


Six trends that will have a major impact on today's corporate IT market
Everyone is talking about AI and it is pointed out that many companies have integrated AI into their business. "It's already built in, or is being built into existing SaaS platforms at the largest providers."
However, with the arrival of AI comes a certain level of fear and apprehension, Fox said. There are many problems. "What would a fully AI-enabled company look like? Will it have the same workforce, in the same locations?" Those aren't questions that need to be answered today, she said, but they do need to be considered.
This and several other emerging trends may be about to reshape the IT and business world. That's why Asana CIO Saket Srivastava believes there has never been a better time to become a CIO.
Despite the uncertainty about AI and the future of work, it’s an exciting time for IT leaders to leverage new technologies to drive strategy, aid decision-making and guide planning,” he said.
To help you keep up with the ever-changing pace, here are some of the major trends impacting today’s corporate IT market.
GenAI affects everything
GenAI is one of the most important IT market trends right now "We often see trends that impact certain parts of an organization, but GenAI has the potential to be a catalyst for change in everything from the back office to consumer products and everything in between," said Mike Storiale, vice president of innovation development at financial services company Synchrony.
Catalytic technologies like GenAI create demand for change, Storiale said. "This demand is exciting and unlocks tremendous potential, but it also creates the need for IT teams to focus precisely on how to prioritize and scale tools to empower the organization while also being accountable."
It’s crucial to embrace this paradox, he added: “You need to move fast but also be cautious.”
GenAI is driving creativity, from improving employee experience to growing operations to customer experience, Storiale said. At the same time, there is an increasing focus on what needs to be prioritized to ensure companies have the resources and tools to meet GenAI’s needs.
“Like other catalytic trends, we will see an explosion of ideas in the short term, followed by groundbreaking shifts, and then stabilizing on effective use cases,” he predicts. "Over time, we expect GenAI to become an intrinsic part of operations, just like previous catalysts such as the Internet, mobility and cloud computing."
GenAI will enable companies to leverage data efficiently and productively, said Lori Beer, global chief information officer of JPMorgan Chase.
“We are in the early stages of the GenAI journey, but it is transformative,” she observed. Teams across industries are evaluating how their organizations can leverage data more effectively. “For a company like JPMorgan Chase, we have vast amounts of data, and data is the fuel for AI, allowing us to highly differentiate our capabilities, services and products to our clients, consumers, communities and employees.”
Beer believes that for her company, GenAI will bring a higher level of personalization, more targeted messaging, tailored stock recommendations, efficiently summarized earnings reporting and streamlined internal processes. .
Quantum Computing Enters Companies
While current quantum computers are primarily advanced research machines, they may soon impact every aspect of the business world, just as GenAI has already upended companies, Scott Buchholz, managing director of consulting firm Deloitte Consulting, predicts.
“While IT leaders are still trying to figure out how and when this will impact their businesses, quantum computing has tremendous potential to disrupt industries such as energy, finance, cybersecurity, and more,” he said.
Quantum computing technology is ideal for processing optimization, machine learning and data analysis. "It could be useful for companies in a wide range of activity areas, from supply chain optimization and vehicle routing to predictive modeling to complex derivatives valuation," Buchholz said. Quantum computers may also transform adopters' understanding and simulation capabilities of chemistry and materials science. "We may soon reach a point where quantum computers can solve problems that today's supercomputers cannot."
Cloud computing adoption slows down and reflections on it
In the past For more than a decade, IT leaders have invested in a variety of "silver bullets" they hoped would solve all their pressing problems, said Christian Kelly, managing director at corporate consulting firm Accenture. "Every time, most IT organizations adopt new technologies and models at a micro level without changing their technology architecture - the way they work or the way they interact with upstream and downstream business partners."
Such past experiences have led many CIOs to rethink their existing cloud investments and slow down their cloud migrations. "These leaders report that cloud computing is costing them more money than expected without seeing the promised ROI," Kelly said. "This is because these CIOs have not made the structural changes needed to unlock the full potential of the technologies they pursue."
Zero Trust Security Becomes the Norm
IT security is continuing to evolve toward a zero trust security model, which is based on the idea that nothing inside or outside a company’s network should be implicitly trusted.
“While Zero Trust itself is not a cybersecurity solution, implementing a Zero Trust architecture should help mitigate and ultimately reduce the number of successful cybersecurity attacks on an organization,” Industrial Automation Company Rockwell Automated operational technology security strategist Robert Pingel said.
Maintaining a vigilant zero-trust architecture requires constant adaptation. "The first line of defense is regular vulnerability assessment and testing to identify weaknesses and promote continuous improvement," Pingel said. It’s also important to incorporate updated threat intelligence and adapt policies and controls to address evolving cyber threats.
Multiple vendors are responding to the rapidly growing zero trust trend. Monitoring and logging technologies play a vital role, providing real-time visibility into user activity and suspicious behavior. "This allows for rapid investigation and remediation, preventing security vulnerabilities from escalating," Pingel said. “Automation streamlines repetitive tasks such as access control updates and anomaly detection, freeing up security teams to perform strategic tasks.” Regular employee training can also foster a culture of security awareness, empowering everyone to identify and report potential threats.
Network Resilience Gains Momentum
More and more chief information officers are doubling down on network resilience, said Ron Culler, vice president of network development programs at the Computing Technology Industry Association (CompTIA). He noted that cyber resilience focuses on keeping a company functioning in the event of an attack. “Simply put, it’s about keeping your company alive.”
Cyberattacks are inevitable, but disasters and incidents can also damage or destroy digital assets and data. "A cyber resilience strategy builds a plan for how to deal with these issues when they occur," Culler said. As with Zero Trust security, numerous vendors are working to provide customers with tools and services geared toward cyber resilience.
Achieving cyber resilience starts with identifying risks. "You need to know what you need to protect and why," Culler said. “It’s not just about your IT systems, but the business units they support and ultimately the entire company.” Cyber resilience isn’t just the responsibility of IT and security leaders, Culler added. “It requires buy-in and active participation from everyone from the board to staff,” he explains. “Once you identify the risks, create your policies and plans, test them, learn from your mistakes, and start again.”
Challenges of AI Data Management
Fox from NCC Group warns that AI is becoming a huge data access challenge. “When using AI at the corporate level, how the data is stored, where it is stored, and who has access to that data is critical,” she said.
Fox pointed out that some technology providers have created AI environments that limit data only to the host organization. But she wonders whether organizations will be able to manage access to data as data sets grow. The nature of AI is weakly structured, which makes controlling data a challenge.
“Deleting data from an AI model is not as simple as deleting emails or records from a database; it’s much more complex,” Fox said. "This will require new professional skills to manage AI data models."
The above is the detailed content of Six trends that will have a major impact on today's corporate IT market. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

Managing Hadoop logs on Debian, you can follow the following steps and best practices: Log Aggregation Enable log aggregation: Set yarn.log-aggregation-enable to true in the yarn-site.xml file to enable log aggregation. Configure log retention policy: Set yarn.log-aggregation.retain-seconds to define the retention time of the log, such as 172800 seconds (2 days). Specify log storage path: via yarn.n
