. gent systems like Watson must with stores of data.
Andrew Moore , dean, school of Computer science , be able to tackle complex ques-
Carnegie Mellon University
tions and handle vast amounts Action, Not Entertainment
of data simultaneously. With Joel Cawley, general manager of
forecast reference points, more the purchase, IBM gets weather IBMs Information and Insight as
than 40 million smartphones data and analytics tools it can a Service unit, said the company
and 50,000 airplane flights use in multiple industries, as is looking to deliver actionable
each day. The result: IBM will well as a robust IoT platform it insights, not entertaining ones.
be collecting huge amounts of plans to extend even further to Such insights would come from
global data for deeper, more collect data from any source or weather data being integrated
relevant insights via Watson. sensor-enabled device. into decision making. Data thats
Companies using IoT sys- When you are talking about collected from countless sensors
tems will get a significant com- A.I. [artificial intelligence sys- and from comments and posts
petitive advantage as they link tems], they need two things: on places like Twitter and Face-

December 201 5 | Co m pute rwo r ld 4


News AnalysisBusiness Intelligence

book can be quickly analyzed mation from all the noisy data Between the Lines | John Klossner
during storms to provide better those sensors generate. Accord-
insights for users such as retail- ing to Moore, as more data flows
ers and even emergency man- in, the chances of something
agement operations teams. going wrong go up dramatically.
Accuracy in the retail envi-
ronment means you can do the Social media insights
forecast down to the store loca- Thats why IBM wants to analyze
tion, said Cawley. social media posts: They can pro-
The number of data sources vide context for the sterile data
around the world is explod- coming from sensors. A combi-
ing, he said, thanks to recent nation of weather data with Twit-
declines in the costs of IoT sen- ter posts has more value than if
sors used to gather information. the two sources were considered
The trick and something separately, according to Ryan
IBMs data scientists are focused Fogt, an assistant professor of
on is extracting relevant infor- meteorology at Ohio University.
The IBM-Weather Company
deal builds on a strategic alli-
ance that the two companies
You can do announced earlier this year. Watson platform go beyond ners are Engage, Macaw Speech,
the forecast Under the previous agreement, just the addition of the Weather Opentopic, StatSocial, Vennli
down to IBM licensed The Weather Companys digital assets. In and Domus Semo Sancus. u
the store Companys powerful cloud another late October announce-
location. data platform and collaborated ment, IBM revealed that six new Katherine Noyes of the IDG
Joel C awley, general
manager, IBMs with its B2B division on various partners will use Watson to de- News Service and Computer-
Information and Insight
as a Service unit products and services. velop new cognitive computing worlds Patrick Thibodeau
IBMs efforts to augment its apps and services. Those part- contributed to this story.

December 201 5 | Co m pute rwo r ld 5


Paul GlenOpinion

Paul Glen is the co-author of The Geek Leaders Handbook and a


principal of Leading Geeks, an education and consulting firm devoted to
clarifying the murky world of human emotion for people who gravitate
toward concrete thinking. You can contact him at info@leadinggeeks.com.

Overcoming Our
Auto-Petulance
Do you ever find yourself do something and your refusal Im in the throes of auto-pet- pletely done. And if the task you
resisting doing something that makes you feel like a kid deter- ulance include: I dont want resist is related to career devel-
you know you need to do? Im mined not to eat his broccoli, to go to the gym today, so Im opment, your opportunities to
not talking about everyday pro- even if it means sitting at the not going to. I dont want to progress will be curtailed, per-
crastination: wandering to the dinner table until he turns 18 answer that email now, so Ill haps severely.
refrigerator, talking to a co- and no longer has to comply move on to something else. I But auto-petulance can affect
worker or reading your favorite with his parents demands. But dont want to write that docu- more than just progress toward
news site to delay some nonpre- in this case, youre not rebelling mentation today, so Im going to your objectives. It can affect your
ferred task. Im not even talking against a parent, a boss or any work on that new project. relationships at work as well. If
about those times when you other authority figure. Youre Obviously, this sort of behav- you consistently fail to deliver
say to yourself, I dont want to refusing to do what you have told ior gets in the way of accom- on your commitments, or if the
do that, but then slump your yourself you need to do. In effect, plishing your goals. If you need quality of your work suffers, you
shoulders, hold your nose and you are rebelling against your- to complete 20 tasks to finish can end up with a bad reputa-
dive in anyway. self. I call it auto-petulance. a project and just one of them tion. A history of succumbing
Im talking about those times Im prone to it myself. Some triggers your auto-petulance, to auto-petulance can give your
when you absolutely refuse to of the things I might say when the project will never be com- supervisors and co-workers a

December 201 5 | Co m pute rwo r ld 6


Paul GlenOpinion

sense that you are disengaged, with a task that you dont want greater sense of accomplish-
unreliable or undisciplined. to do, accept that its OK to feel ment when you finish the thing
But perhaps worse, it can that way. Thats how you feel, you really didnt want to do and
give you a negative view of and you should acknowledge move on to something youd
yourself as someone who is out it to yourself. What you dont rather do. Youll start seeing
of control, lazy or temperamen- want to do is to think, I dont yourself as powerful and effec-
tally unfit for your job. Your want to do that, so Im not going tive. And who doesnt like feel-
negative judgments about your- to. Instead, you have to train ing competent?
self will extend beyond your yourself to accept that, I dont Beyond that, ask yourself
behavior to your character. And want to do that, and I will do it. how often you tell yourself,
when you think of yourself as
irreparably damaged, its easy to
just stop trying. You become a
victim of your own self-image,
Succumbing to auto-petulance can give you a
transforming yourself into the
negative view of yourself as someone who is out of
person you fear you are.
control, lazy or temperamentally unfit for your job.
So how do you combat auto-
petulance?
First, you dont have to con- Can it really be that simple? I dont want to do that, and I
vince yourself that you really Yes, it can. With that short will do it. If it happens with
want to do the things that need thought, you are giving yourself more than half of the tasks you
to be done. Thats just silly. If you permission to feel what you face, you probably should think
hate doing something, pretend- feel while recognizing that you about finding a new job. But if
ing that you like doing it isnt go- dont have to love doing some- you love 80% of what you do,
ing to change anything. Denying thing in order to do it. And once admit it: Youre pretty lucky.
reality is a poor way to start. youve done this a few times, There are lots of folks who hate
No, when youre confronted youll notice that you have a every minute at work. u

December 201 5 | Co m pute rwo r ld 7


Grll
The

Michael Nilles
Schindler Groups CIO sees a huge
role for the Internet of Things in
improving customer experience.

F
or nearly 150 years, Schindler
Group has been moving people. The
Lucerne, Switzerland-based company
makes, supplies and services eleva-
tors, escalators and moving walkways. As it
moves toward the future, Schindler is deploy-

n
Family: Married, with enjoy the victory lap, and dont after marathon. You should stop n
Are you a runner? Yes, I am,
two daughters start to think about the next and celebrate achievements, but not a marathon runner.
n
Best advice youve ever marathon yet. The idea is that so you can head into your next n
Hobbies: Spending time with my
received: After a marathon, you shouldnt run marathon marathon better. kids, tennis, running and sailing.

Schindler Group December 201 5 | Co m pute rwo r ld 8


The GrillMichael Nilles

ing smart equipment capable of sharing in- lutionary step in our digitalization. Its our where we optimized our internal business
formation with back-end systems and, among innovation unit within our corporation, and processes to drive major optimization. And
other things, sending alerts about mainte- it helps us have a much more holistic view now were in this phase we call leading-edge
nance needs to service personnel. and to fast-forward our digitalization effort. digital business, which is bringing substan-
CIO Michael Nilles has been instrumental in tial changes to the business model.
spearheading efforts to develop smarter, more Business transformation is a popular buzz
advanced systems and enable a more mobile phrase these days. How do you define it? What Is there a metric to measure transformation?
and connected workforce. In addition to lead- is unique to business transformation is that Its really looking toward disruptive opportu-
ing IT operations, hes also CEO of a new unit youre doing some game-changing adapta- nities. With digital transformation, its much
called Schindler Digital Business, which tackles tion to your business model to stay at the more focused on top-line growth. You want
to dig into new market opportunities. Now
were looking into new fields of business,
and thats what requires the entrepreneurial
What is unique to business transformation long-term visioning approach.
is that youre doing some game-changing
adaptation to your business model to stay You talk about building a global business pro-
at the forefront of your industry. cess platform and IT rationalization. What
did these bring to your company? This again
comes back to the three phases. The first
innovative projects with emerging technologies forefront of your industry. Thats how I de- one was IT rationalization, where you stan-
to further the companys digital transforma- fine it. The industry could be challenged by dardize IT infrastructure, retire legacy sys-
tion. His work earned him the 2015 MIT Sloan competitors who werent even in the busi- tems, harmonize your IT architecture to
CIO Leadership Award, which recognizes CIOs ness before. Business transformation in lead to high efficiency.
who lead their organizations to deliver business our traditional industry happened in three The next big phase was the global busi-
value and use IT in innovative ways. waves. The first was globalization; compa- ness process platform where you build up
nies used to be extremely decentralized, and harmonize your processes and stan-
Why do you have two titles? Being CEO of the everything was more by country. Then the dardize them on a global scale. This helps
digital unit is really reflecting the next evo- next big wave was operational excellence, you establish a global supply chain and

