Data Realities: 2017 & Beyond

Data matters. You don’t need to be a professionally trained futurist to see that a critical driving force in the global economy for the next 10 years will be data exploitation, creation of value with data, data-sharing and data protection. Executives need to examine what they know and how they think about data.

That’s because data matters, now more than ever. The recent CES in Las Vegas drove this home. If you hadn’t accepted the reality of the Internet of Things (IoT), you couldn’t escape it at CES 2017.

When the IoT becomes dominant, every object will be collecting and sharing data. Smart beds will be sharing data with smart thermostats, smart refrigerators will be sharing data with smart product packaging, and smart hairbrushes will be sharing data with human hair brushers. And everything will be a source of data.

Proof, a prototype wearable from Milo Sensors, measures blood alcohol level through your skin. Aspiring baseball superstars can use a virtual batting cage in which they practice against a database of every pitch ever thrown by a particular pitcher.

The nature of relationships will change. Everything will have a relationship with everything, objects with other objects, objects with their manufacturers, objects with their human users.

The robots showcased at CES 2017, such as Mayfield Robotics’ Kuri and LG’s Hub Robot, were notable not so much for what they could do as for the relationship their interface enabled, their personality.

The Yui interface of Toyota’s “Concept-i” concept car collects data that apparently can tell when the driver is happy or sad and adjust the mood inside the car accordingly. The NeuV concept vehicle puts Honda on a path that will “enable machines to artificially generate their own emotions,” according to the company.

Data is Power

For 420 years, no one has challenged Sir Francis Bacon’s formulation that knowledge is power. But in 2017 and beyond, data is power. The differences run deep. Knowledge is gained through study and experience. Data is merely collected, and in such a quantity that no human mind can begin to contain it.

And those who collect it are divvying up the spoils in a data cold war, with Google accumulating a data set that reflects what we want to know, Amazon what we buy, Apple what we listen to and where we go, and Facebook how we connect. What is the Geneva Convention that governs what can be done with that data? And, with carmakers entering the fray with a focus on what we feel, are there different rules for collecting, managing and acting upon emotional data?

Who determines what data will be shared with what devices under which circumstances? Will we need a database to keep track of all the devices we have relationships with, another of which devices have relationships with which other devices and yet another of data permissions we have granted and revoked? A question looming in the not-so-distant future is how much of machine-to-machine language humans will need to understand.

Two ways of considering the balance of power between individuals and the data colossi are data empowerment and transparency. Data empowerment is the degree to which you can decide who knows what about you and when, now and in the future.

Transparency is how knowable an individual or organisation is. In this early stage of our digital society, individuals are becoming more and more transparent, while some organisations are becoming more opaque. But marketers tell me that consumers will influence companies by valuing transparency.

To be successful, brands will have to be transparent about diversity in their workforce, sources of their raw materials, their eco-behaviors and more.

Sadly, although we live in a data-defined reality, the vast majority of executives leading major institutions today have received no formal training in data management.

It will be fascinating to see what path individuals and organisations follow as they seek to hone and enhance data skills and rectify data deficiencies. Will universal measures of data skills be created? To be employable in the future, will one need to possess as-yet-un-agreed-upon data skills certifications?

The bottom line is we exist at a moment when individuals have infinite choice regarding what data they wish to collect, analyse and act upon.

Computerworld

 

« Google's New AI System Unscrambles Pixelated Faces
Does Russia’s Election Meddling Break International Law? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Innefu Labs

Innefu Labs

Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions.

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

Wired Assurance

Wired Assurance

Wired Assurance is a testing and assurance company, specialized in software applications and blockchain smart contracts.

Cloudbrink

Cloudbrink

Cloudbrink is purpose-built to deliver the industry’s highest performance connectivity to remote and hybrid workers, anywhere in the world.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

Sphinx

Sphinx

Sphinx provide advanced security consulting services and cyber solutions to federal and private industry.