Trends Identified
User Empowerment
The end-user renaissance forces a disruptive shift in IT In their personal lives, business users are enjoying a technology renaissance that continues to deliver simple, elegant and often innovative technology products. Then they come to work expecting the same experience. To meet those expectations, IT leaders should understand and deliver capabilities that engage each key persona of their users, enabling a given role in the way they actually perform their job. But it shouldn’t stop there. The real trick is envisioning how emerging technologies and new form factors can improve how work actually gets done. Enterprise users are clamoring for mobile and social enablement – collaboration, information and insight wherever, whenever. They’re looking to leave behind the legacy “point, click, type” world for one of “touch, swipe, talk and gesture,” and they won’t hesitate to go around central IT to get the capabilities they need. The CIO must envision the digital future and deliver the empowered present.
2012
Tech Trends 2012-Elevate IT for digital business
Deloitte
Hyper-hybrid Cloud
Adoption moves from cloud to clouds, and hybrid emerges as a dominant model As cloud offerings added vertical business capability offerings to the horizontal IT capacity services, the adoption question changed from “if” to “when” – and the answer is frequently “now.” Along the way, leading organisations moved from cautious exploration to the reality of multiple individual cloud offerings handling critical pieces of their business operations – and sourced from multiple public and private providers. In each instance, these offerings needed to be connected back to the core of the business, often through traditional data-driven on-premise integration solutions. Advance one step further, and the organisation is managing both exception and routine workflow across a growing range of disparate cloud offerings with point-to-point links to legacy systems and data. This shift from “cloud” to “clouds” provides new opportunities, but it also brings challenges beyond just integration – security, data integrity and reliability, and business rules management for business processes that depend on enterprise IT assets composed with one or more cloud services. Welcome to the world of hyper-hybrid cloud.
2012
Tech Trends 2012-Elevate IT for digital business
Deloitte
Big Data Goes to Work
The competition between big data and traditional enterprise data is over: they both win Just as businesses start to appreciate information as a strategic asset, they are overwhelmed with big data – from growing volumes and increasing complexity to the proliferation of unstructured data sources and a surge in external data streams. Internal and external, structured and unstructured. Volume. Variety. Velocity. But where’s the fourth V for Value?
2012
Tech Trends 2012-Elevate IT for digital business
Deloitte
Geospatial Visualisation
Where matters The human brain is naturally wired to process visual images by recognising patterns, inferring relationships and discerning features. Analytic visualisation connects these perceptual and cognitive strengths with modern statistical computing capabilities and can enable decision makers to pull significant results quickly out of tremendous volumes of complex and diverse data. In turn, connecting this data to geography is key to building compelling visualisations from diverse information sources.
2012
Tech Trends 2012-Elevate IT for digital business
Deloitte
Digital Identities
Managing identity in an increasingly digital world The digital expression of identity grows increasingly complex every day. Not so long ago, an employee’s entire digital presence belonged almost exclusively to the employer, a practice that culminated in the mainframe ID. As enterprise technology expanded to include new tools and platforms, the number of digital identities grew. Today, many workers must manage a dozen or more user names and passwords across different roles on different systems to do their jobs.
2012
Tech Trends 2012-Elevate IT for digital business
Deloitte
Measured Innovation
Innovation is shifting from “eureka” to an institutional discipline Innovation has long been accepted as an important driver of modern economic development. From economist Joseph Schumpeter’s work in the 1940’s1 to Clayton Christensen’s more recent research2 to conventional wisdom about technology’s meteoric impact on our daily lives. Corporations have taken note – recognising that effective innovation can create new market value, drive efficiencies, extend the lifecycle of products and services, and help launch new business models. Emerging technology is a continuing source of potential for innovation in business, and the CIO is the executive to deliver on that opportunity. Sounds great. But how?
2012
Tech Trends 2012-Elevate IT for digital business
Deloitte
Outside-in Architecture
Finding the sweet spot between ‘need to share’ and ‘need to own’ For decades, businesses have typically been rewarded for consolidation around standard processes and stockpiling assets through people, technology and goods. Operations were assumed to be confined within organisational boundaries, with transactions viewed as short-lived events following well-defined steps. Systems were built primarily to enhance execution within their own self-contained scope of control. Conventional wisdom about these principles is changing, and it’s changing fast. Flexibility in operating and business models today is emerging to be a key differentiator. Markets and business conditions are shifting rapidly, necessitating new capabilities that can adapt to changing players, rules and desired outcomes. Sustaining innovation, both inside the organisation and within broader ecosystems, is emerging as a top priority. Many companies are discovering they need a new kind of leverage – capability leverage – to mobilise third parties that can add value. As a result, the traditional need to own is colliding with the emerging need to share, shifting solution architectures away from a siloed, enterprise-out design pattern. These new architectures are designed to anticipate service and people dependencies from the outside – and to require that data and systems be encapsulated for external consumption. Outside-in, not inside-out, is becoming the standard.
2012
Tech Trends 2012-Elevate IT for digital business
Deloitte
Visualization
See, discover and explore deeper insights within large, complex data sets Enterprises move into 2011 with information at the forefront of their agendas. According to a recent Gartner survey, increasing the use of information and analytics is one of the top three business priorities1 . Data volumes continue to explode, as unstructured content proliferates via collaboration, productivity and social channels. And while organizations are making headway on enterprise information management and broad analytics solutions, much potential insight is buried within static reports that are accessible only by a small fraction of the organization2 .
2011
Tech Trends 2011 The natural convergence of business and IT
Deloitte
“Almost-Enterprise” Applications
Quick and agile solutions appeal to the business, but are they “enterprise enough” for IT? Business units have historically had a love-hate relationship with IT. In the early days, IT was an esoteric specialty, far removed from core business competencies yet consuming a big piece of the budget. IT was often seen as unresponsive, expensive or fl at-out ineffective, but business leaders saw no other choice for essential process and information automation. IT was left to balance these harsh perceptions with the practical reality of providing secure, reliable and scalable solutions with zero tolerance for fault or failure.
2011
Tech Trends 2011 The natural convergence of business and IT
Deloitte
Cyber Intelligence
Protecting vital information assets demands a full-spectrum cyber approach In 2010, security and privacy graduated from IT department concerns. C-suites and boardrooms took notice of highly visible incidents, ranging from malwareinfected motherboards from top-tier PC manufacturers1 , to information theft from a leading cloud provider2 , to the manipulation of the underlying routing tables of the internet, redirecting traffic to Chinese networks3 . At the same time, the regulatory environment around sensitive data protection has become more rigorous, diverse and complex. Organizations are aware of the shifting threat profile and are working to deal with technical barriers as well as sophisticated criminal elements. Incidents are increasingly originating in the trust vector – due to inadvertent employee behavior via the sites they visit, the posts they access on social media sites or even the devices they bring with them to the workplace. A “protect-the-perimeter and respondwhen-attacked” mentality is no longer sufficient.
2011
Tech Trends 2011 The natural convergence of business and IT
Deloitte