Dossier : Un CES 2013 Riche En Annonces

Total Page:16

File Type:pdf, Size:1020Kb

Dossier : Un CES 2013 Riche En Annonces Dossier : un CES 2013 riche en annonces Le CES 2013 de Las Vegas vient de fermer ses portes. Des centaines d’annonces ont été faites dans le cadre de ce rassemblement. Pas moins de 24 ont fait l’objet d’un article au sein deSilicon.fr . Débutons notre dossier par un article de fond : «CES 2013 : une édition sous le signe de la connexion ». D’un point de vue technologique, voici les grandes stars du CES 2013 la: mobilité et les processeurs. À commencer bien entendu par le Tegra 4 de Nvidia. Les annonces de la firme ont fait l’objet de plusieurs articles sur notre site : Nvidia lance le Tegra 4, le plus puissant processeur ARM jamais conçu Tout sur le Nvidia Tegra 4 : fréquence, technologie et positionnement face à la concurrence Avec Nvidia Grid, le jeu 3D se transporte dans le cloud La technologie Grid Gaming System de Nvidia, en images Nous avons assisté à une véritable déferlante de puces ARM : ST-Ericsson pousse ses puces ARM à 2,5 GHz Qualcomm dévoile les Snapdragon 600 et 800 Puce Exynos 5 Octa, l’Hydre à 8 têtes de Samsung Broadcom se donne les moyens de percer dans la mobilité Huawei disposera d’un processeur ARM Cortex-A15 à 8 cœurs Le monde x86 n’est toutefois resté inactif : Intel lance ses nouveaux processeurs Atom et Core pour terminaux mobiles AMD présente les premiers SoC x86 quadricœurs du marché Même l’architecture MIPS a eu son mot à dire : Puce JZ4780 : le bras armé de l’architecture MIPS pour les tablettes La mobilité… avant le MWC Certains constructeurs n’ont pas attendu le Mobile World Congress 2013 de Barcelone (du 25 au 28 février) pour lancer de nouveaux terminaux mobiles. Commençons avec les smartphones : Huawei Ascend Mate, le plus grand smartphone au monde Huawei lance le W1, son premier smartphone Windows Phone 8 Xperia Z et ZL, deux haut de gamme chez Sony Microsoft a vendu 5 fois plus de Windows Phone à Noël qu’en 2011 Lenovo K900 : le smartphone le plus fin du CES 2013 Six terminaux BlackBerry 10 en vue en 2013 Et poursuivons avec les tablettes : Acer joue la carte du low cost avec une tablette Android 7 pouces à 119 euros Panasonic mène l’offensive B2B avec la gamme ToughPad Notez que nous avons également mis au point une galerie photos des smartphones et tablettes qui ont retenu notre attention. Vous la trouverez en bas de page, ou à cette adresse :Les « smartphones et tablettes du CES 2013 ». De la technologie encore et toujours Voici les autres sujets en relation avec le CES 2013 traités au sein de Silicon.fr : SuperSpeed va doubler la vitesse de l’USB 3.0 Le Gorilla Glass 3 se veut toujours plus résistant Qualcomm déploie ses technologies au CES 2013 Lenovo ancre l’IdeaCentre Horizon dans l’ère du “PC Plus” QNAP crée du liant dans son offre Pour aller (encore) plus loin, nous vous renvoyons vers nos confrères de NetMediaEurope, qui ont eu aussi largement couvert cet évènement. Le CES 2013 chez ITespresso.fr Le CES 2013 chez Gizmodo.fr Quiz Silicon.fr – Les temps forts du CES 2013 en dix questions Les smartphones et tablettes du CES 2013 Visualiser ou chorégraphier les processus ? le long chemin du B.P.M. en France Définir la stratégie commerciale de l’entreprise, embaucher un collaborateur, administrer les flux logistiques, traiter les factures… les entreprises exécutent des processus métier à tous les niveaux, parfois même sans le savoir. LaGestion des Processus Métier (ou BPM, Business Process Management) est un ensemble de méthodes et d’outils qui visent à gérer le cycle de vie des