How To Create A Cloud Computing System

Size: px
Start display at page:

Download "How To Create A Cloud Computing System"

Transcription

1 G Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus specifically on a number of subtrends that will be accelerating, shifting or reaching a tipping point over the next three years. Continual monitoring of cloud computing trends, with regular updates to the enterprise's cloud strategy, is essential to avoid costly mistakes or miss market opportunities. Impacts Formal decision frameworks facilitate cloud investment optimization. Hybrid cloud computing is an imperative. Cloud brokerage will facilitate cloud consumption. Cloud-centric design becomes a necessity. Cloud computing influences future data center and operational models. Recommendations Develop a model to identify the legal, compliance and corporate sensitivity with regard to your data (e.g., data classification scheme). For particular workload/data combinations, map the anticipated benefits against the associated risks for public cloud services. Establish security, management and governance models to coordinate the use of internal and external services. Position IT as an internal cloud services broker providing advice, guidance and intermediary service for the consumption of cloud services. Evaluate third-party cloud services brokers that can facilitate the consumption of cloud services.

2 Look beyond the migration of enterprise workloads to the creation of cloud-optimized applications that fully exploit the potential of the cloud to deliver global-class applications. Apply the concepts of cloud computing to future data center and infrastructure investments to increase agility and efficiency. Analysis Cloud computing is a style of computing where scalable and elastic IT-related capabilities are provided "as a service" to customers using Internet technologies. The concept of cloud computing builds on general outsourcing and hosting models in which a third party operates an IT environment on behalf of a customer, but the cloud is characterized by a number of key attributes that differentiate it from what is delivered by traditional external service providers. Cloud computing services are service-based, elastically scalable, use shared resources, can be metered by use and use Internet technologies. Moreover, cloud computing is not simply about an external party providing some sort of service. It also represents a style of computing that is applied to the creation, deployment, access and management of internal infrastructure and services. Cloud computing is a major technology trend that has permeated the market over the last two years. It sets the stage for a new approach to IT that enables individuals and businesses to choose how they'll acquire or deliver IT services, with reduced emphasis on the constraints of traditional software and hardware licensing models. Cloud computing has a significant potential impact on every aspect of IT and how users access applications, information and business services. Although the potential is significant, the breadth and depth of the impact and the level of adoption over time is uncertain. The trend and related technologies continue to evolve and change rapidly, and there is continuing confusion and misunderstanding as vendors increasingly hype "cloud" as a marketing term. This level of impact, confusion, uncertainty and change make cloud computing one of Gartner's top 10 strategic technology trends to address. This research highlights a number of evolving areas of potential impact that users must factor into their planning processes. Page 2 of 9 Gartner, Inc. G

3 Figure 1. Impacts and Top Recommendations for Five Cloud Computing Trends That Will Affect Cloud Strategy Impacts Formal decision frameworks facilitate cloud investment optimization. Top Recommendations Develop a model to identify the legal, compliance and corporate sensitivity regarding your data (e.g., data classification scheme). For particular workload/data combinations, map the anticipated benefits against the associated risks for public cloud services. For any given project, consider the timing of the anticipated impact, and focus attention on projects with a near-term impact on the business versus those with a longer-term indirect impact. Hybrid cloud computing is an imperative. Cloud brokerage will facilitate cloud consumption. Establish security, management and governance models to coordinate the use of internal and external services. Focus near-term efforts on application and data integration, linking fixed internal and external applications with a hybrid solution. Approach sophisticated integrated solutions, cloudbursting and dynamic execution cautiously, because these are the least-mature and most problematic hybrid approaches. Position IT as an internal cloud services broker providing advice, guidance and intermediary service for the consumption of cloud services. Evaluate third-party cloud services brokers that can facilitate the consumption of cloud services. Train IT staff in relationship management to better enable them to manage cloud provider relationships and contracts. Source: Gartner (February 2012) Impact: Formal Decision Frameworks Facilitate Cloud Investment Optimization Cloud computing services exist along a spectrum of capabilities ranging from system and application infrastructure services through application and information services to high-level business services. There are also security, provisioning, management, governance and brokerage services to facilitate the use of other cloud services. Cloud computing is generally thought of as a model in which an external service provider delivers IT capabilities as a service to individuals or businesses (aka the public cloud). However, the cloud style also can be applied internally to influence how an enterprise builds its own infrastructure and applications to deliver private cloud services. The cloud promises to deliver a range of benefits, including a shift from capital-intensive to operational cost models, lower overall cost, greater agility and reduced complexity. It can also be used to shift the focus of IT resources to higher value-added activities for the business, or to support business innovation and, potentially, lower risks. However, these prospective benefits need to be examined carefully and mapped against a number of challenges, including security, lack of transparency, concerns about performance and availability, the potential for vendor lock-in, Gartner, Inc. G Page 3 of 9

