Monday, July 6, 2015

Gartner IT Tech Trends - 2014 vs 2015 Avoiding the Idiot Sandwich...

When Gideon Gartnefounded Gartner Group (now called Gartner, Inc.) in 1979, he started the new discipline of annual predictions of the Top 10 Strategic Technology Trends.  However, over time, it has been found that Gartner usually throws up the same old stuff, with tiny tweaks in the interim.

Well, rather than ignore the whole diatribe, we would assert that there are some real delectable takeaways in this dollar buffet.  

So if you would forgive the analogy, rather than eat what's placed before us, Wasabi decided to put the predictions to the test.  We compared the dishes side by side, ie., 2014 predictions against the 2015's just published.  

Now - as with anything Gartner, we know it's easy to serve up the same ol' meat and potatoes that was given last year, but rather than focus on the same ol'-same ol', we focused on the items that failed to make it on the menu and the new items that showed up.  These are the real food for thought... bon appetit!

First, Here are the Rehashed - some names have been changed to protect the lazy...

The top 10 strategic technology trends for 2014 include:

The top 10 strategic technology trends for 2015 are:

2014: Mobile Device Diversity and Management
2015: Computing Everywhere
Through 2018, the growing variety of devices, computing styles, user contexts and interaction paradigms will make "everything everywhere" strategies unachievable. The unexpected consequence of bring your own device (BYOD)   programs is a doubling or even tripling of the size of the mobile workforce. This is placing tremendous strain on IT and Finance organizations. Enterprise policies on employee-owned hardware usage need to be thoroughly reviewed and, where necessary, updated and extended. Most companies only have policies for employees accessing their networks through devices that the enterprise owns and manages. Set policies to define clear expectations around what they can and can't do. Balance flexibility with confidentiality and privacy requirements
As mobile devices continue to proliferate, Gartner predicts an increased emphasis on serving the needs of the mobile user in   diverse contexts and environments, as opposed to focusing on devices alone.  Phones and wearable devices are now part of an expanded computing environment that includes such things as consumer electronics and connected screens in the workplace and public space, said Mr. Cearley. "Increasingly, it's the overall environment that will need to adapt to the requirements of the mobile user. This will continue to raise significant management challenges for IT organizations as they lose control of user endpoint devices. It will also require increased attention to user experience design."
2014: The Internet of Everything
2015: The Internet of Things
The Internet is expanding beyond PCs and mobile devices into enterprise assets such as field equipment, and consumer items such as cars and televisions. The problem is that most enterprises and technology vendors have yet to explore the possibilities of an expanded internet and are not operationally or organizationally ready. Imagine digitizing the most important products, services and assets. The combination of data streams and services created by digitizing everything creates four basic usage models – Manage; Monetize; Operate; Extend. These four basic models can be applied to any of the four "internets” (people, things, information and places).  Enterprises should not limit themselves to thinking that only the Internet of Things (i.e., assets and machines) has the potential to leverage these four models. Enterprises from all industries (heavy, mixed, and weightless) can leverage these four models.
The combination of data streams and services created by digitizing everything creates four basic usage models — Manage, Monetize, Operate and Extend. These four basic models can be applied to any of the four "Internets." Enterprises should not limit themselves to thinking that only the Internet of Things (IoT) (assets and machines) has the potential to leverage these four models. For example, the pay-per-use model can be applied to assets (such as industrial equipment), services (such as pay-as-you-drive insurance), people (such as movers), places (such as parking spots) and systems (such as cloud services). Enterprises from all industries can leverage these four models.
2014: Cloud/Client Architecture
2015: Cloud/Client Computing
Cloud/client computing models are shifting. In the cloud/client architecture, the client is a rich application running on an Internet-connected device, and the server is a set of application services hosted in an increasingly elastically scalable cloud computing platform. The cloud is the control point and system or record and applications can span multiple client devices. The client environment may be a native application or browser-based the increasing power of the browser is available to many client devices, mobile and desktop alike. Robust capabilities in many mobile devices, the increased demand on networks, the cost of networks and the need to manage bandwidth use creates incentives, in some cases, to minimize the cloud application computing and storage footprint, and to exploit the intelligence and storage of the client device. However, the increasingly complex demands of mobile users will drive apps to demand increasing amounts of server-side computing and storage capacity.
The convergence of cloud and mobile computing will continue to promote the growth of centrally coordinated applications that can be delivered to any device. "Cloud is the new style of elastically scalable, self-service computing, and both internal applications and external applications will be built on this new style," said Mr. Cearley. "While network and bandwidth costs may continue to favor apps that use the intelligence and storage of the client device effectively, coordination and management will be based in the cloud." In the near term, the focus for cloud/client will be on synchronizing content and application state across multiple devices and addressing application portability across devices. Over time, applications will evolve to support simultaneous use of multiple devices. The second-screen phenomenon today focuses on coordinating television viewing with use of a mobile device. In the future, games and enterprise applications alike will use multiple screens and exploit wearables and other devices to deliver an enhanced experience.
2014: The Era of Personal Cloud
2015: Context-Rich Systems
The personal cloud era will mark a power shift away from devices toward services. In this new world, the specifics of devices will become less important for the organization to worry about, although the devices will still be necessary. Users will use a collection of devices, with the PC remaining one of many options, but no one device will be the primary hub. Rather, the personal cloud will take on that role. Access to the cloud and the content stored or shared from the cloud will be managed and secured, rather than solely focusing on the device itself.
