Find a Question:
“Gartner” Foundation identifies 10 best IT strategic directions for 2015
Today highlighted research and Global Studies Foundation “Gartner” light on the top 10 technology trends strategy pursued by most of the institutions during the year 2015.
The “Gartner” institution that technical orientation and strategic of the most important reasons that significantly affect the systematic organization of work during the next three years, and the other its factors affecting high-drove to disrupt the business or end or information technology users, or the need for large investments, or risk exposure delays in the adoption of orientation. These techniques affect the plans and long-term programs and initiatives launched by the Foundation.
In this context Sirle David said: “We have identified the top 10 technology trends can not be ignored institutions through strategic planning processes. This does not necessarily mean adoption and investment of all these trends at the same level, but must take into account the institutions to take appropriate and thoughtful decisions about these trends over the next two years. ”
Sirle also pointed out that the best trends for 2015 covers three main topics, namely the merger between the real and virtual worlds, and the deployment of smart solutions in all over the place, and the impact of digital technologies in the process of transformation of the business.
Below we review the top 10 IT strategic directions for 2015:
In conjunction with the widespread use of mobile phones on a large scale, you expect “Gartner” Foundation high focus on meeting the needs of mobile phone users in different environments level, rather than focusing only on the devices.
David Sirle Turning to this point by saying: “Currently representing mobile devices and wearable part of the computing environment Dhahiyeh, which include consumer electronics and related screens in work environments and public places. Increasingly, the general environment will need to adapt to the requirements of users of mobile phones, which would raise the level of critical and ongoing administrative challenges for IT organizations, in conjunction with their loss of control on the user’s peripheral devices. They also require express more attention towards the design of the user experience. ”
Internet of Things
The distinctive mix of flow data and services that have arisen through the digitization of everything led to the emergence of the use of four basic models, namely, cash management, operation and expansion, and the possible application of these four basic models on any of the four Internet applications. Should not be limited to institutions on the Internet thinking that things IoT “assets and machinery” alone have the ability to benefit from the use of these four models. For example, it is possible the application of payment model by use of the assets “of industrial such as equipment,” services “such as payment of insurance depending on driving distances by car”, people “Kalmtnkulain constantly,” and places “parking lots cars”, and regulations, “such as services cloud,” where companies can all industries to take advantage of these four models.
It is expected that the number of global shipments of three-dimensional printers rises to 98 percent during the year 2015, as the ratio of shipments will double by the year 2016, and will reach printers shipments of three-dimensional to peak during the next three years, with the three-printer market growth dimensions and relatively low cost at an accelerated pace, and the expansion of industrial uses significantly. Industrial and biomedical and consumer applications and will continue to prove that the three-dimensional printers from the real means of effective, efficient and economic, they limit their costs through improved designs, prototypes and simplify, and shorten the time period for the manufacturing cycle.
Advanced, comprehensive and subtle analysis
Analyses will reach to the top of the list with the high volume of data that is generated by the embedded systems, and analysis of the enormous backlog of structured and unstructured data inside and outside the institution quantities. In this regard, David Sirle said: “Each application needs now to last for the analysis of the application, and require institutions to the Roads Department idealism and better for the classification of massive amounts of the coming of the Internet data objects, and social media, and devices wearable, and then work to provide information the right to the right person at the right time, as will become deep analyzes unobtrusively and built-in everywhere. ” Big data will maintain its importance in facilitating the deployment of this trend, but must focus on the concept of changing the way of thinking about big questions and answers primarily, big data and the second class, so the value here lies in the answers, and not in the data.
Rich systems interacting with the ocean
Will be extensive and compact survey data operations as well as the overall pay system development process, which interacts with its surroundings analyzes and have the ability to respond to them appropriately. The security solutions interacting with the ocean of early applications that have invested this new capability, which will appear in the rest of the applications soon, and during the briefing surroundings user requests, the application will adjust the security response, and adjust the delivery of information to the user mechanism, and simplify the world of growing computing complexity significantly.
Deep analysis will be applied in order to take the environment that will provide the preconditions for the world of smart machines. The Constituent Assembly meets this point with the advanced algorithms that allow the systems to understand the nature of the surrounding environment, and education itself, and act based on subjective judgments. Here we refer to the prototypes self-control vehicles, and robots unsophisticated, and personal assistants virtual, and advisers smartphones, is already in place, as it is evolving very quickly to enter us into a new era of auxiliary machines, Fsr intelligent machines will become more independent era in IT history .
Computerization of the cloud / client
Central will continue to cloud computing and mobile phones operations to strengthen the growth of the central coordinating applications, which can be delivered to any device. Commented David Sirle said on this point by saying: “The cloud is the new style of flexible computing viable for promotion and self-service, and that will be all internal and external applications based on the future design of this new style. In spite of that network and bandwidth costs may continue to tip the applications that use information storage and survey techniques when the client effectively, but the coordination and management processes will be based on the cloud. ”
In the near term, the focus of the cloud / client will be on synchronize content and application state by several means, and addressing applicability in all devices. Over time, applications will evolve to support the simultaneous use of multiple devices. While the second screen phenomenon today focused on scenes of the TV screen with the coordination of mobile phone use in the device. And the future, will be used games and enterprise applications alike several screens, and will use wearable devices and other devices in order to provide an enhanced experience.
Applications and infrastructure software-defined
The cruise programming for everything from the start of applications and access to basic infrastructure is a necessary process to enable the institutions to provide the flexibility required to achieve the digital business. This has reached networking software-defined storage solutions and data center and security solutions to maturity, services are cloud became configurable and the configuration software through communication and application programming interface API, and the same applies to applications, has increased the communication and application programming interface API to access the functions and content compiled. To deal with the rapidly changing requirements of the digital business and upgrade systems, whether for publication or downsizing, it is necessary to move away from fixed computing models and adopt interactive models. The rules and forms and code that can be assembled and configured interactively, all of which is one of the necessary elements required to start from the network access to applications.
Network Information Technology domain
Network Information Technology domain is a global standard computing is based on the provision of capacity to providers of large cloud services within the Information Technology settings in institutions, this will start more institutions to think and work to build applications and infrastructure like networking giants, such as Amazon, Google and Facebook. And can not immediately build a network scope of information technology, but evolve over time commercial platforms embrace new models, and improved cloud services, and knowledge of software methodologies cope mainstream. The first step to gain access to network information technology domain for many of the institutions represented in the development and operations, which must be achieved together in a coordinated manner in order to push the progressive development of sustainable and fast wheel for applications and services.
Security solutions and self-protection based on risk
All roads leading to the digital future pass through security solutions, but in the midst of the digital business world can not be security solutions that stand in the way of progress, institutions increasingly will be delivered to the fact that it is not possible to provide a 100 percent safe environment. Once institutions realize this, they will be able to start the application of more sophisticated tools for risk assessment and mitigation. From the technical side, the awareness that the walls of the excellent protection is not sufficient, and that the applications need to pursue a more effective role in the security field, will lead to the emergence of a new multi-faceted methodologies. So, we need to design applications that interact with security solutions, and develop security tests interactive and traditional applications, and implementation of self-protection for the application runtime associated with the presence of an active interaction with the environment, and enact controls access adaptable, in order to keep up with new and dangerous digital world. Which would result to the emergence of new models to build security solutions directly related with applications. Since firewalls are no longer sufficient, each application needs to detect and self-protection techniques.Viewing:-189
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!