by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January 2015
CYBEREYE 2015 IS SHAPING UP as a year when data analytics, ubiquitous video, and cyber fo- rensics will force government IT managers to make decisions about how they deploy their resources. The following five technology trends will drive those decisions. 1. Big data analytics will expand in a multiple directions. Many government agencies are starting to realize they must not only deal with a coming big data deluge, they also need to make sense of that data – in multiple ways and through many aspects of government information and services delivery. This includes “entity analytics” to look for common elements related to terrorism and fraud analytics related to taxes, unemployment compen- sation, health payments and more. Leveraging data collected from the Internet of Things as well as smart city applications ranging from traffic analysis to perimeter security monitors, are also on the near horizon for local public safety agen- cies. Each of these efforts involves analyzing different types of data that are held in different collections. Thus the world of analytics will start to have highly specialized focus areas, even as databases themselves are merged and shared. What’s more, meta- data will play a larger role in tracking these data types, and agencies will need to expand their efforts to build reliable metadata structures. 2. The rise of ubiquitous video. Here are some of the drivers: Police are under pressure to wear body cameras. Many types of vehicles, not just police cars but even snow plows and other maintenance vehicles are being equipped with dashboard cams. Like- wise there is a growing num- ber of cameras in hallways, stairwells and common spaces of government offices. Some workers even choose to leave their webcams on as a way of keeping watch on their work spaces. All of this not only creates more data, it begs for new sets of rules. Who has access to these video feeds? How can they be used? How long should the files be stored? Consequently, new rules may need to be set for when police cameras are turned off and on, who has access to the full range of video, and whether the files can be released im- mediately or if longer delays are necessary. 3. The logistics of data col- lection raises more than just ownership issues. In many cases, data owner- ship has taken top billing in the data logistics debate. Under pressure to share data, agencies often lose control of how it is updated, what their metadata covers and how the data should be used once it leaves their hands. However, other sets of issues arise as high-end computers need specific rules about the locations of their data stores. In converged infrastructures, processing is faster if data is stored in high-speed network attached systems. “Hyperconverged” systems further ramp up per- formance by moving storage closer to the compute element – even resident in memory – while also streamlining the management of those resources. These trends mean data logistics will become an important part of future gov- ernment data collection and the decision making process about where it is stored. 4. Cyber investigations be- come more complex. The Sony studio hacking has ramped up the need for better cyber forensics. Everything from improved egress filtering to data visu- alization for attack patterns and high-end tracing tools for packet traffic is on the table. The problem is that most of these tools already exist, but most agencies don’t use all of them because of management costs and processing over- head. Thus, to use the best possible security tools, invest- ments must also be made in infrastructure. 5. Predictive analytics and maintenance is on the rise. Predictive analytics can be tied to many activities. Security experts are build- ing applications that monitor external penetration efforts while predicting the next steps that hackers will take. At the same time behavioral pro- filing – collecting, analyzing and interpreting information to identify risks and predict threats – is on the rise. Meanwhile physical asset- intensive government depart- ments will invest in predic- tive maintenance solutions enabled by the intersection of big data, IoT, mobile and cloud computing. New applications can send messages and calendar tickler files when maintenance is anticipated. In the long term, this can cut maintenance costs and allow maintenance to be scheduled rather than treated as an emergency. • — Shawn McCarthy is research director for IDC Government Insights. 18 GCN JANUARY 2015 • GCN.COM In many cases, data ownership has taken top billing in the data logistics debate. BY SHAWN McCARTHY INTERNAUT 5 trends that will drive IT management in 2015 0115gcn_018.indd 18 1/14/15 9:18 AM
November and December 2014