strategic technologies for 2010
technology is defined by Gartner as having a significant
impact on the activity and development of a company within 3 years.
They are strategic because they are now sufficiently mature for
implementation and broad adoption or because their early use may
provide competitive advantage.
computer model in which providers offer a range of services to
businesses or individuals is primarily an architectural
model out that provides access to the service "on demand" mode
"self-service, and with cost control to use (model pay-as-you-go
is built on an extensive and flexible network that should allows to
abstract the location of resources and puts the Internet in the heart
of business activity. It allows the use of remote hardware resources
(servers) to create online services. Companies no longer
need to set up their own network infrastructure and server, but they
can leave their service providers offer turnkey capabilities. From
there, they may develop solutions type SaaS
(Softwareas a Service ) manageable from a web
interface accessible from any terminal connected
to the Internet.
The advanced analytical technologies
optimization and simulation use tools and analytical models to
maximize the efficiency of business processes and decisions by
examining the results and alternative scenarios before, during and
after the implementation and execution of these processes.
in the tools available for decision makers, analytical
technologies should make
their arrival into the world of business processes.
Modeling from various applications such as CRM and ERP are now
possible. The Business Intelligence (Business Intelligence) on the
business processes are now possible, and should be an engine of growth
for years to come.
brings new ways to implement applications on the client. Consequently,
the choice of the type of PC hardware and even operating system becomes
Evolution of the client including
standards, the type of ownership and support, operating system and
applications deployment and updates, and management plans and security
control of these systems and environments.
With an operating
system and application
virtualization, power of servers becomes less important, but requires bandwidth
of importance for the transport applications, and new competencies to
manage an infrastructure that can quickly become complex.
4. The "Green IT"
and information technology can be used for "green" initiatives.
Possible initiatives in these areas include the dematerialization of
all types of documents, reducing business travel and partial
implementation of telework.
can also provide analytical tools to reduce energy
consumption in activities sources of CO2 emissions as the transport of
uses could be distinguished :
On one hand, using information
technology to reduce the
ecological footprint of companies with video conferencing instead of
business travel for example.
other hand, using software to analyze and reduce energy
consumption in areas of particular pollutants, such as road transport.
Reshaping Data Center
reduction of operating expenses frees up financial resources
that could be used for other projects, in IT investments or even
in other business activities.
Virtualization, security, growth in
volumes handled, these changes
require rethinking of the data centers as they existed before. Major
trends in this area are energy availability of research
ever more important, redundant, and coupled with cooling systems ever
Consequently, we observe the
construction of very large data centers by IT providers.
do not want to manage two different environments: one for their
personal activities and another for their work.
In business too, social networks
should increase, and especially in a collaborative approach between
employees and with external
management of social networks is therefore a real challenge for IT
of his main tasks is to ensure the integrity of critical datas of the
company, and their failure to communicate externally.
Security and monitoring activities.
Business sector in growth, computer
security is also in transition. Experts in information security are
challenged to detect malicious
activity in a steady stream of discrete events usually associated with
an authorized user and come from multiple sources in terms of network,
systems and applications.
wide range of monitoring tools and analysis (redundant in terms of
features) helps companies to better detect and investigate suspicious
activity - often with real-time alerts.
firewall, which filters data logically, could not be enough to
prevent companies contamination. There will be identification systems
that will go to expand, in order to filter information flow ever more
and analysis are therefore the two engines of the future security, with
a particular focus on real time.
memory is not new, but it is evolving in different levels of storage
systems. Flash memory is much faster than traditional magnetic disk,
but much more expensive, although the differential is reduced
With this price reduction, this
technology is expected to
see annual growth rate exceeding 100% in the coming years and become
strategic in many IT sectors. In addition, it provides an additional
level of hierarchy in storage for servers and client stations
the benefits of flash memory (low volume, low heat
dissipation, performance and reliability) designate this new generation
of memory as a successor must multiple trays.
Virtualization for availability
can facilitate operations of application migration. The process of
"live migration" can move a virtual machine from one physical node to
another in a very short time (less than a TCP timeout), which allows
the process to be completely transparent to applications.
now, application migrations caused service interruptions due to the
cessation of physical machines. Now, the migration of virtual machines
"hot application migration" without
interruption of service could radically change the definition of the
availability of IS. It will allow to remove the need to use equipment
reliability and safety of fried and software failover,
while ensuring the needs of increasing system availability.
the end of 2010, 1.2 billion people will own smartphones.
Among other features, you can download and
install specific applications on these phones.
Free or not, public or
these applications represent significant sources of revenue for
operators, handset manufacturers and developers.
will take more time to see applications and other solutions
that can be
implemented on PCs and smartphones. Greater consistency in operating
systems and processors will accelerate the development and
availability of applications for mobile phones.
economic vision for the future of NITC
basic trends contribute
to the dynamism of international investment flows in this area:
1. Rapid market growth due to
the constant appartition new products and applications
2. Phenomenon of
technological convergence accompanied by constant
restructuring of the sector
3. The need for
companies to acquire a global dimension to fund and
absorb the efforts in R & D field of choice for
The growth drivers emerging from
crisis are numerous and will help open a new phase of expansion:
of the virtual world,
- acceleration equipment SMEs
- impact of collaborative social
techniques to use public and professional ...
What is coming up in
- Further development of
mobile technologies and
wireless services, offering the possibility of continuous connectivity
through the Internet and the continued Convergence
- Mobile phone / Internet
- Internet Broadcasting
- Internet / phone, etc. ...
- To fight against
the spread of malware and other
threats Securityinformation systems,
solutions for the defense of supportive infrastructure as well as
Storage management and data reconciliation and improvement of expert
systems and automation
- Growth in the
number of devices radio frequency
identification ( RFID ) And other sensor
technologies that have the potential to significantly improve thea geolocation goods,
people and animals, with further improvement in the capacity of speech
recognition or Forms