Big Data // Big Data Analytics
News
7/25/2013
02:39 PM
Connect Directly
Google+
RSS
E-Mail
50%
50%

Big Data Ushers In 'Virtuous Cycle Of Computing'

IT is entering a new era where devices attract users, who in turn attract more devices. It's a 'virtuous' whirlwind of data-driven progress, says Intel exec.

5 Big Wishes For Big Data Deployments
5 Big Wishes For Big Data Deployments
(click image for larger view and for slideshow)

The proliferation of consumer devices and machine-to-machine sensors is ushering in a new era for IT: a cloud-computing age that enables services to be deployed more rapidly thereby attracting an ever-increasing number of users and devices.

Intel has coined a name for this epoch, the "Virtuous Cycle of Computing," referring to a system of events that reinforces itself in a continuous loop. The driver of this cycle: big data.

In her Monday keynote at Intel's "Reimagine the Datacenter" event in San Francisco, Diane Bryant, senior VP and general manager of Intel's Datacenter and Connected Systems Group, said the dramatic upsurge in end-user and machine-to-machine devices -- two areas commonly associated with big data -- is good news for the IT industry.

"We're going through a significant transformation in the way that IT is fundamentally used," said Bryant. Two factors are making this happen, she added: Cloud computing and the "massive build-out" of devices. "We're going into a whole new era where we look at IT as a service," she said. "IT is no longer supporting the business, but IT is actually the business."

[ In one possible future, everything will have a sensor. Read The Internet Of Things Gold Rush. ]

IT continues to evolve to meet changing business needs. The 1990s marked the "computer-centric era," one where manual systems were automated to increase efficiency. The 2000s brought pervasive Internet connections and the growth of wireless, developments that expanded IT's role in a burgeoning "network-centric" era.

"You could change the way businesses communicate with businesses -- do things like B2B supply chain management systems -- or change the way businesses communicate with their customers through online marketing," said Bryant.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
6 Tools to Protect Big Data
6 Tools to Protect Big Data
Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 7, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program!
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.