SlideShare a Scribd company logo
1 of 39
Download to read offline
Cloudy Forecasts and Other
Trends in Information
Technology


Alan McSweeney
Objectives

•   To discuss the trend towards cloud computing in the
    context of current and past trends and forecasts in
    Information Technology




    March 15, 2010                                        2
Agenda

•   Cloud Computing
•   IT Trends
•   Cloud Adoption




    March 15, 2010    3
Tired of Presentations from Vendors With Pictures
of Clouds?




 March 15, 2010                                     4
Cloud Computing as a Trend in Information
Technology
•   What are the sources of information technology trends
      − Surveys by trade bodies of members
      − Surveys by journals and publications
      − Statements by analysts
      − Statements by vendors
•   Which are real trends and which represent wishful/fanciful
    thinking or biased?
•   Which trends are relevant to your organisation, based on
    operating area, geography, size, state of adoption and use
    of IT?
•   What happened to previous trends?
    March 15, 2010                                               5
Cloud Definition

•   The use of a collection of services, applications,
    information and associated infrastructure consisting of
    pools of computing, networking and storage resources
•   Components can be rapidly provisioned, implemented and
    decommissioned and scaled up or down providing for an
    on-demand utility-like model of allocation and
    consumption




    March 15, 2010                                            6
What Use Are Trends?

•   To the business - what is likely to be able to generate
    revenue through additional sales, access to new markets
    or channels or save money

•   To the IT function within an organisation – what new
    technologies can help in managing IT like a business and
    delivering value

•   To suppliers of IT services - what customers will buy,
    where I should focus my sales effort, how I should
    restructure my products/services to be relevant, how I
    should invest in R&D
    March 15, 2010                                             7
Business and IT Concerns Regarding Information
Technology
                                                                 Information
                             Business                            Technology
                                                                       Efficiency

                    Business Processes Delivered by IT    Business Alignment, Management
                                Systems                              and Control

         Internal                 Cost                         Cost, Budgeting, Planning

          Focus        Continuity and Availability       Reliability, Continuity and Availability

                                Training                               Personnel

                                                                        Training

                                                                  Technology Changes
                              Competition
                                                                 Vendors and Suppliers
         External              Regulation
                                                         What Partners and Competitors Are
          Focus        Governance and Standards                        Doing

                            Business Partners                 Technical Platforms of New
                                                                     Applications


 March 15, 2010                                                                                     8
Relevance of Trends in Information Technology to
Business and IT                  Information
                             Business                             Technology

                                                          Will it Reduce IT Management Costs?

                           Will it Save Money?                 Will it Improve IT Service
         Internal                                                    Management?
                         Will it Generate Money?
          Focus                                               Will it Enable IT to be More
                                                                       Responsive?




         External   Will Adoption of Trends Assist With
                                                           Will Existing Systems Be Rendered
                       Competition, Regulation and
          Focus                Governance?
                                                              Obsolete and Unsupported?




 March 15, 2010                                                                                 9
How Much of Trend Adoption Is Driven By?
                                     Information
                    Business         Technology
                                    Everybody Else Is Doing It

                               I Want To Do It So It Appears On My
                                             Resume

                                     I Like New Technology
         Internal
                                 Vendors Keep Talking About It
          Focus
                               I Need One Good Idea To Stamp My
                                    Mark On The Organisation

                                  It Will Solve All My Problems




         External
          Focus



 March 15, 2010                                                      10
Layered View of IT Infrastructure
                         Operations, Usage,
         Layer 8+       Management, Control,
                            Governance                  What the Business
          Layer 7
                       Applications, Systems and        is Concerned With
                          Business Processes

          Layer 6   Data Presentation, Data Security


          Layer 5           Communication


          Layer 4             Connection                 What IT is
                                                       Concerned With
          Layer 3        Network Transmission


          Layer 2   Storage and Network Addressing

                      Storage Media and Network
          Layer 1
                               Signals

 March 15, 2010                                                             11
Information Technology Concerns

•   IT should concern itself with trends that
      − Assist and improve its internal operations
      − Improve the systems and service IT delivers to the business




    March 15, 2010                                                    12
Cloud Manifestations

Cloud Computing A business model for delivering IT as a service,
                referred to as IT as a service (ITaaS)
Types of Cloud     Private Cloud - behind firewall serving applications
                   in their company
                   Public Cloud – shared infrastructure, accessible to
                   general customers with multiple tenants
Manifestations of IaaS - Infrastructure as a service
Cloud Computing PaaS - Platform as a service

                   SaaS - Software as a service
                   STaaS - Storage as a service
                   BRaaS - Backup and recovery as a service
                   EaaS - Everything as a Service
  March 15, 2010                                                          13
Cloud Manifestations

•   Is it all just a pain in the …aaS




    March 15, 2010                      14
What are the Issues Cloud Computing is Trying to
Fix?
•   Up to 85% of computing capacity is unused


•   54% growth in storage capacity every year


•   70% of IT budget on average is spent on maintaining
    current IT infrastructures rather than adding new
    capabilities


•   How will cloud computing fix these issues?

    March 15, 2010                                        15
Migration to Cloud
                       Traditional
                                             (Partially)         Private               Public
                      Application-
                                             Virtualised       (Internal)             (Shared)
                         Based
                                           Infrastructure        Cloud                  Cloud
                     Infrastructure

Applications

     Servers

   Network

    Storage




                                       Relatively Minor and
                                                                            A Major Change
                                      Incremental Evolutions
    March 15, 2010                                                                               16
Migration to Cloud

•   Virtualisation technology enables a shared and a type of
    service-oriented infrastructure
•   Creates a pool of computing, storage and network
    resources that can be shared between applications
•   Private cloud implementations are effectively more
    packaged versions of virtualisation technology created by
    vendors with additional management tools




    March 15, 2010                                              17
Cloud Features and Potential Benefits

•   Features                                 •   Benefits

•   Virtualised and standardised             •   Potential for simplified and more
    infrastructure                               efficient IT and application
                                                 management

•   Highly scalable (depending on the
    application                              •   Deliver more applications to large
                                                 number of users

•   Fault tolerant and highly reliable and
    available                                •   increased utilisation at reduced cost


•   Fast application deployment              •   Faster reaction to business
                                                 requirements

    March 15, 2010                                                                       18
Analysis of Some Information Technology Trends

•   AICPA – Survey of members from 2001 to 2009 (2010 not
    published) on initiatives in IT that are of concern to their
    members
•   Gartner – well known analyst company
•   Two very different views of information technology trends




    March 15, 2010                                                 19
Gartner – Key IT Trends 2008 - 2010

          2010                              2009                         2008
1         Cloud Computing                   Virtualisation               Green IT

2         Advanced Analytics                Cloud Computing              Unified Communications

3         Client Computing                  Servers - Beyond Blades      Business Process Modelling

4         IT for Green                      Web-Oriented Architectures   Metadata Management

5         Reshaping the Data Centre         Enterprise Mashups           Virtualisation 2.0

6         Social Computing                  Specialised Systems          Mashup and Composite
                                                                         Applications
7         Security – Activity Monitoring    Social Software and Social   Web Platform and Web-
                                            Networking                   Oriented Architectures
8         Flash Memory                      Unified Communications       Computing Fabric

9         Virtualisation for Availability   Business Intelligence        Real World Web

10        Mobile Applications               Green IT                     Social Software

    March 15, 2010                                                                                    20
Gartner – Key IT Trends 2008 - 2010

•   How relevant are these trends to you and your
    organisation?




