Sunteți pe pagina 1din 26

In My Opinion:

Pat Goepel, Asure Software

CIOReview
The Navigator for Enterprise Solutions
MARCH - 2013 CIOREVIEW.COM Company of the Month
Barmak Meftah, CEO, AlienVault

Skyline Global Partners

VC Talk: Sachin Gupta,

Meet the CIO:

Kevin Vasconi, Domino's Pizza

$10

Pradeep Rathinam, CEO, Aditi Technologies

CIOReview

|1|

March 2013

Contents
Cover Story
Page

March 2013

12

Disrupting Technology
Services in the Cloud and Winning
By Rachita Sharma

Pradeep Rathinam, CEO, Aditi Technologies

06 [In My Opinion]

22 Trends driving Radical

Change in Consumer Behaviordrive the Industry Kevin Vasconi, Dominos Pizza the CIOs Equation Rama Prasad, Gogo Inc. 2013 Cloud Predictions: We will Finally Get Real About Cloud James Staten, Forrester Research for Enterprise Customers is a $60 Billion Opportunity Art King, SpiderCloud Wireless

36 [Technology]
Are You Opening a Door for Hackers? Joel Bomgar, Bomgar

24 Changing Variables in

38 Ushering in a New Age of Translation


By Jack Welde, Smartling,Inc.

40 [View Point]
Guard the Perimeter of Cloud and Address Cyber Crimes JVijay Basani, eIQnetworks

Technology Strategies Designed to Support the Workplace of the Future Pat Goepel, CEO, Asure Software

26 [View Point]

42 [Technology]

08 [CEO Spotlight]

Jeff Hudson, Venafi Dave Scholtz, Damballa Rajeev Chawla, CloudVelocity Mike Burkland, Five9 Arvind Narain, MobileASaP

28 Managed Mobility Services

Hadoop MapReduce & SQL Mash Up: A Match-Made in Enterprise Heaven? John Bantleman, RainStor

44 [View Point]
Time to Deliver Efficiencies in Care Delivery Process Omar Hussain, Imprivata Inc.

30 Big Data: Fueling the Rise of NoSQL


Bob Wiederhold, Couchbase

32 BYOD and the CIO:

46 [VC Talk]
Digital Health and IT are Exciting Opportunities Sachin Gupta, Skyline Global Partners

20 [Meet the CIO]

Think Differently to Support new Capabilities in Business Environment Stuart Kippelman, Covanta Energy Corporation

A Location Impact Assessment for Enterprise Mobility Rip Gerber, Locaid "Mobile Consumer Enterprise" Milind Gadekar, CloudOn

34 The Emergence of the

18 [Company of the Month]

Richard Kirk, Senior Vice President, AlienVault

CIOReview

|2 |

March 2013

CIOReview

|3 |

March 2013

CIOReview
MARCH - 2013

Editorial Secure your Cloud

Publisher & Editor-in-Chief

Harvi Sachar
Managing Editor

Christo Jacob
Editorial Staff

Benita M Rachita Sharma Sagaya Christuraj Thomson Antony Joe Philip

Visualiser

Ashok kumar


Mailing Address

CIOReview 44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538 T:510.440.8249, F:510.440.8276 CIOReview
March 2013 volume 2-2 Published monthy by CIOReview subscription rate: $60 for 12 issues

To subscribe to CIOReview

Visit www.cioreciew.com
Copyright 2009 CIOReview, Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.

ast month, we witnessed Obama signing an executive order on cyber security, vowing to strengthen the nation's critical infrastructure through cross-sector information-sharing and framework. While increasing the amount of IT infrastructure moves to the cloud, it is the right time to reflect on addressing security concerns in the cloud. Though security is one of the top concerns in the punch bag list in most of the enterprises, majority of the companies are not safe using the cloud services. A GAO report based on the views of CIOs at 22 major U.S. agencies, listed several security concerns: vendors using ineffective security practices, agencies not able to examine the security controls of vendors, cyber criminals targeting data-rich clouds, and agencies losing access to their data if the relationship with a vendor ends. Moreover, highly regulated industries such as banking, insurance, and healthcare face potential security threats owing to breaches and compliance. Studies indicate that some merchants and businesses that manage or store credit card numbers and other sensitive information do not use data encryption software. But awareness towards security breaches and compliance issues is on a rise and more and more companies are now looking towards cloud information protection. So as cloud technologies mature, cloud providers will need to address this concern so that customers who utilize cloud infrastructure can gain visibility into their security postures within the cloud. So going forward, Obamas new law would incorporate and address private sector concerns while at the same time providing information sharing and collaboration between government and private sector which will provide additional security to critical infrastructure such as banking, industry, telecom and utilities sectors. What enterprises need to focus on is, while making the switch to cloud computing, organizations should search for cloud providers that use high-end firewalls and intrusion detection systems and which undertake regular independent security tests of their environments. This would help us in maximizing the cloud computing market, which is expected to grow to $206.6 billion by 2016. However neither the CIOs nor the enterprise IT entrepreneurs have taken these issues relatively seriously and need to be more serious about it. It is sad that, The most important things that one's working on are not necessarily the most important things that one thinks one's working on. And Obamas new law calls for it to reflect. Please do let us know what you think. Christo Jacob Managing Editor christo@cioreview.com

CIOReview CIOReview

4| | 4| |

March 2013 March 2013

CIOReview

|5 |

March 2013

tools to their fullest capabilities and reap the productivity gains.

the proven social tools that make sense for your business.

that can be reserved in advance online. Additionally, ad-hoc access to space and collaboration areas should be easy to find and access for employees that are dropping into the office. Lobby dashboards, interactive floorplan displays for space availability, and even low cost solutions like actionable QR Codes can be leveraged to facilitate the experience. Giving employees access to a physical workspace when they need it allows them to stay connected to the organization and to their coworkers.

Use Technology to do things in more Innovative ways


The information technology curve for a productive and efficient business can be summed up in four words: Cloud, applications, mobility and social. If you are not thinking about how to develop and deploy these four business-critical technologies, its time to rethink your IT strategy. Leveraging cloud-based services for software and data storage enables employees work virtually anytime, anywhere. Cumbersome VPN connectivity and arcane file server network searches will sink employee morale when their social technology experiences have clearly shown them there is a better way. The traditional employee backpack approach of supplying traditional desktop PCs, designated workspaces, and land lines are giving way to newer, productivityenhancing applications designed for tablet and smart phone devices. And with access to data via the Cloud and the rise of sophisticated analytics via Big Data employees can manage every aspect of their jobs from making strategic decisions to recording time and managing expense reports from their mobile device. Speaking of mobility organizations that place high emphasis on workplace mobility solutions will generate as much as 30 percent bottom line occupancy savings per year with a bit of real estate management diligence. Just like the technology that serves us, corporate workplaces are becoming smaller with less traditional work cubes and more gathering spaces for collaboration and social conversations. Lastly, organizations that use the social networks your employees are most familiar with enhanced overall productivity. Do not deploy proprietary social network tools built only for business. Adapt and adopt to

Cater to Employees needs as they work Remotely more Frequently


As technology drives change in how companies and employees do business, the physical office or workplace loses its importance in many ways. Progressive organizations

in my opinion

Workplace of the Future


By Pat Goepel, CEO, Asure Software

Designed to Support the

Technology Strategies

Maintain a Thriving Corporate Culture


A recent study called the Kelly Global Workforce Index showed that 37 percent of workers feel pressured to stay connected with work outside of normal working hours. Mobile technologies may improve work efficiency and productivity, but it also contributes to employee fatigue and burnout. As our global workforce continues to conduct business virtually, its vital that the organization helps employees maintain their work-life balance. Companies must revisit and revise work-life policies with frequency. Create clear work-life balance policies that employees will embrace and adhere to. To ensure success, practice these policies from the top down, i.e., weekend emails from senior leaders should be a rarity, not the norm for the workplace to take these guidelines seriously. In short, the technological revolution will continue to evolve the workplace and its up to you to carefully determine which solutions will positively impact workplace cost savings and improve employee productivity. As you examine opportunities and solutions, continue to monitor and measure the impact technology is having on the organization and its people.

Asure Software (Nasdaq: ASUR) provides cloud-based workplace management solutions to clients in North America and Europe. Headquartered in Austin, the company has a market cap of $35.96 million.

Pat Goepel
implementation, a Fortune 500 client reported drop-in sites with WiFi access were utilized 3 to 1 over fixed seating options with wired network drops. As college graduates enter the workforce, they are accustomed to working in small groups while simultaneously communicating with their social networks. Employers can leverage these skilled multi-taskers by ensuring they have access to the technologies they need namely the Internet and the latest mobile devices such as tablet computers and smart phones. Employers should not place narrow parameters on how these former luxury devices get used to complete projects. Cumbersome Bring Your Own Device Policies and strict rules around technology usage frustrate an increasingly technology -savvy workforce and create a culture of distrust. Instead, leadership teams should enable employees to use the

I
CIOReview

t happens almost daily: New technological advances change how employees around the world get work done. A great example of the impact technology on business is making work (and employees) more portable. Thanks to tablet computing, wi-fi, easy access to limitless data storage, and smart phone technology, people can work from almost anywhere at anytime. And organizations leading the charge in mobilized workforce strategies are realizing the benefits of collaboration with better work products and increased productivity. When it comes to technology designed to support this evolving workplace of the future, whats next? Will anyone have a dedicated office or space? Will a physical office presence become a thing of the past? How can leaders create a workplace that

fosters productivity, efficiency and collaboration and creates a company culture current and future workforces will embrace? Here are four considerations your leadership team must consider as they prepare, deploy and support technology strategies for a truly portable workplace that is right around the corner.

Continue to provide Employees with Technology that helps them


Laptops and mobile devices, coupled with Internet access, are commonplace office tools that we all expect in the workplace. Employees must feel empowered to take their computers and smart phones with them wherever they go. And when workers need to collaborate on projects, provide them with an atmosphere where they can meet and have access to the information they need. One recent example: as part of a recent product

encourage employees to telecommute from their location of choice. But frequently, remote office workers and telecommuters find themselves isolated from the organization. The isolation can deteriorate employee/ workplace relationships unless your organization connects people more thoughtfully. One technology trend organizations can use to ensure employees stay connected to the workplace is access to the same tools available at the physical office location. For example, remote workers should be able to schedule meetings in the office when they need to with all the confidence that the meeting room they schedule will be available to them. In addition, organizations can maximize their available real estate by providing remote workers with hotel office space

|6 |

March 2013

CIOReview

|7 |

March 2013

CEO Spotlight

CEO Spotlight

Changing Technology Demands Complete Data Encryption


Jeff Hudson, CEO, Venafi Founded in 2000, Venafi delivers enterprise encryption management solutions providing organizations significant improvements in critical system uptime, operational efficiency, and compliance management. Headquartered in Salt Lake City, the company has raised a total of $16 million to date from Foundation Capital, Origin Partners and UV Partners.

Embrace Technology Trends to take Advantage of Market Opportunities


Dave Scholtz, CEO, Damballa Atlanta headquartered Damballa protects businesses from bot-driven targeted attacks used for organized, online crime. Founded in 2006, the company has raised a total amount of $44.5 million from Paladin Capital Group, Sigma Partners, Palomar Ventures, InterWest Partners, Imlay Investments, Blumberg Capital, GRA Venture Fund, Adams Street Partners and Noro-Moseley Partners.

he technology industry has been in a state of constant flux, and there have been several prominent advancements which have changed the face of business operations. The contraption of data based inventions such as cloud computing and big data have made it all the more convenient to supervise and store data.

