Data Realities: 2017 & Beyond

Data matters. You don’t need to be a professionally trained futurist to see that a critical driving force in the global economy for the next 10 years will be data exploitation, creation of value with data, data-sharing and data protection. Executives need to examine what they know and how they think about data.

That’s because data matters, now more than ever. The recent CES in Las Vegas drove this home. If you hadn’t accepted the reality of the Internet of Things (IoT), you couldn’t escape it at CES 2017.

When the IoT becomes dominant, every object will be collecting and sharing data. Smart beds will be sharing data with smart thermostats, smart refrigerators will be sharing data with smart product packaging, and smart hairbrushes will be sharing data with human hair brushers. And everything will be a source of data.

Proof, a prototype wearable from Milo Sensors, measures blood alcohol level through your skin. Aspiring baseball superstars can use a virtual batting cage in which they practice against a database of every pitch ever thrown by a particular pitcher.

The nature of relationships will change. Everything will have a relationship with everything, objects with other objects, objects with their manufacturers, objects with their human users.

The robots showcased at CES 2017, such as Mayfield Robotics’ Kuri and LG’s Hub Robot, were notable not so much for what they could do as for the relationship their interface enabled, their personality.

The Yui interface of Toyota’s “Concept-i” concept car collects data that apparently can tell when the driver is happy or sad and adjust the mood inside the car accordingly. The NeuV concept vehicle puts Honda on a path that will “enable machines to artificially generate their own emotions,” according to the company.

Data is Power

For 420 years, no one has challenged Sir Francis Bacon’s formulation that knowledge is power. But in 2017 and beyond, data is power. The differences run deep. Knowledge is gained through study and experience. Data is merely collected, and in such a quantity that no human mind can begin to contain it.

And those who collect it are divvying up the spoils in a data cold war, with Google accumulating a data set that reflects what we want to know, Amazon what we buy, Apple what we listen to and where we go, and Facebook how we connect. What is the Geneva Convention that governs what can be done with that data? And, with carmakers entering the fray with a focus on what we feel, are there different rules for collecting, managing and acting upon emotional data?

Who determines what data will be shared with what devices under which circumstances? Will we need a database to keep track of all the devices we have relationships with, another of which devices have relationships with which other devices and yet another of data permissions we have granted and revoked? A question looming in the not-so-distant future is how much of machine-to-machine language humans will need to understand.

Two ways of considering the balance of power between individuals and the data colossi are data empowerment and transparency. Data empowerment is the degree to which you can decide who knows what about you and when, now and in the future.

Transparency is how knowable an individual or organisation is. In this early stage of our digital society, individuals are becoming more and more transparent, while some organisations are becoming more opaque. But marketers tell me that consumers will influence companies by valuing transparency.

To be successful, brands will have to be transparent about diversity in their workforce, sources of their raw materials, their eco-behaviors and more.

Sadly, although we live in a data-defined reality, the vast majority of executives leading major institutions today have received no formal training in data management.

It will be fascinating to see what path individuals and organisations follow as they seek to hone and enhance data skills and rectify data deficiencies. Will universal measures of data skills be created? To be employable in the future, will one need to possess as-yet-un-agreed-upon data skills certifications?

The bottom line is we exist at a moment when individuals have infinite choice regarding what data they wish to collect, analyse and act upon.

Computerworld

 

« Google's New AI System Unscrambles Pixelated Faces
Does Russia’s Election Meddling Break International Law? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace.

Camel Secure

Camel Secure

Camel Secure is a company specialized in the development of products for information security and technology risk management.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.

Kaavalan

Kaavalan

Kaavalan was founded with a mission and a vision to protect you against cyber threats in the connected world.

Freeze

Freeze

Freeze prevents attacks before they can start by finding, removing, and stopping the spread of information about your organization and employees.