Report: Cloud computing poised for enterprise adoption
Gartner expects it to have a 'transformational impact' on companies
IDG News Service - Gartner has named cloud computing, green IT and social-computing platforms among the technologies that are poised to reach broad enterprise adoption in the next two to five years.
The report "Hype Cycle for Emerging Technologies, 2008" by Gartner Vice President and Fellow Jackie Fenn and other analysts, also cited video telepresence, which utilizes high-end videoconferencing systems to provide remote conference participants with the feeling that they are in the same room, and microblogging, popularized by the Internet application Twitter, as being on the brink of widespread adoption among enterprises.
All of these technologies are at the peak of what the report calls their "hype cycle," a term Gartner began using in 1995 to describe the human response to technology — from overenthusiasm at the beginning, through a period of disillusionment with the technology, to an eventual understanding of the technology's relevance and role in a market or domain.
Gartner uses the hype-cycle assessment to advise IT managers about when they should begin to adopt certain technologies that are getting a lot of attention but whose value to the enterprise is not yet known, according to the report. IT professionals generally have a better understanding of how to implement technologies at the peak of their hype cycles, once the initial excitement about them dies down in a few years.
The impact of technologies that are at the peak of their hype cycles in 2008 will differ depending on the technology, according to the report.
Cloud computing, defined by Gartner as "a style of computing where massively scalable IT-enabled capabilities are delivered 'as a service' to external customers using Internet technologies," in particular should have "transformational impact" on the enterprise, according to the report. This means the technology will change the way the IT industry "looks at user and vendor relationships," Fenn wrote.
"As service provisions (a critical aspect of cloud computing) grow, vendors must become or partner with service providers to deliver their technologies indirectly to users," according to the report. "User organizations will watch portfolios of owned technologies decline as service portfolios grow. The key activity will be to determine which cloud services will be viable, and when."
The impact of green IT will be high but less relevant to organizations than the impact of cloud computing, according to the report. However, organizations may use green IT practices to lessen the impact and acceleration of global climate change, and so could have a more long-term effect on that phenomenon.
Social-computing platforms, microblogging and video telepresence will have only a moderate impact on the enterprise as they begin to be widely adopted, according to the report.
The hype-cycle technologies outlined in the report are following a broader trend in recent years among emerging technologies in which they come of age among consumers before they reach businesses, Fenn wrote. She cited microblogging, social networking and cloud computing as examples of this trend.
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Web Apps White Papers | Webcasts