the future of enterprise information technology

Upload: bob-gourley

Post on 07-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 The Future of Enterprise Information Technology

    1/22

  • 8/6/2019 The Future of Enterprise Information Technology

    2/22

    2

    The Future of Enterprise IT, Special Edition for GEOINTOctober 2009

    Published by Crucial Point LLC

    Copyright 2009http://crucialpointllc.com

    Suite 500, 1818 Library Street, Reston VA 20190

    No part of this publication may be reproduced, stored in a retrieval system or transmit-

    ted in any form or by any means, electronic, mechanical, photocopying, recording,

    scanning or otherwise except as permitted under Sections 107 or 108 of the 1976

    United States Copyright Act, without the prior written permission of the publisher.

  • 8/6/2019 The Future of Enterprise Information Technology

    3/22

    Table of Contents

    INTRODUCTION................................................................................................................ 4

    THE MEGA TRENDS IN IT................................................................................................ 5 ConvergenceandTrendTowardsUniedUserEmpowerment...............................5

    Globalization, Demographic Shifts, and Increasing Internationalization ofIT and Demographic Shifts...................................................................................... 6Increasing Open Development of Software and Hardware...................................... 6Cloud Computing..................................................................................................... 7Increasing Pace of Technology Development and Probability of Disruption............ 7

    THE DISCIPLINES OF ENTERPRISE INFORMATION TECHNOLOGY AND

    MARKET LEADERS.......................................................................................................... 8Storage.................................................................................................................... 8Communications...................................................................................................... 9Search and Discovery.............................................................................................. 9Applications.............................................................................................................. 10Virtualization.............................................................................................................11Open Source............................................................................................................ 12

    Security Technologies.............................................................................................. 12Collaboration Technology......................................................................................... 13Web2.0 and Social Media........................................................................................ 13GEOINT Tools.......................................................................................................... 14Visualization............................................................................................................. 15Cloud Computing..................................................................................................... 15Green IT................................................................................................................... 17Summary.................................................................................................................. 18

    DRAWING LESSONS FROM THE FUTURE OF IT........................................................... 19Concluding Thoughts............................................................................................... 21

  • 8/6/2019 The Future of Enterprise Information Technology

    4/22

    4

    The Future of Enterprise ITFrom Mega Trends to Off the Shelf Technologies

    Introduction

    This report on the future of enterprise technology was produced with the Geospatial enterprise and National Geospatial

    Intelligence Agency (NGA) in mind. Geospatial Intelligence places many unique demands on information technology,

    including requirements for increased processing power, increased storage, new means of indexing data and increased

    functionalityincommunicationsnetworks.Fortunately,developmentsinthoseandmanyothereldsofITarecoming

    fast and can help address key GEOINT community challenges. A new challenge is arising, however. How can we know

    which of todays problems are nearly solved and which remain intractable? And how can we know what is immediately

    available to address outstanding mission needs? One answer: focused thought and assessments on the future of enter-

    prise IT.

    Focused thought on the future of technology can provide real insights of use to planners and decision-makers of today.

    ViewsofthefuturecanhelpusersexpressrequirementswithmoreclarityandcanhelpChiefTechnologyOfcers(CTOs)

    andChiefInformationOfcers(CIOs)decidewhichtechnologiestoacceleratetomeetthoserequirements.Whetheryou

    are a user or a technologist, studying the future of IT can help you decide which constructs to accelerate into todays reality.

    This report uses two models of predicting the near term future:

    1) Tracking mega-trends in the IT industry.

    2)DeningthedisciplinesofEnterpriseInformationTechnologyandhighlightingmarketleaders.

    Using these models, we are able to present forward-looking reccomendations to use in planning the IT systems of today.

    The material here is largely from the online resources of CTOvision.com. The blog and reference pages there are reviewed

    and commented on by a wide swath of technologists including CTOs from the IT community, systems integrators and large

    enterprises. Please consider using the blog there to provide feedback and input for future iterations.

    This booklet has applicability for any large organization, but was written with the technology needs of the Geospatial en-

    terprise in mind.

  • 8/6/2019 The Future of Enterprise Information Technology

    5/22

    The Mega Trends in IT

    A mega trend is a movement so big it cannot be avoided.

    Ignoring it will only ensure the trend acts on you vice giv-

    ing you a chance to proactively shape it. These are expres-

    sions of major driving forces that move globally and impact

    wide swaths of humanity.

    Thevemegatrendsexploredhereare:

    Convergenceandtrendtowardsuniedcommunica-

    tions and user empowerment

    Globalization and increasing internationalization of

    IT and demographic shifts

    Increasingopendevelopmentofsoftwareandhard-

    ware

    CloudComputing

    Increasing pace of technology development and

    probability of disruption

    Convergence and Trend Towards Unied

    User EmpowermentEnterprise CIOs and CTOs remain key players in the IT

    ecosystem. But, the IT industry has been shifting to support

    an increasingly important player -- the individual. The com-

    mercialization and commoditization of IT, paired with the

    ubiquity of computing devices, has caused a shift in IT de-

    veloper focus towards the individual consumer. This trend

    can both compete with and enable enterprises.

    The competition comes from the pull on developers focus

    and time. Increasingly the limited pool of computer engi-

    neers is being pulled towards coding for Facebook, Linke-

    dIn, Twitter, the iPhone and consumer focused cloud ser-

    vices providers (like Google and Amazon). The enablement

    comes from enterprises with incredibly competent/capable

    workforces skilled in technology, plus access to increas-

    ingly powerful devices and cloud capabilities that can be

    leveraged by the enterprise for their mission. Consumer de-

    mand continues to fuel advances in communications and

    networking capability, which ends up supporting enterprise

    buyers by reducing cost and enhancing capabilities. And

    consumer demands on IT are also a key driver in emerging

    Cloud Computing trends (a mega trend so critically impor-

    tant we discuss it separately as its own wave).

    Enterprises are also increasingly being enabled by the

    social media/social networking dimensions of this shift to

    users. Social media and its ability to bring mass collabora-

    tiontoproblemshasshownbenetsinwaysthatisfueling

    increasing consumer demand and that should ensure con-

    tinued advancement of social media tools. Enterprises are

    also bringing social media to bear on problems, both inside

    andoutsideoftheirrewalls.

    Globalization, Demographic Shifts, and

    Increasing Internationalization of IT

    The CTOvision.com Technology Titan List covers the 16

    largestITrms(Microsoft,Apple,IBM,Google,Cisco,In-

    tel, Hewlett-Packard, Oracle, Qualcom, SAP, EMC, Dell,

    Yahoo, Adobe, Vmware, Symantec). These powerhousecompanies all have a market capitalization of over $16 Bil-

    lion. A review of the list highlights an incredible fact:

    These are all, with the exception of one case (SAP), Ameri-

    can companies. This chart shows that U.S. companies con-

    duct the majority of commercial IT engineering and develop-

    ment for big enterprises. This is good news for the country.

