Enterprise CIO Forum - Thriving in a technology-enabled world https://www.enterprisecioforum.com/en/ContentVault en Stories from the field: How one bank deepens customer engagement with cloud computing https://www.enterprisecioforum.com/en/blogs/terencengai/stories-field-how-one-bank-deepens-custo <p>A big part of my job that I really enjoy is going out and meeting with customers, and listening to how they’re using cloud computing to realize business goals. Increasingly, I’m meeting with not only members of the IT team but with business leaders—CEOs and lines of business heads. And they’re telling me how technology is playing a central role in their business plans. I recently met a CEO of a European financial institution that is planning to use cloud computing to spark revenue growth. I found the bank’s story inspiring and I’d love to share it with you here.</p><p>This customer is looking to build out new services and enhance existing offerings, including mobile payments, e-invoicing, cross-country money transfers, and electronic signature. Cloud computing will enable the company to expand its business by:&nbsp;</p><ul><li>Introducing new services for customers</li><li>Upgrading existing services</li><li>Deepening engagement with customers</li></ul><p>&nbsp;</p><p><strong>Quickly deliver new solutions</strong></p><p>One of the company’s goals is to become a part of a single payer system, delivering more value to its customers. The Electronic Budget Payments Systems (SERBA) is an ongoing initiative to establish a single payment system across the European Union. It provides financial companies a way to monitor, manage, and service payments. End users would be able to make purchases and pay the same way electronically in all participating countries.</p><p>Cloud computing will help the company facilitate and provide this new service in a number of ways. By using cloud for a development and testing environment, the company can respond to business pressures in a more agile manner, quickly spinning up resources to develop, test, and deploy new services and release them to the market.</p><p>Rather than taking months to upgrade applications, the cloud will enable the company to scale up and scale out resources, continuously delivering incremental updates that are necessary to remain competitive, especially on mobile platforms.</p><p>&nbsp;</p><p><strong>Store data in the cloud for maximum flexibility</strong></p><p>Because cloud computing lets you move and aggregate data into a central place, the financial company can use cloud to facilitate transactions in multiple countries and across different geographic locations. A cloud-enabled infrastructure allows it to more freely exchange information and connect to other systems, because the application is abstracted from the infrastructure itself.</p><p>How does this help with a single payment system across Europe? Different banks have different data services and different technologies. Without cloud computing, it would be difficult to connect one bank using X technology to another bank using Y system. By decoupling the applications from the underlying infrastructure, the applications can be instrumented to exchange data more flexibly without hardware or infrastructure constraints.</p><p>So what does this all mean for the bank and its customers? For customers, it means they can use any portal or device to access the single payer system, as well as interact with different applications across SERBA. For the bank, it means it can deepen its engagement with customers because customers can use devices with different form factors to interact with it.</p><p>&nbsp;</p><p><strong>Upgrading existing services</strong></p><p>Cloud computing also makes it possible for the financial company to improve existing services. Part of the company’s business involves issuing invoices on behalf of clients and collecting payments for clients who lack their own procurement and invoicing system. Cloud computing lets the company spin up resources as needed to meet fluctuating demand and rely on OpEx rather than CapEx to fund those services.</p><p>The financial company can leverage cloud to make other services more cost-effective, such as managing transfers and providing electronic signatures. By offering mobile cash-management services such as person-to-person payments, the company can grow its user base by making services more convenient and accessible while reining in CapEx to fund those services.</p><p>To learn how a trusted partner can help your enterprise develop an innovative use for cloud, please visit <a href="http://www.hp.com/helion" rel="nofollow">http://www.hp.com/helion</a></p> https://www.enterprisecioforum.com/en/blogs/terencengai/stories-field-how-one-bank-deepens-custo#comments Business Issues Cloud Blog-post banks financial services HP Helion hybrid cloud managed cloud private cloud public cloud Tue, 25 Nov 2014 20:24:32 +0000 terencengai 11181 at https://www.enterprisecioforum.com Evolution of Law to Address Social Media Privacy Concerns for Employees & Employers https://www.enterprisecioforum.com/en/blogs/robert-conrad/evolution-law-address-social-media-priva <p>When the Forefathers of the United States were creating the foundations of a new nation, the Internet was still centuries away from being created. &nbsp;However, due to the astronomical rise in social media in recent years, new concerns have arisen, perhaps the most prominent being privacy. &nbsp;Many employees do not want their private lives aired out for their superiors to see, and there are some instances where employers would need to be privy to certain sensitive details, such as illicit drug use or other illegal activity, in order to retain the integrity of their business. &nbsp;<br /> <br /> So what is being done to address these two very real and warranted concerns?</p><p>For one, the landscape of social media is ever-changing and generally focused on improving the user experience. &nbsp;However, some of these enhancements can prove to be too invasive for some. &nbsp;For example, Facebook has created a new method of <a href="https://www.abine.com/blog/2014/facebook-tracking-browsing/" rel="nofollow">creating targeted ads</a> for its users by tracking their browsing history on external sites and mobile apps. &nbsp;For those with privacy concerns, Facebook has created an “opt-out” tool that doesn’t track browsing history. &nbsp;</p><p>But what about employees who network with their co-workers and superiors on a platform such as Facebook? &nbsp;&nbsp;Unfortunately, there have been some who have made the mistake of broadcasting their weekend’s illicit activities to all of their social media friends, including their bosses. &nbsp;One example would be former school bus driver Johnny Cook, who went on a <a href="https://storify.com/CNN/10-people-who-learned-social-media-can-get-you-fir" rel="nofollow">public Facebook rant</a> about the unfairness of the school’s student lunch policy. &nbsp;<br /> <br /> So if we, as employees, can’t let it all hang out on social media, what should be considered protected and private?</p><p>Certain states, such as Washington, have enacted legislation to address privacy concerns regarding social media and the workplace. &nbsp;Effective July 28, 2013, in the state of Washington, employers are prohibited from requesting or coercing an employee to provide them with their login credentials or to view their social media profile. &nbsp;However, <a href="http://omba.wsu.edu/resources/articles/recent-trends-of-social-media-law-and-the-workplace-environment/" rel="nofollow">these protections</a> do not cover an employee during the course of an investigation by the employer or if a questionable post or interaction took place on a company platform, such as a company Intranet or application.</p><p>However, on a federal level, there has yet to be a clear cut definition of privacy drafted regarding social media. &nbsp;The National Labor Relations Board, or NLRB, is the federal entity that investigates complaints against employers from former employees who were terminated over social media content. &nbsp;Out of the numerous cases that were investigated, one item separated valid complaints from invalid ones: protected concerted activity. &nbsp;</p><p>In four cases <a href="http://www.nlrb.gov/news-outreach/fact-sheets/nlrb-and-social-media" rel="nofollow">outlined in an August 18, 2011 report,</a> former employees were found to have a valid complaint because they were engaged in a “protected concerted activity”, where they were discussing terms and conditions of employment on Facebook. &nbsp;However, not every case that came in proved to be valid, and the definition of social media privacy is still ambiguous. &nbsp;So the next question would be: what information should be federally protected and what shouldn’t?</p><p>A federal norm, when drafted appropriately, would provide a solid foundation for state legislators to follow suit. &nbsp;As of now, the NLRB is the federal entity that investigates complaints, and through a clearer policy, would be able to save resources and address concerns more expediently. &nbsp;An <a href="http://publicadmin.norwich.edu/characteristics-of-successful-public-policy/" rel="nofollow">effective public policy</a> would need to prove effective over time, utilize government resources more effectively, and be constitutional and realistic. &nbsp;The state of Washington may very well be on its way to influencing federal lawmakers to draft more progressive laws regarding privacy that would benefit both employees and employers.</p><p>In summation, federal legislation is still catching up to technology. &nbsp;Throughout the investigations conducted by the NLRB, it has been discovered that where some employer policies may be unlawful or overbroad, some employees are engaged in activities online that are not protected. &nbsp;All inquiries to the NLRB are investigated on a case-by-case basis, but much of this labor can be diverted or reduced through more focused legislation. &nbsp;</p><p>How do you weigh in on this issue?</p> https://www.enterprisecioforum.com/en/blogs/robert-conrad/evolution-law-address-social-media-priva#comments Business Issues Security Blog-post act board Change employees employers Facebook labor laws media national nlra nlrb reform relations Social Twitter Mon, 24 Nov 2014 21:53:27 +0000 Robert Conrad 11176 at https://www.enterprisecioforum.com Upcoming OFS Webinar: Understanding Your Digital Transformation Agenda: https://www.enterprisecioforum.com/en/blogs/susana-caparros/upcoming-ofs-webinar-understanding-your <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> How Do You Meet Customers’ Real-Time Expectations? </div> </div> </div> <p><strong><br /></strong></p><p><strong>Featuring Forrester Analyst John C. McCarthy with OFS CEO Rich Napoli</strong></p><p><strong>Thursday, December 4, 2014 from 1:00-1:30pm ET</strong></p><p>&nbsp;</p><p>&nbsp;</p><p><em><strong><br /></strong></em></p><p><em><strong>With the pervasiveness of digital devices in today’s world</strong></em>, firms must rethink their business strategy – from the outside in – to capitalize on the competitive advantages that today’s digital technology provides.</p><p>&nbsp;The best digital experiences are ones that understand a customer’s complete journey, not just their current transactions with your company. Predicting your customer’s next most likely need by analyzing his prior purchase patterns, his current location through his smartphone, and his recent requests, lets you build innovative, engaging apps and services that make your customer likely to return. Rather than designing a technology stack around assembling components, it must be designed around the tasks that customers are actually trying to accomplish.</p><p>&nbsp;Building all this technology requires a whole new way of thinking and operation not only in the IT department, but the entire corporation as well. With the customer journey as the focus, it’s not just the front-end UI that needs attention – exceptional digital products require that you simplify all your systems on the back-end, too.</p><p>&nbsp;But reorganizing and re-operating in this way is a huge undertaking. And what’s more – customers are constantly changing their behavior faster than firms are evolving their business model, processes, and technology. <em>Find out how to stay a step ahead of customers’ expectations and transform your business to provide meaningful digital experiences using an agile, product mindset.</em></p><p>&nbsp;Topics that we will discuss:</p><ul><li>Why it’s essential to understand your customer’s complete journey to satisfy their real objective</li><li>How to rethink your business strategy and IT strategy</li><li>How businesses are using digital to drive engagement and revenue, through real-world examples</li><li>How to adopt a Product Engineering Mindset with a philosophy and culture of business agility</li><li>How to structure your organization to respond quickly to developing customer needs</li><li>How to bridge the gap between customer expectations and the products you deliver</li><li>Which new skillsets are required for your team to keep up</li></ul><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/susana-caparros/upcoming-ofs-webinar-understanding-your#comments Business Issues CIO Leadership Technology Applications IT Performance Mobility Services Blog-post customer facing software customer journey mapping digital transformation product engineering mindset software for generating revenue webinar Mon, 24 Nov 2014 21:33:12 +0000 Susana Caparros 11171 at https://www.enterprisecioforum.com LOB has biggest stake in data, analytics: #CIOchat https://www.enterprisecioforum.com/en/blogs/jdodge/lob-has-biggest-stake-data-analytics-cio <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> But the right questions and hypotheses are key. </div> </div> </div> <p>Last Thursday's chat explored who owns data and analytics and typifies #CIOchat: there's no black and white answers. What fun would Twitter chatting be no fun if there were only easy answers.</p><p>However, there was consensus of a couple of things and excuse me if I do not say quite right: line of business (LOB) has usually has the biggest stake in analytics and that you must ask the "right" questions to get any value out of the answer that analytics might produce. Of course, the "revenue generating side of the business" can be more than just the line of business. Sometimes, even IT can generate revenue, which, I guess, would make it line of business.</p><p>To the question about the biggest stake in data and analytics, here's HP Fellow Charlie Bess:</p><p><img class="networkAvatar isLoaded" src="https://pbs.twimg.com/profile_images/436895924162265088/duBYQ88K_normal.png" alt="" /><a class="_username networkName _userInfoPopup" title="cebess" href="https://hootsuite.com/dashboard#" rel="nofollow">cebess</a><a class="postTime _postPermalink _postTime" href="http://twitter.com/cebess/status/535508707321593856" target="_blank" rel="nofollow">Nov 20, 2:03pm via TweetChat powered by oneQube</a></p><p class="_baseTweetText _tweetText messageContent">The revenue generating side of the business has the largest stake -- right?<br /><a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a></p><p class="_baseTweetText _tweetText messageContent">CIO&nbsp;David J. Hinson's Tweet drove home point two:</p><p><img class="networkAvatar isLoaded" src="https://pbs.twimg.com/profile_images/505818737748889600/qYV1ybqF_normal.png" alt="" /><a class="_username networkName _userInfoPopup" title="davidjhinson" href="https://hootsuite.com/dashboard#" rel="nofollow">davidjhinson</a><a class="postTime _postPermalink _postTime" href="http://twitter.com/davidjhinson/status/535515993078898688" target="_blank" rel="nofollow">Nov 20, 2:32pm via Twitter Web Client</a></p><p class="_baseTweetText _tweetText messageContent">@<a class="_userInfoPopup _twitter" title="cebess" href="https://hootsuite.com/dashboard#" rel="nofollow">cebess</a>&nbsp;@<a class="_userInfoPopup _twitter" title="katweasle" href="https://hootsuite.com/dashboard#" rel="nofollow">katweasle</a>&nbsp;the scientific method is actually a thing. Big data insights begin with a grounded hypothesis to investigate&nbsp;<a class="_quickSearchPopup hash" title="CIOChat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOChat</a></p><p class="_baseTweetText _tweetText messageContent">And don't forget plain old luck and serendipity at gaining insights from asking the right questions. Again, Hinson: &nbsp;</p><p class="_baseTweetText _tweetText messageContent">&nbsp;<img class="networkAvatar isLoaded" src="https://pbs.twimg.com/profile_images/505818737748889600/qYV1ybqF_normal.png" alt="" /><a class="_username networkName _userInfoPopup" title="davidjhinson" href="https://hootsuite.com/dashboard#" rel="nofollow">davidjhinson</a><a class="postTime _postPermalink _postTime" href="http://twitter.com/davidjhinson/status/535515347470655488" target="_blank" rel="nofollow">Nov 20, 2:29pm via Twitter Web Client</a></p><p class="_baseTweetText _tweetText messageContent">@<a class="_userInfoPopup _twitter" title="Thedodgeretort" href="https://hootsuite.com/dashboard#" rel="nofollow">Thedodgeretort</a>&nbsp;@<a class="_userInfoPopup _twitter" title="TerenceCNgai" href="https://hootsuite.com/dashboard#" rel="nofollow">TerenceCNgai</a>plus, you can't predict where brilliant insight will originate.&nbsp;<a class="_quickSearchPopup hash" title="CIOChat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOChat</a>&nbsp;Ready access only part of picture.</p><p class="_baseTweetText _tweetText messageContent">The #CIOchat - every Thursday 2-3 p.m. ET except we're off this coming Thursday for Thanksgiving - touched on many organizational aspects of analytics and the often fuzzy topic of data ownership.&nbsp;This #CIOchat hour included 32 participants who generated 247 Tweets. &nbsp;</p><p class="_baseTweetText _tweetText messageContent">Here's a couple of noteworthy conversations:</p><p class="_baseTweetText _tweetText messageContent"><strong>Conversation 1 - "Information" is my name, data's the game.</strong></p><div id="tweet_103407831_535510464978223105" class="_message message "><div class="-messageConversation"><div class="_comment comment originalComment"><img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" />Thedodgeretort&nbsp;&nbsp;Q. 1 Who in the enterprise owns analytics and data? Who has the biggest stake in them?&nbsp;<a class="_quickSearchPopup hash" title="CIOchat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOchat</a>2:02pm, Nov 20 from Hootsuite</div><div class="_comment comment originalComment"><div id="tweet_103407831_535511237892005888" class="_message message "><div class="-messageConversation"><div class="_previousTweets previousMessages"><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanEG" />NadhanEG&nbsp;&nbsp;A1.&nbsp;@<a class="_userInfoPopup" title="Thedodgeretort" href="https://hootsuite.com/dashboard#" rel="nofollow">Thedodgeretort</a>&nbsp;How about the Chief Officer for Information?<a class="url" href="http://t.co/e1R9W2X2ap" target="_blank" rel="nofollow">http://t.co/e1R9W2X2ap</a>&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:03pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F436895924162265088%2FduBYQ88K_normal.png" alt="cebess" />cebess&nbsp;&nbsp;.@<a class="_userInfoPopup" title="NadhanEG" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanEG</a>&nbsp;but is the CIO a producer or a consumer?