Documente Academic
Documente Profesional
Documente Cultură
CIOReview
The Navigator for Enterprise Solutions
MARCH - 2013 CIOREVIEW.COM Company of the Month
Barmak Meftah, CEO, AlienVault
$10
CIOReview
|1|
March 2013
Contents
Cover Story
Page
March 2013
12
Disrupting Technology
Services in the Cloud and Winning
By Rachita Sharma
06 [In My Opinion]
Change in Consumer Behaviordrive the Industry Kevin Vasconi, Dominos Pizza the CIOs Equation Rama Prasad, Gogo Inc. 2013 Cloud Predictions: We will Finally Get Real About Cloud James Staten, Forrester Research for Enterprise Customers is a $60 Billion Opportunity Art King, SpiderCloud Wireless
36 [Technology]
Are You Opening a Door for Hackers? Joel Bomgar, Bomgar
24 Changing Variables in
40 [View Point]
Guard the Perimeter of Cloud and Address Cyber Crimes JVijay Basani, eIQnetworks
Technology Strategies Designed to Support the Workplace of the Future Pat Goepel, CEO, Asure Software
26 [View Point]
42 [Technology]
08 [CEO Spotlight]
Jeff Hudson, Venafi Dave Scholtz, Damballa Rajeev Chawla, CloudVelocity Mike Burkland, Five9 Arvind Narain, MobileASaP
Hadoop MapReduce & SQL Mash Up: A Match-Made in Enterprise Heaven? John Bantleman, RainStor
44 [View Point]
Time to Deliver Efficiencies in Care Delivery Process Omar Hussain, Imprivata Inc.
46 [VC Talk]
Digital Health and IT are Exciting Opportunities Sachin Gupta, Skyline Global Partners
Think Differently to Support new Capabilities in Business Environment Stuart Kippelman, Covanta Energy Corporation
A Location Impact Assessment for Enterprise Mobility Rip Gerber, Locaid "Mobile Consumer Enterprise" Milind Gadekar, CloudOn
CIOReview
|2 |
March 2013
CIOReview
|3 |
March 2013
CIOReview
MARCH - 2013
Harvi Sachar
Managing Editor
Christo Jacob
Editorial Staff
Visualiser
Ashok kumar
Mailing Address
CIOReview 44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538 T:510.440.8249, F:510.440.8276 CIOReview
March 2013 volume 2-2 Published monthy by CIOReview subscription rate: $60 for 12 issues
To subscribe to CIOReview
Visit www.cioreciew.com
Copyright 2009 CIOReview, Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.
ast month, we witnessed Obama signing an executive order on cyber security, vowing to strengthen the nation's critical infrastructure through cross-sector information-sharing and framework. While increasing the amount of IT infrastructure moves to the cloud, it is the right time to reflect on addressing security concerns in the cloud. Though security is one of the top concerns in the punch bag list in most of the enterprises, majority of the companies are not safe using the cloud services. A GAO report based on the views of CIOs at 22 major U.S. agencies, listed several security concerns: vendors using ineffective security practices, agencies not able to examine the security controls of vendors, cyber criminals targeting data-rich clouds, and agencies losing access to their data if the relationship with a vendor ends. Moreover, highly regulated industries such as banking, insurance, and healthcare face potential security threats owing to breaches and compliance. Studies indicate that some merchants and businesses that manage or store credit card numbers and other sensitive information do not use data encryption software. But awareness towards security breaches and compliance issues is on a rise and more and more companies are now looking towards cloud information protection. So as cloud technologies mature, cloud providers will need to address this concern so that customers who utilize cloud infrastructure can gain visibility into their security postures within the cloud. So going forward, Obamas new law would incorporate and address private sector concerns while at the same time providing information sharing and collaboration between government and private sector which will provide additional security to critical infrastructure such as banking, industry, telecom and utilities sectors. What enterprises need to focus on is, while making the switch to cloud computing, organizations should search for cloud providers that use high-end firewalls and intrusion detection systems and which undertake regular independent security tests of their environments. This would help us in maximizing the cloud computing market, which is expected to grow to $206.6 billion by 2016. However neither the CIOs nor the enterprise IT entrepreneurs have taken these issues relatively seriously and need to be more serious about it. It is sad that, The most important things that one's working on are not necessarily the most important things that one thinks one's working on. And Obamas new law calls for it to reflect. Please do let us know what you think. Christo Jacob Managing Editor christo@cioreview.com
CIOReview CIOReview
4| | 4| |
CIOReview
|5 |
March 2013
the proven social tools that make sense for your business.
that can be reserved in advance online. Additionally, ad-hoc access to space and collaboration areas should be easy to find and access for employees that are dropping into the office. Lobby dashboards, interactive floorplan displays for space availability, and even low cost solutions like actionable QR Codes can be leveraged to facilitate the experience. Giving employees access to a physical workspace when they need it allows them to stay connected to the organization and to their coworkers.
in my opinion
Technology Strategies
Asure Software (Nasdaq: ASUR) provides cloud-based workplace management solutions to clients in North America and Europe. Headquartered in Austin, the company has a market cap of $35.96 million.
Pat Goepel
implementation, a Fortune 500 client reported drop-in sites with WiFi access were utilized 3 to 1 over fixed seating options with wired network drops. As college graduates enter the workforce, they are accustomed to working in small groups while simultaneously communicating with their social networks. Employers can leverage these skilled multi-taskers by ensuring they have access to the technologies they need namely the Internet and the latest mobile devices such as tablet computers and smart phones. Employers should not place narrow parameters on how these former luxury devices get used to complete projects. Cumbersome Bring Your Own Device Policies and strict rules around technology usage frustrate an increasingly technology -savvy workforce and create a culture of distrust. Instead, leadership teams should enable employees to use the
I
CIOReview
t happens almost daily: New technological advances change how employees around the world get work done. A great example of the impact technology on business is making work (and employees) more portable. Thanks to tablet computing, wi-fi, easy access to limitless data storage, and smart phone technology, people can work from almost anywhere at anytime. And organizations leading the charge in mobilized workforce strategies are realizing the benefits of collaboration with better work products and increased productivity. When it comes to technology designed to support this evolving workplace of the future, whats next? Will anyone have a dedicated office or space? Will a physical office presence become a thing of the past? How can leaders create a workplace that
fosters productivity, efficiency and collaboration and creates a company culture current and future workforces will embrace? Here are four considerations your leadership team must consider as they prepare, deploy and support technology strategies for a truly portable workplace that is right around the corner.
encourage employees to telecommute from their location of choice. But frequently, remote office workers and telecommuters find themselves isolated from the organization. The isolation can deteriorate employee/ workplace relationships unless your organization connects people more thoughtfully. One technology trend organizations can use to ensure employees stay connected to the workplace is access to the same tools available at the physical office location. For example, remote workers should be able to schedule meetings in the office when they need to with all the confidence that the meeting room they schedule will be available to them. In addition, organizations can maximize their available real estate by providing remote workers with hotel office space
|6 |
March 2013
CIOReview
|7 |
March 2013
CEO Spotlight
CEO Spotlight
he technology industry has been in a state of constant flux, and there have been several prominent advancements which have changed the face of business operations. The contraption of data based inventions such as cloud computing and big data have made it all the more convenient to supervise and store data.
By enabling organizations understand where their security certificates lie and who has access to it, we give them control over the data. We also enable them to change security around the certificates and revoke access as and when required. Our role in the industry is to give the companies control over data even if they do not own it.
