Key tech transformation trends for 2014

Adrian De Luca
06 Dec 2013
00:00

Hitachi Data Systems’ 5 key IT trends emerging in Asia Pacific in 2014 that will impact the use of technology among organizations:

1. Big data analytics will go beyond proof of concept

Enterprises will have to find ways to uncover value from within their existing data stores and deploy scalable infrastructures to extract meaningful outcomes from big data projects.

In the recent Economist Intelligence Unit (EIU) Asia Pacific Big Data Survey, sponsored by HDS, over 70% of organizations in the region believe big data adoption will improve their profitability, productivity, and innovation. However, many organizations find that their existing information systems hinder the effective gathering of data for analysis as the information is stored and managed in separate business systems, information silos, formats, and media. The big data challenge comes in two forms: technology and organization. In 2014, companies will try to address both.

2. The cloud-broker model will gain traction

Organizations will transform their IT departments from technology implementers to business innovators. Enterprises with high-demand IT infrastructure and application services will start exploring the cloud-broker model, preferring to work with providers who act as vendor-neutral third-party cloud services brokerages.

When it comes time to refresh technology, the focus will be on applications and business outcomes rather than the infrastructure itself. Enterprises will start turning to their system integrators, internal IT organizations, or third-party service providers to play the role of cloud-service broker.

3. Concerns over data security will reach a tipping point

Across Asia Pacific, new legislation is being introduced to protect personal data. Organizations will have to re-examine their security policies and look to solutions such as enterprise file sync and share, data encryption, and auditability to address these issues.

Organizations will increase their emphasis on mobile and edge security, and will implement stricter security and data management practices. They will have to use modern technologies to manage and automate these processes; otherwise the cost of compliance could be very high.

Related content

Comments
No Comments Yet! Be the first to share what you think!
This website uses cookies
This provides customers with a personalized experience and increases the efficiency of visiting the site, allowing us to provide the most efficient service. By using the website and accepting the terms of the policy, you consent to the use of cookies in accordance with the terms of this policy.