&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:04pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanEG" />NadhanEG&nbsp;&nbsp;.&nbsp;@<a class="_userInfoPopup" title="cebess" href="https://hootsuite.com/dashboard#" rel="nofollow">cebess</a>&nbsp;CIO owns Analytics &amp; is the producer of insight. Enterprise must take action in a timely fashion<a class="url" href="http://t.co/39YjRFn4LF" target="_blank" rel="nofollow">http://t.co/39YjRFn4LF</a>&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:05pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment"><img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F2544916053%2Fimage_normal.jpg" alt="katweasle" />katweasle&nbsp;&nbsp;@<a class="_userInfoPopup" title="NadhanEG" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanEG</a>&nbsp;@<a class="_userInfoPopup" title="cebess" href="https://hootsuite.com/dashboard#" rel="nofollow">cebess</a>&nbsp;I doubt the CIO will have enough business knowledge to create insight, may need to work with business experts&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:07pm, Nov 20 from Twitter for iPad</div><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanEG" />NadhanEG&nbsp;&nbsp;.&nbsp;@<a class="_userInfoPopup" title="katweasle" href="https://hootsuite.com/dashboard#" rel="nofollow">katweasle</a>&nbsp;@<a class="_userInfoPopup" title="cebess" href="https://hootsuite.com/dashboard#" rel="nofollow">cebess</a>&nbsp;<a class="_quickSearchPopup hash" title="CIO" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIO</a>must enable the infrastructure (and culture) that systemically drives insight&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:09pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F436895924162265088%2FduBYQ88K_normal.png" alt="cebess" />cebess&nbsp;&nbsp;.@<a class="_userInfoPopup" title="NadhanEG" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanEG</a>&nbsp;I am not even sure the culture of analytics is the domain of the CIO. There are so many other contextual viewpoints&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:10pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment originalComment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanEG" /><p class="commentContent">NadhanEG&nbsp;&nbsp;.&nbsp;@<a class="_userInfoPopup" title="cebess" href="https://hootsuite.com/dashboard#" rel="nofollow">cebess</a>&nbsp;How does the CIO manage "information" -- his/her middle name?&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>&nbsp;</p><p class="commentContent"><strong><br /></strong></p><p class="commentContent"><strong>Conversation 2 - Changing one's mind is better than losing it</strong></p><p class="commentContent"><br /><img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" />Thedodgeretort&nbsp;&nbsp;Q. 3 How analytics savvy are LOBs? Are they capable of analytics oversight? Should they reach out to CIO? Thanks&nbsp;@<a class="_userInfoPopup" title="kmurphy8080" href="https://hootsuite.com/dashboard#" rel="nofollow">kmurphy8080</a>&nbsp;<a class="_quickSearchPopup hash" title="CIOchat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOchat</a>2:43pm, Nov 20 from Hootsuite</p><div id="tweet_103407831_535522134505062401" class="_message message"><div class="-messageConversation"><div class="_previousTweets previousMessages"><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanEG" />NadhanEG&nbsp;&nbsp;A.3.&nbsp;@<a class="_userInfoPopup" title="Thedodgeretort" href="https://hootsuite.com/dashboard#" rel="nofollow">Thedodgeretort</a>@<a class="_userInfoPopup" title="kmurphy8080" href="https://hootsuite.com/dashboard#" rel="nofollow">kmurphy8080</a>&nbsp;Depends on the&nbsp;<a class="_quickSearchPopup hash" title="IT" href="https://hootsuite.com/dashboard#" rel="nofollow">#IT</a>&nbsp;culture<a class="url" href="http://t.co/ngDqhPOZKY" target="_blank" rel="nofollow">http://t.co/ngDqhPOZKY</a>&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:44pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment"><img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" />Thedodgeretort&nbsp;&nbsp;@<a class="_userInfoPopup" title="NadhanEG" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanEG</a>&nbsp;Wouldn't analytics be integral to digital marketing?<a class="_quickSearchPopup hash" title="CIOchat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOchat</a>2:45pm, Nov 20 from Hootsuite</div><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanEG" />NadhanEG&nbsp;&nbsp;.&nbsp;@<a class="_userInfoPopup" title="Thedodgeretort" href="https://hootsuite.com/dashboard#" rel="nofollow">Thedodgeretort</a>&nbsp;Yes. But, that does not automatically make all&nbsp;<a class="_quickSearchPopup hash" title="LOBs" href="https://hootsuite.com/dashboard#" rel="nofollow">#LOBs</a>analytics savvy&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:48pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment"><img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" />Thedodgeretort&nbsp;&nbsp;@<a class="_userInfoPopup" title="NadhanEG" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanEG</a>&nbsp;They better, but I've seen studies marketers rate themselves as woefully inadequate in digital marketing.&nbsp;<a class="_quickSearchPopup hash" title="CIOchat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOchat</a>2:51pm, Nov 20 from Hootsuite</div><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanEG" />&nbsp; NadhanEG&nbsp;@<a class="_userInfoPopup" title="Thedodgeretort" href="https://hootsuite.com/dashboard#" rel="nofollow">Thedodgeretort</a>&nbsp;You must be referring to your comment on this post<a class="url" href="http://t.co/MHuC2kfzQr" target="_blank" rel="nofollow">http://t.co/MHuC2kfzQr</a>&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:53pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment"><img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" />Thedodgeretort&nbsp;&nbsp;@<a class="_userInfoPopup" title="NadhanEG" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanEG</a>&nbsp;That's ages ago (14 mos) and I've changed my mind-:)<a class="_quickSearchPopup hash" title="CIOchat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOchat</a>2:55pm, Nov 20 from Hootsuite</div><div class="_comment comment originalComment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F436895924162265088%2FduBYQ88K_normal.png" alt="cebess" />cebess&nbsp;&nbsp;.@<a class="_userInfoPopup" title="Thedodgeretort" href="https://hootsuite.com/dashboard#" rel="nofollow">Thedodgeretort</a>&nbsp;changing it is usually better than losing it&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:56pm, Nov 20 from TweetChat powered by oneQube</div><div class="_comment comment originalComment">Follow&nbsp;<a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a>&nbsp;and&nbsp;<a href="http://www.twitter.com/thedodgeretort" rel="nofollow">@thedodgeretort</a></div></div></div></div><p class="commentContent"><br /></p></div></div></div></div></div></div></div><div id="tweet_103407831_535514247330291712" class="_message message "><div class="-messageBody"><p class="_baseTweetText _tweetText messageContent">&nbsp;</p></div></div> https://www.enterprisecioforum.com/en/blogs/jdodge/lob-has-biggest-stake-data-analytics-cio#comments Business Issues Big Data Blog-post #CIOchat analytics Big Data CIO data IT LOB Mon, 24 Nov 2014 19:09:43 +0000 jdodge 11166 at https://www.enterprisecioforum.com Automating the growth of human intelligence https://www.enterprisecioforum.com/en/blogs/enadhan/automating-growth-human-intelligence <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> A new style of interaction with the machine </div> </div> </div> <p>Microsoft tested <a href="http://hothardware.com/News/microsoft-tests-robot-security-guards-for-patrolling-office-campuses" rel="nofollow">robot security guards</a> for patrolling its Silicon Valley campus.&nbsp; This is a good example of how technology has evolved across the network of sensors and monitoring devices to enable the execution of repeatable tasks with great accuracy.&nbsp; But, to what extent do we take such automation for granted?&nbsp; Does this mean that, with the advent of such robot security guards, we no longer need to be on our guard to bring out that sixth sense in us?&nbsp; Various studies have shown that it is our tendency to rely so much on automation that it “de-skills rather than up-skilling us” as discussed in this Wall Street Journal article <a href="http://online.wsj.com/articles/automation-makes-us-dumb-1416589342" rel="nofollow">Automation makes us dumb</a>. So, how can we make Automation work towards growing our collective human intelligence? Let us explore this a little further taking a cue from real-life examples discussed in the second half of the same article.&nbsp;</p><p>Here are some of the factors to be considered to ensure that the human mind does not get dumb and dumber as the machines get smart and smarter!</p><ol><li><strong>1. Process. </strong><em>What is being done? </em>Understanding the process that is actually being automated.</li><li></li><li></li><li><strong>2. Engineering. </strong><em>How is it automated?</em><strong>&nbsp; </strong>The simple question of asking why certain things are engineered, packaged and automated the way they are is a good first step.&nbsp;</li><li></li><li></li><li><strong>3. Training.&nbsp; </strong><em>What does it take for the human to do it?</em><strong> </strong>Periodically engaging select experts of the workforce in training exercises and drills so that they understand how life used to be before automation.&nbsp; Remember, <a href="http://bit.ly/ZkrtKj" rel="nofollow">Manual execution is the first step to effective automation</a>.</li><li></li><li></li><li><strong>4. Monitoring. </strong><em>What if it fails?</em><strong> </strong>Defining and establishing processes for addressing the what-if scenarios so that untimely runs of the automated system can be handled with appropriate manual intervention.&nbsp; <em>Example:</em> My sprinkler system turns on with full force when there is a roaring thunderstorm in our neighborhood!&nbsp;</li><li></li><li></li><li><strong>5. Culture.</strong> <em>How do you effectively interact with it?</em> But, most importantly, enterprises must institute a culture where the human workforce treats the automated systems as one of their peers within the larger enterprise who just happen to be a lot more efficient at what they do.&nbsp;&nbsp;&nbsp;</li><li></li><li><br /></li><li>What is interesting is that between the human and the machine, it is the human who has that innate ability to strategize, innovate and apply logical thinking to take us forward.&nbsp; After all, that is why we are where we are today – with continuous, steady evolution punctuated with waves of disruptive innovation.&nbsp; This very same human mind must also take a step back and look at each automated solution and study it carefully to make it part of our overall “team”.&nbsp;</li></ol><p>So, back on the Microsoft campus, we must continue to be as alert as we are anyplace else but acknowledge any alerts raised by the robot security guards just like we would react to any other stimulant.&nbsp; It is our privilege to be equipped with more useful information than we were before.&nbsp;</p><p>Here is to a more secure world thanks to purposeful automation that can improve our overall quality of life.</p><p>Team up with&nbsp;<a href="http://www.hp.com/go/easwarannadhan" target="_self" rel="nofollow">HP Technology Expert, E.G.Nadhan</a></p><p>Connect with <a href="https://twitter.com/NadhanEG" target="_self" rel="nofollow">Nadhan</a>&nbsp;on: <a href="https://twitter.com/NadhanEG" target="_self" rel="nofollow">Twitter</a>, <a href="http://www.facebook.com/easwaran.nadhan" target="_self" rel="nofollow">Facebook</a>, <a href="http://www.linkedin.com/profile/view?id=102637222&amp;trk=tab_pro" target="_self" rel="nofollow">Linkedin</a> and <a href="http://bit.ly/VDfGGn" target="_blank" rel="nofollow">Journey Blog</a>.</p> https://www.enterprisecioforum.com/en/blogs/enadhan/automating-growth-human-intelligence#comments CIO Leadership IT Performance Blog-post Automation Innovation Internet of Things IoT IT Packaging process Robotics robots Sensors standardization Technology Mon, 24 Nov 2014 15:31:03 +0000 enadhan 11161 at https://www.enterprisecioforum.com Cyber security: Attacking from the Inside https://www.enterprisecioforum.com/en/blogs/hp-security-strategists/cyber-security-attacking-inside <p>Blog post by HP security strategist Dan Schulte<strong></strong></p><p><strong>Attacking from the Inside</strong></p><p>In Part 1 of our series on <a href="http://www.enterprisecioforum.com/en/blogs/hp-security-strategists/insider-threat-who-cares" rel="nofollow">Insider Threats</a> we discussed an expanded definition of the “Insider” to include our trusted vendors, contractors and partners - essentially any person or thing that has connectivity to our internal network. &nbsp;While it seems the insider threat concept has been around forever, we have certainly started to think about it differently in recent years. &nbsp;This is due mainly to the increasing popularity and number of breaches recently in the news which utilize this mechanism to gain access. Take into consideration a major breach which was initiated by a phishing email to a vendor. By expanding the insider threat concept to include all users of our networks (employees, remote staff, vendors, contractors, etc.), we start to see very clever ways to bypass traditional security mechanisms. &nbsp;</p><p>When we look more closely at these insider threat scenarios and realize how they expand our attack surface, we have a major problem on our hands.&nbsp; Trusted users who have been traveling and are compromised while web browsing on public networks provide a means for malicious actors to infiltrate our trusted networks. Small vendors with limited security programs provide direct access to our internal environment.&nbsp; We <strong>must</strong> find better ways to detect these types of attacks; methods which leverage a combination of people, process and technology.</p><p>We are all now familiar with the Kill Chain or Adversary Attack Lifecycle of which the first phase consists of research.&nbsp;This important step allows attackers to perform reconnaissance of our organization and security posture and determine our key users, systems and weaknesses. &nbsp;When this research phase is complete, attackers have an excellent overview of whom and how to attack. Once that is understood, the adversary is ready to infiltrate our networks. For this article, I’ll focus on two specific techniques utilized in most APT attack scenarios that bypass traditional external defenses - Phishing and Watering Hole Attacks.</p><p><strong>Phishing/Spear Phishing</strong></p><p><a href="http://en.wikipedia.org/wiki/Phishing" rel="nofollow">Phishing and Spear Phishing</a> attacks encourage unsuspecting victims to click on socially engineered links in their email.&nbsp; Even though this attack vector has been around since the early 90’s we still cannot stop clicking on that “free” money from Nigeria. All they need is your SSN and bank account number.&nbsp; What a great deal!</p><p>All joking aside, even when we educate our users not to click on links they don’t trust, phishing attacks can be very difficult to detect.&nbsp; SPAM filters are often the primary means of detection, but unfortunately these are easily defeated.&nbsp; For example:&nbsp; An attacker sends a short URL for a legitimate website on a Friday which makes it past the SPAM filter and is delivered to the user.&nbsp; Over the weekend the attacker redirects the short URL to a malicious website.&nbsp; The user opens the “scanned” email on Monday, clicks on the link and is compromised by malware delivered from the malicious website.&nbsp;</p><p><strong>Watering Holes</strong></p><p><a href="http://en.wikipedia.org/wiki/Watering_Hole" rel="nofollow">Watering Holes</a> allow attackers to utilize a third party website in an attempt to compromise victims in their daily routines.&nbsp; The beauty of this attack method is that they don’t have to bypass the SPAM filters but rather lure the victim in another way.&nbsp; This is typically done by installing malware on a website which is routinely visited by a company “Insider” or posted on social media.&nbsp; Take for example the <a href="http://gizmodo.com/hackers-are-being-forced-to-target-chinese-takeout-menu-1560755886" rel="nofollow">Chinese Restaurant Menu</a> which was modified to install malware during the <a href="http://www.nytimes.com/2014/07/01/technology/energy-sector-faces-attacks-from-hackers-in-russia.html" rel="nofollow">Energetic Bear</a> campaign.</p><p>Since these two techniques allow attackers to bypass our traditional defenses and potentially take information without ever touching our internal network, how do we protect ourselves?&nbsp; Within HP we recognize there is no “Silver Bullet” but rather the importance of the roles of People, Process and Technology in our security programs.&nbsp;</p><p><strong>People, Process &amp; Technology</strong></p><p><strong>People</strong> – The primary mechanism for reducing the risk of compromise through a phishing or watering hole attack is through educating our users. Keep in mind that we need to expand this “Insider” definition to not only associates, but anyone who may have access to our internal network. People as defined here also means well trained security practitioners who understand how to hunt and respond to these types of threats. Educated users and appropriately trained security staff are an essential component of our triad.</p><p><strong>Process</strong> - When Phishing or Malicious Websites are discovered by our “Insiders”, they need a well-defined process for reporting this activity.&nbsp; If a user reports a phishing email, we need to have a method to quickly quarantine these emails and alert our users to be wary of this attack.&nbsp; Keep in mind that users may also be accessing personal accounts on their corporate device.&nbsp; Accessing these sites could still give access to the attacker.</p><p><strong>Technology</strong> – There are several items we should be doing to help from a technology perspective.</p><p><strong>IPS/FW</strong> – While IPS and Firewalls cannot protect your users while off of the network (unless you are forcing users to connect to the corporate network to browse the web), they can help you detect devices which have been compromised while traveling.&nbsp; Always log both ingress and egress traffic on FW/IPS.&nbsp; This technology is going to be key in finding those Command and Control connections.</p><p><strong>SIEM/Security Analytics</strong> – Ensure that you are sending all relevant logs to a SIEM or Security Analytics platform.&nbsp; By sending FW/IPS, Proxy, DNS, 2FA, AV logs to a central location, you can correlate and analyze efficiently, detect outliers and suspicious user activity and automate response mechanisms to protect your environment.</p><p><strong>Cloud Proxy</strong> – I believe that proxy servers are a key component to any security infrastructure.&nbsp; Proxy servers not only protect us from legal liabilities (content filtering), but can also detect malware, enable centralized logging for web activity and potentially allow you to perform other security functions such as Data Loss Prevention for the web channel.&nbsp; Proxies also perform a secondary function allowing you to block unnecessary ports and protocols typically used by the adversary to exfiltrate data from our corporate network.