Dave Scholtz
Things. With this impending reality, the industry is heading into a new frontier of combatting cyber crime. Of course, not every IP -addressable object will be a target or fall victim to
An Entrepreneurs Mandate
Keeping up with industry trends and innovation more specifically, the challenge to entrepreneurs is to be aware of and take advantage of the trends and innovation going on around them, while remaining maniacally focused on the specifics of their own unique offering as they work to develop product, take it to market and build a viable business. Whether it is cloud computing, Big Data, mobility, or any of the -as-aservicesolutions to name a few, there is continuous innovation taking place at a rapid rate around the entrepreneur that may impact the entrepreneurs business. By being aware of these, entrepreneurs can put them to work in making their businesses more productive and efficient, and they can apply them to their business strategies to take advantage of market opportunities or to avoid pitfalls. All of this being said - this is a good problem to have. There has never been a better time to embark on an entrepreneurial venture given the low cost and ease-of-access of computing power and other solutions that are now available to provide the infrastructure, software, applications and best practices necessary to develop product and support a company and its operations.
CIOReview
Jeff Hudson 500 companies have been attacked and infected and data has been compromised. Preeminent techniques to contradict security threats such as consolidation are slow and cumbersome ineffectual on modern day threats. Even installing firewalls and barriers prove futile against inside threats. Encryption answers all the security related problems of modern day business and is highly effective against attacks from inside the organization. Encryption ensures that data in any form is protected as it is meaningless in possession of individuals who do not have the key to decrypt it. The amount of data produced in the world today is enormous and managing the encryption keys generated is a herculean task. Venafi was established to address this issue.
The Future
The Internet of Things. While it has not fully arrived yet, it is apparent that it is not a question of will? but when? we will be living amidst the Internet of
cyber criminals, though we can expect to be challenged by a new wave of threats and threat vectors as these criminals seek new and innovative ways to exploit the pervasiveness of an IP - connected world. Already today, enterprises must react to the erosion of the network perimeter and the proliferation of devices, operating systems and mobile users that are connecting to their networks. This is why Damballa and others are delivering next-generation security solutions that detect and terminate criminal activity by monitoring network behavior.
|8 |
March 2013
|9 |
March 2013
CEO Spotlight
CEO Spotlight
CloudVelocity is a provider of software that enables new and existing Linux and Windows multi-tier applications to run in the cloud without modification. Headquartered in Santa Clara, CA, the company recently raised $5 Million in series-A funding from Mayfield Fund. enterprise. Today it requires extensive manual configuration, provisioning, and a series of complicated and time consuming processes. The result is a costly, risky and slow approach to orchestrating workloads and services between data centers and clouds, impeding the business case for public clouds for most enterprises. So adoption of public cloud by enterprises has been tepid at best. We decided to tackle this problem at CloudVelocity. The CloudVelocity platform decouples enterprises from todays public and private cloud restrictions and enables the ability to treat multiple clouds and data centers as a single, dynamic pool of resources. and premise-bound predecessors, including cloud migration and integration, cloud cloning, cloud failover and cloud bursting. All of these solutions will be a leap ahead of the solutions in use today. They offer more agility and economy with higher potentials for availability, and with fewer trade-offs and compromises now commonplace. There will be increasing agility pressures on enterprise IT and the need for hybrid cloud operating models will become table stakes for all enterprise IT departments. Service providers will be required to cater to this requirement in order to win significant portions of the enterprise cloud business.
leadership team capable of executing on the vision. Five9 has been fortunate in the ability to meet these challenges head on to become the breakaway market leader in cloud contact center software.
Rajeev Chawla
Mike Burkland
T
CIOReview
he business case for enterprises to develop their own data centers is rapidly eroding. Many are opting for third party facilities and cloud operating models, yet there are serious shortcomings which prevent enterprises from taking full advantage of the transformative power of public clouds. Running existing applications in a public cloud is hard: today's multi-tier applications span multiple hosts and are comprised of not only application binaries and data, but also libraries, operating system services, data servers and other network services residing in the
he software industry is at an inflection point; aging, premisedbased solutions are being replaced with cloud solutions. This shift to the cloud is allowing businesses to move beyond outdated technology paradigms to new, more flexible and cost effective models. Cloud based solutions are helping businesses achieve tangible results while also controlling costs with a Pay As You Go model. Today, many cloud solutions are as sophisticated
By 2017, 25 percent of enterprises will have an enterprise app store for managing corporatesanctioned apps on PCs and mobile devices. Enterprise app stores promise greater control over the apps used by employees, greater control over software expenditures and greater negotiating leverage with app vendors, but this greater control is only possible if the enterprise app store would be widely adopted. Courtesy: Gartner
|10|
March 2013
CIOReview
|11 |
March 2013
Cover Story
How an innovator is
In 18 months, either your business will be on the cloud or you will be in a different business
to Disrupt Technology
March 2013
Services
CIOReview
|12|
"
f we have to pick one technology that would define this decade, it would be Cloud Computing. With the proliferation of better internet bandwidth and improvements in web technology, cloud computing technologies are disrupting the way companies look at IT. As with any emerging technology, there are misconceptions and fears associated with Cloud computing too. Slowly yet steadily these misconceptions are dissolving as enterprises realize the hidden potential of the technology and the long list of advantages such as cost efficiency, energy efficiency, disaster recovery, flexibility etc that it ensues with itself. Enterprises in several verticals are embracing cloud open heartedly and experts believe that the cloud computing market will reach a whopping $14 billion by 2014. As the technology comes of age, innovations are the key way forward. One such disruptor is Aditi Technologies, an award winning Microsoft Cloud Partner which has pledged to help customers leverage emerging technologies and guide clients to gain competitive advantage through transforming their business to the cloud. Through their deep partnership with Microsoft, Aditi is at the forefront of Platform as a Service innovations. Founded in 1994 as a technology services company, Aditi Technologies has always been a contrarian in a fairly homogenous Indian IT services sector. As a result, clients regularly turn to them when a new paradigm emerge which requires serious technology depth. Today, the worlds largest ISV, largest insurance company, largest gaming company, largest information services provider, largest mobile carrier and second largest social network count them as their R&D innovation partner.
that. With the widespread adoption of Cloud based applications 1. Companies big or small have the same access to resources, technology 2. Users get a friendly user interface similar to that of consumer technology and reduce learning curve greatly 3. They are without the usual complex installations and integrations, ensuring that the applications could be running in hours 4. No upfront cost with operational costs based on usage make them easy to try and then buy As a trendsetter in emerging technologies, Aditi foresaw this shift and positioned themselves as the vehicle of choice for organizations, irrespective of
"
|13|
March 2013
their size and might to help them migrate their functions to the cloud. This transition has opened new vistas and Aditi Technologies is steadily working to leverage this revolution. We believe that cloud can aid any organization innovate and accelerate their strategy to market domination, explains Pradeep Rathinam, CEO, Aditi Technologies. The largest part of their business comes from product companies, startups and ISVs. Product companies building social, media or data driven products are the biggest consumer of their services. The company is also seeing rapid enterprise adoption in the past quarter specifically in the online commerce, healthcare, travel and financial services verticals.
