...Gartner's 2012 Hype Cycle for Emerging Technologies Identifies "Tipping Point" Technologies That Will Unlock Long-Awaited Technology Scenarios 2012 Hype Cycle Special Report Evaluates the Maturity of More Than 1,900 Technologies Big data, 3D printing, activity streams, Internet TV, Near Field Communication (NFC) payment, cloud computing and media tablets are some of the fastest-moving technologies identified in Gartner Inc.'s 2012 Hype Cycle for Emerging Technologies. Gartner analysts said that these technologies have moved noticeably along the Hype Cycle since 2011, while consumerization is now expected to reach the Plateau of Productivity in two to five years, down from five to 10 years in 2011. Bring your own device (BYOD), 3D printing and social analytics are some of the technologies identified at the Peak of Inflated Expectations in this year's Emerging Technologies Hype Cycle (see Figure 1). Gartner's 2012 Hype Cycle Special Report provides strategists and planners with an assessment of the maturity, business benefit and future direction of more than 1,900 technologies, grouped into 92 areas. New Hype Cycles this year include big data, the Internet of Things, in-memory computing and strategic business capabilities. The Hype Cycle graphic has been used by Gartner since 1995 to highlight the common pattern of overenthusiasm, disillusionment and eventual realism that accompanies each new technology and innovation. The Hype Cycle Special Report is updated annually to track technologies...
Words: 1510 - Pages: 7
...ANSWER SHEET Course Code: | | Course Title: | | Student ID: | | Name: | | Location: | | Task 1: As a consultant, decide to use a a systematic approach to help Spinneys – the famous retail chain to expand their customer outreach in Dubai in line with the 3 directions given by Spinneys. 50 marks. Spinneys is a super-market chain in the Middle East which began as railway provision merchants in 1924, and expanded to a grocery firm importing British Empire goods to the Mandate Palestine. Spinneys’ Dubai chapter started in1961, with the first super-market opening in Al-Nasr Square in 1962. Today it operates multiple supermarkets in the Middle East. 1 The task entails proposing Spinneys to launch a non-typical online delivery model to expand customers outreach in Dubai by utilizing the time people spend in metro stations, bus stops and similar places to order products from the store via QR-Code technology or any other suitable technology in those lines. The first constraint laid out by Spinneys is to utilize the time people spend while waiting at metro stations, bus-stops and other waiting times to order online which they could implement was through online shopping facility. The second constraint was to use QR codes for this initiative and the third constraint was that they did not want to invest in own data centers for any computing requirements. My proposal in line with this constraint would be to provide 1. e-koisk with touch screen at metro stations...
Words: 1934 - Pages: 8
...hossain Flash Research Assignment MIS 2501-002 Date: 02/25/2013 Virtualization and Cloud Computing As CTA of our growing manufacturing company, I believe there are considerable opportunities for savings by utilizing virtualization to consolidate server workloads. If we utilize virtualization, we could save up to 11,500,000 dollars in server costs after three years. The costs of our current servers are too high but, using virtualization, our company would benefit by reducing costs and the number of servers. Virtualization is the abstraction of IT resources, such as servers, that masks the physical nature and boundaries of those resources from resource user. Abstraction enables better flexibility, which enables better efficiency. An example of this would be through consolidation. If our company were to consolidate server workloads, instead of having 1000 servers in our datacenter, we would have 10 physical servers in one virtual machine server. This would come to a total of 100 virtual machine servers, instead of the 1000 that we currently run on. Even though the costs of these higher end servers are greater, we would still greatly benefit. To a provider, virtualization creates the flexibility to deliver resources to meet service needs in very flexible, elastic, rapidly changing manner. Virtualization makes it easier for IT to deliver IT capabilities faster, to have a lower barrier to access IT capabilities, and to deliver exactly the right amount of resources needed. Virtual...