&nbsp; For example, if we proxy all http and/or ftp traffic, we no longer need the firewall rules to allow all outbound traffic on these protocols.&nbsp; If a C&amp;C tries to utilize these ports without the proxy, it is now blocked by default.&nbsp; This key here is it forces attacks from C&amp;C sites to utilize standard ports and proxy services to communicate with internal clients.</p><p><strong>2 Factor Authentication</strong> – While this may seem like the outlier, we should keep 2FA in mind when discussing phishing and watering holes.&nbsp; If a machine is compromised, all accounts on that machine should be considered compromised.&nbsp; To ensure that an attacker does not gain remote access through a compromised account.&nbsp; We must institute 2FA.&nbsp; Ensuring 2FA for all “Insider” access is critical to ensure a remote attacker does not impersonate an internal user’s credentials on the VPN.</p><p>Even though we spend an increasing number of dollars each year to improve our security posture, we are still struggling to keep our network and critical data secure. The Adversary is more skillful and patient, cloud and mobile have expanded the attack surface and it’s getting harder to tell the good guys from the bad guys already on our network. While we have focused on only two techniques that allow bad actors to masquerade as trusted insiders, these methods are typical of what we’ve seen in some of the largest breaches this year. Implementing a security program which encompasses <strong>People, Process and Technology</strong> provides the best chance of mitigating such attacks and should be the central theme of your risk-based security strategy.</p><p>&nbsp;</p><p>Learn more about <a href="http://www8.hp.com/us/en/software-solutions/enterprise-security.html" target="_blank" rel="nofollow">HP Enterprise Security</a>.</p> https://www.enterprisecioforum.com/en/blogs/hp-security-strategists/cyber-security-attacking-inside#comments Business Issues CIO Leadership Technology Security Blog-post CIO CISO Cyber security data breach insider threat IT Mon, 24 Nov 2014 14:16:11 +0000 HP Security Strategists 11156 at https://www.enterprisecioforum.com Build Your Career with Asp Dot Net Training https://www.enterprisecioforum.com/en/blogs/mathews123/build-your-career-asp-dot-net-training <p>Microsoft .Net is most popular and widely popular programming languages in software and web development industries. This framework allows developers to create software application based on your preference. Dot net was developed and introduced by Microsoft Corporation in the year 2000. This software suite is loaded with large library, virtual machine and common programming languages that control the execution of programs written on this framework. .Net is the Microsoft vision of providing “Software as a Service”. This development environment allows the user to build, create and deploy next generation desktop, enterprise and web applications.</p><p>Dot Net framework allows the developer to create application in whatever programing language they are comfortable with using common language runtime (CLR). It also provides “building block services” for easy application development and deployment. The dot net development tool consists of .Net framework SDK and other important tools. Over past two decades, software development has become an effective career option for professionals. While opting for a training program to learn, people generally look for certain capable programming languages like Java, Dot Net, PHP, etc. Dot net training course is essential for career growth in software development industry. To know more about .Net technology and build strong career in this field, you need to enroll in <strong><a href="http://www.fita.in/dot-net-training-in-chennai/" rel="nofollow">.Net Training in Chennai</a></strong> @ <strong>FITA</strong>.</p><p>Since its inception, dot net is most accepted programming languages among the developers across the world. The most important feature of .Net programming language is easy to learn, built, execute, test and develop application. This framework offers better interface between the new and old application. It means to provide functionality that can be implemented in programs and executed in outside environment. India is the major hub of software development industry in the world. Here you can get quality development service at affordable price. You can find several training institute offering <strong><a href="http://www.fita.in/dot-net-training-in-chennai/" rel="nofollow">dot net course in Chennai</a></strong> to help freshers and professionals to start their career in software industry.</p><p>In this competitive world, every industry is trying to provide quality service to their clients. The main ideal to draw potential customers by offering quality services catering their business requirements. In order to make the software application productive and best performing, software industries are looking for professionals and experienced programmers who are needful in agile software development lifecycle. They are ready to pay huge salary package for professionals who can cope with agile development process and deploy quality application before the deadline.</p><p>You need to choose the IT training and placement institute offering quality training on dot net technology and 100% success in your future. Prior to choosing the dot net training institute, you need to check for course syllabus, teaching method, trainers experience, course duration, cost, infrastructure, etc. It is ideal to choose training institute offering intensive training syllabus combined with placement assistance. FITA is best <strong><a href="http://www.fita.in/dot-net-training-in-chennai/" rel="nofollow">dot net training institute in Chennai</a></strong> offering dot net training by industry professionals with practical training and real-time projects. With us, you can enjoy the course timings based on your work schedule. Join FITA for lucrative career in software development industry with lucrative salary package.</p> https://www.enterprisecioforum.com/en/blogs/mathews123/build-your-career-asp-dot-net-training#comments Technology IT Performance Blog-post Mon, 24 Nov 2014 10:01:26 +0000 mathews123 11151 at https://www.enterprisecioforum.com Customer Journey Mapping; Why It's Key to Your Digital Transformation (blog post and webinar) https://www.enterprisecioforum.com/en/blogs/susana-caparros/customer-journey-mapping-why-its-key-you https://www.enterprisecioforum.com/en/blogs/susana-caparros/customer-journey-mapping-why-its-key-you#comments Quick Post Blogs Sun, 23 Nov 2014 15:53:52 +0000 Susana Caparros 11146 at https://www.enterprisecioforum.com QTP Course in Chennai for Enhanced Career https://www.enterprisecioforum.com/en/blogs/mathews123/qtp-course-chennai-enhanced-career <p>Quick Test Professional (QTP) is now called as HP Unified Functional Testing (UFT). It is one of the leading automation tools available in the market to carry out functional and regression testing. This testing tool comes with Graphical User Interface (GUI) that allows you to perform test action using VBScript. This automation tool features array of plugins which allows testing of software applications that building on various programming languages like .NET, Delphi, web applications, etc. This automation testing suite used to validate wide range of web applications and software products using its extensive features, custom test script action, ease of usage and extended plugins compatibility.</p><p>Software testing is the part of software development lifecycle. Software coders and testing professional works jointly to create stunning web or desktop applications that cater the requirements of individual or business needs. Being most trusted platform, QTP is automatic choice to conduct functional and regression testing for a software application. Software testers need to be familiar with different software development platform to stay updated with ever changing market. Writing test scripts with QTP automation testing tool is relatively simpler compared to other automation testing product. There is huge demand of skilled and experienced QTP application across software development industry all over the world.</p><p>&nbsp;The main advantage of using quick test professional is precise information and low cost maintenance.&nbsp; If there is any modification in test scripts, only test case field to be changed and startup code does not require any modification. This testing product makes whole testing process lot easier and comfortable. Most basic component in QTP keyword driven testing framework are the test cases file, control file, utility script, startup script and driver script. The control file is the base of keyword driven testing. It contains entire lists of test cases which needed to be executed. Startup scripts will execute the first step and starts the sequence. Driver scripts will check for the keywords and call upon the utility scripts for various functions.</p><p>Aspiring QTP professional can avail the advantage of good career, lucrative salary package, guaranteed growth and immense job opportunities in various fields. The main advantage of HP quick test professional is that you no need to have strong knowledge on software programming and development tools. Students from various educational backgrounds with basic programming languages can enter this lucrative domain. Learning HP quick test professional is lot easier, you can learn it easily compared to other programming languages.</p><p>FITA offer well-panned <a href="http://www.fita.in/qtp-training-in-chennai/" rel="nofollow"><strong>QTP training in Chennai</strong></a> to give professional training for aspiring students and professionals. With us, students can enjoy the flexibility of pursuing the course based on their convenience and own faces. Course syllabus from industrial experts with rich experience on software testing domain and lot concentrates on practical way of teaching. We limit our students up to four in a group, in order to provide individual attention to everyone. In addition to quality training through industrial experts, students can enjoy 100 percent placement through our dedicated human resources and staffing team. Join FITA reputed <a href="http://www.fita.in/qtp-training-in-chennai/" rel="nofollow"><strong>QTP training institutes in Chennai</strong></a>, to be successful QTP professional in leading software development industry.</p> https://www.enterprisecioforum.com/en/blogs/mathews123/qtp-course-chennai-enhanced-career#comments Technology IT Performance Blog-post Thu, 20 Nov 2014 12:03:52 +0000 mathews123 11131 at https://www.enterprisecioforum.com 5 Horrors of Software Development Outsourcing https://www.enterprisecioforum.com/en/blogs/natalia-pankova/5-horrors-software-development-outsourci <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> How to deal with main horrors that beginner outsourcer may have? </div> </div> </div> <p>For some people application development outsourcing still seems to be too complicated. They are afraid even to think about such possibility. For such people fear may be stronger than possible benefits of outsourcing.</p><h2>Lets have a look at five situations that may make inexperienced outsourcer to wake up in horror.</h2><h3>1.Outsourcing provider abandons the project.</h3><p><strong>Situation</strong>: You have found a perfect contractor, you are waiting to receive great result and suddenly you get an email that all provider’s team has quit. You have lost time and got nothing.&nbsp;</p><p><strong>Solution</strong>: Outsource only part of work, leave key stages in house. Choose&nbsp;<a title="agile" href="http://www.smissltd.com/blog/agile-or-waterfall" rel="nofollow">agile method</a>&nbsp;when you can check intermediate result and receive at least a trial version.</p><h3>2.Outsourcing provider is late with release.&nbsp;</h3><p><strong>Situation</strong>: You have agreed for exact time to release your product, advertising and marketing companies are ready, but your outsourcing provider is late. All your plans are ruined. And in our quickly changing world the whole project may be ruined. &nbsp;&nbsp;</p><p><strong>Solution</strong>: Sign detailed contracts, control every step and never pay 100% beforehand. Stay tuned! Don’t think that your outsourcing provider is a magician and will take your ideal software product out of hat by just waving a magic wand. He is just a usual person that makes mistakes, and you should treat him as your usual employee, providing sufficient control and support.</p><h3>3.The result is wrong.&nbsp;</h3><p><strong><img title="confused" src="http://www.smissltd.com/sites/default/files/confused_computer_keyboard.jpg" alt="confused" width="200" height="150" />Situation</strong>: You have described in detail what you want to receive, but when it is ready, you realize that everything is wrong – design, functionality, technical details, etc.&nbsp;</p><p><strong>Solution</strong>: Use written instructions! It would be easier for both – your provider and you. You will have enough time to think about all details. And your provider will always have instructions in front of him and won’t omit any minor detail.&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><h3>4.Poor quality in output.&nbsp;</h3><p><strong>Situation</strong>: You find provider with low cost and rich portfolio. You discuss everything and pay in advance, but you get at the end is even not close to the level you expected.</p><p><strong>Solution</strong>: check provider’s background and references. Choose provider that is experienced exactly in your niche. Get acquainted with key members of provider’s team and make sure that they exactly the professionals that you expect them to be. Pay attention to contract. Develop detailed plan and payment schedule, so that you pay for the result you want to get.&nbsp;</p><h3>5.The cost appears to be different.</h3><p><strong>Situation</strong>. You agreed with provider, discussed all details, he started work, but then it appears that the project is more complicated than it was expected, provider needs more time and resources. And in output you have to pay a lot more than it was agreed at the beginning. &nbsp;</p><p><strong>Solution</strong>. Detailed documentation. First,&nbsp;<a title="requirement specification" href="http://www.smissltd.com/blog/ideal-requirement-specification" rel="nofollow">requirement specification</a>&nbsp;(double check it before agreed), then development schedule and contract. Check that there is an option for additional tasks and modifications. Make sure that you understand how long each stage will take and how much you will pay for it.&nbsp;</p><p>&nbsp;</p><p>In conclusion I would say that the main solution for all described above situations is client’s reasonable approach (well-thought-out requirement specification,&nbsp;<a title="outsourcing provider" href="http://www.smissltd.com/blog/questions-outsourcing-partner" rel="nofollow">wise choice of provider</a>, detailed contract, constant control and right motivation) and provider’s professional attitude (stick to contract rules, diligent implementation, high-level professionalism).</p><p>Just be careful, thoughtful and attentive to details and IT outsourcing will turn from nightmare to fairy-tale!&nbsp;</p><p>&nbsp;</p><p><em>Did you experience any negative situations with IT outsourcing? How did you solve them?&nbsp;</em></p> https://www.enterprisecioforum.com/en/blogs/natalia-pankova/5-horrors-software-development-outsourci#comments Business Issues Applications Blog-post application development outsourcing Software Development Outsourcing Wed, 19 Nov 2014 21:13:20 +0000 Natalia Pankova 11126 at https://www.enterprisecioforum.com Ten security mistakes that will get you fired https://www.enterprisecioforum.com/en/blogs/jdodge/ten-security-mistakes-will-get-you-fired <p>A recent <a href="These%20are%20in%20an%20Infowrold%20article" rel="nofollow">Infoworld article</a>&nbsp;explores the ten biggest "colossal security mistakes."&nbsp;See if you can guess what they are. </p><p>I'll give you the first one: "Killing critical business functionality." The second is "killing the CEO's access to anything.</p><p>How big a sins are these? Well, consider this quote from the article: "You’d be far better off letting hackers stay inside the company than interrupt core business systems."</p><p>Agree or disagree?&nbsp;You best read this.</p><p><em>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort" rel="nofollow">@thedodgeretort</a> on Twitter.&nbsp;</em></p> https://www.enterprisecioforum.com/en/blogs/jdodge/ten-security-mistakes-will-get-you-fired#comments Business Issues Security Quick Post CIO Cyber security data breach IT security mistakes Wed, 19 Nov 2014 20:10:32 +0000 jdodge 11121 at https://www.enterprisecioforum.com Dropbox Software Glitch https://www.enterprisecioforum.com/en/blogs/lynnzhou/dropbox-software-glitch <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Lost Files May be Restored, but What About Lost Confidence? </div> </div> </div> <h1>Mr. Murphy (of Murphy’s Law fame) has a way of seeing to it that data is lost when you need it most, and he is apparently undeterred by the Cloud Computing Revolution.</h1><p>Still reeling from the iCloud breach, the Cloud Computing industry faces another PR hit – lost files due to a software glitch in the popular Dropbox application. The glitch is the latest in a series of incidents involving Dropbox, including an August 2012 security breach in which customer email addresses were stolen from Dropbox employee’s accounts, and recent concerns about Dropbox’s approach to addressing security vulnerabilities and notification of breaches.</p><p>Kudos to Dropbox for their response to this latest incident: a prompt mea culpa, a succinct explanation of the problem and who is affected, a quick software patch, and a free upgrade to the Dropbox Pro product. According to a company post on Hacker News, the file loss occurs if you use the Selective Sync features and the application is shut down or restarted when a selective sync is in progress. Dropbox has patched the desktop client, retired older versions of the Dropbox client, and ensured that users have the patched version. Affected users may receive a free one year subscription to the Dropbox Pro product which offers basic collaboration features and 1 TB of storage (normal pricing is $9.99 a month or $99 a year).<br />Some users report years of lost data. One case in particular has gone viral; that of Jan Čurn, co-founder and CTO at photography software platform VirtualRig Studio. Čurn has used Dropbox since 2009 and reports losing 8,343 files stored over that five year period. While the whereabouts of Čurn’s files have yet to be determined, Dropbox has been able to restore some user files, contacted affected users, and provided listings of restored files. It remains to be seen how much data can be restored.<br />It is important to note that the software bug is not related to security or malicious hacking, and that the bug affected personal users and not business users. Cloud storage products for Business Use require flexible user and file permissions setup, state of the art encryption standards, history logging, and remote administrative features. An example is the Secure.Share product from ComputerSupport.com. Aimed at small to medium sized business, it offers military grade, 448-Bit Blowfish encryption. Data is encrypted both in transit and at rest using SSL, and two factor authentication can be utilized. Accounts are managed from a single dashboard, and versioning and update notification features similar to Microsoft SharePoint are available for document collaboration. Additional security and administrative features include File History Sharing and remote data wiping.