Cloud provides us an opportunity to play as Service as a software player by leveraging reusable cloud based software to deliver services faster, cheaper and smarter
CIOReview
|14|
March 2013
"
is convinced that by investing in the cloud, ahead of the curve, customers stand to gain significant competitive advantage in the long term. Enterprises also stand to gain velocity, agility and focus on enabling their own business objectives rather than IT. This strategy also guaranteed their customers to leverage cloud aggressively and learn more. At first they are skeptical about such a radical recommendation, but once they realize the actual potential, things become easy, adds a proud Rathinam. The company has delivered over 100 engagements on cloud, that by itself is often 5X or 3X the number of engagements most of their competitors have delivered. One of these engagements was when Aditi helped Restaurant.com, a web company for restaurant booking & gifting; gain auto-scalability of data centers during promotion days via cloud. Due to spike in the web traffic which went almost up to 10 times during the season days, RDC was not able to handle it efficiently which resulted in losses. Aditi deployed its cloud solution and mirrored them at different data centers for advantages in proximity, availability & Disaster recovery. Says Adnan Adamji, CIO of Restaurant.com, Aditi has been invaluable in helping Restaurant.com implement our cloudbased solution. Their extensive technical depth on Microsoft Azure has been extremely crucial to our success. But any move
to the Cloud must be meticulously planned. Aditi sounds a word of caution to organizations planning to make the move to the cloud as doing so without thoughtful planning can create problems down the road. In a bid to increase credibility of its radical Cloud First Approach Aditi moved all of their functioning to the cloud as well. With a vision to be a zero server company they have successfully moved their mailboxes, communication infrastructure, development platforms, intranet, corporate sites and analytics to the cloud. The company's strategic planning and reviews are conducted on Google+ hangouts and they also made a unique step of recruiting via Facebook and Twitter. Aditi chose to build its solution using Microsoft virtualization and cloud technologies on a Hyper-V platform. This move ensured a 40 percent reduction in costs while consolidating physical servers by 60 percent. The transition was so successful that Microsoft published a case study on it as a reference for future customers.
consulting companies on Microsoft platform 3 years in a row, across 6000 global services companies proving their ability to lead this space and sustain leadership. One might wonder how one could manage to beat the stiff competition and emerge victorious time and again. The answer lies in the approach adopted by the company to create a differentiated identity and services portfolio. Aditi has mastered the technique of working in the emerging technologies sector and always stay
"
Disrupting Competition
With an innovative yet effective Cloud First Policy in place coupled with the deep talent pool in the organization, winning accolades for its dedicated work in the field of cloud computing has become a routine for Aditi Technologies. The company has been graced as one of top 3 cloud
The biggest challenge our customers face today is the unknown risks with cloud integration. Navigating the journey and managing the risk is core to our offering
CIOReview
|15|
March 2013
CEO Spotlight
a step ahead of the technology curve, when most services companies find it difficult to understand and deliver an end to end solution in a disruptive technology space. We execute at a global scale, leveraging pre-built frameworks and Intellectual Properties (IP) to accelerate time-to-market for our clients, adds Rathinam. Another point of differentiation is their capability to solve complex problems. It is relatively easy to try a new cloud platform but on the contrary building, releasing and managing a cloud based solution does not come so easily to all. While many services providers are finding a lot of envisioning and PoC business, few of them have the capability to solve the cloud problem with a clear sense of challenges across SDLC and across markets. Owing to the early starter advantage and over 100 cloud engagements, Aditi is capable of solving this problem well giving them a clear lead in the race. Customers leverage these frameworks and codebases to accelerate time to market and reduce cost of cloud development, says Rathinam. And crucially, the company makes it a point to involve their customers with them on this journey. Today, we have over 20 cloud customers who would refer us and are strong advocates of our cloud services. Most of our growth in recent times has come from customers and the ecosystem referring us to other customers. As long as we deliver customer delight, we will be in a strong position, explain a proud Rathinam. the top cloud consulting company across all major cloud platforms in the next 2 years apart from seeking faster profit growth. Investing heavily in AWS, SFDC, TIBCO and having built up technology partnerships with more than 20 cloud platform vendors globally they are surely making their way to the top of this new peak. We want to become a complete cloud solutions provider across core cloud challenges like data, media and cloud integration for our customers, says Rathinam. Innovation is a core ingredient of Aditis DNA and the company is gearing up to build offerings around Cloud Services. The core idea is to package frameworks and code libraries that clients can deploy without significant technology investments. It helps our clients and helps us scale without necessarily building huge teams. We want to be smart about scaling our business and leverage repeatability, explains Rathinam. Having released one of the first 5 apps on Windows Azure Store around Task Scheduling the company will be releasing many more such services around data integration; mobile services this half to stay ahead of its competitors.
Cloud provides us an opportunity to play as Service as a software player by leveraging reusable cloud based software to deliver services faster, cheaper and smarter
CIOReview
obile Density in corporations is increasing by leaps and bounds: three devices per user in 2012 climbing to seven devices in 2016. Mixed-use or BYOD (Bring Your Own Device) is now mainstream. Mobile application downloads from appstores such as Apple and Android are into billions, and corporate applications are increasingly mobile-centric. Throw in the shift to the Cloud, which means anytime/anywhere access, and you can see why Mobile is the NEW NORMAL. With this kind of explosive growth, comes a risk, compliance, and security headache. Let us deep-dive into this a bit more. With the latest device in hand and 20-30 apps downloaded to that personal device, the user (say an employee or guest) comes into the corporate network. Next, IT provisions the user with a handful of corporate apps. Now, the validated user has unfettered access into the network and the public cloud. In the process, this user consumes WAN bandwidth, accesses apps that may or may not meet corporate content standards, and, maybe even use applications that could expose that companys infrastructure to security threats. In each of these scenarios, the problem may not be the user or the device instead, it could be mobile app itself.
Just as IT typically does not leave anything to chance (or honor system) with laptops, nor can they afford to do so with mobile devices. Next, let us look at todays antidote to this problem space IT has a set of tools that allows them to authenticate a user, gain visibility into the device, provision company apps, and, maybe even look at the flow of data packets from the device into the network. This passive approach may not recognize that the bigger lurking risk is elsewhere in the form of admission control challenges around mobile apps, both public and private. Over the years, IT security has evolved from a single-tier to a multitiered protection model: endpoint security (anti-virus) to gateway security to vulnerability assessment to intrusion prevention. And, from simply inspecting packets of data to understanding context who the user is and what application the traffic belongs to. Just the same way, the mobile ecosystem needs to be protected. Unfortunately, instead of dealing with hundreds of thousands of device and applications, we have to cope with millions of devices and billions of applications. In other words, IT controls need to be more specific, more active (or real-time), and have tools that allow them to Be Selective, Not Equally when it comes to apps, users and devices. And, of course, like anything else in IT-land, it needs to be cloud-based, policy
Arvind Narain managed, and event-driven. This mobile explosion in corporate America creates opportunities. Along with Big Data and IT Consumerization, Mobile Management offers tremendous entrepreneurial opportunities. We do not anticipate a one-size/one-class of solutions; instead, we expect a robust mobile ecosystem of solutions. As entrepreneurs, we have an opportunity to participate in this mobile wave over the next one to five years. Our prescriptive advice to entrepreneurs is straightforward: attempt to solve a targeted problem and then expand (penetrate and radiate; find a hole and fill it then, find a bigger hole); focus on the problem ahead, not just todays (Wayne Gretzky, the greatest hockey player used to say that he played to where the puck was headed, not where it is), and finally define your success by what you have done for your customers, not by the amount of VC funding you have raised. In the words of Steve jobs: Stay Hungry. Stay Foolish.
CIOReview
|16|
March 2013
|17|
March 2013
Organizations may be better off by getting an accurate report of previous attacks and how they were performed
Changing Business Environment
Times are changing and business operations are adapting to the technological flux. There is a need to bring a paradigm shift in security measures and systems. AlienVault is working towards discovering opportunities and achieving breakthroughs by reopening long closed systems. The company has been growing by leaps and bounds, recording a growth of 100 percent per year. With a highly qualified leadership team which comes directly from Hewlett Packard, they have managed to raise $22.4 billion in series C round. AlienVault is hiring fast and is on track to more than double in revenue year-over-year, adds Meftah. The company has been named 2013 Technology Pioneer by world economic forums. The company envisions continued growth by serving organizations they believe are underserved. AlienVault currently has 120 people working in the organization. Through continuous innovations, AlienVault endeavourers to continue leading the way in security and threat management.
