Enterprise CIO Forum - Thriving in a technology-enabled world https://www.enterprisecioforum.com/en/ContentVault en QTP Course in Chennai for Enhanced Career https://www.enterprisecioforum.com/en/blogs/mathews123/qtp-course-chennai-enhanced-career <p>Quick Test Professional (QTP) is now called as HP Unified Functional Testing (UFT). It is one of the leading automation tools available in the market to carry out functional and regression testing. This testing tool comes with Graphical User Interface (GUI) that allows you to perform test action using VBScript. This automation tool features array of plugins which allows testing of software applications that building on various programming languages like .NET, Delphi, web applications, etc. This automation testing suite used to validate wide range of web applications and software products using its extensive features, custom test script action, ease of usage and extended plugins compatibility.</p><p>Software testing is the part of software development lifecycle. Software coders and testing professional works jointly to create stunning web or desktop applications that cater the requirements of individual or business needs. Being most trusted platform, QTP is automatic choice to conduct functional and regression testing for a software application. Software testers need to be familiar with different software development platform to stay updated with ever changing market. Writing test scripts with QTP automation testing tool is relatively simpler compared to other automation testing product. There is huge demand of skilled and experienced QTP application across software development industry all over the world.</p><p>&nbsp;The main advantage of using quick test professional is precise information and low cost maintenance.&nbsp; If there is any modification in test scripts, only test case field to be changed and startup code does not require any modification. This testing product makes whole testing process lot easier and comfortable. Most basic component in QTP keyword driven testing framework are the test cases file, control file, utility script, startup script and driver script. The control file is the base of keyword driven testing. It contains entire lists of test cases which needed to be executed. Startup scripts will execute the first step and starts the sequence. Driver scripts will check for the keywords and call upon the utility scripts for various functions.</p><p>Aspiring QTP professional can avail the advantage of good career, lucrative salary package, guaranteed growth and immense job opportunities in various fields. The main advantage of HP quick test professional is that you no need to have strong knowledge on software programming and development tools. Students from various educational backgrounds with basic programming languages can enter this lucrative domain. Learning HP quick test professional is lot easier, you can learn it easily compared to other programming languages.</p><p>FITA offer well-panned <a href="http://www.fita.in/qtp-training-in-chennai/" rel="nofollow"><strong>QTP training in Chennai</strong></a> to give professional training for aspiring students and professionals. With us, students can enjoy the flexibility of pursuing the course based on their convenience and own faces. Course syllabus from industrial experts with rich experience on software testing domain and lot concentrates on practical way of teaching. We limit our students up to four in a group, in order to provide individual attention to everyone. In addition to quality training through industrial experts, students can enjoy 100 percent placement through our dedicated human resources and staffing team. Join FITA reputed <a href="http://www.fita.in/qtp-training-in-chennai/" rel="nofollow"><strong>QTP training institutes in Chennai</strong></a>, to be successful QTP professional in leading software development industry.</p> https://www.enterprisecioforum.com/en/blogs/mathews123/qtp-course-chennai-enhanced-career#comments Technology IT Performance Blog-post Thu, 20 Nov 2014 12:03:52 +0000 mathews123 11131 at https://www.enterprisecioforum.com 5 Horrors of Software Development Outsourcing https://www.enterprisecioforum.com/en/blogs/natalia-pankova/5-horrors-software-development-outsourci <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> How to deal with main horrors that beginner outsourcer may have? </div> </div> </div> <p>For some people application development outsourcing still seems to be too complicated. They are afraid even to think about such possibility. For such people fear may be stronger than possible benefits of outsourcing.</p><h2>Lets have a look at five situations that may make inexperienced outsourcer to wake up in horror.</h2><h3>1.Outsourcing provider abandons the project.</h3><p><strong>Situation</strong>: You have found a perfect contractor, you are waiting to receive great result and suddenly you get an email that all provider’s team has quit. You have lost time and got nothing.&nbsp;</p><p><strong>Solution</strong>: Outsource only part of work, leave key stages in house. Choose&nbsp;<a title="agile" href="http://www.smissltd.com/blog/agile-or-waterfall" rel="nofollow">agile method</a>&nbsp;when you can check intermediate result and receive at least a trial version.</p><h3>2.Outsourcing provider is late with release.&nbsp;</h3><p><strong>Situation</strong>: You have agreed for exact time to release your product, advertising and marketing companies are ready, but your outsourcing provider is late. All your plans are ruined. And in our quickly changing world the whole project may be ruined. &nbsp;&nbsp;</p><p><strong>Solution</strong>: Sign detailed contracts, control every step and never pay 100% beforehand. Stay tuned! Don’t think that your outsourcing provider is a magician and will take your ideal software product out of hat by just waving a magic wand. He is just a usual person that makes mistakes, and you should treat him as your usual employee, providing sufficient control and support.</p><h3>3.The result is wrong.&nbsp;</h3><p><strong><img title="confused" src="http://www.smissltd.com/sites/default/files/confused_computer_keyboard.jpg" alt="confused" width="200" height="150" />Situation</strong>: You have described in detail what you want to receive, but when it is ready, you realize that everything is wrong – design, functionality, technical details, etc.&nbsp;</p><p><strong>Solution</strong>: Use written instructions! It would be easier for both – your provider and you. You will have enough time to think about all details. And your provider will always have instructions in front of him and won’t omit any minor detail.&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><h3>4.Poor quality in output.&nbsp;</h3><p><strong>Situation</strong>: You find provider with low cost and rich portfolio. You discuss everything and pay in advance, but you get at the end is even not close to the level you expected.</p><p><strong>Solution</strong>: check provider’s background and references. Choose provider that is experienced exactly in your niche. Get acquainted with key members of provider’s team and make sure that they exactly the professionals that you expect them to be. Pay attention to contract. Develop detailed plan and payment schedule, so that you pay for the result you want to get.&nbsp;</p><h3>5.The cost appears to be different.</h3><p><strong>Situation</strong>. You agreed with provider, discussed all details, he started work, but then it appears that the project is more complicated than it was expected, provider needs more time and resources. And in output you have to pay a lot more than it was agreed at the beginning. &nbsp;</p><p><strong>Solution</strong>. Detailed documentation. First,&nbsp;<a title="requirement specification" href="http://www.smissltd.com/blog/ideal-requirement-specification" rel="nofollow">requirement specification</a>&nbsp;(double check it before agreed), then development schedule and contract. Check that there is an option for additional tasks and modifications. Make sure that you understand how long each stage will take and how much you will pay for it.&nbsp;</p><p>&nbsp;</p><p>In conclusion I would say that the main solution for all described above situations is client’s reasonable approach (well-thought-out requirement specification,&nbsp;<a title="outsourcing provider" href="http://www.smissltd.com/blog/questions-outsourcing-partner" rel="nofollow">wise choice of provider</a>, detailed contract, constant control and right motivation) and provider’s professional attitude (stick to contract rules, diligent implementation, high-level professionalism).</p><p>Just be careful, thoughtful and attentive to details and IT outsourcing will turn from nightmare to fairy-tale!&nbsp;</p><p>&nbsp;</p><p><em>Did you experience any negative situations with IT outsourcing? How did you solve them?&nbsp;</em></p> https://www.enterprisecioforum.com/en/blogs/natalia-pankova/5-horrors-software-development-outsourci#comments Business Issues Applications Blog-post application development outsourcing Software Development Outsourcing Wed, 19 Nov 2014 21:13:20 +0000 Natalia Pankova 11126 at https://www.enterprisecioforum.com Dropbox Software Glitch https://www.enterprisecioforum.com/en/blogs/lynnzhou/dropbox-software-glitch <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Lost Files May be Restored, but What About Lost Confidence? </div> </div> </div> <h1>Mr. Murphy (of Murphy’s Law fame) has a way of seeing to it that data is lost when you need it most, and he is apparently undeterred by the Cloud Computing Revolution.</h1><p>Still reeling from the iCloud breach, the Cloud Computing industry faces another PR hit – lost files due to a software glitch in the popular Dropbox application. The glitch is the latest in a series of incidents involving Dropbox, including an August 2012 security breach in which customer email addresses were stolen from Dropbox employee’s accounts, and recent concerns about Dropbox’s approach to addressing security vulnerabilities and notification of breaches.</p><p>Kudos to Dropbox for their response to this latest incident: a prompt mea culpa, a succinct explanation of the problem and who is affected, a quick software patch, and a free upgrade to the Dropbox Pro product. According to a company post on Hacker News, the file loss occurs if you use the Selective Sync features and the application is shut down or restarted when a selective sync is in progress. Dropbox has patched the desktop client, retired older versions of the Dropbox client, and ensured that users have the patched version. Affected users may receive a free one year subscription to the Dropbox Pro product which offers basic collaboration features and 1 TB of storage (normal pricing is $9.99 a month or $99 a year).<br />Some users report years of lost data. One case in particular has gone viral; that of Jan Čurn, co-founder and CTO at photography software platform VirtualRig Studio. Čurn has used Dropbox since 2009 and reports losing 8,343 files stored over that five year period. While the whereabouts of Čurn’s files have yet to be determined, Dropbox has been able to restore some user files, contacted affected users, and provided listings of restored files. It remains to be seen how much data can be restored.<br />It is important to note that the software bug is not related to security or malicious hacking, and that the bug affected personal users and not business users. Cloud storage products for Business Use require flexible user and file permissions setup, state of the art encryption standards, history logging, and remote administrative features. An example is the Secure.Share product from ComputerSupport.com. Aimed at small to medium sized business, it offers military grade, 448-Bit Blowfish encryption. Data is encrypted both in transit and at rest using SSL, and two factor authentication can be utilized. Accounts are managed from a single dashboard, and versioning and update notification features similar to Microsoft SharePoint are available for document collaboration. Additional security and administrative features include File History Sharing and remote data wiping.<br />Unfortunately for the affected Dropbox users, many used Dropbox as their sole document repository. The takeaway (painfully learned by the affected Dropbox users) is that personal cloud storage is not a substitute for regular backups. You’ve heard it before (and like me, have ignored it and paid the price) – regularly back up critical data and ensure it is two separate locations. This was true in the era of 5 ¼” inch Floppy Disks and is true today.</p><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/lynnzhou/dropbox-software-glitch#comments Technology Security Blog-post cloud security data breach DropBox iCloud breach Wed, 19 Nov 2014 16:34:39 +0000 LynnZhou 11116 at https://www.enterprisecioforum.com Public, Private and Hybrid Clouds https://www.enterprisecioforum.com/en/blogs/lynnzhou/public-private-and-hybrid-clouds <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> The Difference And When It Matters </div> </div> </div> <p>A decision maker at an SMB is trying to keep things simple (or at least no more complicated than they have to be). Saving money for outsourced services gets everyone’s attention, and the promise of Cloud Computing undoubtedly gets yours. While most of the technical details are delegated to your hard working CIO, Directors, and foot soldiers, there are some concepts it’s good to have an overview of – because of their effect on your data security and your bottom line.There are three categories of Cloud Computing Environments you’ll hear your IT staff talking about – a&nbsp;<strong>Public</strong>&nbsp;Cloud, a<strong>Private</strong>&nbsp;Cloud or a&nbsp;<strong>Hybrid</strong>&nbsp;Cloud. The differences between the three involve the&nbsp;<strong>capital investment&nbsp;</strong>of each, and the<strong>data security</strong>&nbsp;level provided by each.</p><p><strong>The Public Cloud</strong></p><p>The Public Cloud is all around us. If you used Google Docs, Google Drive, Dropbox, or Microsoft OneDrive, you’ve use the public cloud. In the Public Cloud, all the infrastructure and maintenance are provided off site. This is the ideal choice for most SMBs.</p><p><strong>Advantages</strong>: &nbsp;A Public Cloud:</p><ul><li>Takes all of the&nbsp;<strong>overhead</strong>&nbsp;of IT operations off of your shoulders.</li><li><strong>Simplifies accounting</strong>&nbsp;in that you pay fees instead of overhead and effort involved in Capital Expenditures.</li><li><strong>Increased demand</strong>&nbsp;is&nbsp;<strong>simply a matter of purchasing more bandwidth and/or services</strong>. For example, If you need more capacity during the Christmas buying season, you can purchase more capacity during the season (as opposed to purchasing equipment and systems that must have capacity that is not needed for a majority of the year).</li></ul><p><strong><br /></strong></p><p><strong>Disadvantage</strong>: &nbsp;You are using shared resources with other organizations, which makes a Public Cloud less secure than a Private Cloud. &nbsp;However, It is important to note that the resources of a Cloud Vendor are far greater than a typical SMB, and that the environment of your Cloud Vendor is still more secure than an environment in the traditional IT space</p><p>In short, a Public Cloud is ideal when:</p><ul><li>a standalone IT Operation represents major overhead to your business,</li><li>You use standard applications (Such as Microsoft Office),</li><li>You use Cloud applications by major vendors (such as Adobe Creative Cloud or SalesForce), or:</li><li>You do a lot of collaborative projects over a disbursed area.</li></ul><p><strong><br /></strong></p><p><strong>Private Clouds</strong></p><p>A&nbsp;<strong>Private Cloud&nbsp;</strong>is one where a Cloud Infrastructure is used by a single organization. It provides the most security, but requires that the organization have the resources to maintain the environment (and typically an SMB is turning to the Cloud to avoid that overhead!). Recently, Public Cloud Vendors have started offering Private Cloud Services at a premium– i.e., Cloud Environments which are segregated from their public services.</p><p>Because of the extra overhead and/or premium costs, Private Clouds are only desirable if you are in an industry with stringent security or data privacy demands, or your business is by nature financial data, intellectual property, or being a custodian of either. Consider leasing Private Cloud Services from your vendor if you have a genuine need for top level security, but don’t have the resources to support it in house.</p><p><strong>Hybrid Clouds</strong></p><p>A Hybrid Cloud is one that, as the name implies, have elements of a Public Cloud. For example, you have Financial Data you want to maintain in a Private Cloud, but also have collaborative efforts for which you want to use a Public Cloud. Large corporations with vertical markets are potential candidates for a hybrid cloud; a typical SMB would not have a need or have the resources to support one.</p><p>All businesses have unique needs, and you know your business better than anyone. The right Cloud Service Provider works with you to find the best solution for your unique situation.</p> https://www.enterprisecioforum.com/en/blogs/lynnzhou/public-private-and-hybrid-clouds#comments Technology Cloud Blog-post cloud costs cloud management hybrid cloud private cloud public cloud SMB Wed, 19 Nov 2014 16:26:06 +0000 LynnZhou 11111 at https://www.enterprisecioforum.com Healthcare Interoperability https://www.enterprisecioforum.com/en/blogs/drpravinapawar/healthcare-interoperability <p>Interoperability refers to the ability to share and manage information between devices and information systems within and across organizational boundaries.</p><p>&nbsp;According Health Information and Management Systems Society (HIMSS) defines <strong><em>Interoperability</em></strong> as-</p><p>"The ability of different information technology systems and software applications to communicate, exchange data, and use the information that has been exchanged.&nbsp;Data exchange schema and standards should permit data to be shared across clinicians, lab, hospital, pharmacy, and patient regardless of the application or application vendor.”</p><p>&nbsp;HIMSS further identifies three levels of digital health information technology interoperability:</p><p>a) <strong>Foundational Interoperability:-</strong></p><p>&nbsp; &nbsp; Foundational interoperability allows data exchange between health-IT systems without requiring that the receiving health IT system have the ability to interpret the data.