processus métier : conception, modélisation, simulation, exécution, automatisation, pilotage, diagnostique, optimisation… Mettre en œuvre une solution de BPM consiste à modéliser et automatiser un ensemble d’activités en orchestrant les interactions humaines et les échanges de données avec le système d’information existant (ERP, CRM….). Schématiquement, on distingue les outils deBPA (Business Process Analysis) qui permettent la cartographie, l’analyse et la modélisation des processus, et les outils deBPM (Business Process Management) qui traitent l’automation, l’exécution et la supervision des processus. État du marché en France L’amélioration des processus métier devient importante voire stratégique pour 91% des entreprises en France. C’est ce que révèle l’enquête menée par Le CXP sur les usages et les pratiques de la Gestion des processus métier en France en 2013. Ainsi 81 % d’entre elles ont déjà engagé une démarche d’amélioration de leurs processus métier. Mais si l’importance de cette démarche est clairement perçue, les moyens mis en œuvre restent encore archaïques. Les processus sont encore souvent exécutés au moyen d’emails et de pièces jointes (fichiers Word et Excel). Seulement 23% des entreprises utilisent des outils BPA pour modéliser leurs processus et 17% des outils BPM pour en orchestrer le déroulement. Des chiffres confirmés par l’étude d’Ernst & Young « Panorama 2013 du Business Process Management. Le BPM en marche » : 23 % des répondants utilisent un outil de modélisation dans leur démarche BPM. Comment expliquer cette ignorance des outils BPM en France ? Pour Capgemini qui a publié une version française de son rapport Enquête sur le marché du BPM en France, la faute reviendrait au manque d’implication des directions générales : seules 11 % des personnes interrogées affirment que le BPM est une préoccupation pour la Direction Générale et 54 % ont reconnu que la culture en silo des entreprises françaises est un frein à l’accomplissement des projets BPM. Pour Ernst & Young et Le CXP, on retrouve le même son de cloche : direction peu impliquée, difficulté à mesurer le ROI, méconnaissance des outils, manque de compétences internes. Un marché français atypique En France, les outils les plus populaires (en renommée et en utilisation) sont selon Le CXP les solutions de Microsoft, Software AG et Mega. En open source, on trouve surtout Bonitasoft. > Microsoft Curieusement, le principal vendeur d’outils BPM en France ne propose pas de suite BPM, mais un ensemble d’outils qui, mis bout à bout, permettent de réaliser du BPM. De ce fait, l’éditeur ne fait pas partie du fameux Forrester Wave BPM Suites Q1 2013. Pour faire du BPM, on pourra utiliser selon les cas Visio, SharePoint Server, SQL Server, Project Server… Destiné à l’origine à dessiner des diagrammes, Visio s’est mué progressivement en outil de modélisation et de de validation de processus métier. C’est aujourd’hui l’outil le plus utilsé en France (58 % selon le CXP). Visio permet de déployer les workflows dans SharePoint. Ce dernier n’est pas à proprement parler un outil BPM, SharePoint est plutôt une plate-forme de collaboration permettant de capturer la connaissance de l’entreprise, de partager des documents, de créer des processus de gouvernance en utilisant les fonctionnalités de workflow. Consolider les processus métier avec Project Server DSI chez Solairedirect, premier producteur indépendant français d’électricité solaire, Benjamin Drieux-Falgon avait besoin de gérer des projets (documents juridiques, fiches techniques, études… ) en s’interfaçant avec l’ERP et la GED sous