Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Malaysia: Look Ahead to 2012 - Part 1

AvantiKumar | Jan. 4, 2012
Computerworld Malaysia presents a 'virtual roundtable' of opinions from Malaysian industry practitioners and vendors on what we can expect in 2012.

The applications portfolio also has increased in size, leading to the current challenge of application "sprawl" or "bloat." The average Fortune 100 Company has 35 million lines of code, a number that is growing at 10 percent per year. This ageing and "bloated" applications portfolio, coupled with the challenges set by new delivery models such as mobile and cloud computing, requires appropriate application transformation strategies to be executed. Application transformation therefore remained a key priority project for enterprises in 2011.


 Outlook for 2012

The technology that drives so many of the systems in the IT world today is at a critical juncture. In the next five years, everything from mobile devices and applications, to servers and social networking, will impact IT in ways that companies will need to prepare for now!


 Big Data and Next-Generation Analytics

Big data has quickly emerged as a significant challenge for IT leaders. Unstructured data will grow at 80 percent over the course of the next five years (Gartner). Enterprises struggle with managing big data, especially when considering the volume and types of data generated by businesses in today's information economy. Today, enterprises analyse more than a petabyte of data in real time.

In early 2011, HP completed its acquisition of Vertica Systems, a real-time analytics platform company. With Vertica's real-time analytics platform, HP can deliver to clients the ability to concurrently load and analyse data, allowing customers to turn information into insight and a competitive advantage at the speed of business. Only a few months ago, HP announced the latest version of the Vertica Analytics Platform, which offers greatly improved flexibility and real-time performance for customers' most demanding business intelligence and analytic workloads.

Clearly big data and next-generation analytics will continue to be top technology priorities for CIOs and business leaders of enterprises going into 2012.



The benefits of server virtualisation, which include higher server utilisation, high availability and disaster recovery, are well understood. And customers generally find that utilisation efficiency improvements and reduced expenses are easier to quantify with server virtualisation. The big trend that is now emerging is from deriving significant additional benefits by virtualising beyond servers.

In order for businesses to grow, they have to address the escalating issue of data and hardware sprawl that drains needed resources. Converged infrastructures can break down this sprawl and the technology islands of disparate resource pools. This requires customers' virtualisation efforts to span across the entire data centre - from servers to storage - through consolidated "shared data" architecture. Those that do will be rewarded with greater benefits than the traditional 'siloed' approaches.


Enterprise Security

Bring-your-own-technology policies at work are becoming the norm, not the exception. With that come security and management challenges that IT need to be addressed. There are more security products out in the market addressing security at end points and network perimeters as well as each level of the technology stack. But with the volume and complexity of security threats continuing to escalate, companies are finding that security breaches have increased, and they still need to increase security budgets. According to an HP commissioned Ponemon survey, during a four-week period, organisations surveyed experienced an average of 72 successful attacks per week, an increase of nearly 45 percent from last year. What companies need is to establish a more sustainable approach to managing security and risk. At HP, our Enterprise Security Solutions framework addresses this need by delivering overarching information security management capabilities coupled with modern security operations centers and technologies that provide actionable security intelligence.


Previous Page  1  2  3  4  5  6  7  8  9  10  11  12  Next Page 

Sign up for Computerworld eNewsletters.