It is not easy to identify those, which are important for individual needs and to focus the right way for realization.
Highly rated for the year 2012 are especially the trends “Consolidation and Security”, “Mobility” and “Cloud Computing”.
These issues are also on the to-do-list of Don Lohrmann (Chief Technology Officer and a Deputy Director for the Michigan Department of Technology) as he describes in his blog Government Technology.
Important opinion leaders also describe “Mobility” and “Cloud Computing” as parts of the current top-5 technologies. “Consolidation and Security” are to be seen primarily as an organizational aspect, if the availability of an applicable basic-infrastructure (e.g. Fabasoft eGov-Suite) is given.
Consolidation and Security
The consolidation of systems and solutions is an important challenge and a significant base to keep the security under control – especially in our more and more connected world. The number of systems and solutions – even if these have already been virtualized in relation to the infrastructure – carries an incalculable risk because of their complexity and the huge quantity of interfaces. But consolidation offers also the potential to get the exploding running costs under control. In the blog article “The end of isolation is near” we described this subject in more in detail.
The number of open-end questions concerning security and authenticity decreases day by day. That’s why the point of the concrete usability of such services (both private and public cloud) gets in striking distance. Implementations, for example the possibility to use the German identity card for the authentication in Fabasoft Folio Cloud, increased the trust and acceptance considerably.
The mobile using possibilities of internet-based services have increased significantly within the last years – owing to the improvement of smartphones and the raising market penetration of mobile devices. Therefore the expectations towards public authorities have also increased considerably. Trends like Open Data or Open Government pushed this enormous expectation additionally. So, it is absolutely time to meet these requirements with concrete solutions. Developments like „Bring Your Own Device“ show clearly that it is not possible to ignore the usage of mobile devices. If it is a question of webbrowser-based solutions or of apps, seems to be currently a matter of taste yet.
As in many situations the order of the realization of the different measures plays a decisive role. In this case it is especially important to place the step “consolidation and security” first already together with some selected aspects of cloud computing, so that the implementation of mobile functionalities does not turn into a disaster.