By enabling organizations understand where their security certificates lie and who has access to it, we give them control over the data. We also enable them to change security around the certificates and revoke access as and when required. Our role in the industry is to give the companies control over data even if they do not own it.

Dave Scholtz

Cyber Security Trends


The hot trend is cyber security and the related adoption of next generation security solutions required to address the sophistication behind today's cyber-attacks, commonly referred to as 'advanced malware. The enemy is well-funded, patient and is leveraging an ecosystem and infrastructure that they have developed specifically for the purposes of evading traditional layers of defense. The stakes are ever increasing as cyber criminals are targeting intellectual property, sensitive personal information, critical infrastructure systems and more. Companies are now realizing that prevention - centric approach (think anti-virus solutions and firewalls) to protecting their network and users is not enough. The information security community at large is shifting to a detect-andrespond mentality, recognizing that they may not be able to prevent a breach. But it is imperative that they detect infected assets within their networks, particularly those under criminal control.

Things. With this impending reality, the industry is heading into a new frontier of combatting cyber crime. Of course, not every IP -addressable object will be a target or fall victim to

An Entrepreneurs Mandate
Keeping up with industry trends and innovation more specifically, the challenge to entrepreneurs is to be aware of and take advantage of the trends and innovation going on around them, while remaining maniacally focused on the specifics of their own unique offering as they work to develop product, take it to market and build a viable business. Whether it is cloud computing, Big Data, mobility, or any of the -as-aservicesolutions to name a few, there is continuous innovation taking place at a rapid rate around the entrepreneur that may impact the entrepreneurs business. By being aware of these, entrepreneurs can put them to work in making their businesses more productive and efficient, and they can apply them to their business strategies to take advantage of market opportunities or to avoid pitfalls. All of this being said - this is a good problem to have. There has never been a better time to embark on an entrepreneurial venture given the low cost and ease-of-access of computing power and other solutions that are now available to provide the infrastructure, software, applications and best practices necessary to develop product and support a company and its operations.
CIOReview

Shift in Technology in Recent Years


The major shift in technology in the recent years is the maturation of internet and its integration into our daily lives. Another big change witnessed is the recognition of mobile computing and advent of services like drop box, cloud and other such services. The advent of Big Data has also raised ramifications regarding data security. Proper encryption of data is required to make sure that private information is not misused by profit making organizations. The key challenge before entrepreneurs is to get large organizations adapt their technology. The process of getting an organization of fortune 500 stature, listen to your idea and sell it to them is tedious and cumbersome and requires skill and expertise. It is a relatively uphill task as these brands are unknown and organizations are skeptical about their ability to service them. Thus, the most important requisite for entrepreneurs is to get the big brands understand their technology and their ability to service them.

Organizations Vulnerable to Internal Threats


Even though organizations are conscientious while handling critical data and undertake to protect themselves from cyber assaults through several security measures, they are still vulnerable to attacks, both external and internal. A recent trend which is shaping up in todays industrial scenario is the absence of laws and precincts required to monitor and control confidential data from being accessed by threats present inside the organization, in the form of human resources like software agents, spy agents and so forth. This leaves organizations in a dilemma of where and how to place their trust regarding data security. Recent incidents have proven time and again the importance of optimal and viable security to protect an organization from outsider as well as insider threats. A study has shown that almost 50 percent of the fortune
CIOReview

Jeff Hudson 500 companies have been attacked and infected and data has been compromised. Preeminent techniques to contradict security threats such as consolidation are slow and cumbersome ineffectual on modern day threats. Even installing firewalls and barriers prove futile against inside threats. Encryption answers all the security related problems of modern day business and is highly effective against attacks from inside the organization. Encryption ensures that data in any form is protected as it is meaningless in possession of individuals who do not have the key to decrypt it. The amount of data produced in the world today is enormous and managing the encryption keys generated is a herculean task. Venafi was established to address this issue.

The Future
The Internet of Things. While it has not fully arrived yet, it is apparent that it is not a question of will? but when? we will be living amidst the Internet of

cyber criminals, though we can expect to be challenged by a new wave of threats and threat vectors as these criminals seek new and innovative ways to exploit the pervasiveness of an IP - connected world. Already today, enterprises must react to the erosion of the network perimeter and the proliferation of devices, operating systems and mobile users that are connecting to their networks. This is why Damballa and others are delivering next-generation security solutions that detect and terminate criminal activity by monitoring network behavior.

|8 |

March 2013

|9 |

March 2013

CEO Spotlight

CEO Spotlight

Rajeev Chawla, CEO, CloudVelocity

Adoption of Public Cloud is Tepid

BYOD: Empowered by the Cloud


Mike Burkland, CEO, Five9 Founded in 2001, Five9 is a pure cloud-based contact center software provider. The California headquartered company has received a total funding of $49.6 million from Mosaic Venture Partners, Hummer Winblad Venture Partners, Partech International and Adams Street Partners. and innovative as traditional software, but at a cost of ownership that is far lower than premise-based solutions. Cloud software providers can deliver robust, enterprise applications as a service that is affordable, scalable and reliable. In the near future mobile devices will outnumber PCs; this is a radical change in the market, which cloud enables. This consumer trend and proliferation of mobile devices is rapidly moving into the enterprise. Many organizations today have or are considering Bring Your Own Device strategies for the workforce. This is forcing IT organizations to rethink infrastructure management, data storage and security. In the future, the old model of knowledge workers using laptops and PCs in a corporate office park will change to tablets being used from coffee shops and home offices. This move toward mobility, enabled by the cloud, will lead to a far more distributed workforce than ever before.

CloudVelocity is a provider of software that enables new and existing Linux and Windows multi-tier applications to run in the cloud without modification. Headquartered in Santa Clara, CA, the company recently raised $5 Million in series-A funding from Mayfield Fund. enterprise. Today it requires extensive manual configuration, provisioning, and a series of complicated and time consuming processes. The result is a costly, risky and slow approach to orchestrating workloads and services between data centers and clouds, impeding the business case for public clouds for most enterprises. So adoption of public cloud by enterprises has been tepid at best. We decided to tackle this problem at CloudVelocity. The CloudVelocity platform decouples enterprises from todays public and private cloud restrictions and enables the ability to treat multiple clouds and data centers as a single, dynamic pool of resources. and premise-bound predecessors, including cloud migration and integration, cloud cloning, cloud failover and cloud bursting. All of these solutions will be a leap ahead of the solutions in use today. They offer more agility and economy with higher potentials for availability, and with fewer trade-offs and compromises now commonplace. There will be increasing agility pressures on enterprise IT and the need for hybrid cloud operating models will become table stakes for all enterprise IT departments. Service providers will be required to cater to this requirement in order to win significant portions of the enterprise cloud business.

leadership team capable of executing on the vision. Five9 has been fortunate in the ability to meet these challenges head on to become the breakaway market leader in cloud contact center software.

Rajeev Chawla

Mike Burkland

T
CIOReview

he business case for enterprises to develop their own data centers is rapidly eroding. Many are opting for third party facilities and cloud operating models, yet there are serious shortcomings which prevent enterprises from taking full advantage of the transformative power of public clouds. Running existing applications in a public cloud is hard: today's multi-tier applications span multiple hosts and are comprised of not only application binaries and data, but also libraries, operating system services, data servers and other network services residing in the

Advantages of a Hybrid Cloud


The hybrid cloud is a hot trend, because it establishes a credible and powerful operating model for the enterprise adoption of public clouds. It combines the agility payoff of public cloud and combines it with the control that enterprise IT expects to have in its own data center. It is the future of enterprise cloud computing because it enables IT to operate at an even higher level of productivity and economy. Hybrid cloud will also enable a new generation of solutions that will be far superior to their hardware

Lines between SME and Enterprise Markets are Blurred


This is a great time to be an entrepreneur as these hybrid cloud platforms will fuel entirely new opportunities for growth. This coming era won't be easy, but it will be easier to start a tech venture and obtain growth on a more level playing field. Service will be a key requirement, and both marketing and operations will play a more strategic role in success as the lines between SME and enterprise markets are blurred by the rise of hybrid clouds.

he software industry is at an inflection point; aging, premisedbased solutions are being replaced with cloud solutions. This shift to the cloud is allowing businesses to move beyond outdated technology paradigms to new, more flexible and cost effective models. Cloud based solutions are helping businesses achieve tangible results while also controlling costs with a Pay As You Go model. Today, many cloud solutions are as sophisticated

Dodging the Darts


Entrepreneurs rarely have a shortage of product and business ideas, however critical challenges do exist. Entrepreneurs must first find a large market opportunity, and then create a product that addresses the market need and has strong competitive differentiators and barriers to entry. The next step in value creation is building a repeatable and scalable business model with a strong

By 2017, 25 percent of enterprises will have an enterprise app store for managing corporatesanctioned apps on PCs and mobile devices. Enterprise app stores promise greater control over the apps used by employees, greater control over software expenditures and greater negotiating leverage with app vendors, but this greater control is only possible if the enterprise app store would be widely adopted. Courtesy: Gartner

|10|

March 2013

CIOReview

|11 |

March 2013

Cover Story

using its Cloud First Policy


By Rachita Sharma
CIOReview

How an innovator is

Cloud, a Common Denominator for Innovation


It has always been the large organizations which had access to people, process and technology; in order to come up with innovations. But cloud has changed all

In 18 months, either your business will be on the cloud or you will be in a different business

to Disrupt Technology
March 2013

Services
CIOReview

|12|

"

f we have to pick one technology that would define this decade, it would be Cloud Computing. With the proliferation of better internet bandwidth and improvements in web technology, cloud computing technologies are disrupting the way companies look at IT. As with any emerging technology, there are misconceptions and fears associated with Cloud computing too. Slowly yet steadily these misconceptions are dissolving as enterprises realize the hidden potential of the technology and the long list of advantages such as cost efficiency, energy efficiency, disaster recovery, flexibility etc that it ensues with itself. Enterprises in several verticals are embracing cloud open heartedly and experts believe that the cloud computing market will reach a whopping $14 billion by 2014. As the technology comes of age, innovations are the key way forward. One such disruptor is Aditi Technologies, an award winning Microsoft Cloud Partner which has pledged to help customers leverage emerging technologies and guide clients to gain competitive advantage through transforming their business to the cloud. Through their deep partnership with Microsoft, Aditi is at the forefront of Platform as a Service innovations. Founded in 1994 as a technology services company, Aditi Technologies has always been a contrarian in a fairly homogenous Indian IT services sector. As a result, clients regularly turn to them when a new paradigm emerge which requires serious technology depth. Today, the worlds largest ISV, largest insurance company, largest gaming company, largest information services provider, largest mobile carrier and second largest social network count them as their R&D innovation partner.

that. With the widespread adoption of Cloud based applications 1. Companies big or small have the same access to resources, technology 2. Users get a friendly user interface similar to that of consumer technology and reduce learning curve greatly 3. They are without the usual complex installations and integrations, ensuring that the applications could be running in hours 4. No upfront cost with operational costs based on usage make them easy to try and then buy As a trendsetter in emerging technologies, Aditi foresaw this shift and positioned themselves as the vehicle of choice for organizations, irrespective of

"

|13|

March 2013

their size and might to help them migrate their functions to the cloud. This transition has opened new vistas and Aditi Technologies is steadily working to leverage this revolution. We believe that cloud can aid any organization innovate and accelerate their strategy to market domination, explains Pradeep Rathinam, CEO, Aditi Technologies. The largest part of their business comes from product companies, startups and ISVs. Product companies building social, media or data driven products are the biggest consumer of their services. The company is also seeing rapid enterprise adoption in the past quarter specifically in the online commerce, healthcare, travel and financial services verticals.

