Gartner: The power of change for security, mobility, large data and cloud

Source: Internet
Author: User
Keywords Will big data security these
Tags access android apple based big data business change cloud

If you've attended a Gartner meeting, you'll notice that a very noticeable thing is that they publish a lot of data about many it topics. The Gartner Symposium/itxpo meeting held in Florida State Orlando last week was no exception. The meeting is attended by about 9,000 executives, focusing on security, mobile computing, large data and cloud technologies that will bring huge changes to the IT industry in the near future.

It's pretty hard to list all this data, so we can only try to simplify the presentation by refining the important presentation documents at Gartner Itxpro meetings and highlighting the most eye-catching information.

Here's a few of the data we've picked up from the presentations from Gartner's many analysts and the IT trends they show.

It trends

2013 's global IT spending is expected to be more than $3.7 trillion trillion, up 3.8% from 2012 's projected spending of $3.6 trillion, but the prospect of big data is most compelling. Because by 2015, there will be 4.4 million new jobs around the world with big data, and 1.9 million more IT jobs in the United States. The big data will create a new economic area where the whole task is to turn information or data into economic revenue. 2013, big data is expected to generate 34 billion of dollars in IT spending.

Most of the current IT spending is spent on a variety of needs that use traditional solutions to deal with big data, such as machine data, social data, a wide variety of data, unpredictable speed and so on; in 2012, only 4.3 billion dollars of software spending was driven directly by new large data features.

At present, the most significant impact of large data is social network analysis and content analysis, the annual new expenditure in this regard as high as 45%.

A year ago, technology spending outside of the IT budget accounted for only 20% per cent of total technology spending, and at the end of the 10-year period, technology spending outside the IT budget would account for almost 90% per cent of total technology spending.

The organization will set up a chief data officer to participate in the leadership of the business unit. Gartner predicts that by 2015, 25% of the organizations will have a chief data Officer position.

"The chief data officer will prove to be the most exciting strategic role in the next 10 years," said David Willis, a renowned analyst and vice president of Gartner. CIOs will be in a place where businesses need to meet their customers, where revenue can be generated and where business missions are done. They will be responsible for the digital business strategy. And they have a long way to go from running back to the front desk, which is full of opportunities. ”

Over the next three years, consumer social networks, which dominate the market, will touch the rising ceiling. But social computing is becoming more and more important. Businesses will set up social media as a required option. Gartner predicts that 10% of organizations will spend more than 1 billion dollars on social media over the next three years.

"Social computing is moving from the edge of the organization to the core of the business," said Peter Sondergaard, Gartner's senior vice president and global research director. It is changing the fundamentals of governance: How to set a sense of purpose and motivate people to take action. Social computing will get organizations off the hierarchy, allowing teams to form interactive communities across organizational boundaries in any sense. ”

Moving trends

16多亿部 Smart mobile devices will be sold worldwide in 2016. Two-thirds of mobile workers will have a smartphone, and 40% of the staff will be mobile. The challenge for IT leaders is to decide how to confront their customers and employees through this new mobile channel.

Gartner predicts that in 2016, half of all non-PC devices will be purchased by employees themselves. By the end of this decade, half of all equipment in the enterprise will be owned by employees.

The advent of Apple's ipad has made BYOD a short-term fad. In most cases, IT departments want end users to be able to use these tools to help them get their work done better, or to help retain valuable employees, but at the same time do not want to increase the cost of computing resources per user.

By the end of 2014, the Android tablet will be shipped more than the iOS tablet. Android and iOS will continue to dominate the smartphone market in the short term, but there will be a big increase in Windows handsets. In the tablet market, Apple's dominance in 2013 will be hit by Low-cost Android tablets. We expect Windows 8 market share to remain smaller and more attractive to businesses than consumers.

HTML5 will become a key mobile technology, but fragmentation and immaturity will remain a challenge for the entire 2015, so HTML5 is a long way from being the panacea for cross-platform development. Some of the challenges of HTML5 can be mitigated by using JavaScript frameworks such as Dojo, Sencha, or jquery movement to hide some platform and browser dependencies. Testing for important HTML5 applications will become increasingly complex as there are too many platforms and browser variants.

By 2016, 60% of large enterprises will implement a limited network access domain to limit the connectivity of individual mobile devices.

Over the next five years, 65% of companies will use MDM to address the security implications of smartphones and tablets.

Gartner predicts that 90% of businesses will support two or more mobile operating systems throughout the 2017. Last year, many companies took Apple's iOS as its main mobile device platform, and other companies followed suit in the next 12 or 18 months. Other mobile platforms, such as Windows 8, will grow and must be managed with MDM.

By 2015, 20% of smartphone users around the world will use a monthly condensed content service to do business.

