Sorry, you need to enable JavaScript to visit this website.

Key Technology Trends: Which Ones Are We Tracking?

Key Technology Trends: Which Ones Are We Tracking?
April 10, 2017

Emerging technology or disruptive innovation has become a part of today’s business lexicon.

Potential disruption creates a value network, generating diverse thought processes among industry leaders. Most technologists struggle to tie new technological solutions with business strategies. Moreover, identifying key trends that are part of the mainstream business in the future is a challenge.

Potential disruption creates a value network, generating diverse thought processes among industry leaders

While the market is buzzing with a wide range of contemporary technologies, we track the ones that matter to our customers. At HCL, we have come up with the Technology Adoption Roadmap, 2017-19’, for products or services. The blueprint falls under each of the next-generation IT practices, including datacenter, workplace services, networks, security, and enterprise platform services.

At HCL, we have come up with the Technology Adoption Roadmap, 2017-19’, for products or services.

The pictorial representation of the roadmap in the following page provides a simple understanding of the process matrix. It will be made available to all customers via account managers, sales, presales, and other customer-facing teams across the organization.

Analyzing vital trends

We have demarcated methods to track and analyze the potential of emerging trends. Each of them has been evaluated based on the following parameters.

Innovation shaping transformational journey

Our analysis helps comprehend — ‘how technology can reduce costs in comparison to the alternative technology in use’, ‘how it helps to improve overall solution availability and supportability’, and ‘how it ensures or contributes to agility’.The size of the circles help you understand the impact of each technology.

Mitigating deployment risks

Solution and deployment blunders influence the effectiveness of a process. Based on the risks related to market place maturity, architecture fitment, and support, we have calibrated certain means to mitigate threats.The colors help you identify the level of risk associated with the technologies. Besides, the roadmap will determine the technology products/services, which are being evaluated further. Additionally, it will spot the ones which have been already deployed in production by customers and those sent for proof of concepts.

How to Read Technology Adoption Roadmaps

Impact On Enterprise

IMPACT ON ENTERPRISE

The following three factors determine the effect, which has the potential to:

  • Reduce cost
  • Improve solution availability & supportability
  • Boost agility

Technologies Under Evaluation

TechnologyTechnology currently under evaluation; proof of concepts are being carried out.

Solution & Deployment Risk

Technology

Listed below are three factors:

  • Marketplace maturity risk
  • Architecture fitment risk
  • Support risk

Deployed In Client Engagements

TechnologyTechnology has already been deployed in production by our customers

Next-gen Datacenter Technology

Adoption Roadmap 2017-19

Adoption Roadmap

MAINSTREAM BY 2017:

1. Hyper-converged infrastructure.

2. Data back-up and archival on cloud.

3. Multi-cloud management & operations.

KEY TAKEAWAYS:

- Asset utility models to gain traction as the focus shifts to consumption rather than procurement.

- Datacenter architectures expected to undergo radical changes (Edge, Micro, hyperscale, distributed and immutable) with digitization.

- Software-oriented infrastructure initiatives aligned with legacy architectures

- Multi-cloud management and expense optimization to gain the center stage.

- Automation to expedite client infrastructure modernization and success of digital initiatives.

Next-gen Networks Technology

Adoption Roadmap 2017-19

MAINSTREAM BY 2017:

  1. Omni-channel Contact Center,
  2. UCaas – SFB Platform
  3. Software-Defined Network,
  4. Software-Defined WAN

KEY TAKEAWAYS:

  • Adapting Software-Defined WAN (SD-WAN) technologies for data transit in the hybrid environment.
  • Focusing on the network automation and orchestration technologies, to derive actionable insights and automate pivotal tasks that are prone to human error.
  • Enhancing business agility via Software-Defined Network (SDN)
  • Shifting dedicated hardware to soft appliances on the Hypervisor for Capex reduction as Network Function Virtualization (NFV) will become a disruptive force
  • Unlocking the power of Microsoft Skype for Business with Unified Communications as a Service (UCaaS)
  • Evolving contact center to incorporate an omni-channel communication model
  • Securing reliable connection for network and cloud service providers using off-the-shelf networking and express routes.

Next-gen Workplace Technology

Adoption Roadmap 2017-19

MAINSTREAM BY 2017:

  1. Automation.
  2. Self-healing.
  3. End-user Analytics.

KEY TAKEAWAYS:

  • The end-user experience effectiveness emerges as the top priority for the 21st century enterprise.
  • The end user is now a primary stakeholder.
  • The CHRO has become a critical point of inputs for improving the end-user products.
  • Liberation from being restricted to platforms or device types is the future.

Next-gen Security Technology

Adoption Roadmap 2017-19

MAINSTREAM BY 2017:

  1. Cloud-based Anti-DDOS.
  2. Big Data Security Analytics.
  3. Software-Defined Micro Segmentation and Flow Visibility.

KEY TAKEAWAYS:

  • Exponential growth in mobility and cloud adoption, to provide higher impetus to software-defined security platforms
  • Emergence of identity as the new perimeter, to increase new IAM implementations that will revolve around supporting cloud
  • Dynamic cyber risk environment compounded by stringent data protection and compliance mandates global enterprises to acquire advanced risk management skills
  • Focus on growing collaborative threat intelligence and user behavior analytics
  • Secure by design will be pivotal in application development with the increased adoption of DevSecOps