Ubiquitous embedded intelligence combined with pervasive analytics will drive the development of systems that are alert to their surroundings and able to respond appropriately. Context-aware security is an early application of this new capability, but others will emerge. By understanding the context of a user request, applications can not only adjust their security response but also adjust how information is delivered to the user, greatly simplifying an increasingly complex computing world.
2014: Software Defined Anything
2015: Software-Defined Applications and Infrastructure
Software-defined anything (SDx) is a collective term that encapsulates the growing market momentum for improved standards for infrastructure programmability and data center interoperability driven by automation inherent to cloud computing, DevOps and fast infrastructure provisioning. As a collective, SDx also incorporates various initiatives like OpenStack, OpenFlow, the Open Compute Project and Open Rack, which share similar visions. As individual SDx technology silos evolve and consortiums arise, look for emerging standards and bridging capabilities to benefit portfolios, but challenge individual technology suppliers to demonstrate their commitment to true interoperability standards within their specific domains. While openness will always be a claimed vendor objective, different interpretations of SDx definitions may be anything but open. Vendors of SDN (network), SDDC (data center), SDS (storage), and SDI (infrastructure) technologies are all trying to maintain leadership in their respective domains, while deploying SDx initiatives to aid market adjacency plays. So vendors who dominate a sector of the infrastructure may only reluctantly want to abide by standards that have the potential to lower margins and open broader competitive opportunities, even when the consumer will benefit by simplicity, cost reduction and consolidation efficiency.
Agile programming of everything from applications to basic infrastructure is essential to enable organizations to deliver the flexibility required to make the digital business work. Software-defined networking, storage, data centers and security are maturing. Cloud services are software-configurable through API   calls, and applications, too, increasingly have rich APIs to access their function and content programmatically. To deal with the rapidly changing demands of digital business and scale systems up — or down — rapidly, computing has to move away from static to dynamic models. Rules, models and code that can dynamically assemble and configure all of the elements needed from the network through the application are needed.
2014: Web-Scale IT
2015: Web-Scale IT
Web-scale IT is a pattern of global-class computing that delivers the capabilities of large cloud service providers within an enterprise IT setting by rethinking positions across several dimensions. Large cloud services providers such as Amazon, Google, Facebook, etc., are re-inventing the way IT in which IT services can be delivered.  Their capabilities go beyond scale in terms of sheer size to also include scale as it pertains to speed and agility. If enterprises want to keep pace, then they need to emulate the architectures, processes and practices of these exemplary cloud providers. Gartner calls the combination of all of these elements Web-scale IT. Web-scale IT looks to change the IT value chain in a systemic fashion.  Data centers are designed with an industrial engineering perspective that looks for every opportunity to reduce cost and waste.  This goes beyond re-designing facilities to be more energy efficient to also include in-house design of key hardware components such as servers, storage and networks. Web-oriented architectures allows developers to build very flexible and resilient systems that recover from failure more quickly.
Web-scale IT is a pattern of global-class computing that delivers the capabilities of large cloud service providers within an enterprise IT setting. More organizations will begin thinking, acting and building applications and infrastructure like Web giants such as Amazon, Google and Facebook. Web-scale IT does not happen immediately, but will evolve over time as commercial hardware platforms embrace the new models and cloud-optimized and software-defined approaches reach mainstream. The first step toward the Web-scale IT future for many organizations should be DevOps — bringing development and operations together in a coordinated way to drive rapid, continuous incremental development of applications and services.
2014: Smart Machines
2015: Smart Machines
Through 2020, the smart machine era will blossom with a proliferation of contextually aware, intelligent personal assistants, smart advisors (such as IBM Watson), advanced global industrial systems and public availability of early examples of autonomous vehicles. The smart machine era will be the most disruptive in the history of IT. New systems that begin to fulfill some of the earliest visions for what information technologies might accomplish — doing what we thought only people could do and machines could not —are now finally emerging. Gartner expects individuals will invest in, control and use their own smart machines to become more successful. Enterprises will similarly invest in smart machines. Consumerization versus central control tensions will not abate in the era of smart-machine-driven disruption. If anything, smart machines will strengthen the forces of consumerization after the first surge of enterprise buying commences.
Deep analytics applied to an understanding of context provide the preconditions for a world of smart machines. This foundation combines with advanced algorithms that allow systems to understand their environment, learn for themselves, and act autonomously. Prototype autonomous vehicles, advanced robots, virtual personal assistants and smart advisors already exist and will evolve rapidly, ushering in a new age of machine helpers. The smart machine era will be the most disruptive in the history of IT.
2014: 3-D Printing
2015: 3D Printing
Worldwide shipments of 3D printers are expected to grow 75 percent in 2014 followed by a near doubling of unit shipments in 2015. While very expensive “additive manufacturing” devices have been around for 20 years, the market for devices ranging from $50,000 to $500, and with commensurate material and build capabilities, is nascent yet growing rapidly. The consumer market hype has made organizations aware of the fact 3D printing is a real, viable and cost-effective means to reduce costs through improved designs, streamlined prototyping and short-run manufacturing.
Worldwide shipments of 3D printers are expected to grow 98 percent in 2015, followed by a doubling of unit shipments in 2016. 3D printing will reach a tipping point over the next three years as the market for relatively low-cost 3D printing devices continues to grow rapidly and industrial use expands significantly. New industrial, biomedical and consumer applications will continue to demonstrate that 3D printing is a real, viable and cost-effective means to reduce costs through improved designs, streamlined prototyping and short-run manufacturing.