    March 15, 2010                                  21
AICPA Top 15 IT Initiatives 2001-2009
     2009                    2008                   2007                   2006                    2005                    2004                    2003                   2002                     2001
     Information Security    Information Security   Information Security   Information Security    Information Security    Information Security    Information Security   Business And Financial   Information Security
1    Management              Management             Management                                                                                                            Reporting                And Controls
                                                                                                                                                                          Applications
     Privacy Management      IT Governance          Identity And Access    Assurance And         Electronic Document       Spam Technology         Business Information   Training And             E-Business
2                                                   Management             Compliance            Management                                        Management             Technology
                                                                           Applications                                                                                   Competency
     Secure Data File      Business Continuity      Conforming To          Disaster And Business Data Integration          Digital Optimisation    Application            Information Security     Electronically-based
3    Storage, Transmission Management And           Assurance And          Continuity Planning                                                     Integration            and Controls             Business and Financial
     And Exchange          Disaster Recovery        Compliance Standards                                                                                                                           Reporting
                           Planning
     Business Process      Privacy Management       Privacy Management     IT Governance           Spam Technology         Database and            Web Services           Quality of Service       Privacy
4    Improvement, Work                                                                                                     Application
     Flow and Process                                                                                                      Integration
     Exception Alerts
     Mobile and Remote     Business Process         Disaster Recovery      Privacy Management      Disaster Recovery       Wireless Technologies Disaster Recovery       Disaster Recovery         Training and
5    Computing             Improvement,             Planning and                                                                                                         Planning and Business     Technology
                           Workflow and Process     Business Continuity                                                                                                  Continuity                competency
                           Exception Alerts         Management                                                                                                           Management
     Training and          Identity and Access      IT Governance          Digital Identity and    Collaboration and     Disaster Recovery         Wireless Technologies Communication             Disaster Recovery
6    Competency            Management                                      Authentication          Messaging                                                             Technologies
                                                                           Technologies            Technologies                                                          Bandwidth
     Identity and Access     Conforming to         Securing and            Wireless Technologies   Wireless Technologies Data Mining               Intrusion Detection   Remote Connectivity       Qualified IT Personnel
7    Management              Assurance and         Controlling                                                                                                           Tools
                             Compliance Standards Information
                                                   Distribution
     Improved Application    Business Intelligence Mobile and Remote       Application and Data    Authentication          Virtual Office          Intrusion Detection   Web-Based and Web- Quality of Service
8    and Data Integration                          Computing               Integration             Technologies                                                          Enabled Applications
     Document, Forms,        Mobile and Remote     Electronic Archiving    Paperless Digital       Storage Technologies    Business Exchange       Customer Relationship Qualified IT personnel Electronic Audit
9    Content and             Computing             and Data Retention      Technologies                                    Technology              Management                                   Trail
     Knowledge
     Management
     Electronic Data         Document, Forms,       Document, Content      Spyware Detection       Learning and Training   Messaging               Privacy                Messaging                Application Service
10   Retention Strategy      Content and            and Knowledge          and Removal             Competency              Applications                                   Applications (e-mail,    Provider
                             Knowledge              Management                                                                                                            faxing, voicemail,
                             Management                                                                                                                                   instant messaging)
     Business Continuity     Customer               Training and           E-mail Filtering        RFID (Radio             ID/Authentication       ID/Authentication
11   Management and          Relationship           Awareness              including Spam and      Frequency
     Disaster Recovery       Management (CRM)                              Malware scanning        Identification)
     Planning
     Conforming to           Improved Application   Business Process     Outsourcing               Search                  Radio Frequency         M-Commerce
12   Assurance and           and Data Integration   Improvement,                                                           Identification (RFID)
     Compliance                                     Workflow and Process
     Standards                                      Exception Alerts
     Collaboration –         Training and           Improved Application Storage and Backup        Fuel Cells              3G Wireless             Tablet PC
13   Information Portals     Competency             and Data Integration Technologies#
     Business Intelligence   Web-deployed           Web Deployed           Patch and Network       Digital Home            Simple Object Access    3G Wireless
14                           Applications           Applications           Management Tools                                Protocol (SOAP)
     Customer                Information Portals    Enterprise System      Technology              Display Technology#     Autonomic Computers
15   Relationship                                   Management             Competency and
     Management                                                            Effective Utilisation

     March 15, 2010                                                                                                                                                                                                    22
AICPA Top 10 IT Initiatives 2004-2009
         2009                    2008                    2007                   2006                     2005                    2004
1        Information Security    Information Security    Information Security   Information Security     Information Security    Information Security
         Management              Management              Management

2        Privacy Management      IT Governance           Identity And Access    Assurance And            Electronic Document     Spam Technology
                                                         Management             Compliance               Management
                                                                                Applications
3        Secure Data File        Business Continuity     Conforming To          Disaster And Business    Data Integration        Digital Optimisation
         Storage, Transmission   Management And          Assurance And          Continuity Planning
         And Exchange            Disaster Recovery       Compliance Standards
                                 Planning
4        Business Process        Privacy Management      Privacy Management     IT Governance            Spam Technology         Database and
         Improvement, Work                                                                                                       Application Integration
         Flow and Process
         Exception Alerts
5        Mobile and Remote       Business Process        Disaster Recovery       Privacy Management      Disaster Recovery       Wireless Technologies
         Computing               Improvement,            Planning and Business
                                 Workflow and Process    Continuity
                                 Exception Alerts        Management
6        Training and            Identity and Access     IT Governance           Digital Identity and    Collaboration and       Disaster Recovery
         Competency              Management                                      Authentication          Messaging
                                                                                 Technologies            Technologies
7        Identity and Access     Conforming to           Securing and            Wireless Technologies   Wireless Technologies   Data Mining
         Management              Assurance and           Controlling Information
                                 Compliance Standards    Distribution
8        Improved Application    Business Intelligence   Mobile and Remote       Application and Data    Authentication          Virtual Office
         and Data Integration                            Computing               Integration             Technologies
9        Document, Forms,        Mobile and Remote       Electronic Archiving    Paperless Digital       Storage Technologies    Business Exchange
         Content and             Computing               and Data Retention      Technologies                                    Technology
         Knowledge
         Management
10       Electronic Data         Document, Forms,        Document, Content      Spyware Detection and Learning and Training      Messaging Applications
         Retention Strategy      Content and             and Knowledge          Removal               Competency
                                 Knowledge               Management
                                 Management
     March 15, 2010                                                                                                                                        23
Security, Privacy, Governance, Disaster Recovery
     2009                  2008               2007                2006                2005                2004                2003                  2002                  2001
     Information           Information         Information         Information         Information        Information         Information                                 Information
1    Security              Security            Security            Security            Security           Security            Security                                    Security And
     Management            Management          Management                                                                                                                 Controls
     Privacy               IT Governance       Identity And Access
2    Management                                Management
                           Business Continuity                     Disaster And                                                                     Information
3                          Management And                          Business Continuity                                                              Security and
                           Disaster Recovery                       Planning                                                                         Controls
                           Planning

