Feeds

Your job's going to Asia, in a good way

Gartner says Asian growth means local firms will need to hire Westerners soon

  • alert
  • submit to reddit

Boost IT visibility and business value

IT spending in APAC will grow by nearly eight per cent over the coming year to $743bn, with Western markets set to benefit eventually as successful Asian firms expand and hire abroad, according to analyst outfit Gartner.

The firm forecast spending in APAC to increase 7.8 per cent year-on-year in 2013, more than double the worldwide average of 3.7 per cent.

Although growth in Australia (3.2 per cent to $75.3bn) and New Zealand (2 per cent to $8.6bn) is a little disappointing, they still top ailing Europe whose average growth forecast is just 1.4 per cent.

Moreover, the West will in time reap the rewards of a strong APAC, as double digit growth in countries such as China and India propel home grown success stories to greater international expansion.

“Consequently, these organisations will be responsible for major hiring of IT professionals to support their growth at a time when Western companies will still be coping with the impact of the economic crisis,” Gartner SVP Peter Sondergaard said in a canned statement.

One area of stellar growth in the IT industry set to accelerate demand for newly skilled professionals is Big Data.

By 2015 it will generate 4.4 million new IT roles worldwide, with just under a quarter of these coming from APAC, although skills and education development are essential to plug the knowledge gap, Gartner said.

“You need to understand how to deal with hybrid data, meaning the combination of structured and unstructured data, and how you shine a light on ‘dark data.’ Dark data is the data being collected, but going unused despite its value,” said Sondergaard.

“Leading organisations of the future will be distinguished by the quality of their predictive algorithms. This is the CIO challenge, and opportunity.”

Gartner also predicted the continued growth of BYOD in the enterprise, claiming that by 2016, half of all non-PC devices will be purchased by employees. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Symantec security chap signs for CSIRO's ICT In Schools
Vulture South is closing in on our goal of 20 new recruits to help teachers and kids
A-level results: Before you smile at that jump-for-joy snap...
Uni-ditching teens are COMING FOR YOUR JOBS
How to promote CSIRO's ICT in Schools in your community
Vulture South is closing in on its target to find volunteers to help teach tech in schools
Everyone's an IoT expert but now there's a certificate to prove it
Cisco creates Certification of Things for industrial sensor-footlers
Facebook wants Linux networking as good as FreeBSD
Help The Social NetworkTM make the kernel better
LinkedIn settles missed overtime pay case: Will pay $6m to staffers
US Dept of Labor: It violated Fair Labor Standards Act
NICTA man explains why he volunteers for CSIRO's ICT in Schools
'I feel fantastic after the sessions - It's the best part of my job' says volunteer
The Register is HIRING technology hacks for the WORLD
Live on Earth? Want to be a Vulture? Enquire within
Pleased to meet you. I'm Joe Bloggs, MVP, vExpert, Cisco Champ
What a mouthful. Do customers care? Six title-holders quizzed
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.