Enterprise CIO Forum - Thriving in a technology-enabled world http://www.enterprisecioforum.com/en/ContentVault en Wearables fashion v. function: depends on who's buying. http://www.enterprisecioforum.com/en/blogs/jdodge/wearables-fashion-v-function-depends-who <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> #CIOchat reveals substantial interest from CIO in wearables. </div> </div> </div> <p>Our Twitter #CIOchat this week tackled wearable devices: fashion versus function? The consensus was it depends on the market, but that fashion is very important in most cases.&nbsp;</p> <p><span style="line-height: 1.4em;">We also explored IT and security implications of smart watches and more broadly, wearable devices. But first the numbers: 28 participants (a half dozen CIOs) cranked out 282 Tweets in our hour long #CIOchat.</span></p> <p><span style="line-height: 1.4em;">Check out #CIOchat yesterday (2-3 p.m. ET every Thursday) to find out what CIOs think about wearables. There's a lot of interest, but at this juncture, it appears more personal than how wearable apply to the work environment although several see a role for devices like Google Glass. We generally agreed that wearables expands and accelerates the consumerization of IT.</span></p> <p><span style="line-height: 1.4em;">Our four #CIOchat questions were wearables' fashion versus function; IT implications of wearables; business implications of wearables; and when will the wearable market take off akin to what the iPhone did for smart phones, iPad for tablets. &nbsp;</span></p> <p><span style="line-height: 1.4em;">Here's a couple of noteworthy Tweets f</span><span style="line-height: 1.4em;">rom healthcare CIO David Chou (@dchou1107):&nbsp;</span></p> <blockquote> <p><span style="line-height: 1.4em;">"Wearables will be huge for getting healthcare daily stat. Allowing people to make smarter choices for a healthier lifestyle&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span style="line-height: 1.4em;">"</span></p> <p><span style="line-height: 1.4em;">"<span>We must start adopting consumer products into the enterprise. New school of IT in MyPOV&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash">#ciochat</a>"</span></p> </blockquote> <p><span style="line-height: 1.4em;">We had some great long conversations. Here's two of them.</span></p> <div class="_message message isRetweet _isRetweet "><strong>Conversation one: Fashion and function are BOTH important.</strong></div> <div class="_message message isRetweet _isRetweet "> <div class="_previousTweets previousMessages"> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">: I don't agree it's fashion 1st. Tech that looks nice but isn't reliable isn't worthwhile. BOTH are important.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:20pm, Sep 18 from Twitter Web Client</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">&nbsp;I got a sharp Victorianox watch for my birthday. Love it, but it only tells time and date! Also want a smart watch.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:23pm, Sep 18 from Hootsuite</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;I have an Android watch but it's bigger than my high school casio calculator watch. I stopped wearing it</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:26pm, Sep 18 from Twitter Web Client</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanAtHP" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">NadhanAtHP</a><span style="line-height: 1.4em;">: .&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">Sounds like fashion is more important to you than function?&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:28pm, Sep 18 from TweetChat powered by oneQube</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">: .</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_userInfoPopup" style="line-height: 1.4em;">NadhanAtHP</a><span style="line-height: 1.4em;">&nbsp;No; it's a balance. My Glass is not that fashionable but it's value is greater than the uncomfortable watch.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:33pm, Sep 18 from Twitter Web Client</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">&nbsp;I would start w watch before Glass.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span style="line-height: 1.4em;">&nbsp;Don't need that ugly and distracting thing on my face.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:35pm, Sep 18 from Hootsuite</span></div> <div class="_comment comment originalComment"><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="KeithBarrett" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">KeithBarrett</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;It's not distracting. A watch or phone is more distracting. I don't think it's ugly either, but that's subjective.</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:38pm, Sep 18 from Twitter Web Client</span></div> <div class="_comment comment originalComment"><strong><span class="date" style="line-height: 1.4em;">Conversation two: What is the killer app?