    An important fact to highlight, however, is that these compa-

    nies all work globally and have development and research

    labs around the world. Just because a U.S. company iseldingyourcapabilitiesdoesnotmeanthecapabilitywas

    developed in the U.S. In fact, odds are it was not

    Withallwesternnationsforecasttoseeasignicantgraying

    of the workforce and pending mass retirement, additional

    dynamicsareatplayinthismegatrend.Japanistherst

    nationtofeelasignicantimpactformtherealityofaretiring

  • 8/6/2019 The Future of Enterprise Information Technology

    6/22

    6

    workforce. This graying of the workforce is affecting every

    U.S. ally, fueling the global competition for IT talent.

    This trend underscores the critical importance of strategicplanning, both for companies and countries. Coordination,

    communication and collaboration are critically important ac-

    tivities. And knowledge capture capabilities, many of which

    may be IT based, will be of growing importance around the

    globe.

    Increasing Open Development of Software

    and Hardware

    Open source software started with hobbyists. It has now

    been embraced by all major IT companies, even the largest

    proprietary shops (like Microsoft) have open source soft-

    ware strategies and activities. And all major enterprises are

    using open source software to some degree.

    The reasons for this are many. One is the large number of

    developers supporting this community. Another is the abil-

    ity to review code and make it better. Another is the ability

    to save money on licensing fees (in general, open source

    software support requires license or support contracts, and

    big enterprises still spend money on this, just less than on

    proprietary software).

    The smart use of open source by big enterprises is havingan impact on many other elements of the environment. For

    example, enterprises have increasing needs for in-house

    programming talent, in part because of the need to under-

    stand open source. There is also a drive towards communi-

    ty engagement with open source software, with more large

    enterprises spending time and energy to engage with open

    source software development collectives.

    Cloud Computing

    The term Cloud Computing is used two different ways in the

    IT community. To most users, cloud computing is any capa-

    bility delivered over the network. If it is not local computing

    it is from the cloud. To these users, almost all enterprise IT

    is cloud computing. Technologists and enterprise architects

    use the term in a different way. To them, cloud computing

    implies new ways of providing capability on demand by use

    of virtualized resources. It involves pools of storage, net-

    work, processing and other computational resources that

    canbeefcientlyallocatedondemand.Italsoimpliesfar

    Tech Titan List, Figure 1

    Market Cap in $B

    CTOVision.com Tech Titan List

    0 50 100 150 200 250

  • 8/6/2019 The Future of Enterprise Information Technology

    7/22

    more agility in support of operational missions. Technolo-

    gistsviewcloudcomputingasameanstomostefciently

    deliver computer power via an application program inter-

    face (API).

    One thing all agree on is that this elastic provision of com-

    putational resources is changing the computing landscape.

    Public clouds are providing incredible capabilities to individ-uals and small businesses and even some large enterpris-

    es. Private clouds are becoming important parts of the en-

    terpriselandscape.Thistrendisprovidingbenetsofcost,

    agility and security, but introduces risk as well, including, if

    donewrong,signicantavailabilityandsecuritythreats.

    We will dive deeper into Cloud Computing details in a later

    section.

    Increasing Pace of Technology Development

    and Probability of Disruption

    The many trends highlighted above all have speed compo-

    nents and all are accelerating. The pace shows no sign of

    slowing, especially since other technology segments (espe-

    cially NanoTech and BioTech) are also now accelerating and

    are contributing to IT in unexpected ways. This acceleration

    andbroadeningofaccelerationintoothertechnologyelds

    is making it very hard to track developments. Complexity is

    also increased because it is impossible to master IT without

    having mastery of NanoTech and BioTech. Things are just

    moving too fast for that.

    The complexity of modern enterprises means as things

    change there is an increasing chance that things will notwork after a new change. Our systems are so complex that

    they are overly susceptible to degradation from change.

    Additionally,improvementsinITareattimessosignicant

    they can introduce unforseen changes to business pro-

    cesses,whichcansignicantlyimprovebutdisruptcurrent

    activities.

    Bottomline--wemustallplantondwaystodecidewhat

    technologies are relevant for bringing into the enterprise

    andmustndwaystomakerelateddecisionsaroundthat

    fast.

    Demographic Trends, Figure 2

  • 8/6/2019 The Future of Enterprise Information Technology

    8/22

    8

    Tracking megatrends provides important context that can

    help inform major decisions. But we need to seek more

    resolution on the state and trends of the many disciplines of

    ITinordertomakemorerenedpredictionsontheimpact

    of the future on today.

    In the following sections we will review IT constructs and

    disciplines such as: Storage, Communications, Search,

    Discovery, Applications, Virtualization, Open Source, Se-

    curity Technologies, Collaboration Technologies, Web2.0

    and Social Media, GEOINT tools, Visualization and Cloud

    Computing.

    Storage

    In this context, the term storage applies to the ability of the

    enterprise to securely hold information. Enterprise storage

    options remain Direct-attached Storage (DAS), Network-

    attached Storage (NAS), Storage-area Networks (SAN)

    with Small Computer System Interface (SCSI) options. All

    will drop in price and increase in capability. In general, the

    trend in enterprise storage is moving us away from stor-

    age tightly coupled to individual programs/projects towards

    storage that is managed as an enterprise mission/function.

    Key storage trends include:

    RapidincreaseinsensorfeedsandGeospatialIntel-

    ligence (GEOINT) sources as well as continued mis-

    sion demands to store and index large quantities of

    historical data will continue to drive storage require-

    ments. The GEOINT enterprise is not the only one

    with these demands, global storage requirements in

    all sectors are growing dramatically.

    Expect growth to multi-petabyte online distributed,

    federated archives. High performance grid storage.

    The Disciplines of EnterpriseInformation Technology and

    Market Leaders

    Disparate,heterogeneousstoragewillbe thenorm

    well into the future. Distributed data synch and the

    software to manage data as an enterprise is the key

    requirement. Simultaneous shared access to large

    lestoragesystemsisamissionneed.

    Dataatrestwillbe increasinglyencrypted.Tond

    the right data it must be indexed (while unencrypt-

    ed). The index to data must also be protected since

    it contains critically important information to protect.

    Indexesandmetadatawillgrow.Frequentlyourdata

    will have more meta than data.

    Deduplicationisimportantforoptimizationoftheen-

    tire storage enterprise.

    Enterprise storage vendors, including Tech Titans like IBM,

    Oracle (with Sun), and EMC continue to closely track these

    trends and are accelerating these capabilities as they can.