SharePoint. Il a choisi Project Server. «La combinaison Project Server, SharePoint et SQL Reporting Services apporte une gestion centralisée des projets, où chaque projet a son propre espace collaboratif. (…) Entre les efforts d’analyse et de remise à plat de nos processus consentis en amont et les fonctions avancées de Project Server, nous allons gagner en productivité et en sérénité » déclare Benjamin Drieux-Falgon. Bonitasoft Les administrations privilégient les solutions open source et Bonitasoft s’impose sur ce marché, mais également sur celui des PME avec peu de moyens. Patrice Salsa, DSI de la CFDT, avait besoin de revoir entièrement la gestion des 800 000 adhérents du syndicat, répartis aux quatre coins de la France, souvent en situation de mobilité. «Les enjeux étaient d’optimiser le temps des militants, de partager les outils informatiques et d’intégrer la génération Y. »déclare-t-il. Le choix s’est porté sur la solution Bonitasoft, capable de s’interfacer avec les applications Java existantes, mais aussi de permettre une démarche de prototypage/POC (Proof Of Concept). « Bonitasoft nous a permis d’offrir une meilleure expérience utilisateur dans la validation des données, une unification dans la présentation […] Au final, nous avons gagné en productivité, mais surtout une unification, une fiabilité et un pilotage centralisé des processus, avec une réduction de notre empreinte carbone » conclut Patrice Salsa. Perspectives du BPM Aux États-Unis, le BPM semble être entré dans les mœurs. Le rapport de CapgeminiGlobal Business Process Management Report révèle que 82 % des sondés au niveau mondial déclarent avoir à la fois une connaissance et une expérience pratique du BPM. L’optimisme est de mise pour les cabinets d’analystes américains comme Winter Green Research qui prévoitune croissance du marché des logiciels de BPM jusqu’à 7 milliards de dollars en 2018. Le BPM a lui aussi son modèle de maturité, le BPM Maturity Model décrit par Gartner. On constate qu’il reste encore du chemin à faire pour atteindre le niveau 5 des processus maîtrisés. Avec le Web 2.0, les entreprises commencent à intégrer lesocial dans leur stratégie : placer le client au cœur de la stratégie, être à l’écoute et réagir sur les réseaux sociaux. Les processus et les outils de BPM commencent à intégrer des foncions sociales (collaboration via messagerie instantanée, flux de statuts, partage de documents…). C’est le Social BPM. Les solutions commencent à prendre en compte aussi – lemobile
Recommended publications
  • HP Openview Storage Data Protector Concepts Guide
    HP OpenView Storage Data Protector Concepts Guide Manual Edition: April 2005 Manufacturing Part Number: B6960-90105 Release A.05.50 © Copyright Hewlett-Packard Development Company, L.P.2005. Legal Notices ©Copyright 2004 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. UNIX® is a registered trademark of The Open Group. Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation. Oracle® is a registered U.S. trademark of Oracle Corporation, Redwood City, California. Java™ is a U.S. trademark of Sun Microsystems, Inc. ARM® is a registered trademark of ARM Limited. ii Contents 1. About Backup and Data Protector In This Chapter . 2 About Data Protector . 3 Introducing Backups and Restores . 7 What Is a Backup? . 7 What Is a Restore? . 7 Backing Up a Network Environment . 8 Direct Backup . 9 Data Protector Architecture . 10 Operations in the Cell. 12 Backup Sessions . 12 Restore Sessions . 14 Enterprise Environments . 15 Splitting an Environment into Multiple Cells . 16 Media Management . 19 Backup Devices .