</span></strong></div> <div class="_comment comment originalComment"> <p class="_baseTweetText _tweetText messageContent"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F63817855%2Fisaac_profile_pic_normal.jpg" alt="nyike" style="line-height: 1.4em;" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="nyike" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">nyike</a><span style="line-height: 1.4em;">: Too many devices. Phone, tablet, laptop - that I hope to phase out one day. No room for</span><a href="https://hootsuite.com/dashboard#" title="wearable" class="_quickSearchPopup hash" style="line-height: 1.4em;">#wearable</a><span style="line-height: 1.4em;">&nbsp;until it has very high value&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:16pm, Sep 18 from Twitterrific</span></p> <div class="_previousTweets previousMessages"> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" class="networkAvatar" /> <p class="commentContent"><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_username networkName _userInfoPopup">mskaff</a>:&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup">nyike</a>&nbsp;Not enough value? What would be the "killer" feature for you?&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash">#CIOChat</a>&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIO" class="_quickSearchPopup hash">#CIO</a><span class="date">2:18pm, Sep 18 from Twitter Web Client</span></p> </div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F63817855%2Fisaac_profile_pic_normal.jpg" alt="nyike" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="nyike" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">nyike</a><span style="line-height: 1.4em;">: .</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup" style="line-height: 1.4em;">mskaff</a><span style="line-height: 1.4em;">&nbsp;really smart health monitoring is the killer app, but the sensors, tools, and alerts need time to mature&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:19pm, Sep 18 from Twitterrific</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanAtHP" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">NadhanAtHP</a><span style="line-height: 1.4em;">: .&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup" style="line-height: 1.4em;">nyike</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup" style="line-height: 1.4em;">mskaff</a><span style="line-height: 1.4em;">&nbsp;Continuous Monitoring applies to individuals and the enterprise&nbsp;</span><a href="http://t.co/b6yJzQU7ux" target="_blank" class="url" style="line-height: 1.4em;">http://t.co/b6yJzQU7ux</a><span style="line-height: 1.4em;">&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:22pm, Sep 18 from TweetChat powered by oneQube</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">mskaff</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_userInfoPopup" style="line-height: 1.4em;">NadhanAtHP</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup" style="line-height: 1.4em;">nyike</a><span style="line-height: 1.4em;">&nbsp;Amazing innovation. Also makes me wonder how</span><a href="https://hootsuite.com/dashboard#" title="wearables" class="_quickSearchPopup hash" style="line-height: 1.4em;">#wearables</a><span style="line-height: 1.4em;">&nbsp;will impact&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="enterprise" class="_quickSearchPopup hash" style="line-height: 1.4em;">#enterprise</a><span style="line-height: 1.4em;">&nbsp;culture. And</span><a href="https://hootsuite.com/dashboard#" title="HR" class="_quickSearchPopup hash" style="line-height: 1.4em;">#HR</a><span style="line-height: 1.4em;">&nbsp;impact?&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:24pm, Sep 18 from Twitter Web Client</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F63817855%2Fisaac_profile_pic_normal.jpg" alt="nyike" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="nyike" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">nyike</a><span style="line-height: 1.4em;">: .</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mskaff" class="_userInfoPopup" style="line-height: 1.4em;">mskaff</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_userInfoPopup" style="line-height: 1.4em;">NadhanAtHP</a><span style="line-height: 1.4em;">&nbsp;I don't like</span><a href="https://hootsuite.com/dashboard#" title="wearable" class="_quickSearchPopup hash" style="line-height: 1.4em;">#wearable</a><span style="line-height: 1.4em;">&nbsp;data collection in the&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="enterprise" class="_quickSearchPopup hash" style="line-height: 1.4em;">#enterprise</a><span style="line-height: 1.4em;">unless it's used for employee safety or benefit</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:26pm, Sep 18 from Twitterrific</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup" style="line-height: 1.4em;">nyike</a><span style="line-height: 1.4em;">&nbsp;Should personal wearables be kept out of the work environment?</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:28pm, Sep 18 from Hootsuite</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">: .</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup" style="line-height: 1.4em;">nyike</a><span style="line-height: 1.4em;">&nbsp;May be overcome by events, BYOW another 4-letter !!</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:30pm, Sep 18 from Twitter Web Client</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="katweasle" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F2544916053%2Fimage_normal.jpg" alt="katweasle" class="networkAvatar" /> <p class="commentContent"><a href="https://hootsuite.com/dashboard#" title="katweasle" class="_username networkName _userInfoPopup">katweasle</a>:&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup">mamezz</a>&nbsp;<span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup">Thedodgeretort</a><span class="at">@</span><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup">nyike</a>&nbsp;How would companies even know? They'd have to strip search every employee to find wearable&nbsp;<a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash">#CIOChat</a><span class="date">2:31pm, Sep 18 from Twitter for iPad</span></p> </div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">: .