                           Privacy            Privacy             IT Governance                                                                                           Privacy
4                          Management         Management
                                             Disaster Recovery Privacy                Disaster Recovery                       Disaster Recovery     Disaster Recovery
5                                            Planning and        Management                                                                         Planning and
                                             Business Continuity                                                                                    Business Continuity
                                             Management                                                                                             Management
                         Identity and Access IT Governance       Digital Identity and                     Disaster Recovery                                               Disaster Recovery
6                        Management                              Authentication
                                                                 Technologies
     Identity and Access Conforming to       Securing and                                                                     Intrusion Detection
7    Management          Assurance and       Controlling
                         Compliance          Information
                         Standards           Distribution
                                                                                      Authentication                          Intrusion Detection
8                                                                                     Technologies
                                                                                                                                                                          Electronic Audit
9                                                                                                                                                                         Trail
                                                                  Spyware Detection
10                                                                and Removal
     Business Continuity                                                                                  ID/Authentication   ID/Authentication
11   Management and
     Disaster Recovery
     Planning
     Conforming to
12   Assurance and
     Compliance
     Standards
13
14
15
     March 15, 2010                                                                                                                                                                          24
Data, Information and Document Management/
    Integration and Analysis and Related Initiatives
     2009                 2008               2007                 2006                   2005               2004                2003           2002   2001
1
                                                                                         Electronic                              Business
2                                                                                        Document                                Information
                                                                                         Management                              Management
     Secure Data File                                                                    Data Integration   Digital Optimisation Application
3    Storage,                                                                                                                    Integration
     Transmission And
     Exchange
                                                                                                            Database and
4                                                                                                           Application
                                                                                                            Integration
5
                                                                  Digital Identity and
6                                                                 Authentication
                                                                  Technologies
                                                                                                            Data Mining
7
     Improved             Business                                Application and
8    Application and      Intelligence                            Data Integration
     Data Integration
     Document, Forms,                        Electronic Archiving Paperless Digital      Storage            Business Exchange
9    Content and                             and Data Retention Technologies             Technologies       Technology
     Knowledge
     Management
     Electronic Data      Document, Forms,   Document, Content
10   Retention Strategy   Content and        and Knowledge
                          Knowledge          Management
                          Management
11
                          Improved
12                        Application and
                          Data Integration
                                             Improved             Storage and Backup
13                                           Application and      Technologies#
                                             Data Integration
     Business
14   Intelligence
15
     March 15, 2010                                                                                                                                          25
AICPA Top 15 IT Initiatives 2001-2009

•   Notice any differences?
•   Business-oriented focus of IT initiatives
•   Not concerned with IT plumbing and infrastructure (such
    as cloud) but on business concerns - running the business -
    and business-related IT concerns – potential impact of IT
    systems on the wider business
•   Security, privacy, disaster recovery/business continuity
    and governance concerns dominate
•   How will cloud computing assist in delivering these
    initiatives?

    March 15, 2010                                                26
It’s Easy to Sneer at Past Predictions But …

•   Gartner Highlights Key Predictions for IT Organisations in 2007 and
    Beyond
      − Vista will be the last major release of Microsoft Windows. The next generation
        of operating environments will be more modular and will be updated
        incrementally. The era of monolithic deployments of software releases is
        nearing an end. Microsoft will be a visible player in this movement, and the
        result will be more-flexible updates to Windows and a new focus on quality
        overall.
      − Blogging and community contributors will peak in the first half of 2007. Given
        the trend in the average life span of a blogger and the current growth rate of
        blogs, there are already more than 200 million ex-bloggers. Consequently, the
        peak number of bloggers will be around 100 million at some point in the first
        half of 2007.
      − By 2010, 60% of the worldwide cellular population will be "trackable" via an
        emerging "follow-me Internet." Local regulations have arisen to protect users'
        privacy, but growing demands for national safety and civil protection are
        relaxing some of the initial privacy limitations. Marketing incentives will also
        push users to forgo privacy concerns, and many other scenarios will enable
        outsiders to track their users.
    March 15, 2010                                                                         27
Private Cloud Computing

•   Cloud computing is largely an IT-focussed initiative that
    potentially allows IT manage systems and applications
    infrastructure more effectively




    March 15, 2010                                              28
Private Cloud

•   Private cloud should consist of
    computing, network and                    Management,
                                                                 Resource Management
    storage hardware packaged               Administration and
                                                Control
    with key management,
    administration and control                                                 Backup
                                          Provisioning
    facilities into self-contained                                              and
                                                                              Recovery
    systems and applications
    infrastructure                        Information
                                           Collection
                                                                              Disaster
                                                                              Recovery
                                              and
•   Not a panacea                           Auditing
      − There is no such thing as an IT     Data Management             Security
        system that does not require
        maintenance and management         Service Management     Application Lifecycle
                                                                     Management
•   Cloud computing is a means to
    an end and not an end in itself
    March 15, 2010                                                                        29
Cloud Processes

•   Possible
    suite of
    service
    management
    processes
    associated
    with
    conversion
    to cloud




    March 15, 2010   30
Public Cloud

•   Potential for fragmentation of applications and associated data as
    specific business applications are run on separate clouds from
    separate suppliers
                      ERP              CRM




                                                                    Application
                                                                      Usage

                                                                       Data
                                                                    Integration
                      Document     Mail and
                     Management    Messaging


    March 15, 2010                                                           31
Public Cloud

•   Offers the potential for the business to bypass the IT
    function and buy the application from the cloud vendor,
    leading to a proliferation of disparate platforms and
    systems
•   Public cloud needs to be viewed as a form of outsourcing
    and needs to be implemented with the same care
•   Look to learn from the lessons from problems with
    outsourcing
•   Vendors will target business rather than IT staff and IT will
    be landed with implementation, maintenance and support

    March 15, 2010                                                  32
Cloud and The Business

•   IT needs to be aware and beware of:
      − If IT cannot help us, who else can?




    March 15, 2010                            33
Disconnect Between What the Business Wants and
What IT Delivers

              What the Business Wants                              What the Business Gets

                              15%                                               5%

                  35%                                                  25%



                                                                                           70%
                               50%

Maintain The Momentum Of The Business Through            Maintain The Momentum Of The Business Through
Existing Business Systems                                Existing Business Systems
Contribute To Improving Business Results                 Contribute To Improving Business Results

Provide It Direction And Management That Is Aligned To   Provide It Direction And Management That Is Aligned To
The Needs Of The Business                                The Needs Of The Business




 March 15, 2010                                                                                                   34
IT Value Management is a Key Topic for IT
                 Do Not Measure Business Value From IT
                                                                                       40%
                             Investments

         Metrics Do Not Adequately Capture Business
                                                                                           45%
                           Value


                      Executives Skeptical Of ROI From IT                                        52%



                         Find It Difficult To Calculate ROI                                             62%


                     CEO/CFO Demanding Better Ways To
                                                                                                              71%
                            Demonstrate Value

                                                              0%   10%   20%   30%   40%   50%    60%    70%   80%   90% 100%

•   Results of managing IT for business value
      − Budget flexibility coupled with strategic IT alignment leads to 50% greater IT
        payoffs
      − Improving management practices alongside IT investment drives 20% higher IT
        yields
    March 15, 2010                                                                                                              35
Lessons Learned from Outsourcing Problems

•   Smoothly Transferring Services And Resources
      − Common cause of failure is the ineffective management of the transfer of services and
        resources to the service provider, leading to service delivery problems
      − Successful service providers rigorously control the transfer of services and resources to
        ensure that the new service is able to adequately deliver the service and the service
        continuity is maintained.
•   Maintaining Stakeholder Expectations
      − Common source of failure in sourcing engagements is a difference in expectations
        between the client, the service provider, and the suppliers and partners
      − Identifying and managing those expectations helps to ensure a common understanding
        of what is necessary for success
•   Translating Implicit And Explicit Needs Into Defined Requirements With Agreed
    Upon Levels Of Quality
      − Frequent cause of failure in sourcing is that the service provider does not fully
        understand the needs of the client
      − Successful service providers rigorously gather and analyse the stated and unstated
        needs, then translate those needs into a set of documented requirements
      − Successful service providers also recognise that needs change over time and establish
        provisions for gathering and analysing modifications to their services
    March 15, 2010                                                                                  36
Lessons Learned from Outsourcing Problems

