|Innovating The Next Big Thing||May 24, 2013|
• Analyst Insights
• Enterprise Insights
• Network & Information Security
• Enterprise Mobility
• Remembering 9/11
Next Innovator Group
Feedjit Live Web Stats
• Ghost City
Gartner Says Top 10 Strategic Technologies Will Be Assimilated Into Management Tools
Jun 12, 2012 – Gartner News
Analysts Discuss the Impact of Cloud and Virtualization on Infrastructure and Operations at Gartner IT Infrastructure & Operations Management Summit 2012.
“We are already seeing the adoption of 'big data' within the IT and operations management [ITOM] industry. In particular, software-as-service [SaaS] management providers now have to collect and synthesize large volumes of data,” said Milind Govekar, managing vice president at Gartner. “We also expect more next-generation analytics to come to the forefront to address an increasingly hybrid cloud environment. On the social front, IT service desk social management tools will establish an interactive relationship with end users, enhance end-user productivity, provide a platform to share information and ideas, and market the value of IT to the business.”
In the fourth quarter of 2011, Gartner identified the 10 technologies and trends that will have the biggest impact for most organizations in 2012. They are: 1. Media tablets and beyond, 2. Mobile-centric applications and interfaces, 3. Contextual and social user experience, 4. The Internet of things, 5. App stores and marketplaces, 6. Next-generation analytics, 7. Big data, 8. In-memory computing, 9. Extreme low-energy servers and 10. Cloud computing.
Gartner analysts have shared their recommendations for how to manage these technologies and trends before they take over an organization’s IT operations.
Media tablets and beyond. The media tablet market is seeing rapid device churn, which makes support and management both complex and expensive. With users broadening their use of personal devices for business applications and many organizations deploying mobile device management (MDM) to support different management styles in different ways, Gartner expects these factors to drive the adoption of tools to manage the full life cycle of mobile devices. IT leaders should develop mobility policies to mitigate the risk associated with, for example, the loss of devices and also consider a managed diversity support strategy to deliver IT support that aligns with end-user choice.
Mobile-centric applications and interfaces. Managing applications and data is more important than managing devices. One application can support multiple devices that run different operating systems (OSs). However, organizations should not assume that tools and OSs work the same way in mobile environments as they do on the desktop. Gartner recommends that IT leaders establish a mobile competency center to ensure there is sufficient focus on this area. In the longer term, they will need to establish an end-user computing group with a single mission to provide a work space management service.
Contextual and social user experience. Context-aware computing uses information about an end user's or an object's environment, activities, connections and preferences to improve the quality of interaction with that end user or object. Gartner believes that by 2015, 40 percent of the world's smartphone users will opt in to contextual service providers that track their activities. Defining and "surfacing" key metrics, such as performance and usage data, during application development will become paramount. IT operations will need to extend their capabilities beyond technologies such as configuration management databases to include individuals’ social interaction information for social graph capabilities.
The Internet of things. The Internet of things is a concept that describes how the Internet will expand as sensors and intelligence are added to physical items such as consumer devices and physical assets and these objects are connected to the Internet. It will likely become impossible for organizations to develop rules and discover relationships between these devices. As a result, machine and statistical learning technologies will likely be tools increasingly used by organizations using Internet-attached sensors and instruments.
App stores and marketplaces. Gartner forecasts that by the end of 2012 mobile application downloads from app stores will top 31 billion. Business users use app stores and marketplaces from both internal and external sources, which potentially make it difficult to distinguish between consumer apps and corporate apps. IT operations will need to address overlap between MDM and app store management as users will use various devices for apps that will be variously in the cloud and on the premises, fixed and mobile, built and bought, and composed and atomic.
Next-generation analytics. Given the aforementioned examples of interlocked and interrelated systems, it is important to be able to construct a dependency graph so that IT operations can understand the impact of systems experiencing high error rates or suffering total failure and take remedial action. Cloud-based technology, such as cloud management platforms, has the potential to provide the rapid provisioning necessary in environments where demand is causing infrastructure overload.
Big data. The rapid growth of consumer technology and steadily falling unit costs for processors, storage and communications have resulted in a major disruption to the data that is potentially available to organizations. In big data infrastructure, file systems need a layer of abstraction over them to allow for ease of scale and rapid data processing. These technologies include file systems such as GFS, HDFS and Lustre, which increasingly form the core of these new environments. Management is needed, as so-called worker nodes in file systems like HDFS can come and go, and checks need to be made to see if the rate of node failure is too high to get the necessary work done.
In-memory computing. In-memory computing is a style of computing in which the primary data store for applications (the "data store of records") is the central (or main) memory of the computing environment (on single or multiple networked computers) running these applications. As not all in-memory solutions support durability features, IT leaders need to assess the need for additional logging and/or "snapshoting" capabilities as well as non-volatile random-access memory. It is also important to conduct a design review of applications that use in-memory computing — especially database versions — to ensure the architected performance is not compromised by excessive waiting due to latches and locks.
Extreme low-energy servers. Extreme low-energy servers are systems constructed using processor types that were originally developed for extremely low-power environments. Low-energy servers can significantly reduce power (and facilities space) costs, but their increased number can pose administrative challenges in terms of scale, so IT leaders need to look to automation technology (like Opscode Chef, Puppet and CFEngine) to reduce the labor overhead. IT leaders need to ensure these investments are paying off by deploying power-monitoring and data center infrastructure management technology to collect data on potential energy savings.
Cloud computing. Cloud compute infrastructure as a service (IaaS) — on-demand compute resources coupled with associated storage and networking capabilities — is a rapidly growing and fast-evolving market. Gartner estimates that by 2015 nearly 5 percent of all virtual machines will run on external cloud IaaS. IT operations should transform itself into a "trusted service broker" able to work with the business to identify and procure cloud computing services — private, public and hybrid — to match various business requirements.