</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="katweasle" class="_userInfoPopup" style="line-height: 1.4em;">katweasle</a><span style="line-height: 1.4em;">&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="nyike" class="_userInfoPopup" style="line-height: 1.4em;">nyike</a><span style="line-height: 1.4em;">&nbsp;Security takes policy, process, people and Tech&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span class="date" style="line-height: 1.4em;">2:32pm, Sep 18 from Twitter Web Client</span></div> <div class="_comment comment"><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanAtHP" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">NadhanAtHP</a><span style="line-height: 1.4em;">: .&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">&nbsp;Even when it comes to&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="wearables" class="_quickSearchPopup hash" style="line-height: 1.4em;">#wearables</a><span style="line-height: 1.4em;">, isn't it all about protecting the apps?&nbsp;</span><a href="http://t.co/Kw8ytJTLIO" target="_blank" class="url" style="line-height: 1.4em;">http://t.co/Kw8ytJTLIO</a><span style="line-height: 1.4em;">&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:35pm, Sep 18 from TweetChat powered by oneQube</span></div> <div class="_comment comment originalComment"><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_userInfoPopup _dragUser networkAvatarLink"></a><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F494595017248235520%2FKwkoRXhN_normal.jpeg" alt="mamezz" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="mamezz" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">mamezz</a><span style="line-height: 1.4em;">: .</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="NadhanAtHP" class="_userInfoPopup" style="line-height: 1.4em;">NadhanAtHP</a><span style="line-height: 1.4em;">&nbsp;concentrating on protecting the data, consider the apps and form factor&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a></div> <div class="_comment comment originalComment">Follow <a href="http://www.twitter.com/ecioforum">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort">@thedodgeretort</a> on Twitter.</div> </div> <p class="_baseTweetText _tweetText messageContent">&nbsp;</p> </div> </div> </div> http://www.enterprisecioforum.com/en/blogs/jdodge/wearables-fashion-v-function-depends-who#comments Technology Applications Mobility Security Blog-post CIO IT Smart Phones Smart Watch tablets wearable Fri, 19 Sep 2014 15:35:13 +0000 jdodge 9966 at http://www.enterprisecioforum.com Is the Internet Getting Safer? Why There's Reason for Concern and Optimism http://www.enterprisecioforum.com/en/blogs/ricknotsodelgadogmailcom/internet-getting-safer-why-theres-reason <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Is the Internet Getting Safer? </div> </div> </div> <p dir="ltr">It almost goes without saying that there is a lot of concern when it comes to <a href="http://techpageone.dell.com/technology/security-it/computer-security-threats-a-brief-history/" rel="nofollow">internet security </a>these days. We’re heading online more and more often while also putting more sensitive information about ourselves on the internet. It’s increasingly common for businesses to interact with customers online, and considering the headlines revolving around security breaches and privacy leaks, many of the security worries seem justified. As more of our daily activities hit the web, it’s natural to ask, “Is the internet actually getting safer or are we more at risk than ever before?” A look at the statistics shows it’s not an easy questions to answer but one worth investigating.</p><p><br /></p><p dir="ltr">As should probably be expected, there are improvements that indicate having a more secure internet. Many of the annoyances web users have had to deal with over the years are in decline. Spam emails, for example, were once a major headache affecting everyone from casual internet surfers to major businesses, but the number of spam emails has been steadily decreasing for a number of years now. Companies that provide email services have generally gotten better at developing software tailored to spotting and eliminating spam before it hits your inbox. As software and current hardware have matured, there are also <a href="http://www.computerweekly.com/news/2240147273/Improved-internet-security-forces-criminals-to-change-tactics-says-IBM" rel="nofollow">fewer security vulnerabilities</a> for hackers to exploit. This is largely due to new patches that are programmed with security risks in mind.