Wednesday, July 24, 2024

Top Ten 2010 Tech Trends

Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Which applications and strategies will lead IT spending into the new decade? Research firm Gartner offered its own take with the unveiling today of its Top 10 list of technologies and trends for 2010 a its Gartner Symposium/ITxpo in Orlando, Fla.

Gartner defined a strategic technology as one with the potential for significant impact — meaning it will require substantial financial investment, has a high potential to disrupt the business or puts the organization at risk if it’s late to adopt — in the next three years.

“Companies should factor the top 10 technologies into their strategic planning process by asking key questions and making deliberate decisions about them during the next two years,” Gartner analyst David Cearley said in a statement. “However, this does not necessarily mean adoption and investment in all of the technologies.”

“They should determine which technologies will help and transform their individual business initiatives,” he added.

Not surprisingly, cloud computing was atop the short list for 2010.

As enterprise customers continue to embrace the on-demand model for everything from customer relationship management (CRM) applications to e-mail security and data storage, top-tier vendors are racing to build or acquire the best Software-as-a-Service (SaaS) applications suites.

Gartner analysts said that while cloud computing does rearrange some IT budgets and reduce others, it doesn’t eliminate all of the costs associated with building a data-rich enterprise network. Also, enterprises that opt for cloud-based models will themselves act as cloud providers and deliver application, information or business process services to customers and business partner.

Social computing and social media, the fast-growing and most controversial enterprise IT component, will continue to challenge both the sanity and security of enterprise data networks.

The popularity of social networking sites such as Facebook and Twitter have fundamentally changed the way people communicate within their company and with external partners, vendors and customers.

“Workers do not want two distinct environments to support their work — one for their own work products (whether personal or group) and another for accessing ‘external’ information,” Gartner said. “Enterprises must focus both on use of social software and social media in the enterprise and participation and integration with externally facing enterprise-sponsored and public communities. Do not ignore the role of the social profile to bring communities together.”

Green IT, Mobile Apps and Virtualization

The rest of Gartner’s Top 10 for 2010 includes:

Advanced Analytics: The new step is to provide simulation, prediction, optimization and other business intelligence to improve decision making at every business process action.

Client Computing: Gartner advises clients to build a five- to eight-year strategic client computing roadmap outlining an approach to device standards, ownership and support, operating system and application selection as well as management and security plans to manage diversity in their enterprise networks.

IT for Green: “The use of IT, particularly among the white collar staff, can greatly enhance an enterprise’s green credentials,” Gartner analysts said. Common green initiatives include the use of e-documents, reducing travel and teleworking. IT can also provide the analytic tools that others in the enterprise may use to reduce energy consumption in the transportation of goods or other carbon management activities.

Reshaping the Data Center: Cutting operating expenses, which are a nontrivial part of the overall IT spend for most clients, frees up money to apply to other projects or investments either in IT or in the business itself.

Security/Activity Monitoring: A variety of complimentary (and sometimes overlapping) monitoring and analysis tools help enterprises better detect and investigate suspicious activity — often with real-time alerting or transaction intervention. By understanding the strengths and weaknesses of these tools, enterprises can better understand how to use them to defend the enterprise and meet audit requirements.

Flash Memory: It’s not new but it’s “moving up a new tier in the storage echelon,” according to Gartner. At the rate of price declines, the technology will enjoy more than a 100 percent compound annual growth rate during the next few years and become strategic in many IT areas including consumer devices, entertainment equipment and other embedded IT systems.

Virtualization for Availability: Live migration is the movement of a running virtual machine (VM), while its operating system and other software continue to execute as if they remained on the original physical server. This takes place by replicating the state of physical memory between the source and destination.

“The key value proposition is to displace a variety of separate mechanisms with a single ‘dial’ that can be set to any level of availability from baseline to fault tolerance, all using a common mechanism and permitting the settings to be changed rapidly as needed,” said Gartner.

Mobile Applications: By the end of 2010, Gartner predicts 1.2 billion people will carry handsets capable of rich, mobile commerce providing a rich environment for the convergence of mobility and the Web.

“There are already many thousands of applications for platforms such as the Apple iPhone, in spite of the limited market and need for unique coding,” Gartner said.

“It may take a newer version that is designed to flexibly operate on both full PC and miniature systems, but if the operating system interface and processor architecture were identical, that enabling factor would create a huge turn upwards in mobile application availability.”

Article courtesy of

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Similar articles

Get the Free Newsletter!

Subscribe to Data Insider for top news, trends & analysis

Latest Articles