Words: 515 - Pages: 3
...I believe the one technology that could have the greatest impact on enterprise architecture in U.S. corporations by 2023 is cloud computing. As indicated on the hype cycle for emerging technologies in 2013, it currently is in the trough of disillusionment; however, I believe that cloud computing will bring about the most change to enterprise architecture by 2023. Cloud computing will have the ability to bring enterprise architecture a step forward and redefine the way businesses will support their architecture. As cloud computing evolves, as will enterprise architecture in the way that advanced concepts and practices will eventually be deemed as government requirements. By 2023, I anticipate that most, if not all, companies will be using a cloud platform where it will be used on multiple devices – this brings attention to EA as it will make it more challenging to standardized personal devices. BYOD will become a more relevant option with increased capabilities, like scalability and using software as a service through the cloud, impacting the way EA is integrated in an organization. The shift in enterprise architecture will also stem from the control needed from cloud computing. Currently, when companies move to cloud computing, they are essentially handing control over the design parameters of the enterprise. As a result, the role of the enterprise architect will become obsolete as the responsibilities were to build and maintain a stable model for the business. The...
Words: 382 - Pages: 2
...behavior. Machine Learning, at the heart of it, works on this very premise. All the data in the world is of little use if are unable to devise a way to extract meaningful information from it, which can aid us making effective and efficient decisions. Machine Learning is what facilitates this, and it is for this very reason that Gartner, a leading market and technology research firm, has replaced Big Data with Machine Learning in its 2015 Hype Cycle Report of Emerging Technologies. Gartner's Hype Cycle, introduced in 1995, characterizes the typical progression of innovation, from overenthusiasm through a period of disillusionment to an eventual understanding of the innovation's relevance and its role in a market or domain. The Hype Cycle is a graphical depiction of a common pattern that arises with each new technology or innovation. Hype Cycles help technology planners to decide when to invest in a technology. They are important for organizations deciding which new technologies to adopt and when, and what actions should be taken by strategic and technology planners based on their knowledge of the Hype Cycle. If one observes the 2014 and 2015 Hype Cycles closely, it will not escape notice that not only has Machine Learning replaced Big Data, it has also been included in the ‘Peak of Inflated Expectations’ region, which signifies that the expectations of Machine Learning will rise above the current reality of its capabilities. In the light of such revelations, it is perhaps wise...
Words: 1614 - Pages: 7
...Information Systems Dissertation The Impact of Cloud Computing on Small and Medium Sized Enterprises. Word Count: 12,497 Abstract In recent years a new computing paradigm has emerged: Cloud Computing. Whilst there seem to be an endless number of definitions for this new term, including one by the National Institute of Standards and Technology (NIST) that is nearly 800 words long, nobody seems to be able to settle on a true characterisation of the subject matter. In its simplest form cloud computing can be described as IT-as-a-service. Instead of building your own IT infrastructure to host databases or software, a third party hosts them on their own servers. Companies have access to their data and software over the internet (which in most diagrams is depicted as a cloud). However, is this new paradigm simply a new term for something we are already doing or is it truly going to change the future of IT as we know it? This dissertation investigates the phenomenon commonly known as cloud computing, focussing closely on its impact on small and medium sized enterprises (SME’s), and ultimately attempts to assess the future of cloud computing. The research throughout this paper is based solely on secondary research. No primary research into the topic area has been made. In order to gain a broad view and understanding of the topic various existing papers and studies, on the topic of cloud computing and technology adoption within SME’s, have been studied and critiqued...
Words: 18031 - Pages: 73
...1. Introduction In order to gain a competitive edge an organisations should continuously adopt technologies that would ensure that the company is always ahead of its competitors. Technology, especially in the field of Information technology is changing at a rapid rate. The challenge that most organisations are facing is whether to adopt new technology that hasn’t been proven or adopt technology that has been proven as a success. Both of them have risks linked to them. Adopting unproven technology there is a risk loss of money in the event that the technology is a failure but if technology is a success it might give the company a competitive edge. Adopting a proven technology there is less risk of the company losing money but competitors would have taken advantage of that technology already. Cost is also a factor that needs to be taken before the company could adopt a certain technology; cost benefit analysis should be done. In the report the following topics will be discussed: * The new trends in software and service distribution * Social networking tools * Virtual reality * Biometrics * The new trends in networking and * Nanotechnology The report aims to advice Eskom on what actions should be taken with regards to the above technologies. Eskom is a state owned utility that supplies about 95% of electricity in South Africa. The company owns massive assets such as power stations (coal fired, nuclear, hydro, pump storage and wind turbines), transmission...