</p><p><br /></p><p dir="ltr">Having said that, there is still plenty of reason to be concerned the internet is not getting any safer. The latest research from <a href="http://www.symantec.com/security_response/publications/threatreport.jsp" rel="nofollow">Symantec’s Internet Security Threat Report</a> shows that the number of web-based attacks has increased by 23%. Targeted attack campaigns and the number of breaches also reached record numbers in 2013, and equally troubling was the finding that roughly one out of every eight legitimate websites had some critical vulnerability putting the site at risk. While much progress has been made in trying to patch up these vulnerabilities, enough of them still exist to make putting any critical information on the web an added risk.</p><p><br /></p><p dir="ltr">A main reason for concern over internet security is how quickly these security threats can change. While it’s true that computers have gotten more secure when accessing the web, that only means cyber criminals have turned their attention to emerging technologies in the search for more loopholes to exploit. One of the biggest increases in internet security threats comes from new developments in <a href="http://www.mcafee.com/us/security-awareness/articles/the-top-internet-security-threats-for-2014.aspx" rel="nofollow">mobile malware</a>. The number of mobile devices--smartphones and tablets in particular--has exploded recently, and with that increase in popularity has come an emphasis from attackers in creating malware through websites and apps intended to compromise the devices and steal information. Cyber criminals are also taking aim at the cloud as more companies entrust sensitive data to cloud vendors. Another target is the rise in <a href="http://www.esecurityplanet.com/network-security/7-security-trends-to-expect-in-2014.html" rel="nofollow">virtual currency like Bitcoin</a>, where attackers are developing new malware to infiltrate accounts and break down network security.</p><p><br /></p><p dir="ltr">Part of the <a href="http://www.dell.com/learn/uk/en/ukbsdt1/security" rel="nofollow">problem with network security</a> is the very nature of the practice. Network security seems to follow a similar cycle where threats are created, companies respond to those threats with security solutions, and cyber criminals react by changing up their tactics and the types of threats they create. In other words, security is largely a reactive practice, one which signifies being one step behind the latest threats. If the internet is to get any safer, the reactive approach needs to be replaced by a more anticipatory strategy, but the large variety of risks combined with the massive amount of new threats makes this challenging.</p><p><br /></p><p dir="ltr">There is, however, hope for a new strategy, and it comes in the <a href="http://www.usatoday.com/story/cybertruth/2013/11/07/how-big-data-can-make-the-internet-safer/3467641/" rel="nofollow">form of big data</a>. Improvement in internet security can be made as big data is leveraged to combat security threats. By capturing data on current and developing threats, big data experts can create programs designed to predict what future threats will emerge. With the infrastructure in place to collect large amounts of data, automated security models can be created that can prevent threats from corrupting current systems. Since threats change so quickly, big data needs to be used to adapt these security practices on the fly. If lead by a big data security team, this can be made possible, but it will take time to implement on a worldwide basis.</p><p><br /></p><p dir="ltr">So is the internet getting safer? The answer is an unsatisfactory yes and no. While certain vulnerabilities have been tackled, attackers are finding new ways to exploit old and new technologies. Only by adopting new strategies, like using big data, can experts truly address the security threats out there. It will take time, but the day may come when surfing the internet will be considered a truly safe activity.</p><div><br /></div> http://www.enterprisecioforum.com/en/blogs/ricknotsodelgadogmailcom/internet-getting-safer-why-theres-reason#comments Technology Cloud Blog-post network security Fri, 19 Sep 2014 14:37:58 +0000 ricknotsodelgado@gmail.com 9956 at http://www.enterprisecioforum.com Why Most Global Businesses Won’t Realize the Promise of Enterprise Comms http://www.enterprisecioforum.com/en/blogs/jcvodafone/why-most-global-businesses-won%E2%80%99t-realize <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> By John Curtis, VP of Business Transformation, Vodafone Global Enterprise </div> </div> </div> <p>Many CIOs today can’t keep pace with the communications needs of the enterprise. The volume of information and devices that need to be managed is growing and the costs can be unpredictable. The roster of vendors servicing the wired, wireless and cloud needs of an organization is creating a patchwork solution with many seams. At the same time, employees well beyond the IT department now have a say, and sometimes the buying power, in the technology needed to support their roles.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; </p><p>The challenge multiplies when the business is international or global. Every time a new office is opened or an additional market foothold is gained, the CIO is in need of expanding their relationship with existing suppliers or sourcing new ones. Contracts and fees are negotiated to support the local communications needs, with the hope that the solution integrates with the rest of the world.</p><p>The patchwork of providers makes it tough for CIOs to gain a holistic view of their communications infrastructure. It can be difficult for them to have a deep insight into critical resources, such as network and application performance, making it challenging for CFOs to monitor usage and expenditure to see precisely where savings can be made.