CIOReview
T
The Initiation
CIOReview CIOReview
he industrial ecosystem we operate in has evolved progressively and so has the risk of security hazards. Complex IT infrastructures are met by multifaceted threats and attacks which results in security being compromised. One of the biggest challenges encountered by security professionals worldwide is the need for visibility across a multitude of disparate point security solutions that desperately needed to work together. The present security measures in place fail to meet the needs of organizations which are continuously vulnerable to threats from hackers around the world.
Founded in Spain in 2007 by Julio Casal and Dominique Karg, AlienVault has revolutionized the process of security and threat management. This California headquartered company understood that the prime trepidation for technology buyers is the lack of desired requisition required to manage threats inspite of investing large sums of money. Another concern is the deficiency of skilled talent and expertise in security which causes serious implications on how efficiently an organization addresses security issues. The companys goal is to provide a comprehensive
collection of tools which grant an administrator an eagles eye view of all security related aspects of their system. This is made possible by OSSIM (Open Source Security Information and Event Management), the de facto standard SIEM which comprises a collection of tools designed to aid network administrators in computer security, intrusion detection and prevention. AlienVault has ushered in a radical change in the way security and threat was being managed before, by reducing the time taken to deploy security measures from weeks and months to hours and days, thus reducing the overhead costs. They managed to achieve this by bringing different solutions to one company and integrating it in a simple console, the Unified Security Management platform. This platform integrates tools to detect threats and provides the administrator ability to control and view all built in security controls with one single console. This provides better visibility and control and helps organizations manage threats better.
|| 18| |18
"
"
|19|
March 2013
Business Environment
Stuart Kippelman, VP & CIO, Covanta Energy Corporation Covanta Energy (NYSE: CVA) owns and operates worldwide over 40new generation waste combustion facilities with added benefit of energy recovery, also known as waste-to-energy or energy-from-waste power generation plants. Headquartered in Morristown, the company has a market share of $2.6 billion.
Think Differently
To deliver success based on innovative thinking, everyone on the team needs to feel they can think outside the box
is still no cost effective and simple way to do it. The new terminology for this issue is called Big Data, but it goes beyond that. The average company is only analyzing a fraction of the data they have, and most likely not collecting all the data they should be. Solving this problem would enable companies to be more productive, more responsive to customer needs, and better positioned for growth.
Expectations to Meet
Every day, employee expectations of technology are increasing to keep pace with the world of mobile applications. These expectations demand access to large complex data at any time, on any device, and from anywhere in the world. This is all great progress and I believe that it positively contributes to culture, making the world a smaller place. However, it might be happening too quickly. It was not that long ago that a web page that loaded in 10 seconds was acceptable. Today if a web page does not load in one or two seconds on a mobile device, we become impatient and often open another web site. That is
The foundation of encouraging innovation is to create a culture that not only allows and supports it, but expects it from everyone. In order to deliver success based on innovative thinking, everyone on the team needs to feel they can think outside the box related to everything they do. It might sound basic, and it is. However we constantly challenge each other to ensure creativity and new ideas are always brought to the table. From the most basic task to the largest most complex projects, there is always a better way to do things.
A Gadget Marvel
I am definitely a gadget lover, but my favorite is my Nest Learning Thermostat. It is like a smartphone and a home thermostat combined into one. Besides being a good thermostat, it does everything automatically and can be controlled over the Internet so no more forgetting to set the heat or air conditioning. It is a great example of how technology is making everyday tasks easier.
Stuart Kippelman
CIOReview
|20|
March 2013
"
"
CIOReview
|21|
March 2013
Trends driving
Consumer Behavior
drive the Industry
Kevin Vasconi, EVP, CIO, Dominos Pizza
Radical Change in
The biggest challenge is not the things you know you have to do, it is the unexpected that provides the real challenge and often the greatest opportunity
Domino's Pizza (NYSE: DPZ) is a restaurant chain known for its pizza delivery operating a network of company-owned and franchise-owned stores in the United States and in international markets. Founded in 1960, the company has a market cap of $ 2.58 billion. help make this happen. Some areas of Focus for Dominos E-commerce with a strong investment in Mobile platforms Big Data & Real-Time Analytics E-Commerce Infrastructure
(problem) we are asked to play. We recruit and develop our senior technical team with this in mind.
Technology Trends
We always look at Macro trends first, focusing on the big trends in society, consumer behavior and technology and then we look for the inflection points. The biggest trends that will drive our industry are the same ones that are driving radical change in consumer behavior: Mobility, Ubiquity & Personalization. Dominos has active projects in all these areas.
Kevin Vasconi
CIOReview CIOReview
| | 22| | 22
"
"
CIOReview
|23|
March 2013
CIOs Equation
Rama Prasad, SVP & CIO, Gogo Inc.
Gogo Inc., headquartered in Itasca provides in-flight broadband Internet service, streaming video and other connectivity services for commercial and business aircraft.
I
CIOReview
n todays times, architectural elegance is a growing requirement in organizations. With problems requiring newer solutions in terms of disruptive technologies we can see plenty of opportunities but at the same time this makes the architecture more complex which gives rise to the requirement of greater planning. This is an area that a CIO must monitor. Needs of business partners such as marketing and customer support are also growing and they need to be aligned with the budget and guidelines laid out by the senior management. A CIO is expected to balance multiple constituents like these together. This seems tougher in todays era than ever because of multitude of opportunities present. Disruptive technologies are well on their way to change the face of enterprises and the way they look at IT. Cloud computing is one of the crucial technology trends that is molding the future of the industry in a big way. Moving assets and process components to the cloud has a huge impact on streamlining business processes and improving cycle time. This technology entails advantages such as it being asset-light, which helps IT organizations steer the focus towards the core issues more and making an organization move faster. With cloud computing gaining momentum, mobile is another trend that is already changing the way the enterprise and consumers interact. The penetration of smart phones has made computing truly mobile today.
These devices bring the end user closer to the business and have managed to cut out a lot of the processes and layers in between. This has also increased the importance of the technology organization. More than ever, IT now plays a
Rama Prasad
transformational role in an organization. As technology advances and companies adapt to these change; in this environment a CIO always requires to focus on finding the right talent that fits the requirements of a job. This process has always been tough but the complexities are growing manifolds now with the advent of newer technologies. To solve all these issues and to ensure growth, innovation is the key. It is very important to create a culture within the team that fosters innovation. People who become good examples to the rest of the organization must
A CIO also needs to balance the demands pertaining to projects, ideas and opportunities, of the business with the limited supply in terms of budget and manpower
be hired. Recognizing and rewarding innovation at all levels of the organization irrespective of its size is a necessity. Apples iPhone is a great example of innovation in technology. The simplicity of intuitiveness of the device has changed the expectations of user interfaces for all software. Companies should try and incorporate this streak of innovation in all their products and services. But innovations alone will not help growth. The enterprise environment faces several challenges; the solutions from different vendors cannot be nitrated easily. It becomes mandatory for the vendors to follow or adapt up
to date industry standards. The need of the hour is to address this issue where the equation in demand can be facilitated. A CIO also needs to balance the demands pertaining to projects, ideas and opportunities, of the business with the limited supply in terms of budget and manpower. This is a never-ending challenge faced by a CIO. Initiating a project prioritization process that puts the business partners in charge of prioritization is a possible solution. The concept though is simpler said than done. All these elements put together will enable the CIO and the enterprise alike.