4 licensing constraints and integration needs. In addition, a careful analysis shows that, over time, cloud computing will not always save money. These issues create a complex environment in which to evaluate individual cloud offerings. This complexity is further increased by the fact that the requirements and constraints of particular workloads and the datasets associated with them have a significant impact on the potential benefits and risks of various cloud models. Companies will increasingly codify and formalize frameworks to evaluate particular cloud services options based on the characteristics of specific workloads and the security and compliance needs of the associated datasets. Recommendations: Develop a model to identify legal, compliance and corporate sensitivity with regard to your data (e.g., data classification scheme). For particular workload/data combinations, map the anticipated benefits against the associated risks for public cloud services. Focus public cloud initiatives where the benefits are high and the risks are low or manageable. Where benefits are high but risks are also high or unknown, evaluate private cloud approaches. For any given project, consider the timing of the anticipated impact, and focus attention on projects with a near-term impact on the business versus those with a longer-term indirect impact. Work with the business units by responding to requests to evaluate particular cloud services, and by helping them identify opportunities to safely leverage the potential of cloud computing. Impact: Hybrid Cloud Computing Is an Imperative Hybrid computing refers to the coordination and combination of external cloud computing services (public or private) and internal infrastructure or application services (private cloud or traditional delivery, including outsourced models). However, hybrid computing does not refer to using internal systems and external cloud-based services in a disconnected or loosely connected fashion. Hybrid computing implies significant integration or coordination between the internal and external environments at the data, process, management or security layers. Most large companies will use some form of hybrid computing. Over time, hybrid cloud computing could lead to a unified model in which there is a single "cloud" made up of multiple cloud platforms (internal or external) that can be used, as needed, based on changing business requirements. Cloudbursting would allow an application to automatically reach out to external cloud services when additional resources are needed. However, the full promise of this unified cloud may not be realistic, and in any case will take many years to mature. In the meantime, less ambitious hybrid cloud approaches still allow for cost optimization, flexible application deployment options and a coordinated use of internal and external resources. Early adopters are using mashups and joint security and management approaches. Some are building simple integrated solutions and experimenting with cloudbursting. Page 4 of 9 Gartner, Inc. G

