200 likes | 381 Views
Top 10 Strategic Technologies for 2010. Kathy Harris. Strategic Technologies. Organizational impact during next 3 years Reaching maturity or a tipping point Driver of change / disruption May be existing or emerging Targets mainstream organizations. Agenda and Strategic Technologies.
E N D
Top 10 StrategicTechnologies for 2010 Kathy Harris
Strategic Technologies • Organizational impact during next 3 years • Reaching maturity or a tipping point • Driver of change / disruption • May be existing or emerging • Targets mainstream organizations
Agenda and Strategic Technologies • Technologies that will drive change in applications, application development and data centers • Technologies that will drive change and advances in the end-user environment • Other long-term trends and "forgotten" technologies that should be evaluated • Cloud Computing • Virtualization for Availability • Reshaping the Data Center • IT for Green • Client Computing • Social Computing • Mobile Applications • Advanced Analytics • Security — Activity Monitoring • Flash Memory
1 Service-Based 1 ConsumingCloud Services 2 Scalable and Elastic 2 Developing Cloud-Based Applications and Solutions 3 Shared 5 Attributes That Support Outcomes 3 Focal Points For Cloud Projects 3 4 Metered by Use ImplementingPrivate Cloud Computing Environments 5 Internet Technologies Cloud Computing: Everything as a Service Promises Agility, Innovation, Simplicity and Economic Value Gartner defines cloud computing as "a style of computing where scalable and elastic IT-related capabilities are provided'as a service' to customers* using Internet Technologies". * Public cloud computing refers to delivery of cloud services by a third-party provider to external customers. In private cloud computing, IT acts as the provider of services to internal customers.
Client Client A A A Client P P P A A A I I I P P P I I I Consuming Cloud-Computing Services Application Infra Services Appl, Information, or Bus Process Services System Infrastructure Services • Rapid hardware provisioning & delegated hardware management • Developer responsible for cloud optimization • Rapid development, deployment & change • Greater vendor lock-in • Rapid application deployment & change • Least flexibility Service Consumer Responsibility Caution Service Provider Responsibility
Virtualization for Availability: Far Beyond Consolidation • Live Migration — VMware or Microsoft • Currently used for one time permanent move • But … imagine a perpetual process, never done • What happens if source VM fails? • What happens if target VM fails? • One mechanism for availability versus many VM VM No special approach High reliability machine Separate physical machines Separate hi-reliability machines Fail-over clustering software Fault tolerant server Versus Change virtualization setting
Reshaping the Data Center —POD Design and Power Zones • What we knew about data center design for decades was wrong! • POD DesignIncremental build-out methodology; standard components; component configuration; optimized power and cooling to a prescribed amount of raised-floor space; reduced capital expenditure • Power ZonesHigh, medium or low density • Based on workload mix • Power and cooling designed at the zone level • Expandable over time • Dramatically reduce capital costs upfront • Minimize over-provisioning • Reduce operating expenses up to 40% • Allow very-high-density computing where needed
Remote communication and collaboration to reduce travel Analytics to optimize transportation of goods Teleworking Content and document mgt reduce the need for paper Smart building technology Carbon tracking, management and trading Collation and reporting of nonfinancial and CSR data Domains of Impact Product Use Business Production and Operations IT's Impact Mfg Energy Retail Fin Svcs Gov't Fix IT Fix Business • How intrinsic is IT to business? • How much does green IT contribute to overall green footprint? • If I don't spend on green IT how will it affect my business? IT For Green Business — Green ITMeans More Than Energy Efficient IT
Agenda • Technologies that will drive change in applications, application development and data centers • Technologies that will drive change and advances in the end-user environment • Other long-term trends and "forgotten" technologies that should be evaluated
Virtualization for Client Computing Hosted Virtual Desktops • Architectural equivalent of the blade PC • Full "thick-client" image, thin-client delivery model Portable Personalities • Carry the bubble, not thehardware • Portable media, stored on the network • Bubbles of various sizes: some with OS, some without
Social Computing: Participating in and Tapping Into the Collective Social Software for the Enterprise Social Profile Public Social Media Externally Facing: Customer Communities Twitter Myspace Blogs Wikis Social Network E-Mail Integration Activity Streams Security Content Tagging Facebook Discussions Ratings Bloggers Recommendations Ratings Search Content Tagging Website Integration The Battle for User Input and Knowledge Sharing
Mobile Applications • How Does It Affect You? • Mobile applications need new servers to which they connect • Application delivery and support complexity increases • Immature management tools • Look at mobile apps as a critical enabler of G2C interactions and increased customer satisfaction • Mobile applications can create • Stickiness, customer behavioral inertia, value “real estate”, support impulse interactions • Harbinger: • Tens of thousands of new, more powerful applications are coming online. • This will accelerate.
