Gartner: Top 10 Technology Trends 2015

Download Gartner: Top 10 Technology Trends 2015

Post on 15-Jul-2015

7.705 views

Category:

Technology

0 download

Embed Size (px)

TRANSCRIPT

<ul><li><p>Top 10 Strategic Technology Trends for 2015 David Cearley </p></li><li><p>Technology Adoption and Market Disruption </p><p>Strategic Technology Trends </p><p>Time </p><p>Gro</p><p>wth</p><p>Emerging Growth Mainstream </p><p>Disruption Clarified and Starting Disruption </p><p>Uncertain </p><p>Disruption Happening or Happened </p></li><li><p>Top 10 Strategic Technology Trends for 2015 </p><p>The New IT Reality Emerges </p><p>Intelligence Everywhere </p><p>Merging the Real World and the Virtual World </p><p>1 Computing Everywhere 2 The Internet of Things </p><p>4 Advanced, Pervasive and Invisible Analytics </p><p>6 Smart Machines 7 Cloud/Client Computing </p><p>3 3D Printing </p><p>5 Context-Rich Systems </p><p>8 Software-Defined Applications and Infrastructure 9 Web-Scale IT 10 Risk-Based Security and Self-protection </p></li><li><p>Top 10 Strategic Technology Trends for 2015 </p><p>The New IT Reality Emerges </p><p>Intelligence Everywhere </p><p>Merging the Real World and the Virtual World </p><p>1 Computing Everywhere 2 The Internet of Things </p><p>4 Advanced, Pervasive and Invisible Analytics </p><p>6 Smart Machines 7 Cloud/Client Computing </p><p>3 3D Printing </p><p>5 Context-Rich Systems </p><p>8 Software-Defined Applications and Infrastructure 9 Web-Scale IT 10 Risk-Based Security and Self-protection </p></li><li><p>Computing Everywhere Look Beyond Mobile Form Factors </p><p>Inside everything All around </p><p>Pocketable Portable Shared areas Desk </p><p>Touch, voice, etc. Keyboard, mouse </p><p>Gesture </p><p>Portable screen Wearable Convertible </p><p> Many form factors, screen sizes, interaction styles, platforms, architectures </p><p> Technology advances accelerate: Sensors, displays, wireless and more </p><p> Embrace heterogeneity and loss of complete control </p><p> Use containment and isolation as a foundational security strategy </p></li><li><p>The User Experience in a Hyper Connected World </p><p>Richer I/O Models </p><p>Emotionally Impactful </p><p>Consumer- Driven </p><p>People- Centric </p></li><li><p>Think "Outside in" and Focus on Solution Architecture, Design Thinking and Development </p><p>Exploit the natural affinity between agile development methodologies and UX Pilot and iterate </p><p>Create UX pattern libraries that guide application development teams Personas and use cases </p><p>Tool software, so usage data can be extracted and analyzed Continuous feedback </p><p>1 </p><p>2 </p><p>3 </p></li><li><p>The Internet of Things Links to Everything </p><p>Internet of Things 25B Things by 2020 </p><p>Internet of Information 30T Web Pages in Google Index, 2013 </p><p>Internet of Places 6 Foursquare Check-Ins, </p><p>January 2015 </p><p>Manage </p><p>Monetize </p><p>Operate </p><p>Extend </p><p>Internet of People 1.35 billion monthly active users </p><p>July 2014 </p></li><li><p>Identify New Patterns and Define New Technical Architectures for the Internet of Things </p><p>Enterprise/ Thing Gateway Cloud/"Internet" On-Premises </p><p>Analytics Data Application Logic and Rules </p><p>User Interface </p><p>10101001010100 11010101010010 10110101011 </p></li><li><p>Experiment! A $75 Proof of Concept </p><p>Can Save $75,000 "Customer down, magnet down, $75,000 magnet recovery problem to recool the magnet. </p><p>These have really worked well monitoring our magnets at our office in Ohio." </p><p> and embrace the "maker culture." </p><p>Source: http://supermechanical.tumblr.com/post/51173089463/in-an- internet-of-medical-devices-weve-got-the </p></li><li><p> "3d printing is not new but is newly strategic" </p><p>2014 </p><p>Enterprise </p><p>2015 </p><p>Consumer </p><p>3 2 1 0 </p><p>4 </p><p>5 </p><p>6 </p><p>2012 2013 2016 2017 </p><p>Billions of Dollars </p><p>7 </p><p>81.9% CAGR </p></li><li><p>Consumer Shipments Point to More Pervasive Use </p><p>400,000 200,000 </p><p>0 </p><p>600,000 </p><p>800,000 </p><p>1,000,000 </p><p>Shipments 1,200,000 </p><p>2012 2013 2014 </p><p>Enterprise </p><p>2015 </p><p>Consumer </p><p>2016 2017 </p><p>95.4% CAGR </p></li><li><p>Look for Innovation Opportunities From the Simple &amp; Mundane to the Complex and Critical </p><p>Airbus A320 Redesigned Nacelle </p><p>Hinge Bracket </p><p>Injection Molds Cut Tooling Costs </p><p>by Up to 97% </p><p>M1 Abrams Tank Engine Material Added to Worn Components </p><p>Not Impossible Labs "Project Daniel" Prosthetic Limbs </p><p>Courtesy of EOS </p><p>Courtesy of Not Impossible Labs </p></li><li><p>Is 3D Print for You? Five Key Questions Responsive Will we be able to focus more on our customers' needs and less on our manufacturing processes? </p><p>Knowledge Do we need to develop our staff's additive manufacturing skills? </p><p>Agile Will we make our product development and production processes more nimble? </p><p>Cost How much can we reduce product development, operating and support costs? </p><p>Will we be able to create items that were difficult or impossible to produce before? Innovation </p></li><li><p>Top 10 Strategic Technology Trends for 2015 </p><p>The New IT Reality Emerges </p><p>Intelligence Everywhere </p><p>Merging the Real World and the Virtual World </p><p>1 Computing Everywhere 2 The Internet of Things </p><p>4 Advanced, Pervasive and Invisible Analytics </p><p>6 Smart Machines 7 Cloud/Client Computing </p><p>3 3D Printing </p><p>5 Context-Rich Systems </p><p>8 Software-Defined Applications and Infrastructure 9 Web-Scale IT 10 Risk-Based Security and Self-protection </p></li><li><p>Big Data Security Analytics at the Heart of Next-Generation Security Platforms </p><p>Information Collect, Correlate </p><p>Big Data </p><p>Knowledge Analyze </p><p>Data Data Data Data </p><p>Logs, Events, Costs, Usage, Attacks, Breaches </p><p>Community </p><p>Patterns, Meaningful Anomalies </p><p>Dependencies, Relationships </p><p>Context Continuous Monitoring </p><p>and Analytics </p><p>Context-Aware Intelligence Model, Simulate, Act, Protect </p></li><li><p>Context-Rich Systems Understand Who, What, When, Where, How and Why </p><p>User-Facing Context Content Sources Process Models </p><p>Environment </p><p>Community </p><p>Identity and Pref. </p><p>Location </p><p>Calendar </p><p>Etc. </p><p>History </p><p>Connectivity </p><p>Patterns </p><p>System-Facing Context </p></li><li><p>Real-Time, Context-Aware, Risk-Aware and Active: Adaptive Access Control </p><p>Risk engine. </p><p>Trust elevation. </p><p>Step-up authentication. </p><p>Transaction verification. </p><p>Contextual information. </p><p>Get more information! </p><p>Allow access. </p><p>STOP Deny access. </p><p>Allow access with fine-grained audit. </p><p>Other obligation. </p></li><li><p>Emerging Trend: The Contextual User Experience </p><p>Personal Assistants as Intermediaries Contextual Information: Location Information Available Endpoints Human Request for Action Relevant Services and Content </p><p>User Experience Platform: Intermediary Between Users and </p><p>Content/Capabilities Acts for or Interacts With the User to </p><p>Accomplish Goals: - The Invisible User Interface Dynamically Assembles UI Screens/Forms </p><p>Image Apple </p><p>Siri Image Microsoft </p><p>Cortana Image Google </p><p>Google Now </p><p> Just the Beginning! </p></li><li><p>Information-Based Helpers </p><p>Machine-Focused Helpers </p><p>Sages </p><p>Doers </p><p>Autonomous Vehicles </p><p>Smart Machine Categories Based on What They Do </p><p>Movers </p><p>(Related market terms - Artificial Intelligence, Robots, Cognitive Computing, Anticipatory Computing) </p></li><li><p>Rio Tinto Reinventing Mining and More </p></li><li><p>Cornell Robot Credit: Hema Koppula and Ashutosh Saxena, 2013. Robot Learning Lab, Computer Science Department, Cornell University. See http://pr.cs.cornell.edu/anticipation </p><p>Cornell's Observant, Predictive Servant </p></li><li><p>Virtual Private Assistants You Will Not Have Just One </p><p>Image Microsoft Image Google </p></li><li><p>Memorial Sloan Kettering and IBM Watson </p><p>Source: IBM </p></li><li><p>Maturity, Adoption and Diffusion </p><p>Segment Smart Advisor </p><p>Virtual Personal Assistant1 </p><p>Early Emerging Use Cases </p><p>Adoption Accelerates </p><p>90% Adoption for Addressable </p><p>Market </p><p>Autonomous Personal Transport </p><p>Semiautonomous Robotic Assistants </p><p>1 Growth of use of virtual personal assistants for work purposes in 2017 to 2018 will exceed iPad's growth in its first 2 years. </p><p>2014 2017 Segments Merge (and Fragment) 2020 to 2022 2013 2017 </p><p>2020 (2) </p><p>2030 (5) </p><p>2044 (10) </p><p>2025 (2020 to 2030) </p><p>2032 (2025 to 2040) </p><p>? </p></li><li><p>Top 10 Strategic Technology Trends for 2015 </p><p>The New IT Reality Emerges </p><p>Intelligence Everywhere </p><p>Merging the Real World and the Virtual World </p><p>1 Computing Everywhere 2 The Internet of Things </p><p>4 Advanced, Pervasive and Invisible Analytics </p><p>6 Smart Machines 7 Cloud/Client Computing </p><p>3 3D Printing </p><p>5 Context-Rich Systems </p><p>8 Software-Defined Applications and Infrastructure 9 Web-Scale IT 10 Risk-Based Security and Self-protection </p></li><li><p>Unify Cloud and Mobile Strategies: Cloud/Client Computing </p><p> The application is in the cloud. Cloud is the coordination point and system of record. Clients can be anything with varying levels of data </p><p>and logic. Applications can span multiple clients. Multichannel, Multi-scn., ensemble interactions. The experience flows to the user in context. Mobile is not about devices it is about people. </p><p>UX logic </p><p>Business logic </p><p>UX logic </p><p>Business logic </p><p>Data </p><p>Data </p></li><li><p>Software-Defined Applications and Infrastructure: The Future Is Software-Defined </p><p>Networking Cloud Services </p><p>Real-Time Infrastructure </p><p>Fabric-Based Computing </p><p>Service-Oriented Architecture </p><p>Model-Driven Architecture </p><p>Storage </p><p>Security </p><p>Data Centers </p><p>OpenStack Open Compute </p><p>Everything Is Programmable </p><p>The API Economy </p></li><li><p>Software-Defined Architecture for Application Services </p><p>Source: "Software-Defined Architecture for Application in Digital Business" (G00264171) </p><p>Outer View Resource Virtualization </p><p>Inner View Managed Resources </p><p>Inner APIs </p><p>Outer APIs </p><p>Inner View </p><p>Outer View </p></li><li><p>Web-Scale IT: The Foundation for the Digital Future </p><p>Web-scale IT is a pattern of global class computing that delivers the capabilities of large cloud services providers to the enterprise </p><p>Web-Scale IT </p><p>Infrastructure as Code </p><p>Web-Oriented Architecture </p><p>Collaborative Aligned </p><p>Organization </p><p>Velocity- F o c u s e d Processes </p><p>Risk- Embracing </p><p>Culture </p><p>Open </p><p>Industrially Designed Data </p><p>Centers </p><p>Source </p></li><li><p>Create Your Blueprint and Road Map for Web-Scale IT </p><p>DevOps API-Based Management Velocity-Focused Processes Collaboratively-Aligned Organization Risk-Embracing Culture </p><p>Web-Oriented Architecture </p><p>Industrially Designed </p><p>Infrastructure </p><p>1 2 3 </p></li><li><p>All Roads to the Digital Future Lead Through Security </p></li><li><p>Security Myth: Perimeter Defense Will Protect My Applications </p><p>Mobile Internet of Things </p><p>Insider Attacks </p></li><li><p>Enable Applications to Protect Themselves Application Runtime </p><p>Dynamic Interaction Application </p><p>Source Code Output: </p><p>High-Assurance Security </p><p>Vulnerabilities Runtime </p><p>Application Self-Protection </p><p>Security-Aware Application </p><p>Design </p></li><li><p>Top 10 Strategic Technology Trends for 2015 </p><p> Proactively analyze disruptive technology trends and create a vision of the future technology landscape </p><p> Link trend analysis to the impact on people (employees and customers), the business and IT </p><p> Establish strategic decision models to take action on disruptive impacts </p><p> Focus on the EA role as a visionary, an analyst and a catalyst for disruptive trend analysis across IT and the business </p><p>The New IT Reality Emerges </p><p>Intelligence Everywhere </p><p>Merging the Real World and the Virtual World </p></li><li><p>Top 10 Strategic Technology Trends for 2015 David Cearley </p></li></ul>