10 Strategic Technologies for 2010 | Part 2

Client Computing:
Visualization is bringing new ways of packaging client computing  application and capabiltites. As a result, the choice of a particular PC hardware platform, and eventually the OS platform, becomes less critical. Enterprises should proactivivty build a five-to-eight year strategic client computing readmap outlining an approach to device standards, ownership and support, operating system and application selection, deployment and update, and management and security plans to manage diversity.
IT for Green:

IT can enable many green initiatives. The use of IT, particullarly among the white collar staff, can greatly enhance an enterprise's green initiative include the use of e-documents, reducing travel and teleworking . IT can also provide the anaytic tools that others in the enterprise may use to reduce energy consumption in the transportation of goods or other carbon management activities.
Reshaping the Data Centers:
In the past, design principles for data centers were simple. figure out what u have, estimate growth for 15 to 20 years, then build to suit. Newly-built data centers are often designed with huge areas of white floor space, fully powered and backed by a uninterruptible power supply (UPS), water and air-cooled and mostly are actually lower if enterprises adopt a pod-based approach to data center construction and expansion. if 9,000 square feet is expected to be needed during the life of a data center, then the company should design the site to support it, but only build what's needed for five to seven years. Cutting operating expenses, which are a nontrivial
part of the overall IT spending for most clients, frees up money to apply to other projects or investments either in IT or for the business itself.
Social Computing:
Workers do not want two distinct envirnoment to support their work one for their own work products (whether personal or group) and another for accessing "external" information. Enterprises must focus both on use of social software and social media in the enterprises and participation and integration with externally facing enterprises sponsored and public communities. Do not ignore the role of Social profiles to bring communities together.
Security - Activity Monitoring :

Traditionally, security has focused on putting up a perimeter fence to keep others out, but it has evolved to monitoring activities and identifying patterns that would have been missed before. Information security professionals face the challenge of detecting malicious activity in a constant stream of discrete events that are usually associated with an authorised user and are generated from multiple network, system and application sources. At the same time, security departments are facing increasing demands for ever greater log analysis and reporting to support audit requirments. A varity of complimentary (and sometimes overlapping) monitoring and analysis tools help enterprises improve the detection and investigation of suspicious activity often with real time alerting or transaction interventions and weaknesses of these tools, enterprises can understand how to use them to defend the enterprise and meet audit requirment in a better way.
Flash Memory:
Flash memory is not new, but it is moving up to a new tier in the storage echelon. Flash Memory is a semiconductor memory device, familiar from its use in USB memory sticks and digital camera cards, it is much faster than rotating disk, but considerably more expensive, however this difference is shrinking. At the rate of price declines, the technology will enjoy more than a 100 per cent compound annual growth rate during the next years and become strategic in many IT areas including consumer devices, entertainment equipment and other embedded IT systems. In addition, it offers a new layer of the storage hierarchy in servers and client computers that has key advantages including space heat, performance and ruggedness.
Virtualisation for Availabilty:
Vitualisation has been on the list of top strategic technogies in previous years. it is on the list of this year because Gartner emphasis new element such as live migration for availibility that have long term implications. Live migration is the movement of a running virtual machine (VM), while its operating systems and other software continue to execute as if they remained on the origional physical server. This takes place by replicating the state of destination VMs, then at same point in time, one instruction finishes execution on the destination machine.
Mobile Applications:
By year end 2010, 1.2 billion people will carry handsets capable of rich, mobile commerce, providing a rich envoirment for the convergence of mobility and the Web. There are already thousands of applications for the platforms such as Apple, iphone in spite of the limited market and need for unique coding. it may take a newer version that is designed to easily operate on both full PC and miniature systems, but if the operating systems interface and processor architecture were identical, that enabling factor would create a huge turn upwards in mobile application availability.
"This list should be used as starting point and companies should adjust their lists based on their industries, unique business needs and technology adoption mode",  said Carl Claunch, vice president and distinguished analyst at Gartner.

0 Comments:

Post a Comment

Thank You.