•   Reviewing Service Design And Deployment To Ensure An Adequate
    Coverage Of The Client’s Requirements
      − Failure in sourcing is caused by the service provider not fully addressing the
        needs of the client
      − To ensure that the service delivery will meet the client’s needs successful
        engagements include rigorous reviews of the service design and deployment
        activities by the clients and the service provider prior to service delivery
•   Managing Client’s Security
      − Managing security and controlling critical data and assets are critical to
        establishing trust
      − Security management includes protection of intellectual property,
        confidentiality, and privacy concerns
•   Monitoring And Controlling Activities To Consistently Meet The
    Service Delivery Commitments
      − Successful service providers rigorously monitor their service delivery activities
        to ensure that the client’s commitments are being met
      − Actions are taken to resolve and prevent problems, thereby escalating issues
        as appropriate to ensure that they are addressed in a timely basis

    March 15, 2010                                                                          37
Lessons Learned from Outsourcing Problems

•   Monitoring And Managing Client’s And End User’s Satisfaction
      − Success is not always defined in terms of meeting the agreed upon commitments,
        because clients and end users may be unsatisfied even when commitments are being
        met
      − Successful sourcing engagements monitor the satisfaction levels of the stakeholders to
        identify problems and take action
•   Managing Employee Satisfaction, Motivation, And Retention
      − IT-enabled sourcing often involves challenges during transition, deployment, and
        service delivery
      − High employee turnover jeopardises the service provider’s ability to meet its client’s
        requirements and undermines their expected gains and performance levels
      − Proactively monitoring and managing employee satisfaction and motivation can
        improve personnel retention and effectiveness
•   Managing Technological Shifts And Maintaining The Availability, Reliability,
    Accessibility, And Security Of Technology
      − Technology is a key component of outsourcing
      − Major challenges for the service provider include keeping pace with rapid changes in
        technology and effectively managing the technology infrastructure while changes are
        incorporated
    March 15, 2010                                                                               38
Summary

•   Trends come from many sources: analysts, industry bodies, vendors,
    surveys, publications and some of these may be tendentious
•   A trend needs to be validated against your geography, operating
    area, organisation size and technology maturity
•   Adopting a trend is not an automatic guarantee of benefits - there
    are rarely easy answers - you have to work at it
•   There is still a need for architecture, analysis, design, validation to
    ensure that you will derive the greatest benefits from adopting new
    technologies/systems/applications
•   Private cloud can offer flexibility
•   Public cloud is a form of outsourcing and needs to be managed as
    such
•   There is no such thing as an IT system that does not require
    maintenance and management

    March 15, 2010                                                            39

More Related Content

What's hot

Rationalizing an Enterprise IT Architecture
Rationalizing an Enterprise IT ArchitectureRationalizing an Enterprise IT Architecture
Rationalizing an Enterprise IT ArchitectureBob Rhubart
 
Whitepaper Practical Information Technology Governance
Whitepaper   Practical Information Technology GovernanceWhitepaper   Practical Information Technology Governance
Whitepaper Practical Information Technology GovernanceAlan McSweeney
 
IT Strategy & Planning
IT Strategy & PlanningIT Strategy & Planning
IT Strategy & Planningchakraj
 
Executive Overview of IT Strategy and Capability Maturity Framework
Executive Overview of IT Strategy and Capability Maturity FrameworkExecutive Overview of IT Strategy and Capability Maturity Framework
Executive Overview of IT Strategy and Capability Maturity FrameworkVishal Sharma
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapAlan McSweeney
 
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...Alan McSweeney
 
Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureAlan McSweeney
 
White Paper - The Business Case For Business Intelligence
White Paper -  The Business Case For Business IntelligenceWhite Paper -  The Business Case For Business Intelligence
White Paper - The Business Case For Business IntelligenceDavid Walker
 
Creating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyCreating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyAlan McSweeney
 
Define an IT Strategy and Roadmap
Define an IT Strategy and RoadmapDefine an IT Strategy and Roadmap
Define an IT Strategy and RoadmapAndrew Byers
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy DevelopmentAlan McSweeney
 
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningDigital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningCognizant
 
Create an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsCreate an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsMauricio 'MJ' Jimenez
 
Information management and enterprise architecture
Information management and enterprise architectureInformation management and enterprise architecture
Information management and enterprise architecturenvvrajesh
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
 
Enterprise Architecture J.P Morgan Chase
Enterprise Architecture J.P Morgan ChaseEnterprise Architecture J.P Morgan Chase
Enterprise Architecture J.P Morgan ChaseHampus Ahlqvist
 
Utf8''it organizational planning report
Utf8''it organizational planning reportUtf8''it organizational planning report
Utf8''it organizational planning reportAbuallia
 
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Alan McSweeney
 

What's hot (20)

Rationalizing an Enterprise IT Architecture
Rationalizing an Enterprise IT ArchitectureRationalizing an Enterprise IT Architecture
Rationalizing an Enterprise IT Architecture
 
Whitepaper Practical Information Technology Governance
Whitepaper   Practical Information Technology GovernanceWhitepaper   Practical Information Technology Governance
Whitepaper Practical Information Technology Governance
 
IT Strategy & Planning
IT Strategy & PlanningIT Strategy & Planning
IT Strategy & Planning
 
Fqm Brochure
Fqm BrochureFqm Brochure
Fqm Brochure
 
Executive Overview of IT Strategy and Capability Maturity Framework
Executive Overview of IT Strategy and Capability Maturity FrameworkExecutive Overview of IT Strategy and Capability Maturity Framework
Executive Overview of IT Strategy and Capability Maturity Framework
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And Roadmap
 
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
 
Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT Architecture
 
White Paper - The Business Case For Business Intelligence
White Paper -  The Business Case For Business IntelligenceWhite Paper -  The Business Case For Business Intelligence
White Paper - The Business Case For Business Intelligence
 
Creating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyCreating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology Strategy
 
Lean Information Technology Webinar
Lean Information Technology WebinarLean Information Technology Webinar
Lean Information Technology Webinar
 
Define an IT Strategy and Roadmap
Define an IT Strategy and RoadmapDefine an IT Strategy and Roadmap
Define an IT Strategy and Roadmap
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningDigital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
 
Create an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsCreate an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 Steps
 
Information management and enterprise architecture
Information management and enterprise architectureInformation management and enterprise architecture
Information management and enterprise architecture
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
 
Enterprise Architecture J.P Morgan Chase
Enterprise Architecture J.P Morgan ChaseEnterprise Architecture J.P Morgan Chase
Enterprise Architecture J.P Morgan Chase
 
Utf8''it organizational planning report
Utf8''it organizational planning reportUtf8''it organizational planning report
Utf8''it organizational planning report
 
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
 

Viewers also liked

OER: Disruptive Innovation Solution to the Challenges of Education
OER: Disruptive Innovation Solution to the Challenges of EducationOER: Disruptive Innovation Solution to the Challenges of Education
OER: Disruptive Innovation Solution to the Challenges of EducationRamesh C. Sharma
 
From Kafka to MOOCs: Disruptive Innovation in Globalized Rehabilitation Educa...
From Kafka to MOOCs: Disruptive Innovation in Globalized Rehabilitation Educa...From Kafka to MOOCs: Disruptive Innovation in Globalized Rehabilitation Educa...
From Kafka to MOOCs: Disruptive Innovation in Globalized Rehabilitation Educa...Alan Bruce
 
IT Trends - DAV Centenary College Presentation by Deepak Chauhan
IT Trends - DAV Centenary College Presentation by Deepak ChauhanIT Trends - DAV Centenary College Presentation by Deepak Chauhan
IT Trends - DAV Centenary College Presentation by Deepak ChauhanVOCSO Technologies
 
Open Educational Resources: Emerging Scenarios in India
Open Educational Resources: Emerging Scenarios in IndiaOpen Educational Resources: Emerging Scenarios in India
Open Educational Resources: Emerging Scenarios in IndiaRamesh C. Sharma
 
Trends on Information Technology
Trends on Information TechnologyTrends on Information Technology
Trends on Information TechnologyCarlos J. Costa
 