Fixed Rules Supported by Data Predictive Analytics Advanced Analytics: OperationalAnalytics to Optimize and Simulate Gartner's definition of optimization/simulation: Using analytical tools and models to maximize business process and decision effectiveness by examining alternative outcomes and scenarios, before, during, and after process implementation and execution. In-line/embeddedanalytics Enabling Trends Increasing connectivity More-powerful mobile processors Sophisticated mobile applications Derivingevents/data Traditionaloffline analytics Explanatory Exploringevents/data Predictive
Examine Collaboration in Context Using Social Network Analytics Social network analysis: relationship-based business intelligence regarding… • Intricacies of working relationships • Which team and individual activities would benefit from technology? • Network connectors and boundary spanners • Who are the critical people to drive technology adoption? • Social analytics • Trends, topics, expertise?
Agenda • Technologies that will drive change in applications, application development and data centers • Technologies that will drive change and advances in the end-user environment • Other long-term trends and "forgotten" technologies that should be evaluated
Flash Memory — Wide Uses Ahead Performance Why Flash is Strategic • Orders-of-magnitude enhancements • Price per byte declines Issues and Impact • Adds a layer to the storage hierarchy • Cost and useful life disadvantages • Rebalances the processor to storage speed ratio Strategic Decisions • Evaluate storage requirements and budget feasibility • Find opportunities to displace other hardware or solve service level challenges Energy efficiency Advantages Density Ruggedness Cost per byte Disadvantages Update limits
User Activity Monitoring —It's Going to Get Harder Privileged Users: Cloud User Activity: Cloud-Based Applications • Targeted attacks are on the rise • Application and infrastructure are prime vulnerabilities • Cloud computing complicates the picture • Security shifting from targeted protection to broad monitoring • User activity event streams must be monitored • Instrument internal systems • Evaluate cloud providers Cloud Applications Cloud Infrastructure Cloud Security Services TargetedAttacks Insider Threats Compliance Corporate Data Your Data Center Applications Infrastructure Activity monitoring User Activity: Data-Center-Hosted Applications Privileged Users: Data Center
User Activity and Resource Access Monitoring Technologies Monitor: • Identity and access policy change • Privileged user activity • Application user activity • Sensitive data access and movement User Activity Drivers Technologies Network Anti-Fraud Fraud Detection Application Security Information and Event Management (SIEM) Forensics/ Breach Detection Database Activity Monitoring (DAM) Access Management Database Identity And Access Manage-ment (IAM) Compliance Reporting Data Data Loss Prevention (DLP) System
Action Plan Tomorrow Categorize vendor cloud offerings as "consumer" or "provider" focused Identify social profile sources and begin planning for coordination Use pod and zone concepts for data center refits or new builds Expand "Green IT" to include a focus on "IT for Green Business" Within 90 Days Establish a project team to identify public and private cloud computing opportunities and governance models Determine where user activity and resource access monitoring can be applied for maximum impact in your environment Find opportunities for mobile apps for employees, citizens and partners Investigate flash memory to address top performance problems Within 12 months Build a 10-year strategic roadmap for client computing Exploit social network analysis (fraud detection and organization development) Build transition plans to a live migration based availability strategy Select the high value points to employ operational analytics
Top 10 StrategicTechnologies for 2010 Kathy Harris