Skip to ContentGo to accessibility page
OpenStax Logo
Introduction to Business 2e

13.6 Trends in Information Technology

Introduction to Business 2e13.6 Trends in Information Technology

13.6 Trends in Information Technology

  1. What are the leading trends in information technology?

Information technology is a continually evolving field. The fast pace and amount of change, coupled with IT’s broad reach, make it especially challenging to isolate industry trends. Month over month, and year over year, new trends appear, and those that seemed important may fade. However, some trends that are reshaping today’s IT landscape are cloud-based solutions, the inclusion of AI within IT operations, and sustainability concerns with large data centers becoming more prolific.

The proliferation of AI technologies is changing how IT departments operate and support their organizations. AI is part of how nearly all software programs are built and deployed across business functions. However, one of the more important benefits of AI integration into IT operations is system reliability through real-time monitoring and automated fixes for network issues when they arise. This can be critical to the day-to-day functioning of the firm overall as IT is integrated across most business functions in nearly all companies and industries. IT professionals are utilizing AI and machine learning technologies to solve user issues more quickly, deliver a more reliable and secure network for the firm, and elevate productivity of employees with strategic integration of AI tools in the workplace.21

Cyber Sleuthing: A New Style of Crime Busting

What helped investigators bring suit against Enron, Merck’s Vioxx medication, and the BTK serial killer? Digital evidence taken from an individual’s computer or corporate network—web pages, pictures, documents, and e-mails are part of a relatively new science called digital forensics. Digital-forensics software safeguards electronic evidence used in investigations by creating a duplicate of a hard drive that an investigator can search by keyword, file type, or access date. Digital forensics is also evolving into areas such as cloud computing and blockchain technology. For instance, it is estimated that as much as 14 percent of the original 21 million bitcoins are "lost" due to various issues such as discarded hardware or lost passwords.22

But nowadays digital sleuthing is not limited to law enforcement. Companies such as Walmart and Target, and in industries including insurance and healthcare organizations, have their own in-house digital forensics teams. And what if you’re in New York and need to seize a hard drive in Hong Kong? No problem. With advancements in digital forensic tools, users can now search hard drives remotely. Digital forensics makes it possible to track down those who steal corporate data and intellectual property. Broadcom, a semiconductor chip designer, used computer forensics to investigate and apprehend former employees who were attempting to steal trade secrets. In the process, Broadcom gathered incriminating e-mails, including deleted documents, that gave it solid evidence to use existing legislation as support to stop the former employees from starting up a rival firm.23

However, there is a downside to having these advanced capabilities. If this kind of software falls into the wrong hands, sophisticated hackers could access corporate networks and individual computers as easily as taking candy from a baby—and the victims would not even know it was happening. In an age of corporate wrongdoing, sexual predators, and computer porn, your hard drive will tell investigators everything they need to know about your behavior and interests, good and bad. Cybersleuthing means we are all potential targets of digital forensics. As evidenced by the huge increase in identity theft, personal privacy—once an unassailable right—is no longer as protected as it once was.

Ethics in Practice

Unearthing Your Secrets

Cybercrimes in our technologically driven world are on the increase—identity theft, pornography, and sexual predator victim access, to name a few. The FBI’s computer analysis response team confirms their caseload includes hundreds of cases per day. To keep up with the changing world we live in, law enforcement, corporations, and government agencies have turned to new crime-fighting tools, one of the most effective being digital forensics.

The leader in this technology is OpenText, which acquired Guidance Software that developed solutions to identify, recover, and deliver digital information in a forensically sound and cost-effective manner. The company employs people at offices and training facilities across the world. Its high-profile clients include leading police agencies, government investigation and law enforcement agencies, and Fortune 1000 corporations in the financial service, insurance, high-tech and consulting, health care, and utility industries.

OpenText's software suite of OpenText EnCase® solutions is the first computer forensics tool able to provide world-class electronic investigative capabilities for large-scale complex investigations. Law enforcement officers, government/corporate investigators, and consultants around the world can now benefit from computer forensics that exceed anything previously available. The software offers an investigative infrastructure that provides network-enabled investigations, enterprise-wide integration with other security technologies, and powerful search and collection tools. With EnCase, clients can conduct digital investigations, handle large-scale data collection needs, and respond to external attacks.

Notably, forensic tools such as EnCase have been used by law enforcement to solve murder cases that have gone cold, major security breaches, and even to examine data retrieved in military operations.

Guidance Software also helps reduce corporate and personal liability when investigating computer-related fraud, intellectual property theft, and employee misconduct. It protects against network threats such as hackers, worms, and viruses and hidden threats such as malicious code.

In response to increases in the number and scope of discovery requests, new solutions have been developed such as OpenText eDiscovery. The software package dramatically improves the practice of large-scale discovery—the identification, collection, cataloging, and saving of evidence—required in almost every major legal case these days. eDiscovery integrates with other litigation-support software to significantly decrease the time for corporations to accomplish these tasks. At the same time, it improves regulatory compliance and reduces disruption. The result is many millions of dollars in cost savings.