<br />Unfortunately for the affected Dropbox users, many used Dropbox as their sole document repository. The takeaway (painfully learned by the affected Dropbox users) is that personal cloud storage is not a substitute for regular backups. You’ve heard it before (and like me, have ignored it and paid the price) – regularly back up critical data and ensure it is two separate locations. This was true in the era of 5 ¼” inch Floppy Disks and is true today.</p><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/lynnzhou/dropbox-software-glitch#comments Technology Security Blog-post cloud security data breach DropBox iCloud breach Wed, 19 Nov 2014 16:34:39 +0000 LynnZhou 11116 at https://www.enterprisecioforum.com Public, Private and Hybrid Clouds https://www.enterprisecioforum.com/en/blogs/lynnzhou/public-private-and-hybrid-clouds <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> The Difference And When It Matters </div> </div> </div> <p>A decision maker at an SMB is trying to keep things simple (or at least no more complicated than they have to be). Saving money for outsourced services gets everyone’s attention, and the promise of Cloud Computing undoubtedly gets yours. While most of the technical details are delegated to your hard working CIO, Directors, and foot soldiers, there are some concepts it’s good to have an overview of – because of their effect on your data security and your bottom line.There are three categories of Cloud Computing Environments you’ll hear your IT staff talking about – a&nbsp;<strong>Public</strong>&nbsp;Cloud, a<strong>Private</strong>&nbsp;Cloud or a&nbsp;<strong>Hybrid</strong>&nbsp;Cloud. The differences between the three involve the&nbsp;<strong>capital investment&nbsp;</strong>of each, and the<strong>data security</strong>&nbsp;level provided by each.</p><p><strong>The Public Cloud</strong></p><p>The Public Cloud is all around us. If you used Google Docs, Google Drive, Dropbox, or Microsoft OneDrive, you’ve use the public cloud. In the Public Cloud, all the infrastructure and maintenance are provided off site. This is the ideal choice for most SMBs.</p><p><strong>Advantages</strong>: &nbsp;A Public Cloud:</p><ul><li>Takes all of the&nbsp;<strong>overhead</strong>&nbsp;of IT operations off of your shoulders.</li><li><strong>Simplifies accounting</strong>&nbsp;in that you pay fees instead of overhead and effort involved in Capital Expenditures.</li><li><strong>Increased demand</strong>&nbsp;is&nbsp;<strong>simply a matter of purchasing more bandwidth and/or services</strong>. For example, If you need more capacity during the Christmas buying season, you can purchase more capacity during the season (as opposed to purchasing equipment and systems that must have capacity that is not needed for a majority of the year).</li></ul><p><strong><br /></strong></p><p><strong>Disadvantage</strong>: &nbsp;You are using shared resources with other organizations, which makes a Public Cloud less secure than a Private Cloud. &nbsp;However, It is important to note that the resources of a Cloud Vendor are far greater than a typical SMB, and that the environment of your Cloud Vendor is still more secure than an environment in the traditional IT space</p><p>In short, a Public Cloud is ideal when:</p><ul><li>a standalone IT Operation represents major overhead to your business,</li><li>You use standard applications (Such as Microsoft Office),</li><li>You use Cloud applications by major vendors (such as Adobe Creative Cloud or SalesForce), or:</li><li>You do a lot of collaborative projects over a disbursed area.</li></ul><p><strong><br /></strong></p><p><strong>Private Clouds</strong></p><p>A&nbsp;<strong>Private Cloud&nbsp;</strong>is one where a Cloud Infrastructure is used by a single organization. It provides the most security, but requires that the organization have the resources to maintain the environment (and typically an SMB is turning to the Cloud to avoid that overhead!). Recently, Public Cloud Vendors have started offering Private Cloud Services at a premium– i.e., Cloud Environments which are segregated from their public services.</p><p>Because of the extra overhead and/or premium costs, Private Clouds are only desirable if you are in an industry with stringent security or data privacy demands, or your business is by nature financial data, intellectual property, or being a custodian of either. Consider leasing Private Cloud Services from your vendor if you have a genuine need for top level security, but don’t have the resources to support it in house.</p><p><strong>Hybrid Clouds</strong></p><p>A Hybrid Cloud is one that, as the name implies, have elements of a Public Cloud. For example, you have Financial Data you want to maintain in a Private Cloud, but also have collaborative efforts for which you want to use a Public Cloud. Large corporations with vertical markets are potential candidates for a hybrid cloud; a typical SMB would not have a need or have the resources to support one.</p><p>All businesses have unique needs, and you know your business better than anyone. The right Cloud Service Provider works with you to find the best solution for your unique situation.</p> https://www.enterprisecioforum.com/en/blogs/lynnzhou/public-private-and-hybrid-clouds#comments Technology Cloud Blog-post cloud costs cloud management hybrid cloud private cloud public cloud SMB Wed, 19 Nov 2014 16:26:06 +0000 LynnZhou 11111 at https://www.enterprisecioforum.com Healthcare Interoperability https://www.enterprisecioforum.com/en/blogs/drpravinapawar/healthcare-interoperability <p>Interoperability refers to the ability to share and manage information between devices and information systems within and across organizational boundaries.</p><p>&nbsp;According Health Information and Management Systems Society (HIMSS) defines <strong><em>Interoperability</em></strong> as-</p><p>"The ability of different information technology systems and software applications to communicate, exchange data, and use the information that has been exchanged.&nbsp;Data exchange schema and standards should permit data to be shared across clinicians, lab, hospital, pharmacy, and patient regardless of the application or application vendor.”</p><p>&nbsp;HIMSS further identifies three levels of digital health information technology interoperability:</p><p>a) <strong>Foundational Interoperability:-</strong></p><p>&nbsp; &nbsp; Foundational interoperability allows data exchange between health-IT systems without requiring that the receiving health IT system have the ability to interpret the data.</p><p>b) <strong>Structural Interoperability:-</strong></p><p>&nbsp; &nbsp; Structural interoperability is an intermediate level that defines the structure or format of data exchange (i.e., the message format standards) where there is uniform movement of healthcare data from one system to another such that the clinical or operational purpose and meaning of the data is preserved and unaltered.</p><p>&nbsp; &nbsp; Structural interoperability defines the syntax of the data exchange. It ensures that data exchanged between health-IT systems can be interpreted at the data field level.</p><p>c) &nbsp;<strong>Semantic Interoperability:-</strong></p><p>&nbsp; &nbsp; &nbsp;Semantic interoperability provides interoperability at the highest level, which is the ability for two or more systems or elements to exchange information and to use the information that has been exchanged.</p><p>&nbsp; &nbsp; &nbsp;Semantic interoperability takes advantage of both the structuring of the data exchange and the codification of the data—including vocabulary—so that the receiving health IT systems can interpret the&nbsp;Data.</p><ul><li>&nbsp;<strong>Importance of Interoperability:-</strong></li></ul><p>&nbsp;- Interoperability is important because it allows important information to be shared as appropriate to meet the needs of patients and organizations—as opposed to being held in the silo of a specific software application, device, or healthcare entity.</p><p>- Healthcare organizations use diverse health IT software and hardware solutions – which are typically obtained from a variety of vendors.</p><p>- When common standards exist, a common language for communication is created—increasing the potential for interoperability among these diverse systems both internally and externally.</p><p>- The existence of shareable data that can interface universally with other systems improves continuity of care and healthcare outcomes by helping healthcare providers and organizations function from a consistent and centralized body of patient information.</p><p>- This increases competition in the marketplace—which helps to drive innovation, improve quality, and reduce costs.</p><p>- This level of interoperability supports the electronic exchange of patient summary information among caregivers and other authorized parties via potentially disparate&nbsp;(EHR) systems and other systems to improve quality, safety, efficiency, and efficacy of healthcare delivery.</p><ul><li>&nbsp;<strong>Current Market and Industry Trends in Interoperability:-</strong></li></ul><p>&nbsp;- Progress in interoperability has been slow. Some large manufacturers have pursued interoperability between their own products, but not with products from other vendors.</p><p>- In such a competitive environment, there’s not been much incentive to do so thus far. However, government mandates, financial incentives and the pressure to reduce operating costs are slowly driving vendors and healthcare organizations to embrace interoperability.</p><p>- It appears that such external factors will be needed to move this initiative forward—which will most likely occur when it’s viewed as an essential component of high-value offerings.</p><ul><li>&nbsp;<strong>Important factors driving interoperability include:-</strong></li></ul><p>- Government mandates</p><p>- Pressure to cut healthcare costs</p><p>- Desire to increase efficiencies</p><p>- Desire to optimize work flow</p><p>- Desire to limit paperwork</p><p>- Desire to increase productivity</p><p>- Desire to create real-time communications between healthcare professionals</p><p>- Growing demand to integrate healthcare systems</p><p>- High ROI related to health IT systems</p><ul><li>&nbsp;<strong>Factors inhibiting interoperability include:-</strong></li></ul><p>- Lack of electronic data</p><p>- Poor quality of data</p><p>- Inconsistent standards in health IT systems</p><p>- Lack of vendor-vendor, vendor-provider and provider-provider cooperation</p><p>- Complexity of interoperability</p><p>- Lack of standardized healthcare protocols</p><p>- Inadequate health IT budgets within healthcare organizations</p><p>- Outdated legacy systems still in use</p> https://www.enterprisecioforum.com/en/blogs/drpravinapawar/healthcare-interoperability#comments Technology Converged Infrastructure Services Blog-post Communication Healthcare Interoperability Information exchange Information technology. Wed, 19 Nov 2014 12:23:23 +0000 drpravinapawar 11106 at https://www.enterprisecioforum.com Who has the largest claim on data, analytics? https://www.enterprisecioforum.com/en/blogs/jdodge/who-has-largest-claim-data-analytics <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> LOB? CIO? CFO? Who owns them? Come #CIOchat 2-3 p.m. ET Thursday. </div> </div> </div> <p>Who owns data and analytics? LOB? CIO? CFO? Probably all of them and sometimes none of them. That is our #CIOchat topic for this Thursday - 2-3 p.m. ET.&nbsp;</p><p>Long time ECF blogger <a href="http://www.enterprisecioforum.com/en/users/mylessuer" rel="nofollow">Myles Suer</a> makes a strong case that it should be the CFO is his post "<a href="http://www.enterprisecioforum.com/en/blogs/mylessuer/who-owns-enterprise-analytics-and-data" rel="nofollow">Who owns enterprise analytics and data?</a>" The CFO, he argues, is the closest to the data although he cites CIOs from several companies who have varying opinions on ownership.</p><p>In any event, it'll be a rich topic for our #CIOchat this week. It is also our featured CIO Question where you can go on at length.</p><p>Join us for some great conversation in either place.&nbsp;The #CIOchat will be off Nov. 27, Thanksgiving Day, and will return Thursday, Dec. 2.</p><p><em>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort" rel="nofollow">@thedodgeretort</a> on Twitter.</em></p><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/jdodge/who-has-largest-claim-data-analytics#comments Business Issues CIO Leadership Big Data Blog-post analytics Big Data CFO CIO IT LOB Tue, 18 Nov 2014 20:16:47 +0000 jdodge 11091 at https://www.enterprisecioforum.com Who owns enterprise data and analytics? CFO? CIO? LOB? None or all of the above? https://www.enterprisecioforum.com/en/question/who-owns-enterprise-data-and-analytics-c https://www.enterprisecioforum.com/en/question/who-owns-enterprise-data-and-analytics-c#comments CIO Leadership Big Data CIO Questions Tue, 18 Nov 2014 19:46:21 +0000 myles.suer 11086 at https://www.enterprisecioforum.com Can Your Security Protection Keep Up with Roaming Mobile Workers? https://www.enterprisecioforum.com/en/blogs/paullipman/can-your-security-protection-keep-roamin <p>As 2014 comes to a close, many of us in the security industry cringe as we look back at a year full of massive, high profile security breaches. In spite of major investments of capital and time by large corporations, attackers are still getting through their defensive perimeters, and dwelling undetected long enough to do extensive damage. It’s become painfully clear that enterprises today are so interconnected, any gap in their widely dispersed infrastructures or ecosystems can provide an entry point for sophisticated cybercriminals.</p><p>Roaming mobile users are a real and growing part of the problem. The security industry has invested heavily in ever more advanced ways to defend the network, applications, and data from attack; new products and technologies are introduced at a dizzying pace. Customers have scrambled to keep pace, investing in defense-in-depth architectures to beef up their security posture. But if their solutions don’t carefully protect mobile workers and their devices as they move daily back and forth across the network perimeter, huge vulnerabilities still remain.</p><p>Even the most conscientious of mobile users (and let’s face it, most of us are relatively careless) heads out into a world full of unprotected Wi-Fi networks, inadvertently opens phishing emails and interacts with risky mobile apps. It has become all too easy for your mobile device to unknowingly become infected with malware, which you then bring back to the office. In no time at all, the malware infection is in the network—replicating, burrowing in, and getting ready to do its dirty work.</p><p>The problem is that the whole concept of the server-based network perimeter has evolved—security threats are so advanced and persistent that we can’t count on keeping the bad guys out. Moreover, the world is clearly moving to a mobile, cloud-based IT architecture. Much as security chiefs would like to maintain a high degree of control over a well-defined perimeter, it’s time to acknowledge a new reality.</p><p>To keep up with constantly shifting cyber threats and rapidly detect intrusions, security solutions must be flexible and adaptable. One thing you can count on is that hackers will find a way in, and your average roaming user creates a tunnel big enough to drive a train through. Most likely, you have limited budget resources for security measures, so you need a scalable, comprehensive solution that doesn’t require an upfront investment in hardware, software, or professional system administration installation. And you need it now—regulators, business partners, and even customers are demanding more accountability and proof of security. You need a solution that helps you demonstrate compliance before you start to lose business.</p><p>A multilayered, cloud-based security solution doesn’t require significant set up costs or labor, but can cover your security needs with a single solution from a single vendor. These types of solutions are priced per user, so they will grow with your business. The protection these services offer is constantly updated to cover ever-mutating malware and other types of vulnerabilities.</p><p>Controlling application use is as critical as blocking malware; a comprehensive web security solution should include the ability to remotely block the use of vulnerable, infected, and risky applications. Cloud-based web solutions are globally available, and incorporate all the platforms on which you do business—web sites, email, laptops, tablets, smartphones, etc...</p><p>Roaming users constitute a new reality that security professionals must address, and must address now. Allowing mobile devices in the workplace is unavoidable these days as the connected generation is upon us. But, there are effective ways to manage the risks they introduce. For businesses of any size, diligent training, clear policies, and a comprehensive security solution can reduce the risks of roaming and preserve the productivity of mobile workers.</p> https://www.enterprisecioforum.com/en/blogs/paullipman/can-your-security-protection-keep-roamin#comments Business Issues CIO Leadership Technology Big Data Cloud Converged Infrastructure Mobility Security Blog-post ByoD cloud computing cloud security Connected Devices Cyber security Cybersecurity Internet of Things IoT Mobile mobile applications mobile apps mobile security Security Tue, 18 Nov 2014 16:58:52 +0000 PaulLipman 11081 at https://www.enterprisecioforum.com Selected hybrid cloud reads https://www.enterprisecioforum.com/en/blogs/jdodge/selected-hybrid-cloud-reads <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Linthicum, Verstraete and McKendrick on hybrid cloud </div> </div> </div> <p>Hybrid clouds this year are forecast grow 48% in organizations with more than 1,000 employees, according a study by cloud consulting firm Rightscale. What's more, companies with multiple clouds will grow 78%.</p><p>The study is among dozens that predict large enterprises will adopt hybrid clouds at a record pace. What is a hybrid cloud? Quite simply, they are some combination of integrated public and private clouds and home grown data centers. The definition is <a href="http://en.wikipedia.org/wiki/Cloud_computing" rel="nofollow">one I modified from Wikipedia</a>,&nbsp;which comes by way of the National Institute for Standards and Technology.</p><p>So I've pulled together 11 (I am a Spinal Tap fan) of my favorite cloud blogs (<a href="http://research.gigaom.com/analyst/david-linthicum/" rel="nofollow">GigaOm analyst</a> David Linthicum and <a href="http://h18004.www1.hp.com/products/solutions/cloud_advisors/christian_verstraete.htmlhttp://h18004.www1.hp.com/products/solutions/cloud_advisors/christian_verstraete.html" rel="nofollow">HP blogger Christian Verstraete</a> to name two) and surveys. Give credit to Linthicum: he was on the hybrid bandwagon way back in 2011.