Cloud First in PracticeRestaurant.com


Challenge Restaurant.com (RDC) is the trusted and valued source connecting restaurants and diners in the US. The company offers the best deal on every meal at more than 18,000 restaurants in US with nearly 50,000 daily gift certificate options. During their popular promotion days, their web site is crushed with sometimes a 10x spike in traffic. Solution Aditi conducted a detailed design analysis over a three week period, and as a Cloud First approach, recommended a cloud based architecture based on Windows Azure. As a follow up to the design, Aditi completed six proof-of-concepts (POC) over a 6 week period that proved the technical viability of key aspects of the architecture to RDC. On the strength of the success of the POC, a Hybrid Cloud solution with sensitive data kept on-premises while application and data processing was built and deployed on the cloud. Benefits Automatic 10x Scalability in Minutes Consume server capacity on-demand during surge and contract during other normal periods Gain advantages of proximity, Azure availability and Disaster recovery through data center mirroring

Quick Facts about Aditi Technologies

Cloud First Policy


While cloud had a great level playing effect for startups and ISV, enterprises too cannot afford to ignore the inherent advantages of it. Customers always want to gain first mover advantage to beat competition and reduced time to market and executing projects on cloud enables them with faster time to market & reduced cost, explains Rathinam. Contemplating the criticality of cloud in the future, Aditi has devised an ingenious Cloud First Policy where they encourage all their customers to consider the move to the cloud for every technology project. While the approach may sound radical, but the company

Cloud provides us an opportunity to play as Service as a software player by leveraging reusable cloud based software to deliver services faster, cheaper and smarter
CIOReview

|14|

March 2013

"

is convinced that by investing in the cloud, ahead of the curve, customers stand to gain significant competitive advantage in the long term. Enterprises also stand to gain velocity, agility and focus on enabling their own business objectives rather than IT. This strategy also guaranteed their customers to leverage cloud aggressively and learn more. At first they are skeptical about such a radical recommendation, but once they realize the actual potential, things become easy, adds a proud Rathinam. The company has delivered over 100 engagements on cloud, that by itself is often 5X or 3X the number of engagements most of their competitors have delivered. One of these engagements was when Aditi helped Restaurant.com, a web company for restaurant booking & gifting; gain auto-scalability of data centers during promotion days via cloud. Due to spike in the web traffic which went almost up to 10 times during the season days, RDC was not able to handle it efficiently which resulted in losses. Aditi deployed its cloud solution and mirrored them at different data centers for advantages in proximity, availability & Disaster recovery. Says Adnan Adamji, CIO of Restaurant.com, Aditi has been invaluable in helping Restaurant.com implement our cloudbased solution. Their extensive technical depth on Microsoft Azure has been extremely crucial to our success. But any move

to the Cloud must be meticulously planned. Aditi sounds a word of caution to organizations planning to make the move to the cloud as doing so without thoughtful planning can create problems down the road. In a bid to increase credibility of its radical Cloud First Approach Aditi moved all of their functioning to the cloud as well. With a vision to be a zero server company they have successfully moved their mailboxes, communication infrastructure, development platforms, intranet, corporate sites and analytics to the cloud. The company's strategic planning and reviews are conducted on Google+ hangouts and they also made a unique step of recruiting via Facebook and Twitter. Aditi chose to build its solution using Microsoft virtualization and cloud technologies on a Hyper-V platform. This move ensured a 40 percent reduction in costs while consolidating physical servers by 60 percent. The transition was so successful that Microsoft published a case study on it as a reference for future customers.

consulting companies on Microsoft platform 3 years in a row, across 6000 global services companies proving their ability to lead this space and sustain leadership. One might wonder how one could manage to beat the stiff competition and emerge victorious time and again. The answer lies in the approach adopted by the company to create a differentiated identity and services portfolio. Aditi has mastered the technique of working in the emerging technologies sector and always stay

"

Disrupting Competition
With an innovative yet effective Cloud First Policy in place coupled with the deep talent pool in the organization, winning accolades for its dedicated work in the field of cloud computing has become a routine for Aditi Technologies. The company has been graced as one of top 3 cloud

The biggest challenge our customers face today is the unknown risks with cloud integration. Navigating the journey and managing the risk is core to our offering
CIOReview

|15|

March 2013

CEO Spotlight
a step ahead of the technology curve, when most services companies find it difficult to understand and deliver an end to end solution in a disruptive technology space. We execute at a global scale, leveraging pre-built frameworks and Intellectual Properties (IP) to accelerate time-to-market for our clients, adds Rathinam. Another point of differentiation is their capability to solve complex problems. It is relatively easy to try a new cloud platform but on the contrary building, releasing and managing a cloud based solution does not come so easily to all. While many services providers are finding a lot of envisioning and PoC business, few of them have the capability to solve the cloud problem with a clear sense of challenges across SDLC and across markets. Owing to the early starter advantage and over 100 cloud engagements, Aditi is capable of solving this problem well giving them a clear lead in the race. Customers leverage these frameworks and codebases to accelerate time to market and reduce cost of cloud development, says Rathinam. And crucially, the company makes it a point to involve their customers with them on this journey. Today, we have over 20 cloud customers who would refer us and are strong advocates of our cloud services. Most of our growth in recent times has come from customers and the ecosystem referring us to other customers. As long as we deliver customer delight, we will be in a strong position, explain a proud Rathinam. the top cloud consulting company across all major cloud platforms in the next 2 years apart from seeking faster profit growth. Investing heavily in AWS, SFDC, TIBCO and having built up technology partnerships with more than 20 cloud platform vendors globally they are surely making their way to the top of this new peak. We want to become a complete cloud solutions provider across core cloud challenges like data, media and cloud integration for our customers, says Rathinam. Innovation is a core ingredient of Aditis DNA and the company is gearing up to build offerings around Cloud Services. The core idea is to package frameworks and code libraries that clients can deploy without significant technology investments. It helps our clients and helps us scale without necessarily building huge teams. We want to be smart about scaling our business and leverage repeatability, explains Rathinam. Having released one of the first 5 apps on Windows Azure Store around Task Scheduling the company will be releasing many more such services around data integration; mobile services this half to stay ahead of its competitors.

Mobile is Risky Business


By Arvind Narain, Founder &CEO, MobileASaP Headquartered in Fremont, MobileASaP delivers real-time mobile risk and security solutions for a converged world of BYOD, mobile apps and enterprise access.

Aditis Customer Focused Growth


Aditis simple yet disruptive operating model is doing the trick. With a long list of illustrious customers such as Microsoft, Nokia, Intuit among others, the company showcases the trust put in it by these established stalwarts to battle the challenges that cloud throws their way. These challenges are tough problems and require astute technology and business orientation. To deliver this, Aditi is insanely focused on getting the right talent. The company only hires the top percentile technology talent and gives them the freedom and direction to excel. This forms a sold ingredient of the core of their growth. We believe in picking the right battles and stay focused. So, we have deliberately stayed away from commodity services and focused instead on high-value, high-complexity consulting space, explains Rathinam. The company has its eyes set on its goal and is steadfast making its way to make the most of the cloud. 2013 is going to be the year of the cloud when it loses its buzz word status and actually becomes a ground reality. More vendors and solution providers will compete to offer customers services with more reliability, lower prices, better management and easier use. This means stiffer competition but Aditi is gearing up to make the most of this shift and is rapidly evolving. The company envisions to become

Cloud provides us an opportunity to play as Service as a software player by leveraging reusable cloud based software to deliver services faster, cheaper and smarter
CIOReview

Cloud: The Platform of Choice for Future Innovations


The verdict is clear. Cloud is here to stay and companies that do not make the move will end up being the losers in the race to the top. The future belongs to those who will truly understand the present scenario, manage risks, and innovate using cloud. Disruptors like Aditi are making this critical transition to the cloud seamlessly; which has become a cake walk for ISVs and enterprises. Be it their radical cloud first approach or the talented Cloud Ninjas, the company only aims for perfection, because for leaders; nothing less will suffice.

obile Density in corporations is increasing by leaps and bounds: three devices per user in 2012 climbing to seven devices in 2016. Mixed-use or BYOD (Bring Your Own Device) is now mainstream. Mobile application downloads from appstores such as Apple and Android are into billions, and corporate applications are increasingly mobile-centric. Throw in the shift to the Cloud, which means anytime/anywhere access, and you can see why Mobile is the NEW NORMAL. With this kind of explosive growth, comes a risk, compliance, and security headache. Let us deep-dive into this a bit more. With the latest device in hand and 20-30 apps downloaded to that personal device, the user (say an employee or guest) comes into the corporate network. Next, IT provisions the user with a handful of corporate apps. Now, the validated user has unfettered access into the network and the public cloud. In the process, this user consumes WAN bandwidth, accesses apps that may or may not meet corporate content standards, and, maybe even use applications that could expose that companys infrastructure to security threats. In each of these scenarios, the problem may not be the user or the device instead, it could be mobile app itself.

Just as IT typically does not leave anything to chance (or honor system) with laptops, nor can they afford to do so with mobile devices. Next, let us look at todays antidote to this problem space IT has a set of tools that allows them to authenticate a user, gain visibility into the device, provision company apps, and, maybe even look at the flow of data packets from the device into the network. This passive approach may not recognize that the bigger lurking risk is elsewhere in the form of admission control challenges around mobile apps, both public and private. Over the years, IT security has evolved from a single-tier to a multitiered protection model: endpoint security (anti-virus) to gateway security to vulnerability assessment to intrusion prevention. And, from simply inspecting packets of data to understanding context who the user is and what application the traffic belongs to. Just the same way, the mobile ecosystem needs to be protected. Unfortunately, instead of dealing with hundreds of thousands of device and applications, we have to cope with millions of devices and billions of applications. In other words, IT controls need to be more specific, more active (or real-time), and have tools that allow them to Be Selective, Not Equally when it comes to apps, users and devices. And, of course, like anything else in IT-land, it needs to be cloud-based, policy

Arvind Narain managed, and event-driven. This mobile explosion in corporate America creates opportunities. Along with Big Data and IT Consumerization, Mobile Management offers tremendous entrepreneurial opportunities. We do not anticipate a one-size/one-class of solutions; instead, we expect a robust mobile ecosystem of solutions. As entrepreneurs, we have an opportunity to participate in this mobile wave over the next one to five years. Our prescriptive advice to entrepreneurs is straightforward: attempt to solve a targeted problem and then expand (penetrate and radiate; find a hole and fill it then, find a bigger hole); focus on the problem ahead, not just todays (Wayne Gretzky, the greatest hockey player used to say that he played to where the puck was headed, not where it is), and finally define your success by what you have done for your customers, not by the amount of VC funding you have raised. In the words of Steve jobs: Stay Hungry. Stay Foolish.
CIOReview

|16|

March 2013

|17|

March 2013

Company of the Month


huge amount of money on various security services while the reality is completely different. Organizations may be better off by getting an accurate report of previous attacks and how they were performed, says Barmak Meftah, CEO, AlienVault. To ward off the threat of hackers and arm users against possible threats AlienVault has eventuated Open Threat Exchange, a free system for gathering, processing and sharing threat intelligence. Users of OSSIM platform can share information regarding security threats. OTX is about collecting data from individual installations of AlienVault, bringing it together, analyzing it, and then sending it back so it can be automatically installed and be used in threat management and correlation. Nobody else is doing that today, says Richard Kirk, Senior Vice President, AlienVault. Although a number of other IT companies collect and share information with their users, AlienVault differentiates itself owing to its high user base of 16,000 as well as large number of commercial users which gives their researchers access to tons of information. No other company has an open source community which makes it very unlikely for them to get high end commercial clients share information. This puts AlienVault on a different pedestal altogether. AlienVault has a renowned hacking team which is instrumental in the company being efficacious consistently. The AlienVault platform is uploading information on hourly basis. It is then immediately processed. Sure, it is not instant, but it is quicker than anything else today, beams Kirk.