5 Recommendations: Establish security, management and governance models to coordinate the use of internal and external services. Focus near-term efforts on application and data integration, linking fixed internal and external applications with a hybrid solution. Where public cloud application services or custom applications running on public cloud infrastructures are used, establish guidelines and standards for how these elements will combine with internal systems to form a hybrid environment. Approach sophisticated integrated solutions, cloudbursting and dynamic execution cautiously, because these are the least mature and most problematic hybrid approaches. Test the viability of cloudbursting for selected applications where horizontal scalability through the cloning of application instances is feasible. Create guidelines/policies on the appropriate use of the different hybrid cloud models. For hybrid application deployments, establish an application performance management architecture primarily around the dimensions of end-user experience monitoring and analytics. Impact: Cloud Brokerage Will Facilitate Cloud Consumption As cloud computing adoption proliferates, so does the need for consumption assistance. A cloud services brokerage (CSB) is a service provider that plays an intermediary role in cloud computing. A CSB is primarily made up of three roles aggregator, integrator and customizer. These roles are adopted by IT services providers, B2B providers and new cloud specialists. During 2011, IT users, and providers, interest in the CSB concept increased, and the market saw an expansion of CSB offerings and more adoption of CSB services. Over the next three years, we expect this trend to accelerate, with an expanded set of providers and offerings. Deploying cloud services will involve substantial integration work, and many CSBs will deliver integration services and employ business process management suites (BPMSs) to address this complexity. Steady investments by IT distributors and communication service providers (CSPs) for cloud aggregation brokerage offerings will help small or midsize businesses (SMBs) acquire, leverage and maximize investments involving multiple cloud services. Individuals, whether they are in IT or a line-of-business unit, can easily consume cloud services without involving IT. While seen as a boon by many users, this approach poses challenges in coordinating purchases, managing the provider relationship, ensuring that consumption of the services does not pose undue risk, integrating disparate services and more. Business units increasingly purchase software as a service (SaaS) solutions and force IT departments to react after the fact. To address this challenge, IT departments should explore how they can position themselves as CSBs to the enterprise by establishing a purchasing process that accommodates cloud adoption and encourages business units to come to the IT organization for advice and support. This will enable IT to track the services that business users are acquiring and bring a Gartner, Inc. G Page 5 of 9

6 degree of governance to the process. However, IT must walk a fine line. If this process is used simply to erect a barrier to accessing cloud services, individuals will once again bypass IT. The enterprise CSB approach can be implemented by modifying existing processes and tools such as internal portals and service catalogs. In addition, vendors of operations management and portal software, as well as external CSB providers, will offer tools to facilitate the process. Recommendations: Position IT as an internal CSB providing advice, guidance and intermediary service for the consumption of cloud services. Evaluate third-party CSBs that can facilitate the consumption of cloud services. Train IT staff in relationship management to better enable them to manage cloud provider relationships and contracts. Cloud services consumers should determine the strategic focus of a CSB provider among the three different CSB roles when seeking help with cloud projects. Align their focus with your greatest need aggregation, integration or customization. Brokerage customers should plan contingencies (e.g., internal brokerage and direct negotiation with cloud providers), as the CSB model is relatively immature, and the CSB provider landscape will continue to evolve during the next five years as CSB adoption proliferates. Impact: Cloud-Centric Design Becomes a Necessity Many organizations look first for opportunities to migrate existing enterprise workloads to a cloud system and/or an application infrastructure. This approach may provide benefits where the workload has a highly variable resource requirement, or where the application naturally lends itself to horizontal scalability. However, to fully exploit the potential of a cloud model, applications need to be designed with the unique characteristics, limitations and opportunities of a cloud model in mind. The architectural and design principles for cloud-optimized applications include: Applications optimized for dynamic resource use versus predictable resource use Failure-aware applications designed for resiliency, rather than assuming a resilient infrastructure A modular, asynchronous and stateless architecture that takes into account latency across internal and external services Parallel execution to increase performance and remove bottlenecks Dynamic execution supporting reconfiguration based on runtime data Use of content delivery networks, data replication and caching, and other new approaches to data management optimized for the cloud Recommendations: Look beyond the migration of enterprise workloads to the creation of cloud-optimized applications that fully exploit the potential of the cloud to deliver global-class applications. Page 6 of 9 Gartner, Inc. G

