Presentation is loading. Please wait.

Presentation is loading. Please wait.

Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.

Similar presentations


Presentation on theme: "Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals."— Presentation transcript:

1

2 Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must be requested via e-mail: vendor.relations@gartner.com. Gartner is a registered trademark of Gartner, Inc. or its affiliates. Top 10 Strategic Technologies for 2010 Kathy Harris

3 Organizational impact during next 3 years Reaching maturity or a tipping point Driver of change / disruption May be existing or emerging Targets mainstream organizations Organizational impact during next 3 years Reaching maturity or a tipping point Driver of change / disruption May be existing or emerging Targets mainstream organizations Strategic Technologies

4 Agenda and Strategic Technologies Technologies that will drive change in applications, application development and data centers Technologies that will drive change and advances in the end-user environment Other long-term trends and "forgotten" technologies that should be evaluated 1.Cloud Computing 2.Virtualization for Availability 3.Reshaping the Data Center 4.IT for Green 5.Client Computing 6.Social Computing 7.Mobile Applications 8.Advanced Analytics 9.Security Activity Monitoring 10.Flash Memory

5 Gartner defines cloud computing as "a style of computing where scalable and elastic IT-related capabilities are provided 'as a service' to customers* using Internet Technologies". Cloud Computing: Everything as a Service Promises Agility, Innovation, Simplicity and Economic Value * Public cloud computing refers to delivery of cloud services by a third-party provider to external customers. In private cloud computing, IT acts as the provider of services to internal customers. 3 Focal Points For Cloud Projects Consuming Cloud Services 1 Developing Cloud- Based Applications and Solutions 2 Implementing Private Cloud Computing Environments 3 Internet Technologies 5 Metered by Use 4 Shared 3 Scalable and Elastic 2 Service-Based 1 5 Attributes That Support Outcomes

6 Consuming Cloud-Computing Services System Infrastructure Services Client A P I Application Infra Services Client A P I P I A A A A P I I I P P Appl, Information, or Bus Process Services Rapid development, deployment & change Greater vendor lock-in Rapid hardware provisioning & delegated hardware management Developer responsible for cloud optimization Rapid application deployment & change Least flexibility Caution Service Consumer Responsibility Service Provider Responsibility

7 Virtualization for Availability: Far Beyond Consolidation Live Migration VMware or Microsoft Currently used for one time permanent move But … imagine a perpetual process, never done -What happens if source VM fails? -What happens if target VM fails? One mechanism for availability versus many VM Separate physical machines High reliability machine Separate hi-reliability machines Fail-over clustering software Fault tolerant server No special approach Change virtualization setting Versus

8 Reshaping the Data Center POD Design and Power Zones What we knew about data center design for decades was wrong! POD Design Incremental build-out methodology; standard components; component configuration; optimized power and cooling to a prescribed amount of raised-floor space; reduced capital expenditure Power Zones High, medium or low density Based on workload mix Power and cooling designed at the zone level Expandable over time Dramatically reduce capital costs upfront Minimize over-provisioning Reduce operating expenses up to 40% Allow very-high-density computing where needed

9 IT For Green Business Green IT Means More Than Energy Efficient IT Remote communication and collaboration to reduce travel Analytics to optimize transportation of goods Teleworking Content and document mgt reduce the need for paper Smart building technology Carbon tracking, management and trading Collation and reporting of nonfinancial and CSR data How intrinsic is IT to business? How much does green IT contribute to overall green footprint? If I don't spend on green IT how will it affect my business? MfgEnergyRetailFin Svcs Gov't IT's Impact Business Production and Operations Fix Business Fix IT Product Use Domains of Impact

10 Agenda 1.Technologies that will drive change in applications, application development and data centers 2.Technologies that will drive change and advances in the end-user environment 3.Other long-term trends and "forgotten" technologies that should be evaluated

11 Virtualization for Client Computing Hosted Virtual Desktops Architectural equivalent of the blade PC Full "thick-client" image, thin-client delivery model Portable Personalities Carry the bubble, not the hardware Portable media, stored on the network Bubbles of various sizes: some with OS, some without

12 Public Social Media Social Software for the Enterprise Externally Facing: Customer Communities Bloggers Facebook MyspaceTwitter Content Tagging Search Website Integration Ratings Discussions Blogs Wikis Social Network Activity Streams E-Mail Integration Content Tagging Security Social Computing: Participating in and Tapping Into the Collective Social Profile Recommendations Ratings The Battle for User Input and Knowledge Sharing