|24|
March 2013
CIOReview
|25|
March 2013
View Point
platforms different from traditional virtual infrastructures and traditional hosting environments to make architecturally sound decisions about which applications to move to the cloud. 2. Cloud and mobile will become one. Whats the value of a mobile app that does not call out through the Internet to back-end services? Not much. More often than not, we are finding mobile applications connected to cloud-based back-end services that can elastically respond to mobile client engagements and shield your data center from this traffic. 3. We will stop stressing about cloud SLAs, and recognize that apps have to protect themselves. The best practice for cloud application design and configuration is to build resiliency into the application rather than expect it from the cloud platform. This way you can achieve any service-level agreement regardless of the base SLA provided by the cloud platform. 4. We will get real about cost modeling. Do the math, understand the economics, and monitor and optimize as your use evolves. If you want to get the best ROI out of your use of cloud services and platforms, you need to actively model the cost profile of your applications, monitor their resource use, and adjust accordingly. Cost should not solely drive your cloud deployment decisions, but cost can no longer be ignored or assumed. 5. Infrastructure & operations will free the development teams to build apps in the cloud. The developers do not really need I&Os permission, and our surveys show the business-unitaligned developers certainly are not waiting for it. In 2013 the I&O team will get comfortable with the fact that development on public clouds is going to happen whether they like it or not and it is easier for them to engage developers and be part of the conversation about how to do it safely, securely, and with appropriate oversight. 6. We will get real about using the cloud for backup and disaster recovery. Instead of enterprises buying resources in case of a disaster, cloud computing and its pay-per-use pricing model lets you pay for longterm data storage while only paying for servers when testing or declaring a disaster. It probably will not replace your existing BC/DR resources completely, but the cloud is turning the cost of storage upside down faster every month, and what was cheaper to back up to traditional DR storage last year will be cheaper and easier to put in the cloud is short order and faster to recover. 7. We will stop equating cloud with commodity. Cloud services are highly standardized and automated, but standardization does not have to mean commodity. We are already seeing cloud services backed by highend hardware, offering GPUs, SSDs, and other clearly non-commodity infrastructure options. In 2013 expect to see the proliferation of these types of choices as cloud providers leverage them to meet specific market demands and to differentiate competitively. 8. We will stop equating cloud with AWS. While Amazon Web Services has opened up a substantial lead in the cloud platforms market arguably as large as 70 percent market share in 2013 we will see that market position give way to a cadre of strengthening competitors and new entrants. Microsoft and Google have made significant improvements to their platforms, and by the end of 2013 we fully expect to see at least three substantial OpenStack-based clouds building strong positions. 9. We will acknowledge that advanced virtualization is a good thing, and no, its not a cloud. The cloudwashing award for 2012 definitely goes to enterprise I&O departments who relabeled last years VMware environment a private cloud so they could get to yes in the eyes of their CIO. Very few of these environments offered self-service to the developer, fully-automated provisioning, standardized services, or cost transparency. In 2013, lets get real about these environments. A mostly static virtual environment that successfully drives workload consolidation, operational efficiencies and fast recovery is a good thing a very good thing. 10. Developers will awaken to: Development is not all that different in the cloud. Our cloud developer survey shows that the majority of languages, frameworks, and development methodologies we use in the enterprise are also in use in the cloud. Whats different isnt the coding but the services orientation and the need to configure the application to provide its own availability and performance. And frankly this is not all that new either. So, while some of the best practices and cloud services may be new, there are few excuses for a welltrained developer to not be productive in the cloud.
A
James Staten
CIOReview CIOReview
t the end of 2012 there was one clear takeaway about the cloud computing market enterprise use has arrived. Cloud use is no longer solely hiding in the shadows, IT departments are no longer denying its happening, and legitimate budgeting around cloud is now taking place. According to the latest Forrsights surveys, nearly half of all enterprises in North America and Europe will set aside budget for private cloud investments in 2013 and nearly as many software development managers are planning to deploy applications to the cloud. So what does that mean for the coming year? In short, cloud use in 2013 will get real. We can stop speculating, hopefully stop cloudwashing, and get down to the real business of incorporating cloud services and platforms into our formal IT portfolios. Here is what we expect to happen when enterprise gets real about cloud in 2013: 1. We will finally stop saying that everything is going cloud, and get real about what fits and what does not. We now have enough understanding about what makes cloud
We are finding mobile applications connected to cloud-based backend services that can elastically respond to mobile client engagements and shield your data center from this traffic
| | 26 | | 26
"
"
CIOReview
|27|
March 2013
View Point
to do more with less budgets and resources, the opportunity for trusted mobility services is tremendous, says Greg Collins, Principal with Exact Ventures. Until now, there has been little reason for enterprises to have a relationship with operators beyond minutes and mobile devices. Small cell systems that go beyond coverage and capacity can change this model and open up new business models that can help enterprise customers save significantly on CapEx and OpEx. Enterprise IT can save approximately $60 billion between 2014 and 2020 By outsourcing telecommunications services, enterprises can leverage new in-building mobile services and save up to 35 percent per year by transitioning from a CapEx to a peruser/month OpEx model saving enterprise IT over $60 billion between
with services such as BYOD, MDM and PBX Integration, even Wi-Fi as a Service. Enablement of such services starts with the deployment of a multiaccess small cell system that includes 3G, LTE and Wi-Fi, and can scale beyond a few small cells to deliver reliable mobile services indoors for enterprise customers of any size. To enable managed cloud and application services, a locally deployed controller or services node maintains secure services access to and from any mobile device on the network.
within an organization. In conjunction with other cloudbased telecommunications services, operators can centralize the collection, storage, and reporting of such data, helping customers relieve costs, and adhere to regulatory or best-practice compliance.
W
CIOReview
e are in the midst of the most rapid mobile network change we have seen in over 15 years. Mobility and the use of wireless spectrum is the digital oxygen that drives productivity the mobile industry's equivalent to crude oil deposits. Spectrum reuse and targeted capacity using small cells indoors is rapidly becoming the answer to deal with networks at capacity and poor indoor service. So where is the $60 billion opportunity? It starts with providing a scalable small cell network that can deliver reliable indoor 3G/LTE and Wi-Fi coverage and capacity for enterprises that recaptures vastly under-utilized licensed spectrum indoors, and is positively impacting the outdoor macro cellular network. Mobility and agile network services for enterprises can create competitive advantage The enterprise mobility services market opportunity is arising as a result of several key trends: mobility and the need for BYOD policies and control, cloud computing and the emergence of enterprise small cell systems capabilities that go beyond coverage and capacity. In 2013 and beyond, enterprises have an unrivalled opportunity to move
their mobile relationships beyond minutes, Megabytes, subsidized devices, and engage mobile operators as trusted partners to their business. As more hardware and Wi-Fi vendors start to offer managed SaaS and WaaS services, so they leave the door open for fixed service providers to do the same. Enterprise customers now have valuable options to curtail CapEx spending. The advantage that the mobile operators have is that they can offer a full suite of OpExonly mobility services with reliable licensed spectrum coverage and capacity using multi-mode small cell systems and still deliver WaaS, SaaS, security and compliance services. In the market analysis, Enterprise Mobility Services: Market Opportunity for Mobile Service Providers, Exact Ventures, an analyst firm focused on technology market intelligence, analyzed the managed mobility services opportunity for businesses of 100 to 4999 employees in the United States and the European Union. In leveraging the mobile ecosystem and small cell systems for inbuilding coverage, capacity and services, operators have the ability to help enterprise customers remove IT challenges with mobility, unified communications, secure access to applications, device management and integration of cloud and telephony, as well as leverage the emergence of new context and locationbased services. With enterprise IT teams under constant pressure Art King
Hosted Unified Communications(UC) refers to a set of real-time communications services such as instant messaging, presence information, telephony and video conferencing, as well as non-real-time communication services like e-mail, SMS, voicemail and fax. UC is not necessarily a single product, but is often a set of products that provides a consistent unified user interface and user experience across multiple devices and media types. Security: Cloud-based Web Filtering :Enterprises
increasingly employ cloudbased web filtering as a way to monitor and control website access and usage to enhance productivity and improve security by protecting against malware and spyware.
