Garter Updates top ten blueprint technology tendency for 2015

No comments
As the leaves begin to soften, the time approaches for analyzing new year and planning for 2015 with research analysts Gartner, who launched the latest annual report of the most important technology trends strategic in the coming year.

The report lays out a path of short-term priorities for organizations of all sizes pursuing technological excellence. In discussing how to make the annual report on strategic planning of an organization, vice president and Gartner Fellow David Cearley said

We have identified the main technological trends that 10 organizations can not afford to ignore in their strategic planning processes. This does not necessarily mean adoption and investment in all the trends at the same speed, but companies should look to make deliberate decisions about them during the next two years.

Cloud computing has a huge role, demonstrating how the transition to the cloud has affected all aspects of technology. And not just "the cloud" as a trend, but the environment in which the cloud has become the communication infrastructure, storage and facilitate interaction underlying almost all technological trends.

In the report, the company identifies the global strategic technology topics as "the merging of real and virtual worlds, the advent of intelligence everywhere, and the impact of technology digital business day."
The trends this year are the following, each of which is supported in some way in cloud computing to deliver the kind of integrations necessary for success.

Figure out everywhere:

The ubiquity of mobile phones has caused a transition to a broader "computing everywhere" approach, giving users full access mobile computing diverse and different needs of users environments.

Cearley pursue:

Phones and portable devices are now part of an expanded computing environment which includes things such as consumer electronics and connected in the workplace and public space screens.
Each Again, that is the global environment will have to adapt to the needs of the mobile user. This will continue to pose significant management challenges for IT organizations as they lose control of endpoint devices user. It will also require greater attention to the user experience.

The cyberspace of Things:

This technology potentially has the largest in the hotels, as connected intelligent buildings could improve the guest experience by extending and sharing knowledge throughout the property, while also customizing the guest experience impact. The deployment of iBeacons at airports also demonstrates the potential of increasing the information provided by the connected devices, objects and physical locations.

From the reports:

The combination of currents and data services created by the digitization of everything creates four basic models of Use - Manage, Monetize, operate and expand. These four basic models can be applied to any of the four "Internets".
Companies should not just think that only the Internet of Things (IoT) (assets and machines) has the potential to take advantage of these four models. For example, the pay per use model can be applied to assets (such as industrial equipment), services (such as pay as you drive insurance), people (such as motors), places (such as parking) and systems (such as services the cloud). Companies from all sectors can take advantage of these four models.
Even Gartner puts own productivity IoT in 5-10 years away, so stay tuned for more to come!

3D composition:

3D printing continues to explode in popularity, as major brands like HP 3D release large format printers. Multiple industries are also beginning to explore new printing options that accelerate production and reduce downtime. The shipments pins 3D printers report 98% growth in 2015, driven by lower cost printers that further entrench technology.
On trips - and specifically aviation - there is a potential savings by printing live for the repair of aircraft, or even print toothbrushes, soap and other services for hotel rooms.

Advanced, omnipresent and invisible Analysis:

Big Data has happened in the invisible analytical, as the large amount of data has led to more intelligent solutions to sort and deliver viable answers.

Cearley:

Each application must now be an analytic application. Organizations need to manage better way to filter the huge amounts of data from the IO, social networks and portable devices and then deliver exactly the right thing to the right person at the right time information. Analytics will be deeply, but invisibly embedded everywhere.

Systems rich in context:

Context is essential because it provides one of the best possibilities to provide a specific response related information specific user. This is especially important when traveling as a passenger looking for hotels in a climatic event may have different expectations and needs then a leisure traveler looking for a few days before a trip.

Gartner says
integrated intelligence analysis combined with pervasive ubiquitous boost the development of systems that are aware of their surroundings and able to respond appropriately. Context-sensitive security is an early application of this new capability, but others will emerge. By understanding the context of a user request, applications can not only adjust their security response but also adjust the information delivered to the user, greatly simplifying a world of increasingly complex computing.

Brilliant appliance:

Self-driving vehicles, robots and intelligent personal assistants fall under intelligent machines, rather offering the opportunity to travel. Taxis and land transport could be affected by the eventual shift to autonomous vehicles; airports may see particular tasks automation sometime by robots (and some hotels are already testing robots), and travel brands are experimenting with artificial intelligence as part of the planning process

Cloud / client computing:

One of the clearest benefits of cloud computing / client is the shift towards exchange of information from multiple devices - for example, Notepad Expedia searchable and notes to be shared across device regardless of location. An increase "interoperability information" travel benefit, and encourage users to book travel by allowing them to collect searches on any device that is closest.

Clearley:
Cloud is the new style elastically scalable, self-service computing, and applications for both internal and external applications will be built in this new style. While costs and network bandwidth can still favoring applications using intelligence and client storage device effectively, coordination and management will be based in the cloud.

Wearables fit in here as a client device added to add to the mixture.
Applications and infrastructure software defined
Flexibility is the key to development in 2015 speech, emphasizing the ability to easily scale and add devices and emerging applications at will.
The report reminds readers that "cloud services are software configurable via API calls, and applications also are getting richer API to access your function and programming content." The static nature of the applications and infrastructure has been completely replaced by a dynamic field that offers infinite flexibility.

Web-scale IT:

The report defines IT-scale web as "a pattern of world-class computer that provides the capabilities of cloud service providers within a large enterprise IT environment."

The idea here is that smaller organizations begin to replicate the types of infrastructure built by Amazon, Google and Facebook to merge the development and operations into a full-scale Devlopements capacity drives coordination between operations and development to develop rapidly and progressively internal services. This also corresponds to the ability to scale at will - the infrastructure must exist, either internally or externally, to provide such flexibility.

Risk Based Safety and Self-Defense:

With the almost continuous cycle of security breaches capture international headlines, strategic technology implementations in 2015 will be highly specialized in the security front. By segmenting the areas of risk and ensure successful according to the specific risks - rather than a wholesale approach - organizations can be much more successful in the rapidly changing ecosystem.
Travel brands are particularly vulnerable to security breaches, as most are not only the official dealer but also targets for terrorism, fraud and other digital and physical intrusions. The volume of hard assets on trips leave vulnerabilities through systems and decentralization of many IT functions across multiple providers. As disperse capabilities, comprehensive security is elusive - and therefore safety must correspond to specific risks.

A breakdown of TechRepublic shows how trends Gartner predictions have flowed over the last five years. Interestingly, certain broad trends move to specifics -. "Defined by software / infrastructure applications," for example, "anything software-defined" a Gartner forecasts trends 2012
Gartner forecasts trends 2012
Also of note is that the Internet of things remains an important consideration trend, but not hit the mainstream enough to leave off the list strategic trend. Given the current scenario, the technology will probably be here for a while, as manufacturers begin to implement and understand this completely new connected ecosystem.

No comments :

Post a Comment