Gartner has identified the top 10 strategic technology trends for 2015 and beyond. Each of these will likely be very disruptive to the business, end users, or IT; require a major investment; or pose a risk if adopted late. In other words, they will affect organizations’ long-term plans, programs, and initiatives.
The trends cover three themes: “the merging of the real and virtual worlds, the advent of intelligence everywhere, and the technology impact of the digital business shift,” explained David Cearley, vice president and Gartner Fellow.
The top 10 trends are as follows:
- Computing Everywhere – The focus will shift to mobile users as opposed to mobile devices only.
- The Internet of Things (IoT)
- 3D Printing – Worldwide shipments of 3D printers are expected to grow 98% in 2015 and double in 2016.
- Advanced, Pervasive, and Invisible Analytics – Organizations will need to focus analytics as the volume of data coming from the IoT, social media, and wearable devices explodes in order to deliver exactly the right information to the right person at the right time.
- Context-Rich Systems – “By understanding the context of a user request, applications can not only adjust their security response but also adjust how information is delivered to the user…”
- Smart Machines – The application of deep analytics to an understanding of context will ultimately lead to a world of smart machines. Gartner predicts this era will be the most disruptive in the history of IT.
- Cloud/Client Computing – The focus will be on synchronizing content and applications across multiple devices.
- Software-Defined Applications and Infrastructure – Computing will need to become more dynamic and less static in order to deal with the rapidly changing demands of digital business.
- Web-Scale IT – Expect more organizations to begin thinking, acting, and building applications and infrastructures like Amazon, Google, and Facebook.
- Risk-Based Security and Self-Protection – Once organizations realize that 100% secure environments are impossible, they can begin to apply more sophisticated risk assessment and mitigation tools.