Wi-Fi-as-a-Service is the delivery of enterprise-focused services such as secure internal and guest Wi-Fi. Where the operator is already installing small cells with Wi-Fi, it can offer business customers Wi-Fi access when the opportunity is available. Context-Aware (or Location-Based) Services
can offer enterprises a large array of use cases. The opportunity to leverage the very sophisticated mobile network location capabilities in small cells, and extend them into the macro network, creates unique opportunities to innovate enterprise business systems in ways that have never been easily available. Enterprise CIOs are starting to expect mobility services from their communications partners as part of a longer-term strategy to lower CapEx and improve productivity and business agility.
2014 and 2020, and allowing finite IT resources to be either re-allocated to focus on differentiation and competitive advantage, or for the cost savings to fall to the bottom line.
Compliance Services
Many industries are subject to regulatory record keeping, requiring documentation of all communications
|28|
March 2013
|29|
March 2013
View Point
W
CIOReview
hen people say Big Data, they are usually talking about the analysis of petabytes of data to get insights hidden in massive datasets. New technologies like Hadoop get lots of attention because they make analyzing these huge datasets possible. But Big Data also affects another part of the database world: operational databases. These databases provide interactive web and mobile applications with millisecond access to small pieces of data in a large database and are crucial to meeting the response time user demands. Big Data dramatically changes the requirements these interactive applications place on operational databases, which is why developers are seeking alternatives to the relational databases used for the last 40 years.
generated data are just a few examples of the ever-expanding array of data that is captured, stored and processed in an app or acquired from third parties. The use of this data is transforming the nature of communications, shopping, advertising, entertainment, relationship management and even how we do everyday things like hail a cab. Developers are discovering ways to leverage this data to enrich existing applications and create new ones made possible by it because if they do not, they will fall behind.
Current Generation of Interactive Applications must Capture and Process more Data
Big Data is all about capturing and processing growing amounts of data to bring valuable new capabilities to users. The current generation of interactive applications must capture and process far more data than those of just a few years ago. Personal user information, session states, geo location data, social graphs, purchase histories, user-generated content, machine logging data and sensor-
Figure 1. Big Users: Global Internet usage is growing rapidly, as is the amount of time each user spends online daily. With the proliferation of smart phones, people use their apps even more frequently.
at scale is more effectively a c h i e v e d with clusters of standard, commodity servers, and that a schema-less data model is often a better approach Figure 2. Big Data: The amount of data is growing for handling the rapidly, but the vast amount of new data being stored variety and types in unstructured and semi-structured. of data used by applications today. But managing this ever-growing NoSQL databases were developed amount of data is increasingly from the ground up as distributed, problematic. Not only is there more scale out databases (unlike the scaledata to manage, there are also more up, shared-everything architecture users accessing it (see Figure 1). Today, most applications are accessed of relational technologies). They through a browser or thin mobile app use a cluster of standard, physical but run in the cloud. That means a or virtual servers to store data and database might need to store terabytes support database operations. To scale, of data for tens of millions of users additional servers are joined to the who have downloaded the app and cluster and the data and database support the database operations for operations are spread across the larger cluster. Since commodity servers are millions of concurrent users. Compounding the problem, the expected to fail from time to time, majority of the new kinds of Big NoSQL databases are highly resilient, Data being stored are unstructured built to tolerate and recover from such or semi-structured data (See Figure failure. NoSQL databases provide a much 2). This means the data does not fit easier, linear approach to database well into the highly structured rows scaling. If 10,000 new users start and columns of a schema-based using your application, you simply relational database. App developers add another database server to your want something more flexible that cluster. Add 10,000 more users and can easily store any new type of data add another server. There is no need and easily handle content structure to modify the application as you scale changes. since the application always sees a single (distributed) database. Since Addressing the challenges of Big database operations are spread over many servers, consistently very high Data To address the challenges of Big performance can be maintained. Since the use of Big Data is Data and Big Users, more and more increasingly important to the success application developers are looking to of an application, being able to NoSQL databases. The use of NoSQL efficiently interact with a database technology is rising rapidly among takes on added importance. Since Internet companies and enterprises. developers generally use objectMany consider it a viable alternative to relational databases, especially as oriented programming languages to organizations recognize that operating build applications, it is usually most
efficient to work with data that is in the form of an object with a complex structure consisting of nested data, lists and arrays.
The rapid take-up of tablets, combined with the growing acceptance of in-game purchasing and virtual currencies will result in an estimated $3.03 billion of sales in 2016, reaching over 10 times the $301 million figure calculated for 2012. The migration to tablet devices is due to the fact that games have to be purchased upfront and the gaming devices themselves often do not allow for a 3G or 4G connection. Courtesy: Juniper research
|30|
March 2013
CIOReview
|31|
March 2013
View Point
know about more than just one. The Big Ten are 1) navigation, 2) search, 3) advertising, 4)social networking, 5) entertainment, 6) people locator services, 7) resource management, 8) authentication, 9) operations improvement and 10) analytics.
The trouble for the CIO is grabbing and controlling the primary location sources and others such as IP location for computers and connected devices & third party sources from Google
Programming Interfaces (API) and Software Development Kit (SDK) and make them easy to access for the CIO. Or you can direct the sources.
Locaid operates a location privacy platform that allows mobile developers to locate over 350 million devices for enterprise authentication, fraud management, and consumer location services and opt-in mobile marketing. The San Francisco based company has raised a total funding of $26.2 million from InterSouth Partners and H.I.G. Ventures.
F
Rip Gerber
CIOReview CIOReview
or the last two years I have written a blog called Chief Location Officer. Why? Because today, mobile locationbased services are mainstream. Most of your employees, contractors and customers carry a smartphone or GPS-enabled handset. Even your assets are connected to the network, from vending and ATM machines to fleets and pallets to medical equipment to drones. Which means you can locate, track and monitor nearly any device, anywhere. And that poses big issues and opportunities for the enterprise.
How do you keep your in-the-cloud data secure in a bring-your-owndevice (BYOD) world? Who can you track, and why, without violating privacy regulations? How can you turn your customers and workers into information gatherers that you can use to reduce operating costs, slash fraud, improve efficiencies and enhance customer insight? How can you tap into all the treasures of location in a mobile world? Chief Information Officer (CIO), meet the Chief Location Officer (CLO). Last month I attended a conference of information officers, and these four questions kept coming up. Here is what a CIO should ask
| 32| |32 |
CIOReview
|33|
March 2013
View Point
perfect storm is brewing in the enterprise with the current waves of mobile adoption, BYOD and "consumerization of IT", each bringing its unique requirements to be addressed. This has created an opportunity for a range of point solutions such as MDM (Mobile Device Management), MAM (Mobile Application Management), Federated SSO (Single Sign On), Enterprise AppStores, etc. The untapped opportunity is for new software services to focus on knowledge workers with an ease-of-use and mobile-first experience, all with the intent to enable a new wave of mobile productivity. Knowledge (or content) creation, consumption and sharing has been "stuck" in the PC paradigm for over 30 years. It is time to be unshackled and head into an increasingly mobile and social workforce, and not just through cloud-based file storage, but by bringing social context to content creation/consumption and enabling new models for sharing knowledge.
The cost to start a company and roll out a product has significantly been reduced, creating an over-supply of solutions for any given problem
This will fundamentally change how people work and boost productivity in an increasingly borderless enterprise.
