Feeds

Gartner plots hype cycle for emergent tech

Collaboration hot. Video conferencing not

Security for virtualized datacentres

Collaboration, next generation architectures and real world web applications have been singled out as key emergent technolgies by analyst house Gartner. But other technologies such as video conferencing and passive RFID tags have been labeled as over hyped in Gartner's 2005 Hype Cycle for Emerging Technologies.

Collaboration technologies, such as podcasting, described as "an extremely efficient method for delivering audio and spoken-word content to niche audiences" as well as Peer to Peer (P2P) and voice over IP (VoIP) tools are hot, it reckons. Desktop Search will also be important but will not really take off until they become a standard feature on desktops, a development that will be spurred by the inclusion of the technology in Windows Vista.

Gartner predicts that RSS will be most useful for content that is 'nice to know' rather than 'need to know'. Corporate blogging reached its peak of hype in 2004 but will evolve to become useful in projecting corporate marketing messages primarily and secondarily in competitive intelligence, customer support and recruiting.

However Web Services-Enabled Business Models will have to wait for more-mature standards and clearer examples.

The hype cycle highlights the "progression of an emerging technology from conception, to market over-enthusiasm, through a period of disillusionment, to an eventual understanding of the technology's relevance and role in a market, Gartner explains. The analyst house said that in helping to cut through the hype it assisted strategy planners in making better informed decisions about the adoption of emergent technologies. 2005 marks the tenth anniversary of the Gartner hype cycle. (So where does the Hype Cycle fit in the Hype Cycle then? Ed.)

"The IT industry is awash with hype and buzz words and Gartner's Emerging Technologies Hype Cycles cuts through this to offer an independent overview of the relative maturity of technologies in any given domain," said Alexander Linden, research vice president at Gartner. "It provides not only a scorecard to separate hype from reality, but also models that help enterprises to decide when they should adopt a new technology." ®

Beginner's guide to SSL certificates

More from The Register

next story
MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
And, um, don't sleep with other men. If that's what worries you
Jim Beam me up, Scotty! WHISKY from SPAAACE returns to Earth
They're insured for $1m, before you thirsty folks make plans
Now: The REAL APPLE NEWS you need to know
OMG! Gravity's totes amazeballs. Calm down, George Clooney, not your film
Boffins who stare at goats: I do believe they’re SHRINKING
Alpine chamois being squashed by global warming
Let's make an app that POSTS your POO to APPLE HQ
Plus: It's OPEN WARFARE in the Linux greybeard world
FedEx helps deliver THOUSANDS of spam messages DIRECT to its Blighty customers
Don't worry Wilson, I'll do all the paddling. You just hang on
Adorkable overshare of words like photobomb in this year's dictionaries
And hipsters are finally defined as self-loathing. Sort of
Not a loyal follower of @BritishMonarchy? You missed The QUEEN*'s first Tweet
Her Maj opens 'Information Age' at the Science Museum
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.