Dogs: idle time bored, really let themselves on the battlefield, it is really quite impossible to start with. In 2006, the year belongs to me, for "play" out of a flower
Like to make chicken mother shame. In 2006, the network infrastructure, servers, storage, security, software, and communications will have a great change, you look good, thin Road Come listen to me.
Chicken: You also worked a year chanting, after one year will, like me get out, what manner of. Hmm!
Network facilities
Wireless is everywhere
The rapid popularization of mobile phones seems to indicate the wireless network (WLAN) will be everywhere. Gartner predicts by 2010, 30% of U.S. households using only cellular technology or Internet telephony. In the U.S., Western Europe and other developed markets, growth in traditional wired voice connections will slow down, more and more people will turn to DSL, cellular and Internet telephony. There are indications that the individual / family area, enterprise applications and infrastructure, the wireless world is coming.
It should be noted that, WiMAX technology has also made encouraging progress, IEEE has approved this includes support for new mobile WiMax standard for chip manufacturers and equipment manufacturers began to pave the way for new products. WiMAX is a next generation wireless network technology, it can provide higher data rates and greater network coverage. 802.16e data transfer rates up to 1Mbps to 5Mbps, the transmission distance up to 36 km radius. In addition, fewer network elements required, WiMAX is also compared to traditional cellular communications technology cheaper.
In 2006, WLAN will be further spread, and business users, the more secure, and cable networks can integrate WLAN into focus. With the launch of WiMAX products, wireless networks will be everywhere.
WAN acceleration
Low bandwidth and high latency wide area network have always plagued the two problems, both problems are resolved, users like to use wide area network LAN as making stirring. Merrill Lynch on 100 large U.S. companies, CIO survey, obtained ranking corporate network construction costs, WAN optimization technology is only ranked in the network security, after the three-exchange and VoIP.
Currently, users have at least Gigabit LAN backbone, while he sent a lot of wide-area network, microwave, or T1/T3 line the most common wide area network bandwidth at most a few megabytes. Some well-LAN applications, the WAN is stretched. Some people think that bandwidth is getting cheaper, increasing the bandwidth enough. However, the TCP / IP technology to the "three-way handshake" delay caused by the bandwidth problem is to increase the number can not be resolved. WAN optimization technology is responsible for the birth of such a mission, in addition to the traditional application acceleration, data compression, dynamic caching, IP traffic management and QoS, etc., adaptive TCP acceleration technology companies in 2006 will also speed up WAN powered. Many companies have deep accumulation in this area, such as Actona, Peribit and Riverbed. Back in April 2004, Cisco will acquire the Actona, 2005 骞?Juniper Peribit has become the table of food. In reality, demand-driven premise of these biggest names in the industry manipulator, WAN optimization technology in the application is expected in 2006.
VoIP not only voice
As we all know, IP voice is the inevitable trend of the future of enterprise applications, but security, network upgrades, performance and data sharing problem has restricted the VoIP application. Exceed the needs of power that enables VoIP in the near future may not be widely used in voice application itself, but the enterprise video applications. Today's businesses can not survive entirely on a single resource, mastery of the details of user needs, the customer relationship maintenance and the construction and adjustment of marketing channels, directly affect the development of state enterprises, but these are increasingly demanding the two parties to achieve real-time face to face communication and information sharing. As a result, video conferencing become more and more common choice for corporate users. Like Wal-Mart asked its suppliers to replace the bar code 2006, all identified as RFID, as in 2006, we look forward to more business with customers through video networks, communication channels, face to face.
Implementation of IP video technology is not complex, IP-based voice rate will more than double-digit in 2006, the deployment size. Data, voice and video triple play, triple play technology, supporting voice and video bandwidth of the terminal and corporate direction toward a more mature, they will bring VoIP prosperity.
Servers and storage
The first year of universal parallel computing
With the single-chip multi-processor architecture popularity, the next bottleneck impeding the overall performance of the computer is pretty obvious - no longer a CPU, the system I
/ O so hardware problem, but the parallel environment (including instruction-level parallelism and thread-level parallelism) in the software development problems. While multi-threading and parallel computing has been 30 years of history, but since 2001, with the multi-core, multi-threaded CPU in the Unix server and PC server popularity, parallel software development environment has become increasingly prominent problem.
