Wednesday 4 January 2012

What technology should be in your top drawer this year?

So 2012 is upon us and that brings with it a plethora of roadmaps from tier one enterprise technology vendors mixed with the continuing march of consumerisation of IT.  So given the hype, hysteria and trends presented in 2011 we thought a list of technologies to look at within this year might be useful:

  1. Tablets – No surprise here they have gained momentum over 2011 and lets face it I bet a number were shifted over the Christmas period and are now sitting on the desks of your colleagues.  From a business perspective, replacing notebook computers with much lower-cost tablets may have a double benefit of reducing capital expenditures as well as increasing user satisfaction.  Getting the devices to add value and match business requirements can be a challenge but defining your tablet strategy should overcome many of the hurdles that will present themselves.
  2. Windows 8 – The combination of both Server 8 and Windows 8 both laptop and mobile with a fully capable unified communications environment -- could mean rapid adoption for mobile organisations that can benefit from the access-anywhere model.
  3. Cloud Backups – Cloud will continue to be used for areas of the business that makes sense, one of those is backup and recovery. Because backups are secondary or tertiary copy of your data, cloud backups can more affordably fulfill archiving or disaster recovery than with moving tapes around.
  4. Storage Virtualisation - Putting a layer of virtualisation between the servers allows for thin provisioning, automatic tiering of storage, instant snapshots, and de-duplication.
  5. Cloud Applications – Again nothing new in concept but we believe that businesses will continue to explore smart utilisation of cloud services that are right for your business model.  Microsoft are touted to launch Dynamics into the cloud this year and we will continue to see broader adoption of Office365 and InTune.  The real trick is to use the cloud effectively while retaining data security and availability  -- no easy task.

No comments:

Post a Comment