    [Show full text]
  • HP LTO Ultrium Tape Drives Overview
    QuickSpecs HP LTO Ultrium Tape Drives Overview The family of HP LTO Ultrium tape drives is HP's premier line of backup devices. Based on the LTO Ultrium format, an open standard with a well-defined six-generation roadmap, HP LTO Ultrium tape drives offer customers the best choice for investment protection. With ultimate reliability and ease of use in mind, even at 100% duty cycles, HP's rugged design builds on superior LTO technology and adds advanced features like hardware data encryption to create a new level of data protection. The tape drives employ dynamic data rate matching to adjust to the speed of the host, reducing wear and tear on both drive and media and increasing performance, even on slower hosts. HP's ultra-durable soft-load feature automatically positions the data cartridge together with the highly reliable HP leader-capture mechanism make your backup and restore operations more reliable. Support for HP One-Button Disaster Recovery provides the easiest way to restore data in the event of a disaster. The family of tape drives also features support for HP TapeAssure which provides a single application for drive management and HP Library and Tape Tools which provides diagnostics, and performance optimization. Included with the HP LTO Ultrium tape drives is Data Protector Express Basic backup and recovery software providing a backup application to protect a single server. If data is critical to your business, protect it with an HP LTO Ultrium tape drive. HP LTO Ultrium Full-Height Tape Drives HP LTO-5 Ultrium 3280 Tape Drive HP LTO-5 Ultrium 3280 Tape Drive sets new standards for capacity, performance, and manageability.
    [Show full text]
  • Quickspecs HP Data Protector for Notebooks & Desktops Software Overview
    RETIRED: Retired products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models. QuickSpecs HP Data Protector for Notebooks & Desktops software Overview HP Data Protector for Notebooks & Desktops software continuously and automatically protects users' files on networked Windows notebook and desktop computers. Continuous protection means that data files, such as Microsoft Office documents, are backed up as soon as they are saved. For the IT administrator, with data on up to 1000 end-user machines to protect, Data Protector for Notebooks and Desktops delivers an easy to manage, robust and unified solution to protecting data on the organization's notebook and desktop computers. For users it provides assurance that their data is safe should they accidentally delete it or corrupt it or should they lose or damage their computer. Protection happens invisibly to the users; there is no backup operation to be manually triggered or scheduled. User self-service data recovery saves time for both the IT administrator and that user. Data Protector for Notebooks and Desktops integrates into Windows Explorer so that a right click opens a context menu that is used to select file versions available for recovery. The multiple file versions are stored using smart differencing technology to optimize use of the available storage space. The protection extends to persistently open files such as Microsoft Outlook PST files and works when the user is connected to the network or working off-line. For added protection, HP Data Protector for Notebooks and Desktops software works with Data Protector Express backup/recovery software to allow protected data to be further protected by backup to tape or other media.
    [Show full text]
  • User's Guide and Technical Reference Data Protector Express
    User’s Guide and Technical Reference Data Protector Express ii Data Protector Express ® User’s Guide and Technical Reference Copyright Copyright © 2005/2006 by Hewlett-Packard Limited. March 2006 Part Number BB116-90023 Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Hewlett-Packard. The information contained in this document is subject to change without notice. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information is provided ”as is” without warranty of any kind and is subject to change without notice. The warranties for Hewlett-Packard Company products are set forth in the express limited warranty statements for such products. Nothing herein should be construed as constituting an additional warranty. www.hp.com Trademarks Windows® and Windows NT® are registered trademarks of Microsoft Corporation. NetWare® is a registered trademark of Novell, Inc. Linux® is a registered trademark of Linus Torvalds. Red Hat® is a registered trademark of Red
    [Show full text]
  • HP X3000 Network Storage Systems Product Overview
    QuickSpecs HP X3000 Network Storage Systems Product Overview IP-based gateway services for arrays/SANs and highly available shared storage solutions built on industry standards You made the decision to invest in a storage array, but now you've found that you still have file and application servers that aren't connected. So you're still spending time managing islands of storage and your array isn't meeting its full potential. Wouldn't it be nice to complete the consolidation to truly create one unified storage pool to expand and protect? HP X3000 Network Storage Systems boost the value of your array or SAN by adding Windows-powered IP-based gateway services to it. You'll spend less time and effort on maintenance and deliver a better return-on-investment for your array/SAN when you consolidate to a single, unified storage pool that can serve files to your clients and blocks to your servers via multiple protocols (FC/iSCSI or SAS/iSCSI). Industry-standards protect your investment by providing compatibility with your network and applications, and a Microsoft Cluster Server (MSCS) license is included to provide high availability and reduce downtime. What is an X3000 HP X3000 Network Storage Systems are enhanced Windows-powered gateway and shared storage Network Storage System? solutions for your medium business, workgroup, or datacenter environment. They are built on industry- standard HP ProLiant servers and come with the Microsoft® Windows Storage Server 2008 Enterprise operating system -- including cluster services -- pre-installed. They connect via Ethernet and add file, print, iSCSI, and management services to an array or SAN, or they can be used in conjunction with array storage to build an affordable and highly-available unified storage solution.