Bpm Implementation Success Criteria And Best Practice
Bpm Implementation   Success Criteria And Best PracticeBpm Implementation   Success Criteria And Best Practice
Bpm Implementation Success Criteria And Best PracticeAlan McSweeney
 
The Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleThe Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleAlan McSweeney
 
Data Warehouse Programme Notes
Data Warehouse Programme NotesData Warehouse Programme Notes
Data Warehouse Programme NotesAlan McSweeney
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Alan McSweeney
 
Notes On Software Development, Platform And Modernisation
Notes On Software Development, Platform And ModernisationNotes On Software Development, Platform And Modernisation
Notes On Software Development, Platform And ModernisationAlan McSweeney
 
Structured Approach To It Business System Availability And Continuity Plannin...
Structured Approach To It Business System Availability And Continuity Plannin...Structured Approach To It Business System Availability And Continuity Plannin...
Structured Approach To It Business System Availability And Continuity Plannin...Alan McSweeney
 
Pmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewPmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewAlan McSweeney
 
Economics of Utility Computing
Economics of Utility ComputingEconomics of Utility Computing
Economics of Utility ComputingAlan McSweeney
 
Notes On Single View Of The Customer
Notes On Single View Of The CustomerNotes On Single View Of The Customer
Notes On Single View Of The CustomerAlan McSweeney
 
Investing Intelligently In The IT Function
Investing Intelligently In The IT FunctionInvesting Intelligently In The IT Function
Investing Intelligently In The IT FunctionAlan McSweeney
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Alan McSweeney
 
Storage Architectures And Options
Storage Architectures And OptionsStorage Architectures And Options
Storage Architectures And OptionsAlan McSweeney
 
Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Alan McSweeney
 
Notes On Managed Service And Outsourcing Implementation And Management
Notes On Managed Service And Outsourcing Implementation And ManagementNotes On Managed Service And Outsourcing Implementation And Management
Notes On Managed Service And Outsourcing Implementation And ManagementAlan McSweeney
 

Viewers also liked (20)

OER: Disruptive Innovation Solution to the Challenges of Education
OER: Disruptive Innovation Solution to the Challenges of EducationOER: Disruptive Innovation Solution to the Challenges of Education
OER: Disruptive Innovation Solution to the Challenges of Education
 
From Kafka to MOOCs: Disruptive Innovation in Globalized Rehabilitation Educa...
From Kafka to MOOCs: Disruptive Innovation in Globalized Rehabilitation Educa...From Kafka to MOOCs: Disruptive Innovation in Globalized Rehabilitation Educa...
From Kafka to MOOCs: Disruptive Innovation in Globalized Rehabilitation Educa...
 
IT Trends - DAV Centenary College Presentation by Deepak Chauhan
IT Trends - DAV Centenary College Presentation by Deepak ChauhanIT Trends - DAV Centenary College Presentation by Deepak Chauhan
IT Trends - DAV Centenary College Presentation by Deepak Chauhan
 
Open Educational Resources: Emerging Scenarios in India
Open Educational Resources: Emerging Scenarios in IndiaOpen Educational Resources: Emerging Scenarios in India
Open Educational Resources: Emerging Scenarios in India
 
Trends on Information Technology
Trends on Information TechnologyTrends on Information Technology
Trends on Information Technology
 
Bpm Implementation Success Criteria And Best Practice
Bpm Implementation   Success Criteria And Best PracticeBpm Implementation   Success Criteria And Best Practice
Bpm Implementation Success Criteria And Best Practice
 
The Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleThe Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level Role
 
Data Warehouse Programme Notes
Data Warehouse Programme NotesData Warehouse Programme Notes
Data Warehouse Programme Notes
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...
 
Notes On Software Development, Platform And Modernisation
Notes On Software Development, Platform And ModernisationNotes On Software Development, Platform And Modernisation
Notes On Software Development, Platform And Modernisation
 
Structured Approach To It Business System Availability And Continuity Plannin...
Structured Approach To It Business System Availability And Continuity Plannin...Structured Approach To It Business System Availability And Continuity Plannin...
Structured Approach To It Business System Availability And Continuity Plannin...
 
Pmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewPmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment Overview
 
Economics of Utility Computing
Economics of Utility ComputingEconomics of Utility Computing
Economics of Utility Computing
 
Notes On Single View Of The Customer
Notes On Single View Of The CustomerNotes On Single View Of The Customer
Notes On Single View Of The Customer
 
Investing Intelligently In The IT Function
Investing Intelligently In The IT FunctionInvesting Intelligently In The IT Function
Investing Intelligently In The IT Function
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
 
Storage Architectures And Options
Storage Architectures And OptionsStorage Architectures And Options
Storage Architectures And Options
 
Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...
 
Notes On Managed Service And Outsourcing Implementation And Management
Notes On Managed Service And Outsourcing Implementation And ManagementNotes On Managed Service And Outsourcing Implementation And Management
Notes On Managed Service And Outsourcing Implementation And Management
 

Similar to Cloudy forecasts and other trends in information technology

How to Better Manage Your IT Infrastructure
How to Better Manage Your IT InfrastructureHow to Better Manage Your IT Infrastructure
How to Better Manage Your IT InfrastructureEdarat Group
 
Mergers & Acquisitions It Implications
Mergers & Acquisitions   It ImplicationsMergers & Acquisitions   It Implications
Mergers & Acquisitions It Implicationsllangin
 
IT Enabled Higher Education
IT Enabled Higher EducationIT Enabled Higher Education
IT Enabled Higher EducationInfosys
 
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...ITIL Indonesia
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructureirvin1969
 
Technology Strategy & You
Technology Strategy & YouTechnology Strategy & You
Technology Strategy & YouPaul Di Gangi
 
Managing Information Technology Services
Managing Information Technology ServicesManaging Information Technology Services
Managing Information Technology Servicesmichaelmadsen
 
Session 4 it architecture and competitive advantage
Session 4 it architecture and competitive advantageSession 4 it architecture and competitive advantage
Session 4 it architecture and competitive advantageYoungjin Yoo
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
 
Ovum It Enterprise Ra 2011
Ovum It Enterprise Ra 2011Ovum It Enterprise Ra 2011
Ovum It Enterprise Ra 2011scubamjp
 
It Governance Slides for MISA Ontario June 2009
It Governance Slides for MISA Ontario June 2009It Governance Slides for MISA Ontario June 2009
It Governance Slides for MISA Ontario June 2009Ben Perry
 
The new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaThe new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaS&T GROUP
 
Insights success the 10 most high tech it services companies.compressed
Insights success the 10 most high tech it services companies.compressedInsights success the 10 most high tech it services companies.compressed
Insights success the 10 most high tech it services companies.compressedMerry D'souza
 
The Case for Continual Realignment of the IT Function
The Case for Continual Realignment of the IT FunctionThe Case for Continual Realignment of the IT Function
The Case for Continual Realignment of the IT FunctionFormicio
 
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...Ted McLaughlan
 

Similar to Cloudy forecasts and other trends in information technology (20)

Hawaii OIMT presentation
Hawaii OIMT presentationHawaii OIMT presentation
Hawaii OIMT presentation
 
How to Better Manage Your IT Infrastructure
How to Better Manage Your IT InfrastructureHow to Better Manage Your IT Infrastructure
How to Better Manage Your IT Infrastructure
 
Mergers & Acquisitions It Implications
Mergers & Acquisitions   It ImplicationsMergers & Acquisitions   It Implications
Mergers & Acquisitions It Implications
 
IT Enabled Higher Education
IT Enabled Higher EducationIT Enabled Higher Education
IT Enabled Higher Education
 
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
(ONLINE) ITIL Indonesia Community – Meetup “Modern IT Service Management Tran...
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructure
 