    Enterprise CIOs and CTOs should clearly articulate to these

    vendors which of these capabilities are most important in

    theenterprise. Themostdramatically positivebenets in

    storagewilllikelycomefromsmallrmswithdramaticnew

    capabilities including:

    Data Domain: Deduplication storage solutions. De-

    duplication storage solutions dramatically reduce the

    amount of disk storage needed to retain, protect, and

    recover critical data. Enterprises large and small are

    using Data Domain to achieve the performance, reli-

    ability and scalability to address their backup, disas-

    ter recovery and archiving needs.

    DataDirect Networks (DDN): Create storage solu-tions based on parallel architecture that enable the

    storage of large amounts of structured data, rapid

    access to data, and scalability for enterprises of any

    size. This is great for digital video and other large

    media. DDN stores and protects mission-critical in-

    formation and deliver results quickly and economi-

  • 8/6/2019 The Future of Enterprise Information Technology

    9/22

    cally to all customers. The DDN Storage Fusion

    Architecture (SFA) fuses the best parts of todays

    advanced processor technology, busses, and mem-

    ory architecture with an optimized RAID engine and

    data management algorithms. These are tightly in-

    tegrated to derive peak performance out of a mas-

    sive IO infrastructure and multi-media disk drives to

    maximize system performance and lower storage in-

    vestment costs. The fusion of unprecedented levels

    of bandwidth and IOPS enable this system to serve

    as the storage foundation for any Extreme Storage

    application set.

    Brocade: Provides data center infrastructure de-

    signed to work at extreme speed from enterprise

    data centers to the service provider core. They con-

    nect data stores and processing to networking solu-

    tions that connect important information in mission-

    critical environments. Their SAN and IP Networking

    solutions support business requirements such as

    virtualization and consolidation.

    Communications

    In the enterprise IT context, this refers to technology that

    moves data. The most common, most widely known pro-

    tocol in communications is the TCP/IP protocol. Long haul

    communications and data center interconnect may use oth-

    er protocols, but TCP/IP remains the most important proto-

    col. Trends to watch are:

    Communicationscapabilitiesbetweenxedfacilities

    willbeenhancedbyafactorof10overthenextve

    years, through natural lifecycle upgrade of existingsystems. If decisions are made to accelerate comms

    capability into enterprises this could increase by a

    factorof100overthenextveyears.

    The need for increased communications is being

    drivenbyrequirementstomovelargequantiesof

    data.

    Increasingexpectations ofusers tobe abletocol-

    laborate with very high quality video will also drive

    communications requirements.

    Comms must support real-time tele-presence and

    tele-collaboration and enhanced video

    Continuous,alwaysoncommunicationsisakeyre-

    quirement for leveraging cloud computing capabili-

    ties.

    Increasesin communicationscapabilitiesto mobile

    userswillnotbeasfastasincreasestoxedfacility

    users.

    ExpectuseoftechnologieslikeWiMaxforenhancing

    communications to mobile users.

    ThecriticallyimportantdemandsofthetacticalGEO-

    INT environment will always present challenges to

    dissemination of national intelligence to battleeld

    users.

    IPv6isin useat about5% ofUS circuits. Orper-

    haps we should say, is intentionally in use in about

    5%ofUScircuits.Unfortunately,manynetworksal -

    low for the protocol and it may be in use without the

    knowledge of the operators of the networks since

    most legacy network monitoring tools are not able to

    monitor IPv6. This is a tremendous backdoor threat

    to the enterprise.

    Tech Titans Cisco and Qualcomm remain market leaders

    inxedandmobilecommunicationsandwarrantcontinued

    tracking by enterprise CTOs. For communications security

    solutions and management of IPv6 while combating net-

    workcongestionexamineCloudshield,thebestintheeld

    carrier-class network solution device.

    Search and Discovery

    By search, we mean the computer based but human fo-

    cused/driven examination designed to nd that which is

  • 8/6/2019 The Future of Enterprise Information Technology

    10/22

    10

    concealed.Searchhelpsyoundwhatyouknowexistsand

    what you know you need. By discovery, we mean features

    thathelpusersndwhattheyneed,eveniftheydontknow

    what to look for. This is a much more open ended problem.

    Some key trends of note:

    Federated,semanticbased search capabilities will

    continue to improve, but these do not scale as they

    are limited by the critical thinking ability of the user.

    Expect continuing advances in new, more power-

    ful search capabilities including in-stream media

    management using new multi-threaded capabilities.

    However, these powerful search capabilities are notkeeping up with the drive to interconnect and ac-

    cess increasingly large data sets (which is required

    for horizontal interoperability). We will all continue to

    face search-scaling problems.

    Weexpect richer, higher bandwidthinterfacesinto

    more human senses, including the use of more inter-

    active interfaces. This is a movement away from en-

    tering terms into a web-based search box. First, the

    search box gets on every app, but later the searchbox goes away and is replaced with a statement of

    desire the computer always looks for.

    Federating and integrating results is a long term

    challenge.

    Protectingagainstnewthreatstofederatedsearch,

    such as attacks on relevance, are also a challenge.

    Capabilitiesprovidedby leadersinguidednaviga-

    tion like Endeca provide disruptive capabilities wewill want to accelerate into the environment.

    Architectsodatandsdata,theright info(andrel-

    evance) ndsusers, and userscontinually access

    relevance.

    Endeca remainsthemostdisruptivecapabilityinthiseld,

    providing means to both search and discovery. GEOINT

    and all source intelligence fusion solutions based on Ende-

    caoperateonclassiednetworkstoday.Unclassiedana-

    logs for these capabilities are available at sites like http://

    newssift.com

    Applications

    In the context of enterprise IT, applications are software that

    does things. Applications are the primary point of user inter-

    action. Of most importance is the mission-focused software

    of the enterprise. Applications are increasingly becoming

    user-focused, which is good news for many reasons. When

    it comes to prediction, we really just need to predict futureuser requirements and we can know what future applica-

    tions will deliver. Other key constructs to consider regarding

    the future of applications:

    Expectstrongerenterprisemanagementofapplica-

    tion development and more code reuse and service

    reuse.Alsoexpectmoreefcientwaysoftransition -

    ing code to operations.

    Donotexpectallapplicationstobedevelopedfrom

    a single integrated development environment (IDE).

    No enterprise will have a single IDE or single archi-

    tecture long into the planning period. Also, expect

    more use of the Adobe Flex environment.

    Expect web and software services allowing users

    more power over their own app creation, including

    creation of composite apps and mashups (giving the

    ability to create applications to the people closest to

    the problem). JackBe is the exemplar here.