</p><p>Unpredictable operational costs aren’t the only downside. Having a web of communications service providers makes it difficult to break down the barriers between different devices and communications methods. The result can be time, money and resource wasted on managing an unnecessarily complex infrastructure.</p><p>When these are united into a single, intelligent and completely configurable service, businesses can benefit from increased productivity and overall business process streamlining. When communications platforms aren’t united it can negatively impact the end user experience, turning what could be an intuitive and contextual experience into something altogether more disjointed.</p><p>As multinational companies continue on their journey to realize the promise of total enterprise communications, the first thing to consider is to consolidate the number of providers in play. In a perfect world, one single global service provider could serve fixed line, fixed data, mobile voice, mobile data and broadband, as well as cloud and managed services - across offices and markets. It would result in one bill, one single global contract that serves as a master services agreement and one global point of contact. &nbsp; &nbsp; &nbsp; &nbsp;</p><p>CIOs should also look to employ a global Service Level Agreement (SLA) to support a consistent level of service on a worldwide basis. A global SLA covers things like performance reporting, service improvement plans and the time it takes to dispatch devices and SIMs, repair handsets or respond to incidents.</p><p>This not only takes away the pain of expensive, patchwork communications, but means that CIO becomes less of a project manager and more of a strategist and consultant to the business.</p><p><strong>Is IT losing control?</strong></p><p>Expanding into new markets is certainly adding to the fragmentation of enterprise communications, but changes closer to home are making things just as complex. Emerging technologies like cloud services and the dependence on applications across departments such as marketing and human resources has meant that a growing number of people now have a say in procurement decisions. In some cases, IT is not even involved in the purchase.&nbsp;</p><p>This is creating a bigger patchwork of providers, less centralized visibility over the communications environment and more potential vulnerability for the business.</p><p>Confounding the situation is the need to cope with the demands of four generations of people in the workplace. While the Baby Boomers and Generation X are generally more accommodating to the commands of the IT department, Generation Y and the Millennials are more fearless technology users and, consequently, less inclined to comply with tight corporate control over how they work, where they work and the devices they work on.</p><p>These are generations that want to use social media and cloud-based applications to communicate, collaborate and share. They expect to be able to bring personal consumer devices into the workplace. And with limited responsibility they are less concerned over the security implications of this for the business.</p><p>While many businesses support user-owned devices and have adopted a Bring Your Own Device (BYOD) strategy – it is still important to realize the profound impact it has on the culture and economics of business communications.</p><p>BYOD spells good news for many organizations as it supports their employees’ desire to work more flexibly, resulting in increased productivity. The fact that employees use their own device also means there are important cost savings too. However, there are also numerous challenges and distinct threats.</p><p>As a result, companies employing a BYOD strategy need to gain control through a device management program, which allows security to be remotely managed regardless of whether the device is personal or corporate-owned. It means companies control who has access to what data or service and can be alerted to security breaches in real time and ensure private information on devices can be locked down or wiped remotely where necessary.</p><p>To many CIOs, enterprise communications has become a complex web of services, devices and applications and a balancing act between the needs of the business and the needs of the people who work within it.</p><p><strong>A roadmap to consolidation</strong></p><p>Businesses can untangle this web and reconcile these competing demands by consolidating their connectivity and communications services.&nbsp;</p><p>Put into practice, this means that if a business wants to keep expanding into new markets, but needs to keep the cost of its network and ICT spend down, it can establish one single Wide Area Network across all of the countries it operates in.</p><p>By doing this the business can simplify the management of its network, which provides greater visibility of cost. It also enables the business to establish a standardized operating model to support faster, more efficient deployment of critical business applications.</p><p>Streamlining communications infrastructure into one strategy means a business that wants to meet demand for flexible working without impacting team collaboration, can integrate fixed and mobile communications into a single, intelligent and completely configurable service.