Sources: FBI website, https://www.fbi.gov, accessed January 15, 2018; Guidance Software website, https://www.guidancesoftware.com, accessed January 15, 2018; OpenText website, https://www.opentext.com, accessed January 15, 2018; "7 Real-Life Cases Solved Using Digital Forensics [References]," https://www.ticktechtold.com, April 16, 2023.

Critical Thinking Questions
  1. How is Guidance Software responding to and helping to manage changes in our technology-driven world?
  2. What other types of forensics software do you foresee a need for in the future? Do you think there are ethical issues in using forensics software, and why?
  3. What are the benefits and risks of Guidance Software being acquired by a larger company?

The Distributed Workforce

Insurance company Aetna (now part of CVS Health) shuttered 2.7 million square feet of office space, saving the company $78 million, while American Express estimates it saved between $10 to $15 million dollars per year by expanding its distributed workforce. Was this a sign that these company were in trouble? Far from it. Instead of maintaining expensive offices in multiple locations, they sent employees home to work and adopted a new model for employees: the distributed workforce. Employees have no permanent office space and work from home or on the road. The shift to virtual workers has been a huge success, and not only do companies save on their personnel and related costs, but they also have happier, more productive employees.

Aetna and American Express are not alone in recognizing the benefits of distributed workers, especially in companies that depend on knowledge workers. Estimates show that over 20 percent of Americans work remotely, but this can vary by industry and geographic location. The World Economic Forum estimates that nearly 100 million jobs globally will be remote by 2030. Long commutes, high gas costs, and better connecting tools and technologies make this an attractive option for many workers who like the flexibility of not working in an office.24 Already, employees use the internet to conduct video-conferenced meetings and collaborate on teams that span the globe. On the downside, working from home can also mean being available 24/7—although most workers consider the trade-off well worth it.

According to current statistics, over 30 million U.S. workers work from home at least half of the time. Remote workers continue to be recruited by companies of all sizes, including Allstate, Humana, Pinterest, and others.25 At Allstate, thousands of employees participate in the virtual-work program, and it has been a critical factor in attracting and retaining younger workers. Almost half of the employees at Sun Microsystems (now part of Oracle) are “location-independent,” reducing real estate costs by $300 million. Additional benefits for Sun are higher productivity from these workers and the ability to hire the best talent. “Our people working these remote schedules are the happiest employees we have, and they have the lowest attrition rates,” says Bill MacGowan, senior vice president for human resources at Sun. “Would I rather settle on someone mediocre in the Bay Area, or get the best person in the country who is willing to work remotely?”26

Grid and Cloud Computing Offer Powerful Solutions

How can smaller companies that occasionally need to perform difficult and large-scale computational tasks find a way to accomplish their projects? They can turn to grid or cloud computing, also called utility computing or peer-to-peer computing. Cloud and grid technology provides a way to divide the job into many smaller tasks and distribute them to a virtual supercomputer consisting of many small computers linked into a common network. Combining multiple desktop machines results in computing power that exceeds supercomputer speeds. A hardware and software infrastructure clusters and integrates computers and applications from multiple sources, harnessing unused power in existing PCs and networks. This structure distributes computational resources but maintains central control of the process. A central server acts as a team leader and traffic monitor. The controlling cluster server divides a task into subtasks, assigns the work to computers on the grid with surplus processing power, combines the results, and moves on to the next task until the job is finished. Exhibit 13.9 shows how typical grid and cloud setups work, and the differences between the two.

Exhibit 13.9 How Grid and Cloud Computing Work (Attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license.)

With utility computing, any company—large or small—can access the software and computer capacity on an as-needed basis. One of the big advantages of cloud computing is that companies can update their inventory in real time across their entire organization. For example, suppose you are an appliance retailer and have several outlets throughout the Midwest. If you have one model of a Whirlpool washing machine in your Des Moines, Iowa, store, and a salesperson in your Chicago location can sell that model in Chicago, the sale can be accomplished pretty easily. They can finalize the sale, create the shipping instructions, and update the inventory record automatically—and the Chicago consumer’s needs will be met.27

Amazon Web Service (AWS), Microsoft Azure, and Oracle Cloud are among the companies providing as-needed cloud and grid services. Although cloud and grid computing appears similar to outsourcing or on-demand software from ASPs, it has two key differences:

  • Pricing is set per-use, whereas outsourcing involves fixed-price contracts.
  • Cloud and grid computing goes beyond hosted software and includes computer and networking equipment as well as services.

The cloud and grids provide a very cost-effective way to provide computing power for complex projects in areas such as weather research and financial and biomedical modeling. Because the computing infrastructure already exists—they tap into computer capacity that is otherwise unused—the cost is quite low. The increased interest in cloud and grid technology will continue to contribute to high growth.

Concept Check

  1. How are companies and other organizations using digital forensics to obtain critical information?
  2. Why do companies find that productivity rises when they offer employees the option of joining the virtual workforce?
  3. What advantages do grid and cloud computing offer a company? What are some of the downsides to using this method?
Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:

    Access for free at https://openstax.org/books/introduction-business-2e/pages/1-introduction

  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:

    Access for free at https://openstax.org/books/introduction-business-2e/pages/1-introduction

Citation information

© Apr 3, 2026 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.