Gartner advises IT doofuses to get ready to deal with loss of control, dawn of Post-PC era

Gartner, Inc. has revealed its top predictions for IT organizations and users for 2012 and beyond. Analysts said that the predictions herald changes in control for IT organizations as budgets, technologies and costs become more fluid and distributed.

This year’s selection process included evaluating several criteria that define a top prediction. The issues examined included relevance, impact and audience appeal. A list of this year’s predicts reports is available on the Gartner Predicts website at www.gartner.com/predicts.

Gartner’s top predictions for 2012 and beyond showcase the trends and events that will change the nature of business today and in years to come. Selected from across Gartner’s research areas as the most compelling and critical predictions, the trends and topics they address underline the reduction of control that IT has over the forces that affect it.

“The continued trends toward consumerization and cloud computing highlight the movement of certain former IT responsibilities into the hands of others,” said Daryl Plummer, managing vice president and Gartner fellow, in the press release. “As users take more control of the devices they will use, business managers are taking more control of the budgets IT organizations have watched shift over the last few years. As the world of IT moves forward, CIOs are finding that they must coordinate their activities in a much wider scope than they once controlled. While this might be a difficult prospect for IT departments, they must now adapt or be swept aside.”

Gartner analysts said that going into 2012 there is an increase in the amount of information available to organizations, but it’s a challenge for them to understand it. Given the shifts in control of systems that IT organizations are facing, the loss of ability to guarantee consistency and effectiveness of data will leave many struggling to prevent their organizations from missing key opportunities or from using questionable information for strategic decisions. No regulatory help is on the near horizon, leaving each business to decide for itself how to handle the introduction of big data.

“Any organization which wishes to accelerate in 2012 must establish in itself a significant discipline of coordinating distributed activities,” Mr. Plummer said. “They must establish relationship management as a key skill and train their people accordingly. The reason for this is that the lack of control can only be combated through coordinative activities. The IT organization of the future must coordinate those who have the money, those who deliver the services, those who secure the data, and those consumers who demand to set their own pace for use of IT.”

Gartner’s top predictions for 2012 include:

By 2015, low-cost cloud services will cannibalize up to 15 percent of top outsourcing players’ revenue.
Industrialized low-cost IT services (ILCS) is an emerging market force that will alter the common perceptions of pricing and value of IT services. In the next three to five years, this new model will reset the value proposition of IT. Low-cost cloud services will cause the cannibalization of current and potential outsourcing revenue. Similar to what happened with the adoption of offshore delivery, it will be incumbent upon vendors to invest in and adopt a new cloud-based, industrialized services strategy either directly or indirectly, internally or externally. The projected $1 trillion IT services market is at the beginning of a phase of further disruption, similar to the one the low-cost airlines have brought in the transportation industry.

In 2013, the investment bubble will burst for consumer social networks, and for enterprise social software companies in 2014.
Vendors in the consumer social network space are competing with each other at a rate and pace that are unusually aggressive, even in the technology market. The net result is a large crop of vendors with overlapping features competing for a finite audience. In the enterprise market, many small independent social networking vendors are struggling to reach critical mass at a time when market consolidation is starting, and megavendors, such as Microsoft, IBM, Oracle, Google and VMware, have made substantial efforts to penetrate the enterprise social networking market. While substantial excitement will be raised by private firms going public, valuations of smaller independent vendors will diminish as recognition sets in that the opportunities for market differentiation and fast growth has eroded.

By 2016, at least 50 percent of enterprise email users will rely primarily on a browser, tablet or mobile client instead of a desktop client.
While the rise in popularity of mobile devices and the growing comfort with browser use for enterprise applications preordains a richer mix of email clients and access mechanisms, the pace of change over the next four years will be breathtaking. Email system vendors are also likely to build mobile clients for a diverse set of devices for the same reason. Market opportunities for mobile device management platform vendors will soar. Increased pressure will be on those suppliers to accommodate an increasing portfolio of collaboration services, including instant messaging, Web conferencing, social networking and shared workspaces.