</p><p>b) <strong>Structural Interoperability:-</strong></p><p>&nbsp; &nbsp; Structural interoperability is an intermediate level that defines the structure or format of data exchange (i.e., the message format standards) where there is uniform movement of healthcare data from one system to another such that the clinical or operational purpose and meaning of the data is preserved and unaltered.</p><p>&nbsp; &nbsp; Structural interoperability defines the syntax of the data exchange. It ensures that data exchanged between health-IT systems can be interpreted at the data field level.</p><p>c) &nbsp;<strong>Semantic Interoperability:-</strong></p><p>&nbsp; &nbsp; &nbsp;Semantic interoperability provides interoperability at the highest level, which is the ability for two or more systems or elements to exchange information and to use the information that has been exchanged.</p><p>&nbsp; &nbsp; &nbsp;Semantic interoperability takes advantage of both the structuring of the data exchange and the codification of the data—including vocabulary—so that the receiving health IT systems can interpret the&nbsp;Data.</p><ul><li>&nbsp;<strong>Importance of Interoperability:-</strong></li></ul><p>&nbsp;- Interoperability is important because it allows important information to be shared as appropriate to meet the needs of patients and organizations—as opposed to being held in the silo of a specific software application, device, or healthcare entity.</p><p>- Healthcare organizations use diverse health IT software and hardware solutions – which are typically obtained from a variety of vendors.</p><p>- When common standards exist, a common language for communication is created—increasing the potential for interoperability among these diverse systems both internally and externally.</p><p>- The existence of shareable data that can interface universally with other systems improves continuity of care and healthcare outcomes by helping healthcare providers and organizations function from a consistent and centralized body of patient information.</p><p>- This increases competition in the marketplace—which helps to drive innovation, improve quality, and reduce costs.</p><p>- This level of interoperability supports the electronic exchange of patient summary information among caregivers and other authorized parties via potentially disparate&nbsp;(EHR) systems and other systems to improve quality, safety, efficiency, and efficacy of healthcare delivery.</p><ul><li>&nbsp;<strong>Current Market and Industry Trends in Interoperability:-</strong></li></ul><p>&nbsp;- Progress in interoperability has been slow. Some large manufacturers have pursued interoperability between their own products, but not with products from other vendors.</p><p>- In such a competitive environment, there’s not been much incentive to do so thus far. However, government mandates, financial incentives and the pressure to reduce operating costs are slowly driving vendors and healthcare organizations to embrace interoperability.</p><p>- It appears that such external factors will be needed to move this initiative forward—which will most likely occur when it’s viewed as an essential component of high-value offerings.</p><ul><li>&nbsp;<strong>Important factors driving interoperability include:-</strong></li></ul><p>- Government mandates</p><p>- Pressure to cut healthcare costs</p><p>- Desire to increase efficiencies</p><p>- Desire to optimize work flow</p><p>- Desire to limit paperwork</p><p>- Desire to increase productivity</p><p>- Desire to create real-time communications between healthcare professionals</p><p>- Growing demand to integrate healthcare systems</p><p>- High ROI related to health IT systems</p><ul><li>&nbsp;<strong>Factors inhibiting interoperability include:-</strong></li></ul><p>- Lack of electronic data</p><p>- Poor quality of data</p><p>- Inconsistent standards in health IT systems</p><p>- Lack of vendor-vendor, vendor-provider and provider-provider cooperation</p><p>- Complexity of interoperability</p><p>- Lack of standardized healthcare protocols</p><p>- Inadequate health IT budgets within healthcare organizations</p><p>- Outdated legacy systems still in use</p> https://www.enterprisecioforum.com/en/blogs/drpravinapawar/healthcare-interoperability#comments Technology Converged Infrastructure Services Blog-post Communication Healthcare Interoperability Information exchange Information technology. Wed, 19 Nov 2014 12:23:23 +0000 drpravinapawar 11106 at https://www.enterprisecioforum.com Who has the largest claim on data, analytics? https://www.enterprisecioforum.com/en/blogs/jdodge/who-has-largest-claim-data-analytics <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> LOB? CIO? CFO? Who owns them? Come #CIOchat 2-3 p.m. ET Thursday. </div> </div> </div> <p>Who owns data and analytics? LOB? CIO? CFO? Probably all of them and sometimes none of them. That is our #CIOchat topic for this Thursday - 2-3 p.m. ET.&nbsp;</p><p>Long time ECF blogger <a href="http://www.enterprisecioforum.com/en/users/mylessuer" rel="nofollow">Myles Suer</a> makes a strong case that it should be the CFO is his post "<a href="http://www.enterprisecioforum.com/en/blogs/mylessuer/who-owns-enterprise-analytics-and-data" rel="nofollow">Who owns enterprise analytics and data?</a>" The CFO, he argues, is the closest to the data although he cites CIOs from several companies who have varying opinions on ownership.</p><p>In any event, it'll be a rich topic for our #CIOchat this week. It is also our featured CIO Question where you can go on at length.</p><p>Join us for some great conversation in either place.&nbsp;The #CIOchat will be off Nov. 27, Thanksgiving Day, and will return Thursday, Dec. 2.</p><p><em>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort" rel="nofollow">@thedodgeretort</a> on Twitter.</em></p><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/jdodge/who-has-largest-claim-data-analytics#comments Business Issues CIO Leadership Big Data Blog-post analytics Big Data CFO CIO IT LOB Tue, 18 Nov 2014 20:16:47 +0000 jdodge 11091 at https://www.enterprisecioforum.com Who owns enterprise data and analytics? CFO? CIO? LOB? None or all of the above? https://www.enterprisecioforum.com/en/question/who-owns-enterprise-data-and-analytics-c https://www.enterprisecioforum.com/en/question/who-owns-enterprise-data-and-analytics-c#comments CIO Leadership Big Data CIO Questions Tue, 18 Nov 2014 19:46:21 +0000 myles.suer 11086 at https://www.enterprisecioforum.com Can Your Security Protection Keep Up with Roaming Mobile Workers? https://www.enterprisecioforum.com/en/blogs/paullipman/can-your-security-protection-keep-roamin <p>As 2014 comes to a close, many of us in the security industry cringe as we look back at a year full of massive, high profile security breaches. In spite of major investments of capital and time by large corporations, attackers are still getting through their defensive perimeters, and dwelling undetected long enough to do extensive damage. It’s become painfully clear that enterprises today are so interconnected, any gap in their widely dispersed infrastructures or ecosystems can provide an entry point for sophisticated cybercriminals.</p><p>Roaming mobile users are a real and growing part of the problem. The security industry has invested heavily in ever more advanced ways to defend the network, applications, and data from attack; new products and technologies are introduced at a dizzying pace. Customers have scrambled to keep pace, investing in defense-in-depth architectures to beef up their security posture. But if their solutions don’t carefully protect mobile workers and their devices as they move daily back and forth across the network perimeter, huge vulnerabilities still remain.</p><p>Even the most conscientious of mobile users (and let’s face it, most of us are relatively careless) heads out into a world full of unprotected Wi-Fi networks, inadvertently opens phishing emails and interacts with risky mobile apps. It has become all too easy for your mobile device to unknowingly become infected with malware, which you then bring back to the office. In no time at all, the malware infection is in the network—replicating, burrowing in, and getting ready to do its dirty work.</p><p>The problem is that the whole concept of the server-based network perimeter has evolved—security threats are so advanced and persistent that we can’t count on keeping the bad guys out. Moreover, the world is clearly moving to a mobile, cloud-based IT architecture. Much as security chiefs would like to maintain a high degree of control over a well-defined perimeter, it’s time to acknowledge a new reality.</p><p>To keep up with constantly shifting cyber threats and rapidly detect intrusions, security solutions must be flexible and adaptable. One thing you can count on is that hackers will find a way in, and your average roaming user creates a tunnel big enough to drive a train through. Most likely, you have limited budget resources for security measures, so you need a scalable, comprehensive solution that doesn’t require an upfront investment in hardware, software, or professional system administration installation. And you need it now—regulators, business partners, and even customers are demanding more accountability and proof of security. You need a solution that helps you demonstrate compliance before you start to lose business.</p><p>A multilayered, cloud-based security solution doesn’t require significant set up costs or labor, but can cover your security needs with a single solution from a single vendor. These types of solutions are priced per user, so they will grow with your business. The protection these services offer is constantly updated to cover ever-mutating malware and other types of vulnerabilities.</p><p>Controlling application use is as critical as blocking malware; a comprehensive web security solution should include the ability to remotely block the use of vulnerable, infected, and risky applications. Cloud-based web solutions are globally available, and incorporate all the platforms on which you do business—web sites, email, laptops, tablets, smartphones, etc...</p><p>Roaming users constitute a new reality that security professionals must address, and must address now. Allowing mobile devices in the workplace is unavoidable these days as the connected generation is upon us. But, there are effective ways to manage the risks they introduce. For businesses of any size, diligent training, clear policies, and a comprehensive security solution can reduce the risks of roaming and preserve the productivity of mobile workers.</p> https://www.enterprisecioforum.com/en/blogs/paullipman/can-your-security-protection-keep-roamin#comments Business Issues CIO Leadership Technology Big Data Cloud Converged Infrastructure Mobility Security Blog-post ByoD cloud computing cloud security Connected Devices Cyber security Cybersecurity Internet of Things IoT Mobile mobile applications mobile apps mobile security Security Tue, 18 Nov 2014 16:58:52 +0000 PaulLipman 11081 at https://www.enterprisecioforum.com Selected hybrid cloud reads https://www.enterprisecioforum.com/en/blogs/jdodge/selected-hybrid-cloud-reads <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Linthicum, Verstraete and McKendrick on hybrid cloud </div> </div> </div> <p>Hybrid clouds this year are forecast grow 48% in organizations with more than 1,000 employees, according a study by cloud consulting firm Rightscale. What's more, companies with multiple clouds will grow 78%.</p><p>The study is among dozens that predict large enterprises will adopt hybrid clouds at a record pace. What is a hybrid cloud? Quite simply, they are some combination of integrated public and private clouds and home grown data centers. The definition is <a href="http://en.wikipedia.org/wiki/Cloud_computing" rel="nofollow">one I modified from Wikipedia</a>,&nbsp;which comes by way of the National Institute for Standards and Technology.</p><p>So I've pulled together 11 (I am a Spinal Tap fan) of my favorite cloud blogs (<a href="http://research.gigaom.com/analyst/david-linthicum/" rel="nofollow">GigaOm analyst</a> David Linthicum and <a href="http://h18004.www1.hp.com/products/solutions/cloud_advisors/christian_verstraete.htmlhttp://h18004.www1.hp.com/products/solutions/cloud_advisors/christian_verstraete.html" rel="nofollow">HP blogger Christian Verstraete</a> to name two) and surveys. Give credit to Linthicum: he was on the hybrid bandwagon way back in 2011.</p><p>--&nbsp;<a href="http://www.infoworld.com/article/2625289/cloud-computing/why-the-hybrid-cloud-model-is-the-best-approach.html" rel="nofollow">Why hybrid is the best approach</a>&nbsp;(David Linthicum's prescient 2011 blog post)</p><p>--&nbsp;<a href="http://h20195.www2.hp.com/v2/GetDocument.aspx?cc=us&amp;doclang=EN_US&amp;docname=4AA4-9896ENW&amp;doctype=white%20paper&amp;lc=en&amp;searchquery=&amp;jumpid=reg_r1002_usen_c-001_title_r0001" rel="nofollow">Managing hybrid clouds</a>&nbsp;(an 8 page HP white paper)</p><p>--&nbsp;<a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/If-it-is-cloud-it-will-be-hybrid/ba-p/159160#.VGpoRlfF-yc" rel="nofollow">If it is cloud, it will be hybrid</a>&nbsp;(Verstraete's 2014 take on hybrid cloud)</p><p>--&nbsp;<a href="http://www.eguardtech.com/blog/eguard-blog/entry/2014/survey-hybrid-cloud-adoption-will-jump-by-56-percent-in-2015" rel="nofollow">Survey: Is hybrid a viable option for the enterprise?</a>&nbsp;(eGuard's post on an survey that says SMBs hybrid cloud adoption will rise 56% next year)</p><p>--&nbsp;<a href="http://smartdatacollective.com/vineetjain/280831/why-hybrid-will-be-next-chapter-cloud-adoption" rel="nofollow">Why hybrid cloud will be the next chapter for cloud adoption</a>&nbsp;(blogger Veneet Jain's take)</p><p>--&nbsp;<a href="http://www.moneycontrol.com/accelerateindia/article.php?autono=1226622" rel="nofollow">Top 10 cloud myths busted</a>&nbsp;(David Mitchell Smith's blog post that asks some hard questions)</p><p>--&nbsp;<a href="http://enterpriseinnovation.net/article/emergence-hybrid-cio-1113961060" rel="nofollow">The emergence of the 'hybrid CIO'</a>&nbsp;(Joe Poon's post on how the hybrid world impacts the CIO)&nbsp;</p><p>--&nbsp;<a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/If-it-is-cloud-it-will-be-hybrid/ba-p/159160#.VGpoRlfF-yc" rel="nofollow">4 steps to hybrid cloud</a>&nbsp;(another winner from Verstraete's <a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/bg-p/cloud-source#.VGt87FfF-yc" rel="nofollow">Cloud Source blog</a>)</p><p>--&nbsp;<a href="http://www.forbes.com/sites/joemckendrick/2014/06/21/clouds-direction-is-very-strategic-and-very-hybrid-survey-shows/" rel="nofollow">Cloud's direction is very strategic and very hybrid, survey shows</a>&nbsp;(blogger Joe McKendrick citing a cloud survey)</p><p>--&nbsp;<a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/If-it-is-cloud-it-will-be-hybrid/ba-p/159160#.VGpoRlfF-yc" rel="nofollow">Survey highlights the challenge of hybrid cloud</a>&nbsp;(Verstraete indentifies and analyzes hybrid cloud challenges)</p><p>--&nbsp;<a href="http://www.enterprisecioforum.com/en/whitepaper/blueprint-cloud-model-hybrid-environment" rel="nofollow">Blueprint of a cloud model for a hybrid envrionment</a>&nbsp;(a white paper done by CIO and HP)</p><p>What are your favorite hybrid cloud reads?</p><p><em>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort" rel="nofollow">@thedodgerertort</a> on Twitter</em>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/jdodge/selected-hybrid-cloud-reads#comments Business Issues Cloud Blog-post Applications CIO Data center hybrid cloud IT Mon, 17 Nov 2014 21:51:07 +0000 jdodge 11076 at https://www.enterprisecioforum.com Keep the infrastructure team away from cloud strategies? Yup! https://www.enterprisecioforum.com/en/blogs/blaberis/keep-infrastructure-team-away-cloud-stra <p>Ultimately cloud computing in most all its iterations is about infrastructure, right? Whether you are trying to minimize Capex or save your existing infrastructure for ‘Sunday best’ applications or trying to quickly scale to meet shifting business conditions. It comes down to infrastructure.</p><p>Therefore it is only logical that the infrastructure team at your organization should be front and center when it comes to planning cloud migrations. Right? Wrong! Because most infrastructure teams are inherently shortsighted, focusing on near-term goals instead of long term strategies.</p><p>At least that is the heart of the thesis developed by <a href="http://h18004.www1.hp.com/products/solutions/cloud_advisors/christian_verstraete.html" rel="nofollow">Christian Verstraete</a>, HP’s chief cloud technologist and a world-renowned blogger. In a<a href="http://www.enterprisecioforum.com/en/blogs/christian/why-infrastructure-teams-should-not-lead" rel="nofollow"> fascinating article</a>, Verstraete makes a more-than credible case for minimizing the role of the infrastructure team. In his view, cloud becomes a vehicle for moving IT away from a technology focus and toward a full-on service focus. In other words, ‘war is too important to be left to the generals,’ as a French statesman observed in WWI.</p><p>I urge you to check out this interesting and carefully conceived blog.</p> https://www.enterprisecioforum.com/en/blogs/blaberis/keep-infrastructure-team-away-cloud-stra#comments CIO Leadership Cloud Blog-post CAPEX CIO Cloud cloud computing cloud security infrastructure Mon, 17 Nov 2014 19:52:31 +0000 blaberis 11071 at https://www.enterprisecioforum.com Who owns enterprise analytics and data? https://www.enterprisecioforum.com/en/blogs/mylessuer/who-owns-enterprise-analytics-and-data <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Is it the CFO? What do you think? </div> </div> </div> <p>With the increasing importance of analytics to the enterprise, the question becomes who should own the analytics and data agenda. This question really matters today because, according to <a href="https://hbr.org/2006/01/competing-on-analytics/ar/1" rel="nofollow">Thomas Davenport</a>, “business processes are among the last remaining points of differentiation.” For this reason, Davenport even suggests that businesses that create a sustainable right to win use analytics to “wring every last drop of value from their processes”.</p><h2>The CFO is the logical choice?</h2><p>In talking with CIOs about both analytics and data, they are clear that they do not want to become their company’s data steward. They insist instead that they want to be an enabler of the analytics and data function. So what business function then should own analytics and data? Last week an interesting answer came from a <a href="http://ww2.cfo.com/analytics/2014/10/cfos-analytics/" rel="nofollow">CFO Magazine Article by Frank Friedman</a>. Frank contends that CFOs are “<strong><em>the logical choice to own analytics and put them to work to serve the organization’s needs</em></strong>”.