Feeds

Gartner plots hype cycle for emergent tech

Collaboration hot. Video conferencing not

Choosing a cloud hosting partner with confidence

Collaboration, next generation architectures and real world web applications have been singled out as key emergent technolgies by analyst house Gartner. But other technologies such as video conferencing and passive RFID tags have been labeled as over hyped in Gartner's 2005 Hype Cycle for Emerging Technologies.

Collaboration technologies, such as podcasting, described as "an extremely efficient method for delivering audio and spoken-word content to niche audiences" as well as Peer to Peer (P2P) and voice over IP (VoIP) tools are hot, it reckons. Desktop Search will also be important but will not really take off until they become a standard feature on desktops, a development that will be spurred by the inclusion of the technology in Windows Vista.

Gartner predicts that RSS will be most useful for content that is 'nice to know' rather than 'need to know'. Corporate blogging reached its peak of hype in 2004 but will evolve to become useful in projecting corporate marketing messages primarily and secondarily in competitive intelligence, customer support and recruiting.

However Web Services-Enabled Business Models will have to wait for more-mature standards and clearer examples.

The hype cycle highlights the "progression of an emerging technology from conception, to market over-enthusiasm, through a period of disillusionment, to an eventual understanding of the technology's relevance and role in a market, Gartner explains. The analyst house said that in helping to cut through the hype it assisted strategy planners in making better informed decisions about the adoption of emergent technologies. 2005 marks the tenth anniversary of the Gartner hype cycle. (So where does the Hype Cycle fit in the Hype Cycle then? Ed.)

"The IT industry is awash with hype and buzz words and Gartner's Emerging Technologies Hype Cycles cuts through this to offer an independent overview of the relative maturity of technologies in any given domain," said Alexander Linden, research vice president at Gartner. "It provides not only a scorecard to separate hype from reality, but also models that help enterprises to decide when they should adopt a new technology." ®

Intelligent flash storage arrays

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.