AlienVault: Changing the Dynamics of Security Management


By CR Team

Organizations may be better off by getting an accurate report of previous attacks and how they were performed
Changing Business Environment
Times are changing and business operations are adapting to the technological flux. There is a need to bring a paradigm shift in security measures and systems. AlienVault is working towards discovering opportunities and achieving breakthroughs by reopening long closed systems. The company has been growing by leaps and bounds, recording a growth of 100 percent per year. With a highly qualified leadership team which comes directly from Hewlett Packard, they have managed to raise $22.4 billion in series C round. AlienVault is hiring fast and is on track to more than double in revenue year-over-year, adds Meftah. The company has been named 2013 Technology Pioneer by world economic forums. The company envisions continued growth by serving organizations they believe are underserved. AlienVault currently has 120 people working in the organization. Through continuous innovations, AlienVault endeavourers to continue leading the way in security and threat management.
CIOReview

T
The Initiation
CIOReview CIOReview

he industrial ecosystem we operate in has evolved progressively and so has the risk of security hazards. Complex IT infrastructures are met by multifaceted threats and attacks which results in security being compromised. One of the biggest challenges encountered by security professionals worldwide is the need for visibility across a multitude of disparate point security solutions that desperately needed to work together. The present security measures in place fail to meet the needs of organizations which are continuously vulnerable to threats from hackers around the world.

Founded in Spain in 2007 by Julio Casal and Dominique Karg, AlienVault has revolutionized the process of security and threat management. This California headquartered company understood that the prime trepidation for technology buyers is the lack of desired requisition required to manage threats inspite of investing large sums of money. Another concern is the deficiency of skilled talent and expertise in security which causes serious implications on how efficiently an organization addresses security issues. The companys goal is to provide a comprehensive

collection of tools which grant an administrator an eagles eye view of all security related aspects of their system. This is made possible by OSSIM (Open Source Security Information and Event Management), the de facto standard SIEM which comprises a collection of tools designed to aid network administrators in computer security, intrusion detection and prevention. AlienVault has ushered in a radical change in the way security and threat was being managed before, by reducing the time taken to deploy security measures from weeks and months to hours and days, thus reducing the overhead costs. They managed to achieve this by bringing different solutions to one company and integrating it in a simple console, the Unified Security Management platform. This platform integrates tools to detect threats and provides the administrator ability to control and view all built in security controls with one single console. This provides better visibility and control and helps organizations manage threats better.

Next Level of Security Management


AlienVaults entry into the market has taken security management technology to the next level. AlienVault saves companies money and time. If a company buys the equivalent point solutions separately, its software budget alone could total between $10 million and $20 million then it would spend $10 million more on consultants to install, configure and integrate the software. But AlienVaults software costs 20 to 25 percent of that total and takes about a week to install says Meftah. The companys customers span across 80 countries and range from banks, financial institutions and defense organizations. Moreover, while many companies would settle with serving big clients, AlienVault targets small and medium sized business units equipping them with the same quality of security technology as big enterprise solutions. Richard Kirk, Senior Vice President, AlienVault

Responding to Threats Effectively


One of the toughest challenges being faced by organizations today is how to respond to security threats. The prevailing belief among many executives is that the right technology can keep hackers at bay. Companies thus end up spending

|| 18| |18

March 2013 March 2013

"

"

|19|

March 2013

Meet the CIO


a big expectation to meet. Technology is too complex, and not enough vendors are focusing on simplifying things. It takes far too much time, money and people to implement most solutions. The bar is set high. Everyone expects every application to look and operate like Google or Facebook. This can be unrealistic and difficult as we know the amount of time and money those companies spend to make things look so simple. While everyone wants the latest and greatest technology with new capabilities, people are still very resistant to change. Many times it is the technology team that winds up having to push these same individuals clamoring for the latest and greatest, out of their comfort zones and into the future.

Business Environment
Stuart Kippelman, VP & CIO, Covanta Energy Corporation Covanta Energy (NYSE: CVA) owns and operates worldwide over 40new generation waste combustion facilities with added benefit of energy recovery, also known as waste-to-energy or energy-from-waste power generation plants. Headquartered in Morristown, the company has a market share of $2.6 billion.

to Support new Capabilities in a

Think Differently

To deliver success based on innovative thinking, everyone on the team needs to feel they can think outside the box

Driving Innovation in the Team

New Technology trends shaping the Industry


There are three current technology factors which are changing the way companies operate and conduct business. They are the consumerization of technology, cloud computing, and social networking. These factors are not necessarily new technology, but they converge more and more to create a significant business disruption. Consumer based technology is changing rapidly, and often applications are designed to only work on mobile devices, with cloud based data, and include a social component. We all must think differently to support these new capabilities in a business environment.

is still no cost effective and simple way to do it. The new terminology for this issue is called Big Data, but it goes beyond that. The average company is only analyzing a fraction of the data they have, and most likely not collecting all the data they should be. Solving this problem would enable companies to be more productive, more responsive to customer needs, and better positioned for growth.

Expectations to Meet
Every day, employee expectations of technology are increasing to keep pace with the world of mobile applications. These expectations demand access to large complex data at any time, on any device, and from anywhere in the world. This is all great progress and I believe that it positively contributes to culture, making the world a smaller place. However, it might be happening too quickly. It was not that long ago that a web page that loaded in 10 seconds was acceptable. Today if a web page does not load in one or two seconds on a mobile device, we become impatient and often open another web site. That is

The foundation of encouraging innovation is to create a culture that not only allows and supports it, but expects it from everyone. In order to deliver success based on innovative thinking, everyone on the team needs to feel they can think outside the box related to everything they do. It might sound basic, and it is. However we constantly challenge each other to ensure creativity and new ideas are always brought to the table. From the most basic task to the largest most complex projects, there is always a better way to do things.

Cost Effective way of utilizing Data is a Must


Almost everything we do in IT is about getting access to valuable information contained in the data we collect. Improving how we collect, manage and analyze this data will provide much better intelligence about our company, translating into a growth enabler. There are many tools that promise success in providing data intelligence, but there

A Gadget Marvel
I am definitely a gadget lover, but my favorite is my Nest Learning Thermostat. It is like a smartphone and a home thermostat combined into one. Besides being a good thermostat, it does everything automatically and can be controlled over the Internet so no more forgetting to set the heat or air conditioning. It is a great example of how technology is making everyday tasks easier.

Stuart Kippelman

CIOReview

|20|

March 2013

"

"

CIOReview

|21|

March 2013

Meet the CIO

Trends driving
Consumer Behavior
drive the Industry
Kevin Vasconi, EVP, CIO, Dominos Pizza

Radical Change in

The biggest challenge is not the things you know you have to do, it is the unexpected that provides the real challenge and often the greatest opportunity

Domino's Pizza (NYSE: DPZ) is a restaurant chain known for its pizza delivery operating a network of company-owned and franchise-owned stores in the United States and in international markets. Founded in 1960, the company has a market cap of $ 2.58 billion. help make this happen. Some areas of Focus for Dominos E-commerce with a strong investment in Mobile platforms Big Data & Real-Time Analytics E-Commerce Infrastructure

Previous Experience aiding Todays needs


My past experiences in other industries have prepared me very well, notably the advanced technologies, process discipline and fast pace. Those are all elements of the Dominos IS culture that are very familiar to me. Dominos customer focus and drive for product excellence are also in my DNA, so that transition has not been too hard. The biggest hurdle for me is that I do not yet know the businesses as well as I want to. The more I understand how the business works, the more impactful I can make the technology. The good news is I am surrounded by a great leadership team, that are experts and they are doing a great job of mentoring me.

Challenges and Solutions


It depends on what day of the week it is. By that I mean the biggest challenge is not the things you know you have to do, it is the unexpected that provides the real challenge and often the greatest opportunity. We have objectives, budgets, project plans and portfolio management to name a few, for all the things we plan to do. For planned activities it is all about flawless execution. For the unexpected or unplanned its about having a nimble, experienced leadership team. We use the analogy of good technical athletes, so we can field team no matter what sport

(problem) we are asked to play. We recruit and develop our senior technical team with this in mind.

Road map ahead


We have a team of about 200 of the best IT professionals in the business, hands down. We augment that team with several technology partners and a couple of world class outsourcers. The vast majority of those people are at our headquarters where we are truly bringing Silicon Valley opportunities to Ann Arbor, Michigan. Which is very cool. As we continue to grow globally we will see more of our IT team located in our regional offices in Europe and Asia.

Technology Trends
We always look at Macro trends first, focusing on the big trends in society, consumer behavior and technology and then we look for the inflection points. The biggest trends that will drive our industry are the same ones that are driving radical change in consumer behavior: Mobility, Ubiquity & Personalization. Dominos has active projects in all these areas.

Technology an Enabler for Dominos


We absolutely feel that technology is a competitive differentiator on a global basis. It starts with a single, common, global, Point of Sale system; extends through a highly-optimized supply chain and meets the customer with one of the highest rated e-commerce experiences. All of our systems work together to

Kevin Vasconi
CIOReview CIOReview

| | 22| | 22

March 2013 March 2013

"

"

CIOReview

|23|

March 2013

Meet the CIO

Changing Variables in the

CIOs Equation
Rama Prasad, SVP & CIO, Gogo Inc.

Gogo Inc., headquartered in Itasca provides in-flight broadband Internet service, streaming video and other connectivity services for commercial and business aircraft.

I
CIOReview

n todays times, architectural elegance is a growing requirement in organizations. With problems requiring newer solutions in terms of disruptive technologies we can see plenty of opportunities but at the same time this makes the architecture more complex which gives rise to the requirement of greater planning. This is an area that a CIO must monitor. Needs of business partners such as marketing and customer support are also growing and they need to be aligned with the budget and guidelines laid out by the senior management. A CIO is expected to balance multiple constituents like these together. This seems tougher in todays era than ever because of multitude of opportunities present. Disruptive technologies are well on their way to change the face of enterprises and the way they look at IT. Cloud computing is one of the crucial technology trends that is molding the future of the industry in a big way. Moving assets and process components to the cloud has a huge impact on streamlining business processes and improving cycle time. This technology entails advantages such as it being asset-light, which helps IT organizations steer the focus towards the core issues more and making an organization move faster. With cloud computing gaining momentum, mobile is another trend that is already changing the way the enterprise and consumers interact. The penetration of smart phones has made computing truly mobile today.