13 Mobile Applications Harbinger: Tens of thousands of new, more powerful applications are coming online. This will accelerate. How Does It Affect You? Mobile applications need new servers to which they connect Application delivery and support complexity increases Immature management tools Look at mobile apps as a critical enabler of G2C interactions and increased customer satisfaction Mobile applications can create o Stickiness, customer behavioral inertia, value real estate, support impulse interactions

14 Advanced Analytics: Operational Analytics to Optimize and Simulate Gartner's definition of optimization/simulation: Using analytical tools and models to maximize business process and decision effectiveness by examining alternative outcomes and scenarios, before, during, and after process implementation and execution. Traditional offline analytics In-line/ embedded analytics Exploring events/data Deriving events/data Predictive Explanatory Enabling Trends Increasing connectivity More-powerful mobile processors Sophisticated mobile applications Fixed Rules Supported by Data Predictive Analytics

15 Examine Collaboration in Context Using Social Network Analytics Social network analysis: relationship-based business intelligence regarding… Intricacies of working relationships -Which team and individual activities would benefit from technology? Network connectors and boundary spanners -Who are the critical people to drive technology adoption? Social analytics -Trends, topics, expertise? Social network analysis: relationship-based business intelligence regarding… Intricacies of working relationships -Which team and individual activities would benefit from technology? Network connectors and boundary spanners -Who are the critical people to drive technology adoption? Social analytics -Trends, topics, expertise?

16 Agenda 1.Technologies that will drive change in applications, application development and data centers 2.Technologies that will drive change and advances in the end-user environment 3.Other long-term trends and "forgotten" technologies that should be evaluated

17 Flash Memory Wide Uses Ahead Why Flash is Strategic Orders-of-magnitude enhancements Price per byte declines Issues and Impact Adds a layer to the storage hierarchy Cost and useful life disadvantages Rebalances the processor to storage speed ratio Strategic Decisions Evaluate storage requirements and budget feasibility Find opportunities to displace other hardware or solve service level challenges Disadvantages Advantages Performance Density Ruggedness Cost per byte Update limits Energy efficiency

18 User Activity Monitoring It's Going to Get Harder Cloud Applications Cloud Infrastructure Cloud Security Services Corporate Data Your Data Center Privileged Users: Data Center User Activity: Data-Center- Hosted Applications Targeted Attacks Insider Threats Applications Infrastructure Activity monitoring Compliance Privileged Users: Cloud User Activity: Cloud- Based Applications Targeted attacks are on the rise Application and infrastructure are prime vulnerabilities Cloud computing complicates the picture Security shifting from targeted protection to broad monitoring User activity event streams must be monitored -Instrument internal systems -Evaluate cloud providers

19 User Activity and Resource Access Monitoring Technologies System Network Application Database Data Identity and access policy change Privileged user activity Application user activity Sensitive data access and movement User Activity Monitor: Security Information and Event Management (SIEM) Fraud Detection Database Activity Monitoring (DAM) Data Loss Prevention (DLP) Technologies Identity And Access Manage- ment (IAM) Compliance Reporting Forensics/ Breach Detection Anti-Fraud Drivers Access Management

20 Action Plan Tomorrow -Categorize vendor cloud offerings as "consumer" or "provider" focused -Identify social profile sources and begin planning for coordination -Use pod and zone concepts for data center refits or new builds -Expand "Green IT" to include a focus on "IT for Green Business" Within 90 Days -Establish a project team to identify public and private cloud computing opportunities and governance models -Determine where user activity and resource access monitoring can be applied for maximum impact in your environment -Find opportunities for mobile apps for employees, citizens and partners -Investigate flash memory to address top performance problems Within 12 months -Build a 10-year strategic roadmap for client computing -Exploit social network analysis (fraud detection and organization development) -Build transition plans to a live migration based availability strategy -Select the high value points to employ operational analytics

21 Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must be requested via e-mail: vendor.relations@gartner.com. Gartner is a registered trademark of Gartner, Inc. or its affiliates. Top 10 Strategic Technologies for 2010 Kathy Harris


Download ppt "Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals."

Similar presentations


Ads by Google