Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Malaysia: Look Ahead to 2012 - Part 1

AvantiKumar | Jan. 4, 2012
Computerworld Malaysia presents a 'virtual roundtable' of opinions from Malaysian industry practitioners and vendors on what we can expect in 2012.

Organisations need to be able to extend their BI initiatives beyond reporting and dashboards to modeling, planning, forecasting, and predictive analytics. Planning applications are also required to be scaled across the enterprise with faster, more accurate planning cycles. For Malaysia specifically, Big Data opportunities are imminent especially considering constant enhancements and expansions in technology over the past year. 

Some of the other key trends that we see for the Malaysian market include the following:

 

Cloud computing

Customers are grappling with tremendous complexity in IT centres, a condition often aggravated by custom deployments and integrations that make each system different and unique to manage. While cloud computing is certainly very alluring with a clear value proposition to solve this; it is not without its challenges. In fact, some of the common pitfalls enterprises face when they move to the cloud includes the following:

a) Enterprises perceive that virtualisation is all that is needed for cloud computing

b) Enterprises tend to focus on the cloud infrastructure instead of the cloud application platform

c) Enterprises perceive that cloud computing is strictly a datacenter architecture and

d) Organisations tend to fail to leverage enterprise architecture to build stable foundation for shared services and cloud computing.

Without proper management capabilities, enterprises will find that expected economic benefits of cloud computing will not be realised.

While hybrid enterprise IT infrastructure has become a reality, powering businesses spanning the public cloud and private data centre infrastructures poses significant IT challenges mainly emerging from complexities around bulk data loads, real-time synchronisation, process integration, identity  administration and compliance, and security access and management. In order to reap maximum business benefits from this hybrid approach, customers must adapt middleware technologies that will seamlessly bridge this divide and help them continue on their path of business agility and transformation.   

 

Cloud Security

One of the common reasons given for the slow uptake of cloud computing thus far is concern about security. Concerns regarding data integrity, physical security, back-up/recovery and addressing regulatory compliance are prevalent for every IT organisation today. The largest perceived risk is that of putting trust in a provider or being able to prove that trust to the end user. As with dedicated environments, the common practices and standards for mitigation and risk reduction for access, privileged user permissions, and monitoring remain relevant. The cloud specific challenges focus more around intrusion detection, data location and impacts to compliance.

Data and application security  may also be subject to controls. Many of today's cloud service providers do not explicitly address these controls. Regulatory compliance is the most significant security challenge. The majority of regulatory standards were written when systems/applications were under physical and technical controls of the organisation operating the application. Cloud turns this model upside down and therefore presents a challenge for both consumers and providers. Appropriate configuration and management controls can address the requirements, but validating these from a provider often proves tricky.

 

Previous Page  1  2  3  4  5  6  7  8  9  10  11  12  Next Page 

Sign up for Computerworld eNewsletters.