And anyone who has experienced a new system rollout knows how important good change management is to the success of an initiative.
Managing information security in the light of ongoing new technology opportunities for both IT and higher education professionals presents another set of challenges.
When solutions become available that address their particular problems, members of that group will adopt new technologies.
Kurzweil noted that although such an exponential growth pattern accrues only modest quantities at the beginning, when the second half of the chessboard is reached, the ensuing increases produce almost unimaginably large amounts.
Viewing the impact of Moore's Law from this perspective, we can see that technology will at some point reach the second half of the chessboard.
But change dominates even the day-to-day, where challenges are in some ways more complex than ever. You've been humming the tune, perhaps dancing to its rhythm.
You may not know all the words, but everyone knows the refrain: "Mobile-Cloud-Big Data-Business Value-Agile-Transformation-Social-Analytics-Online Learning." Some people know just a verse or two, some know several, and some are even helping to write new verses. Information technology has reached an inflection point.
Information technology has reached an inflection point.