The Top 10 Strategic Technologies for 2012 - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next The Top 10 Strategic Technologies for 2012-4 Next

Context-aware computing uses information about an end-user or objects environment, activities, connections and preferences to improve the quality of interaction with that end user or object. A contextually aware system anticipates the user’s needs and proactively serves up the most appropriate and customized content, product or service. Context can be used to link mobile, social, location, payment and commerce. It can help build skills in augmented reality, model-driven security and ensemble applications. Through 2013, context-aware applications will appear in targeted areas such as location-based services, augmented reality on mobile devices, and mobile commerce.

On the social front, the interfaces for applications are taking on the characteristics of social networks. Social information is also becoming a key source of contextual information to enhance delivery of search results or the operation of applications.

Gartner, Inc. recently highlighted the top 10 technologies and trends that will be strategic for most organizations in 2012. They define a strategic technology as one with the potential for significant impact on the enterprise in the next three years. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt.

A strategic technology may be an existing technology that has matured and/or become suitable for a wider range of uses. It may also be an emerging technology that offers an opportunity for strategic business advantage for early adopters or with potential for significant market disruption in the next five years. These technologies impact the organization's long-term plans, programs and initiatives.

“These top 10 technologies will be strategic for most organizations, and IT leaders should use this list in their strategic planning process by reviewing the technologies and how they fit into their expected needs,” said David Cearley, vice president and Gartner fellow. 

“Organizations should start exploratory projects to look at promised candidate technology and kick off a search for combinations of information sources, including social sites and unstructured data that may be mined for insights,” said Carl Claunch, vice president and distinguished analyst at Gartner.

More Slideshows:


Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.

The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.

Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

PlexxiITRoles0x IT Roles: The New Faces of Network Infrastructure

The newfound emphasis on tools and service integration is shaping a new crop of industry professionals — the actual faces behind the IT infrastructure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.