5 technologies that will change the market

 

Connecting state and local government leaders

A guide to the promise, peril and disruption that these technologies will bring to the government market.

If you measured the state of the economy by the number of new and potentially disruptive technologies on the market, you would think we’d be in an economic boom.

Despite the worst economic downturn since the Great Depression, the flow of disruptive technologies in the market has steadied if not increased during the past couple of years.

In large part, that trend is fueled by many of the side effects of the terrible economy, such as an increase in competition, decrease in supply and stronger need to do more with less.

The new trend is focused on creating tools and services that challenge, rethink and dramatically change the way that we use existing technologies. The goal is to provide convenience, security and improved universal service to customers. And make no mistake, some of the products coming out of these new technologies are disruptive and truly innovative, while others are fads.

Now more than ever it requires a symphony of technologies marching in rhythm to make a technology certifiably disruptive. The timing, economy, infrastructure, price and need all must be there at the same time.

Another growing trend with disruptive technologies is the need for those technologies to be familiar to consumers. The factors that led Apple Computer Inc. to change the way we listen to music were not a new idea. Apple was far from the first company to create a portable digital music player, nor was it the first to create the software component that aggregates your music into a library.

What Apple did was disrupt the industry by focusing on the software to make it easy, free and downloadable and then providing an easy, clean and idiot-proof hardware component to match. The result was a paradigm shift in the way we use all forms of media.

The success of a disruptive technology product often depends on the same characteristic that is vital to successful systems integration. The products that can break down the silos that separate disruptive technologies and produce a fully integrated experience will survive to become a sustaining technology and mainstream product.

We’ve examined the following five disruptive technologies to explore upcoming products and trends so you can better prepare for the changes that are coming in the next couple of years. To no surprise, the products to look out for take advantage of multiple technologies to offer users solutions rather than tools.

NEXT: Data, data everywhere


1. Mobile

The mobile market is a personal favorite technology for me to study because the evolution from carrying a beeper, a roll of quarters for pay phones, your address book, a good paperback book, wallet and watch to having a single device that lets you store contacts, read and purchase new books, make and receive calls, and conduct point-of-sales transactions while listening to music is true disruption.

In the coming years, you can expect the consolidation trend in mobile computing to increase in speed. But instead of removing items we carry, the focus is and will continue to be on centralizing services. Apple and Google started this trend with apps for their mobile platforms, and retail, financial, insurance, medical and governmental entities are all moving toward those types of mobile platform services.

The second large trend in mobile will be the way we communicate with those services. The advent of two-way, high-resolution video, mixed with more sophisticated data compression, intelligent video/call routing and robust wireless bandwidth, is creating a new dynamic in the way we communicate with one another and our service providers.

It’s a marriage of disruptive collaboration technology such as video and videoconferencing and our day-to-day activities that provide the ability to physically see a person instead of just hearing them. In the next couple of years, you’ll be able to show an injury to a triage nurse at a local clinic for advice before making an appointment.

A chief beneficiary in the government market will be teleworkers. Telework will become more popular as it becomes as easy and inexpensive to communicate with someone across the country as it does with someone down the hall.

According to a 2006 CDW Government Inc. study on telework, 41 percent of federal employees indicate they telecommute, which was up from 19 percent at the same time in 2005. Information technology professionals have significantly expanded technical support for telework programs, and 32 percent of IT professionals indicated that their agency has started or expanded such a program since 2006.

In recent years, the operational savings coupled with mobile computing and collaboration technology advancements have increased the telework trend, which I expect will become the most common work environment in the next five years.

The two main problems of disruptive mobile technology are security and limits in data mining. It’s nice that I can have a virtual face-to-face conversation with my boss and forward him an e-mail message that he requested while we meet. However, it becomes a moot point if I can’t find that e-mail message because I have gigabytes of small, medium and large pieces of data to sift through before I find it. Even now, I know colleagues who often prefer to re-create data instead of taking the time to look for the original because the original is buried under mountains of old documents, multiple versions of files and gigabytes of e-mail messages.

Part of the security challenge is coming from the increasing ability to snoop on transmitted data packets and decrypt information. The rate of theft and data integrity will go up in the coming years. The problem with that threat is that the onus isn’t just on the mobile device manufacturers to include proper security software. The service providers and users also need to take the proper precautions to guarantee data integrity.

I see biometrics making a strong comeback in coming years as people, who are sick of remembering passwords, swipe their finger or iris to authenticate their identity.

NEXT:  The coming search revolution


 

2. and 3. Search and the Semantic Web

The relationship between search technology and the Semantic Web is a perfect illustration of how a small sustaining technology, such as a basic search feature on an operating system, will eventually be eaten up by a larger disruptive technology, such as the Semantic Web. The Semantic Web has the potential of acting like a red giant star by expanding at exponential rates, swallowing whole planets of existing technology in the process.