December 201 5 | Co m pute rwo r ld 9


The GrillMichael Nilles

manufacturing network in a standard and technology but in acceptance on the busi-


coordinated fashion. Its helping you to gain ness side. Its very high. People are ready for To be a leader in business today,
operational excellence and helping your this disruptive innovation. So thats why its you have to be a risk-taker and lead
disruptive change, Nilles says.
organization to standardize. But at the end not a technology transformation; it has be-
of the day, its something that our competi- come the business transformation.
tors can replicate. Its just a matter of time. Digital is certainly game-changing. Its
So you can lose your competitive advantage. allowing for new platforms, youre creating
So we thought about that and asked, What new ecosystems, and therefore allowing new
is game-changing, and how can we make opportunities. Were not talking here about
a sustained advantage that cant be repli- technology, its more about a new transfor-
cated? Now we want to dig into the leading mative approach. In this regard, digital is not
digital business area where we can obtain a just replacing the term information technol-
sustained competitive advantage. ogy; its making use of information technol-
ogy, but there are more elements to it.
How did you obtain that? We made our prod- In the past, we were looking to individual
ucts smart with the Internet of Things. We technologies and how they could enable
equipped our service force with a digital tool certain business processes. Digital is not re-
case based on iPhones and iPads. But they ally focusing on internal processes and cost
couldnt work on this digital platform if we optimization;digital focuses more on the
hadnt invested in the global business pro- market, customers and top-line growth. Its
cess platform first. a much more holistic and comprehensive
approach to doing business.
Digitalization is another term thrown
around a lot. How do you define it? A lot of You also serve on a board of directors for a
people say its just a new buzzword, and a lot medical devices company. How has that helped
of ideas were there before, like machine-to- you in your CIO role? Its helping quite a lot. In
machine communication. But it has reached the role on the board of directors, you have
a high maturity stage not just in terms of a strategic part. Youre working on disrup-

Schindler Group December 201 5 | Co m pute rwo r ld 10


The GrillMichael Nilles

tive business models, services and products. customers know about it. If youre a man- technology changes involved as well, but its
And it has an oversight aspect where youre ager in a department store chain, you would really about how we make a new customer
looking at large transformation projects. not know immediately if your escalator was experience. Thats the focus. Thats why we
And theres a defense part, when it comes to broken, and when you finally noticed it, you just dont look at the Internet of Things, but
cybersecurity. Its an ideal mix. As CIO its would call for service. we holistically looked at the customer expe-
helping you because you understand much Now the customer has an app and can see rience and came to the conclusion that the
better what are strategic business decisions: the status, and the service technician knows Internet of Things was a big part of it.
How would you extend your product portfo- right away and can keep the customer in-
lio? How do you enter into new markets? Its formed. For us, this is a real game-changing What do you see as the top qualities needed to
helping you get a much more comprehen- technology. Its changing from a reactive to a be a leader in business today? Its super essen-
sive business view. proactive service model. tial to build relationships and drive change.
You have to be a risk-taker and lead disrup-
How does Internet of Things fit into your or- What are the top challenges for IT in support- tive change. Its very important to inspire
ganization? For Schindler and our industry, ing this? Its not just about the technology. people, and to engage them to take risks.
its playing a fundamental role, because our Its about thinking through the processes Thats not so different from being a good CIO
products are now made smart. If you think with the different business partners. This is in the past, but its more important now. u
about our lifts and escalators, you can mea- where unity of effort plays a part, because
sure their health. They are connected, and its working with people in the industry and Interview by Mary K. Pratt, a Computerworld
there are many data points speed, temper- outside the industry to enable this com- contributing writer in Waltham, Mass.
ature, door leveling and you can make use pletely new service model. There are huge (marykpratt@verizon.net).
of that data. You make use of it through a big
analytics engine.
You can predict, for instance, when an el-
evator would need service before a customer
This is where unity of effort plays a part,
knows about it. And we use it in a closed-
because its working with people in the
loop service process we call it a digital
industry and outside the industry to
service platform. So the elevator tells you
enable this completely new service model.
about its health, and our service unit and

December 201 5 | Co m pute rwo r ld 11


Tech Forecast 2016Special Report
R i c h a r d B o r g e i l lu s t r at i o n

13 5 Fast-Track Trends to Tackle Now


19  5 Disruptors to Keep on Your Radar
23  Security Takes Center Stage
29  10 Hottest Tech Skills

As IT transformation
accelerates, heres
where to focus
Your Essential To-Do List your resources.
for the Year Ahead
Co m pute rwo r ld 12
Tech Forecast 2016Special Report

IT will drive business change topics, plus a look at one trendy


in 2016 thanks to these key technology that gets a lot of
tech developments. By Beth buzz but is isnt likely to affect
stackpole enterprise IT in the near future.

O
Once youre up to speed, strap
f all the burning in and hold on tight here
questions that comes 2016.
keep tech execs

1
awake at night,
perhaps none is IT as a change agent
more urgent than, Are we IT may finally move fully
keeping up? The breakneck to the center of the busi-
pace of change in IT and in ness in 2016, as digital
business at large means that transformation becomes a top
CIOs and other senior technol- strategic priority. CIOs and
ogists cant afford to lose focus their tech organizations are
as they head into 2016. well positioned to drive that
Where should you center change, thanks to IT budget

5
your efforts as you build your growth, head count increases

Fast-Track
to-do list for the year ahead? and a pronounced shift toward
Computerworlds Forecast 2016 strategic spending.
survey of IT professionals points As technology becomes an

Trends
to five key areas: cloud comput- integral part of every aspect of
ing, security, the Internet of business and the way we inter-
Things, analytics, and the emer- act with customers, its raising

to Tackle Now
gence of IT as a change agent. the profile of the IT group and
Heres a rundown of survey forcing IT to think about more
findings related to each of those than just keeping the lights on,

R i c h a r d B o r g e I l lu s t r at i o n December 201 5 | Co m pute rwo r ld 13


Tech Forecast 2016Special Report

ing plans are in search of people taking university-level courses in


with combined tech and busi- psychology and spending plenty
Investing ness backgrounds that will al- of time talking to business users

in future tech low them to articulate the value in the field. When you are try-

Source: Computerworld Forecast 2016 survey of 182 IT professionals.


of IT in meeting business goals. ing to lead transformation and

29% top 5 categories


The respondents chose
when asked to identify new areas of spending:
Blended expertise will be
critical in order for IT to achieve
adoption, the most important
thing is getting people to take
its primary objectives in 2016: action, he says. Its a must-have
18% 16% 15% 19% of our survey respondents
said their mission is to generate
skill for CIOs in todays world.