Parallel computing demands server vendors and developers familiar with the thread-level parallelism (TLP) and instruction level parallelism (ILP) environment. Only IBM, HP, Sun and a handful of vendors in the Unix and Linux operating systems on the accumulated years of experience in optimization and application development, and other server systems vendors, including Microsoft, Red Hat operating system, including manufacturers, does not have too many Parallel development and optimization experience, coupled with the overwhelming majority of users do not understand the parallel computation, resulting in a parallel computing niche products.
However, this situation may be with the Windows Cluster Server 2003 (WCS 2003) appeared in the 2006 shift. It tested the beta1 version of the operating system experts, although the size and specific functions in parallel with a larger gap between Linux and Unix, but the biggest advantage of WCS 2003 is easy to install configuration. Perhaps 2006 will be a year of parallel computing into the universal.
Server CPU: looking forward to the new structure
Google's chief engineer Luiz Andr? Barroso in September 2005 published an article entitled "Performance of the price," the article, that the future data center do not need to order execution, but should be a large number of simple sequential mechanism of CPU. The following reasons: power consumption of servers has become an important cost factor, but in recent years, processor manufacturers (including Intel, AMD and IBM) are efforts to promote the performance / power consumption ratio has been stagnant; to diluted hardware R & D costs, processors used in PC and server processors often use the same core, such as AMD Opteron and Athlon 64 are the K8 micro architecture, Intel Xeon and Pentium 4 are all NetBurst, IBM PowerPC 970 in use Power4 so.
In fact, PC processors and server processors have very different application environments. Server environment requires not only high TLP (thread level parallelism), and well-equipped a large number of highly parallel applications, individual markets are the opposite. That is, now many of the server CPU is not fully fit, "practical application" - single-threaded, high-performance needs of individual users, but enterprise users often require powerful parallel processing performance of a CPU do not fish it both ways - perhaps we can look forward to the forthcoming release in 2006, IBM Power6.
Momentum storage software than hardware
Last few years, storage hardware performance of the pursuit of users to achieve the degree of obsession, it seems that the higher someone's product performance, quality, the better. Thus, each manufacturer claims the product in the highest performance. However, users can actually use almost all use the highest performance. So with the development of storage hardware, which can bring us joy will be less and less. The difference in storage hardware manufacturers getting smaller and smaller, high-end 1.5 million and 1.2 million IOPS IOPS performance differences for a 600,000 IOPS only meaningful for users. This leads to high-end storage systems sales last year than in previous years, as crazy, far less growth in the midrange.
On the contrary, storage software, are likely to enter the booming period of development. To give the simplest example, information lifecycle management (ILM) almost every storage vendor's strategy, however, over a period of time, even though manufacturers have strong advocacy in their ILM solution, but look at all like how some of the hardware products The simple set, it simply can not achieve ILM promises. More homogeneous in hardware, the software vendors are able to make the solution easy to stand out.
Stored into the big fish of the times
Storage server which was originally a part of, even though the industry is now generally want it completely independent from the server, but both of these association so on and so just cut off of? Pattern from the storage area can also be discerned: the top two disk storage is HP, IBM; Sun as aware of this effect, the acquisition of STK; Dell and EMC co-operation is very successful at the same time, EMC is also increasingly more involved in the server space (such as server virtualization). It can be said that these major storage vendors doing business will benefit from the servers, but the more traditional server resources, the greater the benefit. So, what are the advantages of this it? The most important is the overall advantage, such as in a large project, the server products can not make money, but storage can make big money, and vice versa; Similarly, the hardware can not make money, software services, you can make big money.
Extend this theory to the internal storage: EMC acquired before Legato, enhance software capabilities; IBM and NetApp NAS efforts to strengthen co-operation; HP acquired AppIQ strengthen the management capacity and so on. In 2006, the server and storage area of each fish in the fast growing up, we'll see continued strength through the whole "eat" fish phenomenon.
Network Security
Focus on the enterprise anti-virus
Anti-virus has always been the focus of network security, according to statistics, network security event occurs, the computer viruses, worms and Trojan horse programs accounting for security incidents caused by
83% of the total estimated in 2006 that the situation will not change.
From future development trends, Trojans, spyware and backdoor program will replace the more mainstream for viruses and worms. The transmission, the instant communication tools (mainly QQ and MSN), and system vulnerabilities will be increasingly replaced by e-mail as the primary means of transmission of the virus. 2005, although no specific large-scale virus outbreaks, but that does not mean that viral load has been reduced; the contrary, the new variant of the frequency of speed, the overall quantity of the virus remains a sharp upward trend. "Multi-variant, spread quickly, more subtle, more purpose," the future development for some time the main characteristics of the virus.