By 2015, mobile application development projects targeting smartphones and tablets will outnumber native PC projects by a ratio of 4-to-1.
Smartphones and tablets represent more than 90 percent of the new net growth in device adoption for the coming four years, and increasing application platform capability across all classes of mobile phones is spurring a new frontier of innovation, particularly where mobile capabilities can be integrated with location, presence and social information to enhance the usefulness. Innovation is moving to the edge for mobile devices; whereas, in 2011, Gartner estimates that app development projects targeting PCs to be on par with mobile development. Future adoption will triple from 4Q10 to 1Q14, and will result in the vast majority of client-side applications being mobile only or mobile first for these devices.

By 2016, 40 percent of enterprises will make proof of independent security testing a precondition for using any type of cloud service.
While enterprises are evaluating the potential cloud benefits in terms of management simplicity, economies of scale and workforce optimization, it is equally critical that they carefully evaluate cloud services for their ability to resist security threats and attacks. Inspectors’ certifications will eventually become a viable alternative or complement to third-party testing. This means that instead of requesting that a third-party security vendor conduct testing on the enterprise’s behalf, the enterprise will be satisfied by a cloud provider’s certificate stating that a reputable third-party security vendor has already tested its applications.

At year-end 2016, more than 50 percent of Global 1000 companies will have stored customer-sensitive data in the public cloud.
With the current global economy facing financial pressure, organizations are compelled to reduce operational costs and streamline their efficiency. Responding to this imperative, it is estimated that more than 20 percent of organizations have already begun to selectively store their customer-sensitive data in a hybrid architecture that is a combined deployment of their on-premises solution with a private and/or public cloud provider in 2011.

By 2015, 35 percent of enterprise IT expenditures for most organizations will be managed outside the IT department’s budget.
Next generation digital enterprises are being driven by a new wave of business managers and individual employees who no longer need technology to be contextualized for them by an IT department. These people are demanding control over the IT expenditure required to evolve the organization within the confines of their roles and responsibilities. CIOs will see some of their current budget simply reallocated to other areas of the business. In other cases, IT projects will be redefined as business projects with line-of-business managers in control.

By 2014, 20 percent of Asia-sourced finished goods and assemblies consumed in the U.S. will shift to the Americas.
Political, environmental, economic and supply chain risks are causing many companies serving the U.S. market to shift sources of supply from Asia to the Americas, including Latin America, Canada and the U.S. Except in cases where there is a unique manufacturing process or product intellectual property, most products are candidates to be relocated. Escalating oil prices globally and rising wages in many offshore markets, plus the hidden costs associated with offshore outsourcing, erode the cost savings that didn’t account for critical supply chain factors, such as inventory carrying costs, lead times, demand variability and product quality.

Through 2016, the financial impact of cybercrime will grow 10 percent per year, due to the continuing discovery of new vulnerabilities.
As IT delivery methods meet the demand for the use of cloud services and employee-owned devices, new software vulnerabilities will be introduced, and innovative attack paths will be developed by financially motivated attackers. The combination of new vulnerabilities and more targeted attacks will lead to continued growth in bottom-line financial impact because of successful cyber attacks.

By 2015, the prices for 80 percent of cloud services will include a global energy surcharge.
While cloud operators can make strategic decisions about locations, tax subsidies are no long-term answer to managing costs, and investments in renewable-energy sources remain costly. Some cloud data center operators already include an energy surcharge in their pricing package, and Gartner analysts believe this trend will rapidly escalate to include the majority of operators — driven by competitive pressures and a “me too” approach. Business and IT leaders and procurement specialists must expect to see energy costs isolated and included as a variable element in future cloud service contracts.

Through 2015, more than 85 percent of Fortune 500 organizations will fail to effectively exploit big data for competitive advantage.
Current trends in smart devices and growing Internet connectivity are creating significant increases in the volume of data available, but the complexity, variety and velocity with which it is delivered combine to amplify the problem substantially beyond the simple issues of volume implied by the popular term “big data.” Collecting and analyzing the data is not enough — it must be presented in a timely fashion so that decisions are made as a direct consequence that have a material impact on the productivity, profitability or efficiency of the organization. Most organizations are ill prepared to address both the technical and management challenges posed by big data; as a direct result, few will be able to effectively exploit this trend for competitive advantage.

Additional details are in the Gartner report, “Gartner’s Top Predictions for IT Organizations and Users, 2012 and Beyond: Control Slips Away,” which is available on Gartner’s website at www.gartner.com/predicts. The Gartner Predicts Special Report includes links to more than 70 predicts reports broken out by topics, industries and markets.