</p><p>--&nbsp;<a href="http://www.infoworld.com/article/2625289/cloud-computing/why-the-hybrid-cloud-model-is-the-best-approach.html" rel="nofollow">Why hybrid is the best approach</a>&nbsp;(David Linthicum's prescient 2011 blog post)</p><p>--&nbsp;<a href="http://h20195.www2.hp.com/v2/GetDocument.aspx?cc=us&amp;doclang=EN_US&amp;docname=4AA4-9896ENW&amp;doctype=white%20paper&amp;lc=en&amp;searchquery=&amp;jumpid=reg_r1002_usen_c-001_title_r0001" rel="nofollow">Managing hybrid clouds</a>&nbsp;(an 8 page HP white paper)</p><p>--&nbsp;<a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/If-it-is-cloud-it-will-be-hybrid/ba-p/159160#.VGpoRlfF-yc" rel="nofollow">If it is cloud, it will be hybrid</a>&nbsp;(Verstraete's 2014 take on hybrid cloud)</p><p>--&nbsp;<a href="http://www.eguardtech.com/blog/eguard-blog/entry/2014/survey-hybrid-cloud-adoption-will-jump-by-56-percent-in-2015" rel="nofollow">Survey: Is hybrid a viable option for the enterprise?</a>&nbsp;(eGuard's post on an survey that says SMBs hybrid cloud adoption will rise 56% next year)</p><p>--&nbsp;<a href="http://smartdatacollective.com/vineetjain/280831/why-hybrid-will-be-next-chapter-cloud-adoption" rel="nofollow">Why hybrid cloud will be the next chapter for cloud adoption</a>&nbsp;(blogger Veneet Jain's take)</p><p>--&nbsp;<a href="http://www.moneycontrol.com/accelerateindia/article.php?autono=1226622" rel="nofollow">Top 10 cloud myths busted</a>&nbsp;(David Mitchell Smith's blog post that asks some hard questions)</p><p>--&nbsp;<a href="http://enterpriseinnovation.net/article/emergence-hybrid-cio-1113961060" rel="nofollow">The emergence of the 'hybrid CIO'</a>&nbsp;(Joe Poon's post on how the hybrid world impacts the CIO)&nbsp;</p><p>--&nbsp;<a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/If-it-is-cloud-it-will-be-hybrid/ba-p/159160#.VGpoRlfF-yc" rel="nofollow">4 steps to hybrid cloud</a>&nbsp;(another winner from Verstraete's <a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/bg-p/cloud-source#.VGt87FfF-yc" rel="nofollow">Cloud Source blog</a>)</p><p>--&nbsp;<a href="http://www.forbes.com/sites/joemckendrick/2014/06/21/clouds-direction-is-very-strategic-and-very-hybrid-survey-shows/" rel="nofollow">Cloud's direction is very strategic and very hybrid, survey shows</a>&nbsp;(blogger Joe McKendrick citing a cloud survey)</p><p>--&nbsp;<a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/If-it-is-cloud-it-will-be-hybrid/ba-p/159160#.VGpoRlfF-yc" rel="nofollow">Survey highlights the challenge of hybrid cloud</a>&nbsp;(Verstraete indentifies and analyzes hybrid cloud challenges)</p><p>--&nbsp;<a href="http://www.enterprisecioforum.com/en/whitepaper/blueprint-cloud-model-hybrid-environment" rel="nofollow">Blueprint of a cloud model for a hybrid envrionment</a>&nbsp;(a white paper done by CIO and HP)</p><p>What are your favorite hybrid cloud reads?</p><p><em>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort" rel="nofollow">@thedodgerertort</a> on Twitter</em>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/jdodge/selected-hybrid-cloud-reads#comments Business Issues Cloud Blog-post Applications CIO Data center hybrid cloud IT Mon, 17 Nov 2014 21:51:07 +0000 jdodge 11076 at https://www.enterprisecioforum.com Keep the infrastructure team away from cloud strategies? Yup! https://www.enterprisecioforum.com/en/blogs/blaberis/keep-infrastructure-team-away-cloud-stra <p>Ultimately cloud computing in most all its iterations is about infrastructure, right? Whether you are trying to minimize Capex or save your existing infrastructure for ‘Sunday best’ applications or trying to quickly scale to meet shifting business conditions. It comes down to infrastructure.</p><p>Therefore it is only logical that the infrastructure team at your organization should be front and center when it comes to planning cloud migrations. Right? Wrong! Because most infrastructure teams are inherently shortsighted, focusing on near-term goals instead of long term strategies.</p><p>At least that is the heart of the thesis developed by <a href="http://h18004.www1.hp.com/products/solutions/cloud_advisors/christian_verstraete.html" rel="nofollow">Christian Verstraete</a>, HP’s chief cloud technologist and a world-renowned blogger. In a<a href="http://www.enterprisecioforum.com/en/blogs/christian/why-infrastructure-teams-should-not-lead" rel="nofollow"> fascinating article</a>, Verstraete makes a more-than credible case for minimizing the role of the infrastructure team. In his view, cloud becomes a vehicle for moving IT away from a technology focus and toward a full-on service focus. In other words, ‘war is too important to be left to the generals,’ as a French statesman observed in WWI.</p><p>I urge you to check out this interesting and carefully conceived blog.</p> https://www.enterprisecioforum.com/en/blogs/blaberis/keep-infrastructure-team-away-cloud-stra#comments CIO Leadership Cloud Blog-post CAPEX CIO Cloud cloud computing cloud security infrastructure Mon, 17 Nov 2014 19:52:31 +0000 blaberis 11071 at https://www.enterprisecioforum.com Who owns enterprise analytics and data? https://www.enterprisecioforum.com/en/blogs/mylessuer/who-owns-enterprise-analytics-and-data <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Is it the CFO? What do you think? </div> </div> </div> <p>With the increasing importance of analytics to the enterprise, the question becomes who should own the analytics and data agenda. This question really matters today because, according to <a href="https://hbr.org/2006/01/competing-on-analytics/ar/1" rel="nofollow">Thomas Davenport</a>, “business processes are among the last remaining points of differentiation.” For this reason, Davenport even suggests that businesses that create a sustainable right to win use analytics to “wring every last drop of value from their processes”.</p><h2>The CFO is the logical choice?</h2><p>In talking with CIOs about both analytics and data, they are clear that they do not want to become their company’s data steward. They insist instead that they want to be an enabler of the analytics and data function. So what business function then should own analytics and data? Last week an interesting answer came from a <a href="http://ww2.cfo.com/analytics/2014/10/cfos-analytics/" rel="nofollow">CFO Magazine Article by Frank Friedman</a>. Frank contends that CFOs are “<strong><em>the logical choice to own analytics and put them to work to serve the organization’s needs</em></strong>”.</p><p>To justify his position, Frank made the following claims:</p><ol><li>CFOs own most of the unprecedented quantities of data that businesses create from supply chains, product processes, and customer interactions</li><li>Many CFOs already use analytics to address their organization’s strategic issues</li><li>CFOs uniquely can act as a steward of value and an impartial guardian of truth across the organizations. This fact gives them the credibility and trust needed when analytics produce insights that effectively debunk currently accepted wisdom</li></ol><p>Frank contends as well that owning the analytics agenda is a good thing because it allows CFOs to expand their strategic leadership role in doing the following:</p><ul><li>Growing top line revenue</li><li>Strengthening their business ties</li><li>Expanding the CFO’s influence outside the finance function.</li></ul><p>Frank suggests as well that analytics empowers the CFO to exercise more centralized control of operational business decision making. The question is what do other CFOs think about Frank’s position?</p><h2>CFOs clearly have an opinion about analytics and data</h2><p>A major Retail CFO says that finance needs to own “the facts for the organization”—the metrics and KPIs. And while he honestly admits that finance organizations in the past have not used data well, he claims finance departments need to make the time to become truly data centric. He said “I do not consider myself a data expert, but finance needs to own <a href="http://www.informatica.com/us/solutions/enterprise-data-integration-and-management/data-quality/#fbid=L3CixsK52is" rel="nofollow"><em>enterprise data and the integrity of this data</em></a>”. This CFO claims as well that “finance needs to use data to make sure that resources are focused on the right things; decisions are based on facts; and metrics are simple and understandable”. A Food and Beverage CFO agrees with the Retail CFO by saying that almost every piece of data is financial in one way or another. CFOs need to manage all of this data since they own operational performance for the enterprise. CFOs should own the key performance indicators of the business.</p><h2>CIOs should own data, data interconnect, and system selection</h2><p>A Healthcare CFO said he wants, however, the CIO to own data systems, data interconnect, and system selection. However, he believes that the finance organization is the recipient of data. “CFOs have a major stake in data. CFOs need to dig into operational data to be able to relate operations to internal accounting and to analyze things like costs versus price”. He said that “the CFOs can’t function without good operational data”.</p><p>An Accounting Firm CFO agreed with the Healthcare CFO by saying that CIOs are a means to get data. She said that CFOs need to make sense out of data in their performance management role. CFOs, therefore, are big consumers of both business intelligence and analytics. An Insurance CFO concurred by saying CIOs should own how data is delivered.</p><h2>CFOs should be data validators</h2><p>The Insurance CFOs said, however, CFOs need to be validators of data and reports. They should, as a result, in his opinion be very knowledgeable on BI and Analytics. In other words, CFOs need to be the Underwriters Laboratory (<a href="http://ul.com/aboutul/" rel="nofollow">UL</a>) for corporate data.</p><h2>Now it is your chance</h2><p>So the question is what do you believe? Does the CFO own analytics, data, and data quality as a part of their operational performance role? Or is it a group of people within the organization? Please share your opinions below.</p><p><strong>Related links</strong><br /> <strong>Solution Brief</strong>: <a href="http://www.informatica.com/us/vision/intelligent-data-platform/#fbid=6HpVUXgm3ow" rel="nofollow"><strong>The Intelligent Data Platform</strong></a><br /> <strong>Related Blogs</strong><br /> <a href="http://blogs.informatica.com/perspectives/2014/09/17/cfo-move-to-chief-profitability-officer/#fbid=FSkcGNkoan7" rel="nofollow">CFOs Move to Chief Profitability Officer</a></p><p><a title="CFOs Discuss Their Technology Priorities" href="http://blogs.informatica.com/perspectives/2014/09/11/cfos-discuss-their-technology-priorities/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">CFOs Discuss Their Technology Priorities</a><br /> <a title="The CFO Viewpoint upon Data" href="http://blogs.informatica.com/perspectives/2014/09/03/the-cfo-viewpoint-upon-data/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">The CFO Viewpoint upon Data</a><br /> <a title="How CFOs can change the conversation with their CIO?" href="http://blogs.informatica.com/perspectives/2014/07/07/how-cfos-can-change-the-conversation-with-their-cio/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">How CFOs can change the conversation with their CIO?</a><br /> <a title="New type of CFO represents a potent CIO ally" href="http://blogs.informatica.com/perspectives/2014/06/30/new-type-of-cfo-represents-a-potent-cio-ally/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">New type of CFO represents a potent CIO ally</a><br /> <a title="Competing on Analytics" href="http://blogs.informatica.com/perspectives/2014/08/22/competing-on-analytics-a-follow-up-to-thomas-h-davenports-post-in-hbr/#fbid=nL6vd61grIg" target="_blank" rel="nofollow">Competing on Analytics</a><br /> <a title="The Business Case for Better Data Connectivity" href="http://blogs.informatica.com/perspectives/2014/06/25/the-business-case-for-better-data-connectivity/" target="_blank" rel="nofollow">The Business Case for Better Data Connectivity</a></p><p><strong>Twitter</strong>: <a href="https://twitter.com/MylesSuer" rel="nofollow"><strong>@MylesSuer</strong></a></p> https://www.enterprisecioforum.com/en/blogs/mylessuer/who-owns-enterprise-analytics-and-data#comments CIO Leadership IT Performance Blog-post analytics CFO CIO data Mon, 17 Nov 2014 17:52:44 +0000 myles.suer 11066 at https://www.enterprisecioforum.com CIOs Must Learn to Talk to the Board About Cybersecurity https://www.enterprisecioforum.com/en/blogs/jdodge/cios-must-learn-talk-board-about-cyberse <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> ”You can’t paint a rosy picture… but you don’t want to scare the crap out of them either.” WSJ CIO Journal </div> </div> </div> <p>This <a href="http://blogs.wsj.com/cio/2014/11/14/cios-must-learn-to-talk-to-the-board-about-cybersecurity/" rel="nofollow">Wall Street Journal CIO Journal post</a> is quite instructive about how CIOs should approach <a href="http://www.enterprisecioforum.com/en/ContentVault?sort_order=&amp;category=All&amp;topic=10&amp;categorytype=All&amp;uctype%5B%5D=3709" rel="nofollow">the topic of security</a> with boards. Indeed, it is a critical, frank and ongoing discussion.</p><p>In summary, it says to communicate often, grade yourself, strike a balance when it comes to expressing urgency (see the deck) and be aware of jargon and double meanings. For instance, the word "breach" can apply to things other than data.&nbsp;</p><p>Good read.</p><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/jdodge/cios-must-learn-talk-board-about-cyberse#comments Business Issues Security Quick Post CIO CISO Cyber security data breach IT Mon, 17 Nov 2014 16:35:16 +0000 jdodge 11061 at https://www.enterprisecioforum.com The real dilemma of IoT and Ethics https://www.enterprisecioforum.com/en/blogs/enadhan/real-dilemma-iot-and-ethics <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Can devices ever think like humans? </div> </div> </div> <p>"Discuss how you dealt with an ethical dilemma" goes the essay topic for a college application.&nbsp; A question commonly posed to comprehend the dynamics that force us to make those oh-so-difficult judgment calls.&nbsp; These are dilemmas for which there is no "right" answer varying from scenario to scenario, falling into the "gray area" – with no black-and-white answer.&nbsp; Humans are wired to make tough decisions bringing all the context and principles to bear.&nbsp; Similarly, can devices apply the available information to make the right judgment calls?&nbsp; To some extent, I would say.&nbsp; Will the IoT face ethical dilemmas?&nbsp; Absolutely! Question is will the IoT realize it?&nbsp; That is the real dilemma.</p><p>It is those "little gray cells" – one of the favorite phrases of the fictional character <a href="http://en.wikipedia.org/wiki/Hercule_Poirot" rel="nofollow">Hercule Poirot</a> created by <a href="http://www.agathachristie.com/" rel="nofollow">Agatha Christie</a>.&nbsp; Perhaps, they are gray having worked with a world of information -- and emotions – to make those difficult, but real, decisions.</p><p>Take the case of the <a href="http://en.wikipedia.org/wiki/Trolley_problem" rel="nofollow">Trolley Problem</a> introduced in 1967 referenced in this <a href="http://aeon.co/magazine/technology/can-we-design-systems-to-automate-ethics/" rel="nofollow">in this Aeon magazine article</a> by Tom Chatfield.&nbsp; Imagine you are the driver of a runaway tram heading down a track where 5 men are working. All are certain to die when the trolley reaches them.&nbsp; You can switch the trolley's path to an alternative spur.&nbsp; Unfortunately, one man is working on this spur and will be killed if the switch is made.&nbsp; As Chatfield explains, conventional wisdom would be to minimize the losses (1 fatality better than 5).&nbsp; We could build in such rules into devices to re-route the trolley accordingly.&nbsp;</p><p>Enter emotion.&nbsp; As the driver, you recognize the individual on the other track as someone you care about -- or taking it to the other extreme -- someone you perceive to be an adversary.&nbsp; Suddenly, the rules discussed above undergo some distortion.&nbsp; And you make a last minute decision in a fleeting second -- ethical post-mortem to follow later as needed.</p><p>Despite the ability to continuously collect data, is it really possible to introduce the "gray thinking matter" into the IoT?&nbsp; I say “No.”&nbsp; Only humans can think like humans.&nbsp; Moreover, the manner and extent to which ethics are applied defines our character and varies person to person.&nbsp; Perhaps, this is why <a href="http://owl.li/vP2Kg" rel="nofollow">computers can never be Data Scientists</a>.&nbsp;</p><p>So, what could we do then to build ethics into the device that drives the trolley?&nbsp; We can never really anticipate all possible scenarios and program appropriate measures.&nbsp; Avoidance of the impact with early warning detections may be the most effective strategy even though it is not within the domain of applicable solutions for this problem.&nbsp;</p><p>The debate continues about <a href="http://ftijournal.com/article/is-business-ethics-an-oxymoron" rel="nofollow">business ethics being an oxymoron</a>.&nbsp; IoT and ethics may be a challenging proposition too – because IoT can never really be fully automated to being a human.&nbsp;</p><p>And that is not exactly a dilemma – it is just plain and simple reality.</p><p>Team up with&nbsp;<a href="http://www.hp.com/go/easwarannadhan" target="_self" rel="nofollow">HP Technology Expert, E.G.Nadhan</a></p><p>Connect with <a href="https://twitter.com/NadhanEG" target="_self" rel="nofollow">Nadhan</a>&nbsp;on: <a href="https://twitter.com/NadhanEG" target="_self" rel="nofollow">Twitter</a>, <a href="http://www.facebook.com/easwaran.nadhan" target="_self" rel="nofollow">Facebook</a>, <a href="http://www.linkedin.com/profile/view?id=102637222&amp;trk=tab_pro" target="_self" rel="nofollow">Linkedin</a> and <a href="http://bit.ly/VDfGGn" target="_blank" rel="nofollow">Journey Blog</a>.</p> https://www.enterprisecioforum.com/en/blogs/enadhan/real-dilemma-iot-and-ethics#comments CIO Leadership Big Data Blog-post analytics Big Data Business Ethics data science Ethical Dilemma Ethics information management Internet of Things IoT Mon, 17 Nov 2014 15:53:08 +0000 enadhan 11056 at https://www.enterprisecioforum.com So many security concerns and topics, so little time https://www.enterprisecioforum.com/en/blogs/jdodge/so-many-security-concerns-and-topics-so <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> &quot;Fake cell towers!?&quot; See conversation 2. </div> </div> </div> <p>Our #CIOchat yesterday about security nightmares touched on human error, <a href="http://en.wikipedia.org/wiki/Penetration_test">penetration testing</a>, privacy, <a href="http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/POS-malware-a-look-at-Dexter-and-Decebal/ba-p/6654398#.VGZqMfnF-FU">Point of Sale vulnerabilities</a>, training, education, layered security, 7x24 threat monitoring and who should be charge of enterprise cyber security. The sheer number of topics expresses the complex and never ending task of keeping enterprise data secure.</p> <p>And it will only intensify as mobile and Internet of Things (IoT) become more and more pervasive.</p> <p>I say "more and more pervasive" to emphasize that <a href="http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Mobile-malware-shows-us-the-money/ba-p/6666200#.VGZp7PnF-FU">mobile</a> and IoT are already here in massive numbers. The growth rate in their numbers will increase at a progressively faster clip with no end in sight to the acceleration. It's exhilarating and frightening at the same time.</p> <p>The following Tweets should convince you to join in our informative and insightful chats which are every week between 2 and 3 p.m. ET on Thursdays.