Feeds

Blogging to slide - PC TCOs too?

75% of firms predicted to be infected by malware

Bridging the IT gap between rising business demands and ageing tools

Blogging is set to peak next year according to a new forecast which also predicts two-thirds of firms are likely to be infected by financially motivated malware.

According to Gartner, blogging is set to reach its zenith during the first half of next year when the number of active blogs will level out at around 100m.

In November, blog tracker Technorati revealed that 100,000 new online journals, known as web logs or blogs, are being created every day, with 1.3m posts blogged daily. However, Gartner predicts the blogging boom may be close to ending as over 200m individuals have already given up on the activity.

The predictions come in a new report from Gartner which also claims that by 2010, the total cost of ownership (TCO) of new PCs will fall by 50 per cent.

Elsewhere in its top ten predictions for 2007 and beyond, Gartner claims the arrival of automated malware-generation kits which facilitate the creation of thousands of nasty viral variants, will lead to increased attacks on businesses. Researchers estimate by the end of next year 75 per cent of enterprises will be infected with undetected, financially motivated, and targeted malware that can evade firms' traditional perimeter and host defenses.

As if that wasn't worrying enough for enterprises, Gartner further warns that companies are missing out on opportunities to build networks that could put them at a competitive advantage. Instead, they follow outdated design practices and collectively will waste at least $100bn in the next five years.

Gartner forecasts that through to 2009, market share for the top 10 IT oursourcers will decline from 43.5 per cent to 40 per cent - equivalent to a loss of $5.4bn. A number of IT outsourcing firms are expected to bite the bullet due to a decreasing number of contracts available, increasing competition and a reduction in contract sizes.

Moreover, in a worrying development for private citizens, Gartner claims that 60 per cent of the worldwide mobile phone-owning population will be "trackable" via an emerging "follow-me internet" by 2010. The analysts state that while local regulations have arisen to protect users' privacy, growing demands for national safety and civil protection are relaxing some of the initial privacy limitations. Also, mobile phone owners will be increasingly tempted to forgo privacy concerns in order to take advantage of marketing incentives.

Lastly, Gartner predicts Vista will be the last major Windows release by Microsoft; the era of monolithic deployments of software releases is nearing an end.

"Selected from across our research areas as the most compelling and critical predictions, the trends and topics they address this year indicate that priorities, markets, cultures and technologies are all rapidly changing," said Daryl Plummer, managing vice president at Gartner.

"These changes will require that IT and business change their approach to delivering and quantifying value. IT professionals must examine these predictions for opportunities to increase their support of consumer-driven requirements and their ability to help Business deliver stronger services to those customers," he added.

Copyright © 2006, ENN

Seven Steps to Software Security

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.