Mr. Plummer will be the host of the upcoming webinar, “Gartner Top Predictions for 2012 and Beyond,” at 8 a.m. and 11 a.m. EST on December 21. To register for the webinar, please visit http://my.gartner.com/portal/server.pt?open=512&objID=202&mode=2&PageID=5553&resId=1842125&ref=Webinar-Calendar.

Source: Gartner, Inc.

MacDailyNews Take: Welcome to the business computing renaissance (companies with Macs, iPhones, and/or iPads, at least)!

20 Comments

  1. This is the second time in a week the PC IT techs have been referred to as Doofuses.
    I can guarantee there are a number of members of this forum that support PCs for a living and come home to their Macs at night. I can also guarantee that PCs have their place in the market. As a former Instrument Technician who supported PC networks on drilling rigs, I speak from experience. There are a lot of times where I use HyperTerminal/serial ports etc.

    Say what you want about the trend of businesses moving towards Mac (I agree), but lay off the name calling. Totally unprofessional.

    1. I totally agree with Bandit Bill that we should stop calling them names like DOOFUS. It takes much to long to explain to them why they are seeming so backward and arbitrary but worst of all, it takes two times to explain the meaning of any other words with more than two syllables to them.

      1. They ARE doofuses or at least controlling assholes who’s only motivation is to protect their livelihoods and power than truly serve the companies they work for with their insane territorial attitudes as exemplified by SNL’s “Nick the Computer Guy.” It is no longer or is about to be no longer a Microsoft-centric enterprise world. Adapt or die and get drop kicked to the nearest street gutter. Many of us have waited for this day and now it has arrived.

        1. Damn dude you must be stuck in one f*cked up company to have an attitude like that. Im sorry for your pain.

          Unless you are one of the 2 percenters who think IT is out to control you because they have a problem with you installing P2P software, games and streaming porn over the corp LAN in your office 😉

        2. I love Apple products and I’m an IT manager. So if Microsoft is no longer going to dominate the enterprise, where’s the Apple ERP I can deploy? Where’s the Apple CRM I can deploy? And IMAP mail through iCloud is better than Exchange? There’s no question about Apple’s rising dominance but I don’t see a complete death of Microsoft in the near future, or Oracle, or SAP, or salesforce.com, or Google, etc., etc., etc.

    2. Ok name calling is unprofessional!
      … Yet if you go over to “other” pc sites and look at what so called pro pc comments are on Mac / iPad / iPhone and 10 years ago on iPod … so ugly and “unprofessional”!!!
      … Between tech to tech: I have always listened to pc advocates and gave my say on the Mac side. Agreed to disagree and suggested they learn more about the Mac technically and become “bilingual’ in Mac & pc 🙂 because I saw it coming for years now!
      … iMac > USB > iPod > iTunes > Intel chips > iTunes / Safari on pc > iPhone > iPad > iCloud > Zero virus Mac OS X > Tons of Patents & IP rights 🙂
      … I got it then and still getting it!!!

  2. I remember similar “predictions” from both Gartner/Dataquest and IDC from 2005-2006 years — they were as short-sighted as you could imagine.

    So there is no point to take this “analysis” too seriously.

  3. So where is Gartners’ TOST analysis showing cloud and other computing as a growing % of enterprise resources through 2015? Or LATTE curves tracking shared vs. proprietary clouds? All the things you’d show on even a basic PSTRY chart YOY… Otherwise, interesting thought about tax subsidies and global energy surcharge.

  4. Typically, Gartner is a day late and a dollar short. These trends were obvious shortly after the iPad was initially released. But then again what do I know. I only have an iPod Touch, iPhone, 2 iPads and…oh yeah, a desktop computer. 😉

  5. Some of it is obvious but others are not likely.

    They anticipate a 10% yearly growth in vulnerabilities and an expmosive growth in companies storing customee data in a public cloud?

    Everytime we have trusted sensitive data or security to an outside vendor we have pulled it back inhouse over either a leak, loss or finding out the vendor had shady employees with access to our stuff.

    There is no “savings” that is worth your reputation and trust with your customers.

    Anyone too short sided to see that deserves the coming loses they will experience.