</p><p>To justify his position, Frank made the following claims:</p><ol><li>CFOs own most of the unprecedented quantities of data that businesses create from supply chains, product processes, and customer interactions</li><li>Many CFOs already use analytics to address their organization’s strategic issues</li><li>CFOs uniquely can act as a steward of value and an impartial guardian of truth across the organizations. This fact gives them the credibility and trust needed when analytics produce insights that effectively debunk currently accepted wisdom</li></ol><p>Frank contends as well that owning the analytics agenda is a good thing because it allows CFOs to expand their strategic leadership role in doing the following:</p><ul><li>Growing top line revenue</li><li>Strengthening their business ties</li><li>Expanding the CFO’s influence outside the finance function.</li></ul><p>Frank suggests as well that analytics empowers the CFO to exercise more centralized control of operational business decision making. The question is what do other CFOs think about Frank’s position?</p><h2>CFOs clearly have an opinion about analytics and data</h2><p>A major Retail CFO says that finance needs to own “the facts for the organization”—the metrics and KPIs. And while he honestly admits that finance organizations in the past have not used data well, he claims finance departments need to make the time to become truly data centric. He said “I do not consider myself a data expert, but finance needs to own <a href="http://www.informatica.com/us/solutions/enterprise-data-integration-and-management/data-quality/#fbid=L3CixsK52is" rel="nofollow"><em>enterprise data and the integrity of this data</em></a>”. This CFO claims as well that “finance needs to use data to make sure that resources are focused on the right things; decisions are based on facts; and metrics are simple and understandable”. A Food and Beverage CFO agrees with the Retail CFO by saying that almost every piece of data is financial in one way or another. CFOs need to manage all of this data since they own operational performance for the enterprise. CFOs should own the key performance indicators of the business.</p><h2>CIOs should own data, data interconnect, and system selection</h2><p>A Healthcare CFO said he wants, however, the CIO to own data systems, data interconnect, and system selection. However, he believes that the finance organization is the recipient of data. “CFOs have a major stake in data. CFOs need to dig into operational data to be able to relate operations to internal accounting and to analyze things like costs versus price”. He said that “the CFOs can’t function without good operational data”.</p><p>An Accounting Firm CFO agreed with the Healthcare CFO by saying that CIOs are a means to get data. She said that CFOs need to make sense out of data in their performance management role. CFOs, therefore, are big consumers of both business intelligence and analytics. An Insurance CFO concurred by saying CIOs should own how data is delivered.</p><h2>CFOs should be data validators</h2><p>The Insurance CFOs said, however, CFOs need to be validators of data and reports. They should, as a result, in his opinion be very knowledgeable on BI and Analytics. In other words, CFOs need to be the Underwriters Laboratory (<a href="http://ul.com/aboutul/" rel="nofollow">UL</a>) for corporate data.</p><h2>Now it is your chance</h2><p>So the question is what do you believe? Does the CFO own analytics, data, and data quality as a part of their operational performance role? Or is it a group of people within the organization? Please share your opinions below.</p><p><strong>Related links</strong><br /> <strong>Solution Brief</strong>: <a href="http://www.informatica.com/us/vision/intelligent-data-platform/#fbid=6HpVUXgm3ow" rel="nofollow"><strong>The Intelligent Data Platform</strong></a><br /> <strong>Related Blogs</strong><br /> <a href="http://blogs.informatica.com/perspectives/2014/09/17/cfo-move-to-chief-profitability-officer/#fbid=FSkcGNkoan7" rel="nofollow">CFOs Move to Chief Profitability Officer</a></p><p><a title="CFOs Discuss Their Technology Priorities" href="http://blogs.informatica.com/perspectives/2014/09/11/cfos-discuss-their-technology-priorities/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">CFOs Discuss Their Technology Priorities</a><br /> <a title="The CFO Viewpoint upon Data" href="http://blogs.informatica.com/perspectives/2014/09/03/the-cfo-viewpoint-upon-data/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">The CFO Viewpoint upon Data</a><br /> <a title="How CFOs can change the conversation with their CIO?" href="http://blogs.informatica.com/perspectives/2014/07/07/how-cfos-can-change-the-conversation-with-their-cio/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">How CFOs can change the conversation with their CIO?</a><br /> <a title="New type of CFO represents a potent CIO ally" href="http://blogs.informatica.com/perspectives/2014/06/30/new-type-of-cfo-represents-a-potent-cio-ally/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">New type of CFO represents a potent CIO ally</a><br /> <a title="Competing on Analytics" href="http://blogs.informatica.com/perspectives/2014/08/22/competing-on-analytics-a-follow-up-to-thomas-h-davenports-post-in-hbr/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">Competing on Analytics</a><br /> <a title="The Business Case for Better Data Connectivity" href="http://blogs.informatica.com/perspectives/2014/06/25/the-business-case-for-better-data-connectivity/" target="_blank" rel="nofollow">The Business Case for Better Data Connectivity</a></p><p><strong>Twitter</strong>: <a href="https://twitter.com/MylesSuer" rel="nofollow"><strong>@MylesSuer</strong></a></p> https://www.enterprisecioforum.com/en/blogs/mylessuer/who-owns-enterprise-analytics-and-data#comments CIO Leadership IT Performance Blog-post analytics CFO CIO data Mon, 17 Nov 2014 17:52:44 +0000 myles.suer 11066 at https://www.enterprisecioforum.com CIOs Must Learn to Talk to the Board About Cybersecurity https://www.enterprisecioforum.com/en/blogs/jdodge/cios-must-learn-talk-board-about-cyberse <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> ”You can’t paint a rosy picture… but you don’t want to scare the crap out of them either.” WSJ CIO Journal </div> </div> </div> <p>This <a href="http://blogs.wsj.com/cio/2014/11/14/cios-must-learn-to-talk-to-the-board-about-cybersecurity/" rel="nofollow">Wall Street Journal CIO Journal post</a> is quite instructive about how CIOs should approach <a href="http://www.enterprisecioforum.com/en/ContentVault?sort_order=&amp;category=All&amp;topic=10&amp;categorytype=All&amp;uctype%5B%5D=3709" rel="nofollow">the topic of security</a> with boards. Indeed, it is a critical, frank and ongoing discussion.</p><p>In summary, it says to communicate often, grade yourself, strike a balance when it comes to expressing urgency (see the deck) and be aware of jargon and double meanings. For instance, the word "breach" can apply to things other than data.&nbsp;</p><p>Good read.</p><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/jdodge/cios-must-learn-talk-board-about-cyberse#comments Business Issues Security Quick Post CIO CISO Cyber security data breach IT Mon, 17 Nov 2014 16:35:16 +0000 jdodge 11061 at https://www.enterprisecioforum.com The real dilemma of IoT and Ethics https://www.enterprisecioforum.com/en/blogs/enadhan/real-dilemma-iot-and-ethics <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Can devices ever think like humans? </div> </div> </div> <p>"Discuss how you dealt with an ethical dilemma" goes the essay topic for a college application.&nbsp; A question commonly posed to comprehend the dynamics that force us to make those oh-so-difficult judgment calls.&nbsp; These are dilemmas for which there is no "right" answer varying from scenario to scenario, falling into the "gray area" – with no black-and-white answer.&nbsp; Humans are wired to make tough decisions bringing all the context and principles to bear.&nbsp; Similarly, can devices apply the available information to make the right judgment calls?&nbsp; To some extent, I would say.&nbsp; Will the IoT face ethical dilemmas?&nbsp; Absolutely! Question is will the IoT realize it?&nbsp; That is the real dilemma.</p><p>It is those "little gray cells" – one of the favorite phrases of the fictional character <a href="http://en.wikipedia.org/wiki/Hercule_Poirot" rel="nofollow">Hercule Poirot</a> created by <a href="http://www.agathachristie.com/" rel="nofollow">Agatha Christie</a>.&nbsp; Perhaps, they are gray having worked with a world of information -- and emotions – to make those difficult, but real, decisions.</p><p>Take the case of the <a href="http://en.wikipedia.org/wiki/Trolley_problem" rel="nofollow">Trolley Problem</a> introduced in 1967 referenced in this <a href="http://aeon.co/magazine/technology/can-we-design-systems-to-automate-ethics/" rel="nofollow">in this Aeon magazine article</a> by Tom Chatfield.&nbsp; Imagine you are the driver of a runaway tram heading down a track where 5 men are working. All are certain to die when the trolley reaches them.&nbsp; You can switch the trolley's path to an alternative spur.&nbsp; Unfortunately, one man is working on this spur and will be killed if the switch is made.&nbsp; As Chatfield explains, conventional wisdom would be to minimize the losses (1 fatality better than 5).&nbsp; We could build in such rules into devices to re-route the trolley accordingly.&nbsp;</p><p>Enter emotion.&nbsp; As the driver, you recognize the individual on the other track as someone you care about -- or taking it to the other extreme -- someone you perceive to be an adversary.&nbsp; Suddenly, the rules discussed above undergo some distortion.&nbsp; And you make a last minute decision in a fleeting second -- ethical post-mortem to follow later as needed.</p><p>Despite the ability to continuously collect data, is it really possible to introduce the "gray thinking matter" into the IoT?&nbsp; I say “No.”&nbsp; Only humans can think like humans.&nbsp; Moreover, the manner and extent to which ethics are applied defines our character and varies person to person.&nbsp; Perhaps, this is why <a href="http://owl.li/vP2Kg" rel="nofollow">computers can never be Data Scientists</a>.&nbsp;</p><p>So, what could we do then to build ethics into the device that drives the trolley?&nbsp; We can never really anticipate all possible scenarios and program appropriate measures.&nbsp; Avoidance of the impact with early warning detections may be the most effective strategy even though it is not within the domain of applicable solutions for this problem.&nbsp;</p><p>The debate continues about <a href="http://ftijournal.com/article/is-business-ethics-an-oxymoron" rel="nofollow">business ethics being an oxymoron</a>.&nbsp; IoT and ethics may be a challenging proposition too – because IoT can never really be fully automated to being a human.&nbsp;</p><p>And that is not exactly a dilemma – it is just plain and simple reality.</p><p>Team up with&nbsp;<a href="http://www.hp.com/go/easwarannadhan" target="_self" rel="nofollow">HP Technology Expert, E.G.Nadhan</a></p><p>Connect with <a href="https://twitter.com/NadhanEG" target="_self" rel="nofollow">Nadhan</a>&nbsp;on: <a href="https://twitter.com/NadhanEG" target="_self" rel="nofollow">Twitter</a>, <a href="http://www.facebook.com/easwaran.nadhan" target="_self" rel="nofollow">Facebook</a>, <a href="http://www.linkedin.com/profile/view?id=102637222&amp;trk=tab_pro" target="_self" rel="nofollow">Linkedin</a> and <a href="http://bit.ly/VDfGGn" target="_blank" rel="nofollow">Journey Blog</a>.</p> https://www.enterprisecioforum.com/en/blogs/enadhan/real-dilemma-iot-and-ethics#comments CIO Leadership Big Data Blog-post analytics Big Data Business Ethics data science Ethical Dilemma Ethics information management Internet of Things IoT Mon, 17 Nov 2014 15:53:08 +0000 enadhan 11056 at https://www.enterprisecioforum.com So many security concerns and topics, so little time https://www.enterprisecioforum.com/en/blogs/jdodge/so-many-security-concerns-and-topics-so <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> &quot;Fake cell towers!?&quot; See conversation 2. </div> </div> </div> <p>Our #CIOchat yesterday about security nightmares touched on human error, <a href="http://en.wikipedia.org/wiki/Penetration_test">penetration testing</a>, privacy, <a href="http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/POS-malware-a-look-at-Dexter-and-Decebal/ba-p/6654398#.VGZqMfnF-FU">Point of Sale vulnerabilities</a>, training, education, layered security, 7x24 threat monitoring and who should be charge of enterprise cyber security. The sheer number of topics expresses the complex and never ending task of keeping enterprise data secure.</p> <p>And it will only intensify as mobile and Internet of Things (IoT) become more and more pervasive.</p> <p>I say "more and more pervasive" to emphasize that <a href="http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Mobile-malware-shows-us-the-money/ba-p/6666200#.VGZp7PnF-FU">mobile</a> and IoT are already here in massive numbers. The growth rate in their numbers will increase at a progressively faster clip with no end in sight to the acceleration. It's exhilarating and frightening at the same time.</p> <p>The following Tweets should convince you to join in our informative and insightful chats which are every week between 2 and 3 p.m. ET on Thursdays.&nbsp;</p> <p>Two of my favorites Tweets - there were 329 in our #CIOchat hour from 44 participants - were from Disney technologist <a href="http://www.twitter.com/KeithBarrett%20">@KeithBarrett</a>. His first cautionary Tweet advises that planning for what might happen is better than reacting to a ruinous incident. How true. Not just CISOs and CIOs should think that way. Every employee, partner, customer and stakeholder needs to as well. &nbsp;</p> <blockquote> <p><img src="https://pbs.twimg.com/profile_images/378800000549871689/f2a26a2b2354772d910cc499f5a1789f_normal.png" alt="" style="line-height: 1.4em;" class="networkAvatar isLoaded" /><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span class="messageDescription" style="line-height: 1.4em;"><a href="http://twitter.com/KeithBarrett/status/532984767562940416" target="_blank" class="postTime _postPermalink _postTime">Nov 13, 2:54pm via TweetChat powered by oneQube</a></span></p> <p class="_baseTweetText _tweetText messageContent">You have to remember, that most security issues will be discovered AFTER the fact, so you need to plan for that.&nbsp;<a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash">#ciochat</a></p> </blockquote> <p class="_baseTweetText _tweetText messageContent">And I loved his Tweet about pen testing to see who's falling for phishing attacks.&nbsp;</p> <blockquote> <p><span style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="katweasle" class="_userInfoPopup _twitter" style="line-height: 1.4em;">katweasle</a><span style="line-height: 1.4em;">&nbsp;@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup _twitter" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup _twitter" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;I know once place where security sent their own phising attempt to record who fell for it</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a></p> </blockquote> <p><span style="line-height: 1.4em;">Here's two interesting conversations.</span></p> <div id="tweet_103407831_532985051970273280" class="_message message "> <div class="-messageBody"> <p class="_baseTweetText _tweetText messageContent"><strong>Conversation 1 -- Humans are the weakest link. Education, education, education...</strong> &nbsp;</p> <p class="_baseTweetText _tweetText messageContent"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" style="line-height: 1.4em;" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="Thedodgeretort">Thedodgeretort</span><span style="line-height: 1.4em;">&nbsp;&nbsp;Q. 3 Does your company do a good job of educating you and ALL its constituents about security?&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:40pm, Nov 13 from Hootsuite</span></p> </div> </div> <div class="-messageConversation"> <div class="_previousTweets previousMessages"> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="mamezz">mamezz</span><span style="line-height: 1.4em;">&nbsp; A3.&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;Yes, but even a GOOD job isn't going to counteract the ONE-CLICK owned scenario;&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:43pm, Nov 13 from Twitter Web Client</span></div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="mamezz">mamezz</span><span style="line-height: 1.4em;">&nbsp; A3.&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;Need more gamification and real-time feedback for training&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:44pm, Nov 13 from Twitter Web Client</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="KeithBarrett">KeithBarrett</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">&nbsp;You can conduct trial exercises. A lot gets uncovered by pretending to really gain access.</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:47pm, Nov 13 from TweetChat powered by oneQube</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="KeithBarrett">KeithBarrett</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">&nbsp;And I don't mean webinars. I mean stealth call or otherwise pretend a real hack is in progress</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:48pm, Nov 13 from TweetChat powered by oneQube</span></div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F505818737748889600%2FqYV1ybqF_normal.png" alt="davidjhinson" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="davidjhinson">davidjhinson</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;just this type of jack happened to a friend this week.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:49pm, Nov 13 from Twitter for iPhone</span></div> <div class="_comment comment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="mskaff">mskaff</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="davidjhinson" class="_userInfoPopup" style="line-height: 1.4em;">davidjhinson</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;Pen-testing (inc social engineering) is an impt component of a</span><a href="https://hootsuite.com/dashboard#" title="netsec" class="_quickSearchPopup hash" style="line-height: 1.4em;">#netsec</a><span style="line-height: 1.4em;">&nbsp;program.