版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、Bob Hayward,Technology Trends 2004-2008,These materials can be reproduced only with Gartners official approval. Such approvals may be requested via e-mail - .,The Long View Mid-Life Pause For Breath for IT-based Transformation of Business,Silicon Age,?,Mainframes,PCs,Physical Connectivity,Logical Co
2、nnectivity,Embedded Connectivity,Relativeimportance,2,Technology Laws and Innovation Continue,Moores Law The Fifth Paradigm,10-6,10-4,10-2,10,10+2,10+4,10+6,10+8,10+10,1900,1910,1920,1930,1940,1950,1960,1970,1980,1990,2000,Exponential Scale,Calculations Per Second Per $1,000.,Electromechanical,Relay
3、,Vacuum Tube,Transistor,Integrated Circuit,3,The Hype Cycle,Trough ofDisillusionment,Slope ofEnlightenment,Plateau ofProductivity,Maturity,TechnologyTrigger,Peak of InflatedExpectations,Positive Hype,NegativeHype,Do not join in just because it is in,Do not miss out just because it is out,4,Technolog
4、y Trigger,Peak of Inflated Expectations,Trough of Disillusionment,Slope of Enlightenment,Plateau of Productivity,Maturity,Visibility,As of May 2003,Instant messaging, retail,Instant messaging, corporate,Mobile applications, retail,Mobile applications, corporate,Mobile payments,Speech and voice techn
5、ologies,Grid computing,Data mining,Web services,Artificial intelligence,Intelligent agents/push technology,Sales planning and pricing tools,Partner relationship management (PRM),Biometrics,Chip-based cards, corporate,Contact chip cards, Europe,Contact chip cards, U.S.,E-tag,Network identity services
6、,E-signatures,Document imaging,Document management/archive,Business rules engine,Emerging technologies hype cycle,Benefit,Maturity,New business models,New processes,Improved processes,Moderate: Usable with motivation,Low: demonstrations, prototypes and pilots,Radar Screen,6,Technologies at Different
7、 Speeds,Long-fusetechnologies,One to two decades from trigger to plateau Science-fiction-like fascination Inherent complexity, business implications. Reliance on certain infrastructure, skills,“Fast Track” Technologies,Two to four years from trigger to plateau Performance peaks early Uses current in
8、frastructure/standards Easy to use Vendor support,IM, SMS, USB Flash Cards.,Smart Dust,Speech Recognition,Handwriting Recognition,Machine Translation,Intelligent Clothes,“Intelligent Agents”,Holographic Storage,E-mail,Internet,Desktop Videoconferencing,Biometrics,Tele-Immersion,Fiber optics,Nano-Com
9、puting,DNA-Computing,“Autonomic Computing”,Quantum-Decryption,Gartner Predicts: Ten Hot Technologies 2004,The Top Ten Technologies Instant Messaging Real Time Data Warehouse WiFi Security Internal Web Services Policy based management IP Telephony Utility Computing Grid Computing Network Security Tec
10、hnologies RFID Tags,Maturing in 18-36 months,Wider Applicability,Lowered Risk,Issues Resolved,8,Instant Messaging in the Enterprise,Values: Presence Service Real-time No rewind Low overhead,Other Issues: Lack of audit trail QoS limitations Poor integration capability Lost record of decisions Text fo
11、cused, limited media,Security concerns: Data protection Privacy Tamper resistance,9,“Creative Scheduling”,DW,ETL,ETL,ETL,ETL,ETL,ETL,Source,Source,Source,Source,Replication,Source,Source,Source,Source,DW,Data Warehouse As An Application,DW,Integration Broker,Source,Source,Source,Source,Target Apps.,
12、Avoid The Issue No Data Warehouse!,Source,Source,Source,Source,BI Tools and Applications,DW,ETL,Options for developing a Real-Time Data Warehouse,10,On the Cusp of the Most Fundamental Change to Business Since The Internet,IT Architecture, concepts and business philosophy have reached a critical tip
13、ping point: Service Oriented Architectures (SOA), Event Driven Architectures (EDA), Service Oriented Business Applications (SOBA), Service Oriented Development of Applications (SODA), Web Services, Real Time Enterprise (RTE), Business Process Management (BPM) and Modeling and Business Process Fusion
14、 gaining major traction and move towards critical mass and mainstream adoption,Maturity in these areas will drive dramatic changes in the way we do business, to a degree not seen since the advent of the Internet,11,Integration of IT and Business Processes,High,Low,No Business Is an Island: The Incre
15、ased Dependence on IT for Business Processes,12,Software As Product License model Customization required Post implementation hosting Expensive,Software As Service Speed to solution Rental model Remote delivery Vertical templates Medium cost,Business Services Application agnostic Net-native software