In addition, the needed attention to the fact that anti-virus 2006, the market focus has gradually shifted from the personal market to enterprise market, was motivated mainly two things: First, as individual anti-virus software available for download "experience" to Huode, Although the company will charge a service fee, but prices continue to lower; In addition, Microsoft's new operating system will be integrated in a considerable anti-virus functionality, which also makes the face of personal anti-virus market will be a huge hit.
UTM devices are further developed
In 2006, booming UTM (Unified Threat Management) device will continue to star in the field of network security. As attacks continue to wreak havoc mixed, single-function firewall can not meet the needs of users, hence, have a variety of security features, based on application protocol layer defense, low false alarm rate detection, high reliability and high-performance platform and unified management of UTM technology components greatly favored, and advantages of the technology will be further complicated with the security environment, while more and more of a manifestation.
Conceptually speaking, many manufacturers make multi-function security gateway, an integrated security gateway, integrated UTM security appliances are in line with the concept. UTM devices are serial access as safety equipment, so UTM device itself must have good performance and high reliability. Meanwhile, UTM products in a unified management platform, featuring a firewall, VPN, gateway antivirus, IPS, denial of service attacks, and many other functions in one product to achieve a variety of defenses, so the direction of evolution to the UTM will be the development trend of the firewall . The biggest problem with the challenge is, how many security features to ensure UTM device, while improving performance and availability, reduce the false positive rate, while controlling costs.
Wireless network and remote applications, security has become a hot spot
As wireless and remote access technology continues to evolve, mobile devices, wireless devices, VPN, etc. are more and more applications, enterprise boundaries is becoming increasingly blurred, so problems associated with more in 2006 attention.
As the wireless network itself is the wireless signal transmission, with the wired network at the physical needs of the fixed nature of the port there is difference in the exchange of information. In the wireless network signal coverage, each machine can accept the fact, send the signal, the user identification, carried out mainly by encryption and authentication. However, the current wireless network applications, although many local successful implementation of a wireless network set up, but many parts of the simple encryption using WEP do not even encrypted, there are enormous risks in a safe, easily lead to information disclosure and internal security issues such as counterfeiting. I believe that in 2006, with the further promotion of wireless network applications, such security will be exposed more to attract people's attention.
In addition, for mobile wireless devices trojans and exploits begins to appear, this enterprise network security system for the unified management has brought more challenges, all of which make wireless and remote applications into the security focus in 2006.
Network Software
AJAX and software services
The concept of software services companies involved in software profit model changes, the technology behind this have something to do with AJAX a relationship.
AJAX means asynchronous avascript and XML (Asynchronous avascript and XML). This programming technique is used to create Web-based desktop software with the perception of similar applications.
Google, Amazon, Apple, and the Netherlands direct banking (ING Direct) are faithful followers of AJAX.
In November 2005, Microsoft for software services and reorganization of its business, and launched Live.com service. Concern is that software vendors like Microsoft heavyweight software services has been officially put on the table and talk at the same time, including Windows Live Mail (Hotmail), including many of the Live.com services using AJAX front-end. December 13, 2005, launch instant messaging products Microsoft Office Communicator Web Access, the support for AJAX has become an important feature of the product.
Microsoft is actively turning applications based on Web services, from desktop software to online software evolution is quietly beginning, followed with online software is bundled with software services. In 2006, we expect to see more influential software vendor to join the camp of AJAX.
Open-source and non open source integration between
Software acquisition in 2005 staged drama lacking in generous, but not the acquisition of the two may change the direction of the software market in 2006: one is the IBM acquisition of Gluecode this open source application server company, while the second is the JBoss acquisition of Arjuna Technologies, transaction middleware.
Gluecode acquisition, IBM to launch a free WebSphere Application Server Community Edition (WAS CE), JBoss said Arjuna transaction will become open source middleware products. Open-source and non open source integration between the companies has already begun, in 2006, this type of integration will continue and deepen.
With the rapid growth of open source software, the major software vendors are increasing the pressure, SUN officially released in 2005, Java System Application Server Platform Edition of open source, this action also accelerated software vendors, "Open Source Licensing" The speed of the cards. IBM launched a free WAS CE, and Oracle database products launched free inextricably linked with this. JBoss acquired Arjuna Technologies Inc. is another sign board the case of open source software vendors are not fish, they can also acquire other companies, in 2006, this merger may be more.