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:51pm, Nov 13 from Twitter Web Client</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="KeithBarrett">KeithBarrett</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup" style="line-height: 1.4em;">mskaff</a><span style="line-height: 1.4em;">&nbsp;Yeap. Most people only focus on the policies and tech. They don't test the human social components.</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:52pm, Nov 13 from TweetChat powered by oneQube</span></div> <div class="_comment comment originalComment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="mskaff">mskaff</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">&nbsp;We humans are usually the "weakest link". Hence my belief in the importance of education.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:54pm, Nov 13 from Twitter Web Client</span></div> <div class="_comment comment originalComment"><strong><span class="date" style="line-height: 1.4em;">Conversation 2 - Not everyone who needs 7x24 threat monitoring (which is everyone) can afford it. &nbsp;</span></strong></div> <div class="_comment comment originalComment"> <div id="tweet_103407831_532980500135444480" class="_message message "> <div class="-messageBody"> <p class="_baseTweetText _tweetText messageContent"><img src="https://pbs.twimg.com/profile_images/505818737748889600/qYV1ybqF_normal.png" alt="" style="line-height: 1.4em;" class="networkAvatar isLoaded" /><a href="https://hootsuite.com/dashboard#" title="davidjhinson" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">davidjhinson</a><span class="messageDescription" style="line-height: 1.4em;">&nbsp;<a href="http://twitter.com/davidjhinson/status/532980437623111681" target="_blank" class="postTime _postPermalink _postTime">Nov 13, 2:36pm via Twitter for iPhone</a></span></p> </div> </div> <div id="tweet_103407831_532980437623111681" class="_message message "> <div class="-messageBody"> <p class="_baseTweetText _tweetText messageContent">@<a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup _twitter">Thedodgeretort</a>&nbsp;@<a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup _twitter">mamezz</a>&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a>up to a point - but this hits a scale wall with small cos / orgs / schools</p> </div> <div class="-messageConversation"><a href="https://hootsuite.com/dashboard#" class="showConversation _closeReplyTo">Hide conversation</a> <div class="_previousTweets previousMessages"> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="KeithBarrett">KeithBarrett</span>&nbsp;&nbsp;A1. The NSA exploiting backdoors to monitor citizens instead of helping the public close them?&nbsp;<a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash">#ciochat</a><span class="date">2:15pm, Nov 13 from TweetChat powered by oneQube</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="Thedodgeretort">Thedodgeretort</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup">KeithBarrett</a>&nbsp;Or having the data handed to them on a platter by wireless and search cos.&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:17pm, Nov 13 from Hootsuite</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F2544916053%2Fimage_normal.jpg" alt="katweasle" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="katweasle">katweasle</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup">KeithBarrett</a>Agree, main in the middle wifi hacking is easy when people are using coffee shop or airport wifi&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:18pm, Nov 13 from Twitter for iPad</span></p> </div> <div class="_comment comment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="mskaff">mskaff</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="katweasle" class="_userInfoPopup">katweasle</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a><span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup">KeithBarrett</a>&nbsp;Yes - fake access points (and even fake cell towers!) are on the rise.<a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash">#CIOChat</a><span class="date">2:21pm, Nov 13 from Twitter Web Client</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="Thedodgeretort">Thedodgeretort</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup">mskaff</a>&nbsp;Fake cell towers to intercept wireless calls, data?&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a>&nbsp;I just thought they were ones with fake tree branches.<span class="date">2:23pm, Nov 13 from Hootsuite</span></p> </div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="mamezz">mamezz</span>&nbsp;&nbsp;.<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup">mskaff</a>&nbsp;Trust is all relative, and we've gotten complacent using security by obscurity, least target mentality&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:26pm, Nov 13 from Twitter Web Client</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="Thedodgeretort">Thedodgeretort</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup">mamezz</a>&nbsp;Used to think trust was earned. In the security realm, should no one be trusted?&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:29pm, Nov 13 from Hootsuite</span></p> </div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="mamezz">mamezz</span>&nbsp;&nbsp;.<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a>&nbsp;Trust is a tradeoff in a very complex world, security vs. opportunity/value - you decide&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:31pm, Nov 13 from Twitter Web Client</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="Thedodgeretort">Thedodgeretort</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup">mamezz</a>&nbsp;How about several levels of 7x24 threat monitoring?<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a>&nbsp;Internal and external? Hired pros trying to break your systems&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:35pm, Nov 13 from Hootsuite</span></p> </div> <div class="_comment comment originalComment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F505818737748889600%2FqYV1ybqF_normal.png" alt="davidjhinson" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="davidjhinson">davidjhinson</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup">mamezz</a><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a>&nbsp;up to a point - but this hits a scale wall with small cos / orgs / schools<span class="date">2:36pm, Nov 13 from Twitter for iPhone</span></p> <p class="commentContent"><em><span class="date">Follow <a href="http://www.twitter.com/ecioforum">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort">@thedodgeretort</a> on Twitter.</span></em></p> </div> </div> </div> </div> </div> </div> </div> https://www.enterprisecioforum.com/en/blogs/jdodge/so-many-security-concerns-and-topics-so#comments Business Issues Applications Mobility Security Blog-post CIO cyber threats data breaches IT Security Fri, 14 Nov 2014 15:42:35 +0000 jdodge 11051 at https://www.enterprisecioforum.com Cool cloud startups in 2014 https://www.enterprisecioforum.com/en/blogs/rickblaisdell/cool-cloud-startups-2014 <p>Cloud computing is producing a great number of big and successful companies. Bessemer Venture has identified about&nbsp;<a href="https://www.bvp.com/sites/default/files/img/bvp_cloudscape_v4_web.jpg" rel="external nofollow" rel="nofollow">300 successful cloud startups</a>&nbsp;– among them, 16 have already hit a $1 billion valuation or on the verge of it.</p><p>Startups are showing up every day in the cloud market, from optimizing infrastructure services to offering development platforms. There are applications served from the cloud and new classes of apps that could not have been made without the cloud. So let’s take a look at some cool innovative cloud startups that are changing the game this year:</p><ul><li><a href="http://www.cloudphysics.com/" rel="external nofollow" rel="nofollow"><strong>CloudPhysics</strong></a><strong>&nbsp;–&nbsp;</strong>uses big data to protect the cloud. The startup, founded in 2011 in Mountain View, California, by former VMware employees, offers a cloud-based service that gathers billions of samples of anonymized operational data each day from customers around the globe. That information is dissected to identify potential problems on virtual server, storage and networking environments, reducing human errors that can damage a data center.</li><li><a href="http://pistoncloud.com/" rel="external nofollow" rel="nofollow"><strong>Piston Cloud</strong></a><strong>&nbsp;–&nbsp;</strong>with all the interest these days in OpenStack, we sometimes forget how difficult it can be to deploy and manage an OpenStack cloud. The San Francisco-based startup uses advanced systems intelligence to orchestrate private cloud environments on nothing but commodity hardware. The software simplifies the process to the point that a single system administrator using Piston Cloud’s Piston OpenStack 3.0 release can alone operate an OpenStack-powered private cloud.</li><li><a href="https://coreos.com/" rel="external nofollow" rel="nofollow"><strong>CoreOS</strong></a><strong>&nbsp;-</strong>in an age of distributed computing clusters, the lightweight Linux distribution is optimized for massive server deployments. This year, CoreOS became available on Google’s Compute Engine cloud, released an enterprise-grade version and launched a service called Managed Linux that its developers describe as the world’s first OS-as-a-Service. CoreOS fully integrates Docker for deploying and managing Linux containers, and many believe this technology is the future of virtualization in enterprise environments.</li><li><a href="http://www.elastichosts.com/" rel="external nofollow" rel="nofollow"><strong>ElasticHosts</strong></a>&nbsp;– offers a public cloud that comes closer than anyone else, including AWS, to billing customers only for the computing resources they are using. The London-based company takes the consumption-based pricing model a step further than its competitors, dividing usage into 15 minute intervals, and it has the potential to deliver significant cost savings to businesses.</li><li><a href="https://www.netskope.com/" rel="external nofollow" rel="nofollow"><strong>Netskope</strong></a><strong>&nbsp;–&nbsp;</strong>provides discovery, analysis and policy enforcement for over 2,600 cloud and software-as-a-service (SaaS) apps. The startup can help CIOs get a handle on Shadow IT by bringing visibility to the great number of apps brought into businesses without IT oversight, and introducing good governance to their management.</li></ul><p>An increasing number of startups and small businesses are moving key operations to the cloud. In this era of everything as a service, cloud startups are also forcing existing businesses to up their games and go cloud. What’s your plan?</p> https://www.enterprisecioforum.com/en/blogs/rickblaisdell/cool-cloud-startups-2014#comments CIO Leadership Cloud Blog-post #Cloud #Computing cloud computing cloud startups startups Thu, 13 Nov 2014 11:18:30 +0000 RickBlaisdell 11046 at https://www.enterprisecioforum.com ‘Data Breach’ - Top Concern for CIOs in 2015 https://www.enterprisecioforum.com/en/blogs/eiq-networks/%E2%80%98data-breach%E2%80%99-top-concern-cios-2015 <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> EiQ Networks&#039; recent survey of CIOs and top IT professionals across industries found that security breaches are the top concern in 2014 and moving into 2015. </div> </div> </div> <p>EiQ Networks recently surveyed CIOs and top IT pros across industries, and found, not surprisingly, that security breaches are the top concern in 2014 and moving into 2015.</p><p>More specifically, we learned that data breaches are the top concern for 90% of IT security professionals. Despite this, only 15% of those same IT professionals surveyed, described their organizations as “well prepared” for a security breach. Out of the 145 IT decision-makers surveyed, only 21% said they are truly confident in their company system’s ability to mitigate the risk of security incidents.&nbsp;</p><p>Top challenges for risk management teams in 2015 include keeping up with the latest cyber threats, staying current on new forms of malware, and figuring out which systems are adequately protected. These three challenges concern CIOs because hackers are finding new ways to bypass traditional network security systems, creating a critical need for a comprehensive security program that includes proactive and reactive security management to stay ahead of cybercriminals.&nbsp;</p><p>Despite all of the security breaches that have occurred within the past year, 60% of IT professionals said they only had a partial cyber defense process in place. Only 31% of respondents have a "solid process" in place for cyber defense, and only 15% of respondents said their company is "well prepared" for a cyber breach. Alarmingly, 11% of IT pros say that their companies have no cyber defense process.</p><p>According to the survey, the top three security concerns for IT infrastructure are mobility, networks, and endpoints. The survey found that 81% of companies rely on traditional firewalls to protect their networks. Anti-virus software followed firewalls at 66% as a preferred cyber security protection method.&nbsp; 85% of IT pros say they plan to replace their current log management and SIEM vendors with a Managed Services solution.</p><p><strong><em>How to Protect Against a Data Breach</em></strong></p><p>When a cyber breach occurs, all stakeholders will look to the CIO/CISO/CSO to communicate information about the incident and its consequences, and the steps the company is taking to reduce risk to the organization. CIOs should have a well-defined security program that includes an incident response plan before a cyber breach occurs, especially since cyber breaches are becoming more common. The CIO needs to serve as the manager of the incident response team. This team should have necessary tools in their arsenal to quickly identify and analyze root cause of the problem, compromised systems, data and users, and be able to implement corrective counter measures to mitigate and minimize the risk. Centralized control over a data breach response team can result in more accountability and responsibility, which can reduce the overall financial cost of a data breach.</p><p>As the volume and complexity of security breaches continue to accelerate, an increasing number of organizations are at risk of losing valuable customer data, corporate data, and intellectual property and reputation. With the severity of today’s threat environment and impact on all areas of the business, IT pros are looking beyond basic compliance and beginning to focus on security best practices to get out in front. Defining and implementing an effective security program that provides both proactive and reactive security monitoring on a continuous basis, and is supported by trained security professionals who can engage in timely analysis and remediation, is mandatory in protecting businesses against current threats.</p><p>EiQ's&nbsp;survey results confirm that IT pros are very concerned about keeping company data secure. &nbsp;It is critical that executive management allocate sufficient budgets and encourage implementing well thought out and common sense security practices such as SANS Security Controls that result in meaningful and measureable improvements in security, rather than just focusing on basic compliance and the latest greatest technology to get a check box.</p> https://www.enterprisecioforum.com/en/blogs/eiq-networks/%E2%80%98data-breach%E2%80%99-top-concern-cios-2015#comments Technology Security Blog-post CIO data breach EiQ infographic IT Pros SIEM survey Vulnerability Thu, 13 Nov 2014 01:31:26 +0000 EiQ Networks 11036 at https://www.enterprisecioforum.com Eight ways to lower costs with the cloud https://www.enterprisecioforum.com/en/blogs/christian/eight-ways-lower-costs-cloud <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Enterprise software development an untapped target. </div> </div> </div> <p>A primary goal for the CIO since the beginning of IT time has been to keep costs low. And one area that is not always a focus of cost reduction is enterprise software development. Cloud to the rescue. &nbsp;&nbsp;</p> <p><span style="line-height: 1.4em;">After considering this habit of companies missing a cost-cutting opportunity, I came up with&nbsp;</span><em style="line-height: 1.4em;">eight</em><span style="line-height: 1.4em;">&nbsp;</span><em style="line-height: 1.4em;">savings resulting from the use of cloud computing in the development process</em><span style="line-height: 1.4em;">. Let me share what I came up with and tell me if I missed anything.</span></p> <p><strong>Reuse infrastructure through the provisioning from a central pool of servers (virtual and physical)</strong></p> <p>The time of the server under the desk is over. The time of the dedicated server also. Why not provide a pool of servers, virtual and physical, and have developers provisioning what they need, when they need it? And ideally, they would release the servers when they are not developing. Using such approach improves the usage of the infrastructure drastically.</p> <p><span style="line-height: 1.4em;">Furthermore, when considering virtual and physical servers, ideally you would only use virtual servers at this time. Unfortunately, some license schemes push you to physical servers as installing them in virtual environments makes the cost of the license prohibitive because it is based on cores. Physical servers are more difficult to reuse, so you may want to look at alternative approaches to give your users access to those databases. DBaaS, or a “database hotel,” is an option, if available. In other words, you dedicate one server to databases and install the databases of all ongoing development projects on the same server so you limit the license costs. In production, this might be seen as a security weakness, but developments are being made to combat threats.</span></p> <p><strong>Provide a finite number of virtual machine images or provisioning options</strong></p> <p>What can make the lives of operation people miserable is when developers use multiple versions of the same middleware or database service, forcing them to support many different options and combinations. This is often due to the DVD the developer has available when he sets up his environment. By providing virtual machine images, or even better- provisioning options that only give you access to one version of each tool- you limit the options, reducing the licensing, support and operations costs drastically.