In the 2013, the industry's definition of big data will become clearer and more focused on its derivative business value. To tap into the relevance of both data and business applications, the talent for managing and analyzing big data will emerge. The development of information technology, just like all human civilization evolution, now any widely expected or unique concept technology, can not be turned out overnight, but the accumulation of a lot of kinetic energy, only with the internal and external environmental conditions mature and gradually rise. Looking ahead to the IT trend in the 2013, there are still many expectations that continue from the 2012, such as public clouds, large data will enter a more mature year.
The role of it itself, of course, is evolving. Michelsen, chief technology officer at CA Technologies, believes that it will become a further engine for enterprise operations in 2013, and that the role of the information chief will be different from the past, serving as a business service innovator and integrator (Business service Innovators and Re-programme to manage the collection of diverse services and services that differ from business products, and it must also begin to act as a reliable consultant and service agent to provide security for the service.
Large data post potential period
Talking about the trend of 2013 years, Michelsen bullish big data will be maturing. In 2013, he noted, the industry's definition of big data will be clearer and more focused on its derived commercial value, and the talent for managing and analyzing big data will rise in order to tap into the relevance of both data and business applications, through the skills and computational processing capabilities that are good at To integrate the data to show the return on investment. On the other hand, because the infrastructure of big data is the integration of relevant information from social media and open data sources, the need for management and security will increase dramatically. He points to the CA's view that as the risk of big data decision is lowered, the insights it offers will enhance it's leadership in enterprise innovation.
However, while big data promotes innovation, it can also create different challenges. Acronis, senior vice president and marketing director Scott Crenshaw points out that with the increasing volume of internal data, big data will become a major factor in IT spending, especially the cost of data storage, which is likely to result in a business burden, Visionary IT managers must be prepared in advance. "2013 will be a year in which data are organized to make business more efficient." ”
Of course, not every manufacturer is fully optimistic about the development of big data. Lamorena, director of product marketing at Symantec Storage and availability management, says that in the 2013, companies will still remain on the sidelines for big data, although the number of new projects added to big data will grow significantly, But the high cost of the new infrastructure is often a daunting business, and many will switch to open source Hadoop architecture for more targeted and autonomous project investments. Combined with a large amount of data will make storage and management inefficient, relative to the big data related risks.
Rising cloud services
In the 2013, companies will be inspired to adopt the public cloud, as they increasingly agree on the "cloud" and realise that cloud is the way to do business. In addition to moving large hosts faster into the cloud, cloud storage will be heavily utilized. Acronis, senior vice president and Marketing director Scott Crenshaw, believes that 2013 will be the year when cloud storage capabilities are truly used for corporate mobility and data availability. Companies will be able to use cloud storage to meet growing data availability requirements, secure mobile security, manage ever-expanding data, and see it as a strategic storage differentiation measure.
"The traditional cloud computing capabilities focus primarily on server scalability, hardware optimization, and the ability to move applications from one virtual server to another in the cloud, but in 2013 cloud computing will have more commercial impact due to its storage capabilities." "he said.
However, Lamorena, director of product marketing at Symantec's storage and availability management, also reminds companies that the number of cloud service outages in 2013 will increase substantially, resulting in millions of of billions of dollars in losses, as cloud service disruptions may continue to deteriorate, so regardless of enterprise size, Need to adopt better cloud management tools to protect the data.
In addition to the need to strengthen and confirm the service levels provided by cloud service providers themselves, the risk of exposure to cloud services has soared. Wu, senior manager of the trend science and technology business, said 2013 cyber-criminals will abuse cloud services for criminal activity. "Cloud services meet the needs of many businesses and individuals. For cyber criminals, cloud computing has the same appeal. He noted that in the 2012, some cloud computing services had been exploited by cyber-criminals, including blogs, Facebook, and Twitter, which were used to send behind the scenes to manipulate server commands; Google Docs, Dropbox and Pastebin are all data-delivery targets. And Amazon EC2 have been used as a malicious system, and so on, although cloud service providers generally have the ability to withstand malicious users, they still cannot completely prevent abuse of services. There will certainly be more illegal misuse of cloud computing services in 2013.
Mobility has far-reaching implications
Another 2013 predictable trend is adroit (mobility). Dell China general manager Liao Renxiang said 2013 adroit will be a big issue. Mobility allows users to access at any place, at any time, and the IT topics that are generated for this purpose are large and far-reaching, and the adroit can be explored in the context of big Data, IT management, information security, cloud and many other extensions. He explained that BYOD (Bring Your Own Device) was only one of the adroit, and that there was a number of facets to be taken into account when it was BYOD the need for synergy, information security and data access.
Wu, senior manager of Trend Science and technology business, also agrees that when users use multiple computing platforms and devices, how to protect these devices will be a complex and difficult issue. He pointed out that in the past, the traditional computing environment, the most common platform is windows. But this situation is bound to change in 2013 years. Smart phones and tablet computers make new operating systems and applications popular, and they are used differently and are much different from traditional desktop or laptop computers. Security has become a difficult challenge that users must face.
CA Technologies Chief Technology officer John Michelsen also said that Adroit has many facets to explore, and identity authentication is one of them. When the user access system time and space no longer boundaries, and a variety of devices are also beginning to link to the cloud to collaborate, how to identify the user identity is a key. "The traditional certification approach will gradually exit, replaced by more intelligent identity certification development, such as the combination of biometric, image or sound technology." ”
Around the IT trend, all levels have to pay attention to the field and development, next to information security and data storage as the main axis, look at 2013 years of development trends and prospects.
(Responsible editor: The good of the Legacy)