Words: 4362 - Pages: 18
...A strategic approach to disruptive technologies 1 A strategic approach to disruptive technologies Disruptive change requires new strategies. When conditions change rapidly, organisations find their former approaches which have led to success in the past, are no longer effective. It can be hard to let go of these approaches if they have been a source of competitive advantage. This leads many managers to assume that successful responses to disruptive change are a matter of luck. But it is possible to craft strategies to best exploit opportunities ahead of the competition. Disruptive technologies/ disruptive innovations Harvard professor Clay Christensen coined the term disruptive technology, which he later renamed disruptive innovation. He identified that it was not the technology itself which was disruptive, but its impact on strategy or business models. Christensen’s theory developed the previous body of literature about discontinuity of organisational change. In summary: 1. A disruptive technology emerges. Initially it cannot match the performance of the existing dominant technology, on the factors which customers traditionally value. 2. The distinctive features of the disruptive technology are valued by a small fringe segment of customers, and increasing numbers of new customers. It is also typically cheaper, simpler, smaller or more convenient. 3. Incumbent players in the market conclude that investment in the disruptive technology is irrational, since their most...
Words: 1351 - Pages: 6
...Consumer 3D Printing | | | | | Index SR.NO. | TITLE | PAGE NO. | 1 | What is 3D Printing? | 3 | 2 | History of 3D Printing | 3 | 3 | 3D Printing and Gartner Hype Cycle | 4 | 4 | 3D Printing Today | 4 | 5 | Impact of 3D Printing | 6 | 6 | Achilles’ heel of 3D Printing | 7 | 7 | Future of 3D Printing | 7 | Consumer 3D Printing “3D printing has the potential to change everything” * Former Ship Engineer What is 3D Printing? The process of making a three-dimensional solid object of virtually any shape from a digital model is 3D printing. It is also known as Additive manufacturing. Using an additive process successive layers of material are laid down in different shapes. 3D printing is different from traditional machining techniques, which mostly rely on the removal of material by methods such as cutting or drilling (subtractive processes). A materials printer usually performs 3D printing processes using digital technology. 3D Printers have evolved to make a variety of objects using a laser or extruder (the material output part of the printer, best described as a futuristic hot glue gun) that move along an X, Y and Z axis to build an object in three dimensions, layer by layer, sometimes only microns thick at a time, depending on the desired resolution of the object. History of 3D Printing This technology was called Rapid Manufacturing; a term coined by inventor S. Scott Crump who founded Stratasys in the late 1980′s. During the...
Words: 944 - Pages: 4
...Technology Management is set of management disciplines that allows organizations to manage their technological fundamentals to create competitive advantage. Typical concepts used in technology management are technology strategy (a logic or role of technology in organization), technology forecasting (identification of possible relevant technologies for the organization, possibly through technology scouting), technology roadmapping (mapping technologies to business and market needs), technology project portfolio ( a set of projects under development) and technology portfolio (a set of technologies in use). The role of the technology management function in an organization is to understand the value of certain technology for the organization. Continuous development of technology is valuable as long as there is a value for the customer and therefore the technology management function in an organization should be able to argue when to invest on technology development and when to withdraw. Technology Management can also be defined as the integrated planning, design, optimization, operation and control of technological products, processes and services, a better definition would be the management of the use of technology for human advantage. The Association of Technology, Management, and Applied Engineering defines Technology Management as the field concerned with the supervision of personnel across the technical spectrum and a wide variety of complex technological systems. Technology...
