Feeds

Clouds gathering on horizon for software devs, say wise men

'There are things to be done. I don’t know what they are'

Combat fraud and increase customer satisfaction

The software industry will dissolve into a soup of micro-detailed web services delivered over the cloud by 2022, with IT departments reduced to “guiding” users to prevent them from leaking their companies’ crown jewels onto the net.

That was the extremist version of the vision sketched out by a panel considering “The Software Industry Ten Years from Now” at the Cloud Computing World Forum yesterday, which considered how the cloud will affect the development and management of software.

Eriks Dobelis, former information SVP at Air Baltic and professor at the Riga Business School, said that services delivered by SaaS “will get smaller and smaller, focusing on a single task.”

This has obvious, and potentially unpleasant implications for people who make their living developing and/or selling massive bespoke applications.

John Harris, chief architect & VP global IT strategy, innovation and learning at GlaxoSmithKline, and chairman of the Corporate IT Forum, said:

“The accessibility of platforms means that software development is no longer such a specialist activity.”

As the “internet of things” generated oceans of data, the traditional software great and the good would no longer be in a position to dictate terms, Harris said. He cited the example of Google Maps, where it was crowdsourcing - for want of a better word - that had created many of the most interesting applications.

“There are things that can be done. I don’t know what they are,” he said, “but software will be created by the world.”

As for the IT department, he said: “We won’t be controlling. I think our job will be to guide.”

Dobelis said that it would become increasingly difficult to protect intellectual property in the form of software, with the costs of protection increasingly simply uneconomic compared to the benefit.

However, Harris pointed out that for a company like GlaxoSmithKline, protecting its core IP was an existential challenge. So, he argued, the challenge for IT departments became educating users about what to keep well away from the cloud. When it came to the “crown jewels” they had to be in “the most secure environment".

CohesiveFT CTO and Borland veteran Patrick Kerpan said that as companies give up hands-on control of their data it will have to be encrypted, so that as the hardware and the data pipes get faster, the potential loss does not represent the penalty it does today.

But Kerpan said that while companies and individuals might feel they are no longer spending a fortune on software, they will find they are handing over a fortune for their data services – from broadband, to cellular and cable.

As for the possibility of making money from the software industry, Fort Technologies' sales and marketing director Noel O’Grady quipped:

“If nobody’s buying software, I’ve got just a few years to sell my company,” before pointing out that his business was providing the tools for developers and providers to tie the myriad services together. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.