</p><p>This ensures calls and messages can always be routed to reach employees and enables teams to use a range of collaborative tools such as instant messenger, video conferencing and enterprise social media apps on any device, through the same unified application.</p><p>And by bringing all communications together a business seeking to improve internal processes or create better customer-facing products and services can deploy technologies such as Machine-to-Machine (M2M) using one global SIM card and one single supply chain across all markets.</p><p><strong>Confidently Connected</strong></p><p>Enterprise communications needs aren’t going to get any less complicated. More bandwidth, more data, more devices, more markets, and more speed are becoming the mantra of today’s multinational business.</p><p>Tech-savvy employees will continue joining the workforce armed with connected devices, seeking better, more efficient ways of working. The uses and applications of cloud, M2M and data analytics will only become broader as costs come down and understanding of the benefits goes up.</p><p>These emerging technologies will become fundamentals of successful businesses. The goal is to move business along the continuum to global mobilization by seamlessly connecting people and things, and removing the barriers of unpredictable cost, security and integration difficulties. This shift creates huge opportunity for those that embrace the potential of fully managed total communications. Those that continue patchwork solutions may never realize the true promise.</p><p>&nbsp;</p> http://www.enterprisecioforum.com/en/blogs/jcvodafone/why-most-global-businesses-won%E2%80%99t-realize#comments Business Issues Converged Infrastructure Blog-post analytics ByoD Cloud Unified Communications Vodafone Fri, 19 Sep 2014 13:20:55 +0000 JCVodafone 9951 at http://www.enterprisecioforum.com Recipe for Successful SaaS Company http://www.enterprisecioforum.com/en/blogs/karthikeyan-v/recipe-successful-saas-company <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> SaaS has almost become the defacto standard of delivering products </div> </div> </div> <p><a title="SaaS Application" href="http://www.slideshare.net/Techcello/recipe-of-saas-part-1" target="_blank" rel="nofollow">SaaS</a> has almost become the defacto standard of delivering products. ISVs selling on-premise products have started realizing that SaaS is the key to stay in the competition. But, whether you migrate your product to SaaS or build a new one, it’s important for an ISV to understand the best practices that can help them avoid the mistakes/learnings that have already been made</p><p><strong>Key Take Aways:</strong></p><ul><li>Overview on <a title="Techcello" href="http://www.techcello.com" target="_blank" rel="nofollow">SaaS</a> Building Blocks</li><li>Non-Functional Requirements of SaaS</li><li>Operational features that can save time and cost for ISVs</li><li>Insight on Cloud AWS Cloud Services and how it can help in expediting SaaS product development</li><li>Considerations for choosing the right cloud environment</li></ul><p><br /></p><div class="field field-type-emvideo field-field-video"> <div class="field-items"> <div class="field-item odd"> http://www.youtube.com/watch?v=L1Hidm5AVbQ </div> </div> </div> http://www.enterprisecioforum.com/en/blogs/karthikeyan-v/recipe-successful-saas-company#comments Technology Cloud Blog-post Building SaaS Application New SaaS product Development SaaS Application Development Platform SaaS Applications SaaS Architecture SaaS Challenges Fri, 19 Sep 2014 09:39:44 +0000 Karthikeyan V 9946 at http://www.enterprisecioforum.com Web 3.0 (A semantic perspective) http://www.enterprisecioforum.com/en/blogs/fengqiao/web-30-semantic-perspective <div>The goal of this introduction is to explain internet trends (web 3.0) <strong>from the point of view of Feng Qiao Software</strong> and give an overview of web 3.0. Perspective is a new concept created and introduced by Feng Qiao Software to design web 3.0. Web 3.0 can be understood as adding an extended abstraction (metadata) layer to describe website in such a way so that it can be observed from different perspectives.</div><div>It won't tell you all the details, but should give you an idea of how web 3.0 and perspective work and make it possible for you to even figure out how the web 3.0 would go further. This solution paper gives a very high-level design of web 3.0.</div><p><a href="http://mywe.co/wp-content/mywe/web3.0.pdf" target="_blank" rel="nofollow"><strong>Read post as PDF</strong></a></p><p><a href="http://software-productivity.blogspot.com/2014/09/web-3.html" target="_blank" rel="nofollow">http://software-productivity.blogspot.com/2014/09/web-3.html</a></p> http://www.enterprisecioforum.com/en/blogs/fengqiao/web-30-semantic-perspective#comments Business Issues Applications Big Data Services Quick Post Big Data Web 2.0 web 3.0 Fri, 19 Sep 2014 07:57:37 +0000 feng_qiao 9941 at http://www.enterprisecioforum.com Difference between Huawei SSN1SL64(LS-64.2) with SSN4SL64(P1L1-2D2,LC) Board http://www.enterprisecioforum.com/en/blogs/joshua-koo/difference-between-huawei-ssn1sl64ls-642 <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> How to distinguish the two Huawei optix boards </div> </div> </div> <p align="left"><a href="http://www.thunder-link.com/SSN4SL64P1L12D2LC_p331.html" target="_blank" rel="nofollow">SSN4SL64(P1L1-2D2,LC)</a>, also named as SSN4SL6403, 1xSTM-64 Optical Interface Board(P1L1-2D2,LC) is a available in the following functional versions:N4, N3, N2 and N1.