Welcome!

Machine Learning Authors: Zakia Bouachraoui, Yeshim Deniz, Pat Romanski, Elizabeth White, Liz McMillan

Related Topics: Machine Learning , Apache

Machine Learning : Blog Post

Gartner Releases Two Top 10 Predictions for 2013

What Gartner is really saying?

Gartner has released two sets of predictions for 2013 – back to back:

  1. Top 10 Strategic Technology Trends for 2013: Technologies and trends that will be strategic for most organizations in 2013
  2. Top Predictions for IT Organizations and Users for 2013 and Beyond: Economic risks, opportunities and innovations that will impel CIOs to move to the next generation of business-driven solutions

In short the first set of predictions are about technology and the second set of predictions are about business implication of technology. As you can expect, there are overlapping area.

What are they really saying?

Next Hype = Big Data, Internet of Things, Wearable Devices and Gamification

Big Data: By 2015, big data demand will reach 4.4 million jobs globally, but only one-third of those jobs will be filled. With the improvement of performance and costs, IT leaders can afford to perform analytics and simulation for every action taken in the business.

Internet of Things: Through 2014, software spending resulting from the proliferation of smart operational technology will increase by 25 percent

Wearable Devices: By 2016, wearable smart electronics in shoes, tattoos and accessories will emerge as a $10 billion industry

Gamification: By 2015, 40 percent of Global 1000 organizations will use gamification as the primary mechanism to transform business operations

My take:

Mobile Winner = Android, Chinese Handset Manufacturer

Mobile Loser = Windows 8, two of (Samsung, Nokia, Apple or LG)

Windows 8: Through 2015, 90% of enterprises will bypass broad-scale deployment of Windows 8

Mobile Handset War: By Year-End 2014, three of the top five mobile handset vendors will be Chinese.

Mobile Beats PC: By 2013 mobile phones will overtake PCs as the most common Web access device worldwide

My take:

  • Windows 8 may emerge as the dark horse and do better than expected.
  • Two among Samsung, Nokia, Apple or LG loosing out to Chinese handset manufacturer in next 2 years looks very unlikely.
Update:
  • Looks like Gartner may be right about 3 of the 5 top mobile handset manufacturer being Chinese! (see this)

BYOD + Social Media = Big Security Threat

Data Leak Through Facebook: By 2017, 40 percent of enterprise contact information will have leaked into Facebook via employees’ increased use of mobile device collaboration applications.

Malware Proliferation Through BYOD: Through 2014, employee-owned devices will be compromised by malware at more than double the rate of corporate-owned devices.

My Take:

  • Too bad — the trend is unstoppable.

Net Reduction of Offshoring — but — Asian Headquartered Companies Win

Protectionism: By 2014, European Union directives will drive legislation to protect jobs, reducing offshoring by 20 percent through 2016

Success of Asian Companies: By 2014, IT hiring in major Western markets will come predominantly from Asian-headquartered companies enjoying double-digit growth

Market Consolidation: By 2014, market consolidation will displace up to 20 percent of the top 100 IT services providers

My Take:

  • Why is China always grouped with India for outsourcing when there is an order of magnitude difference in size of the industry in the two countries?

Other Technologies of Interest

HTML5 wins over Native Mobile Application: There will be a long term shift away from native apps to Web apps as HTML5 becomes more capable.

Personal Cloud: The personal cloud will gradually replace the PC as the location where individuals keep their personal content, access their services and personal preferences and center their digital lives.

Enterprise App Store: By 2014, many organizations will deliver mobile applications to workers through private application stores.

New Role of Cloud Service Brokerage: The internal cloud services brokerage (CSB) role is emerging as IT organizations realize that they have a responsibility to help improve the provisioning and consumption of inherently distributed, heterogeneous and often complex cloud services for their internal users and external business partners.

In Memory Computing: The possibility of concurrently running transactional and analytical applications against the same dataset opens unexplored possibilities for business innovation.

Integrated Ecosystems: The market is undergoing a shift to more integrated systems and ecosystems and away from loosely coupled heterogeneous approaches.

My Take:

  • Reasonably realistic!

Related Articles:

Read the original blog entry...

More Stories By Udayan Banerjee

Udayan Banerjee is CTO at NIIT Technologies Ltd, an IT industry veteran with more than 30 years' experience. He blogs at http://setandbma.wordpress.com.
The blog focuses on emerging technologies like cloud computing, mobile computing, social media aka web 2.0 etc. It also contains stuff about agile methodology and trends in architecture. It is a world view seen through the lens of a software service provider based out of Bangalore and serving clients across the world. The focus is mostly on...

  • Keep the hype out and project a realistic picture
  • Uncover trends not very apparent
  • Draw conclusion from real life experience
  • Point out fallacy & discrepancy when I see them
  • Talk about trends which I find interesting
Google

CloudEXPO Stories
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like "How is my application doing" but no idea how to get a proper answer.
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next-gen applications and how to address the challenges of building applications that harness all data types and sources.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O'Reilly author.