12 Recent Technologies That Have Yet to Live Up to Their Hype
Indeed, all too often, today's "next big thing" is tomorrow's overhyped tech trend that never took off or lived up to its potential. So what recent technologies have (to date, at least) failed to live up to the hype surrounding their release? CIO.com asked dozens of IT professionals, marketing experts and business owners and managers to find out. Here are their top 12 nominees for the most overhyped technology of the last few years.
The Rise of Flash in the Datacenter
Hybrid combinations of flash drives and mechanical disks have become a viable option for organizations of all sizes. There are many ways IT can architect SSDs into the storage mix. Many are simply adding SSD drives to the PCIe slots in the servers, which also have hard disks (or configuring new server purchases with flash drives) or adding them as direct-attached storage (DAS). Companies managing storage networks are also increasingly adding flash to their storage arrays. In a growing number of shops where performance is critical, some are stepping up to pure flash-based SSD storage.
Is There An App For That? An Increasingly Mobile World Requires Expanding Skill Sets
The ability to keep in constant contact with both co-workers and friends, access data and information in a second, and respond to emails from our desk and our couch, alike. Now more than ever, as society continues the shift toward mobile technology, mobile app developers attempt to stay one step ahead of trends and introduce the newest and best software solutions to businesses and consumers.
Why Creativity Thrives In The Dark
Turns out you need not possess a Nobel Prize in Literature to appreciate the creative confines of a dark room. Psychologists Anna Steidel and Lioba Werth recently conducted a series of clever experiments designed to measure how creativity responded to various lighting schemes. In a paper published last month, Steidel and Werth reported some of the first evidence for what creative masters know by nature: when the lights switch off, something in the brain switches on.
Cybersecurity Is the Board's Business
Computer security is no longer a mere technical challenge; it is a strategic business issue. Protecting against cybercrime has become a critical responsibility of the board, alongside succession planning and setting strategic direction. There is a fiduciary duty to protect a company’s assets, particularly those that are digital, and regulators have made clear they expect corporations to address cybersecurity.
Avoiding cloud lock-in, self-service bloat and private cloud traps
Companies are building API-driven environments. So when they talk to their internal infrastructure, they are talking to it the same way they would any other environment and can use the same tools. This is very clever, because if they ever do need external capacity, they are ready for it. That desire for interoperability drives things like OpenStack. There is a huge concern about lock-in at this point. I won't name names, but having a bunch of VMs from one hypervisor vendor doesn't necessarily lock you in to that vendor, because you can still turn on VMs from another vendor.
BadBIOS: Malware whispers via mic & speakers to PCs disconnected from all networks?
As the “badBIOS” name implies, it’s a rootkit that burrows in to infect a system’s BIOS [Basic Input Output System]. Supposedly this nasty piece of malware is platform-independent -- capable of infecting Windows, Linux, OS X and Open BSD -- has self-healing capabilities, resists erasure, and uses ultrasonic high-frequency transmissions in order to talk to other infectedsystems that are completely disconnected from the Internet and all other networks — aka air gap systems.
20/20 vision of risk
Banks need a system that can use advanced methods to accurately detect risk while overcoming the challenges associated with poor data quality and ‘noise’ generated by existing control systems. A best-of-breed approach to improving risk management is a virtuous circle of data-driven detection and exploration, with a focus on enabling banks to ingest, calculate, explore and prioritize data in a timely manner.
InfoQ eMag: API Technologies
Web APIs are driving important new business and technology models. Download the API Technologies eMag where leading practitioners share their experience on making money from APIs and on API design best practices. InfoQ discover "cloud native" architectures that scale to meet global demand and get hands on building API's from contract to go-live. InfoQ look at connected devices, mashups and consider new standards for security in this free ebook.
Preparing for Recovery: Four Strategies for Disaster Proofing Data
More than ever, robust data protection is imperative to recovery in the event of data loss. In fact, failure to safeguard company data can result in business disruption, devastating losses, and in some cases, catastrophic consequences to the business. Numerous reports and studies show that businesses that go through critical data loss often never recover. Below are the four steps organizations should take to disaster proof their data.