Milind Gadekar
CIOReview CIOReview
|| 34| |34
"
"
CIOReview CIOReview
| |35 | 35|
Technology
T
Joel Bomgar
CIOReview CIOReview
oday, no CIO is safe from a data breach. In 2013 alone, we have already seen major data breach reports from big government organizations, hospitals, restaurant chains and some of the most revered technology companies. But even though we cannot completely protect ourselves from hackers, we can reduce our risk by making it a lot harder for them to do their dirty work. In 2008, the Verizon Business RISK team issued the first in what has become an annual report analyzing hundreds of actual data breaches. One of the angles they examine is what attack pathway hackers use to gain access to confidential data. According to that first report, In over 40 percent of the breaches investigated during this study, an attacker gained unauthorized access to the victim via one of the many types of remote access and control software, and In many of these cases, the remote access account is configured with default settings, making the attackers job all too easy. In the five years since that report came out, it would seem obvious to assume that IT organizations have secured their remote access and control software against hackers. But in the most recent Data Breach Investigations Report, the Verizon team discovered, Remote access services (e.g., VNC, RDP) continue their rise in prevalence, accounting for 88 percent of all breaches leveraging hacking techniquesmore than any other vector. How can that be? How could the percentage of attacks via remote access more than double even after loud warnings every single one of the last five years? Service desk reps, IT administrators, and application specialists use remote control and remote access tools every
day to access, control and fix remote systems. In most organizations you can find four or five different remote access products without even digging. (In one large IT outsourcer I know, they found seventeen.) Unfortunately, a lot of these products are legacy, point-to-point remote access tools that provide few security controls and are easily hacked. And in many cases, the CIO and other IT leaders do not even know they are in use. The good news is, it is fairly easy and cost-effective to replace these unsecure remote access tools. But first you must determine if you are at risk. The following questions will help you determine whether you are unknowingly holding a door open to hackers.
data and system access is kept within your own network, behind your own security measures. Ask your team: Are they using more than one remote access tool? Are any of those creating open listing ports that can easily be found by hackers? Are you routing sensitive remote support data and access through a third-party vendor, and if so, do they meet your security criteria?
access to everything on the end system or you do not have access at all. As convenient and as easy as this method may sound, if any default login credentials fall into the wrong hands, this all-or-nothing access model can be ITs worst nightmare. Can remote support permissions be assigned granularly, enabling administrators to give reps only the privileges they need and no more? And when greater permissions are needed for a particular remote support session, can they be given on a one-off basis by higher-tier reps or administrators?
|36|
|37|
March 2013
Technology
elson Mandela once said, If you speak to a man in a language he understands, that goes to his head. If you speak to him in his language, that goes to his heart. In our dynamic world we are more connected than ever by ultrahigh-speed bandwidth, 4G wireless, smartphones, tablets and mobile apps. But one barrier to global transparency remains: language. To thrive in new markets businesses must bring their story, products and promotions to local customers in their native language. Today, brands and businesses seeking to go global are literally tied to the past with legacy translation and localization tools and processes that have not kept up with technology or consumer expectations. Poor technology, tired approaches and high costs have forced many businesses into choosing between bad and worse: delayed releases or compromised quality. In my view this is not acceptable and the wrong question. The right question is: how will translation change to drive competitive advantage for modern businesses? That is right, translation is not about supporting a global business rather it is a fundamental driver of success and it deserves the right enterprise software solution to support it. Enter the age of Agile Translation. In the software realm, agile development is now the status quo
Translation is not about supporting a global business rather it is a fundamental driver of Success
an iterative, incremental method for building software that allows for rapid and flexible response to change. This model can be replicated for translation, which can be simplified into five steps.
tracking. 3. Contextualize your content using modern web-based tools. Translating out of context is the number one reason for poor translation results. Working directly with dynamic content, exactly as the target audience will see it, allows the linguist to better understand the context of individual strings, and to ensure the translated content properly fits within the limited screen of a web or mobile browser. 4. Translate using best practices. While agile translation encourages fast translation turnaround, it still adheres to basic tenets of high quality translation. For example, using a glossary of approved terminology and a proper style guide is essential. Also, leveraging an organizations prior translations, which can provide faster turnarounds with better consistency (and generally even lower costs). 5. Automatically deploy completed translations. Once the translation workflow is complete, automate the deployment process. If your content has already been translated, edited, and reviewed via your translation workflow, then put it to use immediately and automatically. Also, make sure your newly completed translations become a part of your organizations translation memory, so the translated content is available to reuse in the future. The pace of global business continues full steam ahead, and companies must be prepared as they expand into new markets. The future of translation is agile. Those who do not embrace agile methodologies will be left in the dust.
|38|
March 2013
CIOReview
|39|
March 2013
View Point
Guard the
Vijay Basani, Co-Founder, President & CEO, eIQnetworks
One of the challenges entrepreneurs always face is to compete for quality talent with large companies
if they get value.
T
CIOReview CIOReview
oday, increasingly customers are interested in cloud security and IT security in general. More and more customers are paying attention to breaches, and becoming more aware of different types of breaches such as APTs and cyber-attacks, while at the same time trying to meet compliance challenges. In the IT security vertical, increasingly customers are talking about the challenges of meeting new headaches with limited IT budgets and a huge shortage of security
professionals. Now if one talks about the segment EIQ addresses SIEM and log managementthe trends seen are: demands for visibility into security and compliance, automation of security analysis and correlation tasks, meeting security threat detection challenges in a cost effective fashion and deriving value from their investments quickly. Unfortunately, SIEM and log management solutions to-date have failed to address these challenges as every vendors solution has proven cumbersome to deploy, expensive to procure, and requires constant tuning over long periods of time that too only
log management vendors to address in the near future. In our perspective the recently issued executive orders from President Obama with regard to cyber security as the first step towards a comprehensive cyber security law. I am of the opinion that this law would incorporate and address private sector concerns while at the same time providing information sharing and collaboration between government and private sector which will provide additional security to critical infrastructure such as banking, industry, telecom and utilities sectors. I predict that cyber-attacks will continue to increase in sophistication and intensity, which would finally force companies of all sizes to begin focusing more on security versus traditional approaches taken of checkbox compliance. In order to address these challenges, customers must implement next-generation security analysis solutions that provide proactive answers to potential problems.
talent with large companies. Second, entrepreneurs that have ideas that can radically change the industry must overcome big companies with brand name recognition as well as these companies ability to slow innovations through confusing marketing messages. But as an entrepreneur, it is also very gratifying when we are not only able to win against goliaths with brand names, but also able to deliver the best possible security protection for customers.
The number of users of mobile video calling services will increase four-fold to almost 160 million by 2017. The reasons for the increase would be the improvements in both the user-interface and the underlying technology. Courtesy: Juniper Research
| |40 | 40|
Vijay Basani
March 2013 March 2013
CIOReview
|41|
March 2013
Technology
initiatives is also the fact that every enterprise IT database admin person has been using SQL for years and it makes no sense to re-invent what has been working well for decades let alone the reality of existing skilled resources. So with the next generation of Big Data solutions, users will be able to move fluidly between MapReduce jobs where there are faced with a very large data set that needs to be sifted and transformed, through to full SQL based BI tools to access the same data. This essentially removes the need to migrate or move the data to a completely different environment to conduct business analytics. With this come key advantages and a number of benefits; firstly it leverages the low cost scalability of Hadoop, which costs a fraction of proprietary analytical appliances, and more importantly it removes the need to have disparate data environments or silos. Many of the initial use cases where Hadoop has been adopted is the pre-processing engine that then feeds aggregated data into the analytical warehouse which has created a separation from the analytical application and the detailed big data. By mashing up analytics on the same platform there is always the ability to access the detail and perform analytics outside the limits of the summary data that often feeds dashboards and other visualization or dashboard tools. From a technical perspective what we are talking about is essentially two access paths to the same data MapReduce using the more conventional SQL access. Depending upon the question being asked these offer different capabilities and benefits so bringing them together increases the power and capabilities of the Hadoop platform. The next phase will be for these different access paths to converge, the ability to embed SQL within a MapReduce job or for example have a MapReduce user defined function called within a SQL statement. A specific example might include a large Telco operator conducting web click stream analytics where MapReduce would be the ideal tool to perform such a long-running task or jobs putting sessions together based on customer profiles in order to determine which pages were viewed and for how long and then run a SQL query or use a BI tool query where you may ask which customer demographic stayed on a specific web-page for the longest duration. We also believe that this will be extended even further, and an area we are particularly interested in is the ability to interoperate on the same data with MapReduce, SQL and even free text search. We believe that having the most flexible access methods is critical and depending on the query and the user skill set, they can determine the best path and most efficient mechanism to glean the answers they are looking for. Hadoop MapReduce and SQL mashed-up make the perfect enterprise match and if used correctly might just be a heavenly thing.