These devices bring the end user closer to the business and have managed to cut out a lot of the processes and layers in between. This has also increased the importance of the technology organization. More than ever, IT now plays a

Rama Prasad

transformational role in an organization. As technology advances and companies adapt to these change; in this environment a CIO always requires to focus on finding the right talent that fits the requirements of a job. This process has always been tough but the complexities are growing manifolds now with the advent of newer technologies. To solve all these issues and to ensure growth, innovation is the key. It is very important to create a culture within the team that fosters innovation. People who become good examples to the rest of the organization must

A CIO also needs to balance the demands pertaining to projects, ideas and opportunities, of the business with the limited supply in terms of budget and manpower

be hired. Recognizing and rewarding innovation at all levels of the organization irrespective of its size is a necessity. Apples iPhone is a great example of innovation in technology. The simplicity of intuitiveness of the device has changed the expectations of user interfaces for all software. Companies should try and incorporate this streak of innovation in all their products and services. But innovations alone will not help growth. The enterprise environment faces several challenges; the solutions from different vendors cannot be nitrated easily. It becomes mandatory for the vendors to follow or adapt up

to date industry standards. The need of the hour is to address this issue where the equation in demand can be facilitated. A CIO also needs to balance the demands pertaining to projects, ideas and opportunities, of the business with the limited supply in terms of budget and manpower. This is a never-ending challenge faced by a CIO. Initiating a project prioritization process that puts the business partners in charge of prioritization is a possible solution. The concept though is simpler said than done. All these elements put together will enable the CIO and the enterprise alike.

|24|

March 2013

CIOReview

|25|

March 2013

View Point
platforms different from traditional virtual infrastructures and traditional hosting environments to make architecturally sound decisions about which applications to move to the cloud. 2. Cloud and mobile will become one. Whats the value of a mobile app that does not call out through the Internet to back-end services? Not much. More often than not, we are finding mobile applications connected to cloud-based back-end services that can elastically respond to mobile client engagements and shield your data center from this traffic. 3. We will stop stressing about cloud SLAs, and recognize that apps have to protect themselves. The best practice for cloud application design and configuration is to build resiliency into the application rather than expect it from the cloud platform. This way you can achieve any service-level agreement regardless of the base SLA provided by the cloud platform. 4. We will get real about cost modeling. Do the math, understand the economics, and monitor and optimize as your use evolves. If you want to get the best ROI out of your use of cloud services and platforms, you need to actively model the cost profile of your applications, monitor their resource use, and adjust accordingly. Cost should not solely drive your cloud deployment decisions, but cost can no longer be ignored or assumed. 5. Infrastructure & operations will free the development teams to build apps in the cloud. The developers do not really need I&Os permission, and our surveys show the business-unitaligned developers certainly are not waiting for it. In 2013 the I&O team will get comfortable with the fact that development on public clouds is going to happen whether they like it or not and it is easier for them to engage developers and be part of the conversation about how to do it safely, securely, and with appropriate oversight. 6. We will get real about using the cloud for backup and disaster recovery. Instead of enterprises buying resources in case of a disaster, cloud computing and its pay-per-use pricing model lets you pay for longterm data storage while only paying for servers when testing or declaring a disaster. It probably will not replace your existing BC/DR resources completely, but the cloud is turning the cost of storage upside down faster every month, and what was cheaper to back up to traditional DR storage last year will be cheaper and easier to put in the cloud is short order and faster to recover. 7. We will stop equating cloud with commodity. Cloud services are highly standardized and automated, but standardization does not have to mean commodity. We are already seeing cloud services backed by highend hardware, offering GPUs, SSDs, and other clearly non-commodity infrastructure options. In 2013 expect to see the proliferation of these types of choices as cloud providers leverage them to meet specific market demands and to differentiate competitively. 8. We will stop equating cloud with AWS. While Amazon Web Services has opened up a substantial lead in the cloud platforms market arguably as large as 70 percent market share in 2013 we will see that market position give way to a cadre of strengthening competitors and new entrants. Microsoft and Google have made significant improvements to their platforms, and by the end of 2013 we fully expect to see at least three substantial OpenStack-based clouds building strong positions. 9. We will acknowledge that advanced virtualization is a good thing, and no, its not a cloud. The cloudwashing award for 2012 definitely goes to enterprise I&O departments who relabeled last years VMware environment a private cloud so they could get to yes in the eyes of their CIO. Very few of these environments offered self-service to the developer, fully-automated provisioning, standardized services, or cost transparency. In 2013, lets get real about these environments. A mostly static virtual environment that successfully drives workload consolidation, operational efficiencies and fast recovery is a good thing a very good thing. 10. Developers will awaken to: Development is not all that different in the cloud. Our cloud developer survey shows that the majority of languages, frameworks, and development methodologies we use in the enterprise are also in use in the cloud. Whats different isnt the coding but the services orientation and the need to configure the application to provide its own availability and performance. And frankly this is not all that new either. So, while some of the best practices and cloud services may be new, there are few excuses for a welltrained developer to not be productive in the cloud.

2013 Cloud Predictions: We will Finally Get Real About Cloud


By James Staten, Vice President & Principal Analyst, Forrester Research

A
James Staten
CIOReview CIOReview

t the end of 2012 there was one clear takeaway about the cloud computing market enterprise use has arrived. Cloud use is no longer solely hiding in the shadows, IT departments are no longer denying its happening, and legitimate budgeting around cloud is now taking place. According to the latest Forrsights surveys, nearly half of all enterprises in North America and Europe will set aside budget for private cloud investments in 2013 and nearly as many software development managers are planning to deploy applications to the cloud. So what does that mean for the coming year? In short, cloud use in 2013 will get real. We can stop speculating, hopefully stop cloudwashing, and get down to the real business of incorporating cloud services and platforms into our formal IT portfolios. Here is what we expect to happen when enterprise gets real about cloud in 2013: 1. We will finally stop saying that everything is going cloud, and get real about what fits and what does not. We now have enough understanding about what makes cloud

We are finding mobile applications connected to cloud-based backend services that can elastically respond to mobile client engagements and shield your data center from this traffic

| | 26 | | 26

March 2013 March 2013

"

"

CIOReview

|27|

March 2013

View Point

Managed Mobility Services for Enterprise


By Art King, Director of Enterprise Services & Technologies, SpiderCloud Wireless

Customers is a $60 Billion Opportunity


The San Jose based SpiderCloud Wireless develops small-cell network platforms that allow mobile operators to deliver unprecedented cellular coverage, capacity and smart applications to enterprises. Founded in 2007, the company has raised a total funding of $75 million from Charles River Ventures, Matrix Partners, Shasta Ventures and Opus Capital.

to do more with less budgets and resources, the opportunity for trusted mobility services is tremendous, says Greg Collins, Principal with Exact Ventures. Until now, there has been little reason for enterprises to have a relationship with operators beyond minutes and mobile devices. Small cell systems that go beyond coverage and capacity can change this model and open up new business models that can help enterprise customers save significantly on CapEx and OpEx. Enterprise IT can save approximately $60 billion between 2014 and 2020 By outsourcing telecommunications services, enterprises can leverage new in-building mobile services and save up to 35 percent per year by transitioning from a CapEx to a peruser/month OpEx model saving enterprise IT over $60 billion between

with services such as BYOD, MDM and PBX Integration, even Wi-Fi as a Service. Enablement of such services starts with the deployment of a multiaccess small cell system that includes 3G, LTE and Wi-Fi, and can scale beyond a few small cells to deliver reliable mobile services indoors for enterprise customers of any size. To enable managed cloud and application services, a locally deployed controller or services node maintains secure services access to and from any mobile device on the network.

within an organization. In conjunction with other cloudbased telecommunications services, operators can centralize the collection, storage, and reporting of such data, helping customers relieve costs, and adhere to regulatory or best-practice compliance.

W
CIOReview

e are in the midst of the most rapid mobile network change we have seen in over 15 years. Mobility and the use of wireless spectrum is the digital oxygen that drives productivity the mobile industry's equivalent to crude oil deposits. Spectrum reuse and targeted capacity using small cells indoors is rapidly becoming the answer to deal with networks at capacity and poor indoor service. So where is the $60 billion opportunity? It starts with providing a scalable small cell network that can deliver reliable indoor 3G/LTE and Wi-Fi coverage and capacity for enterprises that recaptures vastly under-utilized licensed spectrum indoors, and is positively impacting the outdoor macro cellular network. Mobility and agile network services for enterprises can create competitive advantage The enterprise mobility services market opportunity is arising as a result of several key trends: mobility and the need for BYOD policies and control, cloud computing and the emergence of enterprise small cell systems capabilities that go beyond coverage and capacity. In 2013 and beyond, enterprises have an unrivalled opportunity to move

their mobile relationships beyond minutes, Megabytes, subsidized devices, and engage mobile operators as trusted partners to their business. As more hardware and Wi-Fi vendors start to offer managed SaaS and WaaS services, so they leave the door open for fixed service providers to do the same. Enterprise customers now have valuable options to curtail CapEx spending. The advantage that the mobile operators have is that they can offer a full suite of OpExonly mobility services with reliable licensed spectrum coverage and capacity using multi-mode small cell systems and still deliver WaaS, SaaS, security and compliance services. In the market analysis, Enterprise Mobility Services: Market Opportunity for Mobile Service Providers, Exact Ventures, an analyst firm focused on technology market intelligence, analyzed the managed mobility services opportunity for businesses of 100 to 4999 employees in the United States and the European Union. In leveraging the mobile ecosystem and small cell systems for inbuilding coverage, capacity and services, operators have the ability to help enterprise customers remove IT challenges with mobility, unified communications, secure access to applications, device management and integration of cloud and telephony, as well as leverage the emergence of new context and locationbased services. With enterprise IT teams under constant pressure Art King

Hosted Unified Communications(UC) refers to a set of real-time communications services such as instant messaging, presence information, telephony and video conferencing, as well as non-real-time communication services like e-mail, SMS, voicemail and fax. UC is not necessarily a single product, but is often a set of products that provides a consistent unified user interface and user experience across multiple devices and media types. Security: Cloud-based Web Filtering :Enterprises
increasingly employ cloudbased web filtering as a way to monitor and control website access and usage to enhance productivity and improve security by protecting against malware and spyware.

Wi-Fi-as-a-Service is the delivery of enterprise-focused services such as secure internal and guest Wi-Fi. Where the operator is already installing small cells with Wi-Fi, it can offer business customers Wi-Fi access when the opportunity is available. Context-Aware (or Location-Based) Services
can offer enterprises a large array of use cases. The opportunity to leverage the very sophisticated mobile network location capabilities in small cells, and extend them into the macro network, creates unique opportunities to innovate enterprise business systems in ways that have never been easily available. Enterprise CIOs are starting to expect mobility services from their communications partners as part of a longer-term strategy to lower CapEx and improve productivity and business agility.

NaaS: The next Big Thing


As we look forward, we are seeing the emergence of a common services network infrastructure where macro, micro and small cells work in close tandem with intelligent physical and virtual routing of access and services. Network-as-a-Service (NaaS) is becoming a reality much faster than expected. Mobile operators will be offering their enterprise customers clientless-UC access to mobility, applications and cloud-based services that create more valuable sticky services, and build deeper trusted relationships for years to come.
CIOReview

2014 and 2020, and allowing finite IT resources to be either re-allocated to focus on differentiation and competitive advantage, or for the cost savings to fall to the bottom line.

Mobile Device Management (MDM)


entails lifecycle management of both company and employee provided mobile devices to manage and secure enterprise data and access.

Managed Mobility Services


Mobile operators will start to offer true managed mobility services to the enterprise, starting with basic coverage and capacity, and follow on

Compliance Services
Many industries are subject to regulatory record keeping, requiring documentation of all communications

|28|

March 2013

|29|

March 2013

View Point

Big Data: Fueling the Rise of NoSQL


By Bob Wiederhold, CEO, Couchbase Bob Wiederhold The California based Couchbase is a provider of NoSQL database technology and is the company behind the Couchbase open source project. Founded in 2009, the company has raised a total funding of $31 million from Mayfield Fund, Accel Partners, North Bridge Venture Partners, Ignition Partners and DoCoMo Capital

W
CIOReview

hen people say Big Data, they are usually talking about the analysis of petabytes of data to get insights hidden in massive datasets. New technologies like Hadoop get lots of attention because they make analyzing these huge datasets possible. But Big Data also affects another part of the database world: operational databases. These databases provide interactive web and mobile applications with millisecond access to small pieces of data in a large database and are crucial to meeting the response time user demands. Big Data dramatically changes the requirements these interactive applications place on operational databases, which is why developers are seeking alternatives to the relational databases used for the last 40 years.

generated data are just a few examples of the ever-expanding array of data that is captured, stored and processed in an app or acquired from third parties. The use of this data is transforming the nature of communications, shopping, advertising, entertainment, relationship management and even how we do everyday things like hail a cab. Developers are discovering ways to leverage this data to enrich existing applications and create new ones made possible by it because if they do not, they will fall behind.

