International Forecast: Top Ten Strategic Technology in 2005

xiaoxiao2021-03-06  42

(2004.05.07) From: CNETCIO and other information technology (IT) supervisors face technologies that may have substantially impact on competitiveness and finance, but which new or existing technologies meet the company's goals, and adopted The timing is mature and difficult to judge. In view of this, Gartner selects the top ten strategy technology for reference.

Real-time message (Instant Messaging)

Gartner expects that by 2005, 60% of interpersonal communications will come out in real time on the spot, whether enterprises or consumers. Real-time news has swept the company and the various types of palm. However, Carl Claunch, Vice President of the Gartner Research, said safety concerns, lack of follow-up document records, limited quality, integration issues, and lack of non-literary media support, order enterprises to bundle the investment real-time message technology.

"IM is safe, because basic IM architectures are not designed for data preservation," Claunch said: "You will not want to e-mail $ 1 billion to Brendo's bank, then use IM to confirm this transaction. "

However, some companies have now provided real-time messaging software for solving security, audit and integration issues. AOL, IBM, Microsoft, Shengyang and Yahoo have begun to sell enterprise version of IM services, including information preservation, and functionality that follows government instructions. IBM is testing an application software integrating email and IM functionality, called NotesBuddy, and stores the IM conversation to the email's recipient, and attached.

Claunch said that Gartner has internal use of real-time communication technology, has achieved positive results: 40% of email, and the voice call is more declined.

"Some IM provides security and data storage check, but when you communicate with the company, there is still a lack of tools to handle identity, certification, and authorization," Claunch said.

Based on real-time communication, enterprises must develop the use of real-time communication in order to make employees to improve productivity simultaneously. In the future, Claunch said that IM will be integrated with the application, no longer an isolated online conversation, and a closed window disappears in invisible.

Wireless LAN (WLAN)

With the support of Wi-Fi Protection Access Agreement (WPA), security concerns related to wireless network deployment have been reduced. CLAUNCH said that WPA will provide sufficient security, making WLAN applications more popular, becoming an alternative to online network. "People have been cautious, think it is not worth venture to deploy wireless local area network (LAN)," But Claunch said: "WPA reaches the door of wireless network security requirements, and for a long time, it will make only the concept of wired networks and more interesting. "

WPA is derived from the upcoming IEEE 802.11i standard, two technologies compatible. 802.11i Standard (otherwis WPA2) will incorporate the High Order Encryption Standard (AES) algorithm to provide encryption protection than Wi-Fi security. Products certified by WPA2 is expected to come here later this year.

Taxonomies

Gartner expects how to construct a classification technology to improve productivity at the end of 2005, and it is still a problem of headache for users and software developers. The classification method is a way to divide the information. Modern people have limited time and attention. If the time required to find data is shortened, the productivity can be increased to customer satisfaction. For example, a wide range of preset rules can be used to filter the content of the email to improve the current file search. When the customer queries product information, if it is found that the data has been properly labeled with a well-designed classification, a better impression will be left.

In accordance with Claunch's statement, the application software that is in contact with consumers and enterprises, its biggest challenge is to determine that the classification method and the word will not make the user of the search data inexplicably. The classification results of manual and machine execution, and between the terms used by the user search data, there will be some inconspicuousness. Gartner expects that in 2005, enterprise-level solutions using the Classification and Analysis Method for guided content. Enterprise resources such as e-commerce websites, a set of classification management methods, Gartner recommends adjusting the company's internal or commercial classification method to operate in manual classification and machine classification. In addition, companies must have a budget to build a business word, dictionary, specialized terminology, and index required for a valid classification system.

Internet phone (IP Telephony)

Internet phone, including the technology that uses Internet protocols to transmit voice (VoIP), is a step near mainstream users, but Gartner analysts predict that it will jump as mainstream from 2006. "By 2006, most companies will fully complete the deployment of the Internet phone infrastructure and began to get a visual commercial interest in many applications," Claunch said. These applications include: Integrated Collaboration Suites-based conference, Call Center, and Integrated Collaboration Suites.

The cost savings is a major consideration to adopt a network telephone system, and most companies are waiting for the old-fashioned digital and analog telephone systems when they are coming. ZDNET's views of 400 IT professionals found that one-third of respondents said that the institutions they belonged to integrate a large part of the voice and data networks, in order to change the network phone in the future. system. In addition to reducing costs, respondents say that the main considerations for adopting the Internet phone also include: Video Conference (VideoConference and other integrated cooperation functions, as well as the benefits of productivity.