John Bantleman
Moving From MapReduce jobs through to full SQL based BI tools removes the need to move the data to a different environment to conduct business analytics
distribution leader Cloudera, with its recent Impala announcement. These innovations are also met by more established vendors including Microsoft who recently announced Polybase. Essentially what these products deliver (or promise to) is high performance analytics directly against data running on the Hadoop platform, with varying approaches, and the common denominator of speed as the driver across all these solutions. The undercurrent across all these
A
CIOReview
s Big Data moves to the mainstream enterprise, one major theme has emerged and is driving the next generation of Big Data solutions - the need to extend beyond the batch limitations of MapReduce and deliver high performance (real-time) analytics. Hadoop is in effect moving from being a file-based system to manage unstructured data to a data operating platform that addresses the broader needs to manage Big Data within
the enterprise. A major limitation to growing adoption has been that the core data processing environment, which is massively scalable, but arguably a slow batch system, requiring organizations to essentially move (what could be 100s of Terabytes) to a secondary data warehouse to deliver fast analytics for the business. RainStor has been leading this charge for quite some time now and over the last year we have seen a number of announcements that make the shift a very clear trend. Announcements from others in the market include newer vendors such as Hadapt and more recently the Hadoop
Worldwide mobile phone sales to end users totaled 1.75 billion units in 2012, a 1.7 percent decline from 2011 sales. Smartphones continued to drive overall mobile phone sales, and the fourth quarter of 2012 saw record smartphone sales of 207.7 million units, up 38.3 percent from the same period last year. Courtesy: Gartner
|42|
March 2013
CIOReview
|43|
March 2013
View Point
like Imprivatas Chief Medical Officer, Sean Kelly, the ability to instantly text message the on-call cardiologist a picture of a patients EKG, and quickly mobilize the catheterization lab can literally save a life. The ability to send secure, HIPAA compliant text messages is a perfect example of how technology can help to solve the healthcare crisis and Imprivata is helping. When we started talking to many of our customers about texting, we often heard two different stories: the CMIO would say that texting was not happening and was not allowed. Then the CIO would tell me that it was happening all over the place, and he was panicked about the security risk, potential law suits, and the damage to the hospitals reputation. We shipped Imprivata Cortext, our HIPAA compliant texting solution only five months ago, and already more than 500 hospitals are enrolled. That tells you something. I have been in the enterprise technology space for a long time, and I have never seen adoption like this.
Omar Hussain
accustomed to in all other aspects of their lives. They also want to do the right thing when it comes to their patients security and privacy, but efficient, high quality care trumps everything for doctors. For an ER doctor
CIOReview
It is easy to think youve made it when you have experienced significant growth in a short period of time and there is still plenty of upside in the market
substantially and vendors have to stay ahead of the curve. The proliferation of smartphones and other mobile devices is having
"
a huge impact on healthcare. There are 2.4 billion global internet users and 1.2 billion global smartphone subscriptions today. Patients have the tools to take a more active role in their own care. The difference is drastic compared to even 10 years ago. Today patients compare doctors and treatments on-line through services like Healthgrades. They consult with other patients with the help of tools like PatientsLikeMe. They can monitor their own vital signs using their smartphones. This patient involvement is all good and necessary in order for us to improve outcomes, increase efficiency and lower costs. Meaningful Use is driving the change here in the U.S., but other countries are on the same track as well. All industrialized countries are facing the same issues, and looking for dramatic and much needed efficiencies in the care delivery process. Technology is the only option we have. With an aging population on a global scale, the skyrocketing cost of care, and healthcare accounting for 18 percent GDP - and growing fast our current model is unsustainable. Every other major industry has applied technology to increase efficiency and improve quality. Look at finance, manufacturing or retail. They have all been way ahead of healthcare in terms of automation. Yet, in the past few years, we are seeing healthcare actually beginning to leap frog the others and thats largely due to meaningful use which in my opinion, has been great for the industry. We have customers all over the world, and I find it interesting that when I speak with CIOs in the U.K., France or Germany for example, they tell me that they would welcome similar legislation to help drive the adoption of electronic health records in their countries. The sweeping benefits will come down the road, but we are making
substantial progress already. We have some very forward thinking customers who are seeing terrific results. Augusta Medical Center has been able to tie shorter hospital stays to faster medication adjustments for patients as a result of higher adoption of CPOE. Intermountain healthcare, a pioneer in evidenced-based medicine, has greatly improved the quality of care by analyzing the vast data they have collected over the years. One example is that they were able to determine that 39 weeks is the optimal gestation age for babies delivered in their hospitals. So by adhering to that 39 -week standard, whenever possible, patients have less complications and better outcomes, and as a result, Intermountain has lower costs.
|44|
March 2013
"
CIOReview
|45|
March 2013
VC Talk
S
CIOReview
pending a lot of time looking at healthcare and medical related technologies made investment in products and services that can lower the cost of healthcare a top priority. This has to be a fundamental thesis for anyone in this space. To that extent, having invested in everything from biotechnology to medical clinics, there is a particular excitement about the opportunities that exist in digital health and IT. Fundamentally the incremental cost savings to society from a new promising drug or device does not compare to the savings that can be achieved from streamlined processes enabled by IT across the continuum of healthcare. So there is a liking for enterprise focused healthcare technologies that improve efficiencies for all constituents in the process.
More technology needs to be developed to better monitor patients without them even knowing they are being monitored
CIOReview
|46|
March 2013
|47|
March 2013
The biggest challenge entrepreneurs face is developing a new service or product that an enterprise customer will actually pay for
Technologies for the Future
The interest lies in developments occurring in everything from telemedicine, kiosk-based healthcare used for tasks such as health screenings or pharmacy dispensing to software designed to allow insurance companies and providers to communicate, authenticate and transact more swiftly. It is intriguing about the working of technologies that truly help with connectivity and the sharing of
"
Sachin Gupta
that may be better than incumbent solutions but do not warrant a customer to want to actually pay for it, especially if what they have is good enough. Technologies need to have a compelling value proposition and today in healthcare; cost savings coupled with better and faster is a becoming mandatory requirement.
information. For example, a new legislation in the U.S. will now make it mandatory for lab companies to give patients access to their own lab results (vs. just sending it to the doctor). This should give the patient an ability to push his/her information to whomever they want, including second opinions, alternative medicine doctors and even websites such as disease specific
An Entrepreneurs Challenge
The biggest challenge entrepreneurs face is developing a new service or product that an enterprise customer will actually pay for. Too many companies are developing neat ideas
The emerging data-asa-service trend could significantly grow the market for business intelligence (BI) and analytics platforms. Worldwide BI software revenue will reach $13.8 billion in 2013, a seven percent increase from 2012. The market is forecasted to reach $17.1 billion by 2016. Courtesy: Gartner
CIOReview
|48|
March 2013
CIOReview
|49|
March 2013
CIOReview
|50|
March 2013
CIOReview
|51|
March 2013