&nbsp;</p> <p>Two of my favorites Tweets - there were 329 in our #CIOchat hour from 44 participants - were from Disney technologist <a href="http://www.twitter.com/KeithBarrett%20">@KeithBarrett</a>. His first cautionary Tweet advises that planning for what might happen is better than reacting to a ruinous incident. How true. Not just CISOs and CIOs should think that way. Every employee, partner, customer and stakeholder needs to as well. &nbsp;</p> <blockquote> <p><img src="https://pbs.twimg.com/profile_images/378800000549871689/f2a26a2b2354772d910cc499f5a1789f_normal.png" alt="" style="line-height: 1.4em;" class="networkAvatar isLoaded" /><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span class="messageDescription" style="line-height: 1.4em;"><a href="http://twitter.com/KeithBarrett/status/532984767562940416" target="_blank" class="postTime _postPermalink _postTime">Nov 13, 2:54pm via TweetChat powered by oneQube</a></span></p> <p class="_baseTweetText _tweetText messageContent">You have to remember, that most security issues will be discovered AFTER the fact, so you need to plan for that.&nbsp;<a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash">#ciochat</a></p> </blockquote> <p class="_baseTweetText _tweetText messageContent">And I loved his Tweet about pen testing to see who's falling for phishing attacks.&nbsp;</p> <blockquote> <p><span style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="katweasle" class="_userInfoPopup _twitter" style="line-height: 1.4em;">katweasle</a><span style="line-height: 1.4em;">&nbsp;@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup _twitter" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup _twitter" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;I know once place where security sent their own phising attempt to record who fell for it</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a></p> </blockquote> <p><span style="line-height: 1.4em;">Here's two interesting conversations.</span></p> <div id="tweet_103407831_532985051970273280" class="_message message "> <div class="-messageBody"> <p class="_baseTweetText _tweetText messageContent"><strong>Conversation 1 -- Humans are the weakest link. Education, education, education...</strong> &nbsp;</p> <p class="_baseTweetText _tweetText messageContent"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" style="line-height: 1.4em;" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="Thedodgeretort">Thedodgeretort</span><span style="line-height: 1.4em;">&nbsp;&nbsp;Q. 3 Does your company do a good job of educating you and ALL its constituents about security?&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:40pm, Nov 13 from Hootsuite</span></p> </div> </div> <div class="-messageConversation"> <div class="_previousTweets previousMessages"> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="mamezz">mamezz</span><span style="line-height: 1.4em;">&nbsp; A3.&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;Yes, but even a GOOD job isn't going to counteract the ONE-CLICK owned scenario;&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:43pm, Nov 13 from Twitter Web Client</span></div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="mamezz">mamezz</span><span style="line-height: 1.4em;">&nbsp; A3.&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;Need more gamification and real-time feedback for training&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:44pm, Nov 13 from Twitter Web Client</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="KeithBarrett">KeithBarrett</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">&nbsp;You can conduct trial exercises. A lot gets uncovered by pretending to really gain access.</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:47pm, Nov 13 from TweetChat powered by oneQube</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="KeithBarrett">KeithBarrett</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">&nbsp;And I don't mean webinars. I mean stealth call or otherwise pretend a real hack is in progress</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:48pm, Nov 13 from TweetChat powered by oneQube</span></div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F505818737748889600%2FqYV1ybqF_normal.png" alt="davidjhinson" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="davidjhinson">davidjhinson</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;just this type of jack happened to a friend this week.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:49pm, Nov 13 from Twitter for iPhone</span></div> <div class="_comment comment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="mskaff">mskaff</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="davidjhinson" class="_userInfoPopup" style="line-height: 1.4em;">davidjhinson</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;Pen-testing (inc social engineering) is an impt component of a</span><a href="https://hootsuite.com/dashboard#" title="netsec" class="_quickSearchPopup hash" style="line-height: 1.4em;">#netsec</a><span style="line-height: 1.4em;">&nbsp;program.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:51pm, Nov 13 from Twitter Web Client</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="KeithBarrett">KeithBarrett</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup" style="line-height: 1.4em;">mskaff</a><span style="line-height: 1.4em;">&nbsp;Yeap. Most people only focus on the policies and tech. They don't test the human social components.</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:52pm, Nov 13 from TweetChat powered by oneQube</span></div> <div class="_comment comment originalComment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" class="networkAvatar" /><span class="_username networkName _userInfoPopup" style="line-height: 1.4em;" title="mskaff">mskaff</span><span style="line-height: 1.4em;">&nbsp;&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">&nbsp;We humans are usually the "weakest link". Hence my belief in the importance of education.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:54pm, Nov 13 from Twitter Web Client</span></div> <div class="_comment comment originalComment"><strong><span class="date" style="line-height: 1.4em;">Conversation 2 - Not everyone who needs 7x24 threat monitoring (which is everyone) can afford it. &nbsp;</span></strong></div> <div class="_comment comment originalComment"> <div id="tweet_103407831_532980500135444480" class="_message message "> <div class="-messageBody"> <p class="_baseTweetText _tweetText messageContent"><img src="https://pbs.twimg.com/profile_images/505818737748889600/qYV1ybqF_normal.png" alt="" style="line-height: 1.4em;" class="networkAvatar isLoaded" /><a href="https://hootsuite.com/dashboard#" title="davidjhinson" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">davidjhinson</a><span class="messageDescription" style="line-height: 1.4em;">&nbsp;<a href="http://twitter.com/davidjhinson/status/532980437623111681" target="_blank" class="postTime _postPermalink _postTime">Nov 13, 2:36pm via Twitter for iPhone</a></span></p> </div> </div> <div id="tweet_103407831_532980437623111681" class="_message message "> <div class="-messageBody"> <p class="_baseTweetText _tweetText messageContent">@<a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup _twitter">Thedodgeretort</a>&nbsp;@<a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup _twitter">mamezz</a>&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a>up to a point - but this hits a scale wall with small cos / orgs / schools</p> </div> <div class="-messageConversation"><a href="https://hootsuite.com/dashboard#" class="showConversation _closeReplyTo">Hide conversation</a> <div class="_previousTweets previousMessages"> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="KeithBarrett">KeithBarrett</span>&nbsp;&nbsp;A1. The NSA exploiting backdoors to monitor citizens instead of helping the public close them?&nbsp;<a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash">#ciochat</a><span class="date">2:15pm, Nov 13 from TweetChat powered by oneQube</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="Thedodgeretort">Thedodgeretort</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup">KeithBarrett</a>&nbsp;Or having the data handed to them on a platter by wireless and search cos.&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:17pm, Nov 13 from Hootsuite</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F2544916053%2Fimage_normal.jpg" alt="katweasle" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="katweasle">katweasle</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup">KeithBarrett</a>Agree, main in the middle wifi hacking is easy when people are using coffee shop or airport wifi&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:18pm, Nov 13 from Twitter for iPad</span></p> </div> <div class="_comment comment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="mskaff">mskaff</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="katweasle" class="_userInfoPopup">katweasle</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a><span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup">KeithBarrett</a>&nbsp;Yes - fake access points (and even fake cell towers!) are on the rise.<a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash">#CIOChat</a><span class="date">2:21pm, Nov 13 from Twitter Web Client</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="Thedodgeretort">Thedodgeretort</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup">mskaff</a>&nbsp;Fake cell towers to intercept wireless calls, data?&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a>&nbsp;I just thought they were ones with fake tree branches.<span class="date">2:23pm, Nov 13 from Hootsuite</span></p> </div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="mamezz">mamezz</span>&nbsp;&nbsp;.<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup">mskaff</a>&nbsp;Trust is all relative, and we've gotten complacent using security by obscurity, least target mentality&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:26pm, Nov 13 from Twitter Web Client</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="Thedodgeretort">Thedodgeretort</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup">mamezz</a>&nbsp;Used to think trust was earned. In the security realm, should no one be trusted?&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:29pm, Nov 13 from Hootsuite</span></p> </div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="mamezz">mamezz</span>&nbsp;&nbsp;.<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a>&nbsp;Trust is a tradeoff in a very complex world, security vs. opportunity/value - you decide&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:31pm, Nov 13 from Twitter Web Client</span></p> </div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="Thedodgeretort">Thedodgeretort</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup">mamezz</a>&nbsp;How about several levels of 7x24 threat monitoring?<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a>&nbsp;Internal and external? Hired pros trying to break your systems&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a><span class="date">2:35pm, Nov 13 from Hootsuite</span></p> </div> <div class="_comment comment originalComment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F505818737748889600%2FqYV1ybqF_normal.png" alt="davidjhinson" class="networkAvatar" /> <p class="commentContent"><span class="_username networkName _userInfoPopup" title="davidjhinson">davidjhinson</span>&nbsp;&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup">mamezz</a><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash">#CIOchat</a>&nbsp;up to a point - but this hits a scale wall with small cos / orgs / schools<span class="date">2:36pm, Nov 13 from Twitter for iPhone</span></p> <p class="commentContent"><em><span class="date">Follow <a href="http://www.twitter.com/ecioforum">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort">@thedodgeretort</a> on Twitter.</span></em></p> </div> </div> </div> </div> </div> </div> </div> https://www.enterprisecioforum.com/en/blogs/jdodge/so-many-security-concerns-and-topics-so#comments Business Issues Applications Mobility Security Blog-post CIO cyber threats data breaches IT Security Fri, 14 Nov 2014 15:42:35 +0000 jdodge 11051 at https://www.enterprisecioforum.com Cool cloud startups in 2014 https://www.enterprisecioforum.com/en/blogs/rickblaisdell/cool-cloud-startups-2014 <p>Cloud computing is producing a great number of big and successful companies. Bessemer Venture has identified about&nbsp;<a href="https://www.bvp.com/sites/default/files/img/bvp_cloudscape_v4_web.jpg" rel="external nofollow" rel="nofollow">300 successful cloud startups</a>&nbsp;– among them, 16 have already hit a $1 billion valuation or on the verge of it.</p><p>Startups are showing up every day in the cloud market, from optimizing infrastructure services to offering development platforms. There are applications served from the cloud and new classes of apps that could not have been made without the cloud. So let’s take a look at some cool innovative cloud startups that are changing the game this year:</p><ul><li><a href="http://www.cloudphysics.com/" rel="external nofollow" rel="nofollow"><strong>CloudPhysics</strong></a><strong>&nbsp;–&nbsp;</strong>uses big data to protect the cloud. The startup, founded in 2011 in Mountain View, California, by former VMware employees, offers a cloud-based service that gathers billions of samples of anonymized operational data each day from customers around the globe. That information is dissected to identify potential problems on virtual server, storage and networking environments, reducing human errors that can damage a data center.</li><li><a href="http://pistoncloud.com/" rel="external nofollow" rel="nofollow"><strong>Piston Cloud</strong></a><strong>&nbsp;–&nbsp;</strong>with all the interest these days in OpenStack, we sometimes forget how difficult it can be to deploy and manage an OpenStack cloud. The San Francisco-based startup uses advanced systems intelligence to orchestrate private cloud environments on nothing but commodity hardware. The software simplifies the process to the point that a single system administrator using Piston Cloud’s Piston OpenStack 3.0 release can alone operate an OpenStack-powered private cloud.</li><li><a href="https://coreos.com/" rel="external nofollow" rel="nofollow"><strong>CoreOS</strong></a><strong>&nbsp;-</strong>in an age of distributed computing clusters, the lightweight Linux distribution is optimized for massive server deployments. This year, CoreOS became available on Google’s Compute Engine cloud, released an enterprise-grade version and launched a service called Managed Linux that its developers describe as the world’s first OS-as-a-Service. CoreOS fully integrates Docker for deploying and managing Linux containers, and many believe this technology is the future of virtualization in enterprise environments.</li><li><a href="http://www.elastichosts.com/" rel="external nofollow" rel="nofollow"><strong>ElasticHosts</strong></a>&nbsp;– offers a public cloud that comes closer than anyone else, including AWS, to billing customers only for the computing resources they are using. The London-based company takes the consumption-based pricing model a step further than its competitors, dividing usage into 15 minute intervals, and it has the potential to deliver significant cost savings to businesses.</li><li><a href="https://www.netskope.com/" rel="external nofollow" rel="nofollow"><strong>Netskope</strong></a><strong>&nbsp;–&nbsp;</strong>provides discovery, analysis and policy enforcement for over 2,600 cloud and software-as-a-service (SaaS) apps. The startup can help CIOs get a handle on Shadow IT by bringing visibility to the great number of apps brought into businesses without IT oversight, and introducing good governance to their management.</li></ul><p>An increasing number of startups and small businesses are moving key operations to the cloud. In this era of everything as a service, cloud startups are also forcing existing businesses to up their games and go cloud. What’s your plan?</p> https://www.enterprisecioforum.com/en/blogs/rickblaisdell/cool-cloud-startups-2014#comments CIO Leadership Cloud Blog-post #Cloud #Computing cloud computing cloud startups startups Thu, 13 Nov 2014 11:18:30 +0000 RickBlaisdell 11046 at https://www.enterprisecioforum.com ‘Data Breach’ - Top Concern for CIOs in 2015 https://www.enterprisecioforum.com/en/blogs/eiq-networks/%E2%80%98data-breach%E2%80%99-top-concern-cios-2015 <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> EiQ Networks&#039; recent survey of CIOs and top IT professionals across industries found that security breaches are the top concern in 2014 and moving into 2015. </div> </div> </div> <p>EiQ Networks recently surveyed CIOs and top IT pros across industries, and found, not surprisingly, that security breaches are the top concern in 2014 and moving into 2015.</p><p>More specifically, we learned that data breaches are the top concern for 90% of IT security professionals. Despite this, only 15% of those same IT professionals surveyed, described their organizations as “well prepared” for a security breach. Out of the 145 IT decision-makers surveyed, only 21% said they are truly confident in their company system’s ability to mitigate the risk of security incidents.&nbsp;</p><p>Top challenges for risk management teams in 2015 include keeping up with the latest cyber threats, staying current on new forms of malware, and figuring out which systems are adequately protected. These three challenges concern CIOs because hackers are finding new ways to bypass traditional network security systems, creating a critical need for a comprehensive security program that includes proactive and reactive security management to stay ahead of cybercriminals.&nbsp;</p><p>Despite all of the security breaches that have occurred within the past year, 60% of IT professionals said they only had a partial cyber defense process in place. Only 31% of respondents have a "solid process" in place for cyber defense, and only 15% of respondents said their company is "well prepared" for a cyber breach. Alarmingly, 11% of IT pros say that their companies have no cyber defense process.</p><p>According to the survey, the top three security concerns for IT infrastructure are mobility, networks, and endpoints. The survey found that 81% of companies rely on traditional firewalls to protect their networks. Anti-virus software followed firewalls at 66% as a preferred cyber security protection method.&nbsp; 85% of IT pros say they plan to replace their current log management and SIEM vendors with a Managed Services solution.</p><p><strong><em>How to Protect Against a Data Breach</em></strong></p><p>When a cyber breach occurs, all stakeholders will look to the CIO/CISO/CSO to communicate information about the incident and its consequences, and the steps the company is taking to reduce risk to the organization. CIOs should have a well-defined security program that includes an incident response plan before a cyber breach occurs, especially since cyber breaches are becoming more common. The CIO needs to serve as the manager of the incident response team. This team should have necessary tools in their arsenal to quickly identify and analyze root cause of the problem, compromised systems, data and users, and be able to implement corrective counter measures to mitigate and minimize the risk. Centralized control over a data breach response team can result in more accountability and responsibility, which can reduce the overall financial cost of a data breach.