Current Generation of Interactive Applications must Capture and Process more Data
Big Data is all about capturing and processing growing amounts of data to bring valuable new capabilities to users. The current generation of interactive applications must capture and process far more data than those of just a few years ago. Personal user information, session states, geo location data, social graphs, purchase histories, user-generated content, machine logging data and sensor-

Figure 1. Big Users: Global Internet usage is growing rapidly, as is the amount of time each user spends online daily. With the proliferation of smart phones, people use their apps even more frequently.

at scale is more effectively a c h i e v e d with clusters of standard, commodity servers, and that a schema-less data model is often a better approach Figure 2. Big Data: The amount of data is growing for handling the rapidly, but the vast amount of new data being stored variety and types in unstructured and semi-structured. of data used by applications today. But managing this ever-growing NoSQL databases were developed amount of data is increasingly from the ground up as distributed, problematic. Not only is there more scale out databases (unlike the scaledata to manage, there are also more up, shared-everything architecture users accessing it (see Figure 1). Today, most applications are accessed of relational technologies). They through a browser or thin mobile app use a cluster of standard, physical but run in the cloud. That means a or virtual servers to store data and database might need to store terabytes support database operations. To scale, of data for tens of millions of users additional servers are joined to the who have downloaded the app and cluster and the data and database support the database operations for operations are spread across the larger cluster. Since commodity servers are millions of concurrent users. Compounding the problem, the expected to fail from time to time, majority of the new kinds of Big NoSQL databases are highly resilient, Data being stored are unstructured built to tolerate and recover from such or semi-structured data (See Figure failure. NoSQL databases provide a much 2). This means the data does not fit easier, linear approach to database well into the highly structured rows scaling. If 10,000 new users start and columns of a schema-based using your application, you simply relational database. App developers add another database server to your want something more flexible that cluster. Add 10,000 more users and can easily store any new type of data add another server. There is no need and easily handle content structure to modify the application as you scale changes. since the application always sees a single (distributed) database. Since Addressing the challenges of Big database operations are spread over many servers, consistently very high Data To address the challenges of Big performance can be maintained. Since the use of Big Data is Data and Big Users, more and more increasingly important to the success application developers are looking to of an application, being able to NoSQL databases. The use of NoSQL efficiently interact with a database technology is rising rapidly among takes on added importance. Since Internet companies and enterprises. developers generally use objectMany consider it a viable alternative to relational databases, especially as oriented programming languages to organizations recognize that operating build applications, it is usually most

efficient to work with data that is in the form of an object with a complex structure consisting of nested data, lists and arrays.

Relational Data Model and its forthcomings


The relational data model provides a very limited data structure that does not map well to the object model. Instead data must be stored and retrieved from tens or even hundreds of interrelated tables. Objectrelational frameworks provide some relief but the fundamental impedance mismatch still exists between the way an application would like to see its data and the way it is actually stored in a relational database. NoSQL databases specifically document databases can store an entire object in a single JSON document and support complex data structures. This makes it easier to conceptualize data as well as write, debug, and evolve applications, often with fewer lines of code a big advantage in a Big Data world.

The rapid take-up of tablets, combined with the growing acceptance of in-game purchasing and virtual currencies will result in an estimated $3.03 billion of sales in 2016, reaching over 10 times the $301 million figure calculated for 2012. The migration to tablet devices is due to the fact that games have to be purchased upfront and the gaming devices themselves often do not allow for a 3G or 4G connection. Courtesy: Juniper research

|30|

March 2013

CIOReview

|31|

March 2013

View Point

BYOD and the

a CLO on the elevator ride up to the CEOs office.

How big is this mobile and location thing?


Big and exploding. Of the 7.1 billion people on the planet, about 4.3 billion have mobile phones, according to the TomiAhomen Almanac 2013. By 2015, it is assumed that the number of IP-ready devices that will be connected to the internet will grow to a total of 6,593 billion (source: ITU). This growth cannot be ignored. It is a boardroom topic.

know about more than just one. The Big Ten are 1) navigation, 2) search, 3) advertising, 4)social networking, 5) entertainment, 6) people locator services, 7) resource management, 8) authentication, 9) operations improvement and 10) analytics.

CIO: A Location Impact


Assessment for Enterprise Mobility
By Rip Gerber, Founder & CEO, Locaid

Location and its benefits


Cost savings, Reducing risk, Increasing revenues and Enhancing insight. Your answer depends on where your pain or opportunity is greatest. The Fortune 1000 CEOs I talk to tell me their CIOs are digging in on the last five categories listed above. Why? The reason is mobile location delivers a new and dynamic data feed that can save significant operations cost, reduce fraud and risk, protect security and pull actionable insight into the product, marketing and sales teams. The first five are key for the front line and companies in the technology, consumer and marketing agency sectors.

Location matters to the CIO


Because we live in a mobile society. Mobile-broadband subscriptions have grown 45 percent annually over the last four years and today there are twice as many mobile-broadband as fixedbroadband subscriptions (source: MobiThinking, 'Global mobile statistics 2012'). But what does location mean to the CIO? Depends on your business. I divide the entire location industry into 10 service categories. You may need t o

The trouble for the CIO is grabbing and controlling the primary location sources and others such as IP location for computers and connected devices & third party sources from Google
Programming Interfaces (API) and Software Development Kit (SDK) and make them easy to access for the CIO. Or you can direct the sources.

Locaid operates a location privacy platform that allows mobile developers to locate over 350 million devices for enterprise authentication, fraud management, and consumer location services and opt-in mobile marketing. The San Francisco based company has raised a total funding of $26.2 million from InterSouth Partners and H.I.G. Ventures.

Where do I get location?


Most people think location comes from their smartphone. It does not. That is just the application asking for permission, as in: This app would like to use your location. OK? The three primary location sources are a) satellites that signal with GPS chips in devices b) cell towers operated by wireless carriers and c) WiFi access points, such as hotspots. There are other sources too, such as IP location for computers and connected devices, third party sources from Google and other data mapping companies. There is even NFC. The trouble for the CIO is grabbing and controlling all these sources. That is what Locaid, does. We are like the Amazon of location; we pull together all those sources of location through a single Application

Top 3 Things to worry about with BYOD and location


As the CIO, you are trying to operate and protect your infrastructure and systems in a rapidly evolving world. Consumers are more empowered, bad guys more capable, data more in the cloud, mini computers in your employees pockets and purses. Top three things you need to worry about? 1. Never violate a persons privacy. 2. Fully vet any vendor or service provider in mobile, cloud or big data. These are explosive industries and there are lots of bright folks with shiny new things that will not be around in a few years. 3. Stay ahead of the curve. As CIO, your biggest risk is stagnation. Your competitors are moving fast. Mobile is not just an app on an iPhone. Location is not just GPS and aggregated consumer data. Stay ahead of the market. Learn more about location, because location matters.

F
Rip Gerber
CIOReview CIOReview

or the last two years I have written a blog called Chief Location Officer. Why? Because today, mobile locationbased services are mainstream. Most of your employees, contractors and customers carry a smartphone or GPS-enabled handset. Even your assets are connected to the network, from vending and ATM machines to fleets and pallets to medical equipment to drones. Which means you can locate, track and monitor nearly any device, anywhere. And that poses big issues and opportunities for the enterprise.

How do you keep your in-the-cloud data secure in a bring-your-owndevice (BYOD) world? Who can you track, and why, without violating privacy regulations? How can you turn your customers and workers into information gatherers that you can use to reduce operating costs, slash fraud, improve efficiencies and enhance customer insight? How can you tap into all the treasures of location in a mobile world? Chief Information Officer (CIO), meet the Chief Location Officer (CLO). Last month I attended a conference of information officers, and these four questions kept coming up. Here is what a CIO should ask

| 32| |32 |

MarchMarch 2013 2013

CIOReview

|33|

March 2013

View Point

The Emergence of the "Mobile Consumer Enterprise"


By Milind Gadekar, Founder & CEO, CloudOn Founded in 2009, CloudOn provides access to the productivity and collaboration tools required for devices. Headquartered in Palo Alto, the company has received a total funding of $25.5 million from The Social+Capital Partnership, Translink Capital, Foundation Capital and Rembrandt Venture Partners.

perfect storm is brewing in the enterprise with the current waves of mobile adoption, BYOD and "consumerization of IT", each bringing its unique requirements to be addressed. This has created an opportunity for a range of point solutions such as MDM (Mobile Device Management), MAM (Mobile Application Management), Federated SSO (Single Sign On), Enterprise AppStores, etc. The untapped opportunity is for new software services to focus on knowledge workers with an ease-of-use and mobile-first experience, all with the intent to enable a new wave of mobile productivity. Knowledge (or content) creation, consumption and sharing has been "stuck" in the PC paradigm for over 30 years. It is time to be unshackled and head into an increasingly mobile and social workforce, and not just through cloud-based file storage, but by bringing social context to content creation/consumption and enabling new models for sharing knowledge.

The cost to start a company and roll out a product has significantly been reduced, creating an over-supply of solutions for any given problem
This will fundamentally change how people work and boost productivity in an increasingly borderless enterprise.

Strategies for the GTM barriers


The cost to start a company and roll out a product has significantly been reduced, thereby creating an over-supply of solutions for any given problem. The challenge is now less about development barriers, but more about go-to-market (GTM) and overall distribution barriers. With some seed capital, one can quickly overcome the development risks and be able to roll out a solution. If it is a mobile solution, one has to now crack the distribution and monetization challenges across Apple AppStore, Google Play, and the plethora of new app marketplaces. Since venture capital is the source of "oxygen" for entrepreneurs, the bar for Series A has gotten much higher as they are now expected to have solved the GTM and monetization requirements earlier in the life-cycle of the company. The funding chasm, which was traditionally between Series A and Series B, has been brought forward to between the Seed round and Series A. Hence there is increase in the trend of entrepreneurs picking one platform or OS to develop and focus their initial success and unfortunately for (Windows) Microsoft, it tends to be either iOS (Apple) or Android (Google).

Mobile: The World in your Pocket


Mobile is by far the biggest disrupting force in the industry. With individuals carrying a computer in their pockets, in the form of a smartphone, phablet or tablet, there is a need for instant gratification when it comes to information. Over the past 30 years, the industry has consolidated around the Windows PC platform and the innovation was limited by the possibilities of the end-point. Now with a range of different mobile devices with different OS and a wide array of capabilities, innovation has been awakened once again, and it is refreshing to see old habits being challenged. The near ubiquity of broadband networks (in most parts of the world), infinite storage and compute capacity in the "cloud", and the rich capabilities of the end points lay the foundation for new services to be rolled out and utilized almost instantly. Employees find themselves empowered to select their solutions of choice on their device of choice.

Milind Gadekar

CIOReview CIOReview

|| 34| |34

March March 2013 2013

"

"

CIOReview CIOReview

| |35 | 35|

March 2013 March 2013

Technology

Are You Opening a Door for Hackers?