    Enterpriseswillhaveacontinuingneedforappsand

    solutions that can empower users to get data/info

    their way and rapidly collaborate/create/share. Too

    few of todays apps do this well. Apps must access/

    leverage enterprise requirements for Data Layer and

    t in to theService OrientedArchitecture.Applica-

  • 8/6/2019 The Future of Enterprise Information Technology

    11/22

    1

    tions will comply with enterprise storage system re-

    quirements.

    Enterprises today do not suffer from a lack of applications.They suffer from incredibly complex integrations of ap-

    plications that were not designed to work together in any

    strategic way. As an exemplar of applications that can work

    together in a common framework, this example of a docu-

    ment management/exploitation is provided:

    The Twister Document Screening Application provides

    the intelligence community enterprise and its users with an

    ability to rapidly examine captured/found/gathered written

    documents (in multiple languages). The Twister DOCEXapp provides users with a simple interface, but technolo-

    gists will see a very smart, well thought out framework

    which uses the strength of Twisters ability to connect any

    data and any process to any app, securely. Users can

    import documents in soft copy or hard copy. Documents

    are translated from their initial language, but are also in-

    dexed in their existing language. Documents can be rap-

    idly screened, managed, exploited, stored and subjected to

    very high powered analytical tools, all within minutes. This

    state of the art, faster, simpler process will have dramatic

    positiveworkowimplicationsontheintelligencecommu-

    nity, saving time and giving analysts more time to think. This

    application uses a new integrated model made possible by

    adherence to enterprise standards. This enables addition of

    new capabilities in modular ways as desired (current capa-

    bilities include hard copy OCR by NovoDynamics, Entity

    Extraction and Translation and indexing by Basis Technol-

    ogy, Machine Translation by Language Weaver, and auto-

    mated ingestion and integration by Twister).

    Virtualization

    In the enterprise context, this is a technology that allows

    forfarmoreefcientuseofresources.Itisatechniquefor

    hiding the physical characteristics of computing resources,

    including making a single resource (like a server, operating

    system, application or storage device) act like multiple re-

    sources. It can also make multiple resources look like one.

    With virtualization, enterprises can now centrally manage

    their computing, storage and network environments while:

    Increasingserverutilization, performance andsys-

    tem uptime

    Reducing cost and complexity of delivering enter-

    prise class service

    Loweringthe risk and platformcostsof rolling out

    new applications

    Some key trends of note:

    Virtualizationhasproveneffectiveasameansforin-

    creasingefciencies,andasapotentialsolutionfor

    disaster recovery.

    Virtualizationissavingpower,whichisbecomingof

    critical importance.

    Virtualization isalsosolvingspacechallenges, en-

    abling consolidations of existing data centers.

    Virtualization technologies will changethe wayen-

    terprises support all users, but most users will not

    know that.

    Virtualizationisaattenerfor hardwareproducers,

    which might change the hardware end of the PC and

    Server business. It will also likely impact most en-

    terprise architectures with virtualized SOA environ-

    ments.

    Wireless laptops with totally virtualized, statelesspower are available today. As wireless communica-

    tions increase expect more of these.

    Althoughmanyplayersareenteringthevirtualizationeld,

    including Microsoft and IBM, the clear leader for now and

    the near future is VMware. Their proven virtual infrastruc-

    turesolutionsenableenterprisestoincreasetheefciency

  • 8/6/2019 The Future of Enterprise Information Technology

    12/22

    12

    and cost-effectiveness of their IT operations.

    Open Source

    This term refers to software that is developed with its source

    code open to review and input (and with an OSI license).

    Open source hardware architectures are also included in

    this category. Some key trends of note:

    Commerciallysupportedopen-sourcesolutionswill

    increasingly be found in the same solution stack with

    proprietary solutions. Commercially supported open

    source is an important distinction for enterprise-class

    users since enterprise CIOs prefer an ability to tap

    into support networks.

    Opensourcesoftware(includingsoftwareyouhave

    no idea who wrote), will be part of every major solu-

    tion.

    Issues can arisewith sloppypracticessuchas re-

    using open source without conducting any testing or

    characterization for suitability. Always use commer-

    cial open source.

    Intellectualpropertyindemnicationissuesremain.

    Thebiggestbenetstoopensourcecomefromcode

    sharing and reuse, as well as the ability to build on

    whatisalreadythere.Leveragingthesebenetsre -

    quires a framework for effective use of code.

    The worlds leading open source company is Red Hat,

    which focuses primarily on Linux. They provide operating

    system software along with middleware, applications and

    management solutions. In addition to offering support,training and consulting services to its customers worldwide,

    their Open Source strategy offers customers a long term

    plan for building infrastructures that are based on and lever-

    age open source technologies with focus on security and

    ease of management.

    Another key capability to track in open source is the de-

    velopment support environments like those provided to the

    DoD under Forge.mil. This CollabNet solution is the same

    solution that drives the open source communitys Java.net,

    OpenOfce.orgaswellas mostotherlarge open source

    codebase projects.

    Security Technologies

    Security technologies are those that contribute to the con-

    dentiality,integrityandavailabilityofinformation.Security

    technologiesalloperateunderthecongurationcontroland

    guidanceofaChiefInformationAssuranceOfcer.These

    technologiesinclude:rewalls,intrusiondetectiondevices,

    PKI, auditing, security testing, policy servers, and accesscontrol mechanisms. Some key trends of note:

    Weare trackingthe abilityof government-provided

    encryption to scale to future comms requirements.

    AllITprovidersaregettingmoreseriousaboutsecu-

    rity, however, not one controls the entire stack, leav-

    ing lots of room for fault lines that can be exploited. \

    Identityandauthenticationofuserswilllongremaina

    critical component of security technology.

    WedonotexpectanySingleSignOnsolutionto

    provide comprehensive access to dispersed data.

    Single Sign On will provide access to more and more

    data, but current data management/ownership con-

    structs will prevent ubiquity.

    Crossdomainsolutionswill all begovernedatthe

    enterprise-level. Individual programs will not develop

    their own cross-domain solutions.

    TheDoDEncryptionatrestenterprisebuywillhelp

    change the marketplace in a very positive way.

    Thecombinationofincreasedentrypointsandmore

    sophisticated threats has prompted many organiza-

    tions to reassess endpoint security as it relates to

    their networks.

  • 8/6/2019 The Future of Enterprise Information Technology

    13/22

    1

    SymantecistheTechTitantowatchinthiseld.Theirend-

    point security solutions are aimed at a key enterprise se-

    curity challenge. Symantec Endpoint Security solutions en-

    able organizations to evaluate and protect systems as they

    connect to corporate assets. Client protection technologies,

    integrated with industry standards, provide protection for

    systems and networks.