    [Show full text]
  • Magic Quadrant for Enterprise Backup/Recovery Software
    6/10/13 Magic Quadrant for Enterprise Backup/Recovery Software Magic Quadrant for Enterprise Backup/Recovery Software 5 June 2013 ID:G00245495 Analyst(s): Dave Russell, Pushan Rinnen VIEW SUMMARY STRATEGIC PLANNING ASSUMPTIONS Through 2015, disk-to-disk-to-tape (D2D2T) Backup is among the oldest, most performed tasks in IT. The industry continues to undergo backup will remain the predominant strategy for significant change as organizations embrace new technologies and techniques and show a large enterprises. propensity to augment or switch legacy vendors and backup techniques. By the end of 2016, 40% of large enterprises, up from 20% at year-end 2012, will have eliminated tape for operational recovery. Between 2012 and 2016, one-third of Market Definition/Description organizations will change backup vendors due to frustration over cost, complexity and/or capability. This document was revised on 7 June 2013. The document you are viewing is the corrected By 2016, at least 20% of large enterprises will version. For more information, see the Corrections page on gartner.com. abandon backup/recovery solutions using a traditional methodology and adopt those that A vendor profile in this research is not entirely product-specific, but rather represents the vendor's employ only snapshot and replication techniques, up from less than 7% today. overall position in the enterprise backup/recovery software market. The emphasis of this Magic Quadrant research is on backup/recovery software (that is, backup applications). For vendors that meet the inclusion criteria (weighted heavily toward backup application software capabilities), we EVALUATION CRITERIA DEFINITIONS evaluated their entire backup/recovery software and hardware portfolio.
    [Show full text]
  • Emea Q1 SLO 8Strani 02 200X280 02.Pdf
    HP priporoča Windows Vista® Business NOVEMBER 2007 LJUCI ZAK LETO 2007 v Stilu i! u p nak PRENOSNI RAČUNALNIK i HP COMPAQ 6710b obr Bodite učinkoviti tudi na terenu. d Priporočena cena* (z DDV): OGLASI SE, 1. 038,00 € NAGRADA KLIČE! Procesor Intel® Core™2 Duo T7250 (2 GHz) Zaslon 15,4’’ TFT WXGA 1280 x 800 ® ® KLIKNI - Intel PRO/Wireless LAN 802.11 a/b/g Grafična kartica Intel MGA X3100 z do 384 MB www.hp.com/si/nagradnaigra Originalni Windows Vista® Business SLO deljenega pomnilnika Microsoft® Office 2007 Ready Čitalec prstnih odtisov Pomnilnik 1 GB DDR2 667 MHz (1 slot prost) Vmesnik Bluetooth Trdi disk 160 GB SATA 5400 rpm Vgrajen varnostni čip TPM Dvoslojni pogon DVD+/-RW Garancija: 1 leto Podporni paket, ki podaljša garancijo na 3 leta. HP Priporočena cena* s HP Care Packom (z DDV): Care Pack 1.181,00 € Garancija ščiti vaše izdelke HP, HP Care Pack dvigne raven naše storitve. Obiščite: www.hp.com/si/Pametneresitve Kupite: www.hp.com/si/Partnerji Vse modele predstavljenih računalnikov HP priporoča Windows Vista® Business lahko dobite tudi z operacijskim sistemom Windows® XP Professional! Pokličite svojega pooblaščenega prodajalca! VELIKE SLIKE RAČUNALNIšKI ZASLON VISOKA HP L1950T 19” LOČLJIVOST Priporočena cena*(z DDV): 274,00 € RAČUNALNIšKI ZASLON ŠIRŠI ZASLON HP L2045w 20,1” ŠIRŠE IDEJE Priporočena cena*(z DDV): 317,00 € MICROTOWER MICROTOWER NAMIZNI RAČUNALNIK NAMIZNI RAČUNALNIK HP COMPAQ dx2300 HP COMPAQ dx2300 Hiter začetek vašega posla. Profesionalna oprema, profesionalno poslovanje. Priporočena cena*(z DDV): + Priporočena cena*(z
    [Show full text]
  • County of Ventura
