Telecom Signaling Industry News

TMCNet:  CA Technologies Top 5 IT Predictions for 2013

[December 18, 2012]

CA Technologies Top 5 IT Predictions for 2013

Dec 18, 2012 (M2 PRESSWIRE via COMTEX) -- CA Technologies (NASDAQ: CA) today released its top five IT predictions for 2013: 1. Big Data Grows Up: There will be an emergence of Big Data Administrators, who will play a critical role in using new technologies and processing power to take a cold, hard (and useful) look at data and its business application. In 2013, Big Data projects will begin to show demonstrable ROI. As with cloud, our definitions will mature, enabling better focus on delivering business value. This infrastructure that integrates with data from social media and open data sources will dramatically increase the demand for management and security. The risk of Big Data decision is much lower and the insights Big Data provides will increase IT's leadership on innovation.

2. Enterprises Adopt Public Cloud: Enterprises will adopt public cloud services, spurred by the expansion of offerings from Service Providers (SP) like established telcos, who have already earned their trust. In addition, as SPs franchise their business models and technologies, cloud services will surge outside the US. Additionally, the buzz of "the cloud" will dim as people realize it's just the way business is done. Vertical industries such as healthcare will lead this trend, realizing its impact on security, the value of specialized community cloud services and the ability to address compliance while driving down costs. Mainframe will move more rapidly to the cloud as companies that already have a mainframe will adopt cloud technologies and processes to get the most out of them. Externally hosted private cloud adoption will also increase in the next couple of years.

3. Identity is the New Perimeter: Enterprise users know no bounds of time and space. As they adopt cloud services and collaborate globally with external customers and partners from multiple devices, they erase the traditional IT perimeter. Security professionals today find themselves in a borderless war on multiple fronts and one common ally -- Identity. Strongly authenticated identity is the new perimeter. This places emphasis on reducing risk at the authentication point, signaling the end of the password as we know it today. As such, we expect to see advanced authentication models expand. We will see more risk-based authentication coming into play based on the device, transaction, location and more. We will see industry move towards more intelligent methods of authentication such as pattern creation, image recognition, mobile phone-based authentication, audio and biometrics. But this is not enough. We will see more content-driven security based on what the data is, or how it's classified, and that information, plus user identity and role, will be used to guide access rights.

4. The Seventh Sense: There will be increased exploitation of sensing technologies available in most modern mobile devices as the 'Internet of Things' takes hold. Everything will become intelligent as sensors are embedded into a wide array of devices from the home to those that drive applications that span disaster management, healthcare IT, transportation networks, Smart Grids, utility computing and more. These technologies will drive additional demand for IT to manage, store, analyze and secure the data traffic, privacy and end points.

5. Mobile/Social First in the Enterprise: Companies will start to build applications not just with mobile/social platforms in mind, but primarily for mobile/social platforms, with traditional platforms secondary or not supported at all. Consumerization will accelerate as we see the end of resistance from the enterprise embracing the rich, immersive user experience consumers are used to from mobile applications. In parallel, the management of mobile/social IT will become less about managing and securing the devices themselves, and more about managing and securing the mobile applications and mobile data, all while preserving the user experience.

Runner Up - The Rise of DevOps is Imminent: Intelligent computing in every piece of equipment in the world today is driving the world towards environments that are becoming so complex that operations needs to be taken into consideration before the first line of code is written. As the move to agile brings developers, testers, and business closer together, we see DevOps driving the rise of experience-led design. The CIO will be less worried about managing devices and more concerned with managing apps. As services are moved to the cloud, consumers will be less interested in monitoring infrastructure themselves. DevOps will necessitate the reconstitution of traditional frameworks like ITIL, extracting their most valuable concepts and adjusting them for modern, agile development. In this reality, cloud, mobility, and DevOps are becoming one movement.

"In 2013, IT will drive business competitiveness. CIOs need to achieve an end-to-end service delivery model, tying in all the required elements and technologies to create an integrated user experience. To stay relevant, CIOs will function as Business Service Innovators and Integrators, managing diverse services and service aggregations that differentiate business offerings," said John Michelsen, chief technology officer, CA Technologies. "IT must begin to act as a trusted advisor, service broker and as quality assurance in this brave new world of complex IT." The proliferation of smart mobile devices and BYOD, cloud computing, Big Data and security have brought a new level of complexity. Historically, technology was transactional and IT defined. However, in this networked world, technology is evolving beyond simply enabling operations to being a truly intelligent driver of business innovation.

More than ever before, IT is so well primed to begin its transition from technology ownership and management to becoming the broker of business services. As SaaS, PaaS and IaaS provide turnkey, infrastructure-less access to compute capacity, IT will increasingly focus on composite business applications--rather than the buy-build-manage model--to achieve new levels of speed, innovation, performance and cost/risk efficiencies.

About CA Technologies CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. Learn more about CA Technologies at .

((M2 Communications disclaims all liability for information provided within M2 PressWIRE. Data supplied by named party/parties. Further information on M2 PressWIRE can be obtained at on the world wide web. Inquiries to

[ Back To Telecom Signaling's Homepage ]

Featured Events

5G NA Signaling Day

November 14-16, 2016
Sheraton Dallas, Dallas, TX

Featured Webcasts

Securing The Signaling Interconnect: Oracle's Perspective On Recent Security Events

Today's telecommunications landscape is changing rapidly, and the "institution" of trust between networks that has been assumed over the decades is no longer relevant. We are now hearing of vulnerabilities in CSP interconnection points that have been known ...

Applications of Wi-Fi Calling

With all of the discussion about faster data access and richer content, it could be assumed that voice services no longer play an important role in the business model of the communications service provider. Join ReThink Technologies Research and Oracle Communications as we explore ...

Featured Whitepapers

Oracle Communications Diameter Signaling Router Main Differentiators

Diameter is the protocol used by network elements in LTE and 3G networks to enable and monetize services, such as voice, video and data. Diameter enables revenue-generating data services; including tiered data plans, loyalty programs, application specific QoS, content provider and Internet of Things (IoT) solutions ...

Multi-Layer Security Protection for Signaling Networks

The sanctity of mobile operators' networks and brands will depend greatly on their ability to deliver QoS guarantees to roaming and interconnect partners, while simultaneously protecting increasingly multimedia-savvy and socially connected ...

Featured Datasheets

Oracle Communications Diameter Signaling Router

Centralizing Diameter routing with cloud deployable Oracle Communications Diameter Signaling Router creates a secure signaling architecture that reduces the cost and complexity of the core network and enables elastic growth, interoperability and rapid introduction ...

Oracle Communications Mobile Security Gateway

The Oracle Communications Mobile Security Gateway is a high performance gateway that allows the Communications Service Provider (CSP) to cost effectively expand network coverage and increase capacity by incorporating Heterogeneous ...

Oracle Communications Evolved Communications Application Server

As service providers drive their networks toward an all-IP and virtualized state, they require the means to design and deliver compelling high definition voice, video and multimedia offers via Voice over LTE (VoLTE) and Voice over WiFi (VoWiFi) ...

Featured Infographic