16、Pay for use Business process focused Lower cost,Time 2014,Business Focus Transactions to Process Innovation,Flexible Application Platform Portal, Integration, App Server, APS, SOA,Leverage Enterprise Knowledge Content, Data, Analytics, Relationship Mgmt,Transaction Processing ERP, SCM, Customer Tran
17、sactions, etc.,Business Collaboration Smart Enterprise Suites, Multienterprise,End-to-End Processing Business Process Fusion,20,Gartner Predicts: Application Development Models, Toolsets Are Changing,1M,2M,3M,2002,2003,2004,2005,2006,2007,New Projects Programming Models,Professional Developers,COBOL
18、,Visual Basic 6 and lower,C/C+,Java,C#,Visual Basic .NET,21,Static and Unshared Islands,Service A,Edge,Application,Database,Service B,Service C,Inefficient Overprovisioned Hard to manage,Current state is inflexible and does not reflect business priorities,(And Many Others),22,Policy Based Management
19、: The Real-Time Infrastructure,Black-Box Application Services,Actual User Experience,Policies Definition of IT Service Service Agreements User Class Business Priorities,INPUTS,Compute,Store,Network,Resources,Workloads,Applications,Databases,Middleware,OUTPUTS,IT Services,Policy-based, dynamic, cost-
20、efficient: Provisioning: Deployment, Growth Optimization: Resource Efficiency Availability: Predictable, Service Level,23,IP Telephony,VoIP on WAN issues QoS control Economics vs carrier trends IP variable latency Standards and interoperability,IP telephony issues Features vs PBX Scalability Reliabi
21、lity QoS and sharing networks Interoperability,Some Missing Features Attendant console Least cost routing Busy override Trunk callback queuing Blind transfer,Less then 500 phones; VoIP over WAN,Large IP Telephony (500 or more phones),Very Large IP telephony (2,000 or more phones),24,Utility Computin
22、g,Utility computing Buy the services of system, not HW/SW Separates the what from the how Pricing model tends toward usage Examples: ASPs, SSPs, MSPs, hosting services Access them various ways Web services Browsers Thick clients . . .,8.6B$ 2003,25B$ 2006,25,GRID Computing,Application,Owner C,Owner
23、A,Owner B,26,Utility Computing and GRID,Application,Utility selling grid resources,Owner A,27,Honey Pots, Application Traces and Forensics,Firewalls,IDS,VA,Gateway AV,Security Platform,In the Cloud MSS,Intrusion Prevention Appliances,Anti- spam,Content Scanning,Sub-100 Mb,Gigabit+,2002,2004,2006,?,?
24、,Policies and Parameters,New Network Security Technology,Unified Management,28,Current Applications Toll pass systems Pet identification Access cards Retail theft protection Electronic parolee tracking,Photos source Texas Instruments,Successor to Bar Codes Can read even covered Can read while moving
25、 Can scan at distance Survives water, heat, painting Price dropping to low levels Remain in product for life,Potential Applications Locate common objects Improved asset control Real-time retail-shelf inventory Move to faster or self-checkout Improve manufacturing and supply-chain efficiency After-sa
26、le services offerings,RFID Tag,29,“Smart” Objects,Passive tags temporarily attached to medium-/high-value items. Dedicated communication and computation is applied in specialized situations only. Computers are relatively large and long-lived.,Passive tags in every nontrivial object. Active intellige
27、nce wireless networking and sensing capabilities cost under 50c and are widely distributed. The majority of computers are invisible and disposable.,Bar coded shopping. Inventory tagging. Specialized industrial tagging.,Nothing is ever lost. Everything is identifiable. Many objects know their history
28、 and can interact wirelessly.,30,More information,Improved understanding,Improved decisions,Analysis Gap,Action Gap,Digital footprints(Sensors, RFID) Self-service Information extraction Unstructured data sources Embedded connectivity Metadata and tags,Improved algorithms Targeted algorithms Integrat
29、ed analysis,Business rules Business process fusion,Analysis: Mind the Gap,31,Proxy Caching VPN Firewall WAP VoIP Gateway,Desktops,Client Devices,Databases Consolidation on zSeries,ERP SCM CRM HR,Business Application Server,Internet Access,Line of Business,Enterprise Data,Data/Content Server/ Warehou
30、se,Network Edge Servers,Compute Clusters,Infrastructure Server/Blade,Directory Security Load balance File/print Web E-mail NAS,Financial, R&D, biotech, geophysical, energy, visualize,Gartner Predicts: Linux in the Enterprise: Grass Roots,32,Office Suite Word Processor Spreadsheet Charting Personal D
