Cisco Blogs

The Future of IT

- January 21, 2013 - 9 Comments

What an exciting time to be in the tech industry. We are at the beginning of a major transition to the Mobile-Cloud era. Trends like bring your own device (BYOD), access anywhere, virtualization, and machine-to-machine connections have given way to a new breed of applications. We estimate that approximately 50 billion devices will be connected by 2020. In 2010 alone, more than 350, 000 applications were developed with more than three million downloads. A 44-fold increase in data creation is predicted from 2010 to 2020, with 34 percent of it in the cloud. All of this leads to a world of intuitive connections between people, processes, data and things on the network – the Internet of Everything.

What does this mean?

It means the trends we’ve been discussing over the past several years are all having a cumulative effect putting new demands on IT.

For example, the mobile consumer is turning the traditional enterprise upside down, forcing IT departments to deliver against an experience differential with stagnant, and even decreasing budgets. Employees are looking to consume, create, and share information in business like they do in their personal lives – seamlessly through the cloud.

The onus is on IT to make applications available anytime, anywhere for employees and allow businesses to move with greater agility and speed. The goal is to free the business from the constraints of legacy infrastructure and move to a world of anything delivered “as a service”. This creates a velocity differential requiring a shift to services delivered from the cloud.

The proliferation of connected devices, sensors, and other context-aware “things” results in an explosion of data. And IT departments will need to contend with people-to-people connections, people-to-machine, and machine-to-machine connections, resulting in a data differential. Only those organizations that adapt their business processes in order to analyze all that data and transform it into actionable information will reap the rewards.

It’s easy for those of us who live and breathe technology to be captivated by enabling the Internet of Everything, and on working out the massive implications on the future of information technology. But it’s also important to highlight the human outcomes of this technology phenomenon. The true value of Internet of Everything resides in its ability to fuel better, more informed business decisions, create unprecedented economic opportunity, enable richer experiences, and improve lives. While we’re seeing an incredible growth in IP-enabled devices, sensors and other context-aware machines, all those connections – even machine-to-machine connections – ultimately serve to benefit humanity.


In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.


  1. Cloud is new toy for us.Dropbox became popular in cloud business then google entered and Recently Kim Dotcom came up with his own new version of cloud. This shows the future of IT.

  2. Good stuff, but were all still waiting for the next facebook, when will there be a new giant in the IT business... _____ IT bundkort

  3. Great Article.. yes it’s easy for those of us who live and breathe technology to be captivated by enabling the Internet of Everything and on working out the massive implications on the future of information technology. God Bless you and continue posting such great articles...

  4. Good shared... thank's you.! Aan Shared

  5. As we move into more consumer devices in enterprises, surely network access and data management will follow, at least on those where IT is preparing for this change. Better, they need to explore more what they can propose to business leaders to remain relevant. We will see less dependencies on corporate equipment support and support teams, those remaining, being better capacitated and less technical skilled workers out. This happen in paralell with data migration in corporations from personal devices like desktop and laptops to cloud solutions and/or VDI, less fat solutions like email clients that people use to keep up workflow to more web centric ones like WebEx Social, SharePoint, Zimbra. As for security of this data, there will be a shift from strong personal device security that hinders work (disk encryption, external flash memory ousting or encryption, etc...) to personal devices that can access the info from anywhere/anytime as mobile backbones improve. The data protection does not disappear, but moves to DC. Something else we might see is change in how we sort and retrieve all this information, again, away from email clients (I had some years managing IBM Domino servers long ago, and people were so hard to loose grip on information they keep in local archives, and how difficult was to the company recover this).

  6. Good article.. We live in a networked world and thanks to the combination of "SoCloMo" technologies and ability to analyze huge amounts of data in real time, we are entering Into the most productive periods as a humanity.. Era of entrepreneurs from Facebook,google,LinkedIn to dreamzngoalz all Information Age companies that are making Intelligent use of Technology(aka IT) and adding value in people's life..Just my 2cents-KP(Co-CEO

  7. Great insight Padma. I work in healthcare and my organization is already feeling the pressure of allowing employees to connect and share via social networks. We have not crumbled yet but it's only a matter of time.

  8. Good insight. Described the requirements of a business user very well. However , what about the Data Security and Data Lekage ?

    • Keyur, Networking initially solved the problem of machine-machine communication through the use of the flood and broadcast, as we say with switching technology and then the emergence of Spanning Tree to mitigate the problems associated with flooding. Security in a programmatic network is achieved through the combination of virtual peer networks across a backbone along with network analytics that provide user and device authentication. Networks are about to be able to change in real-time, which adds a level of security never before seen.