I normally do this the other way round, but this time I decided to publish on the Softcat.com news site first – but for those of you who follow me here (thank you!), here’s my predictions for IT, plus some suggestions for how to address and take advantage of these trends. Happy New Year!
Happy New Year from all at Softcat! I thought we would start the year off with a few predictions for what we expect to happen over the course of the year. Rather than this being simply some predictions in isolation, we’ve made a few suggestions as to how you might be able to respond to, or take advantage of, these trends:
Desktop – if you haven’t already, you will come under increasing pressure to migrate to Windows 7. We expect IT to need to reduce desktop management costs, while maintaining or improving service levels to the business. Windows 8 is looking likely to ship towards the end of the year – it’s looking good so far and could be interesting when your PC, phone and tablet run basically the same OS. We think Windows 8 will be the last revision of the ‘desktop’ operating system as we know it – Windows won’t go away, but will increasingly be a platform across a huge range of devices.
What to do?
Get your desktop house in order – look at management toolsets such as System Center to reduce the pain of migrating to Windows 7 and of ongoing maintenance, and reconsider server-based computing (VDI, Terminal Services etc) where this makes sense.
BYOD – more and more people within your organisation will demand, and even expect, to be able to use their own devices – particularly phones and tablets – for work purposes. You need to set out your strategy here, as it is something that you can harness to improve productivity, employee satisfaction and business continuity.
What to do?
Evaluate the risk inherent in having data on these devices, versus the demand and potential gains. Technologies such as GOOD can encrypt data on those end-points, or you can use centralised computing to deliver Windows apps to those devices without any data getting on to the device. Over time, you may want to consider rearchitecting your line-of-business applications or at least having a transport mechanism that enables delivery to handheld devices.
Communications – we think there will be two main trends in communications. The first will be mobility-related – replacing desktop handsets by running telephony clients on mobile devices, and increasingly implementing VoIP over GSM or WiFi. The second will be an increase in the use of casual, desktop-based video conferencing and application sharing. Both of these trends will improve collaboration across geographical boundaries and bring disparate work-forces closer together.
What to do?
We think the increasing interest in Microsoft LYNC will drive both of these areas, so you could do worse than start there, especially if you have an Enterprise Agreement which gives you at least some LYNC entitlement. There’s a healthy ecosystem of products to improve and extend the capabilities of LYNC, as well.
Datacentre – virtualisation will continue to be the prevailing trend. If you haven’t, you really should – and if you have, you should probably do more! We’ll see more management technologies, both from the virtualisation vendors and from the ecosystem, which will help to push up the percentage of applications you virtualise, as well as to migrate towards the nirvana of a ‘private cloud’. No doubt your demand for storage will accelerate as well, so you will need to be clever about the way in which you use disk to keep on top of costs in that area while maintaining the performance your applications need. Oh, and you’ll need to improve your ability to recover in the event of a disaster, too.
What to do?
Review your strategy for virtualisation – are you trading physical server sprawl for the virtual equivalent? Would tighter management enable you to drive up utilisation? Review your storage strategy as well – can you make use of deduplication, for example – or employ a combination of SSDs for performance and cheaper, slower disk for data? The combination of clever use of storage and increased virtualisation can make it far easier – and cheaper – to implement a robust DR plan.
Cloud – this is the year that we will see ‘Cloud’ descend into Gartner’s ‘trough of disillusionment’. It wouldn’t surprise us if we saw the first serious security breach in the cloud space, and doubtless another large-scale outage. Having said that, losing some of the hype will make Cloud a more realistic proposition for businesses when done properly. We think that localised, friendly cloud providers will be increasingly important – credit-card-cloud will be reserved for development and test.
What to do?
Don’t write cloud off – but look to providers where you have or can build a relationship and where doing your own due diligence is possible. Look to extend the capabilities of your infrastructure for capacity or DR by partnering with a provider of infrastructure as a service, and if your business needs a new application, consider cloud options against on-premise.
Security – Firstly, 2012 is the year we expect security technologies to start to catch up with virtualisation. Up until now the available technologies have been somewhat immature, and the new model of ‘introspection’ via APIs will improve this. Secondly, this will be the year the business tells you to stop blocking Facebook, Youtube and Twitter, as people are now genuinely using them as business tools. You will no longer be able to mitigate the risks by turning them off! We’ll also see more focus than ever on keeping data safe – something which is increasingly difficult in this mobile world.
What to do?
Firstly, if your legislative or threat landscape demands it, look seriously at Intrusion Prevention technologies which will work across your virtual environment. Secondly, make sure that your Web Security Policy is up-to-date, and supplement it with a powerful filtering technology that enables control down to application-level within social networking sites, rather than taking a simple allow-or-deny approach. Thirdly, gain an understanding of the way in which data moves around your organisation and make sure your access policy limits data misuse, especially through social media and email. Encryption of remote access is a sensible step, and you may, if your position requires it, like to give consideration to a data-loss-prevention tool.
January 3, 2012 at 6:43 pm |
[…] more? I read an interesting post about 2012 in tech business on Sam Routledge’s Blog. Share this:MoreShare on TumblrDiggPrintLike this:Like2 bloggers like this […]
December 11, 2012 at 8:52 pm |
[…] Every year, in January, there is a flood of articles with predictions for the year ahead. Last year, I thought we should join the deluge and we put together our version of what lay ahead for 2012. I found myself wondering how many of these would be accurate and how many would quietly be deleted come December, so I decided that I would revisit our article and see how we did. I’ve summarised our points below, but you can find the original article here. […]