Gartner’s Top 10 Strategic Technologies for 2011

The year is coming to an end, and businesses are looking out for technologies and trends that would be hot and a game-changer in 2011. Here’s a list of top 10 strategic technologies for 2011 according to Gartner.


 
  • Cloud Computing: Gartner expects large enterprises to have a dynamic sourcing team in place by 2012 that is responsible for ongoing cloud sourcing decisions and management.
  • Mobile Applications and Media Tablets: Gartner estimates that by the end of 2010, 1.2 billion people will carry handsets capable of rich, mobile commerce providing an ideal environment for the convergence of mobility and the Web.
  • Social Communications and Collaboration: Gartner predicts that by 2016, social technologies will be integrated with most business applications. Companies should bring together their social CRM, internal communications and collaboration, and public social site initiatives into a coordinated strategy.
  • Video: Video is not a new media form, but its use as a standard media type used in non-media companies is expanding rapidly. Over the next three years Gartner believes that video will become a commonplace content type and interaction model for most users, and by 2013, more than 25 percent of the content that workers see in a day will be dominated by pictures, video or audio.
  • Next Generation Analytics: Increasing compute capabilities of computers including mobile devices along with improving connectivity are enabling a shift in how businesses support operational decisions. It is becoming possible to run simulations or models to predict the future outcome, rather than to simply provide backward looking data about past interactions, and to do these predictions in real-time to support each individual business action. While this may require significant changes to existing operational and business intelligence infrastructure, the potential exists to unlock significant improvements in business results and other success rates.
  • Social Analytics: Social analytics describes the process of measuring, analyzing and interpreting the results of interactions and associations among people, topics and ideas. These interactions may occur on social software applications used in the workplace, in internally or externally facing communities or on the social web. Social network analysis involves collecting data from multiple sources, identifying relationships, and evaluating the impact, quality or effectiveness of a relationship.
  • Context-Aware Computing: Context-aware computing centers on the concept of using information about an end user or object’s environment, activities connections and preferences to improve the quality of interaction with that end user. The end user may be a customer, business partner or employee. Gartner predicts that by 2013, more than half of Fortune 500 companies will have context-aware computing initiatives and by 2016, one-third of worldwide mobile consumer marketing will be context-awareness-based.
  • Storage Class Memory: Gartner sees huge use of flash memory in consumer devices, entertainment equipment and other embedded IT systems. It also offers a new layer of the storage hierarchy in servers and client computers that has key advantages — space, heat, performance and ruggedness among them. Unlike RAM, the main memory in servers and PCs, flash memory is persistent even when power is removed. In that way, it looks more like disk drives where information is placed and must survive power-downs and reboots. Given the cost premium, simply building solid state disk drives from flash will tie up that valuable space on all the data in a file or entire volume, while a new explicitly addressed layer, not part of the file system, permits targeted placement of only the high-leverage items of information that need to experience the mix of performance and persistence available with flash memory.
  • Ubiquitous Computing: As computers proliferate and as everyday objects are given the ability to communicate with RFID tags and their successors, networks will approach and surpass the scale that can be managed in traditional centralized ways. This leads to the important trend of imbuing computing systems into operational technology, whether done as calming technology or explicitly managed and integrated with IT. In addition, it gives us important guidance on what to expect with proliferating personal devices, the effect of consumerization on IT decisions, and the necessary capabilities that will be driven by the pressure of rapid inflation in the number of computers for each person.
  • Fabric-Based Infrastructure and Computers: A fabric-based computer is a modular form of computing where a system can be aggregated from separate building-block modules connected over a fabric or switched backplane. In its basic form, a fabric-based computer comprises a separate processor, memory, I/O, and offload modules (GPU, NPU, etc.) that are connected to a switched interconnect and, importantly, the software required to configure and manage the resulting system(s). The fabric-based infrastructure (FBI) can be supplied by a single vendor or by a group of vendors working closely together, or by an integrator — internal or external.

 

Mobile Number Portability is ON!!!

After a decade of waiting and a two year delay, Mobile Number Portability (MNP) will ultimately be a reality. It has been launched in Rohtak, Haryana today and marks the end of the service providers rein over the custyomers. Telecom Ministry officials informed that it is likely to be launched in other parts of the country by the end of December.


MNP which should have been a part of Indian telecom success story long time back was being held back by the service providers. The providers feared that the customer loyalty (either willingly or enforced) would be gone with MNP as customers would simply move to a new provider if they are not happy with the current provider.

It will definitely lead to a tariff war and VAS offerings will also increase as the telecom service providers would try their best to retain their existing customers. Providers with bad customer services should take notice as their subscribers number will go down rapidly unless they start offering good services and tariffs quickly. The customer is ultimately the king!!!!

War for the Cloud--Microsoft Vs Google

The cloud space is heating up with both Google and Microsoft coming up with solutions and strategies to beat each other. Recently, Google has released Google Cloud Connect for Microsoft Office, which allows users to save their Office documents in Google Docs.

The solution reportedly can not only save copies of a user's Office documents to the Google Docs cloud, where they can be edited simultaneously by other users, but syncs them for access from a variety of PC and mobile devices. It works with Office 2003, 2007 and 2010; and starting 2011 it will be accessible to anyone with a Google account.

Analysts have pointed out that although this solution allows Microsoft and Google users to collaborate but it’s an extremely strategic step to show Google Apps' benefits over Microsoft Office.

Microsoft has already moved to the clouds with the launch of Office 365 which combines Microsoft Office, SharePoint Online, Exchange Online and Lync Online. The company has already shown its cloud seriousness by the earlier launch of cloud platforms such as Windows Azure and smaller offerings along the lines of Office Web Apps.

The cloud space is definitely important to both companies, and both of them will definitely try to outdo each other. Watch out this space for more inputs.

Cloud Computing Hurdles---the reason for low adoption

The biggest challenge towards the adoption of cloud computing is security. Majority of the enterprises are confused and not sure about the security aspects; and are apprehensive that the number of breaches or data loss would increase as enterprises move into the cloud. In addition, enterprises are scared of the cloud as they feel out of control, and sees traditional computing as better way to keep data secured.


But there are many companies that offer best of the class security solutions. For example, access and identity management solutions from Oracle can keep the cloud security threats at bay. In fact, with the right kind of solutions, cloud computing would be even more secured than the traditional network security.

Cloud computing offers a large number benefits. Enterprises will definitely start moving to the cloud once they start seeing the advantages. Not only will cloud computing cut down on expenses but will also provide the enterprises with an edge over others which are still in the traditional computing arena.

As the enterprises move to the cloud, there will definitely be a number of complications, some big and some really serious. So selecting the right vendor to roll-out the cloud computing is very crucial. In fact, it’s imperative for the enterprises to look out for the strengths of the vendor which includes adaptability, technical expertise and most important of all security. Vendors that offer cost effective, easy to adopt and secured solutions will be the market leaders.