    Another company of note is Initiate, a provider of master

    data management, entity resolution and advanced relation-

    ship analysis solutions. Initiate transforms distributed data

    setsintoresolvedentitiesofhighcondencethatcanbe

    used to detect and defeat threats before they occur. Their

    trusted solution scales to support missions involving billions

    of records and enables cross-organizational information

    sharing, providing accurate information at all critical deci-

    sion points, while protecting privacy and security.

    Congurationmanagementisincreasinglyimportanttore -

    mediation and Triumfant is one to watch there.

    Collaboration Technology

    In the enterprise context, collaboration is a technology

    which assists humans in working together. This is normally

    humans (probably geographically dispersed) working to-

    gether to create intelligence. Some key trends of note:

    Theageofstand-alonecollaborativetoolsisnearly

    over. Expect all future tools to have a collaboration

    feature.

    Trends toward convergenceindicate future collab-

    orative capabilities will be centered on existing full

    service directories and will also integrate standardenterprise scheduling software and desktop video

    and voice.

    GEOINT analysts need means to collaborate via

    multiple paths at all levels. Pervasive tele-collabora-

    tion is a key requirement.

    The rapidly shifting consumer focused capabilities

    found in an increasing number of social software and

    other Web2.0 sites will be a key driver.

    Thisisnotonlyaboutcollaborationwithintelligence

    but withcustomers.And itis mostdenitelyabout

    collaboration with allies.

    Lookfortoolsthatbridgeworkowacrossandout-

    side the enterprise. From private clouds to public

    clouds to external partners.

    Likeapplications,thereare manyexemplarsin thiseld.

    One key capability of note is the solutions provided by

    Adobe Connect, which links entire enterprises together. It

    enablessharingofdocuments,images,andotherles,as

    well as hosting web seminars and collaborative sessions.

    Web2.0 and Social Media

    Originally coined to mean the next generation Internet,Web

    2.0spopularusagenowhasthetermmeaningwhatever

    is hottest/newest/available now on the net.

    Web 2.0 websites typically include some of the following

    features/techniques:

    RichInternetapplicationtechniques

    Flexopensourceframeworkforwebapps

    Flashforinteractivity

    SemanticallyvalidXHTMLandHTMLmarkup

    Microformats extending pages with additional se-

    mantics

    Folksonomies(intheformof tagsortagclouds,for

    example)

    CascadingStyleSheetsto aidin theseparationof

    presentation and content

    RESTand/orXML-and/orJSON-basedAPIs

  • 8/6/2019 The Future of Enterprise Information Technology

    14/22

    14

    Syndication,aggregationandnoticationof datain

    RSS or Atom feeds

    Mashups, merging content from different sources,client- and server-side

    Weblog-publishingtools

    Wikiorforumsoftware,etc.,tosupportuser-generat-

    ed content

    For enterprises to use these features, capabilities are re-

    quiredthatservebehindthecorporaterewallandcanse -

    curely pull in information and people-to-people connections

    from outside the enterprise. Jive Softwares Jive SocialBusiness Software (SBS) establishes a trusted online en-

    vironment with appropriate controls that leverages social

    media and community software for connecting people and

    knowledge. Their solutionwhich is the de facto standard

    fortheintelligence communitypromotes uidcollabora-

    tion, consolidated information, and access to diverse exper-

    tise to improve the quality and timeliness of agency work.

    GEOINT Tools

    In this context, these are capabilities that assist users in

    planning, visualizing, managing and directing GEOINT.

    Some key trends of note:

    ToomanyoftodaysGEOINTtoolsarenotfullyinte-

    grated into the enterprise, resulting in sub-optimized

    performance for end users. Future tools are being

    written to take advantage of SOA concepts

    Geospatial location of individuals is becoming the

    greatest biometric. Where you are and when is astandoff biometric that is highly reliable.

    Expect more movement towards force-structure-

    aware networks and networks that sense where on

    earth all force structure is.

    Expect a greater ability to focus on long mission

    threads and real-time mission GEOINT.

    GEOINTs newest, hardest missions require sys-

    tems which can automate the population of knowl-edge bases, provide next-best observation, support

    uncertainty management, and provide integrated

    planning tools. Systems must enable real-time, dy-

    namic re-tasking.

    SOAconstructswillbethegreatestsingledriverof

    future GEOINT tools, but in the context of GEOINT

    tools, Web Services will probably not be the tech-

    nology of choice for SOA. Too much data is being

    moved and too many users will need access to thetools and services for a web service approach to be

    used in SOA.

    Like other capabilities discussed in the applications section,

    GEOINT solutions are now only limited by the imagination.

    Buttoefcientlyandeffectivelybringsolutionstothecus-

    tomer, the best practice is to accelerate the best available

    to the entire enterprise. A key example is the use ofAdobe

    and TerraGo integrations. TerraGo leverages Adobe PDF

    document formatting to provide maps to anyone with a PDFreader. Extending access to maps and geographical data to

    the soldier on the ground, or any Adobe user provides ac-

    cess to GEOINT on the go. GeoPDF, 3D PDF, Flash/Flex

    embedded in PDF, with content control/DRM. Dashboards

    that auto synch for command situational awareness.

    Other recent GEOINT examples include an integration

    based on Thetus semantic knowledge modeling and dis-

    covery software called Savanna. Savanna is a rich internet

    application, model/services-driven Intelligence Analysis ap-plication. Its focus is on the analysis challenge; key ques-

    tions, assumptions, hypothesis and conclusions and the

    associated data used to support the analysis. Savanna in-

    cludescongurableanalysisworkspacesthatfacilitateana-

    lytical views of supporting information, locations, relation-

    ships and reports. It is expandable and tailorable but typical

  • 8/6/2019 The Future of Enterprise Information Technology

    15/22

    1

    congurationsuseMark Logic Serveras the high perfor-

    mance XML store, Metacarta for geotagging and location

    constrained search, Kapow for web harvesting and Janya

    for automated entity extraction. The Geospatial element en-

    suresSavannais ofmaximumrelevance/utility while ne

    tuning results to expose cultural, political and other human

    terrain practices.

    Visualization

    In this context, visualization refers to the ability to link the

    two greatest processors in our grid, the computational pow-

    er of our enterprise and the human brain. Some key trends

    of note:

    Thetietocommercialtechnologysofarhasnotpro-

    vided a good way to enable GEOINT analysts with

    wrap-around desktop screens. This need is met by

    lining up more monitors next to each other,

    butenhanced 2D/3D workstations withagilewide-

    band interfaces to the brain are the need.

    UtilityofcapabilitieslikeTouch Table or Jeff Hans

    Perceptive Pixel to visualize and interact with datashows promise. If live data is brought in these will be

    disruptive technologies.