    COUNTY OF VENTURA COMPUTING ARCHITECTURE STANDARDS FEBRUARY 19, 2014 County of Ventura Computing Architecture Standards TABLE OF CONTENTS 1. Executive Overview ................................................................................................... 1 1.1. Purpose/Objective ............................................................................................... 1 1.2. Architecture Document Updates/Maintenance .................................................... 1 2. Standard Categories .................................................................................................. 1 2.1. Local Area Network (LAN) Servers ..................................................................... 1 2.2. Individual Personal Computer System ................................................................ 1 2.3. Application Architecture ....................................................................................... 1 2.4. Infrastructure ....................................................................................................... 2 3. Standard vs. Alternative Products .............................................................................. 2 4. Standard Adoption and Exception Approval Process ................................................. 2 5. Standards Currently Under Review ............................................................................ 3 6. Exemptions ................................................................................................................ 3 CHART I – Local Area
    [Show full text]
  • HP Data Protector Software
    QuickSpecs HP Data Protector software Overview An intelligent approach to data protection HP Data Protector is the industry's first Adaptive Backup and Recovery solution that uses an intelligent approach to data protection and management. Advanced integration with applications and infrastructure, and operational analytics to optimize backup and recovery process, help you to improve business continuity, and boost uptime within your IT environments. With HP Data Protector, you can centrally manage and protect critical data scattered across remote sites and data centers in physical, virtual, and cloud infrastructures. Today, more than 45,000 customers worldwide use HP Data Protector software to safeguard their business information. In the IT arena, shifting data center requirements are forcing organizations to reassess backup and recovery processes, strategies, and infrastructure for a number of reasons: The need to keep pace with increased data volumes, diverse data formats and complexity Advanced data center technologies such as virtualization and cloud New business models such as IT-as-a-service (ITaaS) and Bring Your Own Device (BYOD) The need to manage and protect data according to tightening internal policies and always-on 24/7 service level objectives HP Data Protector is helping organizations of every size address these challenges with software that offers advanced data protection capabilities such as HP StoreOnce federated deduplication, integrated cloud backup, Enhanced Automated Disaster Recovery (EADR), Zero Downtime Backup, Instant Recovery, advanced virtual server protection, and mission-critical application recovery down to the exact second. With HP Data Protector, you gain better transparency, predictability, and business resiliency within your IT environments. Key Product Highlights Analytical insight and adaptive intelligence Optimizing the backup and recovery process with an approach that also addresses tomorrow's needs requires the ability to derive value and insight from backup-related operational information.