31、atabase,ERP Suite Material Requirements Planning Inventory Control Financials Human Resources,Smart Enterprise Suite Collaboration Support Content Management Information Access Portal Framework,Gartner Predicts: Smart Enterprise Suite A New Wave of Software Consolidation,Content management Collabora
32、tion Information organization and retrieval Business intelligence Portal framework Ad hoc process support Expertise location and management Community support,With: Sufficient range of functionality Aggressive price points Coherent offer for individual, team and enterprise processes Integration acros
33、s suite for user and administration Services and support,SES What to Expect,Connected Society,wireless,wearables,Wi-Fi,smart phones,location-based services,ultra-wide band,Smart Networked Objects,embedded computing,RFID,MEMS,smart dust,digital ink,Semantic Web,information extraction,XBRL,Semantic Co
34、nnectivity,affinity profiles,automatic tagging,Three Megatrends,35,Mobile and Wireless in the Next Decade,PDA Hub,Mesh Networks,By 2007, hubs (central units without peripherals) will emerge that connect many peripherals (e.g., via PAN). Lots of Functions: Phone, Calendar, Internet, MP3 Player, Camer
35、a, Video, House/Car Key, Payment, Authentication, Biometrics, Life Saving, Stun Gunning, Insect Repelling Shared Hub: I/O, Security, Battery, Storage, Call Center,A mix of technologies, e.g., Zigbee, UWB, Bluetooth, Wi-Fi x.y, 2.5/3/4G, will allow best economical mix: reliability, costs, size, bandw
36、idth, reach Sensor Mesh Networks/Monitoring Self-Organizing Principles: Plug-and-Play,Tags,Motes,GPS,RFID, Smart Dust (Smart Peas), GPS Sensors Fleet Management (AVLDS), Inventory Management Optimized Traffic Routing,36,Mobile Network Evolution,Celllocation(worst case, several Km),Location precision
37、 of 80 M or better,2006 2005 2004 2003 2002 2001,TDMA,CDMA,GPRS,EDGE,WCDMA,1x-EV DV,cdma20001xRTT,GSM,GPRS,WCDMA,EDGE,2GAssume 9.6-19.6 Kbps,2.5GAssume80-100 Kbps EDGE,20-40 Kbps GPRS,3GAssume 200-300 Kbps,Celllocation(worst case, several Km),?,EV DO,CDMA,GSM,CDMA,GSM,37,Short-Range Wireless,Persona
38、l Area,Adjacent,Local Area,Metropolitan,1M,10M,100M,1KM,Nearfield Passive RFID Active RFID,802.16a (Wi-Max) 802.16b (mobile) Proprietary fixed mesh 802.20 (mobile),UWB 802.15.4 (Zigbee) Bluetooth Proprietary PAN,Proprietary mesh 802.11 a,be,g,h,i,f (b = Wi-Fi),38,Device Innovation, 2003-2005,Consume
39、r,Corporate,Market Trends Fashion is still key Annuity handset revenue Nokia n-gage console Asian manufacturers,Greater competition, e.g., Dell, Microsoft Fragmentation, not convergence,Microsoft and Symbian battle for corporate mind share No single-standard corporate device,Technology Trends Color,
40、 polyphonic sound Imaging, video, cameras Game technology M-commerce hardware,Java everywhere Form-factor proliferation Slow Bluetooth deployment,Integrated WLAN Microsoft .NET grows 1GHz, PDA by 2005 Tablet PC,39,The Diverse Mobile User,40,Gartner estimates as of February 2003,Primary Modes of Mobi
41、le Workers,41,Computer Human Interaction in the Next Decade,Human Computer,Computer Human,Biometrics, Speech, Handwriting, Eye Position Gait Analysis, Infrared Emotion/Lie Detection SPA: Most CHI will remain keyboard-driven throughout 2015 (0.7 probability),OLED/OLEP, E-Ink Head-Mounted Displays Spe
42、ech Synthesis Avatars, Synthetic Characters,Logic,Natural Language Search Machine Translation Taxonomies/Browsing Personalization,42,Uncontrolled distribution of information,Political & social instability,Electronic fraud,Geographical & cultural remoteness,Lack of trust in Internet security,Supplier dependency,The Connected Economy Opens the Door to New Dependencies and Threats,In recent years, we have witnessed terrorist attacks, political
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 道路交通反違章培訓(xùn)課件
- 道法安全記心上課件
- 2026年甘肅省隴南市高職單招職業(yè)適應(yīng)性測試題庫試題附答案
- 2025胸腔鏡肺結(jié)節(jié)日間手術(shù)圍手術(shù)期健康教育專家共識解讀課件
- 車險新人培訓(xùn)
- 木材加工設(shè)備安裝計劃主要內(nèi)容
- 軍隊文職面試考生回憶版試題(軟件工程工程技術(shù))
- 車間節(jié)后返崗安全培訓(xùn)課件
- 酒店客戶服務(wù)標準流程制度
- 2025年學(xué)校教學(xué)管理與核心教學(xué)制度落實工作心得(2篇)
- 腫瘤放射治療的新技術(shù)進展
- 土壤微生物群落結(jié)構(gòu)優(yōu)化研究
- 2024外研版四年級英語上冊Unit 4知識清單
- 視頻會議系統(tǒng)施工質(zhì)量控制方案
- 2025年高二數(shù)學(xué)建模試題及答案
- 2025年黨的二十屆四中全會精神宣講稿及公報解讀輔導(dǎo)報告
- 壓力管道安裝單位壓力管道質(zhì)量安全風(fēng)險管控清單
- 停車場道閘施工方案范本
- 2025年實驗室安全事故案例
- 衛(wèi)生院關(guān)于成立消除艾滋病、梅毒、乙肝母嬰傳播領(lǐng)導(dǎo)小組及職責(zé)分工的通知
- 鐵路更換夾板課件
評論
0/150
提交評論