7 Rather than rely on the underlying infrastructure to provide high availability, cloud-optimized applications must build resiliency into the application, or build on cloud platform services that provide this resiliency. Expect a significant investment in new application architectures and application design best practices. Develop skills to deal with additional data models beyond relational databases in the cloud (e.g., key value object stores, document stores and content delivery networks [CDNs]). Impact: Cloud Computing Influences Future Data Center and Operational Models In public cloud computing, an enterprise is acting as a consumer of services, with the cloud services provider handling the implementation details, including the data center and related operational models. However, to the extent that the enterprise continues to build its own data centers, they will be influenced by the implementation models used by cloud services providers. Through 2014, IT organizations will spend more money on private cloud computing investments than on offerings from public cloud providers. Over time, IT can leverage public and private cloud services in hybrid models. However, not all applications of cloud computing concepts or enabling technologies will result in a full private cloud that delivers all the attributes of cloud computing and easily interoperates with public cloud services. Recommendations: Apply the concepts of cloud computing to future data center and infrastructure investments to increase agility and efficiency. Get IT out of the rationing business and into the enabling business with a cloud computing business model, transparently pricing out infrastructure as a service (IaaS), and letting the business justify consumption based on business needs. Do not let scope creep prevent you from project success; achieve ROI, and implement continuous optimization over time. Learn from the best-practice experiences of large public cloud services providers, and explore the concept of DevOps, which brings service development and operations together in a closer partnership. Plan to customize and integrate your cloud management platform to succeed in your environment. Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Evaluating the Benefits of Private Cloud Computing" Gartner, Inc. G Page 7 of 9

8 "Predicts 2012: Cloud Computing Is Becoming a Reality" "Hype Cycle for Cloud Computing, 2011" "Market Insight: Customers Need Hybrid Cloud Compute Infrastructure as a Service" "Application Performance Monitoring Is the First Step to Manage the Hybrid Cloud Application Portfolio" "How to Determine When to Use a Cloud Services Brokerage" "Predicts 2012: Cloud Services Brokerage Will Bring New Benefits and Planning Challenges" "Emerging Services Analysis: Communications Service Providers as Cloud Services Brokers" "Who's Who in Cloud Services Brokerage" "Creating Cloud Solutions: A Decision Framework, 2011" "Case Study: DevOps Used at National Instruments" "DevOpsSec: Creating the Agile Triangle" "The 10 Fundamentals of Building a Private Cloud Service" This is part of a set of related research. See the following for an overview: The Top 10 Technology Trends for 2012 Page 8 of 9 Gartner, Inc. G

9 Regional Headquarters Corporate Headquarters 56 Top Gallant Road Stamford, CT USA European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Japan Headquarters Gartner Japan Ltd. Atago Green Hills MORI Tower 5F Atago, Minato-ku Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website, ombudsman/omb_guide2.jsp. Gartner, Inc. G Page 9 of 9

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models G00237716 Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models Published: 6 February 2013 Analyst(s): David W. Cearley, Donna Scott, Joe Skorupa, Thomas J. Bittman Cloud

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

How to Choose Providers for Mobile Consumer Application Platforms

How to Choose Providers for Mobile Consumer Application Platforms How to Choose Providers for Mobile Consumer Application Platforms Michael McGuire Lead Author Michael McGuire,, Mike McGuire guides digital marketers on best practices for developing strategies. He specializes

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary. Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

The Four New Ps of Marketing That CMOs and CIOs Should Consider

The Four New Ps of Marketing That CMOs and CIOs Should Consider G00227185 The Four New Ps of Marketing That CMOs and CIOs Should Consider Published: 18 May 2012 Analyst(s): Kimberly Collins Four new Ps of marketing align people and processes across the marketing ecosystem,

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

Gamification Meets Analytics With Kaggle

Gamification Meets Analytics With Kaggle G00228640 Gamification Meets Analytics With Kaggle Published: 1 June 2012 Analyst(s): Rita L. Sallam This note describes how Kaggle is bringing "the collective" to "the predictive" to help companies overcome

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies

More information

Ensure Emerging Trends and Technologies Advance Your Marketing Strategy

Ensure Emerging Trends and Technologies Advance Your Marketing Strategy Ensure Emerging Trends and Technologies Advance Your Marketing Strategy Richard Fouts, Jackie Fenn and Gartner Fellow Lead Author Richard Fouts, Richard Fouts guides digital marketers on best practices