  6. Re: “IT Doofus”:

    As a lifelong Mac user (Since OS7), I recommended and installed a Windows network at work.
    a. Macs simply offer too much freedom in an enterprise setting.
    b. Specialty applications are lacking (IE: MS Access, alarm monitoring interfaces).
    c. There is not enough tech support from Apple.
    d. Most people already know Windows, which reduces training costs.
    e. It is difficult to make a Mac a “dumb terminal” (something that is far easier to do in Windows) because Macs just find each other out of the box and can share files with relative impunity. The boss REALLY doesn’t like that!
    f. Security again – to an IT “Doofus” … “Target Mode” on a Mac is viewed as a major security breach, whereby a thief can copy an entire harddrive without ever logging in. Thankfully, with the elimination of the Firewire interface, Apple appears to be burning this old bridge.
    g. cross-compatibility with legacy DOS applications doesn’t exist with Macs.

    I agree times are changing, but Windows still runs 95% of the world because it offers the enterprise greater control over the end user, plus legacy support, and that’s not about to be upset as quickly as some hopefuls might like to think.

    Sounds to me like (S.Jobs paraphrased) “People still haven’t gotten over the concept that in order for Apple to succeed, MicroSoft has to fail”.

    1. Apparently, you’ve never heard of the *cross platform* Caspar suite for managing PCs, Macs, or Linux installations. Your points a., b., d., e., f., and g. are just plain wrong. You can argue for c., but there are plenty of third-party companies that provide that, so that’s a nonissue.

      Your argument belongs to 1990; it’s no longer relevant or true.

    2. “a. Macs simply offer too much freedom in an enterprise setting.”

      Because god forbid employees are able to use their computers for anything even resembling fun, right? They must be ground down by mind numbing work from the moment they sit down at their desks to the moment the leave, ever more broken than as they arrived. That’s the proper way.

      “b. Specialty applications are lacking (IE: MS Access, alarm monitoring interfaces)”

      Then write speciality applications for OS X so that it’s no longer lacking in specialty applications. You’re in IT so that means you must be able to program, right? I mean, an IT tech who doesn’t know how to program is like a lifeguard who doesn’t know how to swim.

      “c. There is not enough tech support from Apple.”

      Err, are you saying there’s insufficient tech support in the world for Unix?

      “d. Most people already know Windows, which reduces training costs.”

      Most people might “already know Windows”, but I can gaurantee you they can barely use it and their producitivity on it is abysmal. And what exactly do you mean by “training costs”? Does it actually cost money to tell your fellow employees that on a Mac, you use the Command key instead of Ctrl and the menu for an application goes at the top of the screen instead of being embedded in a window?

      e. “It is difficult to make a Mac a “dumb terminal”

      Well, yeah. “Dumb terminal” runs counter to the entire philosophy of Apple. And if the work that goes on in your company is that sensitive, you shouldn’t be deploying Macs or PCs – you should be deploying actual dumb terminals.

      “f. Security again – to an IT “Doofus” … “Target Mode” on a Mac is viewed as a major security breach, ”

      Whoa… You’re concerned about Target Disk Mode because it could be a possible security breach, and yet the fact that Windows doesn’t even possess* security apparently doesn’t concern you? What?

      (*Yes, I know it has plently of fake security. But I’m talking about the real thing.)

      “g. cross-compatibility with legacy DOS applications doesn’t exist with Macs.”

      Uh, hello? DOSBox? Qemu? Parallels Desktop? VMWare Fusion?

      Also, why the hell are you relying on legacy DOS applications in the first place? It’s called programming. Go do it.

      “Windows still runs 95% of the world because it offers the enterprise greater control over the end user, plus legacy support,”

      No, Windows is prolific in the enterprise because IT doofuses keep recommending it(which ends up costing their companies a fortune both in maintenance and lost productivity), and because of lock-in thanks to legacy and speciality apps which IT doofuses refuse to have replaced.

      Under no circumstance does it make sense for a business to run on the worst, most bug ridden, least secure “operating” system in the whole of the known universe. If not OS X, you should at the very least be running some Unix variant. Not Windows. Not ever.

  7. Steve (MDN) the name calling just lessens your comments. It’s petty and spiteful. Don’t cheapen your comments with name calling. Last time I checked you weren’t a troll!

    There is still a lot IT professionals need to do managing Mac and iOS devices. Profile Manager from Apple doesn’t cut it.

    Don’t get me wrong, an Android device wouldn’t make it through the door at our company but managing devices so they work seamlessly with networks still requires work. There are a lot of us IT guys here that support your site.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.