    ThePenn State CAVE might provide another dis-

    ruptive capability. Its use in multiple academic cen-

    ters of excellence and its use in a couple of govern-

    ment locations is a positive note.

    SuperHDTV, HRMotion Imagery, 40Kx40K hyper-

    spectral are driving key visualization requirements.

    Solutions of note include:

    MotionDSP: MotionDSPs ability to stabilize, clean

    up, and enhance video in real-time using off-the-

    shelf Windows PCs is boon to SIGINT and HUMINT

    gatherers across the DoD, federal agencies, and the

    Intelligence community.

    iMove: Provides immersive video camera systems

    that collect geo-referenced imagery from multiple

    cameras simultaneously. iMove enables mission

    success by giving operational assets increased intel-

    ligence of the area of operation. iMove provides up

    to 360 degree x 360 degree views of any target area,

    by integrating numerous video streams into one con-

    tinuous panorama, or immersive view, that is both

    archived for forensic analysis, and is available in real

    time.

    PiXlogic: Provides a visual search engine that au-

    tomatically analyzes, indexes, and searches the

    contentsofimagesandvideoleswithhighlevelsof

    accuracy and speed.

    Cloud Computing

    This mega trend has translated into an emerging discipline

    weneedtotrackwithmuchmoredelity.

    One of the most critically important capabilities in the cloud

    computing domain is that just rolled out by the federal gov-

    ernment in http://apps.gov. This online cloud services capa-

    bility provides access to key technologies needed now by

    government users, and since it is a cloud based approach

    the functionality there will continue to grow.

    As noted on the Apps.gov website:

    CloudcomputingplaysakeyroleinthePresidentsinitia -

    tive to modernize Information Technology (IT) by identifying

    enterprise-wide common services and solutions and adopt-

    ing a new cloud-computing business model. The Federal

    CIOCouncilundertheguidanceoftheOfceofManage-ment and Budget (OMB) and the Federal Chief Information

    Ofcer(CIO),VivekKundra,establishedtheCloudCom-

    putingInitiativetofulllthePresidentsobjectivesforcloud

    computing.

    Apps.com also notes that cloud computing offers the follow-

    ing features:

  • 8/6/2019 The Future of Enterprise Information Technology

    16/22

    16

    Signicant Cost Reduction: Cloud computing is

    available at a fraction of the cost of traditional IT ser-

    vices, eliminating upfront capital expenditures and

    dramatically reducing administrative burden on IT

    resources.

    IncreasedFlexibility:Cloudcomputingprovideson-

    demand computing across technologies, business

    solutions and large ecosystems of providers, reduc-

    ing time to implement new solutions from months to

    days.

    Accessanywhere:Youare nolongertetheredtoa

    single computer or network. You can change com-puters or move to portable devices, and your existing

    applications and documents follow you through the

    cloud.

    Elasticscalabilityandpay-as-you-go:Addandsub-

    tract capacity as your needs change. Pay for only

    what you use.

    Easy to implement: You donot need to purchase

    hardware, software licenses or implementation ser-

    vices.

    Servicequality:Cloudserviceprovidersofferreliable

    services, large storage and computing capacity, and

    24/7 service and up-time.

    Delegatenon-criticalapplications:Cloudcomputing

    provides a way to outsource non-critical applications

    to service providers, allowing agency IT resources to

    focus on business-critical applications.

    Alwaysthelatestsoftware:Youarenolongerfaced

    with choosing between obsolete software and high

    upgrade costs. When the applications are web-

    based, updates are automatic and are available the

    next time you log into the cloud.

    Sharingdocumentsandgroupcollaboration:Cloud

    computing lets you access all your applications and

    documents from anywhere in the world, freeing you

    from the connes of the desktop and facilitating

    group collaboration on documents and projects.

    Some key Cloud Computing trends:

    Increasingly organizations will leverage computing

    power from other organizations.

    Deviceandlocationindependenceenablesusers

    to access systems regardless of their location or

    what device they are using, e.g., PC, mobile.

    Multi-tenancy enables sharing of resources andcosts among a large pool of users, allowing for:

    Centralizationofinfrastructureinareaswithlower

    costs, e.g., real estate, electricity, etc.

    Peak-loadcapacity increases -- users need not

    engineer for highest possible load levels.

    Utilization and efciency improvements for sys-

    temsthatareoftenonly10-20%utilized.

    On-demand allocation and de-allocation of CPU,

    storage and network bandwidth.

    Performanceismonitoredandconsistent.

    Reliabilityisenhancedbywayofmultipleredundant

    sites, which makes it suitable for business continuity

    and disaster recovery.

    Scalability meets changing user demands quickly

    without users having to engineer for peak loads.

    Massive scalability and large user bases are com-

    mon, but not an absolute requirement for using

    Cloud.

    Sustainabilityisachievedthroughimprovedresource

    utilization,moreefcientsystems,andcarbonneu-

    trality.

  • 8/6/2019 The Future of Enterprise Information Technology

    17/22

    1

    Security typically improves due to centralization

    of data, increased security-focused resources, in-

    creased ability to patch and upgrade, increased abil-

    ity to monitor, increased ability to encrypt and many

    other reasons. However, there are concerns about

    loss of control over certain sensitive data. When de-

    signed in at the beginning, security of cloud architec-

    turesissignicantlyhigherthannon-cloudapproach -

    es. Enterprises requiring signicantly enhanced

    security should consider private clouds, where the

    data center is controlled by the enterprise vice out-

    sourced.

    Key players to track in this area include:

    VMware: Provides several technologies of critical

    importance to enabling cloud computing, and has

    also started offering its own cloud computing on de-

    mand capability called vCloud. This type of capability

    allows enterprises to leverage virtualized clouds in-

    side their own IT infrastructure or hosted with exter-

    nal service providers.

    Cisco: Has long provided the switch fabric of the In-ternet and the interconnect inside datacenters and is

    now offering enhanced collaborative tools and uni-

    edcomputingcapabilitiesthatbringthefoundation

    of cloud computing to any datacenter.

    Green IT

    Green IT is more than a movement, it is a path toward cost-

    savingsandefcienciesthatisdrawingtheattentionofde-

    cision-makers at all levels. For the federal enterprise there

    isnowaPresidtiallysignedanexecutiveorderforFederal

    Leadership in Envronmental, Energy, and Economic Per-

    formance. This order requires action by all agencies in

    many areas of energy performance, including IT. Agencies

    mustensureenergy-efcienciesofITinmeasurableways,

    As this executive order is implemented we can expect

    federal agencies to modernize to take advantage of new

    Green technologies.

    Thefundamentalsofbeinggreenfocusonefciencies.Be-ing green, in this context, means not wasting power, not

    wasting resources, and not polluting. Efciencies save

    moneyforyourorganization.Efcienciesalsocontributeto

    your organizations agility and ability to rapidly respond to

    shifting mission needs.