</p> <p>These savings may seem indirect as they reduce operation, not development costs. However, when looking at total IT costs, they will provide the enterprise with important savings. A couple side questions to ask is whether, during the development process, the same hypervisor needs to be used as in production. VMWare licenses are costly, and many insist on them being used for production workloads.</p> <p>And that makes sense. But does that imply VMWare also needs to be used in all steps of the development process, or could most of the development be done in a KVM environment for example, just migrating to VMWare for final testing, QA and staging? Again, substantial savings are possible here. Lastly, and this is particularly true if VMWare is used, ensure unused virtual machines are de-provisioned. In other words, release the license keys, not just for the hypervisor, but also for all tools and middleware/databases used during the development process, when not in use.</p> <p>That will minimize the size of the pool of licenses you require for development, reducing the cost of acquiring and supporting those licenses. Even better, where possible, consume them using as-a-service structured solutions.</p> <p><strong>Ensure appropriate management of the environment to reduce risks and costs</strong></p> <p>Having a central pool of resources available, having that pool managed by a focused team and having it available “on-demand” ensures an automated provisioning relieving the developer from set-up, management and operation tasks. These include back-up for example. I cannot tell you how often I have seen developers losing several days of their work because they had not saved their work properly. Centralizing back-up, patch management, upgrades etc. relieves the developers of such routine tasks, while ensuring consistency across the development community. If the above management is complemented with centralized source code and documentation management, reuse can be increased, which in turn diminishes the effort of developing applications and facilitate maintenance. Lastly, if portfolio and project management functions are combined with a central pool of infrastructure resources and management, a clear view of the progress of development projects can be made available, facilitating a better management of projects and budgets, limiting un-used budgets at year end.</p> <p><strong>Automate deployment to speed up release to multiple platforms</strong></p> <p>During the development process, multiple environments may be used. This is increasingly necessary when developing cloud-ready and cloud-native applications. Indeed, stress testing for example may require a much larger configuration than regular development work. Using multiple cloud environments may be the way to go so that appropriate resource pools are consumed when required, and only paid for when used. This however, forces developers to install their applications on various environments which may be time consuming. Building on technologies used in projects following agile methodologies, continuous delivery tools can be used to automate the deployment to multiple environments. Configuring the application deployment template once, reusing infrastructure, OS, database and middleware installation recipes already available in the environment facilitate such task. Whether it is the developer, or the operator at a later stage, automating the deployment process reduces the effort of having to install the application and all its components on a given environment.</p> <p><strong>Automate testing to enable daily testing speeding up anomaly discovery</strong></p> <p>Why not adopt another best practice from agile development: let’s automate testing. A couple years ago I talked to one of our product development teams and they mentioned that they had seven teams working on components of the application they were developing. Daily, they clocked in their code and overnight it was assembled automatically and a number of tests were run. In the morning, as the teams returned, reports were available showing them how the development of the previous day operated with the remainder of the application. Since that time, I had the opportunity to talk to some of the engineers responsible for&nbsp;<a href="https://www.openstack.org/summit/openstack-summit-atlanta-2014/session-videos/presentation/continuous-integration-and-deployment-using-openstack" target="_blank" rel="nofollow">Continuous Integration and Deployment on the OpenStack project</a>&nbsp;and I found a lot of similarities, only taken further. Developing such approaches in-house improves quality while reducing the time it takes to identify and correct issues. It also enables the organization to speed-up the development process allowing developers to respond quicker to the requests from the business.</p> <p><strong>Facilitates the re-use of common components</strong></p> <p>I briefly mentioned this already. The standardization of processes, architectures and methodologies improve the reuse of components, and result in lower development costs. Having a central repository where all artifacts are aligned facilitates finding the components that are available and actually re-use them. Components can be software modules, software services or installation and test scripts etc. Do not limit yourself to software functionality, there are many elements that can be reused, including installation and test scripts, components of screens etc.</p> <p><strong>Centralizes the application documentation repository</strong></p> <p>Centralizing application documentation brings with it two advantages. First, the team members quickly find the latest version of the documentation of an application or module of a project. But having a central place is also valuable to improve reuse. From a single place developers can then review what artefacts are available, so it is no longer word of mouth. What is needed is to ensure developers first go and check whether something exists prior to develop it themselves. Hence giving them incentives to do so. Furthermore, they need to learn developing with reuse in mind. This implies following some standards on how the functionality can be accessed (API and others) and appropriate documentation so others can understand what the contribution actually does. And then they need to be ready to share. It requires a change in the enterprise dynamics.</p> <p><strong>Self-Service</strong></p> <p>Developers want to work at their own speed. They do not like to have to rely on others to prepare their environments. They rather take their own destiny in their own hands. For this reason, providing them with self-provisioning capabilities helps empower them, and accept a more centralized environment. No service desk needs to be put in place, they just go to a portal and choose amongst the offerings what they need at that moment in time.</p> <p><strong style="line-height: 1.4em;">Results: Lower costs, a leaner structure, and more effective developers</strong></p> <p>Implementing the eight points above allows developers to focus on core competencies- developing software. When we did this internally, the productivity of our developers jumped more than 15 percent. Employees no longer lost time setting-up and managing their environments. They could focus on development while 0re-using functionality their colleagues had already developed. Their environments were automatically backed-up, ensuring their work was no longer lost on occasions. Being able to test daily resulted in more productive developments. And then there were the savings from a license and operations perspective. Altogether, although any such changes can initially require an adjustment period for employees (and in this case, developers), once they understand how it facilitates their efficiency, data recovery, and successful results, they don’t want to go back, I can tell you that.</p> <p><span style="line-height: 1.4em;">If you are interested in HP's DevOps offering, click&nbsp;</span><a href="http://www8.hp.com/us/en/software-solutions/agility-devops-services/?jumpid=reg_r1002_usen_c-001_title_r0002" target="_blank" style="line-height: 1.4em;">here</a><span style="line-height: 1.4em;">, if you are looking at setting up DevOps in your organization and want help, click&nbsp;</span><a href="http://www8.hp.com/us/en/software-solutions/agility-devops-services/?jumpid=reg_r1002_usen_c-001_title_r0001" target="_blank" style="line-height: 1.4em;">here</a><span style="line-height: 1.4em;">.</span></p> https://www.enterprisecioforum.com/en/blogs/christian/eight-ways-lower-costs-cloud#comments Technology Applications Cloud Blog-post CIO Cloud devops enterprise software IT Wed, 12 Nov 2014 21:30:44 +0000 Christian 11031 at https://www.enterprisecioforum.com Clearing up the confusion between IaaS and Paas https://www.enterprisecioforum.com/en/blogs/christian/clearing-confusion-between-iaas-and-paas <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> &quot;It&#039;s all about PaaS.&quot; </div> </div> </div> <p><span style="line-height: 1.4em;">It’s all about “Platform as a Service” these days. But juxtaposed to Infrastructure as a Service (IaaS), what does PaaS mean, and how do you make the right choice for a given application? I see at least two different kind of PaaS environments addressing different scenarios and needs. It’s important, when embarking on the development and/or migration of an application to a cloud environment, to thoroughly think through which PaaS environment to use.</span></p> <p><strong><span style="line-height: 1.4em;">PaaS, a definition</span></strong></p> <p>Let’s start with&nbsp;<a href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf" target="_blank" rel="nofollow">the definition from the National Institute of Standards and Technologies</a>. They define Platform-as–a-Service (PaaS) as, “…<em>the capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment</em>.”</p> <p><a href="http://www.gartner.com/it-glossary/platform-as-a-service-paas" target="_blank" style="line-height: 1.4em;" rel="nofollow">Gartner</a><span style="line-height: 1.4em;">, on the other hand defines PaaS “…</span><em style="line-height: 1.4em;">as a broad collection of application infrastructure (middleware) services (including application platform, integration, business process management and database services)”.&nbsp;</em><span style="line-height: 1.4em;">They then quickly add that aPaaS often represents the whole category. APaaS (Application PaaS) is in turn defined as “…<em>a cloud service that offers development and deployment environments for application services.”</em></span></p> <p><span style="line-height: 1.4em;">And here is where one can become confused. Some people speak about PaaS as an&nbsp;</span><strong style="line-height: 1.4em;">integrated</strong><span style="line-height: 1.4em;">&nbsp;development and deployment environment for applications (e.g. Azure, Google Apps) while others see it as a&nbsp;</span><strong style="line-height: 1.4em;">collection</strong><span style="line-height: 1.4em;">&nbsp;of middleware, libraries, database and other tools made available to the developers (often as-a-service). There is place for both. Let’s look at this in a little more in depth and highlight the pros and cons of both approaches.</span></p> <p><strong style="line-height: 1.4em;">Which Application on which platform?</strong></p> <p><span>Most companies have existing applications that need to be migrated to a cloud environment. Often, cloud is just used as an infrastructure reservoir, and the middleware/database/libraries are installed on the infrastructure. The application is then installed and runs in a similar way it would run in its old environment.</span></p> <p><span>In some cases, the middleware &amp; database is replaced by an equivalent “as-a-service” offering, so now the application can run on a “cloud platform”. The advantage is that it limits the middleware and database licensing cost to what is actually consumed. Unfortunately, many database and middleware software vendors do not support such a sales approach so the offer is not available.</span></p> <p><span style="line-height: 1.4em;">Some applications are cloud native, or in other words, they are developed with the cloud in mind.&nbsp;</span><a href="http://www.techopedia.com/definition/26684/native-cloud-application-nca" target="_blank" style="line-height: 1.4em;" rel="nofollow">Technopedia</a><span style="line-height: 1.4em;">defines a native cloud application (NCA) as “…</span><em style="line-height: 1.4em;">a software application that is specifically built for cloud computing and virtualization environments. Native cloud applications are designed, developed and deployed in such a way that they reap the maximum functionality and services of a cloud computing and virtualization infrastructure.”&nbsp;</em><span style="line-height: 1.4em;">In other words, such applications are developed with scale-up scale-down capabilities in mind. Its main purpose is for applications requiring improved user experience in environments with unpredictable user demand.</span></p> <p><span style="line-height: 1.4em;">Let’s look at the platforms in more detail.</span></p> <p><strong style="line-height: 1.4em;">Cloud Native Applications, aPaaS.</strong></p> <p><span>When developing a new application that is taking full advantage of the cloud, use an aPaaS such as Microsoft Azure or Google Apps. These are feature rich environments allowing you to improve your productivity during the development process. They facilitate the scale-up or scale-down, the use of load balancers, the communication between application modules, the use of data structures etc.</span></p> <p><span style="line-height: 1.4em;">Their main advantage is that they allow you to develop your application within an integrated environment, and one that typically has many features. In doing so, they shield you from the complexity of the cloud environment and its functionality.</span></p> <p><span style="line-height: 1.4em;">The disadvantage is that they are fully integrated, feature rich environments. You will need to call upon many of these features, and you will also need to speed-up your development time. Doing this, however, locks you into the platform as other platforms do not have the same features. So, if one day you want to migrate your application from one platform to another, you will have to rewrite large parts of your application.</span></p> <p><span style="line-height: 1.4em;">CloudFoundry and OpenShift are two aPaaS environments that are Open Source. They are supported in different IaaS environments, and even if you remain locked in with the environment, you at least have multiple suppliers. So, if you are unhappy with your supplier you have choices of alternative suppliers. If you become frustrated with the lack of features in the platform you will still have work ahead of you in order to change platforms.</span></p> <p><span style="line-height: 1.4em;">Often however, the gains in development time outplay the risks of having to change platform. My advice would be to use an Open Source platform to maintain some freedom in which IaaS supplier you use.</span></p> <p><strong style="line-height: 1.4em;">Transformation of existing applications</strong></p> <p><span>When moving to Cloud, most customers want to take existing applications with them. Either they plan to use Cloud as a quick way to provision infrastructure, or they wish to take advantage of Cloud. In both cases, they want to re-use the applications they have already developed. These apps are not Cloud native. They have not been written with Cloud in mind. In the best cases, they may have been developed using SOA principles, but mostly that won’t be the case, at least not to the full extent. Obviously, here I’m talking of applications where the user has the source code. Common off-the-Shelf applications are evolved by their initiator and the only element under the control of the user is the installation.</span></p> <p><span style="line-height: 1.4em;">The application source code may have to be transformed in order to run on a Cloud environment. Using a PaaS as described in the previous section may force you to completely rewrite the application. You will need to ask yourself: is that something you are ready to do? If the answer is no, you may need a different development environment, one that still automates the testing and deployment of your application, but allows the application to call upon the middleware and database functionality it uses.</span></p> <p><span style="line-height: 1.4em;">You still want the automation though, for two reasons. You no longer control the versions of the operating system, middleware components and databases that are supported by the cloud service provider, so you will need to upgrade to newer versions when support changes. There is a second reason though, which is more business oriented: your business colleagues require changes to the logic more often. DevOps environments allow you to operate at a much faster pace.</span></p> <p><span style="line-height: 1.4em;">What you are looking for is an environment in which you can take in the application source code and documentation and evolve it over time. Automated testing facilitates the speed at which new functionality is developed, as I described it&nbsp;</span><a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/Reducing-costs-by-cloud-enabling-your-developments/ba-p/173384" target="_blank" style="line-height: 1.4em;">in my last blog entry</a><span style="line-height: 1.4em;">. This is what we call continuous integration. The automation of the provisioning of infrastructure and the installation of the application and its associated components is called continuous delivery. Combining both in one platform delivers a PaaS environment for existing applications.</span></p> <p><span style="line-height: 1.4em;">We have started using such platforms for some of our application transformation projects. We call it the transformation platform. It consists of a series of creation services delivering development environments and using tools such as Git, GitHub, Jenkins and others, and a series of runtime services, allowing applications to access specific middleware and database components in a standard way.</span></p> <p>Such platforms should be based (as much as possible) on Open Source components, so lock-in is avoided.