</p><p>As the volume and complexity of security breaches continue to accelerate, an increasing number of organizations are at risk of losing valuable customer data, corporate data, and intellectual property and reputation. With the severity of today’s threat environment and impact on all areas of the business, IT pros are looking beyond basic compliance and beginning to focus on security best practices to get out in front. Defining and implementing an effective security program that provides both proactive and reactive security monitoring on a continuous basis, and is supported by trained security professionals who can engage in timely analysis and remediation, is mandatory in protecting businesses against current threats.</p><p>EiQ's&nbsp;survey results confirm that IT pros are very concerned about keeping company data secure. &nbsp;It is critical that executive management allocate sufficient budgets and encourage implementing well thought out and common sense security practices such as SANS Security Controls that result in meaningful and measureable improvements in security, rather than just focusing on basic compliance and the latest greatest technology to get a check box.</p> https://www.enterprisecioforum.com/en/blogs/eiq-networks/%E2%80%98data-breach%E2%80%99-top-concern-cios-2015#comments Technology Security Blog-post CIO data breach EiQ infographic IT Pros SIEM survey Vulnerability Thu, 13 Nov 2014 01:31:26 +0000 EiQ Networks 11036 at https://www.enterprisecioforum.com Eight ways to lower costs with the cloud https://www.enterprisecioforum.com/en/blogs/christian/eight-ways-lower-costs-cloud <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Enterprise software development an untapped target. </div> </div> </div> <p>A primary goal for the CIO since the beginning of IT time has been to keep costs low. And one area that is not always a focus of cost reduction is enterprise software development. Cloud to the rescue. &nbsp;&nbsp;</p> <p><span style="line-height: 1.4em;">After considering this habit of companies missing a cost-cutting opportunity, I came up with&nbsp;</span><em style="line-height: 1.4em;">eight</em><span style="line-height: 1.4em;">&nbsp;</span><em style="line-height: 1.4em;">savings resulting from the use of cloud computing in the development process</em><span style="line-height: 1.4em;">. Let me share what I came up with and tell me if I missed anything.</span></p> <p><strong>Reuse infrastructure through the provisioning from a central pool of servers (virtual and physical)</strong></p> <p>The time of the server under the desk is over. The time of the dedicated server also. Why not provide a pool of servers, virtual and physical, and have developers provisioning what they need, when they need it? And ideally, they would release the servers when they are not developing. Using such approach improves the usage of the infrastructure drastically.</p> <p><span style="line-height: 1.4em;">Furthermore, when considering virtual and physical servers, ideally you would only use virtual servers at this time. Unfortunately, some license schemes push you to physical servers as installing them in virtual environments makes the cost of the license prohibitive because it is based on cores. Physical servers are more difficult to reuse, so you may want to look at alternative approaches to give your users access to those databases. DBaaS, or a “database hotel,” is an option, if available. In other words, you dedicate one server to databases and install the databases of all ongoing development projects on the same server so you limit the license costs. In production, this might be seen as a security weakness, but developments are being made to combat threats.</span></p> <p><strong>Provide a finite number of virtual machine images or provisioning options</strong></p> <p>What can make the lives of operation people miserable is when developers use multiple versions of the same middleware or database service, forcing them to support many different options and combinations. This is often due to the DVD the developer has available when he sets up his environment. By providing virtual machine images, or even better- provisioning options that only give you access to one version of each tool- you limit the options, reducing the licensing, support and operations costs drastically.</p> <p>These savings may seem indirect as they reduce operation, not development costs. However, when looking at total IT costs, they will provide the enterprise with important savings. A couple side questions to ask is whether, during the development process, the same hypervisor needs to be used as in production. VMWare licenses are costly, and many insist on them being used for production workloads.</p> <p>And that makes sense. But does that imply VMWare also needs to be used in all steps of the development process, or could most of the development be done in a KVM environment for example, just migrating to VMWare for final testing, QA and staging? Again, substantial savings are possible here. Lastly, and this is particularly true if VMWare is used, ensure unused virtual machines are de-provisioned. In other words, release the license keys, not just for the hypervisor, but also for all tools and middleware/databases used during the development process, when not in use.</p> <p>That will minimize the size of the pool of licenses you require for development, reducing the cost of acquiring and supporting those licenses. Even better, where possible, consume them using as-a-service structured solutions.</p> <p><strong>Ensure appropriate management of the environment to reduce risks and costs</strong></p> <p>Having a central pool of resources available, having that pool managed by a focused team and having it available “on-demand” ensures an automated provisioning relieving the developer from set-up, management and operation tasks. These include back-up for example. I cannot tell you how often I have seen developers losing several days of their work because they had not saved their work properly. Centralizing back-up, patch management, upgrades etc. relieves the developers of such routine tasks, while ensuring consistency across the development community. If the above management is complemented with centralized source code and documentation management, reuse can be increased, which in turn diminishes the effort of developing applications and facilitate maintenance. Lastly, if portfolio and project management functions are combined with a central pool of infrastructure resources and management, a clear view of the progress of development projects can be made available, facilitating a better management of projects and budgets, limiting un-used budgets at year end.</p> <p><strong>Automate deployment to speed up release to multiple platforms</strong></p> <p>During the development process, multiple environments may be used. This is increasingly necessary when developing cloud-ready and cloud-native applications. Indeed, stress testing for example may require a much larger configuration than regular development work. Using multiple cloud environments may be the way to go so that appropriate resource pools are consumed when required, and only paid for when used. This however, forces developers to install their applications on various environments which may be time consuming. Building on technologies used in projects following agile methodologies, continuous delivery tools can be used to automate the deployment to multiple environments. Configuring the application deployment template once, reusing infrastructure, OS, database and middleware installation recipes already available in the environment facilitate such task. Whether it is the developer, or the operator at a later stage, automating the deployment process reduces the effort of having to install the application and all its components on a given environment.</p> <p><strong>Automate testing to enable daily testing speeding up anomaly discovery</strong></p> <p>Why not adopt another best practice from agile development: let’s automate testing. A couple years ago I talked to one of our product development teams and they mentioned that they had seven teams working on components of the application they were developing. Daily, they clocked in their code and overnight it was assembled automatically and a number of tests were run. In the morning, as the teams returned, reports were available showing them how the development of the previous day operated with the remainder of the application. Since that time, I had the opportunity to talk to some of the engineers responsible for&nbsp;<a href="https://www.openstack.org/summit/openstack-summit-atlanta-2014/session-videos/presentation/continuous-integration-and-deployment-using-openstack" target="_blank" rel="nofollow">Continuous Integration and Deployment on the OpenStack project</a>&nbsp;and I found a lot of similarities, only taken further. Developing such approaches in-house improves quality while reducing the time it takes to identify and correct issues. It also enables the organization to speed-up the development process allowing developers to respond quicker to the requests from the business.</p> <p><strong>Facilitates the re-use of common components</strong></p> <p>I briefly mentioned this already. The standardization of processes, architectures and methodologies improve the reuse of components, and result in lower development costs. Having a central repository where all artifacts are aligned facilitates finding the components that are available and actually re-use them. Components can be software modules, software services or installation and test scripts etc. Do not limit yourself to software functionality, there are many elements that can be reused, including installation and test scripts, components of screens etc.</p> <p><strong>Centralizes the application documentation repository</strong></p> <p>Centralizing application documentation brings with it two advantages. First, the team members quickly find the latest version of the documentation of an application or module of a project. But having a central place is also valuable to improve reuse. From a single place developers can then review what artefacts are available, so it is no longer word of mouth. What is needed is to ensure developers first go and check whether something exists prior to develop it themselves. Hence giving them incentives to do so. Furthermore, they need to learn developing with reuse in mind. This implies following some standards on how the functionality can be accessed (API and others) and appropriate documentation so others can understand what the contribution actually does. And then they need to be ready to share. It requires a change in the enterprise dynamics.</p> <p><strong>Self-Service</strong></p> <p>Developers want to work at their own speed. They do not like to have to rely on others to prepare their environments. They rather take their own destiny in their own hands. For this reason, providing them with self-provisioning capabilities helps empower them, and accept a more centralized environment. No service desk needs to be put in place, they just go to a portal and choose amongst the offerings what they need at that moment in time.</p> <p><strong style="line-height: 1.4em;">Results: Lower costs, a leaner structure, and more effective developers</strong></p> <p>Implementing the eight points above allows developers to focus on core competencies- developing software. When we did this internally, the productivity of our developers jumped more than 15 percent. Employees no longer lost time setting-up and managing their environments. They could focus on development while 0re-using functionality their colleagues had already developed. Their environments were automatically backed-up, ensuring their work was no longer lost on occasions. Being able to test daily resulted in more productive developments. And then there were the savings from a license and operations perspective. Altogether, although any such changes can initially require an adjustment period for employees (and in this case, developers), once they understand how it facilitates their efficiency, data recovery, and successful results, they don’t want to go back, I can tell you that.</p> <p><span style="line-height: 1.4em;">If you are interested in HP's DevOps offering, click&nbsp;</span><a href="http://www8.hp.com/us/en/software-solutions/agility-devops-services/?jumpid=reg_r1002_usen_c-001_title_r0002" target="_blank" style="line-height: 1.4em;">here</a><span style="line-height: 1.4em;">, if you are looking at setting up DevOps in your organization and want help, click&nbsp;</span><a href="http://www8.hp.com/us/en/software-solutions/agility-devops-services/?jumpid=reg_r1002_usen_c-001_title_r0001" target="_blank" style="line-height: 1.4em;">here</a><span style="line-height: 1.4em;">.</span></p> https://www.enterprisecioforum.com/en/blogs/christian/eight-ways-lower-costs-cloud#comments Technology Applications Cloud Blog-post CIO Cloud devops enterprise software IT Wed, 12 Nov 2014 21:30:44 +0000 Christian 11031 at https://www.enterprisecioforum.com Clearing up the confusion between IaaS and Paas https://www.enterprisecioforum.com/en/blogs/christian/clearing-confusion-between-iaas-and-paas <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> &quot;It&#039;s all about PaaS.&quot; </div> </div> </div> <p><span style="line-height: 1.4em;">It’s all about “Platform as a Service” these days. But juxtaposed to Infrastructure as a Service (IaaS), what does PaaS mean, and how do you make the right choice for a given application? I see at least two different kind of PaaS environments addressing different scenarios and needs. It’s important, when embarking on the development and/or migration of an application to a cloud environment, to thoroughly think through which PaaS environment to use.</span></p> <p><strong><span style="line-height: 1.4em;">PaaS, a definition</span></strong></p> <p>Let’s start with&nbsp;<a href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf" target="_blank" rel="nofollow">the definition from the National Institute of Standards and Technologies</a>. They define Platform-as–a-Service (PaaS) as, “…<em>the capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment</em>.”</p> <p><a href="http://www.gartner.com/it-glossary/platform-as-a-service-paas" target="_blank" style="line-height: 1.4em;" rel="nofollow">Gartner</a><span style="line-height: 1.4em;">, on the other hand defines PaaS “…</span><em style="line-height: 1.4em;">as a broad collection of application infrastructure (middleware) services (including application platform, integration, business process management and database services)”.&nbsp;</em><span style="line-height: 1.4em;">They then quickly add that aPaaS often represents the whole category. APaaS (Application PaaS) is in turn defined as “…<em>a cloud service that offers development and deployment environments for application services.”</em></span></p> <p><span style="line-height: 1.4em;">And here is where one can become confused. Some people speak about PaaS as an&nbsp;</span><strong style="line-height: 1.4em;">integrated</strong><span style="line-height: 1.4em;">&nbsp;development and deployment environment for applications (e.g. Azure, Google Apps) while others see it as a&nbsp;</span><strong style="line-height: 1.4em;">collection</strong><span style="line-height: 1.4em;">&nbsp;of middleware, libraries, database and other tools made available to the developers (often as-a-service). There is place for both. Let’s look at this in a little more in depth and highlight the pros and cons of both approaches.</span></p> <p><strong style="line-height: 1.4em;">Which Application on which platform?</strong></p> <p><span>Most companies have existing applications that need to be migrated to a cloud environment. Often, cloud is just used as an infrastructure reservoir, and the middleware/database/libraries are installed on the infrastructure. The application is then installed and runs in a similar way it would run in its old environment.</span></p> <p><span>In some cases, the middleware &amp; database is replaced by an equivalent “as-a-service” offering, so now the application can run on a “cloud platform”. The advantage is that it limits the middleware and database licensing cost to what is actually consumed. Unfortunately, many database and middleware software vendors do not support such a sales approach so the offer is not available.</span></p> <p><span style="line-height: 1.4em;">Some applications are cloud native, or in other words, they are developed with the cloud in mind.&nbsp;</span><a href="http://www.techopedia.com/definition/26684/native-cloud-application-nca" target="_blank" style="line-height: 1.4em;" rel="nofollow">Technopedia</a><span style="line-height: 1.4em;">defines a native cloud application (NCA) as “…</span><em style="line-height: 1.4em;">a software application that is specifically built for cloud computing and virtualization environments. Native cloud applications are designed, developed and deployed in such a way that they reap the maximum functionality and services of a cloud computing and virtualization infrastructure.”&nbsp;</em><span style="line-height: 1.4em;">In other words, such applications are developed with scale-up scale-down capabilities in mind. Its main purpose is for applications requiring improved user experience in environments with unpredictable user demand.</span></p> <p><span style="line-height: 1.4em;">Let’s look at the platforms in more detail.</span></p> <p><strong style="line-height: 1.4em;">Cloud Native Applications, aPaaS.</strong></p> <p><span>When developing a new application that is taking full advantage of the cloud, use an aPaaS such as Microsoft Azure or Google Apps. These are feature rich environments allowing you to improve your productivity during the development process. They facilitate the scale-up or scale-down, the use of load balancers, the communication between application modules, the use of data structures etc.</span></p> <p><span style="line-height: 1.4em;">Their main advantage is that they allow you to develop your application within an integrated environment, and one that typically has many features. In doing so, they shield you from the complexity of the cloud environment and its functionality.</span></p> <p><span style="line-height: 1.4em;">The disadvantage is that they are fully integrated, feature rich environments. You will need to call upon many of these features, and you will also need to speed-up your development time. Doing this, however, locks you into the platform as other platforms do not have the same features. So, if one day you want to migrate your application from one platform to another, you will have to rewrite large parts of your application.</span></p> <p><span style="line-height: 1.4em;">CloudFoundry and OpenShift are two aPaaS environments that are Open Source. They are supported in different IaaS environments, and even if you remain locked in with the environment, you at least have multiple suppliers. So, if you are unhappy with your supplier you have choices of alternative suppliers. If you become frustrated with the lack of features in the platform you will still have work ahead of you in order to change platforms.