Gartner, Inc. today highlighted the top ten technologies and trends that will be strategic for most organizations in 2014. Analysts presented their findings during Gartner Symposium/ITxpo, being held here through October 10.
Gartner defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt.
A strategic technology may be an existing technology that has matured and/or become suitable for a wider range of uses. It may also be an emerging technology that offers an opportunity for strategic business advantage for early adopters or with potential for significant market disruption in the next five years. These technologies impact the organization's long-term plans, programs and initiatives.
“We have identified the top 10 technologies that companies should factor into their strategic planning processes,” said David Cearley. “This does not necessarily mean adoption and investment in all of the listed technologies, but companies should look to make deliberate decisions about them during the next two years.”
Mr. Cearley said that the Nexus of Forces, the convergence of four powerful forces: social, mobile, cloud and information, continues to drive change and create new opportunities, creating demand for advanced programmable infrastructure that can execute at web-scale.
The top ten strategic technology trends for 2014 include:
Mobile Device Diversity and Management
Through 2018, the growing variety of devices, computing styles, user contexts and interaction paradigms will make "everything everywhere" strategies unachievable. The unexpected consequence of bring your own device (BYOD) programs is a doubling or even tripling of the size of the mobile workforce. This is placing tremendous strain on IT and Finance organizations. Enterprise policies on employee-owned hardware usage need to be thoroughly reviewed and, where necessary, updated and extended. Most companies only have policies for employees accessing their networks through devices that the enterprise owns and manages. Set policies to define clear expectations around what they can and can't do. Balance flexibility with confidentiality and privacy requirements