</p> <p><strong style="line-height: 1.4em;">Between PaaS and PaaS, you have a choice</strong></p> <p><span>The cloud native PaaS, sometimes referred to as aPaaS may provide you with the best tools to exploit all the features of cloud when you develop a new application. An open and expandable PaaS such as the transformation platform, may automate less cloud features slowing down your developments somewhat, but allows you to re-use application logic developed in a pre-cloud era.</span></p> <p><span style="line-height: 1.4em;">Do you need to make a choice? We believe not, both can co-exist. But they should be accessible through a common environment and managed through a common project and portfolio management environment. This is where we believe the Platform as a Service world should go.</span></p> <p><strong style="line-height: 1.4em;"><em>HP released HP Helion Development Platform, based on CloudFoundry last week. If you are interested in reading more about it,&nbsp;<a href="http://www8.hp.com/us/en/cloud/helion-devplatform-overview.html" target="_blank">click here</a></em></strong><strong style="line-height: 1.4em;"><em>.</em></strong></p> https://www.enterprisecioforum.com/en/blogs/christian/clearing-confusion-between-iaas-and-paas#comments Technology Applications Cloud Blog-post Applications CIO Cloud IaaS IT PaaS Wed, 12 Nov 2014 20:54:38 +0000 Christian 11026 at https://www.enterprisecioforum.com CIOops! The Biggest C-Suite Cloud Mistakes https://www.enterprisecioforum.com/en/blogs/deisner/cioops-biggest-c-suite-cloud-mistakes <p>According to a recent <a href="http://www.zdnet.com/cloud-computing-cios-are-taking-back-control-but-it-is-already-too-late-7000035159/" rel="nofollow">ZDNet</a> article, CIOs and IT departments are re-establishing control over technology and cloud spending in the enterprise. Once focused on the deployment of traditional hardware and software services over cloud adoption, CIOs have come to realize the transformative power of distributed computing — and the results are clear. Eighty percent of cloud spend now is now under the purview of IT departments, with 62 percent involving CIOs directly. But increased control and specialized knowledge doesn't make CIOs infallible: Here are five of the top mistakes these C-suite executives make when tackling a cloud transition.</p><h2><em>No Allies</em></h2><p>Rome wasn't built in a day, and it took more than one dedicated laborer to complete the task. The same goes for cloud computing — no matter how passionate a CIO or their IT staff, clouds don't happen in isolation. <a href="http://www.forbes.com/sites/oracle/2014/09/17/the-cloud-the-transformation-and-the-cio/" rel="nofollow">Forbes</a> notes that when it comes to securing cloud success, CIOs need the support of at least one other C-suite member and would also do well to involve other business departments. Out of 750 business executives surveyed, for example, 78 percent said departments such as HR, finance and research/planning were involved in the cloud decision-making process. The takeaway here? Going at it alone leads to frustration and a cloud that's doomed to failure. Collaboration is key.</p><h2><em>The Wrong Supporters</em></h2><p>As pointed out by <a href="http://www.infoworld.com/article/2610425/cloud-computing/3-cio-no-no-s-when-moving-to-the-cloud.html" rel="nofollow">Information Week</a>, however, the wrong supporters can be just as detrimental as none at all. There are a few of these “cloud haters” in every organization; some are front-line employees, some are tech professionals and some are members of the C-suite. They're easy to recognize because they have nothing but disdain for the cloud — employees believe it will make their jobs more complicated, IT pros worry about being replaced and CFOs may question cost savings. While it's temping to include these people in the cloud discussion to allay their fears, this is actually counterproductive and can delay adoption. Instead, bring in critical thinkers who ask hard questions but are open to alternative IT methods.</p><h2><em>Ignoring the Shadows</em></h2><p>When it comes to cloud adoption, many CIOs trying to “wait it out” may find their hand forced by Shadow IT. According to the <a href="http://blogs.wsj.com/cio/2014/10/28/cios-broker-cloud-services-thanks-to-shadow-it/" rel="nofollow">Wall Street Journal</a>, the use of unsanctioned cloud services by employees often compels CIOs to begin the cloud discussion; since front-line users will always find a way to access the cloud, it's better to accommodate this need and gain some measure of oversight than be left out in the cold. The quickest way to limit the proliferation of shadow IT and make progress in the cloud is to ask users what they want and then design an adoption strategy, rather than forcing them to adapt.</p><h2><em>The Snail's Pace</em></h2><p>Forbes also makes the case for CIO-led IT departments that are “highly responsive.” Those that ranked well in this survey category enjoyed a significant transformation of traditional processes such as customer engagement and employee workflow when leveraging the cloud.</p><p>The big CIO mistake here? Promising cloud adoption but then working at a snail's pace. This kind of slowdown prompts the creation of shadow IT and makes a highly responsive environment difficult to achieve, since workflows aren't uniform or visible. Once a course is set for cloud adoption, create a reasonable timeline and update it as required.</p><h2><em>All-or-Nothing</em></h2><p>Some things don't belong in the cloud. A newly minted flagship mobile application that's brimming with in-house code? Keep it close to the chest. Massive data sets that need timely analysis and evaluation? Go cloud. Unfortunately, many CIOs get trapped by the idea of “all-or-nothing”; that cloud ROI can only be achieved if every process makes the jump. This train of thought almost inevitably results in “nothing,” since the work involved in moving some legacy apps or protecting critical data can quickly outweigh the benefits. Instead, move what makes sense when it makes sense — the cloud is not a fixed or limited-time resource.</p><p>CIOs can make big mistakes when it comes to cloud, but mistakes are easily avoided when armed with knowledge. Go in with good allies, avoid poor supporters, embrace the shadows and move at a steady pace with the right data.</p><p><strong><em>Author Bio:</em></strong></p><p><em>David Eisner is the CEO and President of <a href="http://www.dataprise.com" rel="nofollow">Dataprise</a>. Dataprise is the premier provider of IT Services, such as cloud computing and business consulting services to businesses throughout a variety of industries.</em></p> https://www.enterprisecioforum.com/en/blogs/deisner/cioops-biggest-c-suite-cloud-mistakes#comments Business Issues CIO Leadership Technology Big Data Cloud IT Performance Blog-post CIO Cloud cloud computing Cloud Mistakes Wed, 12 Nov 2014 20:54:23 +0000 deisner 11021 at https://www.enterprisecioforum.com Converged infrastructure selected readings https://www.enterprisecioforum.com/en/blogs/jdodge/converged-infrastructure-selected-readin <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> An under-the-radar IT topic comes into the full light of day. </div> </div> </div> <p>Converged Infrastructure (CI) has generated as much curiousity among CIOs as any IT topic. How do I know? When we did <a href="http://www.enterprisecioforum.com/en/article/converged-infrastructure-dummies-20" rel="nofollow">a post about Converged Infrastructure for Dummies 2.0</a>&nbsp;a few months ago, several CIOs trying to get it were irate when there was a registration glitch to activate the download. I mean downright angry!</p><p>Ok, that's not terribly scientific, but their indignation provides a clue to the deep interest in CI. It also suggests CI is just starting to hit CIO radar screens. So here's a dozen links to great CI content and perspective. Let's start at the beginning. &nbsp; &nbsp;&nbsp;</p><p>1)&nbsp;<a href="http://en.wikipedia.org/wiki/Converged_infrastructure" rel="nofollow">What is converged infrastructure?</a></p><p>Old reliable - Wikipedia</p><p>2)&nbsp;<a href="http://h20195.www2.hp.com/v2/GetDocument.aspx?cc=us&amp;doclang=EN_US&amp;docname=4AA5-0433ENW&amp;doctype=analyst%20report&amp;lc=en&amp;searchquery=&amp;jumpid=reg_r1002_usen_c-001_title_r0001" rel="nofollow">Converged Infrastructure for Dummies 2.0</a></p><p>-- What everyone wants! A simple and easy guide to the benefits of CI.</p><p>3)&nbsp;<a href="http://www.cio.com/article/2387483/high-performance-computing/is-converged-infrastructure-the-future-of-the-data-center-.html" rel="nofollow">Is converged infrastructure the future of the data center?</a></p><p>-- This CIO.com article explains why it is. &nbsp;</p><p>4)&nbsp;<a href="http://h30507.www3.hp.com/t5/Converged-Infrastructure/Archiving-the-financial-services-world-with-a-converged/ba-p/175052#.VGONu_nF-dw" rel="nofollow">Archiving the financial services world with a converged infrastructure</a></p><p>-- A CI case study</p><p>5)&nbsp;<a href="http://www.enterprisecioforum.com/en/blogs/duncan-campbell/12-questions-gartner-says-ask-about-conv" rel="nofollow">The 12 questions to ask about converged infrastructure</a></p><p>-- What are you waiting for? Start asking them.</p><p>6)&nbsp;<a href="http://www8.hp.com/us/en/business-services/it-services.html?compURI=1077187&amp;jumpid=reg_r1002_usen_c-001_title_r0003#.VGOOV_nF-dw" rel="nofollow">Breaking IT and data center silos</a></p><p>-- Stop playing `Whack-a-Mole' and converge your data centers.</p><p>7)&nbsp;<a href="http://www.enterprisecioforum.com/en/blogs/billkosik/scalability-and-data-centers" rel="nofollow">Scalability and the data center</a></p><p>-- Why scaling the data center and CI go hand in glove.&nbsp;</p><p>8)&nbsp;<a href="http://youtu.be/_ySVdtanJcA" rel="nofollow">Converged Infrastructure: what it does and why you need it</a></p><p>-- Video! CI explained.</p><p>9)&nbsp;<a href="http://www.information-age.com/technology/data-centre-and-it-infrastructure/123458399/3-myths-converged-infrastructure" rel="nofollow">The three myths of converged infrastructure</a></p><p>-- The relationship between CI, innovation and legacy apps.</p><p>10)&nbsp;<a href="http://www8.hp.com/hpnext/posts/20th-century-fox-journey-converged-cloud?jumpid=reg_r1002_usen_c-001_title_r0013#.VGOOwfnF-dw" rel="nofollow">20th Century Fox and the journey to converged cloud</a></p><p>-- A CI case study</p><p>11)&nbsp;<a href="http://www.enterprisecioforum.com/en/blogs/duncan-campbell/rethinking-business-it%E2%80%9410-reasons-you-ne" rel="nofollow">Rethinking the business of IT - why you need to move to converged infrastructure now</a></p><p>-- Why IT and data center need to evolve.</p><p>12)&nbsp;<a href="http://www.crn.com/news/data-center/240155540/converged-infrastructure-bets-are-in-where-are-they-paying-off.htm" rel="nofollow">Converged infrastructure bets are in: Where are they paying off?</a></p><p>-- The solution provider view.</p><p>&nbsp;</p><p>Share the CI articles and posts you like best.&nbsp;</p><p>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a> and <a href="http://www,twitter.com/thedodgeretort" rel="nofollow">@thedodgeretort</a></p><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/jdodge/converged-infrastructure-selected-readin#comments Technology Converged Infrastructure Blog-post CI CIO Converged Infrastructure Data center IT Wed, 12 Nov 2014 16:51:35 +0000 jdodge 11016 at https://www.enterprisecioforum.com Top Cloud Computing Blogs 2014 Edition https://www.enterprisecioforum.com/en/blogs/ksenie/top-cloud-computing-blogs-2014-edition <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> We&#039;ve updated our top cloud blogger list. Take a look! </div> </div> </div> <p>In 2012, IDG’s Colin Browning wrote an <a href="http://www.enterprisecioforum.com/en/article/top-10-cloud-computing-bloggers" rel="nofollow">Enterprise CIO Forum article</a> listing the top cloud computing blogs for CIOs. But cloud computing, like all enterprise technology, has changed in two years. And we’ve updated our list to focus on the latest in cloud computing.</p><p>Some may look familiar, and others new.</p><p>Take a look at our 2014 review of some of the top cloud computing blogs! And be sure to list your favorite cloud blogs in the comments below.</p><p>Hint: The author’s names are links to their Twitter accounts! Be sure to follow them too!</p><p><a href="http://www.cloudave.com/" rel="nofollow">Cloud Ave</a><br /> <a href="https://twitter.com/i/discover" rel="nofollow">Cloud Ave<br /></a>Approximately fifteen cloud experts contribute to this blog, including <a href="https://twitter.com/IAmOnDemand" rel="nofollow">Ofir Nachmani</a>, <a href="https://twitter.com/chaoticflow" rel="nofollow">Joel York</a> and <a href="https://twitter.com/randybias" rel="nofollow">Randy Bias</a>. Look no further for multiple views on all things cloud.</p><p><a href="http://www.infoworld.com/blog/cloud-computing" rel="nofollow">Cloud Computing</a><br /> <a href="https://twitter.com/DavidLinthicum" rel="nofollow">David Linthicum<br /></a><a href="http://www.infoworld.com/blog/cloud-computing" rel="nofollow">InfoWorld</a>’s resident cloud expert David Linthicum is a top resource for all cloud focused information.</p><p><a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/bg-p/cloud-source#.VGOHwvnF-tM" rel="nofollow">Cloud Source</a><br /> <a href="https://twitter.com/christianve" rel="nofollow">Christian Verstraete<br /></a>HP’s Chief Technology Officer for Cloud Strategy Christian Verstraete has the answers to all the latest cloud challenges.</p><p><a href="http://cloudtweaks.com/" rel="nofollow">CloudTweaks</a><br /> <a href="https://twitter.com/cloudtweaks" rel="nofollow">CloudTweaks<br /></a>CloudTweaks is more than a resource, it’s a community. CloudTweaks also publishes a weekly cloud comic that will make you LOL.</p><p><a href="http://www.diversity.net.nz/" rel="nofollow">Diversity Limited</a><br /> <a href="https://twitter.com/benkepes" rel="nofollow">Ben Kepes<br /></a>Ben Kepes writes daily for his own blog covering technology, mobility enabled by the cloud. He also is a <a href="http://www.forbes.com/sites/benkepes/" rel="nofollow">Forbes columnist</a>.</p><p><a href="http://avoa.com/" rel="nofollow">Leading The IT Evolution</a><br /> <a href="https://twitter.com/tcrawford" rel="nofollow">Tim Crawford<br /></a>Tim Crawford covers technology innovation, cloud computing and the Internet of Things (IoT) in this must-read blog.</p><p><a href="http://gestaltit.com/" rel="nofollow">GestaltIT</a><br /> <a href="https://twitter.com/GestaltIT" rel="nofollow">Stephen Foskett<br /></a>One stop reading for virtualization, networking, storage and desktop engineering.</p><p><a href="https://www.rickscloud.com/" rel="nofollow">Rickscloud</a><br /> <a href="https://twitter.com/rickblaisdell" rel="nofollow">Rick Blaisdell<br /></a>Rick Blaisdell’s blog talks about cloud computing integration, virtualization and the latest and greatest news on cloud computing services. It also features guest posts!</p><p><a href="http://cloudpundit.com/" rel="nofollow">CloudPundit</a><br /> <a href="mailto:@cloudpundit" rel="nofollow">Lydia Leong<br /></a>Lydia Leong, analyst at <a href="http://www.gartner.com/technology/home.jsp" rel="nofollow">Gartner</a>, covers cloud computing and a variety of related technology topics.</p><p><a href="http://cloudcomputing.blogspot.com/" rel="nofollow">CloudComputing</a><br /> <a href="https://twitter.com/chirag_mehta" rel="nofollow">Chirag Mehta<br /></a>Vice President of Product Management and Business Development at <a href="http://www.sap.com/index.html" rel="nofollow">SAP</a> talks enterprise software with a focus on big data and cloud computing.</p><p>There are more… we know. But we’d like to hear your thoughts on other cloud computing blogs. Which do you regularly read? Or do you have your own cloud computing blog we should take a look at? Let us know!</p> https://www.enterprisecioforum.com/en/blogs/ksenie/top-cloud-computing-blogs-2014-edition#comments Technology Cloud Blog-post Wed, 12 Nov 2014 16:37:08 +0000 ksenie 11011 at https://www.enterprisecioforum.com Not Just for War - Changing the Perception of Drones https://www.enterprisecioforum.com/en/blogs/sophinadillard/not-just-war-changing-perception-drones <div dir="ltr">&nbsp;</div><div dir="ltr"><img src="https://3.bp.blogspot.com/-BSzLm7vZLjY/VGMKw7u6X5I/AAAAAAAAA1E/EQ2zMoP2SFI/s1600/use-of-drones.jpg" alt="" border="0" /></div><div dir="ltr">Unfortunately, drones are probably most commonly associated with the nightmarish scenarios playing out on everyday news. Reports of violence and political turmoil seem to plague these sophisticated machines which is really quite an injustice considering how useful they can be. Fortunately, not all is lost on the potential surrounding drones, and now more than ever they are finding acceptance and purpose within everyday society. Drone applications are plentiful, and the enthusiasm surrounding their use is stemming from just about every angle imaginable! Here are some of the creative ways drones are being used for good:<br /> <br /> <strong>Delivery</strong><br /> <br /> Amazon is reportedly clamoring to capitalize on this technology, launching efforts to create a drone doorstep delivery system. This ambitious goal would need to solve several roadblocks, like coordinating and gaining permission from the FAA (Federal Aviation Administration) as well as extending the current battery life of the average drone. Even so, several companies seem up to the challenge, with big names like Google and Dominoes joining in on the drone delivery bandwagon!<br /> <br /> <strong>Search and Rescue</strong><br /> <br /> SAR is a volunteer organization which is dedicated to search and rescue missions. The group passionately touts the lifesaving potential of drones, citing their video cameras and live feed capability. Capable of surveying large areas of land and reporting specific grid details, drones are also able to deliver crucial life support, like food and water. In addition, drones can theoretically be used to help alleviate the tremendous cost of a traditional search and rescue, which leaves a very large finance and resources footprint.<br /> <br /> <strong>Photography &amp; Video</strong><br /> <br /> Drones have opened up new doors in the creative and practical sides of photo and videography. Photographers, amateur and professional can both enjoy the benefits of an eye in the sky. It captures angles and moments that would have otherwise been missed, and this high tech photo op is becoming an increasingly favored feature at weddings and other memorable social events. The video and picture capability can also be used practically, as a diagnostic tool to help with home improvements and other large projects.