More information

Prepare for the Inevitable With an Effective Security Incident Response Plan

Prepare for the Inevitable With an Effective Security Incident Response Plan G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

The Future of IT: Drive New Consumption Models with Cloud and Hybrid IT

The Future of IT: Drive New Consumption Models with Cloud and Hybrid IT Issue 1 The Future of IT: Drive New Consumption Models with Cloud and Hybrid IT Lead Strategic Business Outcomes in a Challenging IT Environment Featuring research from Welcome 2 Welcome 4 From the Gartner

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

Roundup of Business Intelligence and Information Management Research, 1Q08

Roundup of Business Intelligence and Information Management Research, 1Q08 Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

E-Mail Is a Commodity and Other Fairy Tales

E-Mail Is a Commodity and Other Fairy Tales G00210585 E-Mail Is a Commodity and Other Fairy Tales Published: 9 February 2011 Analyst(s): Matthew W. Cain A deep understanding of the operational, architectural, policy and feature requirements of an

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

IT Cost Savings With Information Governance

IT Cost Savings With Information Governance G00232238 IT Cost Savings With Information Governance Published: 17 April 2012 Analyst(s): Debra Logan By systematically eliminating redundant information, Cisco has retired multiple legacy systems, eliminated

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information

Solution Path: Threats and Vulnerabilities

Solution Path: Threats and Vulnerabilities Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Research Publication Date: 10 August 2011 ID Number: G00213049 Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Jay E. Pultz The National Renewable Energy Laboratory's (NREL's) data center

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

The Seven Building Blocks of MDM: A Framework for Success

The Seven Building Blocks of MDM: A Framework for Success Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)

More information

What to Consider When Designing Next-Generation Data Centers

What to Consider When Designing Next-Generation Data Centers Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

How BPM Can Enhance the Eight Building Blocks of CRM

How BPM Can Enhance the Eight Building Blocks of CRM Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's

More information

Singapore Empowers Land Transport Planners With Data Warehouse

Singapore Empowers Land Transport Planners With Data Warehouse G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

NAC Strategies for Supporting BYOD Environments

NAC Strategies for Supporting BYOD Environments G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

Cloud IaaS: Security Considerations

Cloud IaaS: Security Considerations G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s

More information

Document the IT Service Portfolio Before Creating the IT Service Catalog

Document the IT Service Portfolio Before Creating the IT Service Catalog Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service

More information

Charity Shows That You Don't Need a Big Budget to Succeed With Predictive Analytics

Charity Shows That You Don't Need a Big Budget to Succeed With Predictive Analytics G00232733 Charity Shows That You Don't Need a Big Budget to Succeed With Predictive Analytics Published: 17 September 2012 Analyst(s): Joao Tapadinhas A U.K. charity has shown how the smallest organization

More information

Successful EA Change Management Requires Five Key Elements

Successful EA Change Management Requires Five Key Elements Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the

More information

Additional Tools for a World-Class ERP Infrastructure

Additional Tools for a World-Class ERP Infrastructure G00219770 Additional Tools for a World-Class ERP Infrastructure Published: 28 October 2011 Analyst(s): Pat Phelan, Derek Prior This research provides a guide to the infrastructure elements that are needed

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Containers and Modules: Is This the Future of the Data Center?

Containers and Modules: Is This the Future of the Data Center? Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet

More information

The Electronic Signature Market Is Poised to Take Off

The Electronic Signature Market Is Poised to Take Off G00234939 The Electronic Signature Market Is Poised to Take Off Published: 21 May 2012 Analyst(s): Gregg Kreizman Growth in the e-signature market is becoming viral, and there are significant benefits

More information

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,

More information

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes. Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary

GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS Executive Summary Gartner EXP is an exclusive, membership-based organization of more than 3,000 CIOs and senior IT leaders worldwide. Members benefits from the

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

ERP, SCM and CRM: Suites Define the Packaged Application Market

ERP, SCM and CRM: Suites Define the Packaged Application Market Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users

More information