    [Show full text]
  • HP Data Protector Reporter Software Overview
    QuickSpecs HP Data Protector Reporter Software Overview Introduction HP Data Protector software, used by more than 41,000 customers around the world, simplifies application protection in virtual and physical environments through unified recovery and advanced automation. Global, one-touch backup policy configuration and a wide range of disk-based recovery options across HP and non-HP arrays help you meet any SLA for up to 70% less than other backup software solutions. Only Data Protector software includes single-pass disaster recovery for no additional cost and, together with HP Storage, delivers down-to-the-second application recovery - all from a centralized console. And only HP provides you with access to decades of expertise from one of the most trusted service organizations in the world. Data Protector software provides robust reporting functionality. For customers who require more sophisticated compliance and forecast planning, especially across multiple Data Protector instances, HP offers Data Protector Reporter software. What is Data Protector Reporter The Data Protector Reporter management server's integrated storage management lowers the cost of acquiring, managing and reporting on a heterogeneous storage environment while providing a topical, graphical representation of Data Protector Cell manager to storage device connectivity information. HP Data Protector Reporter provides Data Protector administrators with a single, integrated console from which to manage critical operations as backup and recovery forecasting, planning and cost analysis, as well as activities such as storage provisioning, real-time event management, new application installation, and server and storage migration. Powerful enterprise reporting with point and click simplicity HP Data Protector Reporter (DPR) is a competitively priced application that provides a portfolio of global, enterprise-scale reporting and management enhancements for HP Data Protector software.
    [Show full text]
  • Monthly Technobrief - J
    the way we see it Changing the Game: Monthly Technology Briefs January 2012 Ten Game-Changing Technology Shifts for 2012 Read the Capgemini Chief Technology Officers’ Blog at www.capgemini.com/ctoblog Public the way we see it Ten Game-Changing Technology Shifts for 2012 There are three terms that are at the center of the hype cycle at the moment; Cloud, Mobility, and Big Data. None of these are a single technology; instead a clutch of new technologies make up these three headline changers. In addition, there is one other mega trend referred to alternatively as the ‘bring-your-own- revolution’, ‘the tablet revolution’, ‘the consumerization of IT’, or even ‘the ‘post- PC era’. It can be summed up as the shift from the computer being at the core of technology development to people becoming the central focus. It is important to align this change to Capgemini’s TechnoVision and its interpretation of the business impact of different clusters of technology under the following headings: “Invisible Infostructure,” “Sector-as-a-Service,” “Thriving on Data,” “Process-on-the-Fly,” “We Collaborate,” “You Experience,” and the complex, but important, notion of “LiberArchitecture” – the freedom to use an open and constantly available environment. The following ten technology groupings provide a view based on technology that does not necessarily align to a business driven change in the manner of TechnoVision, though there are some obvious similarities. 1. The Core Change - People rather than IT are the new focus New forms of connection and delivery enable users to drive their own choice of place and manner of working, finding information, and even in choosing what software they download and use.
    [Show full text]
  • Data Protector Software Licenses, Services and Warranties
    QuickSpecs Micro Focus Data Protector Overview Data Protector Enterprise-class backup and recovery software for heterogeneous environments Data Protector is a core-to-edge data protection solution that standardizes and consolidates backup processes, allowing enterprises to reduce cost and complexity of their backup operations while delivering improved reliability and business resiliency. Data Protector is an enterprise backup and disaster recovery solution for diverse, dynamic, and distributed enterprises. Its capabilities include built-in disaster recovery, advanced integrations with storage platforms and the cloud, application-consistent recovery and advanced virtual environment protection. Data Protector is offered in two editions: Data Protector Express for virtualized environments and Data Protector Premium for mixed, hybrid environments. By standardizing the protection of data spread across locations, applications, formats, storage platforms, operating systems, and hypervisors, Data Protector backup software provides business assurance needed by today’s data-driven enterprise. With build-in reporting, automation and monitoring capabilities, Data Protector becomes a solution that allows to adapt and optimize your environment at all phases of the data protection cycle in order to meet your operational and business goals. Key product features Standardized protection: A unified and scalable architecture enables centralized management across physical and virtualized environments, disparate OSs, and business applications from core data centers to remote sites. Application-consistent recovery: Leading business application integrations extend backup, automated point-in-time recovery, and granular restores to application owners enabling them to manage, drive, and service their own requirements. Advanced virtual server protection: Hypervisor integrations and support offer virtual machine protection inheritance, tiered recovery options, process automation, analytics, and visualization for virtual environments.
    [Show full text]