</p><p align="center">&nbsp;</p><p>The SSN4SL64(P1L1-2D2,LC) is a line board, which can be used on the OptiX OSN equipment series to transmit and receive STM-64 optical signals. The SSN4SL64(P1L1-2D2,LC) converts the received&nbsp;&nbsp;&nbsp; optical signals into electrical signals and sends the electrical signals to the cross-connect side. In addition, the SSN4SL64(P1L1-2D2,LC) converts the electrical signals sent from the cross-connect side into optical signals and transmits the optical signals.</p><p>&nbsp;</p><p>The slots valid for the SSN4SL64(P1L1-2D2,LC) vary with the cross-connect capacity of the subrack.&nbsp;</p><p>When the cross-connect capacity is 200 Gbit/s, the SSN4SL64(P1L1-2D2,LC) can be installed in slots</p><p>5-8 and 11-14 in Huawei OSN3500 subrack.</p><p align="left">&nbsp;</p><p>The feature code of the SSN4SL64(P1L1-2D2,LC) indicates the type of optical interface.</p><p>The feature code of SSN4SL64(P1L2-2D2) is 03, stand for the type of Optical Interface is P1L1-2D2, that why in some document like Huawei quotation, it also called SSN4SL6403. Following the same rule,&nbsp;<a href="http://www.thunder-link.com/SSN1SL64LS642LC_p304.html" target="_blank" rel="nofollow">Huawei SSN1SL64(LS-64.2)</a>&nbsp;feature code is 04, so it also named SSN1SL6404.</p><p>&nbsp;</p><p>When you looking for a Huawei elder version board (LS-64.2), actually (P1L1-2D2) is&nbsp;completely substitute for it. According to Huawei’s technical guideline, (LS-64.2) is only available on two versions, which is N1 and N2, now all discontinued. Instead, Huawei introduce SSN4SL64(P1L1-2D2) into the market. Please find the optical specification comparison between (LS-64.2) and (P1L1-2D2).</p><p>&nbsp;</p><p align="left">Application code</p><p align="left">Ls-64.2</p><p align="left">P1L1-2D2</p><p align="left">Transmission distance (km)</p><p align="left">55 to 80</p><p align="left">40 to 80</p><p align="left">Type of fiber</p><p align="left">Single-mode LC</p><p align="left">Single-mode LC</p><p align="left">Operating wavelength range (nm)</p><p align="left">1530 to 1565</p><p align="left">1530 to 1565</p><p align="left">Mean launched optical power (dBm)</p><p align="left">4 to 7</p><p align="left">0 to 4</p><p align="left">Receiver sensitivity (dBm)</p><p align="left">-21</p><p align="left">-24</p><p align="left">Minimum overload (dBm)</p><p align="left">-8</p><p align="left">-7</p><p align="left">Minimum extinction ratio (dB)</p><p align="left">8.2</p><p align="left">9</p><p align="left">Dispersion tolerance (ps/nm)</p><p align="left">1600</p><p align="left">1600</p><p align="left">Maximum -20 dB spectral width (nm)</p><p align="left">1</p><p align="left">1</p><p align="left">Minimum side mode suppression ratio (dB)</p><p align="left">30</p><p align="left">30</p><p>&nbsp;</p><p>So when you facing a transmission solution between 40~80km, with STM-64 level, may be you currently using SSN1SL64(LS-64.2) and need expansion more directions, but Huawei stopped manufacture SSN1SL64(LS-64.2), then SSN4SL64(P1L1-2D2) is also a right choice.</p><p>&nbsp;</p><p>For new equipment deployment, directly choose (P1L1-2D2) as a recommendation; But if for existing OSN3500 expansion, one thing need to confirm before this substitution, the system version that is. You may meet a problem with new inserted (P1L1-2D2) can’t be recognize by your OSN3500, don’t worry that would be cause by GSCC software version in your OSN3500. In case to avoid with this, please contact with us at&nbsp;<a href="mailto:info@thunder-link.com" rel="nofollow">info@thunder-link.com</a>, with your existing OSN3500 version, our technical team can verify the compatibility on it.</p><p>&nbsp;</p><p class="p0" align="left">Our&nbsp;Thunder-link.com, dedicated on distributing&nbsp;<a href="http://www.thunder-link.com/" target="_blank" rel="nofollow">Huawei optical transmission equipment</a>&nbsp;globally, with competitive price and fast delivery, we received well reputation from our customers for the past three years. At thunder-link.com, your interests are guaranteed, by original Huawei products, standard one year product warranty, and professional technical services. Any pre-sale or inquires, you can reach us by&nbsp;<a href="mailto:info@thunder-link.com" rel="nofollow">info@thunder-link.com</a>&nbsp;or&nbsp;<a href="mailto:sales@thunder-link.com" rel="nofollow">sales@thunder-link.com</a>.</p> http://www.enterprisecioforum.com/en/blogs/joshua-koo/difference-between-huawei-ssn1sl64ls-642#comments Technology IT Performance Blog-post Huawei optix boards SSN1SL64 SSN4SL64 Fri, 19 Sep 2014 06:52:20 +0000 Joshua Koo 9936 at http://www.enterprisecioforum.com The paradox of secured access to data that matters http://www.enterprisecioforum.com/en/blogs/enadhan/paradox-secured-access-data-matters <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Balancing the security posture for your enterprise </div> </div> </div> <p>Recently, I encrypted my device based upon a recommended precautionary procedure.&nbsp; However, I later learned that this was only meant for a select set of devices.&nbsp; Of course, my device was not<strong> </strong>one of them! I had already fired up the encryption routine losing access to all data resident on the device bit by bit.