<br /> <br /> <strong>Recreation</strong><br /> <br /> Despite all its functionality, you can’t overlook the sheer “cool factor” of owning your very own drone. They have the same appeal as any RC gadget, but kind of on steroids. Racing and outmaneuvering other drones has become a popular hobby and even if racing isn’t your thing, casually flying a drone through the park while checking the live feed can be a lot of fun! <br /> <br /> Interested in your own drone? It will still cost a pretty penny, but thanks to their popularity, there are affordable versions for those of us who just have to have our own! Have a look at below mentioned list of popular drones available in the market:<br /> <br /> Storm Drone FF Flying Platform- $360.00<br /> <br /> This fun drone boasts 9” x 4.7” rotors which helps steady the machine against wind. When equipped with a GoPro camera, it can record for up to seven minutes at a time and produce quality videos. <br /> <br /> H-King Darkwing- $167.00<br /> <br /> Living up to its name, the sleek design and lengthy wingspan of this drone is striking! Its construction is specifically meant for a stunning first-person viewing experience. <br /> <br /> LaTrax Alias- $150.00<br /> <br /> Beginners will find this manually operated drone to be a helpful introduction to flying. It’s durable construction means it won’t break easily and it’s still large enough to fit a small camera for the full drone experience!<br /> <br /> Already own your own? We want to know- what do you use your drone for?<br /> <br /> <em></em></div><div dir="ltr"><em><em>This article originally appeared at <a href="http://omniesolutions.blogspot.com/2014/11/not-just-for-war-changing-perception-of.html" rel="nofollow">here</a> <br /></em></em></div> https://www.enterprisecioforum.com/en/blogs/sophinadillard/not-just-war-changing-perception-drones#comments Technology Applications Blog-post drones Technology use of drones Wed, 12 Nov 2014 14:17:56 +0000 sophinadillard 11006 at https://www.enterprisecioforum.com CTO Focus Interview: Rick Blaisdell, Motus https://www.enterprisecioforum.com/en/blogs/ben-stephenson/cto-focus-interview-rick-blaisdell-motus <p>In the second installment of our CTO Focus Interview series (view <a title="CIO Focus Interview" href="http://blog.greenpages.com/cloud-computing/cio-focus-interview-stuart-appley/" target="_blank" rel="nofollow">part I with Stuart Appley here</a>), I got the chance to sit down with Rick Blaisdell, CTO at Motus, at a coffee shop in Portsmouth, NH.&nbsp;Rick is an experienced&nbsp;IT pro with more than 20 years experience in the industry. Some of his specialties include SaaS, cloud computing, virtualization, software development and business process improvement.&nbsp; Rick is a top thought leader in the industry. He has a very successful blog, <a title="Ricks Cloud" href="https://www.rickscloud.com/" target="_blank" rel="nofollow">Rick’s Cloud</a>,&nbsp;and his opinions and insights are very well respected on <a title="Rick Blaisdell" href="https://twitter.com/RickBlaisdell" target="_blank" rel="nofollow">Twitter</a>. Definitely an interesting guy to talk to – enjoy!</p><p><strong>Ben:</strong> Fill us in on what you do and your IT experience.</p><p><strong>Rick</strong>: I’m currently the CTO for Motus, a mobile technology company that builds solutions for mobile employees. I also advise technology companies on becoming more efficient, scalable and moving physical workloads to the cloud and streamlining their development processes. Small technology companies need direction with best practices; most of these companies have not yet invested heavily in physical infrastructure so it is easier for them to move to, and embrace, cloud technologies. Mid-size and larger companies have more complex issues when moving to the cloud as most of their infrastructure is physical with complex workloads that require assessments, partners and advanced planning before moving to the cloud.&nbsp; I help these organizations with these types of decisions.</p><p><strong>Ben</strong>: What are your main goals when heading into a new company?</p><p><strong>Rick</strong>: My main objective is to migrate companies from CapExt to OpEx. I spend a lot of time discussing the advantages of moving to the cloud. The ultimate goal is to remove internal employee workloads to SaaS and external customer facing production workloads to IaaS and PaaS. Internally it is critical to get your data out of your closet. An enterprise private of hybrid managed cloud solution with process and controls around the data is often the solution for most companies. Migrating 100% of the workloads to the cloud may not be feasible for all companies, although if you are a small business or new technology startup that should be the goal.</p><p><strong>Ben</strong>: Do you often get pushback from C-level executives about utilizing the cloud?</p><p><strong>Rick</strong>: The C-suite understands the high level benefits and business value of utilizing the cloud. One of the unknown barriers of moving to the cloud often comes from within a company’s own internal IT fears.&nbsp; The IT team has been focused on keeping physical environments running, security, patching and maintenance. Shifting to the cloud removes physical resources into virtual resources and now with managed solutions, shared experts are responsible for making sure your environment has the highest level of SLA’s and security. The internal IT team sees this as a threat and in some cases will find out how to slow cloud adoption.&nbsp; The C-Suite wants to be efficient and grow by concentrating on what’s core to the business, not spending energy hiring employees to maintain hard drives. The challenge is educating and retraining these employees to be able to take on new tasks that accelerate the core mission of the company.</p><p><em>{Download our latest whitepaper – <a href="http://response.greenpages.com/White-Paper-8-Point-Checklist-Data-Center-Move-B" rel="nofollow">8 Point Checklist for a Successful Data Center Move</a></em>&nbsp;}</p><p><strong>Ben</strong>: Which area of technology interests you the most?</p><p><strong>Rick</strong>: The Internet of Things fascinates me, where there are billions of objects like toothbrushes, wearable technology, home appliances and tracking devices collecting data. Most technology companies in the near future will have some sort of IoT device. I recently wrote a blog post highlighting some cool <a title="Internet of Things" href="https://www.rickscloud.com/cool-internet-of-things-startups/" target="_blank" rel="nofollow">internet of things startups</a>.</p><p><strong>Ben</strong>: What’s your view on the concept of Anything-as-a-Service?</p><p><strong>Rick</strong>: Things are shifting to the “as a service” mentality. People like the pay as you go model. Everything is being added to the XaaS stack. Overall, I embrace the financial advantages of this model. All the companies I have worked with end up being more secure and efficient while saving money after migrating to SaaS, PaaS, DaaS, MCaaS services.</p><p><strong>Ben</strong>: Throughout your career, what concept or technology would you say has had the most drastic impact on IT?</p><p><strong>Rick</strong>: Virtualization would be my first answer. High density cloud environments cost less, are more efficient, are easier to scale and can be as secure as any physical environment. This has had a major impact on IT.</p><p><strong>Ben</strong>: Where do you see IT in the next 5-7 years?</p><p><strong>Rick</strong>: That is a long way out, my guess is that workloads will be fully commoditized, think of Priceline when you search for hotels today, this is where the world is headed, providers with services large and small available at discounts that meet your SLA’s, security, time frame all being managed and seamlessly migrated between each other.&nbsp;If this doesn’t happen, I will buy you dinner <img class="wp-smiley" alt=";)" src="http://blog.greenpages.com/wp-includes/images/smilies/icon_wink.gif" /></p><p><em>This was originally posted on <a href="http://blog.greenpages.com/cloud-computing/cto-focus-interview-rick-blaisdell-motus/" target="_blank" rel="nofollow">http://blog.greenpages.com/cloud-computing/cto-focus-interview-rick-blaisdell-motus/</a></em></p> https://www.enterprisecioforum.com/en/blogs/ben-stephenson/cto-focus-interview-rick-blaisdell-motus#comments Business Issues CIO Leadership Technology Cloud Blog-post Wed, 12 Nov 2014 13:19:36 +0000 Ben Stephenson 11001 at https://www.enterprisecioforum.com An Overview of Content Creation and Marketing https://www.enterprisecioforum.com/en/blogs/mehulb/overview-content-creation-and-marketing <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Creating content is as crucial as creating the content marketing strategy and many consider it a difficult task. In today’s online world, it is not so easy to create quality and engaging content that fulfils search engines and readers expectations. </div> </div> </div> <p>Creating content is as crucial as creating the content marketing strategy and many consider it a difficult task. In today’s online world, it is not so easy to create quality and engaging content that fulfils search engines and readers expectations. Given this fact, many agencies succeed in creating good content because they take care to avoid some basic mistakes discussed herein below:</p><ul><li><strong>Not Enough Quality Content</strong></li></ul><p>These days almost every SMB(Small Medium Businesses) knows the importance of social media presence. However, sometimes all their efforts are in vain because of the poor or non-engaging content.</p><p>When we say the content is of a poor quality, we mean it is not worth or valuable to the readers. This leads to a low engagement with the content and readers lose their interest towards the particular brand.</p><ul><li><strong>Inconsistent Content</strong></li></ul><p>Creating quality content is not enough; you need to be consistent as well. Every time a visitor arrives at your Facebook, twitter or blog page, they should see a new and valuable post.</p><p>This helps you to encourage them to share your views every time, so that you gain new followers for your social network or blog.</p><ul><li><strong>Content Without Photos</strong></li></ul><p>According to Quick Sprout’s owner Neil Patel, the blog posts with images tend to get 94% more views. This means that content without photos or other interactive materials, is less engaging. It is obvious that no one would like to read the bulk text without relevant photos.</p><p>Avoiding these basic mistakes will help you to focus on creating valuable content.</p><p>Creating the perfect content is an important aspect of online marketing. Everything that helps in making a brand get noticed through online marketing depends on the structure of content.&nbsp; There needs to be a proper way of getting your content across, in order to perform a complete online marketing task. This includes content strategy, social media content, blog content etc.</p><p><strong>When you are starting to create content, you need to ask yourself these questions:</strong></p><ol><li>What should I write about?</li><li>What type of content should I create?</li></ol><p>These two questions will let you focus on the key aspects of the content you need to create. Your content needs to strike the right balance between being informative and entertaining, while also making sure it supports the company’s marketing strategy.</p><p>For this&nbsp;<strong>you need to clarify your business consideration</strong></p><ul><li>Your industry expertise</li><li>Your brand focus</li><li>Your audience goals</li><li>Your audience interest</li></ul><p>After understanding the business consideration while creating content,&nbsp;<strong>each piece of content should have a clearly defined purpose.</strong>&nbsp;Your purpose can vary from providing information, to entertaining, to starting a conversation or sharing the industry knowledge and resource.</p><p>All these points need to form part of your marketing strategy, to increase performance. This can be pictorially depicted through a content marketing pyramid.<a class="aligncenter" href="http://www.aed.in/wp-content/uploads/2014/10/content-marketing-pyramid.jpg" rel="lightbox[auto_group1]" rel="nofollow"><img class="aligncenter size-full wp-image-3783" src="http://www.aed.in/wp-content/uploads/2014/10/content-marketing-pyramid.jpg" alt="content marketing pyramid" height="405" width="530" /></a></p><p>This pyramid will show you the priorities to be given to your efforts. It starts from content curation and ends with Webinars and E-books.</p><p>Also there are&nbsp;<strong>some new tactics that have gained lot of popularity among marketers</strong>, leading to better conversion rates, such as:</p><ol><li>Infographics</li><li>Presentations</li><li>Microbloging</li><li>Online news release</li><li>Custom social network</li><li>Mobile application</li><li>Video blog</li><li>Facebook application</li></ol><p><strong>The basics of creating content haven’t changed yet but it has evolved with some new techniques.</strong>All these will help you to gain a better ROI on your marketing efforts. It also costs significantly less than traditional marketing methods and generates 3 times more leads in the process.</p><p>Content marketing is all about building brand awareness and there is no doubt it has reached the topof the priority list of marketers.</p><p>Let us know in who is on the top in your priority list when it comes to marketing online?</p><p><strong>Source</strong>: <a href="http://www.aed.in/blog/overview-of-content-creation-and-marketing" rel="nofollow">http://www.aed.in/blog/overview-of-content-creation-and-marketing</a></p> https://www.enterprisecioforum.com/en/blogs/mehulb/overview-content-creation-and-marketing#comments Business Issues Services Blog-post content creation content marketing Wed, 12 Nov 2014 11:21:35 +0000 mehulb 10996 at https://www.enterprisecioforum.com 4 Major Factors To Implement DMS https://www.enterprisecioforum.com/en/blogs/mehulb/4-major-factors-implement-dms <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> A document management system is a tool which stores, sorts and indexes a document with its standard parameters and special parameters as established by the company implementing it and allows for easy retrieval using minimum search parameters. </div> </div> </div> <p>A&nbsp;<strong>document management system</strong>&nbsp;is a tool which stores, sorts and indexes a document with its standard parameters and special parameters as established by the company implementing it and allows for easy retrieval using minimum search parameters.</p><p>Not only does it store individual documents in an optimized form but also allows them to be scanned and stored as a set or related files.</p><p>In short, it allows replication of a physical file storage system whilst saving physical storage space and hence can be used by companies and individuals alike.</p><p>Document management system especially helps people who do not have a lot of time to get their documents indexed and in order; this can be done by using the inbuilt features provided in the system.</p><p>Thought there are various motivating factors that would push companies into <a href="http://www.ebuild.co.in/document-management-system.html" rel="nofollow">adopting a document management system</a>, it would help companies in taking informed decision and anticipate the success of implementing a document management system if they consider following factors while evaluating it:</p><ol><li><strong>Ease of use</strong>:<br />Every new initiative is faced with resistance from some quarters and especially from employees who are expected to work on it. If the document management software chosen is complicated, the employees won’t use it. Hence, it is best to keep it simple so that it is widely accepted and implemented in the stipulated time frame</li></ol><ol start="2"><li><strong>Infrastructure needs:&nbsp;</strong><br />Many a time’s companies underestimate the need to evaluate a new product in context of the existing infrastructure that they have or is there a need to upgrade them. This is true when it comes to the storage capacity, network connectivity with the document management system, integration with legacy systems etc. An effective document management software should seamlessly integrate with your organizations current infrastructure</li></ol><ol start="3"><li><strong>Seeing the light at the end of tunnel</strong>:<br />At times it is essential to replace or add some infrastructure to the current setup as required by the document management software so that it can be utilized to its potential. However, the same isn’t true for your employees. It is hence extremely important to consider a document management system that can be managed by your existing staff.</li></ol><ol start="4"><li><strong>Scalability</strong>:<br />This is another area which is often overlooked while zeroing on a document management system which could at a later date come to haunt the IT team. One should know whether the selected system is scalable in terms of growing user base, storage capacity, plugging business processes as required from time to time and what would it cost the company.</li></ol><p>At this point you would be able to see yourself through to the final stages of agreement with the vendors and eagerly looking forward to using the system.</p><p><strong>Source</strong>: <a href="http://www.ebuild.co.in/blog/4-major-factors-to-implement-dms.html" rel="nofollow">http://www.ebuild.co.in/blog/4-major-factors-to-implement-dms.html</a></p> https://www.enterprisecioforum.com/en/blogs/mehulb/4-major-factors-implement-dms#comments Business Issues IT Performance Blog-post DMS document management system Wed, 12 Nov 2014 09:20:49 +0000 mehulb 10991 at https://www.enterprisecioforum.com CFOs show that they can get down to business https://www.enterprisecioforum.com/en/blogs/mylessuer/cfos-show-they-can-get-down-business <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Have you talked your CFO regarding what really matters to them? Is it time to do so? </div> </div> </div> <p>At the <a href="http://theinnovationenterprise.com/summits/cfo-sanfrancisco-2014" rel="nofollow">CFO Rising West Conference</a> on October 30<sup>th</sup> and 31<sup>st</sup>, there were sessions on managing capital expenditures, completing an IPO, and even managing margin and cash flow. However, the keynote presenters did not spend much of time on these topics. Instead, they focused on how CFOs need to help their firms execute better. Here is a quick summary of the suggestions made from CFOs in broadcasting, consumer goods, retail, healthcare, and medical devices.