The Cloud Goes Mainstream
The Cloud will move from an overhyped theory to an adopted practice in mainstream business.
Private, public or hybrid clouds, when applied to the right business need, will be game-changing in some industries.
Microsoft, Google and FireFox are developing hardware accelerated browsers this year, which will make browsing feel even faster. The beta version of IE 9 is the first such browser that is currently available to take advantage of such hardware acceleration.
By 2012, 20% of businesses will not own any core IT infrastructure. Why?
Ray Ozzie, former CSA for Microsoft (he took over for Bill Gates a few years ago) has much to say in his departing memo to Microsoft employees, which he later posted to his blog: http://ozzie.net/docs/dawn-of-a-new-day/
How do you prepare for The Cloud?
Mobile Devices Begin World Domination
Mobile moves aggressively into the data and applications arena as enterprises leverage these devices to empower the workforce, speed decision making and grow top-line revenue. In 2011, Enterprises will begin wide spread adoption the BYOD model (Bring your own device).
By 2013, mobile phones will overtake PC's as the most common Web access device worldwide.
By 2014, over 3 billion of the world's adult population will be able to transact electronically via mobile or Internet technology.
Analysts at Goldman Sachs say Tablets will replace 1 in 3 PCs. Microsoft and Intel stand to take the biggest hit as consumers embrace slates powered by alternative software and hardware.
Gartner predicts that Android (Google) will overtake iPhone's market share by year end, and, match or beat Symbian (Nokia) market share by 2014. Gartner expects 500 million smartphones to be sold in 2014 (remember this stat, it will come back to haunt you later). Andy Rubin, a Google Exec, recently tweeted that 300,000 Android phones are now being activated daily.
Microsoft & Nokia are rumored to be forming a strategic alliance which may shake things up.
Other Mobile Devices Predictions for 2011
How do you prepare for the oncoming revolution in mobile devices?
IT Security Concerns Sky Rocket
Security breaches will hit an all-time high as data keeps getting pushed beyond the enterprise walls (i.e. to the cloud). A new frontier in politically motivated cyber-attacks will occur. By 2015, Gartner predicts, a G20 nation's critical infrastructure will be disrupted and damaged by online sabotage.
Surprisingly, Regulatory compliance, not data breaches, will drive adoption of encryption technologies.
Regarding political concerns about security: Simply look at all of the recent drama surrounding Wikileak. Hacktivists have shut down VISA, MC & PayPal in defense of WikiLeaks.
Riots, demonstrations and revolts will be increasingly done online.
Also, NASDAQ just confirmed that their servers were breached this week. Malware may have been targeting insider information from 10,000 senior executives who use the compromised Directors Desk app.
Hacking is becoming industrialized, making more criminals more effective and less expensive. Enter the rise of cyber-mercenaries, who provide rental bot nets to criminal organizations and even governments. China used such botnets against the US at leasttwice last year.
Your weakest IT security points this year:
How do you protect your business from IT threats this year?
Social Media is The Future
Social media will keep dominating the business conversation, following the same evolution e-commerce did as it became e-business. Soon we'll just call it "social business."
Social Media will also continue to usher in an era of unprecedented transparency, so be on your best behavior unless you want to end up on Wikileaks or a similar web site.
Recommendations for Leveraging Social Media
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more