Quote for the day:
"High achievement always takes place in the framework of high expectation." -- Charles Kettering
Indeed, all too often, today's "next big thing" is tomorrow's overhyped tech trend that never took off or lived up to its potential. So what recent technologies have (to date, at least) failed to live up to the hype surrounding their release? CIO.com asked dozens of IT professionals, marketing experts and business owners and managers to find out. Here are their top 12 nominees for the most overhyped technology of the last few years.
Hybrid combinations of flash drives and mechanical disks have become a viable option for organizations of all sizes. There are many ways IT can architect SSDs into the storage mix. Many are simply adding SSD drives to the PCIe slots in the servers, which also have hard disks (or configuring new server purchases with flash drives) or adding them as direct-attached storage (DAS). Companies managing storage networks are also increasingly adding flash to their storage arrays. In a growing number of shops where performance is critical, some are stepping up to pure flash-based SSD storage.
Is There An App For That? An Increasingly Mobile World Requires Expanding Skill Sets
The ability to keep in constant contact with both co-workers and friends, access data and information in a second, and respond to emails from our desk and our couch, alike. Now more than ever, as society continues the shift toward mobile technology, mobile app developers attempt to stay one step ahead of trends and introduce the newest and best software solutions to businesses and consumers.
Why Creativity Thrives In The Dark
Turns out you need not possess a Nobel Prize in Literature to appreciate the creative confines of a dark room. Psychologists Anna Steidel and Lioba Werth recently conducted a series of clever experiments designed to measure how creativity responded to various lighting schemes. In a paper published last month, Steidel and Werth reported some of the first evidence for what creative masters know by nature: when the lights switch off, something in the brain switches on.
Cybersecurity Is the Board's Business
Computer security is no longer a mere technical challenge; it is a strategic business issue. Protecting against cybercrime has become a critical responsibility of the board, alongside succession planning and setting strategic direction. There is a fiduciary duty to protect a company’s assets, particularly those that are digital, and regulators have made clear they expect corporations to address cybersecurity.
Avoiding cloud lock-in, self-service bloat and private cloud traps
Companies are building API-driven environments. So when they talk to their internal infrastructure, they are talking to it the same way they would any other environment and can use the same tools. This is very clever, because if they ever do need external capacity, they are ready for it. That desire for interoperability drives things like OpenStack. There is a huge concern about lock-in at this point. I won't name names, but having a bunch of VMs from one hypervisor vendor doesn't necessarily lock you in to that vendor, because you can still turn on VMs from another vendor.
BadBIOS: Malware whispers via mic & speakers to PCs disconnected from all networks?
As the “badBIOS” name implies, it’s a rootkit that burrows in to infect a system’s BIOS [Basic Input Output System]. Supposedly this nasty piece of malware is platform-independent -- capable of infecting Windows, Linux, OS X and Open BSD -- has self-healing capabilities, resists erasure, and uses ultrasonic high-frequency transmissions in order to talk to other infectedsystems that are completely disconnected from the Internet and all other networks — aka air gap systems.
20/20 vision of risk
Banks need a system that can use advanced methods to accurately detect risk while overcoming the challenges associated with poor data quality and ‘noise’ generated by existing control systems. A best-of-breed approach to improving risk management is a virtuous circle of data-driven detection and exploration, with a focus on enabling banks to ingest, calculate, explore and prioritize data in a timely manner.
InfoQ eMag: API Technologies
Web APIs are driving important new business and technology models. Download the API Technologies eMag where leading practitioners share their experience on making money from APIs and on API design best practices. InfoQ discover "cloud native" architectures that scale to meet global demand and get hands on building API's from contract to go-live. InfoQ look at connected devices, mashups and consider new standards for security in this free ebook.
Preparing for Recovery: Four Strategies for Disaster Proofing Data
More than ever, robust data protection is imperative to recovery in the event of data loss. In fact, failure to safeguard company data can result in business disruption, devastating losses, and in some cases, catastrophic consequences to the business. Numerous reports and studies show that businesses that go through critical data loss often never recover. Below are the four steps organizations should take to disaster proof their data.
Quote for the day:
"High achievement always takes place in the framework of high expectation." -- Charles Kettering
No comments:
Post a Comment