- The enterprises are making different plans within 5 years for the same reason: If the plan is feasible, the business will achieve its goals. The plan set forth will allow enterprises to define priority solve different tasks, as well as creating opportunities for enterprises to deal with unexpected difficulties arise.
It is certainly the construction of a 5-year plan for the entire information technology industry will be more difficult, to do better than this plan is to start from the consideration of requests from professionals information technology, who outlined the plan and make them each day. Here are eight issues that need information technology sector faces in the next 5 years.
The first problem: The solution for the desktop
Small and medium enterprises have been facing many problems related to the desktop from the early stages when using a PC. Desktop or laptop is still the object of hacker snooping though the administrator is daily updated and improved security technology.
Appeared in alternative technologies have the potential but not a type of technology that is fully integrated features such as a perfect replacement equipment without a human brain.
Get "Thin client" as an example. This equipment can fit in a few applications such as call centers and data entry, but no volume control on the Windows share. Other forms of computing customers, such as centralized ClearCube also fully meet the requirements from a few markets.
Format VDI (virtual desktop architecture) may be the solution to this problem. This model is a Thin client hardware efficiency, can be considered as a combination of both models on or be considered a completely different solution. In short, we need a new model far beyond the personal authorization of the traditional computer but still maintained control, security and systems management of information technology focus chemicalFortunately today's users can bring their equipment to go inside to work. Will the virtual device has a solution?
Problem No.2: The server virtualization
One thing is for sure virtualization was the way to develop the information technology industry in the future. An essential part of it lies in the cumbersome multi-core servers, each contain dozens of other virtual servers and the default shape of this server is designed for virtualization. It is time we change this default.
Most servers now are designed to serve the virtualization market, but they are still used as a single server. The hardware, heat and energy, the size comes not much action in the virtualization market. The server virtualization just three components: CPU, RAM and I / O. Server virtualization can, and should also start thanks to the flash device in or at least the 1.8-inch SSD. However, having a common drive with the cooling requirements and energy may not be needed.
Only a few devices on the server market that meet the requirements of this model. Within 5 years, we can reduce the size of the server to a minimum, and can conduct virtually.
Problem No.3: WAN Cheap
Currently, many offices still use dialup TDM technology obsolete. With its excellent connections via the telephone network Dialup, T1 digital connection 1.54Mb can be considered high speed, but now the connection is considered slow. If Verizon and other distributors can proceed until the connect remote areas, they absolutely can do it for business. Advances in providing high-speed connections in the last century makes the T1 connection over backward and slower than ever.
In the next 5 years, the cost to connect to an office in suburban Michigan could become more expensive than connecting to an office in Virginia through a transmission line 100Mbps or 1Gbps. The new connection should ensure reliable as T1.
Problem No.4: Licensing the software copyright
To know the number of IT professionals and the number of end users have read EULA, we can conduct the entire licensing of software copyright. The software copyright is being used in enterprises still in state of confusion, difficult to control and may adversely affect the operation of information technology systems in enterprises.
Copyright issues is the most sore points in solving problems related to hardware and software issues rather than technology or product is other areas. Resolve copyright issues within 5 years can be a pretty big ambitions, but, in fact, this problem is ignored in the business and should be reviewed fully. If we can convince enterprise customers running applications - all on the TCP / IP will be able to find a structure of copyright for software development firms. This is the idea behind a product as FLEXlm (currently FLEXnet Publisher) but it should be a service available and free business software development small link back to the same building .
Problem No.5: No need to use passwords
The era of the types of passwords has to go through but no one seems to realize that. When users move from site to another site or from browser to browser, from the operating system to another operating system, they will have use of a password with the security requirements strict. These requirements can be quite odd, such as bank sites often refuse to type the password contains special characters. With the password complexity requirements, users often have to write them to remember. All things that are reducing their security.
Besides, the type species of endless passwords on mobile devices will not make users feel comfortable. Whether or not the normal keyboard, this is also a major challenge for the user. But what could replace your password? The smart card and USB code is great idea for the same network connection or the same device. However, the problem here lies not only in narrow spaces like this. In the world of cloud services today, with iPad and Chrome the operating system, the cards are not the ideal answer. Biometric identification can be a convenient solution and neat like passwords and applied in many systems and devices. If using this method, all consumer devices all need to recognize your fingerprint or retina scans.
Standpoint of users, biometric identification is a matter of debate. Although these concerns may be unnecessary, but some people have mentioned that they do not want to lose their fingers to those who intend to enter their bank account. Therefore, will occur when the possibility of a biometric identification of users are accepted, they will not do it any more code.
Voice recognition, the face or other forms of identification can be substituted for other forms of conventional passwords. Let's hope it happens soon.
Problem No.6: Spam
Amount of time and effort was spent to handle spam and phishing in the past 10 years can help people conquer Mars or could even generate a form of renewable energy new. Not only is that annoying to users, spam is reducing the effectiveness of business services, increased costs due to additional servers or services, or simply more time consuming due to the emails were sent to the Junk Mail mailbox or permanently lost.
An unfortunate reality is that the methods to reduce or eliminate spam is still very vicious (ie list of registered methods or ISP will ask for a small fee for each email) , but there are also advocates of Draco (heavy-handed punishment for minor errors) is ready to remove the entire contents of the email. We do not need such a heavy hand, but also not neglect the previous situation.
A distinct solutions for different problems can be done through email filtering. For example, greylisting solutions protect users against spam category will create a time delay before receiving an email from strange addresses in order to disable the target of this spam. In addition, solutions such as copyright registration list or Whitelisting Blacklisting is also an effort to prevent spam. However, not a solution of the above affects the type of spam on the Internet. If these solutions can affect matter, they also block the spam does not run into the Inbox. This is only one solution to support the situation alone.
Problem No. 7: The device virtualization
The installation of a new virtual applications do not require training time. These applications can be run completely at the same equipment supplied. To avoid wasting time checking a DVD screen, we can use a virtual device can be entered and started immediately. This process took place in some cases the VM so we can skip the intermediate stage and proceed immediately with the selection as a virtual device structure distributed applications instead of the default settings Windows or a compressed packet tail. tar.
Companies can save a considerable amount of time, effort and support costs when conducting these solutions. This does not mean you should not find a way to standardize the installation process which should leave them in default with VM.
Problem No. 8: IPv6
Part of the problem is that we have become so familiar with IPv4 addresses. Address 192.168.1.100 is definitely simpler than 4960:0:1001:: 68. This can be explained for most of its information technology quite satisfied with the internal IP addresses so far. Requirements set out here is not only small efforts to conduct renumbering IP addresses but also measures to verify all applications and services to help them work effectively for IPv6.
Therefore, the difficulty of IPv6 is that we have not noticed any particular benefit in the effort to put out is not small. When funds for the IT department is tight, you will not know what will happen.
However, this problem is not serious as the loss of IPv4 addresses. Currently, it is not possible that deserve attention first, but on direct care, these addresses are gradually lost in a considerable extent been warned, especially when China is expanding your Internet service, and of course emerging markets numerous mobile device is connected to the Internet.
Every day we feel satisfied with the IANA as every day we remain faithful to IPv4. We should expect there will soon be a boost to computing world switch to using IPv6.
8 issues facing the IT industry needs
Thursday, 30 September 2010 by nkoknki |
0
comments
Main difficulty here is not motivated providers move to digital connection T3 instead of T1. They took advantage of T1 for centuries and their high prices, while the rotation control technology.
Source: NTT(CIO)
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment