Top 10 Strategic Technologies For 2010

Download Top 10 Strategic Technologies For 2010

Post on 19-May-2015




1 download

Embed Size (px)



<ul><li> 1. 10 Strategic Technologies for 20101. Cloud Computing. Cloud computing is a style ofcomputing that characterizes a model in which providersdeliver a variety of IT-enabled capabilities to consumers.Cloud-based services can be exploited in a variety ofways to develop an application or a solution. Using cloudresources does not eliminate the costs of IT solutions,but does re-arrange some and reduce others. In addition,consuming cloud services enterprises will increasinglyact as cloud providers and deliver application,information or business process services to customersand business partners. 2. Advanced Analytics. Optimization and simulation isusing analytical tools and models to maximize businessprocess and decision effectiveness by examiningalternative outcomes and scenarios, before, during andafter process implementation and execution. This can beviewed as a third step in supporting operational businessdecisions. Fixed rules and prepared policies gave way tomore informed decisions powered by the rightinformation delivered at the right time, whether throughcustomer relationship management (CRM) or enterpriseresource planning (ERP) or other applications. The newstep is to provide simulation, prediction, optimizationand other analytics, not simply information, to empowereven more decision flexibility at the time and place ofevery business process action The new step looks into1 of 4 1/19/2010 1:45 PM </li></ul> <p> 2. every business process action. The new step looks intothe future, predicting what can or will happen. 3. Client Computing. Virtualization is bringing new ways ofpackaging client computing applications and capabilities.As a result, the choice of a particular PC hardwareplatform, and eventually the OS platform, becomes lesscritical. Enterprises should proactively build a five toeight year strategic client computing roadmap outliningan approach to device standards, ownership and support;operating system and application selection, deploymentand update; and management and security plans tomanage diversity. 4. IT for Green. IT can enable many green initiatives. Theuse of IT, particularly among the white collar staff, cangreatly enhance an enterprises green credentials.Common green initiatives include the use ofe-documents, reducing travel and teleworking. IT canalso provide the analytic tools that others in theenterprise may use to reduce energy consumption in thetransportation of goods or other carbon managementactivities. 5. Reshaping the Data Center. In the past, designprinciples for data centers were simple: Figure out whatyou have, estimate growth for 15 to 20 years, then buildto suit. Newly-built data centers often opened with hugeareas of white floor space, fully powered and backed bya uninterruptible power supply (UPS), water-andair-cooled and mostly empty. However, costs areactually lower if enterprises adopt a pod-based approachto data center construction and expansion. If 9,000square feet is expected to be needed during the life of adata center, then design the site to support it, but onlybuild whats needed for five to seven years. Cuttingoperating expenses, which are a nontrivial part of theoverall IT spend for most clients, frees up money toapply to other projects or investments either in IT or inthe business itself. 6. Social Computing. Workers do not want two distinctenvironments to support their work one for their ownwork products (whether personal or group) and anotherfor accessing external information. Enterprises mustfocus both on use of social software and social media inthe enterprise and participation and integration withexternally facing enterprise-sponsored and publiccommunities. Do not ignore the role of the social profileto bring communities together. 7. Security Activity Monitoring. Traditionally, securityhas focused on putting up a perimeter fence to keepothers out, but it has evolved to monitoring activities and2 of 4 1/19/2010 1:45 PM 3. others out, but it has evolved to monitoring activities andidentifying patterns that would have been missed before.Information security professionals face the challenge ofdetecting malicious activity in a constant stream ofdiscrete events that are usually associated with anauthorized user and are generated from multiplenetwork, system and application sources. At the sametime, security departments are facing increasingdemands for ever-greater log analysis and reporting tosupport audit requirements. A variety of complimentary(and sometimes overlapping) monitoring and analysistools help enterprises better detect and investigatesuspicious activity often with real-time alerting ortransaction intervention. By understanding the strengthsand weaknesses of these tools, enterprises can betterunderstand how to use them to defend the enterprise andmeet audit requirements. 8. Flash Memory. Flash memory is not new, but it ismoving up to a new tier in the storage echelon. Flashmemory is a semiconductor memory device, familiarfrom its use in USB memory sticks and digital cameracards. It is much faster than rotating disk, butconsiderably more expensive, however this differential isshrinking. At the rate of price declines, the technologywill enjoy more than a 100 percent compound annualgrowth rate during the new few years and becomestrategic in many IT areas including consumer devices,entertainment equipment and other embedded ITsystems. In addition, it offers a new layer of the storagehierarchy in servers and client computers that has keyadvantages including space, heat, performance andruggedness. 9. Virtualization for Availability. Virtualization has beenon the list of top strategic technologies in previous years.It is on the list this year because Gartner emphases newelements such as live migration for availability that havelonger term implications. Live migration is themovement of a running virtual machine (VM), while itsoperating system and other software continue to executeas if they remained on the original physical server. Thistakes place by replicating the state of physical memorybetween the source and destination VMs, then, at someinstant in time, one instruction finishes execution on thesource machine and the next instruction begins on thedestination machine. 10. Mobile Applications. By year-end 2010, 1.2 billionpeople will carry handsets capable of rich, mobilecommerce providing a rich environment for theconvergence of mobility and the Web. There are alreadymany thousands of applications for platforms such as theApple iPhone in spite of the limited market and need for3 of 4 1/19/2010 1:45 PM 4. iPhone, in spite of the limited market and need forunique coding. It may take a newer version that isdesigned to flexibly operate on both full PC andminiature systems, but if the operating system interfaceand processor architecture were identical, that enablingfactor would create a huge turn upwards in mobileapplication availability.Happy Blogging !Ni n Chauhan | ni | www.maximumhit.com "We brand our clients to stand out from the compeon." 4 of 4 1/19/2010 1:45 PM </p>