Come back to take a look at the top ten IT trends over the past 20 years

REVIEW This is a concept, not a thing. In fact, it can be considered when the organization's data management capabilities growing faster than the IT department, big data began. Previously, the computer department staff used to work on time, except when in extinguishing or writing code. Now, data management has become a professional field.

Looking back over the past 20 years to look at the top ten IT trends come back to take a look at the top ten IT trends over the past 20 years

Big Data

This is a concept, not a thing. In fact, it can be considered when the organization's data management capabilities growing faster than the IT department, big data began. Previously, the computer department staff used to work on time, except when in extinguishing or writing code. Now, data management has become a professional field.

The browser's preferences

We write the client program to interact with the green screen, and then write the code for the DOS and Windows pc, now the user experience is completely responsive browser on (and mobile apps). This implies the need for more planning for different user interfaces, and to prioritize data state when the connection is interrupted. On the plus side, it is easier to learn than in the past.

cloud computing

There is a face pack on Facebook, a little boy asked: "Daddy, what constitutes cloud is?" The father replied: "Most of Linux servers." The moral: it is (still) just someone else's computer. There are public cloud, private cloud, hybrid cloud and private cloud. You just trust in their applications and data. In theory, it is cheaper than the internal work easier and safer. In reality, it? Not yet conclusive. A major problem is that the cloud vendor lock-in.

Commercialization

In the first decade of the 21st century, the major IT vendors want to sell you overpriced hardware. Then, inexpensive hardware becomes good enough, so the top suppliers in the 2010s will shift the focus of their software. Then PBXs from the backup device to the firewall, existing devices become normal. However, for transactional database or other high-end applications, you may still need some special things.

Consumerization

In 2000, when, perhaps difficult to predict that by 2020 people will want everything to work like a mobile phone. When the user wishes to their own devices into the workplace, and when it tells the technical staff (developers, engineers, scientists, etc.) "no" to build their own server or create unregistered networks, technical staff (developers, engineers, scientists, etc.) are not happy. We now live in a user-centric world.

Device Management

All these phones, tablet PCs, notebook computers, hot, projectors and charging stations must be recorded, protection and maintenance. The challenge is, Apple and Samsung are interested in satisfying our desire for electronic products, rather than cling to old-fashioned business buying cycle. Device management is a big industry. Its practitioners are to come up with new ways to keep track of all backup data, the introduction of wireless updates and safety protection equipment in the field.

DevOps

If the programmers and IT work together and not separate it? Of course, this is DevOps. From the literal sense, it brings better function, allowing users happier and other interactive computing systems company and a smoother application, all of which are built and updated faster. In reality, these separate, sometimes competing in Speciesus Nerdus (geek) remains to be seen whether peaceful coexistence.

Proliferation of programming languages

C language, COBOL language, perhaps (for children) some Java is good enough. Plus SQL, you'll have a well-functioning IT department. Fast forward a few decades :: language is still a good language, but Java is no longer suitable for children, Python is a new thing, and now even Google has its own programming language. In addition, the past is something that files and libraries are now bound to the micro-service cloud service and API.

Safety

Security used to be an afterthought. You might set some copy protection and software on your network password, but today hardly needs an elite hacker to crack these things. CSO is a very serious work. As chief information officer, said a few years one of the world's largest law firm before it, this is no longer about your company to prevent hacker attacks, but about how to attack in the ongoing wave of hackers to keep the system safe.

Virtualization

This concept can be traced back to a few decades ago, in the 2010s, it becomes very large. Today, most non-critical servers running multiple operating systems and applications, and software applications is very pleased to think they are the only servers like. Advantages: save a lot of money, save space, save energy, reduce noise, reduce trouble hardware management. Cons: If the server crashes, it would be in big trouble.

 

This switched: https://www.linuxprobe.com/it-trend.html

Guess you like

Origin www.cnblogs.com/it-artical/p/11441403.html