By Joel Bomgar, Founder & CEO, Bomgar The Mississippi based Bomgar provides remote support solutions for easily and securely supporting computing systems and mobile devices. Founded in 2003, the company has raised a total funding of $11 million from Southern Farm Bureau Life Insurance and Gulf South Capital.

T
Joel Bomgar
CIOReview CIOReview

oday, no CIO is safe from a data breach. In 2013 alone, we have already seen major data breach reports from big government organizations, hospitals, restaurant chains and some of the most revered technology companies. But even though we cannot completely protect ourselves from hackers, we can reduce our risk by making it a lot harder for them to do their dirty work. In 2008, the Verizon Business RISK team issued the first in what has become an annual report analyzing hundreds of actual data breaches. One of the angles they examine is what attack pathway hackers use to gain access to confidential data. According to that first report, In over 40 percent of the breaches investigated during this study, an attacker gained unauthorized access to the victim via one of the many types of remote access and control software, and In many of these cases, the remote access account is configured with default settings, making the attackers job all too easy. In the five years since that report came out, it would seem obvious to assume that IT organizations have secured their remote access and control software against hackers. But in the most recent Data Breach Investigations Report, the Verizon team discovered, Remote access services (e.g., VNC, RDP) continue their rise in prevalence, accounting for 88 percent of all breaches leveraging hacking techniquesmore than any other vector. How can that be? How could the percentage of attacks via remote access more than double even after loud warnings every single one of the last five years? Service desk reps, IT administrators, and application specialists use remote control and remote access tools every

day to access, control and fix remote systems. In most organizations you can find four or five different remote access products without even digging. (In one large IT outsourcer I know, they found seventeen.) Unfortunately, a lot of these products are legacy, point-to-point remote access tools that provide few security controls and are easily hacked. And in many cases, the CIO and other IT leaders do not even know they are in use. The good news is, it is fairly easy and cost-effective to replace these unsecure remote access tools. But first you must determine if you are at risk. The following questions will help you determine whether you are unknowingly holding a door open to hackers.

data and system access is kept within your own network, behind your own security measures. Ask your team: Are they using more than one remote access tool? Are any of those creating open listing ports that can easily be found by hackers? Are you routing sensitive remote support data and access through a third-party vendor, and if so, do they meet your security criteria?

access to everything on the end system or you do not have access at all. As convenient and as easy as this method may sound, if any default login credentials fall into the wrong hands, this all-or-nothing access model can be ITs worst nightmare. Can remote support permissions be assigned granularly, enabling administrators to give reps only the privileges they need and no more? And when greater permissions are needed for a particular remote support session, can they be given on a one-off basis by higher-tier reps or administrators?

How is remote support users authenticated?


In many legacy products, authentication takes place at the client level, which means the support rep is logging in with a local password versus a domain password. This encourages the use of shared passwords and/or default login credentials. Also, many SaaS remote support products do not integrate with internal directories and offer named-seat licensing models (where each license has to be tied to a single persons name/account), increasing the motivation to create tech1, tech2 type user names that undermine auditing. A few questions to ask here: can you integrate remote support with your existing identity management and authentication tools (LDAP, Active Directory, RADIUS and Kerberos to name a few)? Can you apply permissions and password policies at the group and individual level to make logging in in a non-secure way more difficult?

Can you track everything that happens through remote access?


The audit feature is non-existent among older products. With nothing in the middle of a point-to-point connection, remote control sessions slip away in the night (or day) without any record that they ever took place. This is very convenient for hackers. The security aspect of auditing features in remote support is having on file exactly what happens in each support session, such as chat transcripts and files transferred. Can you keep detailed logs of complete session activity? How about video logs of the session itself? How do you track and log administrative activity? By asking these simple questions, you may quickly discover that your organization is unintentionally making itself an easy and attractive target for hackers. But if you can address these remote access vulnerabilities, you will not only reduce your risk of a data breach, you will hopefully help to bring that 88 percent number down next year.
CIOReview

What architecture does your remote support tool use?


Many older remote support products are point-to-point, and by default, do not work well through firewalls. This architecture encourages administrators to port forward through their firewall and create listening ports that are accessible via the Internet. Hackers can find these ports through a simple Internet scan, which is why they are such a popular attack pathway. Many of the newer remote access tools are based on a SaaS (Software as a Service) model. This resolves some of the security issues with the pointto-point solutions, but also introduces a new concern. By routing all of your remote support sessions through a third-party, you are increasing your perimeter of risk. The third architecture option is an appliance-based solution. With an onpremises appliance, all remote support

What type of controls do you have over system access?


Many older remote access solutions have binary access, so once you are in, you are in. Either you have full

|36|

March March 2013 2013

|37|

March 2013

Technology
elson Mandela once said, If you speak to a man in a language he understands, that goes to his head. If you speak to him in his language, that goes to his heart. In our dynamic world we are more connected than ever by ultrahigh-speed bandwidth, 4G wireless, smartphones, tablets and mobile apps. But one barrier to global transparency remains: language. To thrive in new markets businesses must bring their story, products and promotions to local customers in their native language. Today, brands and businesses seeking to go global are literally tied to the past with legacy translation and localization tools and processes that have not kept up with technology or consumer expectations. Poor technology, tired approaches and high costs have forced many businesses into choosing between bad and worse: delayed releases or compromised quality. In my view this is not acceptable and the wrong question. The right question is: how will translation change to drive competitive advantage for modern businesses? That is right, translation is not about supporting a global business rather it is a fundamental driver of success and it deserves the right enterprise software solution to support it. Enter the age of Agile Translation. In the software realm, agile development is now the status quo

Translation is not about supporting a global business rather it is a fundamental driver of Success

an iterative, incremental method for building software that allows for rapid and flexible response to change. This model can be replicated for translation, which can be simplified into five steps.

Agile Translation in Practice: A 5- Step Process


1. Automate the process of capturing and extracting content. Process content via Application Programming Interfaces (APIs) to parse, capture, and prepare it for translation. Organizations have translatable content in business documents (Word, Excel, PowerPoint and InDesign), software localization files (GetText, Java Properties, YAML and Android XML), and structured content (HTML, XML, RSS, JSON, XLIFF). The days of emailing documents back and forth between project managers, agencies and translators are over. 2. Use structured, customizable translation workflows. Any task is done better with a disciplined approach, especially when multiple parties are involved. A shared workflow that can engage multiple resources translators, editors, internal reviewers (legal, marketing, bilinguals), local partners and power users allows for everyone to work in sync with p r o p e r

Ushering in a New Age of Translation


By Jack Welde, Founder & CEO, Smartling,Inc. The New York based Smartling Inc., focuses on enabling websites and apps to go multilingual. Founded in 2009, the company has raised a total funding of $14.1 million from Venrock, U.S. Venture Partners, First Round Capital, Accelerator, Ventures, Felicis Ventures, lessin X2, llc and IDG Ventures. Jack Welde
CIOReview

tracking. 3. Contextualize your content using modern web-based tools. Translating out of context is the number one reason for poor translation results. Working directly with dynamic content, exactly as the target audience will see it, allows the linguist to better understand the context of individual strings, and to ensure the translated content properly fits within the limited screen of a web or mobile browser. 4. Translate using best practices. While agile translation encourages fast translation turnaround, it still adheres to basic tenets of high quality translation. For example, using a glossary of approved terminology and a proper style guide is essential. Also, leveraging an organizations prior translations, which can provide faster turnarounds with better consistency (and generally even lower costs). 5. Automatically deploy completed translations. Once the translation workflow is complete, automate the deployment process. If your content has already been translated, edited, and reviewed via your translation workflow, then put it to use immediately and automatically. Also, make sure your newly completed translations become a part of your organizations translation memory, so the translated content is available to reuse in the future. The pace of global business continues full steam ahead, and companies must be prepared as they expand into new markets. The future of translation is agile. Those who do not embrace agile methodologies will be left in the dust.

|38|

March 2013

CIOReview

|39|

March 2013

View Point

Guard the
Vijay Basani, Co-Founder, President & CEO, eIQnetworks

Perimeter of Cloud and

Address Cyber Crimes


The Massachusetts headquartered eIQnetworks is a provider of simplified security and compliance solutions, helping to transform how organizations identify threats, mitigate risks and enable compliance. Founded in 2001, the company has received a total funding of $10 million from Venrock.

One of the challenges entrepreneurs always face is to compete for quality talent with large companies
if they get value.

Dodging Security Concerns


As an increasing amount of IT infrastructure moves to the cloud, security challenges in the cloud will need to be addressed. The current cloud providers do not provide sufficient security and activity related data that can be easily analyzed to protect against newer types of threats such as cyber-attacks and APTs. I believe that as cloud technologies mature, cloud providers will need to address this concern so that customers who utilize cloud infrastructure can gain visibility into their security postures within the cloud. Similarly, with increasing adoption of mobile technology, the traditional security perimeter is no longer secure. Wireless mobile technology security analysis is expected to become an increasing requirement for SIEM and

T
CIOReview CIOReview

oday, increasingly customers are interested in cloud security and IT security in general. More and more customers are paying attention to breaches, and becoming more aware of different types of breaches such as APTs and cyber-attacks, while at the same time trying to meet compliance challenges. In the IT security vertical, increasingly customers are talking about the challenges of meeting new headaches with limited IT budgets and a huge shortage of security

professionals. Now if one talks about the segment EIQ addresses SIEM and log managementthe trends seen are: demands for visibility into security and compliance, automation of security analysis and correlation tasks, meeting security threat detection challenges in a cost effective fashion and deriving value from their investments quickly. Unfortunately, SIEM and log management solutions to-date have failed to address these challenges as every vendors solution has proven cumbersome to deploy, expensive to procure, and requires constant tuning over long periods of time that too only

log management vendors to address in the near future. In our perspective the recently issued executive orders from President Obama with regard to cyber security as the first step towards a comprehensive cyber security law. I am of the opinion that this law would incorporate and address private sector concerns while at the same time providing information sharing and collaboration between government and private sector which will provide additional security to critical infrastructure such as banking, industry, telecom and utilities sectors. I predict that cyber-attacks will continue to increase in sophistication and intensity, which would finally force companies of all sizes to begin focusing more on security versus traditional approaches taken of checkbox compliance. In order to address these challenges, customers must implement next-generation security analysis solutions that provide proactive answers to potential problems.

talent with large companies. Second, entrepreneurs that have ideas that can radically change the industry must overcome big companies with brand name recognition as well as these companies ability to slow innovations through confusing marketing messages. But as an entrepreneur, it is also very gratifying when we are not only able to win against goliaths with brand names, but also able to deliver the best possible security protection for customers.