13%

2
new revenue streams or increase
existing ones over the next 12 Cloud computing
months. Also on the list: acceler- As organizations build
Internet of High- Energy-saving Bring your Marketing
Things/M2M/ performance or carbon- own device/ technology ating business process and agil- out a future-proof IT
telematics computing reducing consumeriza- ity (cited by 40% of those polled) infrastructure, theres
technologies tion of IT and improving collaboration little question that the cloud
with business units (35%). will play a pivotal role the
While IT has made great real challenge lies with figur-
says David Cearley, a fellow at numbers are up from last year, strides in moving to the strategic ing out which cloud computing
Gartner. We are seeing greater when 43% of those polled said center of the enterprise, there is model is the best fit for a par-
alignment as IT steps up to they anticipated spending in- more work to be done most of ticular company.
drive digital business. creases, and the average expect- it focused on building relation- Nearly half (48%) of the re-
Nearly half (46%) of the 182 ed uptick was 13.1%.) ships with business stakehold- spondents to our Forecast 2016
respondents to the Forecast sur- At the same time, 37% of this ers, says Ted Maulucci, CIO of survey indicated that cloud
vey said that theyre gearing up years respondents said theyre Tridel, a commercial real estate computing was an area ear-
for greater technology spend- planning to increase IT head developer in Toronto. Maulucci marked for a spending increase
ing, with anticipated budget in- count, up from 24% last year. is actively working on his own in their organizations, and 14%
creases averaging 14.7%. (Those Tellingly, 42% of those with hir- relationship-building skills by cited cloud initiatives as the

December 201 5 | Co m pute rwo r ld 14


Tech Forecast 2016Special Report

single most important technol- Hahn is using platform-as-a- making security the No. 1 choice
ogy project on their dockets for service applications for disaster among tech initiatives pegged
the upcoming year. Some 29% The cloud lets recovery, customer relationship for spending hikes. When sur-
confirmed they had already me respond management and other tasks, vey participants were asked to
moved some enterprise applica- more rapidly in addition to using software-as- identify the single most impor-
tions to the cloud, with more to to business a-service (SaaS) offerings such tant technology project cur-
come, while 7% said theyre in demands while as Microsoft Office 365. If I try rently underway at their organi-
the process of migrating mis- reducing risk. to address all the holes Ive got zations, security came in second
sion-critical systems to a cloud Stephen Hahn, Global [with] services on premises, I (chosen by 12% of those polled),
IT Leader, Michelman
environment. Moreover, 22% wont be able to drive the change trailing cloud computing by
of the respondents said their needed to support growth, he just two percentage points. And
organizations are currently con- says. The cloud lets me respond 16% of those surveyed identified
ducting beta tests or pilot pro- more rapidly to business de- security as their top leadership
grams that encompass the full mands while reducing risk. challenge in the upcoming year,
stack of cloud delivery methods second only to budgetary and

3
including private, public and economic pressures.
hybrid options. Security At Nova Southeastern Uni-
Now that the cloud is a stan- and there will be new types of High-profile data versity in Fort Lauderdale, Fla.,
dard element of IT architec- delivery models, he says. breaches made for fre- security and HIPAA compliance
tures, the question facing CIOs For Michelman Inc., a pri- quent attention-getting are CIO Tom Wests biggest con-
is not whether to use cloud- vately held manufacturer of headlines in 2015, ratcheting cerns. In the world we live in
based systems but which imple- advanced materials for industrial up anxiety and keeping security today, we can get attacked on a
mentation model is best for applications, the cloud repre- at the top of IT budgets for the daily basis, so the No. 1 thing for
their organizations, according to sents an opportunity to grow, third year in a row. me is to make sure we are com-
Gartners Cearley. Some things says Stephen Hahn, global IT Exactly half of this years sur- pliant and secure, he says.
will be delivered in a private leader for the $225 million fam- vey respondents (up from 46% Thats no easy task, given the
cloud model while others will ily-owned business, headquar- last year) said they will increase constantly changing IT land-
leverage external cloud services, tered in Cincinnati. In particular, spending on security in 2016, scape. Nova Southeasterns se-

December 201 5 | Co m pute rwo r ld 15


Tech Forecast 2016Special Report

curity initiatives run the gamut:


The school has invested in new
intrusion detection/prevention,
The Internet of Things
endpoint protection and encryp-
picks up speed

Source: Computerworld Forecast 2016 survey of 182 IT professionals.


tion products; it employs applica-
tion and Web vulnerability scan-
ning tools to reduce the attack 2015 2016
Forecast Forecast
surface of its applications; it Respondents who . . .
survey survey

In the world we
live in today,
conducts regular audits as part of
a risk management program; and
. . . say IoT is a new area of
spending for their companies. 12% 29%
it recently hired a dedicated chief
we can get
attacked on a information security officer.
In addition to ensuring that
. . . plan to launch an IoT
project in the next 12 months. 15% 21%
daily basis, so
the No. 1 thing Nova Southeastern is in com-
pliance with HIPAA when it
. . . are beta-testing
an IoT project. 8% 14%
for me is to make comes to handling healthcare
sure we are information, West says there
compliant and are several other regulations
secure. and standards that he has to the outside as well as from ality for IT organizations across
Tom west, cio, Nova
Southeastern University abide by, including the Family rogue insiders. many industries. IoT tech-
Educational Rights and Privacy nologies can be deployed for all

4
Act, the Payment Card Indus- kinds of practical uses, such as
try Data Security Standard and The Internet optimizing supply chains via
the IEEEs FIPA standards for of Things RFID and monitoring system
agent-based technologies. The so-called Internet performance with an eye to-
In short, he says, we need of Things (IoT) is no ward saving energy.
to remain constantly vigilant longer the stuff of science fic- In the Computerworld Fore-
for new types of attacks from tion, but rather a near-future re- cast 2016 survey, 29% of the

December 201 5 | Co m pute rwo r ld 16


Tech Forecast 2016Special Report

respondents identified IoT ini- collaboration and are located lytic capabilities are increasingly
tiatives and related machine- where people want to live. being embedded into everyday
to-machine and telematics proj- [The Internet applications and workflows
of Things] is

5
ects as new areas of spending rather than only being available
for the year ahead. In compari- huge for us. Analytics in separate tools, Cearley says.
son, just 12% of those polled Ted Maulucci, The business worlds Analytics are also rapidly bleed-
CIO, Tridel
last year said IoT work would fixation with big data ing into the whole area of ma-
be a new IT expenditure in specifically with the chine learning, artificial intel-
2015. Likewise, the percentage quest to unearth nuggets of in- ligence and pattern recognition,
of respondents who said they sight shows no sign of abating. he says, explaining that analyt-
planned to launch IoT projects As companies pivot toward ics can help discern patterns that
over the next 12 months rose digital business, significant are not clear to human beings.
from 15% last year to 21% this spending on analytics will con- PrimeLending, a Dallas-based
year. Additionally, 14% of this tinue, according to Gartners mortgage company, is expand-
years respondents said they and pervasive Wi-Fi. The tech- Cearley. Business analytics was ing its analytics initiatives an
plan to beta-test IoT technolo- nology supports an array of No. 5 on the list of survey re- effort that includes building a
gies, up from 7% last year. amenities, such as health moni- spondents most important IT data warehouse to get better
In Toronto, Tridel is on the toring systems and personal projects, and it was No. 3 on the operational visibility and in-
front lines of smart building emergency response services in list of technologies sights into customer
construction and is actively its senior residences, and high- that would garner in- behavior. We are
using IoT technologies in its end concierge services in its creased spending in Business mostly using analyt-
Analy tics was
senior citizen communities condominium properties. the next 12 months. ics for competitive
and condominium properties.
The real estate development
company is designing buildings
IoT is huge for us, says Mau-
lucci. The media tends to over-
blow stuff, but this time, I dont
Having organized
all of their data, com-
panies are now figur-
No.3 on survey
intelligence, says
Tim Elkins, execu-
tive vice president
respondents list
from the ground up with tech- mind it with IoT. Using portals, ing out how to use it of areas tapped and CIO. We need
for spending
nologies like commercial-grade networks, sensors and devices, more effectively. At increases. to figure out if a con-
IP networks, digital IP cameras we can build facilities that foster the same time, ana- sumer weve been

December 201 5 | Co m pute rwo r ld 17


Tech Forecast 2016Special Report

companies efforts in a number


of technology realms, but wear-
ables isnt one of them.
Wearables fail
While products like Google
to catch fire

Source: Computerworld Forecast 2016 survey of 182 IT professionals.


Glass and the Apple Watch did
launch to great fanfare, the
Companies are slow to roll out wearables to the enterprise.
reality is that enterprises arent

8%
ready to make practical use of  se wearables in
U

78%
wearable systems, at least for business or tech
operations.
the foreseeable future.
Wearable technology was last
on the Computerworld Forecast
2016 list of systems currently
of respondents are not 7% Are developing
or piloting wear-
able apps.

6%
currently planning for or
supporting wearables or Support
being assessed in beta tests and employee-owned
wearable apps.
We are mostly using analytics for pilot projects, with only 4% of wearables.
competitive intelligence, says our respondents saying they
Tim Elkins, CIO at PrimeLending.
had projects underway involv-
doing business with is getting ing wearables. Furthermore,
credit-pooled by someone else, 78% said they were not cur- device management strategies the graduate and doctoral lev-
or why we lost a loan. As we ex- rently working on wearable to include wearables. el, he says, and theyre always
plore different business models, apps or anticipating the need to But things may change. bringing in new technology
we have to do a better job with support wearables in the near West says hes not particularly and new ideas, which makes for
analytics. future. And only 8% of those interested in or concerned more challenges for me. u
polled said wearables would about wearables, but he recog-
Wearables Can Wait play a role in their business or nizes that the students at Nova stackpole ,a frequent Computer-
Answering the question Are technology operations, while Southeastern University inevi- world contributor, has reported on
we keeping up? may require just 12% indicated that they tably will be. Eighty percent of business and technology for more
IT leaders to take stock of their were adjusting their mobile our users are students, many at than 20 years.