Gartner analysts will explore the impact of cloud computing and virtualization on infrastructure and operations (I&O) at the Gartner IT Infrastructure & Operations Management Summit 2012, to be held from June 12 to 13 in Frankfurt, Germany.
For further information about the Gartner IT Infrastructure & Operations Management Summit 2012 taking place from June 12 to 13 in Frankfurt, Germany, please visit www.gartner.com/eu/iom. Information from the event will be shared on Twitter at http://twitter.com/Gartner_inc using #GartnerIOM.
» Send this article to a friend...
» Comments? Tell us what you think...
» More Analyst Insights articles...
Commentsblog comments powered by Disqus
Support This Site
• 5/12 Frontline Sentinel: Two-Factor Authentication for Social Media Sites
• 5/10 McAfee Blogs: RealTime for ePO – Optimized Endpoint Security
• 5/10 Ovum: Ovum comments: GB smart meter delay better late than never
• 5/10 Gartner Says India Has The Potential To Lead The World In The Nexus Of Social, Mobile, Cloud And Information But May Waste The Opportunity
• 5/9 Frontline Sentinel: NSA's Manual on Hacking the Internet
• 5/9 Frontline Sentinel: 8 charged in $45 million cybertheft bank heist
• 5/9 Gartner Highlights Three Key Foundational Elements for Demand-Driven Retail Success
• 5/9 iSuppli: Korean and American Versions of Galaxy S4 as Different as Kimchee and Coleslaw, IHS Teardown Reveals
• 5/9 eMarketer: eMarketer: Emerging Markets Drive Facebook User Growth
• 5/9 Wireless Watch: Microsoft/Nokia alliance at crossroads as both ponder OS futures
• 5/9 Wireless Watch: Apple must rethink far more than the iOS user interface
• 5/9 Faultline: Quantenna gets closer to ST Micro, expect it to get “ascloseasthis”
• 5/9 Faultline: Microsoft volunteers to take Nook, as Barnes and Noble start to breakup
• 5/9 Canalys: Smart mobile device shipments exceed 300 million in Q1 2013 - Android powers 59% of smart phones, tablets and notebooks
• 5/8 McAfee Blogs: Cybercriminals Celebrate – It’s Mothers Day!!
• 5/8 Ovum: Government policy-makers need to create a level playing field for cloud services procurement
• 5/8 Gartner Says Smart Organizations Will Embrace Fast and Frequent Project Failure in Their Quest for Agility
• 5/7 McAfee Blogs: How Secure Are Your Social Accounts?
• 5/7 McAfee Blogs: The Password Problem. Is it Your Problem?
• 5/7 McAfee Blogs: Have you met McAfee’s SIEM?
• 5/7 McAfee Blogs: NCCDC 2013 – Red Team Recap
• 5/7 HP Security Lab Blog: HP TippingPoint announces Security Management System 3.6
• 5/7 McAfee Blogs: Yes, There are “Mother’s Day” Scams
• 5/7 Ovum: Analyst View: TPG looks to become Australia’s fourth MNO
• 5/7 Ovum: Analyst view: UK G-Cloud to champion public cloud
• 5/7 Gartner Says CIOs Will Need to Manage Both Technology and Business Innovation to Gain Competitive Advantage with Big Data
• 5/6 Gartner Says Indian Public Cloud Services Market To Reach $443 Million In 2013
• 5/6 iSuppli: IHS Discusses How PCs Can Survive the Tablet Invasion, at the SID Touch Gesture Motion Event
• 5/6 McAfee Blogs: Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
• 5/5 McAfee Blogs: Intel, McAfee Investing in Network Security; Strength through Acquisition
• 5/5 McAfee Blogs: Change Your Password Day – Get Onboard!
• 5/5 Frontline Sentinel: iFrame drive-by attack demo [Anatomy of Attack online]
• 5/3 Frontline Sentinel: Basic Use of Maltego for Network Intelligence Gathering
• 5/3 iSuppli: Russian, Eastern European Video Surveillance Market to Double from 2012 to 2017
• 5/3 McAfee Blogs: AP, Burger King, LivingSocial….Who’ll be Hacked Next?
• 5/2 iSuppli: SSDs to Account for One-Third of Worldwide PC Storage Shipments by 2017
• 5/2 iSuppli: PV Inverter Supplier Base Fragments in 2012 – Minimal Impact From Recent M&A Activity in 2013
• 5/2 McAfee Blogs: Healthcare Cloud Enabled Analytics is Growing
• 5/2 Ovum: Analyst view: Facebook’s Q1 2013 results
• 5/2 Australian Organizations to Spend A$70 Million on Business Process Management Suites in 2013: Gartner
• 5/2 Worldwide Semiconductor Assembly and Test Services Market Grew 2.1 Percent in 2012, According to Final Results by Gartner
• 5/2 Wireles Watch: ZigBee Alliance completes Smart Energy Profile 2:
• 5/2 Wireless Watch: AMD, AT&T and Ericsson – wireless value chain shifts to IoT
• 5/2 Faultline: Netflix Hastings predicts OTT world – should stick to profit predictions
• 5/2 Faultline: Ziggo to add 1m homespots by August, work with Liberty Global
• 5/2 Canalys: Canalys launches ‘Appcessory Analysis’ service - First analyst firm to launch a dedicated continuous information service in this space
• 5/1 McAfee Blogs: BadNews for Good People
• 5/1 Frontline Sentinel: The PR Implications Of Cyber Security
• 5/1 HP Security Lab Blog: So, you want to build a Security Operations Center...
• 5/1 HP Security Lab Blog: The new era of security intelligence, part 1