Security trends

There is a big increase in security investment. An already sizeable security market will be bigger, growing by 56% from today's scale in five years, while the cloud security market is growing almost 3 times times.

Gartner analysts say one of the key reasons for this growth is regulatory compliance. It leaders must plan ahead for the coming wave of government intervention and regulation. As information technology is ubiquitous in all operations of the enterprise, the secular world of regulation will also come to the digital world.

By the end of 2015, 50% of the companies currently providing identity management Services (IAMAAS) and cloud-based IAM solutions would be bought by large carriers.

Throughout 2013, 80% of cloud security events will be due to management failures by cloud service providers or cloud service users.

For a low-end security environment, or for a workload with simple security requirements, security in the internal structure or public cloud services is sufficient. This represents about 20% of the overall security market.

In the high-end market, security will remain independent of the private cloud or public cloud infrastructure-as we did in the case of internal network virtualization. The VMsafe API is an example of this mechanism that requires all security-related traffic to be externally flowing, through existing and independent security processes that can be checked and enforced security policies. This represents approximately 20% of the security market share.

In the vast middle of the high and low ends, a compromise is taken to run a secure workload in both the private cloud and the public cloud, as long as it provides adequate segregation of responsibility and audit/visibility.

There is an urgent need for companies to isolate personal and corporate business from consumers ' smartphones and tablets, whether they are owned by a company or a user. And these methods should be low-cost, easy to implement, easy to use, and should be strong in protecting the enterprise's policies and data. There are several technologies that can provide local solutions to support this effort, manage different consumer devices, and get users and IT managers to take what they want, but there is no solution that can satisfy both users and IT managers. After all, it's too easy for users to buy a smartphone, and it's easy to use it to access sensitive data over a corporate network.

The only way IT staff can maintain control is by moving computing devices (laptops, PDA, cell phone, reader and others are divided into three categories: (1) Trustworthy standard equipment, provided by enterprises, (2) acceptable equipment, user-purchased equipment combinations, (3) unsupported equipment, Used only in small areas, or only for consumers. It is not possible for the IT department to provide support for these devices. By 2016, 60% of large enterprises will implement restricted access network domains, restricting the connectivity of all individual mobile devices.

Cloud computing trends

Overall, the trend toward migrating to various cloud platforms is obvious. Virtualization, service-oriented, and Internet convergence create the phenomenon that individuals and businesses have the option of acquiring or delivering IT services, thereby weakening the traditional hardware and software licensing model. Services delivered through the cloud will breed an economic model based on delivery and consumption services, including all services for storage, computing, video, and financial deduction management.

The adoption of cloud computing is growing steadily, but it must be remembered that this adoption starts with a small base. In other words, it will grow faster than the existing types of it models, but so far it represents less than 3% of overall IT spending, even though it is still a decimal place by 2016. The key thing to consider here is how much of the cloud's growth will erode other spending. Notice that the Software license strategy of the manufacturer, the financing and distribution of the hardware, the growth of the service provider's revenue, the progress of the major IT service projects and the cloud computing will have a significant impact on it strategy.

The global market for public cloud services grew by 20.8% in 2011, to $91.4 billion trillion, and 2010 to $75.6 billion. Infrastructure as a service (IaaS) is the fastest growing segment of the public cloud service, with a composite annual growth rate of 41.7% (2011-2016). From 2012-2016, IaaS spending will be over $72 billion trillion.

The growth of the Software as a service (SaaS) market is slowing, with growth of 25.7% per cent in 2011, 2012 21.3%, and five years ' compound annual growth of 17.4%.

Server Virtualization Trends

In the 2014, there will be at least 5 competitive options for x86 server virtualization infrastructure. By the end of 2015, half of the world's top hundred companies will have at least one service for productive use, which is considered a private cloud computing service, while virtual machines (VMS) are basic building blocks.

By the middle of 2012, about 75% of the installed VMs were based on VMware. VMware is even more powerful in the world's top 500 companies, because they were the first to virtualize, and VMware was the only option on the market. Large companies are also using a wide range of high-end tools, such as vmotion, and the need to use VMS in their production is even more pressing.

Over the same period, Microsoft has accounted for nearly 18% of the installed VM market share. Microsoft is focused on new ventures in the virtualization market, most of which are smaller companies with fewer than 100 VM deployments. However, because of the very large price gap with VMware, Microsoft has also fought for some of the larger companies – especially in the periphery of big companies (such as branches and chain stores).

Citrix seems to have lost momentum in server workloads, but it is gaining momentum in the hosted Virtual Desktop (HVD) market. Its installation base accounts for approximately 5% of the VM installation base.

The rest of the vendors Oracle, Novell, Red Hat and parallels share only about 1% of the current total, but they are growing.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.