Top 10 Technologies Archive

    2003 Top Technology Initiatives 

    Laptop and mobile phone to search for 2003 TTI resultsThe 2003 Top 10 Technologies tabulation was one of exceptional change. Six new items broke into the final listing, including Business Information Management, Application Integration, Wireless Technologies, Intrusion Detection, Customer Relationship Management, and Privacy. Not surprisingly, Information Security moved to the number one slot.  

     2003 Top Technology Initiatives

    1. Information Security. The hardware, software, processes, and procedures in place to protect an organization's information systems from internal and external threats. This includes firewalls, antivirus protection, password management, patches, locked facilities, Internet protocol (IP) strategy, and perimeter control.
    1. Business Information Management. The process of capturing, indexing, storing, retrieving, searching, and managing documents electronically, including knowledge and database management (using PDF and other formats). Business Information Management brings to fruition the promise of the paperless office.
    1. Application Integration. The ability of different operating systems, applications, and databases to talk to each other with information flowing freely, regardless of application, language, or platform.
    1. Web Services. Applications that use the Internet as their infrastructure and access tool, including both Web-enabled and Web-based applications. Examples include Java applications, Microsoft's .NET initiative, today's Application Service Providers (ASP), and business portals.
    1. Disaster Recovery. The development, monitoring, and updating of the process for organizational business continuation in the event of a loss of business information resources due to impairments, such as theft, virus infestation, weather damage, accidents, or other malicious destruction (includes business continuation and contingency planning).
    1. Wireless Technologies. The transfer of voice or data from one machine to another via the airwaves without physical connectivity. Examples include cellular, satellite, infrared, Bluetooth, wireless (WiFi), 3G, and 2-way paging.
    1. Intrusion Detection. Software or hardware solutions that list and track successful and unsuccessful login attempts on a network such as Tripwire. Intrusion detection capabilities are being built into many of today's firewall applications.
    1. Remote Connectivity. Technology that allows a user to connect to a computer from a distant location outside the office. Examples would include Remote Access Services (RAS), Windows Terminal Server (WTS), Citrix, MangoMind, and PCAnywhere.
    1. Customer Relationship Management. Processes that manage all customer touch points, including call center technologies, e-commerce, data warehousing, and all other technologies used to facilitate communications with customers and prospects.
    1. Privacy. As more information and processes are converted to a digital format, this information must be protected from unauthorized users and from unauthorized usage by those with access to the data. This includes complying with local, state, national, and international laws.  

    Emerging Technologies 2003 
    Following is a watch list of technologies that may not have current financial viability, but show significant future promise for business owners. The four emerging technologies that were identified as having the most future promise are:  

    1. ID/Authentication. Includes current and evolving technologies for verifying the identity of a user who is logging onto a computer system or verifying the integrity of a transmitted message. Examples include password scenarios, digital signatures, biometrics, and dealing with such issues as IP spoofing.
    1. M-Commerce. Mobile commerce uses smart phones and handheld computers with wireless connections to place orders and transact business over the Web. Although accepted in Europe and the Far East, M-Commerce has had slow adoption in North America.
    1. Tablet PC. Tablet PCs include the next evolution of the personal computer in a tablet format that allows both handwritten and voice input to interact with the applications found on a computer. The system uses a pen-based stylus, in addition to the traditional keyboard (not required). Tablet PCs provide expanded portability because they can be used in a wireless environment.
    1. 3G Wireless. 3G, or third generation, wireless is designed for high-speed multimedia data and voice. Its goals include high-quality audio and video, and advanced global roaming—the ability to go anywhere and automatically be handed off to whatever wireless system is available (in-house phone system, cellular, or satellite).  



    Copyright © 2006-2014 American Institute of CPAs.