December 201 5 | Co m pute rwo r ld 18


Tech Forecast 2016Special Report

Savvy tech execs cant afford to ignore these developments,


which stand to remake the future of IT. By Beth stackpole

Y
ouve honed your sharpening of ITs focus on the
list of hot technolo- customer experience.
gies to focus on in Heres a look at what our sur-
2016, but you also vey revealed about each of those
need to make lon- emerging areas.
ger-term plans and prepare for

1
changes that are fast approach-
ing by keeping an eye on devel- DevOps
opments just now taking shape. As IT retools to become
What should be on your ra- more responsive to rap-
dar screen as we head into the idly changing business
new year? The 182 IT profes- requirements, methodologies
sionals who participated in like DevOps are gaining solid
the Computerworld footing as ways to
Forecast 2016 survey support agile IT ser-

5
singled out these vice delivery.

Disruptors
In the
Computerworld
five potentially dis- Forec ast Considered more
2016 survey,
ruptive technologies of a culture shift
and trends: the rise
44% than a full-blown

to Keep
of DevOps, virtual- development meth-
ization 2.0, carbon- of respondents odology, DevOps
said they pl an
reducing technolo- emphasizes a greater

on Your Radar
to embrace
DevOp s this
gies, the evolution year, up from to level of collabora-
37% l ast year.
of the IT-marketing tion earlier on in the
alignment, and a process between the

R i c h a r d B o r g e I l lu s t r at i o n December 201 5 | Co m pute rwo r ld 19


Tech Forecast 2016Special Report

operations and development tion in areas like expect to see more

64%
teams, aided by a set of automa- testing and moni- money budgeted for
tion tools. Enterprise IT, under toring. That said, a virtualization proj-
continued pressure to acceler- successful DevOps ects over the next 12
of those polled
ate systems delivery, is rapidly strategy has less to said they were months. Thirty-five
beta-testing
adopting the DevOps philoso- do with technology or piloting percent of those
some kind of
phy. In the Computerworld than it does with virtualization. polled said they were
Forecast 2016 survey, 44% of people, Colville says. increasing spend-
respondents said they plan to People and cul- ing on virtualization
embrace DevOps this year, up ture are always the challenge efforts, while a combined 64%
from 37% in 2015. because people have to work said they were beta-testing or
Research firm Gartner also together in ways they didnt piloting some kind of virtual-
sees an uptick in DevOps adop- before, she explains. ization be it desktop, server,
tion as IT organizations look storage, mobile or network.

2
for ways to improve time to As an alternative to full-blown
production, enhance business Virtualization 2.0 virtualization, some organiza-
value and save money. Agility Recognizing that virtual- tions are starting to container-
is the driver, says Gartner ana- ization can reduce costs ize their server, data center and
lyst Ronni Colville. In the old and wring more perfor- cloud applications. The reason
In the DevOps days, if you pushed out a new mance out of the desktop, IT is for containers is all about agility
style of agile function and it didnt work, now eager to embrace next-gen- and speed thats whats push-
development, you started over. In the DevOps eration virtualization technology, ing it today, says Colville.
new applications style of agile development, new which provides similar benefits
... break, but

3
applications are developed in for other types of systems, not
theyre never a fast-fail manner. They break, just desktop computing. Carbon-reducing
broken. but theyre never broken. Tech professionals partici- technologies
Ronni Colville ,
analyst, Gartner A sign that DevOps is matur- pating in Computerworlds Fore- Companies are pay-
ing is the expansion of automa- cast 2016 survey said that they ing more attention to

December 201 5 | Co m pute rwo r ld 20


Tech Forecast 2016Special Report

their environmental footprints, servers will be virtual, therefore


and thats prompting a flurry taking up a very small footprint
of spending on energy-saving and making us very energy-effi-
technologies. cient, he says.
In this years Forecast sur-

4
vey, 16% of the respondents
indicated that energy-saving or IT-marketing
carbon-reducing technologies alignment
would be a new area of spend- In the age of digital
ing for them in 2016. In the data business, technology
center, companies are investing has become a critical asset in
in virtualization, new cooling helping companies engage with
technologies and power man- customers and prospects. As Collaboration between
agement capabilities, among a result, IT and marketing de- marketing and IT is
essential at SAS Institute,
other things, to help reduce partments are collaborating and says CIO Keith Collins.
energy consumption. forging partnerships that once
Nova Southeastern Univer- would have seemed unlikely.
sity in Fort Lauder- Marketing tech- spending on marketing tech- implementations and improve
dale, Fla., is in the nology everything nology in 2016, and 13% said overall marketing effectiveness.

16%
midst of moving from marketing it is a new area of spending for At SAS Institute, collabora-
into Verizons new, automation to email them. As companies place more tion between marketing and IT
world-class data cen- campaign manage- of an emphasis on nurturing is essential given the role tech-
of respondents
ter in Miami. Energy indic ated ment and analytics and engaging customers and nology now plays throughout
that energy-
was a top driver in saving or is a major new prospects through multiple the customer life cycle, accord-
c arbon-reducing
the decision to move technologies area of interest for digital channels, theres a need ing to Keith Collins, executive
would be a
off-campus, accord- new area of our survey respon- for CIOs and CMOs to work vice president and CIO at the
spending for
ing to CIO Tom them in 2016. dents: 23% said they together to drive new innova- Cary, N.C.-based software pro-
West. All of our plan to increase tive use cases, ensure successful vider. Digital transformation

December 201 5 | Co m pute rwo r ld 21


Tech Forecast 2016Special Report

is affecting every area of the tion putting it last among cesses. One of those apps offers
business, including how you the list of options presented. a secure way to automatically
touch customers, how you find This year, that same choice collect bank statements and
customers and how you engage ranked fourth, picked by 16% of other financial information to
customers, Collins says. All of those polled. populate the online forms.
this cant be executed without At mortgage company Customers dont have to
an effective technology plan, PrimeLending, IT is enter data, and they
which is why there is so much pitching in to help dont have to col-
energy in these partnerships. reduce friction and L ast year,
respondents
lect forms, Elkins
streamline the cus- ranked explains. Now they

5
improving
tomer experience to customer
experience /
can go to an open
A focus on customer make the mortgage satisfaction
l ast on a list of
house, make an of-
experience process easier and priorities for
IT projects. This
fer, and enter five to
As companies look to more accessible for year, that same
choice ranked
10 pieces of data in
deploy systems that sim- potential clients, our mortgage app. It
plify interaction and foster en-
gagement with their target audi-
ences, the customer experience
says Tim Elkins,
executive vice presi-
dent and CIO at the
No.4 then automatically
populates the ap-
plication, runs the
has become a priority for IT. Dallas-based finan- credit check, goes
Its certainly a higher prior- cial services firm. Elkins reports through underwriting, and
ity for Computerworld Forecast that his team carried out a mas- enables them to have approval
survey respondents this year sive overhaul to PrimeLendings before they walk out the door.
than it was a year ago. Last year, system for handling mortgage Thats our goal. u
when respondents were asked applications online, making
to rank their top objectives for the process conversational in stackpole , a frequent Computer-
their single most important IT style. They also created a series world contributor, has reported on
project, 11% chose improving of mobile apps that streamline business and technology for more
customer experience/satisfac- previously paper-laden pro- than 20 years.

December 201 5 | Co m pute rwo r ld 22


Tech Forecast 2016Special Report

After a year of high-profile keep them up to date on every-


hacks, security is top of mind thing that IT is doing to protect
for tech execs in 2016. the enterprise and how his team
By Julia king is preparing for the inevitable.