Technology Strategy & You
Technology Strategy & YouTechnology Strategy & You
Technology Strategy & You
 
Managing Information Technology Services
Managing Information Technology ServicesManaging Information Technology Services
Managing Information Technology Services
 
Session 4 it architecture and competitive advantage
Session 4 it architecture and competitive advantageSession 4 it architecture and competitive advantage
Session 4 it architecture and competitive advantage
 
Well-Tailored IT
Well-Tailored ITWell-Tailored IT
Well-Tailored IT
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
 
01 ondrej felix [režim kompatibility]
01   ondrej felix [režim kompatibility]01   ondrej felix [režim kompatibility]
01 ondrej felix [režim kompatibility]
 
Ovum It Enterprise Ra 2011
Ovum It Enterprise Ra 2011Ovum It Enterprise Ra 2011
Ovum It Enterprise Ra 2011
 
It Governance Slides for MISA Ontario June 2009
It Governance Slides for MISA Ontario June 2009It Governance Slides for MISA Ontario June 2009
It Governance Slides for MISA Ontario June 2009
 
The new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaThe new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T Slovenija
 
Insights Sucess The 10 Most High-Tech IT Services Companies june 2016
 Insights Sucess The 10 Most High-Tech IT Services Companies june 2016 Insights Sucess The 10 Most High-Tech IT Services Companies june 2016
Insights Sucess The 10 Most High-Tech IT Services Companies june 2016
 
Insights success the 10 most high tech it services companies.compressed
Insights success the 10 most high tech it services companies.compressedInsights success the 10 most high tech it services companies.compressed
Insights success the 10 most high tech it services companies.compressed
 
Six key themes looking at how the impact of new technology drivers are changi...
Six key themes looking at how the impact of new technology drivers are changi...Six key themes looking at how the impact of new technology drivers are changi...
Six key themes looking at how the impact of new technology drivers are changi...
 
The Case for Continual Realignment of the IT Function
The Case for Continual Realignment of the IT FunctionThe Case for Continual Realignment of the IT Function
The Case for Continual Realignment of the IT Function
 
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...
 

More from Alan McSweeney

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdfAlan McSweeney
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfAlan McSweeney
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Alan McSweeney
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Alan McSweeney
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution SecurityAlan McSweeney
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security ArchitectureAlan McSweeney
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsAlan McSweeney
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationAlan McSweeney
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Alan McSweeney
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Alan McSweeney
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureAlan McSweeney
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Alan McSweeney
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual ChartsAlan McSweeney
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Alan McSweeney
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataAlan McSweeney
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
 
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Alan McSweeney
 

More from Alan McSweeney (20)

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdf
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdf
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security Architecture
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation Solutions
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation Architecture
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual Charts
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In Data
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
 
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cloudy forecasts and other trends in information technology

