10 strategic technologies for 2010
A strategic technology is defined by Gartner as having a significant impact on the activity and development of a company within 3 years. They are strategic because they are now sufficiently mature for implementation and broad adoption or because their early use may provide competitive advantage.

1. Cloud computing

This computer model in which providers offer a range of services to businesses or individuals is primarily an architectural model out that provides access to the service "on demand" mode "self-service, and with cost control to use (model pay-as-you-go "). 

It is built on an extensive and flexible network that should allows to abstract the location of resources and puts the Internet in the heart of business activity. It allows the use of remote hardware resources (servers) to create online services. Companies no longer need to set up their own network infrastructure and server, but they can leave their service providers offer turnkey capabilities. From there, they may develop solutions type SaaS (Softwareas a Service ) manageable from a web interface accessible from any terminal connected to the Internet.

2. The advanced analytical technologies

The optimization and simulation use tools and analytical models to maximize the efficiency of business processes and decisions by examining the results and alternative scenarios before, during and after the implementation and execution of these processes.

Already in the tools available for decision makers, analytical technologies should make their arrival into the world of business processes. Modeling from various applications such as CRM and ERP are now possible. The Business Intelligence (Business Intelligence) on the business processes are now possible, and should be an engine of growth for years to come.


3. Virtualization client

Virtualization brings new ways to implement applications on the client. Consequently, the choice of the type of PC hardware and even operating system becomes less critical. 

Evolution of the client including consideration of standards, the type of ownership and support, operating system and applications deployment and updates, and management plans and security control of these systems and environments.

With an operating system and application virtualization, power of servers becomes less important, but requires bandwidth of importance for the transport applications, and new competencies to manage an infrastructure that can quickly become complex.

4. The "Green IT"

Computing and information technology can be used for "green" initiatives. Possible initiatives in these areas include the dematerialization of all types of documents, reducing business travel and partial implementation of telework.

The computer can also provide analytical tools to reduce energy consumption in activities sources of CO2 emissions as the transport of goods.

Two specific uses could be distinguished :

On one hand, using information technology to reduce the ecological footprint of companies with video conferencing instead of business travel for example.

On the other hand, using software to analyze and reduce energy consumption in areas of particular pollutants, such as road transport.

5. Reshaping Data Center

The reduction of operating expenses frees up financial resources that could be used for other projects, in IT investments or even in other business activities.

Virtualization, security, growth in volumes handled, these changes require rethinking of the data centers as they existed before. Major trends in this area are energy availability of research ever more important, redundant, and coupled with cooling systems ever more efficient.

Consequently, we observe the construction of very large data centers by IT providers.

6. Social networks

Employees do not want to manage two different environments: one for their personal activities and another for their work.

In business too, social networks should increase, and especially in a collaborative approach between employees and with external partners.

The management of social networks is therefore a real challenge for IT managers. One of his main tasks is to ensure the integrity of critical datas of the company, and their failure to communicate externally.

7. Security and monitoring activities.

Business sector in growth, computer security is also in transition. Experts in information security are challenged to detect malicious activity in a steady stream of discrete events usually associated with an authorized user and come from multiple sources in terms of network, systems and applications.

A wide range of monitoring tools and analysis (redundant in terms of features) helps companies to better detect and investigate suspicious activity - often with real-time alerts.

Traditional firewall, which filters data logically, could not be enough to prevent companies contamination. There will be identification systems that will go to expand, in order to filter information flow ever more important.

Monitoring and analysis are therefore the two engines of the future security, with a particular focus on real time.

8. Flash Memory

Flash memory is not new, but it is evolving in different levels of storage systems. Flash memory is much faster than traditional magnetic disk, but much more expensive, although the differential is reduced gradually. 

With this price reduction, this technology is expected to see annual growth rate exceeding 100% in the coming years and become strategic in many IT sectors. In addition, it provides an additional level of hierarchy in storage for servers and client stations 

However, the benefits of flash memory (low volume, low heat dissipation, performance and reliability) designate this new generation of memory as a successor must multiple trays.

9. Virtualization for availability

Virtualization can facilitate operations of application migration. The process of "live migration" can move a virtual machine from one physical node to another in a very short time (less than a TCP timeout), which allows the process to be completely transparent to applications.

Until now, application migrations caused service interruptions due to the cessation of physical machines. Now, the migration of virtual machines or "hot application migration" without interruption of service could radically change the definition of the availability of IS. It will allow to remove the need to use equipment with high reliability and safety of fried and software failover, while ensuring the needs of increasing system availability.

10. Mobile applications

At the end of 2010, 1.2 billion people will own smartphones. Among other features, you can download and install specific applications on these phones. 

Free or not, public or professional, these applications represent significant sources of revenue for operators, handset manufacturers and developers.

It will take more time to see applications and other solutions that can be implemented on PCs and smartphones. Greater consistency in operating systems and processors will accelerate the development and availability of applications for mobile phones.





An economic vision for the future of NITC

Several basic trends contribute to the dynamism of international investment flows in this area:


1. Rapid market growth due to the constant appartition new products and applications

2. Phenomenon of technological convergence accompanied by constant restructuring of the sector

3. The need for companies to acquire a global dimension to fund and absorb the efforts in R & D field of choice for investors

 

The growth drivers emerging from crisis are numerous and will help open a new phase of expansion:

  • generalization of the virtual world,
  • embedded applications (M2M)
  • Eco-responsibility
  • acceleration equipment SMEs
  • impact of collaborative social networks,
  • alignment techniques to use public and professional ...






What is coming up in NITC


  • Further development of mobile technologies and wireless services, offering the possibility of continuous connectivity through the Internet and the continued Convergence Technology:
  1. Mobile phone / Internet 
  2. Internet Broadcasting
  3. Internet / phone, etc. ...
  • To fight against the spread of malware and other threats Securityinformation systems, solutions for the defense of supportive infrastructure as well as providing betterinteroperability, Storage management and data reconciliation and improvement of expert systems and automation
  • Growth in the number of devices radio frequency identification ( RFID ) And other sensor technologies that have the potential to significantly improve thea geolocation goods, people and animals, with further improvement in the capacity of speech recognition or Forms
  • Strengthening of applications, including functional-oriented SMEs and domestic applications-oriented games. What is involved in the evolution and mutation to distribution model SaaS (Software as a Service) solutions and application hosting
HOMESERVICES ABOUT USPARTNERSCONTACT US