    Green Hardware Solutions You Need to Know

    Recently, Intel Corporation released their newest iteration

    of the Xeon Server Processor, the S5500 series. This chip,

    codenamed Nehalem, increases processing power but de-

    creases energy consumption. This chip allows for servers

    that require about half the power and run cooler then previ-

    ous architectures.

    The Xeon S5500 processors have almost 2x the process-

    ing power of the previous generation, and 9x the power of

    2005 processors. This means that to maintain processing

    power, 1 Nehalem server rack replaces 9 older ones. Need-

    ing 1/9th of the number of servers, means you need 1/9th

    of the power (at least!), 1/9th the space, and 1/9th of the

    number of licenses (think about 1/9 the Windows or Oracle

    licenses). Intel estimates that replacing 9 older server racks

    with just 1 Nehalem rack will pay for itself in 8 months. For

    rmsinterestedinTotalCostofOwnership,theS5500pro-

    cessor is a great boon.

    Another new technology is the Solid State Disk (SSD) hard

    drive. SSDs run cooler, faster, and require less power then

    traditional spindle drives. While they are currently more ex-

    pensiveperGBthanspindledrives,theirbenetsmakeup

    for the initial costs. SSDs transfer data at speeds up to 10x

    that of traditional drives. They do this without moving parts,

    creating less heat. Fewer moving parts also means less

    things to fail.

    A recent study done by Principled Technologies shows that

  • 8/6/2019 The Future of Enterprise Information Technology

    18/22

    18

    by replacing an array of HDDs with SSDs you can realize a

    97%powersavingsunderload,anda98%powersavings

    at idle. This is the difference in power consumed by the disk

    solution, not the difference consumed by the system. The

    systemwillconsumeanaverageof60%lesspowerwith

    a SSD solution. These power savings are very real, and

    thus these technologies can pay for themselves within a

    few short months, all the while increasing the IT capabilities

    of your organization.

    Software For Energy Efciency in IT

    Software is also driving the greening of the organization.

    The right software can save energy, reduce heat, and re-duce the number of servers required to do the same task,

    all of which are very green characteristics. The following is

    a sample of software that matters in this space:

    Verdiem: Verdiem empowers organizations to dramati-

    cally reduce their carbon footprints and their IT energy bills

    with a single, simple PC power management solution. This

    software establishes central control of the PC and then im-

    plements policy for power settings.

    VMWare: VMWare also offers signicant energy saving

    and productivity enhancing capabilities. Servers rarely use

    their full processing capabilities. VMWare creates the possi-

    bility of utilizing unused memory and processing capacity to

    createadditionalcomputers.Ifaseverisrunningat10%of

    itsworkload,usingVMwarecanletyourunvirtualservers

    in a way that maximizes the servers use. You might see,

    for example, an 8 to 1 reduction in the number of servers

    you need.

    For private clouds, which most organizations are building

    today, capabilities like Appistry can maximize the agility

    and scalability of your cloud. Appistry can turn your data

    center into a private scalable, automated cloud environ-

    ment which can deliver green capabilities you need today.

    Appistry does not replicate Google Apps, but the applica-

    tions you run in your data center will be made more scalable

    and will be managed in a smarter way.

    Increasingly federal mandates will drive green. But there

    are actually even more powerful reasons to rush towardsgreen computing. Modernizing and optimizing your IT infra-

    structure will reduce your costs and make your organization

    more efcientwhile helping you meet goalsfor reducing

    your carbon footprint. Our bottom line recommendation:

    consider all these green technologies as part of your mod-

    ernization efforts. And it goes without saying, we hope your

    organization is able to rapidly accelerate your green plans,

    for all our sakes.

    Summary

    The many areas of information technology reviewed above

    -- Storage, Communications, Search, Discovery, Applica-

    tions, Virtualization, Open Source, Security Technologies,

    Collaboration Technologies, Web2.0 and Social Media,

    GEOINT tools, Visualization and Cloud Computing -- will

    interact with each other in interesting and exciting ways. We

    can now envision an enterprise where mobile users have

    bandwidth supporting the highest quality video and incred-

    ible data to mobile devices, connecting them securely toenterpriseswithseeminglyinniteabilitytostoredataand

    easily navigable interfaces to discover the relevant mean-

    ing of the data. Enterprise users will be served with ap-

    plications that meet their needs while being interoperable

    with all other applications and media. These applications

    will meet CIO goals for maintainability. The enterprise cloud

    will deliver increasing bang for the buck with increasingly

    optimized, energy efcientdatacenters.Andsecuritywill

    be thought of as the key way to deliver on the promise of

    assured functionality. Collaboration will increasingly link hu-

    mans together in ways that serve the mission. And all of

    this, if done right, will be done with far greater agility and

    ability to respond.

  • 8/6/2019 The Future of Enterprise Information Technology

    19/22

    1

    Drawing Lessons From theFuture of IT

    The future is here, its just not evenly distributed yet.

    -- William Gibson

    The mega trends review and deeper dive into functional

    areas above lead to some key conclusions and recommen-

    dations relevant to todays enterprise. The primary conclu-

    sion: Brace yourself! Your world is about to change.

    Other conclusions: IT power is increasing in a relentless

    march, and so is bandwidth. Human nature says there will

    always be more requirements than capability so IT profes-sionals will always be optimizing what is provided. Doing

    that will require constant learning, constant adjustment, and

    constant planning. It also requires an understanding of what

    your enterprise is building on.

    Consider your current environment. If you are in the classic

    large enterprise you have probably seen incredible contri-

    butions of technology to support your mission. The list of

    eldedenterprisecapabilities islarge.For mostitwill in-

    clude things like:

    Global directoriesofall inthe enterprise andtheir

    contact information.

    Extremelyreliablevoice,videoande-mailconnectiv-

    ity.

    Durable, resilient enterprise datastores giving pro-

    tection to most key enterprise data.

    Manymissionspecicapplications.

    Portalswhichhelpmakesenseforusers.

    But most large enterprises also face huge challenges,

    which may include:

    EveryenterprisehassomeonewithCIOorCTOor

    J6/etc-6 title, and there are frequent overlaps and

    gaps in authority and responsibility.

    Customized, complex applications many designed

    locally, are not well managed or backed up.

    Limitlessuserinterfaces,eachdesignedforcustom-

    ized, complex applications which are hard to teach

    users how to use.

    Proprietary datastores with business logic coded

    into the datastore, making interoperability hard to im-

    pose.

    ServersboughtandownedbylocalITdepartments,

    makingfutureplanningawkwardandinefcient.

    Desktops bought and owned by local IT depart-

    ments, introducing conguration nightmares and

    slowing agility.