Enterprise search thermotaxis
In 2005, for the popular Internet search tools, which from Baidu highly sought after in the U.S. can see. Next, the search giant has begun to enter the enterprise search market.
On structured and unstructured data search, exact search based on text analysis, intelligent data analysis techniques such as demand for the introduction of enterprise search technology into a new Yanwu field. Use of enterprise search tools, employees can not only search for documents where the department and private e-mail, but also further to the enterprise database to find the appropriate information, the user can not only search e-mail and computer files, it can also check blog records enterprise data, image and video files.
Microsoft in the personal search tool in the field off the flip, you want to have a go here. But in 2005, we have seen Google's cooperation with IBM, Google seems to enterprise search, Microsoft's first step.
In 2006, the enterprise search products that may have a more significant progress, as there will be more products available into the system, and enterprise search and content management technology are combined. In addition, the back-end search technologies such as correlation analysis of data, Microsoft and IBM in this regard, more technical strength.
Communicate
3G to be staged in China
With the New Year begins, the people again "Fudge" China's 3G license issuance guess finally taken in 2006. The potential of the face of China
In the world's largest telecommunications market, 3G drama how should be staged, will continue to be hot in the hot spot.
TD-SCDMA standard will not be a separate network? Operators will be HSDPA-enhanced 3G technology strategy for how to deploy? 3G territory, China's operating structure will be distributed? 2006, China will start 3G in the first year of ... ... around 3G, China's communications industry has too many problems to get a clear answer. Yet no matter how 3G communications industry on expectations of businesses and end users of concern is the extent to which 3G can meet their communications, work and entertainment needs.
In the 3G policy, due to the economic level of the great east-west differences in the level of the formation of a communication to achieve backward by the hair between the echelon distribution, which determines the 3G development in China "Chinese characteristics" is very clear copy of any other countries regarding the model may not be applicable. "Fully tested", "cautious", "follow", which are several years left us the impression 3G strategy. Anyway, in 2006, we look forward to the health of newborns born in the Chinese 3G.
Transformation of telecom operators and ICT integration services
With the global broadband Internet and the rapid development of mobile communication industry, ICT (information and communication technology) integration services and telecommunications service providers transition to become the world's most active operators in 2005 to talk about and explore the topic.
The boundaries between communications and IT has become increasingly blurred, telecommunications and IT is moving in the other direction. Precisely, this integration and to enable operators to Reformation in the IT industry from the first full penetration to the communications industry sky. The development of broadband Internet makes communication applications do not need a lot of operators, "custody" can be independently under, to telecom operators tremendous pressure and fear. Of course, broadband, wireless and IT technology for operators to open new ideas, accept new challenges in preparing sufficient imagination and possibilities.
If the past year as carriers of the proposed restructuring objectives, we expect new entry in 2006, telecom operators and ICT integration services will transition into practical operation. Application of new technologies, institutional innovations, network re-engineering, operations support and process re-sort and a series of work remains to be carried out step by step 2006.
IPTV
IPTV, as just the last one in 2005 for the telecommunications industry during the agitation, panic term broadcasting industry. Although China's IPTV drama at the global IPTV, Triple Play (Triple Play) under the thermal spread of the big market staged a grand, however, China's consumer demand for IPTV is not promoted under an industry, there are many issues need further exploration and settlement .
At home, we are still willing to be treated as telecommunications carriers under the impetus of the broadband industry, a business attempts, the test is expressed in consumer demand, network technologies, industry policy and procedure for the many facets of business operation mode among the . Similarly, IPTV operators are also very able to represent the embodiment of a business transformation, into the "TV" in the industry, bringing gains in China's telecommunications industry is not only reflected in the business areas to develop, the more reflected in the thinking mode and operation mode changes in the.
However, network technology, operators face the same challenge, "burning not the" bandwidth seems to suddenly become a little stretched in front of IPTV. Driven in IPTV, broadband development in North America and Europe to find a strong momentum; in China, based on a large number of IPTV on the bandwidth consumption, network operators will face enormous pressure to upgrade.
相关链接:
Zhongguancun hand new COUNTRYSIDE
Teach you when the head: how to reduce your staff turnover rate?
DivX to VOB
3ds max cattle production Throughout Korean beauty Song Hye Kyo
FLV to 3GP
"Batman Arkham asylum" after playing a little bit of GETTING
Report Calculators And Converters
TS To WMV
BenQ compete in, with a hope that THE road
how to buy portable gps car Navigation systems
Tape and disk both methods to
Evaluate Kids Education
Huayin Electric Power