Software as a service (Software Treated As Services)

By the end of 2006, Gartner predicted that more than 80% of software companies changed more than 80% of software companies to change software construction, packaging and sales. Claunch said: "Web Services" provides a way to make an application as a full service. Once you use this new mode to create standard commercial applications, the real power will be played. Network services can span each The application is reused, and it can be adjusted with the special business processes of your company, extending your existing investment and utilization. "

Although network services still have identity, certification, and other security issues to be resolved, the main industry has planned to move toward the service orientation. Gartner expects that by 2005, a business that breaks the process boundary sharing information will tend to select a service interface (Service Interfaces) instead of data interfaces (Data Interfaces). But a broader network service deployment, there is a further improvement of the universal description query and integration (UDDI) standard other resource locker.

Real-time enterprise infrastructure (RTE Infrastructure)

Today's operational environments are not created to make IT investment to make maximum functions and efficiency. Claunch said that today's application serves their buildings in the exclusive basic construction, each has its own functions, such as a seat or island, cannot be easily shared in a distributed environment. Moreover, the utilization rate of the server, storage device and the network is low. If there is a lack of proper technical and application design, it is difficult to adjust, provide and share resources to meet a variety of service needs. "This year, our information length comment shows that the problem of [Respondent] is selected as the number one is the need to develop and manage more efficient IT basic buildings," Claunch said: "We want to transplant to real-time basic construction, More comprehensive monitoring of all resources, as a source of co-ordination supplies for all workload requirements. "Claunch said that it is necessary to improve resource utilization, improve the agility of the reaction and reduce the total cost of ownership, and must make the basic element of the construction of operations (Virtualized) ), Automation, and can be able to control these elements at a higher abstraction level. Strengthen the elasticity and real time of basic construction, which helps to access real-time information, and improve decision-making processes. Gartner is expected that the policy is organized to manage the real-time basic construction of a distributed environment, and it will become mainstream technology from 2005.

Utility computing

Public operations are also related to real-time infrastructure and IT resource sharing. Claunch pointed out that public operations transfer risks from their own IT departments to the supplier's IT service supply model. Claunch said: "This is a more flexible, and presence pattern. Users don't have to choose, have and manage IT devices, can purchase system operations to the utility operation provider."

Typically, the ordering mode of public operation is based on the amount of use, and "How much is" is taken ", which makes companies meet the peak dosage, and do not have to pay huge capital investment. Today, all of the Various Provincial Services (Hosting Services) provides some form of public operational billing schemes, through browser, network service, exclusive interface, or client program for users to access, Claunch said. Gartner estimates that by 2007, companies adopt common arithmetic model will increase from 15% today to 30%.

Grid computing

The grid operation is more than a few steps more than real time based on basic construction and utility. Grid operation is a concept, a term, is also an important forward-looking plan that major companies and new company have adopted. But Claunch warned that some of the company promoted the grid operations may be exaggerated.

Grid Operations Self-science and technology operation applications, those procedures require a lot of operational performance to address issues such as life scientific research and meteorological simulation. The grid environment breaks down into a large number of parts, and can be implemented simultaneously on separate computers, and do not have to focus on a single cluster. Enterprises are now looking for a grid operation mode to perform business applications and utility.

Gartner expects that the main purpose of the grid operation on the profit enterprise will be used to handle intensive workloads, such as complex business and financial analysis, but that will be things at the end of 2006. Gartner believes that the public operation service is in 2008, it may use grid mode. Claunch pointed out that the technical standards for grid operations are still evolved, while parallel processing custom applications require time improvement.

Network security function integration

Gartner expects that by 2006, 60% of the firewall and intrusion detection feature will be provided through the network security platform. At that time, the main security software suppliers will create a integrated security function package, with a unified management mechanism, solve the problems of all-oriented information for enterprises. In addition, Gartner expects that the content scanning and anti-blocking of spam will remain independent of the integrated security platform, but there are two new product categories to be born: high-end online acceleration for management safety services. Wire-speted devices, and low-order devices suitable for small-scale environments.

RF Identity Tag (RFID TAGS)

Gartner believes that by 2012, RF Identification (RFID) and similar wireless chips have changed, evolving from supply chain management technology into applications that can bring value to consumers, such as the location and status of the object, and the like. It is contemplated that the cost of the RFID tag will be reduced to deploy this technology.

Using RFID, you can track the life cycle of the product, provide more, more in-depth data records, can also improve market efficiency. The sensor may be embedded in an un-duplexed product shipping facility to monitor temperature, vibration, corruption, and other factors in the car from the warehouse to the store.

转载请注明原文地址:https://www.9cbs.com/read-73996.html

New Post(0)