Our tech hopes for 2014
We round up the IT Pro team and Leader Board members' tech wishes for the coming year.
There would have to be many considerations in terms of security, but I'm sure all of this would be addressed if the market presents the tools for the services to develop on top of."
Patricio Colombo, head of IT and systems, Jamie Oliver Ltd
"I think 2014 will see a a major data breach resulting from either the proliferation of employee-owned BYOD that have been compromised via malware or by or insecure cloud services and/or deployments."
Steve Harvey, director of middleware, Reed Elsevier
I hope that cyber threat intelligence becomes a mainstream capability of organisation's cyber defence against the 'unknown unknowns'. We need to work harder to look behind technical threat vectors and to identify the sources of cyber attack.
"A tech hope for 2014 would be that work done at CERN on the LHC leads to a new source of energy which is safe, clean and low-cost. The implications of such a discovery would dwarf previous advances in technology."
Simon Hogg, IT portfolio manager, Oxford Brookes
"The integration of the internet into everyday items such as 'the internet of things'. All contributing tech has come far enough to drive this further than ever and we have some really big companies investing a lot of money into it so the potential is limitless.
While I don't think it will set the world alight in 2014, it will certainly gain a lot more traction."
Brendon Petsch, IT director, Gritit
"[I hope that] cyber threat intelligence becomes a mainstream capability of organisation's cyber defence against the 'unknown unknowns'.
We need to work harder to look behind technical threat vectors and to identify the sources of cyber attack."
Simon Placks, head of IT forensics, Ernst & Young
Next-generation time series: Forecasting for the real world, not the ideal world
Solve time series problems with AIFree download
The future of productivity
Driving your business forward with Microsoft Office 365Free download
How to plan for endpoint security against ever-evolving cyber threats
Safeguard your devices, data, and reputationFree download
A quantitative comparison of UPS monitoring and servicing approaches across edge environments
Effective UPS fleet managementFree download