W
Even then, I wouldnt be
hen a high- foolish enough to say I stay
profile cyber- ahead of the bad guys, says
security attack Redden. The bad guys stay
occurs, like ahead of everybody.
the ones at That observation is likely the
Target or Home Depot, Sam reason why 50% of the 182 IT
Redden knows to be ready. Its professionals who participated
almost a given that Redden, in Computerworlds Forecast
chief security officer at Brazos 2016 survey said they plan to
Higher Education Service, a increase spending on security
Waco, Texas-based company technologies in the next 12
that services billions of dollars months. Whats more, when
in student loans, respondents were
will be summoned asked to name the

50%
Security
to brief his worried most important
board of directors. technology project
Redden says he of the 1 82 currently underway
IT professionals
lays the groundwork who responded at their organiza-
to Our Forec ast
for such command survey said tions, security came
they pl an to
performances by pro- in second chosen

Takes Center Stage


increase spending
on securit y
actively communicat- technologies by 12% of those
in the nex t 1 2
ing with the board on months. polled trailing
an ongoing basis to cloud computing by

R i c h a r d B o r g e i l lu s t r at i o n December 201 5 | Co m pute rwo r ld 23


Tech Forecast 2016Special Report

ber of entry points they can use John Nai, CISO at PayPal,
to access vulnerable networks says in 2016 hell pay close atten-
Top projects, is rising exponentially as tele- tion to infrastructure hygiene,

top priorities visions, printers, cameras and


even cars are IP-enabled. Gart-
ner estimates that the number
which, he says, is super impor-
tant to us. Beyond that, Nai says
he believes in keeping a firm eye
Top 5 single most important Primary goals of connected things in use will on the basics. A lot of companies

Source: Computerworld Forecast 2016 survey of 182 IT professionals.


projects that respondents said their for those projects:
IT departments are working on: hit 4.9 billion by the end of this focus on advanced capabilities,
To maintain or improve year, up 30% from 2014, and he notes, but you really need to
expected service levels 24%
Cloud computing 14% will reach 25 billion by 2020. be brilliant at the basics: Make
To generate new revenue One recent example of the sure youre patching your infra-
Security technologies 12% streams or increase
ever-evolving kinds of security structure, patching your desk-
existing ones 19%
Legacy systems modern- threats enterprises are facing is tops and have the right opera-
ization/replacement 10% To increase productivity 17% a piece of persistent malware
Application development, To improve customer dubbed SYNful Knock that was
upgrades or replacement satisfaction/experience 16% discovered in September on
(includes mobile apps) 9% Cisco routers.
A lot of
To meet security, privacy companies
Business analytics 9% or compliance goals 14% Its the first time anything
has been publicly disclosed
focus on
about an exploit of Cisco routing
advanced
and switching equipment, says
capabilities,
just two percentage points. CIO at Lewiston, Maine-based Darren Van Booven, cybersecu-
but you
When you look at the Geiger, a $150 million distributor rity officer for the Idaho Nation-
really
amount of money big organiza- of promotional products. You al Laboratory in Idaho Falls. Its
need to be
tions [spend] to prevent breach- have to have a plan in place. a great example of the kind of
brilliant at
es and they still get breached, Attackers are getting more threats organizations now have
the basics.
John Nai,
youve got to assume youll be numerous, better organized and to mitigate. They require con- CISO, PayPal
attacked too, says Dale Denham, more powerful. And the num- stant changes in our strategy.

December 201 5 | Co m pute rwo r ld 24


Tech Forecast 2016Special Report

tional capabilities to see whats CIO coming to me, says a CISO


going on in your network. from a midsize manufacturing
Slim pickings in the labor pool
Budget booms company who declined to be
is another management concern:
There simply arent enough secu-
rity professionals to go around,
and busts further identified.
In some ways, the high-
profile breaches have done the

Source: Computerworld Forecast 2016 survey of 182 IT professionals.


and those who are in the job mar- Top 5 categories where Top 5 categories where they selling for me. Its almost an
ket can command sky-high com- respondents said their companies plan to decrease spending: open checkbook, he says. But
plan to increase spending:
pensation packages that are out On-premises software 19% make no mistake, he adds: The
of reach for many companies. Security technologies 50% threats are still there and they
Data center consolidation/
Those are just a few of the Cloud computing 48% optimization/ are certainly scary.
security-related issues that IT modernization 18% Across the board, security
leaders lose sleep over. But most Business analytics 41% managers say theyll spend at
Legacy systems modern-
of them say theyre not staying Mobile applications 36% ization/replacement 17% least some of the money being
up late worrying; theyre up Virtualization (includes desktop, added to their security budgets
Hardware 16%
making plans to take action. server, storage, network on further investments in aware-
Theyre preparing to fine-tune and mobile virtualization) 35% Storage 14% ness and training programs.
anti-intrusion strategies, train One of the biggest chal-
and retrain employees, lenges is with employees. Most
and create disaster plans for the of the problems weve had come
breaches and attacks they say theyre often leaving those meet- rity. (See The Board Will See from emails theyve opened that
they know lie ahead. ings with more resources to You Now, page 27, for more on could have Trojans or malware,
spend on protecting enterprise the changing relationship be- says Redden.
Bigger budgets, systems and data. The high-pro- tween security and the C-suite.) It all goes back to user train-
better-trained users file breaches have helped raise Instead of going to the ing, he adds. At Brazos Higher
Security execs may be getting awareness among even the least board or CIO and struggling Education Service, he says,
called to board meetings more technical board members about with justifying every security weve pulled most remote us-
frequently for explanations, but the critical importance of secu- expense, I have the board and ers back in for additional train-

December 201 5 | Co m pute rwo r ld 25


Tech Forecast 2016Special Report

ing. We talk about not letting director, Patricia Malek, will be


anyone access their laptop. Its conducting face-to-face scenar-
not a personal device. We stress
that very highly. Endpoint pro-
io-based training with employees
in all business units. And were
Hard to hire
tection is the No. 1 issue. not just training on the universi- Which skills will be most difficult to
Training is also on the docket tys policy, but providing training
33% 30% hire for in 2016? Here are the top 5:

Source: Computerworld Forecast 2016 survey of 182 IT professionals.


at Loyola University Maryland on the personal side, emphasiz-
in Baltimore. Our largest chal- ing personal control over and
lenge is our end users, so were
really ramping up our cyber
protection of data, Finn says.
The Bank of Labor in Kan- 21% 19% 19%
awareness training, says Louise sas City requires employees to
Finn, CIO and associate vice take part in a security aware-
president of technology services. ness training program annually.
In 2016, the universitys re- But Shaun Miller, the banks
cently hired security operations information security officer, Security Business Cloud/SaaS Programming/ Business
intelligence/ application strategy
says that schedule renders the analytics development
program worthless because
threats change so quickly. Base: 67 respondents who expect to increase IT head count in the next 12 months.
Our largest To help people remain vigi-
challenge is lant, Miller sends out phishing
our end users, emails the same way the bad Im doing the same thing audit security initiatives as the factor
so were really guys do. If users click on the firms would do. People learn driving that decision. And 33%
ramping up links in these messages, theyre [best] from their mistakes. said security was the skill they
our cyber sent to a landing page and get expect will be the most difficult
awareness immediate feedback about what Hire in or contract out? to hire for in 2016.
training. they should have done different- Among respondents to the Fore- In interviews, executives at
Louise Finn, CIO, Loyola
University Maryland ly. Im not doing this to get em- cast survey who said they expect small and midsize organiza-
ployees in trouble, Miller says. to add staff in 2016, 25% named tions say they will hire people

December 201 5 | Co m pute rwo r ld 26


Tech Forecast 2016Special Report

with broad IT and security ter security employees poached


skills, rather than highly ex- by other organizations.
perienced experts in specific Frankie Duenas, CTO at Ca-
We have a budget in place to throw
security areas, such as intrusion brillo Credit Union in San Di-
at security. Were going to double
detection or firewalls. ego, heads a small department
that [contingency] budget next year
Many companies are adding of six IT professionals whose
because hacks evolve quickly, and we
expertise not by hiring, but by duties range from security and
need to have that pot to pull from.
Frankie Duenas, CTO, Cabrillo Credit Union
contracting with the growing networking to programing and
number of security services pro- daily operations, and he also
viders. As one CISO put it, one outsources for security assis- emerging threats or to respond ing to double that [contingency]
of the advantages of contracting tance when necessary. We have to a need for more sophisticated budget next year because hacks
is that its a way of sidestepping a budget in place to throw at security software and/or servic- evolve quickly, and we need to
the threat of having sought-af- security either to respond to es, Duenas explains. Were go- have that pot to pull from.