The technology started as a simple group of secure, trusted, linked data stores. Now Semantic Web technologies enable people to create data stores on the Web and then build vocabularies or write rules for handling the data. Because all the data by definition is trusted, security is often less of a problem.

The task of turning the World Wide Web into a giant dynamic database is causing a shift among traditional search engines because products such as Apture, by Apture Inc. of San Francisco, Calif., let content publishers include pop-up definitions, images or data whenever a user scrolls over a word on a Web site. The ability to categorize content in this manner could have significant implications not only for Web searches but also for corporate intranets and your desktop PC.

These types of products will continue to expand, initially in the publishing industry and then to most industries on the Web in the next two to three years.

For example, human resources sites could use them to pop up a picture and a résumé blip when a recruiter drags a mouse over an applicant's name. Medical and financial sites such as the National Institutes of Health could use it to break down jargon and help with site exploration.

In the next three to five years, I would expect desktop operating system search engines to operate in a way that is similar to the Semantic Web and even have their search engines connect to the Web for an expanded search.

Government sites around the world, such as Zaragoza, Spain, and medical facilities, such as the Cleveland Medical Clinic, are using the vocabulary features of the Semantic Web to create search engines that reach across complex jargon and tech silos to offer a high degree of automation, full integration with external systems and various terminologies, in addition to the ability to accurately answer users' queries.

Despite my excitement about the possibilities of turning a large body of data into an integrated and dynamic database, there are some downsides. During the past three years, the economy has slowed the development of Semantic Web products and services. And this disruptive technology is like any open-source initiative: It requires the public’s help to develop it into something useful, functional and truly disruptive.

There is some danger in using this technology to commoditize data and push content to users. The Semantic Web would essentially allow a large retailer to track your interests, purchasing patterns and behavior to increase sales. That could be a slippery slope to privacy invasion.

The enormous amount of data on the Internet has made it increasingly difficult to find, access and maintain the information that most users require. The Semantic Web can solve that problem. That fact is enough to justify the Semantic Web as a necessary disruptive technology that will spawn both useful and wasteful products.

NEXT: What happens when cloud computing takes off?

 

4. and 5. Virtualization and cloud computing

Virtualization and cloud computing are tied together in similar ways as search functions and the Semantic Web.

The probability of search functions becoming part of the Semantic Web is as high as virtualization acting as a steppingstone to cloud computing.

Whether it's at the operating system level, virtual machine model or paravirtual machine model, virtualization is the process of turning one machine into a domain of several independent, virtual machines.

Cloud computing, which is essentially the outsourcing of IT activities to an Internet provider, would allow IT managers to erase maintenance, licensing and training from their list of costs while improving the speed with which they can get their products or services.

Thomas Bittman, vice president and distinguished analyst at Gartner, said it can take an average of four to six weeks to deploy a server. A virtual server cuts that time by a factor of 30, and a cloud server network could be even faster.

However, despite those benefits, I don’t see all major enterprises moving toward a cloud, especially during the next five years.

Most government agencies, financial institutions and some areas of medical services might never buy into true cloud computing because, at the end of the day, they need to know that all of their data in Richmond, Va., or Toledo, Ohio, is resting comfortably in a secure location that they can access at any time.

Despite that concern, many of those industries will eventually migrate to some sort of private cloud in which they still get to have control of the logistics and mechanics behind their data.

If working with outsourcing has taught me anything, latency and outages will always be problems. Assume your enterprise loses network connectivity or the cloud provider loses power. You’re in deep trouble and will be left with little to no control over the fix. That leaves a need for redundancy, which eliminates the cost benefits of a cloud.

Virtualization isn’t immune to drawbacks either. Just like cloud computing, virtualization carries a single point of failure. If that one machine crashes, you could lose hundreds of services and thousands of clients. Additionally, virtualization is power hungry and sometimes leads to slower performance.

However, companies such as Red Hat are investing heavily in operating system virtualization and have made huge strides in mitigating some of virtualization's risks. For example, Red Hat Version 6 will be more efficient and autonomic and offer a more secure and independent service.

NEXT: What have we learned? 


Lessons Learned

In investments, a diversified portfolio is usually the least risky solution. Technology is no different. To weather the disruption of game-changing technologies, the best approach is to take small, diversified steps.

With mobile technology, the movement toward collaborative integration, such as videoconferencing, is inevitable but should be counterbalanced with the knowledge that the technology will be plagued by latency for the next two to three years.

Search functions online and on your PC will continue to strengthen, but so should your patience, because the amount of available data to sift through is growing exponentially. 

Enterprises should ignore the hype of cloud computing and virtualization and treat those new technologies like any other new advancement: Use them in small, strategic steps to make sure the technologies work for the enterprises' needs and purposes — and have a backup plan and proper procedures in place to deal with potential drawbacks.

NEXT STORY: The 2010 Rising Stars

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.