  • 1. Cloudy Forecasts and Other Trends in Information Technology Alan McSweeney
  • 2. Objectives • To discuss the trend towards cloud computing in the context of current and past trends and forecasts in Information Technology March 15, 2010 2
  • 3. Agenda • Cloud Computing • IT Trends • Cloud Adoption March 15, 2010 3
  • 4. Tired of Presentations from Vendors With Pictures of Clouds? March 15, 2010 4
  • 5. Cloud Computing as a Trend in Information Technology • What are the sources of information technology trends − Surveys by trade bodies of members − Surveys by journals and publications − Statements by analysts − Statements by vendors • Which are real trends and which represent wishful/fanciful thinking or biased? • Which trends are relevant to your organisation, based on operating area, geography, size, state of adoption and use of IT? • What happened to previous trends? March 15, 2010 5
  • 6. Cloud Definition • The use of a collection of services, applications, information and associated infrastructure consisting of pools of computing, networking and storage resources • Components can be rapidly provisioned, implemented and decommissioned and scaled up or down providing for an on-demand utility-like model of allocation and consumption March 15, 2010 6
  • 7. What Use Are Trends? • To the business - what is likely to be able to generate revenue through additional sales, access to new markets or channels or save money • To the IT function within an organisation – what new technologies can help in managing IT like a business and delivering value • To suppliers of IT services - what customers will buy, where I should focus my sales effort, how I should restructure my products/services to be relevant, how I should invest in R&D March 15, 2010 7
  • 8. Business and IT Concerns Regarding Information Technology Information Business Technology Efficiency Business Processes Delivered by IT Business Alignment, Management Systems and Control Internal Cost Cost, Budgeting, Planning Focus Continuity and Availability Reliability, Continuity and Availability Training Personnel Training Technology Changes Competition Vendors and Suppliers External Regulation What Partners and Competitors Are Focus Governance and Standards Doing Business Partners Technical Platforms of New Applications March 15, 2010 8
  • 9. Relevance of Trends in Information Technology to Business and IT Information Business Technology Will it Reduce IT Management Costs? Will it Save Money? Will it Improve IT Service Internal Management? Will it Generate Money? Focus Will it Enable IT to be More Responsive? External Will Adoption of Trends Assist With Will Existing Systems Be Rendered Competition, Regulation and Focus Governance? Obsolete and Unsupported? March 15, 2010 9
  • 10. How Much of Trend Adoption Is Driven By? Information Business Technology Everybody Else Is Doing It I Want To Do It So It Appears On My Resume I Like New Technology Internal Vendors Keep Talking About It Focus I Need One Good Idea To Stamp My Mark On The Organisation It Will Solve All My Problems External Focus March 15, 2010 10
  • 11. Layered View of IT Infrastructure Operations, Usage, Layer 8+ Management, Control, Governance What the Business Layer 7 Applications, Systems and is Concerned With Business Processes Layer 6 Data Presentation, Data Security Layer 5 Communication Layer 4 Connection What IT is Concerned With Layer 3 Network Transmission Layer 2 Storage and Network Addressing Storage Media and Network Layer 1 Signals March 15, 2010 11
  • 12. Information Technology Concerns • IT should concern itself with trends that − Assist and improve its internal operations − Improve the systems and service IT delivers to the business March 15, 2010 12
  • 13. Cloud Manifestations Cloud Computing A business model for delivering IT as a service, referred to as IT as a service (ITaaS) Types of Cloud Private Cloud - behind firewall serving applications in their company Public Cloud – shared infrastructure, accessible to general customers with multiple tenants Manifestations of IaaS - Infrastructure as a service Cloud Computing PaaS - Platform as a service SaaS - Software as a service STaaS - Storage as a service BRaaS - Backup and recovery as a service EaaS - Everything as a Service March 15, 2010 13
  • 14. Cloud Manifestations • Is it all just a pain in the …aaS March 15, 2010 14
  • 15. What are the Issues Cloud Computing is Trying to Fix? • Up to 85% of computing capacity is unused • 54% growth in storage capacity every year • 70% of IT budget on average is spent on maintaining current IT infrastructures rather than adding new capabilities • How will cloud computing fix these issues? March 15, 2010 15
  • 16. Migration to Cloud Traditional (Partially) Private Public Application- Virtualised (Internal) (Shared) Based Infrastructure Cloud Cloud Infrastructure Applications Servers Network Storage Relatively Minor and A Major Change Incremental Evolutions March 15, 2010 16
  • 17. Migration to Cloud • Virtualisation technology enables a shared and a type of service-oriented infrastructure • Creates a pool of computing, storage and network resources that can be shared between applications • Private cloud implementations are effectively more packaged versions of virtualisation technology created by vendors with additional management tools March 15, 2010 17
  • 18. Cloud Features and Potential Benefits • Features • Benefits • Virtualised and standardised • Potential for simplified and more infrastructure efficient IT and application management • Highly scalable (depending on the application • Deliver more applications to large number of users • Fault tolerant and highly reliable and available • increased utilisation at reduced cost • Fast application deployment • Faster reaction to business requirements March 15, 2010 18
  • 19. Analysis of Some Information Technology Trends • AICPA – Survey of members from 2001 to 2009 (2010 not published) on initiatives in IT that are of concern to their members • Gartner – well known analyst company • Two very different views of information technology trends March 15, 2010 19
  • 20. Gartner – Key IT Trends 2008 - 2010 2010 2009 2008 1 Cloud Computing Virtualisation Green IT 2 Advanced Analytics Cloud Computing Unified Communications 3 Client Computing Servers - Beyond Blades Business Process Modelling 4 IT for Green Web-Oriented Architectures Metadata Management 5 Reshaping the Data Centre Enterprise Mashups Virtualisation 2.0 6 Social Computing Specialised Systems Mashup and Composite Applications 7 Security – Activity Monitoring Social Software and Social Web Platform and Web- Networking Oriented Architectures 8 Flash Memory Unified Communications Computing Fabric 9 Virtualisation for Availability Business Intelligence Real World Web 10 Mobile Applications Green IT Social Software March 15, 2010 20
  • 21. Gartner – Key IT Trends 2008 - 2010 • How relevant are these trends to you and your organisation? March 15, 2010 21
  • 22. AICPA Top 15 IT Initiatives 2001-2009 2009 2008 2007 2006 2005 2004 2003 2002 2001 Information Security Information Security Information Security Information Security Information Security Information Security Information Security Business And Financial Information Security 1 Management Management Management Reporting And Controls Applications Privacy Management IT Governance Identity And Access Assurance And Electronic Document Spam Technology Business Information Training And E-Business 2 Management Compliance Management Management Technology Applications Competency Secure Data File Business Continuity Conforming To Disaster And Business Data Integration Digital Optimisation Application Information Security Electronically-based 3 Storage, Transmission Management And Assurance And Continuity Planning Integration and Controls Business and Financial And Exchange Disaster Recovery Compliance Standards Reporting Planning Business Process Privacy Management Privacy Management IT Governance Spam Technology Database and Web Services Quality of Service Privacy 4 Improvement, Work Application Flow and Process Integration Exception Alerts Mobile and Remote Business Process Disaster Recovery Privacy Management Disaster Recovery Wireless Technologies Disaster Recovery Disaster Recovery Training and 5 Computing Improvement, Planning and Planning and Business Technology Workflow and Process Business Continuity Continuity competency Exception Alerts Management Management Training and Identity and Access IT Governance Digital Identity and Collaboration and Disaster Recovery Wireless Technologies Communication Disaster Recovery 6 Competency Management Authentication Messaging Technologies Technologies Technologies Bandwidth Identity and Access Conforming to Securing and Wireless Technologies Wireless Technologies Data Mining Intrusion Detection Remote Connectivity Qualified IT Personnel 7 Management Assurance and Controlling Tools Compliance Standards Information Distribution Improved Application Business Intelligence Mobile and Remote Application and Data Authentication Virtual Office Intrusion Detection Web-Based and Web- Quality of Service 8 and Data Integration Computing Integration Technologies Enabled Applications Document, Forms, Mobile and Remote Electronic Archiving Paperless Digital Storage Technologies Business Exchange Customer Relationship Qualified IT personnel Electronic Audit 9 Content and Computing and Data Retention Technologies Technology Management Trail Knowledge Management Electronic Data Document, Forms, Document, Content Spyware Detection Learning and Training Messaging Privacy Messaging Application Service 10 Retention Strategy Content and and Knowledge and Removal Competency Applications Applications (e-mail, Provider Knowledge Management faxing, voicemail, Management instant messaging) Business Continuity Customer Training and E-mail Filtering RFID (Radio ID/Authentication ID/Authentication 11 Management and Relationship Awareness including Spam and Frequency Disaster Recovery Management (CRM) Malware scanning Identification) Planning Conforming to Improved Application Business Process Outsourcing Search Radio Frequency M-Commerce 12 Assurance and and Data Integration Improvement, Identification (RFID) Compliance Workflow and Process Standards Exception Alerts Collaboration – Training and Improved Application Storage and Backup Fuel Cells 3G Wireless Tablet PC 13 Information Portals Competency and Data Integration Technologies# Business Intelligence Web-deployed Web Deployed Patch and Network Digital Home Simple Object Access 3G Wireless 14 Applications Applications Management Tools Protocol (SOAP) Customer Information Portals Enterprise System Technology Display Technology# Autonomic Computers 15 Relationship Management Competency and Management Effective Utilisation March 15, 2010 22
  • 23. AICPA Top 10 IT Initiatives 2004-2009 2009 2008 2007 2006 2005 2004 1 Information Security Information Security Information Security Information Security Information Security Information Security Management Management Management 2 Privacy Management IT Governance Identity And Access Assurance And Electronic Document Spam Technology Management Compliance Management Applications 3 Secure Data File Business Continuity Conforming To Disaster And Business Data Integration Digital Optimisation Storage, Transmission Management And Assurance And Continuity Planning And Exchange Disaster Recovery Compliance Standards Planning 4 Business Process Privacy Management Privacy Management IT Governance Spam Technology Database and Improvement, Work Application Integration Flow and Process Exception Alerts 5 Mobile and Remote Business Process Disaster Recovery Privacy Management Disaster Recovery Wireless Technologies Computing Improvement, Planning and Business Workflow and Process Continuity Exception Alerts Management 6 Training and Identity and Access IT Governance Digital Identity and Collaboration and Disaster Recovery Competency Management Authentication Messaging Technologies Technologies 7 Identity and Access Conforming to Securing and Wireless Technologies Wireless Technologies Data Mining Management Assurance and Controlling Information Compliance Standards Distribution 8 Improved Application Business Intelligence Mobile and Remote Application and Data Authentication Virtual Office and Data Integration Computing Integration Technologies 9 Document, Forms, Mobile and Remote Electronic Archiving Paperless Digital Storage Technologies Business Exchange Content and Computing and Data Retention Technologies Technology Knowledge Management 10 Electronic Data Document, Forms, Document, Content Spyware Detection and Learning and Training Messaging Applications Retention Strategy Content and and Knowledge Removal Competency Knowledge Management Management March 15, 2010 23