The board will see you now ... and now ... and now ... and ...
Just about all of the security professionals CIO who requested anonymity. Theyre trying to communicate with, senior executives.
and CIOs interviewed for this article said they evaluate risk, and they want to feel confident that Its imperative to understand the business of
expect to put more emphasis on communicating Im putting measures in place that are cost-effec- the organization, he says. If you dont, you cant
with their boards in 2016. tive and protect the company. articulate risks in a way that the leadership under-
Three years ago, unless there was a breach, a Darren Van Booven, cybersecurity officer at stands. If you hear CISOs saying theyre not being
person in this role would rarely get to talk to the the Idaho National Laboratory, says the success of listened to, thats why, Van Booven says.
board. Now its not unusual to talk to the board a risk management and security program hinges In addition to board members, Van Booven
once a quarter, says a manufacturing company on IT leaders having access to, and the ability to meets with most senior managers to share infor-

December 201 5 | Co m pute rwo r ld 27


Tech Forecast 2016Special Report

At Geiger, Denham says he Youre never finished with PayPals Nai, but as it has done so,
hires third parties to handle security. You cant do it all, and the bad guys have refocused their
both intrusion detection and you can never do it fast enough, efforts elsewhere on dissemi-
intrusion prevention services. Denham says. Theres always
Youre never nating malware, for example.
The company also works with more to do than IT can handle.
finished with As we continue to improve
outside auditors on compli- The bottom line is that secu-
security.... in certain areas, the bad actors
ance with the PCI Data Security rity is a critical enterprise issue
Theres dont go away, Nai says. They
Standard. that never goes away. It never
always more dont go out and get legitimate
I dont expect well hire more ends because hackers always
to do than IT jobs. They simply move to an-
[security professionals into IT], find new ways to do damage.
can handle. other attack vector.u
Dale Denham,
he says. Instead, Geiger will con- For example, the industry has CIO, Geiger
tinue to turn to service provid- made great progress in fighting king is a writer and editor in
ers as new needs arise. phishing attacks, according to the Philadelphia area.

mation and provide training. increasingly working outside the companys walls ganizations that give out grants and use Altums
This peer-to-peer meet- with supply chain partners and their boards, in grant-tracking software service to monitor distri-
ing between Darren and other his case. The CIO has drafted a security question- butions and how recipients are using funds.
senior leaders has made a big naire that he is proposing be added as a regular When we get a client that wants to sign up for
difference in their commitment part of the vendor management process. our service, they send us a security software ques-
[to security], says information Dave Cooke, director of technology at Altum, tionnaire. We have to answer a litany of questions
Hortense Nelson management program integra- a Reston, Va., consulting firm and software-as-a- before they consider us, says Cooke. Weve seen an
tion director Hortense Nelson. service provider, has been on the receiving end uptick of these in the last 18 months. They help us
That personal element is very important. of such questionnaires and says he is seeing an because we figure if theyre asking these questions,
Beyond internal communication, IT leaders like increase in their use by client companies. Altums we need to take the same [issues] into account.
the manufacturing company CIO find themselves customers are large foundations and other or- julia king

December 201 5 | Co m pute rwo r ld 28


Tech Forecast 2016Special Report

Gunning for a banner year tecture skills and experience


in IT? Make sure you have working with software-as-a-ser-
these skills in your toolbox. vice and cloud-based offerings to
By Mary K. Pratt guide operations as the organi-

T
zation moves out of its own data
he IT team at center into a colocation site.
HRHCare has seen The results of Computer-
its workload rise in worlds Forecast 2016 survey
recent years, as the suggest that Brosius will face
Beacon, N.Y.-based stiff competition for top talent
nonprofit has added facilities when he goes to recruit people:
and expanded its services. 37% of the 182 IT professionals
Eric Brosius, the organiza- who responded to the survey
tions vice president of technol- said they likewise plan to in-
ogy services, wants to expand crease head count in the upcom-
the staff so his team will be able ing year thats a significant
to cope with the added responsi- jump from last year, when only
bilities and tackle new 24% said they planned

10
technology initiatives. to add new staff. More-

Hottest
Specifically, Brosius over, 24% of those
says he wants to add polled this year listed
another six or seven attracting new talent

Tech Skills
full-time people to his as first among their
staff of 17 full-timers. business priorities for
His first hiring priority: the next 12 months.

for 2016
two tech support folks. Complicating the
Eric Brosius plans to
Then he wants to hire hire six or seven full- recruiting challenge
someone with archi- timers at HRHCare. for Brosius is the fact

R i c h a r d B o r g e I l lu s t r at i o n December 201 5 | Co m pute rwo r ld 29


Tech Forecast 2016Special Report

that hiring managers could be qualified professionals. Robert


facing a challenging year. The Half Technology is projecting
Hot skills in a market has been really strong, a better than 5% increase in IT

hot market and were expecting it will stay


that way for the foreseeable
future, he says. I dont think
salaries for the next year.
Ready to dive into the 2016
job market? Here are the 10
Top 15 skills respondents plan Security/compliance/ youll see explosive growth, but skills on track to be most in de-
to hire for in the next 12 months: governance 25% youll see single-digit growth in mand, according to IT pros who
Cloud/SaaS 25% demand, consistent with what participated in Computerworlds

Source: Computerworld Forecast 2016 survey of 182 IT professionals.


IT architecture 42% weve seen over the past few Forecast 2016 survey.
Web development 24%
Programming/application years.
40%

1
development Mobile applications How to cope? Companies will
and device management 22%
Project management 39% need a comprehensive recruit- IT architecture
Networking 18% ing strategy in order to bring in n 42% of respondents
Big data 36%
Business strategy 16% great workers. Theyll also need with hiring plans said
Business intelligence/ to put a lot of effort into reten- they will be seeking
analytics 34% Vendor management 16%
tion so they wont have their best people with this skill in the next
Help desk/technical Virtualization 13% people walking out as new hires 12 months.
support 30% are walking in, Reed says. If n New to the list this year.
Database administration 25% Base: 67 respondents who expect to in- you have that two-pronged ap-
crease IT head count in the next 12 months.
proach, youre probably going to The top 10 list starts off with a
be OK, he says. Youre certainly surprise. Although IT architec-
going to do better than most. ture is a fundamental area of
that hes looking for people with IT architecture, tech support IT job seekers, on the other expertise for techies at all levels
three of the 10 skills most in and cloud computing. hand, are sitting pretty heading and in various roles, it rarely
demand among survey respon- John Reed, senior executive into 2016, Reed says, because makes anyones list of hot skills.
dents who plan to hire new em- director of IT staffing firm Rob- salaries rise when demand for The term IT architect
ployees in the next 12 months: ert Half Technology, confirms talent exceeds the supply of encompasses a wide range of

December 201 5 | Co m pute rwo r ld 30


Tech Forecast 2016Special Report

specialists, from enterprise Many organizations are cation development continue to


architects to cloud architects, seeking a similar mix profes- be among the most sought-after
so recruiters say it makes sense sionals coming from sysadmin, skills in enterprise IT.
that IT architecture expertise is engineering and senior engi- Technology touches every-
in demand as companies move neering roles, says Tyler Mik- thing today, and programmers
forward with all sorts of tech- kelson, a recruiting team lead and developers theyre the
nology-driven projects. for the Los Angeles office of ones who make things go, says
Michael J. Sylvester II, CIO Mondo, an IT recruiting firm. Jason Hayman, research man-
for the Los Angeles County De- Theyre gifted technically ager with TEKsystems, an IT
partment of Public Social Ser- [and] they have strong business staffing, talent management
vices, manages about 400 staff acumen, so they can speak to and services firm.
members and another 500 or executives and C-suite individ- Demand for programmers
so IT contractors. He says that uals, he says. and developers is springing up
mix includes a lot of people with in new areas, too, thanks to the

2
strong IT architecture talent but rise of mobile and the emer-
adds that we still look for people Programming/ gence of the Internet of Things.
Technology with a firm grasp of enterprise ar- application Hayman points to the fact that
touches chitecture. We want those folks development some cars now come off the as-
everything to look at industry standards and n 40% of respondents sembly line with a million lines
today, and frameworks, and to set those up with hiring plans said they will of code as just one example of
programmers so we can have uniformity. be seeking people with this skill how programmings footprint is
and developers Sylvester says he wants IT in the next 12 months. widening.
theyre the architecture professionals with n Last years ranking: No. 1
ones who make

3
technical chops who have pro-
things go. gressed from deep technical posi- Despite fears that programming Project
Jason Hayman, tions into more managerial roles expertise is a commodity that management
research manager,
TEKsystems so they can lead teams tasked can be obtained cheaply off- n 39% of respondents
with driving IT projects forward. shore, programming and appli- with hiring plans said

