Data Realities: 2017 & Beyond

Data matters. You don’t need to be a professionally trained futurist to see that a critical driving force in the global economy for the next 10 years will be data exploitation, creation of value with data, data-sharing and data protection. Executives need to examine what they know and how they think about data.

That’s because data matters, now more than ever. The recent CES in Las Vegas drove this home. If you hadn’t accepted the reality of the Internet of Things (IoT), you couldn’t escape it at CES 2017.

When the IoT becomes dominant, every object will be collecting and sharing data. Smart beds will be sharing data with smart thermostats, smart refrigerators will be sharing data with smart product packaging, and smart hairbrushes will be sharing data with human hair brushers. And everything will be a source of data.

Proof, a prototype wearable from Milo Sensors, measures blood alcohol level through your skin. Aspiring baseball superstars can use a virtual batting cage in which they practice against a database of every pitch ever thrown by a particular pitcher.

The nature of relationships will change. Everything will have a relationship with everything, objects with other objects, objects with their manufacturers, objects with their human users.

The robots showcased at CES 2017, such as Mayfield Robotics’ Kuri and LG’s Hub Robot, were notable not so much for what they could do as for the relationship their interface enabled, their personality.

The Yui interface of Toyota’s “Concept-i” concept car collects data that apparently can tell when the driver is happy or sad and adjust the mood inside the car accordingly. The NeuV concept vehicle puts Honda on a path that will “enable machines to artificially generate their own emotions,” according to the company.

Data is Power

For 420 years, no one has challenged Sir Francis Bacon’s formulation that knowledge is power. But in 2017 and beyond, data is power. The differences run deep. Knowledge is gained through study and experience. Data is merely collected, and in such a quantity that no human mind can begin to contain it.

And those who collect it are divvying up the spoils in a data cold war, with Google accumulating a data set that reflects what we want to know, Amazon what we buy, Apple what we listen to and where we go, and Facebook how we connect. What is the Geneva Convention that governs what can be done with that data? And, with carmakers entering the fray with a focus on what we feel, are there different rules for collecting, managing and acting upon emotional data?

Who determines what data will be shared with what devices under which circumstances? Will we need a database to keep track of all the devices we have relationships with, another of which devices have relationships with which other devices and yet another of data permissions we have granted and revoked? A question looming in the not-so-distant future is how much of machine-to-machine language humans will need to understand.

Two ways of considering the balance of power between individuals and the data colossi are data empowerment and transparency. Data empowerment is the degree to which you can decide who knows what about you and when, now and in the future.

Transparency is how knowable an individual or organisation is. In this early stage of our digital society, individuals are becoming more and more transparent, while some organisations are becoming more opaque. But marketers tell me that consumers will influence companies by valuing transparency.

To be successful, brands will have to be transparent about diversity in their workforce, sources of their raw materials, their eco-behaviors and more.

Sadly, although we live in a data-defined reality, the vast majority of executives leading major institutions today have received no formal training in data management.

It will be fascinating to see what path individuals and organisations follow as they seek to hone and enhance data skills and rectify data deficiencies. Will universal measures of data skills be created? To be employable in the future, will one need to possess as-yet-un-agreed-upon data skills certifications?

The bottom line is we exist at a moment when individuals have infinite choice regarding what data they wish to collect, analyse and act upon.

Computerworld

 

« Google's New AI System Unscrambles Pixelated Faces
Does Russia’s Election Meddling Break International Law? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.