  • 24. Security, Privacy, Governance, Disaster Recovery 2009 2008 2007 2006 2005 2004 2003 2002 2001 Information Information Information Information Information Information Information Information 1 Security Security Security Security Security Security Security Security And Management Management Management Controls Privacy IT Governance Identity And Access 2 Management Management Business Continuity Disaster And Information 3 Management And Business Continuity Security and Disaster Recovery Planning Controls Planning Privacy Privacy IT Governance Privacy 4 Management Management Disaster Recovery Privacy Disaster Recovery Disaster Recovery Disaster Recovery 5 Planning and Management Planning and Business Continuity Business Continuity Management Management Identity and Access IT Governance Digital Identity and Disaster Recovery Disaster Recovery 6 Management Authentication Technologies Identity and Access Conforming to Securing and Intrusion Detection 7 Management Assurance and Controlling Compliance Information Standards Distribution Authentication Intrusion Detection 8 Technologies Electronic Audit 9 Trail Spyware Detection 10 and Removal Business Continuity ID/Authentication ID/Authentication 11 Management and Disaster Recovery Planning Conforming to 12 Assurance and Compliance Standards 13 14 15 March 15, 2010 24
  • 25. Data, Information and Document Management/ Integration and Analysis and Related Initiatives 2009 2008 2007 2006 2005 2004 2003 2002 2001 1 Electronic Business 2 Document Information Management Management Secure Data File Data Integration Digital Optimisation Application 3 Storage, Integration Transmission And Exchange Database and 4 Application Integration 5 Digital Identity and 6 Authentication Technologies Data Mining 7 Improved Business Application and 8 Application and Intelligence Data Integration Data Integration Document, Forms, Electronic Archiving Paperless Digital Storage Business Exchange 9 Content and and Data Retention Technologies Technologies Technology Knowledge Management Electronic Data Document, Forms, Document, Content 10 Retention Strategy Content and and Knowledge Knowledge Management Management 11 Improved 12 Application and Data Integration Improved Storage and Backup 13 Application and Technologies# Data Integration Business 14 Intelligence 15 March 15, 2010 25
  • 26. AICPA Top 15 IT Initiatives 2001-2009 • Notice any differences? • Business-oriented focus of IT initiatives • Not concerned with IT plumbing and infrastructure (such as cloud) but on business concerns - running the business - and business-related IT concerns – potential impact of IT systems on the wider business • Security, privacy, disaster recovery/business continuity and governance concerns dominate • How will cloud computing assist in delivering these initiatives? March 15, 2010 26
  • 27. It’s Easy to Sneer at Past Predictions But … • Gartner Highlights Key Predictions for IT Organisations in 2007 and Beyond − Vista will be the last major release of Microsoft Windows. The next generation of operating environments will be more modular and will be updated incrementally. The era of monolithic deployments of software releases is nearing an end. Microsoft will be a visible player in this movement, and the result will be more-flexible updates to Windows and a new focus on quality overall. − Blogging and community contributors will peak in the first half of 2007. Given the trend in the average life span of a blogger and the current growth rate of blogs, there are already more than 200 million ex-bloggers. Consequently, the peak number of bloggers will be around 100 million at some point in the first half of 2007. − By 2010, 60% of the worldwide cellular population will be "trackable" via an emerging "follow-me Internet." Local regulations have arisen to protect users' privacy, but growing demands for national safety and civil protection are relaxing some of the initial privacy limitations. Marketing incentives will also push users to forgo privacy concerns, and many other scenarios will enable outsiders to track their users. March 15, 2010 27
  • 28. Private Cloud Computing • Cloud computing is largely an IT-focussed initiative that potentially allows IT manage systems and applications infrastructure more effectively March 15, 2010 28
  • 29. Private Cloud • Private cloud should consist of computing, network and Management, Resource Management storage hardware packaged Administration and Control with key management, administration and control Backup Provisioning facilities into self-contained and Recovery systems and applications infrastructure Information Collection Disaster Recovery and • Not a panacea Auditing − There is no such thing as an IT Data Management Security system that does not require maintenance and management Service Management Application Lifecycle Management • Cloud computing is a means to an end and not an end in itself March 15, 2010 29
  • 30. Cloud Processes • Possible suite of service management processes associated with conversion to cloud March 15, 2010 30
  • 31. Public Cloud • Potential for fragmentation of applications and associated data as specific business applications are run on separate clouds from separate suppliers ERP CRM Application Usage Data Integration Document Mail and Management Messaging March 15, 2010 31
  • 32. Public Cloud • Offers the potential for the business to bypass the IT function and buy the application from the cloud vendor, leading to a proliferation of disparate platforms and systems • Public cloud needs to be viewed as a form of outsourcing and needs to be implemented with the same care • Look to learn from the lessons from problems with outsourcing • Vendors will target business rather than IT staff and IT will be landed with implementation, maintenance and support March 15, 2010 32
  • 33. Cloud and The Business • IT needs to be aware and beware of: − If IT cannot help us, who else can? March 15, 2010 33
  • 34. Disconnect Between What the Business Wants and What IT Delivers What the Business Wants What the Business Gets 15% 5% 35% 25% 70% 50% Maintain The Momentum Of The Business Through Maintain The Momentum Of The Business Through Existing Business Systems Existing Business Systems Contribute To Improving Business Results Contribute To Improving Business Results Provide It Direction And Management That Is Aligned To Provide It Direction And Management That Is Aligned To The Needs Of The Business The Needs Of The Business March 15, 2010 34
  • 35. IT Value Management is a Key Topic for IT Do Not Measure Business Value From IT 40% Investments Metrics Do Not Adequately Capture Business 45% Value Executives Skeptical Of ROI From IT 52% Find It Difficult To Calculate ROI 62% CEO/CFO Demanding Better Ways To 71% Demonstrate Value 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% • Results of managing IT for business value − Budget flexibility coupled with strategic IT alignment leads to 50% greater IT payoffs − Improving management practices alongside IT investment drives 20% higher IT yields March 15, 2010 35
  • 36. Lessons Learned from Outsourcing Problems • Smoothly Transferring Services And Resources − Common cause of failure is the ineffective management of the transfer of services and resources to the service provider, leading to service delivery problems − Successful service providers rigorously control the transfer of services and resources to ensure that the new service is able to adequately deliver the service and the service continuity is maintained. • Maintaining Stakeholder Expectations − Common source of failure in sourcing engagements is a difference in expectations between the client, the service provider, and the suppliers and partners − Identifying and managing those expectations helps to ensure a common understanding of what is necessary for success • Translating Implicit And Explicit Needs Into Defined Requirements With Agreed Upon Levels Of Quality − Frequent cause of failure in sourcing is that the service provider does not fully understand the needs of the client − Successful service providers rigorously gather and analyse the stated and unstated needs, then translate those needs into a set of documented requirements − Successful service providers also recognise that needs change over time and establish provisions for gathering and analysing modifications to their services March 15, 2010 36
  • 37. Lessons Learned from Outsourcing Problems • Reviewing Service Design And Deployment To Ensure An Adequate Coverage Of The Client’s Requirements − Failure in sourcing is caused by the service provider not fully addressing the needs of the client − To ensure that the service delivery will meet the client’s needs successful engagements include rigorous reviews of the service design and deployment activities by the clients and the service provider prior to service delivery • Managing Client’s Security − Managing security and controlling critical data and assets are critical to establishing trust − Security management includes protection of intellectual property, confidentiality, and privacy concerns • Monitoring And Controlling Activities To Consistently Meet The Service Delivery Commitments − Successful service providers rigorously monitor their service delivery activities to ensure that the client’s commitments are being met − Actions are taken to resolve and prevent problems, thereby escalating issues as appropriate to ensure that they are addressed in a timely basis March 15, 2010 37
  • 38. Lessons Learned from Outsourcing Problems • Monitoring And Managing Client’s And End User’s Satisfaction − Success is not always defined in terms of meeting the agreed upon commitments, because clients and end users may be unsatisfied even when commitments are being met − Successful sourcing engagements monitor the satisfaction levels of the stakeholders to identify problems and take action • Managing Employee Satisfaction, Motivation, And Retention − IT-enabled sourcing often involves challenges during transition, deployment, and service delivery − High employee turnover jeopardises the service provider’s ability to meet its client’s requirements and undermines their expected gains and performance levels − Proactively monitoring and managing employee satisfaction and motivation can improve personnel retention and effectiveness • Managing Technological Shifts And Maintaining The Availability, Reliability, Accessibility, And Security Of Technology − Technology is a key component of outsourcing − Major challenges for the service provider include keeping pace with rapid changes in technology and effectively managing the technology infrastructure while changes are incorporated March 15, 2010 38
  • 39. Summary • Trends come from many sources: analysts, industry bodies, vendors, surveys, publications and some of these may be tendentious • A trend needs to be validated against your geography, operating area, organisation size and technology maturity • Adopting a trend is not an automatic guarantee of benefits - there are rarely easy answers - you have to work at it • There is still a need for architecture, analysis, design, validation to ensure that you will derive the greatest benefits from adopting new technologies/systems/applications • Private cloud can offer flexibility • Public cloud is a form of outsourcing and needs to be managed as such • There is no such thing as an IT system that does not require maintenance and management March 15, 2010 39