December 201 5 | Co m pute rwo r ld 31


Tech Forecast 2016Special Report

5
they will be seeking people with Grady says he wants people The surge in interest in us-
this skill in the next 12 months. who can help his teams work ing data to drive business has Business
n Last years ranking: No. 2 within an agile and DevOps pushed demand for big data intelligence/
environment, as well as profes- skills from No. 10 in last years analytics
With almost half (46%) of Fore- sionals who can manage diverse Computerworld Forecast report n 34% of respondents
cast survey respondents expect- teams and negotiate priorities, to No. 4 today. with hiring plans said they will
ing their technology spending scope, deliverables and expecta- Moreover, in the Forecast be seeking people with this skill
to increase in 2016, its no tions with various stakeholders. 2016 survey, big data/analytics in the next 12 months.
surprise that project manage- Its not a new skill, but the was No. 1 on the list of technol- n Last years ranking: No. 7
ment remains a top five skill: difference now is the way we ogies that survey respondents
More spending means more iterate. The execution is much said they were currently beta- Holding steady in the top 10
projects and that means more faster, Grady explains. So it testing or using in pilot proj- skills list is another data-related
people will be needed to man- takes a bit more finesse in ex- ects, with 23% saying they were area of specialization: BI and
age those projects. pectation management and engaged in such initiatives. analytics.
Ken Grady, CIO at IDEXX bringing people together. Im When it comes to big data Jeff Remis, a manager at IT
Laboratories, a pet healthcare looking for people who have the initiatives, companies are typi- staffing and recruiting firm
diagnostics company headquar- comfort with that pace and that cally looking for someone who Addison Group, says demand
tered in Westbrook, Maine, approach. Its as much fit as it is can help them manage data and for IT professionals with these
has about a dozen openings a particular skill set. package that data, says Reed, of skills is strong, particularly in
within his 250-member IT de- Robert Half Technology. [They healthcare, insurance, financial

4
partment, and he plans to add want] people who can inter- services and retail industries
new positions in the upcoming Big data pret and then help bring that where the use of BI and analyt-
year. His hiring plans include n 36% of respondents data to life visually building ics is more mature than it is in
bringing on two or three project with hiring plans said dashboards and things of that other sectors.
managers to join the roughly 15 they will be seeking nature, so the executive suite Remis says hiring managers
project managers already work- people with this skill in the next can push through techspeak are looking for recruits with
ing in his newly created project 12 months. and understand what the data is technical expertise, but they
management office. n Last years ranking: No. 10 telling them. also want BI specialists who

December 201 5 | Co m pute rwo r ld 32


Tech Forecast 2016Special Report

understand the business and cation, and it gives me confi- backgrounds in database ad-
the industry. dence that they can communi- ministration and a deep un-
Such requirements put a pre- cate and have good customer My recruiting derstanding of data reporting
mium on good candidates. service skills, he says. We can model is to tools and technologies such as
educate them on the tech skills, find prospects, Oracle, SQL, DB2 and Hadoop.
people recently

6
but you cant teach personality.
graduated from

8
Help desk/
college. I feel

7
technical support Security/
n 30% of respondents Database they have a compliance/
with hiring plans said administration well-rounded governance
they will be seeking people with n 25% of respondents education, n 25% of respondents
this skill in the next 12 months. with hiring plans said and it gives with hiring plans said they will
n Last years ranking: No. 3 they will be seeking people with me confidence be seeking people with this skill
this skill in the next 12 months. that they can in the next 12 months.
Brosius says hiring Tier 1 and n Last years ranking: No. 6 communicate. n Last years ranking: No. 4
Tier 2 support people is a prior- Eric Brosius, vice
president of technology
ity at HRHCare, where organi- Demand for database adminis- services, HRHCare Although security expertise
zational growth has resulted in trators remains high thanks to slipped from No. 4 on last years
burgeoning technology needs. the ever-increasing interest in list of the 10 hottest tech skills,
But he acknowledges that com- big data, BI and analytics. personnel for managing and make no mistake about its
petition for talent is tough, so In its 2016 Salary Guide, interpreting raw data. importance: Security profes-
he says he looks for potential as Robert Half Technology lists da- The guide also states that sala- sionals are in demand and can
much as experience when eval- tabase administrator as one of ries for database administration command high salaries. Exactly
uating job applicants. the most in-demand specialties, positions will rise by 4% to 9% 50% of the IT professionals who
My recruiting model is to noting that more companies next year, with pay ranging from participated in our Forecast
find prospects, people recently are using big data analytics to about $100,000 to $200,000. 2016 survey said they plan to
graduated from college. I feel help inform business decisions Recruiters say employers increase spending on security
they have a well-rounded edu- and are relying on specialized want people with extensive technologies in the next 12

December 201 5 | Co m pute rwo r ld 33


Tech Forecast 2016Special Report

months, and security 12 months. with it, Ho says of Salesforce, cast list of the top 10 most in-
was No. 2 among According to n Last years noting that many companies face demand IT skills because organi-
Robert Half
the most important Technology, ranking: No. 12 that challenge with other cloud- zations have come to rely heavily
securit y sal aries
IT projects that will rise based systems as well. on the Web as a channel for con-

5%-7%
respondents have Andrew Ho is the Others are following his lead, necting with customers, clients,
underway (see Se- new vice president as the cloud continues to reshape partners and employees since
curity Takes Center of technology at enterprise IT. Research firm they built their first websites a
Stage, page 23). nex t year, ranging Global Strategy IDC predicts that more than half decade or two ago, IT leaders say.
from $100,000 on up
Compensation for to nearly $200,000 Group (GSG). At the of enterprise IT infrastructure While they dont need Web
on average .
security pros keeps moment, hes both and software investments will developers to establish a Web
going up because the top and only IT be cloud-based by 2018. Specifi- presence anymore, they do
demand for talented people is staffer at the public relations cally, spending on public cloud need people with the ability to
strong, and because security and research firm, which has 90 services will grow to more than ensure that their sites are open
specialists play a critical role employees in four U.S. offices. $127 billion by 2018, according and ready for business.
in most organizations. Accord- He wants to add someone with to an IDC forecast report. One of the main categories
ing to Robert Half Technologys experience in cloud computing where were seeing double-digit

10
2016 Salary Guide, salaries in and software as a service. growth is in Web development,
the security field will rise about Ho says GSG has made a sig- Web says Reed, of Robert Half Tech-
5% to 7% next year, ranging nificant investment in Salesforce development nology. Companies want [to
from $100,000 on up to nearly tools, and he wants someone n24% of respon- ensure] they have a website
$200,000 on average. who can ensure that the firm is dents with hiring thats mobile-friendly, thats easy
getting its moneys worth from plans said they will be seeking to navigate, and that showcases

9
that technology and any cloud people with this skill in the next other products and services so it
Cloud/SaaS offerings it uses in the future. 12 months. drives incremental sales. u
n 25% of respondents We bought ourselves a Ferra- n Last years ranking: No. 5
with hiring plans said ri, but we havent figured out how pratt is a Computerworld con-
they will be seeking to get it out of first or second gear. Web development continues to tributing writer. You can contact
people with this skill in the next Theres so much more we can do crack the Computerworld Fore- her at marykpratt@verizon.net.

December 201 5 | Co m pute rwo r ld 34


Trouble
Ticket

Journal
Security Managers interface. Our API architecture
was developed more than 10 At issue:
years ago and was never mod- Two important
ernized. When a user wants to security initiatives cant
write an API to help a customer be done without help
interact with our application, from other departments,
we issue two user IDs and pass- but no one has the time.
words. One credential is used
Money Talks When You to access a shared API gateway; Action plan:
Need to Get Things Done the other is used to access the
specific customers data.
Tie progress
on those initiatives to
Maybe requiring two differ- managers bonus pay.
Two security initiatives will languish if staffers have no
ent passwords seemed like a
incentive to work on them. Solution? Tie them to bonus pay.
strong security measure a de-
By Mathias Thurman
cade ago, but it doesnt impress tomer base that is currently us-
me today. Passwords can be ing the legacy API and change
For several months now, lifting and I wont be able to compromised. all sorts of documentation and
I have been proactively identi- handle them alone, but it can A more secure and modern enablement processes.
fying risks and vulnerabilities be tough to persuade colleagues method for allowing API access All in all, its a huge effort.
within my organization. to work on security initiatives, is to use OAuth, an open stan-
Some were easy especially in a small dard that uses access tokens is- Security Checkup
to fix I just had find full coverage of IT
security at computerworld.com/
company with a tiny sued by an authorization server. I also want to roll out an appli-
to write some new category/security security staff. Moving to OAuth will require cation that will let customers,
policies, convince One potential a great deal of engineering, support personnel and other
our facilities department to is- security weakness that I want to but even more daunting is the organizations assess the health
sue picture ID badges or replace address but that I cant do on my amount of change management of their security configurations.
our firewalls. own involves the architecture of thats required. We will have We offer several configura-
Others require some heavy our application programming to retrofit everyone in our cus- tion options to our customers,