Items That Are No Longer Being Served.

These are the trends that Gartner abandoned.


2014: Mobile Apps and Applications

Gartner predicts that through 2014, improved JavaScript performance will begin to push HTML5 and the browser as a mainstream enterprise application development environment. Gartner recommends that developers focus on creating expanded user interface models including richer voice and video that can connect people in new and different ways. Apps will continue to grow while applications will begin to shrink. Apps are smaller, and more targeted, while a larger application is more comprehensive. Devlopers should look for ways to snap together apps to create larger applications. Building application user interfaces that span a variety of devices require an understanding of fragmented building blocks and an adaptable programming structure that assembles them into optimized content for each device. The market for tools to create consumer and enterprise facing apps is complex with well over 100 potential tools vendors. For the next few years no single tool will be optimal for all types of mobile application so expect to employ several. The next evolution in user experience will be to leverage intent, inferred from emotion and actions, to motivate changes in end-user behavior.

2014: Hybrid Cloud and IT as Service Broker

Bringing together personal clouds and external private cloud services is an imperative. Enterprises should design private cloud services with a hybrid future in mind and make sure future integration/interoperability is possible. Hybrid cloud services can be composed in many ways, varying from relatively static to very dynamic. Managing this composition will often be the responsibility of something filling the role of cloud service broker (CSB), which handles aggregation, integration and customization of services. Enterprises that are expanding into hybrid cloud computing from private cloud services are taking on the CSB role. Terms like "overdrafting" and "cloudbursting" are often used to describe what hybrid cloud computing will make possible. However, the vast majority of hybrid cloud services will initially be much less dynamic than that. Early hybrid cloud services will likely be more static, engineered compositions (such as integration between an internal private cloud and a public cloud service for certain functionality or data). More deployment compositions will emerge as CSBs evolve (for example, private infrastructure as a service [IaaS] offerings that can leverage external service providers based on policy and utilization).

 New Items On the Menu!

Here are the items new on the menu, i.e, Gartner added this year, perhaps the only items of interest in this trend report.


2015: Advanced, Pervasive and Invisible Analytics

Analytics will take center stage as the volume of data generated by embedded systems increases and vast
pools of structured and unstructured data inside and outside the enterprise are analyzed. "Every app now needs to be an analytic app," said Mr. Cearley. "Organizations need to manage how best to filter the huge amounts of data coming from the IoT, social media and wearable devices, and then deliver exactly the right information to the right person, at the right time. Analytics will become deeply, but invisibly embedded everywhere." Big data remains an important enabler for this trend but the focus needs to shift to thinking about big questions and big answers first and big data second — the value is in the answers, not the data.

2015: Risk-Based Security and Self-Protection

All roads to the digital future lead through security. However, in a digital business world, security cannot be a roadblock that stops all progress. Organizations will increasingly recognize that it is not possible to provide a 100 percent secured environment. Once organizations acknowledge that, they can begin to apply more-sophisticated risk assessment and mitigation tools. On the technical side, recognition that perimeter defense is inadequate and applications need to take a more active role in security gives rise to a new multifaceted approach. Security-aware application design, dynamic and static application security testing, and runtime application self-protection combined with active context-aware and adaptive access controls are all needed in today's dangerous digital world. This will lead to new models of building security directly into applications. Perimeters and firewalls are no longer enough every app needs to be self-aware and self-protecting.
So the morale of the story…?  Well, Ubiquitous java enabled mobile and desktop applications and  Hybrid Cloud and IT as Service Broker are not gonna happen.  However be on the lookout for Analytics and security-aware applications.










Source:
  • http://www.gartner.com/newsroom/id/2603623
  • http://www.gartner.com/newsroom/id/2867917
So “Once more unto the breach, dear friends, once more;”

____________________________________________________________

About Rick Ricker

An IT professional with over 23 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.

For more information, contact Rick at (800) 399-6085 x502

No comments:

Post a Comment

Thanks for your input, your ideas, critiques, suggestions are always welcome...

- Wasabi Roll Staff