</p><p><strong>The Modern CFO is a Strategic CFO</strong></p><p>The Broadcasting CFO started his talk by saying he was not at the conference to share why CFOs need to move from being “bean counters to strategic advisors”. He said “let’s face it the modern CFO is a strategic CFO”. Agreeing with this viewpoint, the Consumer Goods CFO said that finance organizations have a major role to play in business transformation. He said that finance after all is the place to drive corporate improvement as well as business productivity and business efficiency.</p><p><strong>CFOs talked about their business’ issues</strong></p><p>The Retailer CFO talked like he was a marketing person. He said retail today is all about driving a multichannel customer experience. To do this, finance increasingly needs to provide real business value. He said, therefore, that data is critical to the retailer’s ability to serve customers better. He claimed that customers are changing how they buy, what they want to buy, and when they want to buy. We are being disrupted and it is better to understand and respond to these trends. We are trying, therefore, to build a better model of ecommerce.</p><p>Meanwhile, the Medical Devices CFO said that as a supplier to medical device vendors “what we do is compete with our customers engineering staffs”. And the Consumer Goods CFO added the importance of finance driving sustained business transformation.</p><p><strong>CFOs want to improve their business’ ability to execute</strong></p><p>The Medical Devices CFO said CFOs need to look for “earlier execution points”. They need to look for the drivers of behavior change. As a key element of this, he suggested that CFOs need to develop “early warning indicators”. He said CFOs need to actively look at the ability to achieve objectives. With sales, we need to ask what deals do we have in the pipe? At what size are these deals? And at what success rate will these deals be closed? Only with this information, can the CFO derive an expected company growth rate. He then asked CFOs in the room to identify themselves. With their hands in the air, he asked them are they helping to create a company that executes or not. He laid down the gauntlet for the CFOs in the room by then asserting that if you are not creating a company that executes then are going to be looking at cutting costs sooner rather than later.</p><p>The retailer CFO agreed with this CFO. He said today we need to focus on how to win a market. We need to be asking business questions including:</p><ul><li>How should we deploy resources to deliver against our firm’s value proposition?</li><li>How do we know when we win?</li></ul><p><strong>CFOs claim ownership for enterprise performance measurement</strong></p><p>The Retail CFO said that finance needs to own “the facts for the organization”—the metrics and KPIs. This is how he claims CFOs will earn their seat at the CEOs table. He said in the past the CFO have tended to be stoic, but this now needs to change.</p><p>The Medical Devices CFO agreed and said enterprises shouldn’t be tracking 150 things—they need to pare it down to 12-15 things. They need to answer with what you measure—who, what, and when. He said in an execution culture people need to know the targets. They need measurable goals. And he asserted that business metrics are needed over financial metrics. The Consumer Goods CFO agreed by saying financial measures alone would find that “a house is on fire after half the house had already burned down”. The Healthcare CFO picked up on this idea and talked about the importance of finance driving value scorecards and monthly benchmarks of performance improvement. The broadcaster CFO went further and suggested the CFO’s role is one of a value optimizer.</p><p><strong>CFOs own the data and driving a fact based, strategic company culture</strong></p><p>The Retail CFOs discussed the need to drive a culture of insight. This means that data absolutely matters to the CFO. Now, he honestly admits that finance organizations have not used data well enough but he claims finance needs to make the time to truly become data centric. He said I do not consider myself a data expert, but finance needs to own “<strong><em>enterprise data and the integrity of this data</em></strong>”. He said as well that finance needs to ensure there are no data silos. He summarized by saying finance needs to use data to make sure that resources are focused on the right things; decisions are based on facts; and metrics are simple and understandable. “In finance, we need use data to increasingly drive business outcomes”.</p><p><strong>CFOs needs to drive a culture that executes for today and the future</strong></p><p>Honestly, I never thought that I would hear this from a group of CFOs. The Retail CFO said we need to ensure that the big ideas do not get lost. We need to speed-up the prosecuting of business activities. We need to drive more exponential things (this means we need to position our assets and resources) and we need, at the same time, to drive the linear things which can drive a 1% improvement in execution or a 1% reduction in cost. Meanwhile, our Medical Device CFO discussed the present value, for example, of a liability for rework, lawsuits, and warranty costs. He said that finance leaders need to ensure things are done right today so the business doesn’t have problems a year from today. “If you give doing it right the first time a priority, you can reduce warranty reserve and this can directly impact corporate operating income”.</p><p><strong>CFOs need to lead on ethics and compliance</strong></p><p>The Medical Devices CFO said that CFOs, also, need to have high ethics and drive compliance. The Retail CFO discussed how finance needs to make the business transparent. Finance needs to be transparent about what is working and what is not working. The role of the CFO, at the same time, needs to ensure the integrity of the organization. The Broadcaster CFO asserted the same thing by saying that CFOs need to take a stakeholder approach to how they do business.</p><p><strong>Final remarks</strong></p><p>In whole, CFOs at CFO Rising are showing the way forward for the modern CFOs. This CFO is all about the data to drive present and future performance, ethics and compliance, and business transparency. This is a big change from the historical controller approach and mentality. I once asked a boss about what I needed to be promoted to a Vice President; my boss said that I needed to move from a technical specialist to a business person. Today’s CFOs clearly show that they are a business person first.</p><p><strong>Related links</strong><br /> <strong>Solution Brief</strong>: <a href="http://www.informatica.com/us/vision/intelligent-data-platform/#fbid=6HpVUXgm3ow" rel="nofollow"><strong>The Intelligent Data Platform</strong></a><br /> <strong>Related Blogs</strong><br /> <a href="http://blogs.informatica.com/perspectives/2014/09/17/cfo-move-to-chief-profitability-officer/#fbid=FSkcGNkoan7" rel="nofollow">CFOs Move to Chief Profitability Officer</a></p><p><a title="CFOs Discuss Their Technology Priorities" href="http://blogs.informatica.com/perspectives/2014/09/11/cfos-discuss-their-technology-priorities/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">CFOs Discuss Their Technology Priorities</a><br /> <a title="The CFO Viewpoint upon Data" href="http://blogs.informatica.com/perspectives/2014/09/03/the-cfo-viewpoint-upon-data/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">The CFO Viewpoint upon Data</a><br /> <a title="How CFOs can change the conversation with their CIO?" href="http://blogs.informatica.com/perspectives/2014/07/07/how-cfos-can-change-the-conversation-with-their-cio/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">How CFOs can change the conversation with their CIO?</a><br /> <a title="New type of CFO represents a potent CIO ally" href="http://blogs.informatica.com/perspectives/2014/06/30/new-type-of-cfo-represents-a-potent-cio-ally/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">New type of CFO represents a potent CIO ally</a><br /> <a title="Competing on Analytics" href="http://blogs.informatica.com/perspectives/2014/08/22/competing-on-analytics-a-follow-up-to-thomas-h-davenports-post-in-hbr/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">Competing on Analytics</a><br /> <a title="The Business Case for Better Data Connectivity" href="http://blogs.informatica.com/perspectives/2014/06/25/the-business-case-for-better-data-connectivity/" target="_blank" rel="nofollow">The Business Case for Better Data Connectivity</a></p><p><strong>Twitter</strong>: <a href="https://twitter.com/MylesSuer" rel="nofollow"><strong>@MylesSuer</strong></a></p> https://www.enterprisecioforum.com/en/blogs/mylessuer/cfos-show-they-can-get-down-business#comments Business Issues IT Performance Blog-post CFO data Enterprise Performance Management Tue, 11 Nov 2014 21:54:13 +0000 myles.suer 10986 at https://www.enterprisecioforum.com Stolen Credentials Led to Data Breaches at Universities https://www.enterprisecioforum.com/en/blogs/thupham/stolen-credentials-led-data-breaches-uni <p>Earlier this year, the University of Maryland suffered a data breach of more than 300k students and personnel, prompting an investigation by the Secret Service and resulting in a testimony before Congress by the UMD president. As the&nbsp;<a href="http://chronicle.com/article/Data-Breaches-Put-a-Dent-in/145341/" rel="nofollow">Chronicle of Higher Education</a>&nbsp;reported, the total costs of the data breach could easily reach millions of dollars, with expenses spread across five years of credit monitoring, legal and IT forensics firm fees.</p><p>Another case in early 2013 involving the Maricopa County Community College (MCCCD) has resulted in costs totaling $19.7 million - a hacked server was never replaced, leading to the discovery of 14 databases containing 2.5 million employee and student records. Find out more in&nbsp;<a href="https://www.duosecurity.com/blog/college-data-breach-triples-in-cost-to-nearly-20-million-tuition-raised" rel="nofollow"><em>College Data Breach Triples in Cost to Nearly $20 Million; Tuition Raised</em></a>.</p><p><strong>Two Breaches in Two Months</strong></p><p>UMD’s initial breach by an external attacker occurred in February, but it was followed by another breach in March carried out by an ex-contractor of the university. The hacker claimed to be a whistleblower, and his breach into UMD’s databases was intended to show just how poorly secured they were. He replicated the February breach and posted the personal information of a university official on Reddit.</p><p>The vigilante hacker was formerly employed with a tech firm contracted by the university, as the&nbsp;<a href="http://www.washingtonpost.com/local/crime/former-contractor-calls-himself-whistleblower-in-exposing-security-problems-at-u-md/2014/04/10/7312699e-c0b3-11e3-b195-dd0c1174052c_story.html" rel="nofollow">Washington Post</a>&nbsp;reports.</p><p>The first breach was detailed in testimony of UMD’s president, Wallace Loh, before the&nbsp;U.S. Senate Committee on Commerce, Science, and Transportation. Attackers targeted a photo-sharing site of the university, uploading a trojan while using the Tor network to hide their identity.</p><p>They managed to get into UMD’s IT management directory, steal and change IT administrator passwords and get access to a database containing the names, SSNs and university IDs of students and staff - proving that, once again, the use of only passwords to protect sensitive information gives remote attackers an easy way in.</p><p><strong>A Single Password: The Downfall</strong></p><p>Loh emphasized the specific difficulties that universities face with cybersecurity, including centralization and finding a balance between security and access:</p><p>“A university is an open organization; there are many points of access because it is all about the free exchange of information,” Loh said in his testimony. “In the private sector, you can centralize cybersecurity. You cannot do that at a university, so we have to find that proper balance between security and access, and that is the challenge for all universities.”</p><p>While that may be true, the common vein in many data breaches across many different sectors is the ability to use a single password to access thousands if not millions of user data, from SSNs to credit and debit card numbers, as exemplified in the Target CFO’s own testimony to Congress alongside UMD’s president.</p><p>And that shows a clear need for better authentication security, which two-factor authentication can provide for any type of login, particularly administrative logins that often include privileged access to sensitive databases.</p> https://www.enterprisecioforum.com/en/blogs/thupham/stolen-credentials-led-data-breaches-uni#comments Business Issues CIO Leadership Technology Cloud IT Performance Mobility Security Blog-post Cyber security data breach Data security information security Risk Management Security Two Factor Authentication Tue, 11 Nov 2014 17:49:03 +0000 ThuPham 10981 at https://www.enterprisecioforum.com Understanding Your Digital Transformation Agenda: How Do You Meet Customers' Real-Time Expectations? https://www.enterprisecioforum.com/en/blogs/adamsmith/understanding-your-digital-transformatio-0 <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> A true digital strategy, central to business growth today, is much more than just a mobile app strategy, and requires a complete transformation of the business… </div> </div> </div> <p><a title="Digital Transformation" href="http://info.objectfrontier.com/webinar/digital-transformation" target="_blank" rel="nofollow"><img src="http://info.objectfrontier.com/Portals/149979/images/digital-transformation-webinar-banner.png" alt="Digital Transformation" height="210" width="990" /></a></p><p>Digitally transforming your enterprise requires a whole new way of thinking and operating –&nbsp;not only in the IT department, but throughout the <strong><em>entire corporation.</em></strong></p><p>It all starts with <strong>re-examining your customer's journey</strong> <em>from their perspective</em> to predict their next most likely actions, and then building your digital products and services around those needs. It requires an <strong>outside-in approach</strong> that focuses on what the customer actually wants to do rather than what the business thinks they should do.</p><p>Check out the numbers: Companies that are&nbsp;<strong>customer experience leaders&nbsp;</strong><em><strong>outperform their peers by nearly 30</strong></em><em><strong>%</strong></em>&nbsp;on the S &amp; P index (Forrester Research, Inc. <a title="The Business Impact of Customer Experience" href="http://solutions.forrester.com/Global/FileLib/Forr_Perspective_/Forrester-Perspective-CX-2.pdf" target="_blank" rel="nofollow">The Business Impact of Customer Experience</a>, 2013). These businesses know that it's&nbsp;not just the front-end UI that needs attention – exceptional digital products require that you simplify all your systems on the back-end, too. But reorganizing and re-operating in this way is a huge undertaking…</p><p><strong><em>The Challenge</em></strong><em>: Customers are constantly changing their behavior faster than firms</em><em>&nbsp;are evolving their business model, processes, and technology.</em></p><p>Join us for a 30-minute webinar so you can future-proof your business strategy and adapt your organization to the digital world!</p><h2 align="center"><a title="How Do You Meet Customers&#039; Real-Time Expectations?" href="http://info.objectfrontier.com/webinar/digital-transformation/" target="_blank" rel="nofollow">Understanding Your Digital Transformation Agenda:</a></h2><h3 align="center"><strong>How Do You Meet Customers' Real-Time Expectations?</strong></h3><h3 align="center">Thursday, December 4, 2014, 1:00-1:30pm ET</h3><h3 align="center">Featuring <strong>Forrester Analyst</strong> John McCarthy and OFS CEO Rich Napoli</h3><h3>&nbsp;</h3><h3>Discover:</h3><ul><li>Why it’s essential to understand your customer’s complete journey</li><li>How businesses today are using digital to drive engagement and revenue</li><li>How to adopt a Product Engineering Mindset to foster business agility</li><li>How to structure your organization and find the right skillsets</li><li>How to bridge the gap between customer expectations and the products you deliver</li></ul><p><em>Find out how to stay a step ahead of customers’ expectations and transform your business to provide meaningful digital experiences using an agile, product mindset.</em></p><p><em><a title="Digital Transformation" href="http://info.objectfrontier.com/webinar/digital-transformation" target="_blank" rel="nofollow"><strong>To Register</strong></a></em><strong><em>, please visit</em></strong> <a href="http://info.objectfrontier.com/webinar/digital-transformation" rel="nofollow">http://info.objectfrontier.com/webinar/digital-transformation</a></p><p><em><br /></em></p> https://www.enterprisecioforum.com/en/blogs/adamsmith/understanding-your-digital-transformatio-0#comments CIO Leadership Services Blog-post chief digital officer CIO CTO digital business digital transformation Tue, 11 Nov 2014 11:00:36 +0000 adamsmith 10976 at https://www.enterprisecioforum.com Understanding Your Digital Transformation Agenda: How Do You Meet Customers' Real-Time Expectations? https://www.enterprisecioforum.com/en/blogs/adamsmith/understanding-your-digital-transformatio https://www.enterprisecioforum.com/en/blogs/adamsmith/understanding-your-digital-transformatio#comments Quick Post Blogs Tue, 11 Nov 2014 10:44:27 +0000 adamsmith 10971 at https://www.enterprisecioforum.com Salesforce Training Institutes in Chennai https://www.enterprisecioforum.com/en/blogs/jackson10001/salesforce-training-institutes-chennai <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Salesforce Training in Chennai, Salesforce Course in Chennai </div> </div> </div> <p>Fita is one of the leading training institutes in Chennai which offers best <a href="http://salesforcecrmtraining.in/" rel="nofollow"><strong>Salesforce Training in Chennai</strong></a> at reasonable cost when compared to other training institutes in chennai. So join this institutes and develop your salesforce skills.</p> https://www.enterprisecioforum.com/en/blogs/jackson10001/salesforce-training-institutes-chennai#comments Technology Services Blog-post Salesforce Certification Salesforce Training Tue, 11 Nov 2014 10:39:34 +0000 jackson10001 10966 at https://www.enterprisecioforum.com