Words: 474 - Pages: 2
...Anthony Wataka Accounting Information Systems Information Security Management within ERP Systems Research Paper Introduction This paper will discuss research on Information Security Management (ISM) within Enterprise Resource Planning (ERP) Systems since information security continues to be a hot topic in the business world. The major focus of the paper will be threefold: an analysis of the ERP systems in the present day, a relation of these systems to the accounting and auditing world, and finally, the future of the technology, given its vast impact in the business world. Notable ERP Systems Research Key research pertinent to this paper includes the works of Grabski et al. (2011) who discuss various issues relating to the security environment, as regards the ERP systems. They talk about the risk associated with ERP systems implementation and define it as a “problem that has not occurred but has the potential to cause loss” (Grabski et al. 2011, p. 55). They mention that there is a need for ERP audit techniques, such as embedded audit modules, to control security risks (2011, p.55). This paper will utilize their research work to analyze auditing in an ERP environment by examining security risks and internal controls after ERP implementation. Additionally, Hunton et al. (2004) try to address the issue of risk associated with ERP systems, in the context of auditing (p.1-23). Hunton et al. (2004) analyze how financial auditors compare ERP systems related risks to...
Words: 6202 - Pages: 25
...Table of Contents Executive Summary ....................................................................................................................... 5 1. Introduction ............................................................................................................................... 7 1.1 Why is an Australian Government Cloud Computing Strategy required? .......................... 7 1.2 Objective .............................................................................................................................. 9 1.3 Audience .............................................................................................................................. 9 2. What is Cloud Computing? ...................................................................................................... 10 2.1 Types of Cloud Computing................................................................................................. 12 2.2 Cloud Service Capability .................................................................................................... 13 3. Potential Risks and Issues of Cloud Computing ...................................................................... 14 4. Potential Business Benefits of Cloud Computing for Australian Government Agencies ........ 17 5. Potential Opportunities of Cloud Computing for Australian Government Agencies .............. 19 6. Australian Government Cloud Computing Policy .......................................
Words: 801 - Pages: 4
...CLOUD TECHNOLOGIES TO APPLY IN COUNTRYPAL INTRODUCTION CLOUD/WEB PLATFORM Cloud computing offers business owners like countrypal an opportunity to take their businesses to the next level without having to invest heavily. The entire foundation of cloud computing is based on Iaas or Infrastructure as a Service, which extensively deals with providing the hardware in a cloud. This includes servers, routers, network equipment, firewall etc. However, all this hardware is of no use without a platform to help developers develop their applications, based on which the businesses can actually operate. Cloud computing platforms, which are otherwise known as Platform as a Service (PaaS), are therefore the middle level of cloud computing, which is extremely important for businesses to utilize the infrastructure and software that are available in the cloud. In order to make the most out of cloud computing platforms, irrespective of whether you are a business owner or a developer, it is important to understand the various aspects of this middle layer. Here is a brief overview of this aspect of cloud computing. When a business requires an application to be developed for its use, usually developers invest a lot of money into gathering the requisite infrastructure for its onsite development. But with cloud computing platforms, they can be delivered on the web. So, you can easily develop your applications without investing heavy amounts of money into buying software and other necessary tools for...
Words: 1611 - Pages: 7
...TRANSVOYANT How to Minimize Supply Chain Risk with Threat Awareness and Thwarting The Situationally Aware Supply Chain™ Strategy Guides www.transvoyant.com How to Minimize Supply Chain Risk with Threat Awareness and Thwarting Table of Contents 2 INTRODUCTION 4 MODIFYING BEHAVIOR 6 OPTIMIZING DATA STREAMS 7 ASSESSING RISK 8 DOD INSIGHT 9 FINAL WORDS www.transvoyant.com 1 How to Minimize Supply Chain Risk with Threat Awareness and Thwarting Introduction to Supply Chain Risk Management Every enterprise must make supply chain risk management one of its core competencies. Yet few understand precisely the extent to which their supply chains are at risk, on which fronts, and least of all, how to address those threats. In fact, most feel far more in control than they are, with a persistent fog preventing visibility into how interdependent key risk variables impact their supply chain. A successful supply chain risk management strategy based on a unified platform is the only way to keep up with shifting risk zones. The platform must be agnostic with respect to point solutions that address specific challenges (e.g., vertical A or geography B), and flexible enough to cross correlate those solutions’ data in a way that drives behavior to minimize supply chain risk and take advantage of supply chain opportunities: • Geographic – terrorism; weather; natural disasters; geopolitical instability; privacy and trade route disruption, among others; ...
Words: 1396 - Pages: 6
...SPECIAL ISSUE: BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research...
Words: 16335 - Pages: 66