December 201 5 | Co m pute rwo r ld 35


Security Managers JournalMathias Thurman

including password complex- ecutive team has given me their architecture and Identify re-
ity, session timeouts, lockout, blessing to pursue both of those quirements for a security health
multifactor authentication, initiatives. But that isnt the check application. Theyre in
single sign-on, and roles and same as allocating the resources my objectives as well.
permissions. necessary to successfully com- Now we all have a vested
A health check application plete the projects. So how are interest in completing these
would enable our customers we going to get them done? projects. Next quarter, Ill ex-
to identify both weaknesses Well, if the problem is that pand the objectives to move the
and opportunities to enhance the people I need to contribute initiatives along, and so on until
security. Our support organiza- to these projects have no incen- completion. It may take several
tion could use it to encourage tive to do so, then we need to quarters to complete both proj-
customers to enhance security give them an incentive. The tool ects, but itll be worth it. u
controls. available to do this is bonus pay-
outs. The company measures This weeks journal is written by
Calling All Teams performance by determining a real security manager, Mathias
So a strong case can be made for how well employees have met Thurman, whose name and em-
developing such an application. the various objectives laid out ployer have been disguised for
But like the issue with our API in their performance reviews. obvious reasons. Contact him at
architecture, it will require a lot Progress (or lack of progress) in mathias_thurman@yahoo.com.
of work from many teams, such meeting those objectives helps
as product management, engi- determine how large each em-
neering and support. ployees bonus will be.
The problem, of course, is I talked upper management It can be tough to persuade
that those folks are all focused into creating two objectives for colleagues to work on security
on daily operational activities key managers within the prod- initiatives, especially in a small
and other priorities identified uct management, support and company with a tiny security staff.
by management. engineering departments: De-
The good news is that the ex- velop a plan to modernize API

December 201 5 | Co m pute rwo r ld 36


Check out Sharkys blog, browse the Sharkives and sign up for home delivery.

But It Works at Home


This pilot fishs son works as a physical therapy aide
while studying computer science. He was talking with his
boss when an older physical therapist walked in and start-
ed unplugging the computers, says fish. One by one the
screens went black. Once the shock wore off, my son jumped
up and prevented her from unplugging PC number four. He
then asked her why she was unplugging the computers. Her

response: My computer is in any other offices, while


running slow, and I know he called IT and let them
that if I unplug enough know what happened.
computers, my computer
will get faster. As she went Oh, That Phone!
back to her PC to continue User complains that she
typing patient notes into keeps getting locked out
Word, my sons boss told of her account and this
him to follow her to make pilot fish is pretty sure he
sure she didnt try to in- knows why. From experi-
crease her computer speed ence we know this is usu-

H a l M ay f o r t h i l l u s t r at i o n December 201 5 | Co m pute rwo r ld 37


Shark Tank

The outside consultant brought in to help with the Exchange


upgrade notices the failed login attempts are coming from a mobile
device using the Outlook Web app, with an IP address thats
not on the company network.

ally a smartphone that is from a mobile device using some reason his health now having problems. Try
trying to check email with the Outlook Web app, with insurance companys logging in with just the
an old password after the an IP address thats not on website wont let him first eight characters, rep
user has changed their the company network it log in, so he calls the sup- says. Sighs fish, I tried it.
password, says fish. The belongs to AT&T, the users port number. Is there a It worked. They had been
user assures us that she mobile provider. Grumbles known issue on your sys- throwing away anything in
has changed the password fish, Its only then that tem, or is there a problem a password beyond eight
on her iPhone and that she tells us, Oh yeah, I with my account? he asks characters and then af-
they both match. Still, the have an old Android phone the support rep. There is ter the security upgrade,
user account is locking out at home that I use just as an issue that might be the people who had longer,
every 15 minutes. And af- a backup. Turns out that causing the problem, sup- better passwords were
ter a week of troubleshoot- phone has an active sync port rep says. It seems that the ones who were pun-
ing, upgrading and reboot- account on it and has been at the start of the month, ished for it. u
ing Exchange, the account attempting to check her security was switched from
still locks her out multiple corporate email account. supporting passwords of Pass the word to SharkY!
times a day. Then the out- six to eight characters to Send me your true tale
side consultant brought in No Good Password supporting passwords that of IT life at sharky@
to help with the Exchange Goes Unpunished were up to 15 characters, computerworld.com.
upgrade notices the failed Consultant pilot fish is pay- and customers with the Youll get a stylish Shark
login attempts are coming ing his bills online, but for longer passwords were shirt if I use it.

December 201 5 | Co m pute rwo r ld 38


Thornton MayOpinion

Thornton May is a speaker, educator and adviser and


the author of The New Know: Innovation Powered
by Analytics. Visit his website at thorntonamay.com,
and contact him at thornton@thorntonamay.com.

IT and the Entrepreneurial Age


Take note: IT can create, or it institution devoted to expand- it this way: Every 120 seconds, come easily. As GE CEO Jeff Im-
can destroy, an organizations ing our capability of coping 50,000 Libraries of Congress melt once said, The book that
ability to be entrepreneurial. with that very thing, believe full of additional information can help you has not been writ-
If your IT organization isnt that from this day forward, the will be created. Data growth ten yet. There are people you
nurturing entrepreneurship, change we experience every five and the rate of change go hand can learn from, but no one, not
youre in trouble. The age of years will be equal to what previ- in hand. Every second, there is even Google, Apple, Facebook
entrepreneurship is upon us. ously filled 100 years. Also ex- more to know. Every day, some- or Amazon, has figured out how
The enterprise the entire en- panding at a fearsome rate is the thing that once was impossible to sustainably play the expo-
terprise has to become entre- amount of data we collect. Dan or prohibitively expensive be- nential strategy game. Your or-
preneurial, meaning that it has Geer, the chief information se- comes possible and affordable. ganization is probably going to
to proactively adapt to rapidly curity officer at In-Q-tel, finds it The question for you to grap- need someone whose job it is to
changing circumstances. plausible that the compound an- ple with is how you can wrest do that; some strategic thinkers
The world is experiencing nual growth rate for new data is what you need from so much argue that the enterprise needs
exponential change. The futur- now 57%. That certainly sounds change and all those mountains a new CEO a chief entrepre-
ists at Singularity University, an big and abstract. So think of of data. The answer doesnt neurship officer.

December 201 5 | Co m pute rwo r ld 39


Thornton MayOpinion

The reason that is not a crazy to be entrepreneurial. ship number of businesses


idea is that what we are in for is Many people have the idea formed, number of workers
not a period of punctuated equi- that you have to be young, or a employed you are typically
librium a brief moment of software developer, or an inhab- hearing data about little e
fundamental change followed by itant of Silicon Valley to be an entrepreneurship. Thats why,
a return to stability but perpet- entrepreneur. None of that mat- in global surveys, Egypt is clas-
ual disequilibrium. Enterprises ters, though. You just have to sified as being more entrepre-
are going to have to figure out have an entrepreneurial mind- neurial than the U.S.; it has a
how to make money (and non- set. Sure, the person behind the whole lot of small-shop owners.
profit organizations are going to next big app might be a young Big E entrepreneurs create
have to figure out how to fulfill software developer in the Val- new industries, disrupt existing
their missions) under conditions ley, but thats not the sum total industries and assault the status
of massive and continuing un- of what makes an entrepreneur. quo. For the longest time, IT has
certainty. The cognitive exercise Remember Harland David hitched its wagon to little e
of determining which opportu- Sanders? He was 62 and living entrepreneurs. In the very near
nities to pursue when the entire in North Corbin, Ky., when he future, IT shops will become
landscape is shifting is what I call franchised his first Kentucky driven by the vision of being
exponential which-craft. Fried Chicken restaurant. in service to big E entrepre-
Innovation the conversion So what exactly is the entre- neurs. Get ready. u
of ideas into cash is at an all- preneurial mindset? It exists
time high. Today, if you want to between two poles, which you
be hired as a C-level executive can think of as little e entre-
in a major global enterprise, you preneurs and big E entrepre-
You dont have to be a young Silicon
are going to have to be capable neurs. Little e entrepreneurs
Valley software developer to be an
of delivering high-growth and start, own and operate small
entrepreneur. You just have to have
high-margin revenue streams. businesses. When you hear sta-
an entrepreneurial mindset.
In short, you are going to have tistics regarding entrepreneur-

December 201 5 | Co m pute rwo r ld 40

Potrebbero piacerti anche