</span></p> <p><span style="line-height: 1.4em;">Often however, the gains in development time outplay the risks of having to change platform. My advice would be to use an Open Source platform to maintain some freedom in which IaaS supplier you use.</span></p> <p><strong style="line-height: 1.4em;">Transformation of existing applications</strong></p> <p><span>When moving to Cloud, most customers want to take existing applications with them. Either they plan to use Cloud as a quick way to provision infrastructure, or they wish to take advantage of Cloud. In both cases, they want to re-use the applications they have already developed. These apps are not Cloud native. They have not been written with Cloud in mind. In the best cases, they may have been developed using SOA principles, but mostly that won’t be the case, at least not to the full extent. Obviously, here I’m talking of applications where the user has the source code. Common off-the-Shelf applications are evolved by their initiator and the only element under the control of the user is the installation.</span></p> <p><span style="line-height: 1.4em;">The application source code may have to be transformed in order to run on a Cloud environment. Using a PaaS as described in the previous section may force you to completely rewrite the application. You will need to ask yourself: is that something you are ready to do? If the answer is no, you may need a different development environment, one that still automates the testing and deployment of your application, but allows the application to call upon the middleware and database functionality it uses.</span></p> <p><span style="line-height: 1.4em;">You still want the automation though, for two reasons. You no longer control the versions of the operating system, middleware components and databases that are supported by the cloud service provider, so you will need to upgrade to newer versions when support changes. There is a second reason though, which is more business oriented: your business colleagues require changes to the logic more often. DevOps environments allow you to operate at a much faster pace.</span></p> <p><span style="line-height: 1.4em;">What you are looking for is an environment in which you can take in the application source code and documentation and evolve it over time. Automated testing facilitates the speed at which new functionality is developed, as I described it&nbsp;</span><a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/Reducing-costs-by-cloud-enabling-your-developments/ba-p/173384" target="_blank" style="line-height: 1.4em;">in my last blog entry</a><span style="line-height: 1.4em;">. This is what we call continuous integration. The automation of the provisioning of infrastructure and the installation of the application and its associated components is called continuous delivery. Combining both in one platform delivers a PaaS environment for existing applications.</span></p> <p><span style="line-height: 1.4em;">We have started using such platforms for some of our application transformation projects. We call it the transformation platform. It consists of a series of creation services delivering development environments and using tools such as Git, GitHub, Jenkins and others, and a series of runtime services, allowing applications to access specific middleware and database components in a standard way.</span></p> <p>Such platforms should be based (as much as possible) on Open Source components, so lock-in is avoided.</p> <p><strong style="line-height: 1.4em;">Between PaaS and PaaS, you have a choice</strong></p> <p><span>The cloud native PaaS, sometimes referred to as aPaaS may provide you with the best tools to exploit all the features of cloud when you develop a new application. An open and expandable PaaS such as the transformation platform, may automate less cloud features slowing down your developments somewhat, but allows you to re-use application logic developed in a pre-cloud era.</span></p> <p><span style="line-height: 1.4em;">Do you need to make a choice? We believe not, both can co-exist. But they should be accessible through a common environment and managed through a common project and portfolio management environment. This is where we believe the Platform as a Service world should go.</span></p> <p><strong style="line-height: 1.4em;"><em>HP released HP Helion Development Platform, based on CloudFoundry last week. If you are interested in reading more about it,&nbsp;<a href="http://www8.hp.com/us/en/cloud/helion-devplatform-overview.html" target="_blank">click here</a></em></strong><strong style="line-height: 1.4em;"><em>.</em></strong></p> https://www.enterprisecioforum.com/en/blogs/christian/clearing-confusion-between-iaas-and-paas#comments Technology Applications Cloud Blog-post Applications CIO Cloud IaaS IT PaaS Wed, 12 Nov 2014 20:54:38 +0000 Christian 11026 at https://www.enterprisecioforum.com CIOops! The Biggest C-Suite Cloud Mistakes https://www.enterprisecioforum.com/en/blogs/deisner/cioops-biggest-c-suite-cloud-mistakes <p>According to a recent <a href="http://www.zdnet.com/cloud-computing-cios-are-taking-back-control-but-it-is-already-too-late-7000035159/" rel="nofollow">ZDNet</a> article, CIOs and IT departments are re-establishing control over technology and cloud spending in the enterprise. Once focused on the deployment of traditional hardware and software services over cloud adoption, CIOs have come to realize the transformative power of distributed computing — and the results are clear. Eighty percent of cloud spend now is now under the purview of IT departments, with 62 percent involving CIOs directly. But increased control and specialized knowledge doesn't make CIOs infallible: Here are five of the top mistakes these C-suite executives make when tackling a cloud transition.</p><h2><em>No Allies</em></h2><p>Rome wasn't built in a day, and it took more than one dedicated laborer to complete the task. The same goes for cloud computing — no matter how passionate a CIO or their IT staff, clouds don't happen in isolation. <a href="http://www.forbes.com/sites/oracle/2014/09/17/the-cloud-the-transformation-and-the-cio/" rel="nofollow">Forbes</a> notes that when it comes to securing cloud success, CIOs need the support of at least one other C-suite member and would also do well to involve other business departments. Out of 750 business executives surveyed, for example, 78 percent said departments such as HR, finance and research/planning were involved in the cloud decision-making process. The takeaway here? Going at it alone leads to frustration and a cloud that's doomed to failure. Collaboration is key.</p><h2><em>The Wrong Supporters</em></h2><p>As pointed out by <a href="http://www.infoworld.com/article/2610425/cloud-computing/3-cio-no-no-s-when-moving-to-the-cloud.html" rel="nofollow">Information Week</a>, however, the wrong supporters can be just as detrimental as none at all. There are a few of these “cloud haters” in every organization; some are front-line employees, some are tech professionals and some are members of the C-suite. They're easy to recognize because they have nothing but disdain for the cloud — employees believe it will make their jobs more complicated, IT pros worry about being replaced and CFOs may question cost savings. While it's temping to include these people in the cloud discussion to allay their fears, this is actually counterproductive and can delay adoption. Instead, bring in critical thinkers who ask hard questions but are open to alternative IT methods.</p><h2><em>Ignoring the Shadows</em></h2><p>When it comes to cloud adoption, many CIOs trying to “wait it out” may find their hand forced by Shadow IT. According to the <a href="http://blogs.wsj.com/cio/2014/10/28/cios-broker-cloud-services-thanks-to-shadow-it/" rel="nofollow">Wall Street Journal</a>, the use of unsanctioned cloud services by employees often compels CIOs to begin the cloud discussion; since front-line users will always find a way to access the cloud, it's better to accommodate this need and gain some measure of oversight than be left out in the cold. The quickest way to limit the proliferation of shadow IT and make progress in the cloud is to ask users what they want and then design an adoption strategy, rather than forcing them to adapt.</p><h2><em>The Snail's Pace</em></h2><p>Forbes also makes the case for CIO-led IT departments that are “highly responsive.” Those that ranked well in this survey category enjoyed a significant transformation of traditional processes such as customer engagement and employee workflow when leveraging the cloud.</p><p>The big CIO mistake here? Promising cloud adoption but then working at a snail's pace. This kind of slowdown prompts the creation of shadow IT and makes a highly responsive environment difficult to achieve, since workflows aren't uniform or visible. Once a course is set for cloud adoption, create a reasonable timeline and update it as required.</p><h2><em>All-or-Nothing</em></h2><p>Some things don't belong in the cloud. A newly minted flagship mobile application that's brimming with in-house code? Keep it close to the chest. Massive data sets that need timely analysis and evaluation? Go cloud. Unfortunately, many CIOs get trapped by the idea of “all-or-nothing”; that cloud ROI can only be achieved if every process makes the jump. This train of thought almost inevitably results in “nothing,” since the work involved in moving some legacy apps or protecting critical data can quickly outweigh the benefits. Instead, move what makes sense when it makes sense — the cloud is not a fixed or limited-time resource.</p><p>CIOs can make big mistakes when it comes to cloud, but mistakes are easily avoided when armed with knowledge. Go in with good allies, avoid poor supporters, embrace the shadows and move at a steady pace with the right data.</p><p><strong><em>Author Bio:</em></strong></p><p><em>David Eisner is the CEO and President of <a href="http://www.dataprise.com" rel="nofollow">Dataprise</a>. Dataprise is the premier provider of IT Services, such as cloud computing and business consulting services to businesses throughout a variety of industries.</em></p> https://www.enterprisecioforum.com/en/blogs/deisner/cioops-biggest-c-suite-cloud-mistakes#comments Business Issues CIO Leadership Technology Big Data Cloud IT Performance Blog-post CIO Cloud cloud computing Cloud Mistakes Wed, 12 Nov 2014 20:54:23 +0000 deisner 11021 at https://www.enterprisecioforum.com Converged infrastructure selected readings https://www.enterprisecioforum.com/en/blogs/jdodge/converged-infrastructure-selected-readin <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> An under-the-radar IT topic comes into the full light of day. </div> </div> </div> <p>Converged Infrastructure (CI) has generated as much curiousity among CIOs as any IT topic. How do I know? When we did <a href="http://www.enterprisecioforum.com/en/article/converged-infrastructure-dummies-20" rel="nofollow">a post about Converged Infrastructure for Dummies 2.0</a>&nbsp;a few months ago, several CIOs trying to get it were irate when there was a registration glitch to activate the download. I mean downright angry!</p><p>Ok, that's not terribly scientific, but their indignation provides a clue to the deep interest in CI. It also suggests CI is just starting to hit CIO radar screens. So here's a dozen links to great CI content and perspective. Let's start at the beginning. &nbsp; &nbsp;&nbsp;</p><p>1)&nbsp;<a href="http://en.wikipedia.org/wiki/Converged_infrastructure" rel="nofollow">What is converged infrastructure?</a></p><p>Old reliable - Wikipedia</p><p>2)&nbsp;<a href="http://h20195.www2.hp.com/v2/GetDocument.aspx?cc=us&amp;doclang=EN_US&amp;docname=4AA5-0433ENW&amp;doctype=analyst%20report&amp;lc=en&amp;searchquery=&amp;jumpid=reg_r1002_usen_c-001_title_r0001" rel="nofollow">Converged Infrastructure for Dummies 2.0</a></p><p>-- What everyone wants! A simple and easy guide to the benefits of CI.</p><p>3)&nbsp;<a href="http://www.cio.com/article/2387483/high-performance-computing/is-converged-infrastructure-the-future-of-the-data-center-.html" rel="nofollow">Is converged infrastructure the future of the data center?</a></p><p>-- This CIO.com article explains why it is. &nbsp;</p><p>4)&nbsp;<a href="http://h30507.www3.hp.com/t5/Converged-Infrastructure/Archiving-the-financial-services-world-with-a-converged/ba-p/175052#.VGONu_nF-dw" rel="nofollow">Archiving the financial services world with a converged infrastructure</a></p><p>-- A CI case study</p><p>5)&nbsp;<a href="http://www.enterprisecioforum.com/en/blogs/duncan-campbell/12-questions-gartner-says-ask-about-conv" rel="nofollow">The 12 questions to ask about converged infrastructure</a></p><p>-- What are you waiting for? Start asking them.</p><p>6)&nbsp;<a href="http://www8.hp.com/us/en/business-services/it-services.html?compURI=1077187&amp;jumpid=reg_r1002_usen_c-001_title_r0003#.VGOOV_nF-dw" rel="nofollow">Breaking IT and data center silos</a></p><p>-- Stop playing `Whack-a-Mole' and converge your data centers.</p><p>7)&nbsp;<a href="http://www.enterprisecioforum.com/en/blogs/billkosik/scalability-and-data-centers" rel="nofollow">Scalability and the data center</a></p><p>-- Why scaling the data center and CI go hand in glove.&nbsp;</p><p>8)&nbsp;<a href="http://youtu.be/_ySVdtanJcA" rel="nofollow">Converged Infrastructure: what it does and why you need it</a></p><p>-- Video! CI explained.</p><p>9)&nbsp;<a href="http://www.information-age.com/technology/data-centre-and-it-infrastructure/123458399/3-myths-converged-infrastructure" rel="nofollow">The three myths of converged infrastructure</a></p><p>-- The relationship between CI, innovation and legacy apps.</p><p>10)&nbsp;<a href="http://www8.hp.com/hpnext/posts/20th-century-fox-journey-converged-cloud?jumpid=reg_r1002_usen_c-001_title_r0013#.VGOOwfnF-dw" rel="nofollow">20th Century Fox and the journey to converged cloud</a></p><p>-- A CI case study</p><p>11)&nbsp;<a href="http://www.enterprisecioforum.com/en/blogs/duncan-campbell/rethinking-business-it%E2%80%9410-reasons-you-ne" rel="nofollow">Rethinking the business of IT - why you need to move to converged infrastructure now</a></p><p>-- Why IT and data center need to evolve.</p><p>12)&nbsp;<a href="http://www.crn.com/news/data-center/240155540/converged-infrastructure-bets-are-in-where-are-they-paying-off.htm" rel="nofollow">Converged infrastructure bets are in: Where are they paying off?</a></p><p>-- The solution provider view.</p><p>&nbsp;</p><p>Share the CI articles and posts you like best.&nbsp;</p><p>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a> and <a href="http://www,twitter.com/thedodgeretort" rel="nofollow">@thedodgeretort</a></p><p>&nbsp;</p> https://www.enterprisecioforum.com/en/blogs/jdodge/converged-infrastructure-selected-readin#comments Technology Converged Infrastructure Blog-post CI CIO Converged Infrastructure Data center IT Wed, 12 Nov 2014 16:51:35 +0000 jdodge 11016 at https://www.enterprisecioforum.com Top Cloud Computing Blogs 2014 Edition https://www.enterprisecioforum.com/en/blogs/ksenie/top-cloud-computing-blogs-2014-edition <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> We&#039;ve updated our top cloud blogger list. Take a look! </div> </div> </div> <p>In 2012, IDG’s Colin Browning wrote an <a href="http://www.enterprisecioforum.com/en/article/top-10-cloud-computing-bloggers" rel="nofollow">Enterprise CIO Forum article</a> listing the top cloud computing blogs for CIOs. But cloud computing, like all enterprise technology, has changed in two years. And we’ve updated our list to focus on the latest in cloud computing.</p><p>Some may look familiar, and others new.</p><p>Take a look at our 2014 review of some of the top cloud computing blogs! And be sure to list your favorite cloud blogs in the comments below.</p><p>Hint: The author’s names are links to their Twitter accounts! Be sure to follow them too!</p><p><a href="http://www.cloudave.com/" rel="nofollow">Cloud Ave</a><br /> <a href="https://twitter.com/i/discover" rel="nofollow">Cloud Ave<br /></a>Approximately fifteen cloud experts contribute to this blog, including <a href="https://twitter.com/IAmOnDemand" rel="nofollow">Ofir Nachmani</a>, <a href="https://twitter.com/chaoticflow" rel="nofollow">Joel York</a> and <a href="https://twitter.com/randybias" rel="nofollow">Randy Bias</a>. Look no further for multiple views on all things cloud.</p><p><a href="http://www.infoworld.com/blog/cloud-computing" rel="nofollow">Cloud Computing</a><br /> <a href="https://twitter.com/DavidLinthicum" rel="nofollow">David Linthicum<br /></a><a href="http://www.infoworld.com/blog/cloud-computing" rel="nofollow">InfoWorld</a>’s resident cloud expert David Linthicum is a top resource for all cloud focused information.</p><p><a href="http://h30507.www3.hp.com/t5/Cloud-Source-Blog/bg-p/cloud-source#.VGOHwvnF-tM" rel="nofollow">Cloud Source</a><br /> <a href="https://twitter.com/christianve" rel="nofollow">Christian Verstraete<br /></a>HP’s Chief Technology Officer for Cloud Strategy Christian Verstraete has the answers to all the latest cloud challenges.</p><p><a href="http://cloudtweaks.com/" rel="nofollow">CloudTweaks</a><br /> <a href="https://twitter.com/cloudtweaks" rel="nofollow">CloudTweaks<br /></a>CloudTweaks is more than a resource, it’s a community. CloudTweaks also publishes a weekly cloud comic that will make you LOL.</p><p><a href="http://www.diversity.net.nz/" rel="nofollow">Diversity Limited</a><br /> <a href="https://twitter.com/benkepes" rel="nofollow">Ben Kepes<br /></a>Ben Kepes writes daily for his own blog covering technology, mobility enabled by the cloud. He also is a <a href="http://www.forbes.com/sites/benkepes/" rel="nofollow">Forbes columnist</a>.</p><p><a href="http://avoa.com/" rel="nofollow">Leading The IT Evolution</a><br /> <a href="https://twitter.com/tcrawford" rel="nofollow">Tim Crawford<br /></a>Tim Crawford covers technology innovation, cloud computing and the Internet of Things (IoT) in this must-read blog.</p><p><a href="http://gestaltit.com/" rel="nofollow">GestaltIT</a><br /> <a href="https://twitter.com/GestaltIT" rel="nofollow">Stephen Foskett<br /></a>One stop reading for virtualization, networking, storage and desktop engineering.</p><p><a href="https://www.rickscloud.com/" rel="nofollow">Rickscloud</a><br /> <a href="https://twitter.com/rickblaisdell" rel="nofollow">Rick Blaisdell<br /></a>Rick Blaisdell’s blog talks about cloud computing integration, virtualization and the latest and greatest news on cloud computing services. It also features guest posts!</p><p><a href="http://cloudpundit.com/" rel="nofollow">CloudPundit</a><br /> <a href="mailto:@cloudpundit" rel="nofollow">Lydia Leong<br /></a>Lydia Leong, analyst at <a href="http://www.gartner.com/technology/home.jsp" rel="nofollow">Gartner</a>, covers cloud computing and a variety of related technology topics.</p><p><a href="http://cloudcomputing.blogspot.com/" rel="nofollow">CloudComputing</a><br /> <a href="https://twitter.com/chirag_mehta" rel="nofollow">Chirag Mehta<br /></a>Vice President of Product Management and Business Development at <a href="http://www.sap.com/index.html" rel="nofollow">SAP</a> talks enterprise software with a focus on big data and cloud computing.</p><p>There are more… we know. But we’d like to hear your thoughts on other cloud computing blogs. Which do you regularly read? Or do you have your own cloud computing blog we should take a look at? Let us know!</p> https://www.enterprisecioforum.com/en/blogs/ksenie/top-cloud-computing-blogs-2014-edition#comments Technology Cloud Blog-post Wed, 12 Nov 2014 16:37:08 +0000 ksenie 11011 at https://www.enterprisecioforum.com