    Desktopsloadedandconguredindividuallyorbylo-

    cal IT, placing high burdens on IT staff.

    Inefcient Datacenters driving enterprise costs up

    while sub optimizing performance.

    Largepowerbillsforlargedatacenters.

    LocalITdepartmentsincreasinglyinefcient.

    Attemptstosatisfyneedsofmobileusersaredifcu-

    ly given the variety of devices and de-centralization.

    Knowledgeworkerswho need automation but get

    poor IT service.

    NounderstandingofthefutureofIT,sonoabilityto

    plan.

    Poorabilitytosearch,poorabilitytodiscover.

    So we have had at least a little glimpse of what is coming

    and we have a working knowledge of what we have now.

    So how do we accelerate the good into the enterprise?

    What does our review motivate us to do?

  • 8/6/2019 The Future of Enterprise Information Technology

    20/22

    20

    If you are primarily an IT user or customer, this review of

    the future provides several considerations for how you can

    articulate requirements for future systems.

    If you are a CTO, CIO or other IT leader, this review can

    help you re-invigorate your strategic planning. Some sug-

    gestions:

    Plan now to enhance agility. The most important

    agility is in the ability to analyze whether or not a

    proposed capability or new technology will actually

    result in a net gain in productivity and mission capa-

    bility.

    Alsoofimportance,butofasecondaryimportanceto

    the above, is enhancing the ability to adopt new tech-

    nologies.Wemustalsospeedtheabilitytocongure

    existing technology.

    Somemorespecicrecommendationsfortechnologists:

    Findandeliminateapplications/solutionsthatarenot

    delivering required functionality or that can be termi-

    nated for other reasons.

    Findandeliminateunneededworkbeingaskedof

    government or contract positions and refocus those

    positions on things that contribute to agility.

    Enhanceliaisonandinteractionswithotherstoen-

    hance agility, support to customers on starved nets,

    and to avoid tech disruption. Interdependence will be

    an enduring requirement.

    Forthegovernmentteam,linkagestoDISAarecriti-

    cal because of the challenges of disseminating intel-ligence to users in comms starved environments.

    Thepotentialfordisruptivetechnologyfromindustry

    or academia (including DNA computing or quantum

    computing) is high during the planning period so a

    continuedtrackingofthoseeldsiscriticallyimpor-

    tant.

    Refocus job skills to emphasize communications

    and enterprise storage management. Retain exper-

    tise in all enterprise IT technologies, but the mix of

    technologists should shift to include more advanced

    network engineers and more enterprise storage

    technologists. These disciplines will become as im-

    portant to us in the future as enterprise systems en-

    gineers are today.

    Builda ve year roadmap for enterprise manage-

    ment capabilities and related enterprise visualization

    systems. All technology disciplines must have views

    into the state of the enterprise to ensure mission fo-

    cus and agility.

    The increase in virtualization and the increase in

    automation will make IT failure an even more costly

    proposition. This will drive the need for more com-

    plex enterprise modeling and simulation technolo-

    gies.

    Plan now for increased engagement in the open

    source technology community. If we are using open

    source, widely known, multiple author software weshould be involved in ensuring its quality.

    Speed the conversion of legacy applications and

    tightly coupled data to SOA-type model where data

    is separated from application.

    Plannowforredesignofgovernmentnetworks(in-

    cluding NIPRNET, SIPRNET, JWICS) to use new

    networking standards to ensure operation of the grid

    at the highest possible capacity.

    Engineer for enhanced wide area wireless Secret

    and SCI capability. Which solution do we scale up?

    WiMAX?

    PlannowtoshiftmoreITworkerstobeuser-facing.

    Pure IT know-how will no longer be enough. IT work-

    ers will require strong leadership ability, knowledge

  • 8/6/2019 The Future of Enterprise Information Technology

    21/22

    2

    of their non-IT partner mission needs, and knowl-

    edge of the processes of their customers.

    Security will be a continuing concern. New tech-niques and tools are required to mitigate new threats,

    especially new threats regarding open source in the

    enterprise. Multi-level security and cross domain are

    enduring requirements.

    Investigatenewwaysofencryptingdataandidentity

    management to enable better use of grid computing

    and to enable better use of commercial off the shelf

    devices.

    Automatewithbrutalefciency.Ifitcanbeautomat-

    ed, automate it.

    Concluding Thoughts

    Many things are uncertain about the future. But one piece

    of timeless advice keeps returning to the discussion: The

    greatest determinant of what comes next is the decisions

    we make today.

    If you are a user of IT, I recommend you get vocal about

    your expectations and requirements. That can do wondersin accelerating new realities into today. If you are an enter-

    prise CTO, CIO or other technologist, I recommend you get

    busy helping your users understand the realm of the pos-

    sible. Their advocacy and support can help you transform

    your enterprise faster, which can help in meeting the ever

    increasing mission needs.

    KeepseekingoutdisruptiveIT

    Maintainfocusonuserandthemission

    Andanalnote:Areminderthattechnologyischanging

    fast. Whoever you are and whatever your role is in the en-

    terprise,youshouldseekoutandndwaystoselfeducate

    yourself on the changing landscape. An avenue that I hope

    factors into your self awareness plans is the http://ctovision.

    com website.

  • 8/6/2019 The Future of Enterprise Information Technology

    22/22

    About CTOvision.com

    TheCTOvision.comblogprovidescontextfortheenterpriseChiefTechnologyOfcer(CTO),ChiefInformationOfcer

    (CIO) and other enterprise technologists. It is home to the CTOvision.com Disruptive Technologies list, which reviews

    disruptive innovations thought to be most relevant to todays enterprises. The site also contains information and context

    onthelargesttechnologyrmsandmaintainsaTechnologyTitanlistforreference.

    About The Author

    Bob Gourley is the primary blogger at CTOvision.com and is the founder and

    ChiefTechnologyOfcer(CTO)ofCrucialPointLLC,atechnologyresearchand

    advisoryrm.HeisaformerCTOoftheDefenseIntelligenceAgency(DIA)anda former senior executive with Northrop Grumman. He was named one of the

    top25mostinuentialCTOsintheglobebyInfoworldin2007,andselectedfor

    AFCEAs award for meritorious service to the intelligence community in 2008.

    HewasnamedbyWashingtonianasoneofDCsTechTitansin2009.Bob

    holdsthreemastersdegreesincludingamasterofsciencedegreeinscientic

    and technical intelligence from Naval Postgraduate School, a master of science

    degree in military science from USMC university, and a master of science degree

    in computer science from James Madison University. Bob has published over 40

    articles on a wide range of topics and is a contributor to the 20 Jan 2009 Book

    titledThreatsintheAgeofObama.