Good Service is not a Synonym of Brand name


One of the challenges entrepreneurs always face is to compete for quality

The number of users of mobile video calling services will increase four-fold to almost 160 million by 2017. The reasons for the increase would be the improvements in both the user-interface and the underlying technology. Courtesy: Juniper Research

| |40 | 40|

Vijay Basani
March 2013 March 2013

CIOReview

|41|

March 2013

Technology
initiatives is also the fact that every enterprise IT database admin person has been using SQL for years and it makes no sense to re-invent what has been working well for decades let alone the reality of existing skilled resources. So with the next generation of Big Data solutions, users will be able to move fluidly between MapReduce jobs where there are faced with a very large data set that needs to be sifted and transformed, through to full SQL based BI tools to access the same data. This essentially removes the need to migrate or move the data to a completely different environment to conduct business analytics. With this come key advantages and a number of benefits; firstly it leverages the low cost scalability of Hadoop, which costs a fraction of proprietary analytical appliances, and more importantly it removes the need to have disparate data environments or silos. Many of the initial use cases where Hadoop has been adopted is the pre-processing engine that then feeds aggregated data into the analytical warehouse which has created a separation from the analytical application and the detailed big data. By mashing up analytics on the same platform there is always the ability to access the detail and perform analytics outside the limits of the summary data that often feeds dashboards and other visualization or dashboard tools. From a technical perspective what we are talking about is essentially two access paths to the same data MapReduce using the more conventional SQL access. Depending upon the question being asked these offer different capabilities and benefits so bringing them together increases the power and capabilities of the Hadoop platform. The next phase will be for these different access paths to converge, the ability to embed SQL within a MapReduce job or for example have a MapReduce user defined function called within a SQL statement. A specific example might include a large Telco operator conducting web click stream analytics where MapReduce would be the ideal tool to perform such a long-running task or jobs putting sessions together based on customer profiles in order to determine which pages were viewed and for how long and then run a SQL query or use a BI tool query where you may ask which customer demographic stayed on a specific web-page for the longest duration. We also believe that this will be extended even further, and an area we are particularly interested in is the ability to interoperate on the same data with MapReduce, SQL and even free text search. We believe that having the most flexible access methods is critical and depending on the query and the user skill set, they can determine the best path and most efficient mechanism to glean the answers they are looking for. Hadoop MapReduce and SQL mashed-up make the perfect enterprise match and if used correctly might just be a heavenly thing.

Hadoop MapReduce & SQL Mash Up: A Match-Made in Enterprise Heaven?


By John Bantleman, CEO, RainStor RainStor is a database designed to manage and analyze Big Data for large enterprises at the lowest total cost. Headquartered in San Francisco, the company has raised a total amount of $19.5 million from Credit Suisse, Doughty Hanson, Technology Ventures, Storm Ventures, The Dow Company, Rogers Venture Partners and Informatica.

John Bantleman

Moving From MapReduce jobs through to full SQL based BI tools removes the need to move the data to a different environment to conduct business analytics
distribution leader Cloudera, with its recent Impala announcement. These innovations are also met by more established vendors including Microsoft who recently announced Polybase. Essentially what these products deliver (or promise to) is high performance analytics directly against data running on the Hadoop platform, with varying approaches, and the common denominator of speed as the driver across all these solutions. The undercurrent across all these

A
CIOReview

s Big Data moves to the mainstream enterprise, one major theme has emerged and is driving the next generation of Big Data solutions - the need to extend beyond the batch limitations of MapReduce and deliver high performance (real-time) analytics. Hadoop is in effect moving from being a file-based system to manage unstructured data to a data operating platform that addresses the broader needs to manage Big Data within

the enterprise. A major limitation to growing adoption has been that the core data processing environment, which is massively scalable, but arguably a slow batch system, requiring organizations to essentially move (what could be 100s of Terabytes) to a secondary data warehouse to deliver fast analytics for the business. RainStor has been leading this charge for quite some time now and over the last year we have seen a number of announcements that make the shift a very clear trend. Announcements from others in the market include newer vendors such as Hadapt and more recently the Hadoop

Worldwide mobile phone sales to end users totaled 1.75 billion units in 2012, a 1.7 percent decline from 2011 sales. Smartphones continued to drive overall mobile phone sales, and the fourth quarter of 2012 saw record smartphone sales of 207.7 million units, up 38.3 percent from the same period last year. Courtesy: Gartner

|42|

March 2013

CIOReview

|43|

March 2013

View Point

Time to Deliver Efficiencies in Care Delivery Process


By Omar Hussain, President & CEO, Imprivata Inc. Headquartered in Lexington, Imprivata Inc. is a provider of secure access and collaboration solutions for healthcare. Founded in 2002, the company has raised a total funding of $23.9 million from SAP Ventures, Polaris Venture Partners, Highland Capital Partners and General Catalyst Partners.

Mobility revolutionizing Medical Industry


The biggest trend today is mobility. The possibilities are endless. Recently Mary Meeker of Kliener Perkins Caufield Byers predicted that the global smartphone and tablet installed base will exceed the PC installed base by Q2 2013 just weeks from today. Text messaging has become the standard method of communication. We text our friends, our kids, our colleagues - and doctors are no different. They want the same convenience of texting at work that they h a v e become

like Imprivatas Chief Medical Officer, Sean Kelly, the ability to instantly text message the on-call cardiologist a picture of a patients EKG, and quickly mobilize the catheterization lab can literally save a life. The ability to send secure, HIPAA compliant text messages is a perfect example of how technology can help to solve the healthcare crisis and Imprivata is helping. When we started talking to many of our customers about texting, we often heard two different stories: the CMIO would say that texting was not happening and was not allowed. Then the CIO would tell me that it was happening all over the place, and he was panicked about the security risk, potential law suits, and the damage to the hospitals reputation. We shipped Imprivata Cortext, our HIPAA compliant texting solution only five months ago, and already more than 500 hospitals are enrolled. That tells you something. I have been in the enterprise technology space for a long time, and I have never seen adoption like this.

Omar Hussain

accustomed to in all other aspects of their lives. They also want to do the right thing when it comes to their patients security and privacy, but efficient, high quality care trumps everything for doctors. For an ER doctor
CIOReview

Healthcare Industry Embracing Technology


We are already beginning to see radical change on two vectors; a drastic technology revolution is taking place at the same time that the industry itself is undergoing a tremendous transformation. On the technology front the digital natives are already in the workforce. The doctors coming out of medical school today have grown up with smartphones, Xbox, Facebook, Twitter and Instagram. They are demanding the same level of invisible technology in the workplace. The bar has been raised

It is easy to think youve made it when you have experienced significant growth in a short period of time and there is still plenty of upside in the market
substantially and vendors have to stay ahead of the curve. The proliferation of smartphones and other mobile devices is having

"

a huge impact on healthcare. There are 2.4 billion global internet users and 1.2 billion global smartphone subscriptions today. Patients have the tools to take a more active role in their own care. The difference is drastic compared to even 10 years ago. Today patients compare doctors and treatments on-line through services like Healthgrades. They consult with other patients with the help of tools like PatientsLikeMe. They can monitor their own vital signs using their smartphones. This patient involvement is all good and necessary in order for us to improve outcomes, increase efficiency and lower costs. Meaningful Use is driving the change here in the U.S., but other countries are on the same track as well. All industrialized countries are facing the same issues, and looking for dramatic and much needed efficiencies in the care delivery process. Technology is the only option we have. With an aging population on a global scale, the skyrocketing cost of care, and healthcare accounting for 18 percent GDP - and growing fast our current model is unsustainable. Every other major industry has applied technology to increase efficiency and improve quality. Look at finance, manufacturing or retail. They have all been way ahead of healthcare in terms of automation. Yet, in the past few years, we are seeing healthcare actually beginning to leap frog the others and thats largely due to meaningful use which in my opinion, has been great for the industry. We have customers all over the world, and I find it interesting that when I speak with CIOs in the U.K., France or Germany for example, they tell me that they would welcome similar legislation to help drive the adoption of electronic health records in their countries. The sweeping benefits will come down the road, but we are making

substantial progress already. We have some very forward thinking customers who are seeing terrific results. Augusta Medical Center has been able to tie shorter hospital stays to faster medication adjustments for patients as a result of higher adoption of CPOE. Intermountain healthcare, a pioneer in evidenced-based medicine, has greatly improved the quality of care by analyzing the vast data they have collected over the years. One example is that they were able to determine that 39 weeks is the optimal gestation age for babies delivered in their hospitals. So by adhering to that 39 -week standard, whenever possible, patients have less complications and better outcomes, and as a result, Intermountain has lower costs.

Focus on Solving Strategic Problems


The biggest challenge entrepreneurs face is complacency. It is easy to think youve made it when you have experienced significant growth in a short period of time and there is still plenty of upside in the market. You listened to the market and understood its needs, which helped deliver a best in class product. But markets are cyclical and requirements change. This is especially true in healthcare, as the market is undergoing an unprecedented transformation. To be successful, you have to stay vigilant, listen, observe and continue to make bets, because all it takes is one difficult economic cycle or industry shift to learn the tough lesson that a company is not built on revenue alone it is built on the value it delivers to the marketplace. Entrepreneurs can easily become complacent as they begin to achieve fiscal success, but it is important to constantly reevaluate the problems you are solving and the value you are delivering to customers. The companies that solve strategic problems are the companies that survive and thrive in any economic cycle.

|44|

March 2013

"

CIOReview

|45|

March 2013

VC Talk

Digital Health and IT


are Exciting Opportunities
Sachin Gupta, Investment Partner, Skyline Global Partners Headquartered in Chicago, Skyline Global Partners LLC is a lower middle market private equity firm which invests an average of $20 million in buyouts and growth equity investments in the U.S. and Canada. The main verticals of interest are healthcare, manufacturing and business services sectors.

S
CIOReview

pending a lot of time looking at healthcare and medical related technologies made investment in products and services that can lower the cost of healthcare a top priority. This has to be a fundamental thesis for anyone in this space. To that extent, having invested in everything from biotechnology to medical clinics, there is a particular excitement about the opportunities that exist in digital health and IT. Fundamentally the incremental cost savings to society from a new promising drug or device does not compare to the savings that can be achieved from streamlined processes enabled by IT across the continuum of healthcare. So there is a liking for enterprise focused healthcare technologies that improve efficiencies for all constituents in the process.

More technology needs to be developed to better monitor patients without them even knowing they are being monitored
CIOReview

|46|

March 2013

|47|

March 2013

The biggest challenge entrepreneurs face is developing a new service or product that an enterprise customer will actually pay for
Technologies for the Future

The interest lies in developments occurring in everything from telemedicine, kiosk-based healthcare used for tasks such as health screenings or pharmacy dispensing to software designed to allow insurance companies and providers to communicate, authenticate and transact more swiftly. It is intriguing about the working of technologies that truly help with connectivity and the sharing of

"

patient portals. Patients will finally be empowered with more information.

Opportunity for Technology Enabled Products


There are lots of opportunities for technology enabled products that provide continuous diagnoses in a passive and non-intrusive manner. This includes everything from disposable patches to smart sensors placed in homes and hospitals. Medical events become events well after initial warning signals are available. More technology needs to be developed to better monitor patients without them even knowing they are being monitored thus improving compliance and catching events earlier. We are just scratching the surface of home based telemedicine. Additionally, more healthcare IT companies need to think globally in terms of the market for innovations. The U.S. market may be great now, but we are late in the cycle here for certain areas of health IT, while demand is just starting to pick-up abroad. From an exit perspective, many of the big guys will need to buy their way into an international presence. So why not be there already for them to buy?

Sachin Gupta

that may be better than incumbent solutions but do not warrant a customer to want to actually pay for it, especially if what they have is good enough. Technologies need to have a compelling value proposition and today in healthcare; cost savings coupled with better and faster is a becoming mandatory requirement.

information. For example, a new legislation in the U.S. will now make it mandatory for lab companies to give patients access to their own lab results (vs. just sending it to the doctor). This should give the patient an ability to push his/her information to whomever they want, including second opinions, alternative medicine doctors and even websites such as disease specific

An Entrepreneurs Challenge
The biggest challenge entrepreneurs face is developing a new service or product that an enterprise customer will actually pay for. Too many companies are developing neat ideas

The emerging data-asa-service trend could significantly grow the market for business intelligence (BI) and analytics platforms. Worldwide BI software revenue will reach $13.8 billion in 2013, a seven percent increase from 2012. The market is forecasted to reach $17.1 billion by 2016. Courtesy: Gartner

CIOReview

|48|

March 2013

CIOReview

|49|

March 2013

CIOReview

|50|

March 2013

CIOReview

|51|

March 2013

S-ar putea să vă placă și