&nbsp; My device would no longer decrypt itself thereby ensuring no one could access the data that <em>was</em>.&nbsp; I found myself dealing with an interesting paradox – I had the most secure device in the enterprise with no access to the underlying data.</p><p>My data was safe and secure all right! But, without access to the fundamental unit of IT, why bother having the devices and technology around us?&nbsp; One needs to establish the optimal level of security that works best for their data based on their risk tolerance. Enterprises are no different – their risk management strategy defines the overall security posture.&nbsp; Nevertheless, the questions to be posed and the approaches taken can still be the same.&nbsp; Let us see how.</p><p><strong><em>What </em></strong><em>data needs to be protected?<strong> </strong></em>There are certain types of data that I care a lot more about than the rest.&nbsp; Generally speaking, I value My Contacts the most since I can reach out to the parties concerned for any additional information.&nbsp; Enterprises have to go through a similar analysis to determine the <a href="http://bit.ly/SK6ONY" rel="nofollow">data that matters</a> to them so that appropriate security measures can be taken to proactively guard themselves from adversaries. Adversaries R Us.</p><p><strong><em>When </em></strong><em>must this data be protected?<strong> </strong></em>Defense in depth only goes so far when it comes to Enterprise Security.&nbsp; An <a href="http://www8.hp.com/us/en/hp-news/press-release.html?id=1744676#.U_znDU10zIV" rel="nofollow">HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack</a>.&nbsp; But then, <a href="http://hp.nu/B2BgJ" rel="nofollow">is it really your Devices or your Apps?</a>&nbsp; The weakest link in Enterprise Security – Applications -- must be proactively guarded by defining the security posture best suited for your enterprise across all architectural layers.</p><p><strong><em>How </em></strong><em>must this data be protected?<strong> </strong></em>Secure your apps to protect your data.<strong>&nbsp; </strong><a href="http://www.eweek.com/security/hps-application-defender-helps-apps-defend-themselves.html" rel="nofollow">Applications by design must be geared up to defend themselves against an attack</a>.&nbsp; At the same time, security best practices must be institutionalized across all phases of the Software Development Life Cycle by going back to the basics of application security!</p><p>So, how much security is adequate security?&nbsp; To answer this question, Enterprises must factor in the cost of cybercrime bearing in mind that adversaries can employ techniques to harvest <a href="http://owl.li/wG6Iy" rel="nofollow">$60 million in 60 seconds</a>!</p><p>I had to spend the whole weekend switching over to a new device and manually resurrecting my BYOD ecosystem so that I can continue to resume functioning as a digital citizen.&nbsp; But, I must say I did enjoy those fleeting moments when I felt like I was in the remotest location on Planet Earth where there was no way anyone could reach me even if they wanted to.&nbsp; I felt secure! But, the very next moment, I was yearning for access to my <a href="http://www.enterprisecioforum.com/en/blogs/jdodge/what-little-data" rel="nofollow">Little Data</a> at my fingertips.&nbsp; What a paradox!</p><p>Team up with&nbsp;<a href="http://www.hp.com/go/easwarannadhan" target="_self" rel="nofollow">HP Technology Expert, E.G.Nadhan</a></p><p>Connect with <a href="https://twitter.com/NadhanAtHP" target="_self" rel="nofollow">Nadhan</a>&nbsp;on: <a href="https://twitter.com/NadhanAtHP" target="_self" rel="nofollow">Twitter</a>, <a href="http://www.facebook.com/easwaran.nadhan" target="_self" rel="nofollow">Facebook</a>, <a href="http://www.linkedin.com/profile/view?id=102637222&amp;trk=tab_pro" target="_self" rel="nofollow">Linkedin</a> and <a href="http://bit.ly/VDfGGn" target="_blank" rel="nofollow">Journey Blog</a>.</p> http://www.enterprisecioforum.com/en/blogs/enadhan/paradox-secured-access-data-matters#comments CIO Leadership Security Blog-post ByoD Cybercrime Data security device Enterprise security information security Security Fri, 19 Sep 2014 00:48:47 +0000 enadhan 9931 at http://www.enterprisecioforum.com Application development – when it’s time to “GO Cloud” http://www.enterprisecioforum.com/en/blogs/rickblaisdell/application-development-%E2%80%93-when-it%E2%80%99s-time <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Software experts and business analysts estimate that approximately 85% of IT budgets go to maintaining, updating and fixing business applications, and only 15% of their resources are dedicated to creating new applications that drive business value. So if you need a new mobile application built quickly to support a sales requirement, you’d better get in line and hope for the best, or better yet, “GO Cloud”! </div> </div> </div> <p>Before examining the benefits of cloud-based application development, it’s important to understand the core features needed in a strong application development and delivery platform. And by that I mean platforms that can be used to build applications ranging from internally focused web and mobile-based portals for human resources to powerful, customized business-critical apps that represent corporate systems of record.</p><p>So, regardless of whether the platform is managed on-premises or in the cloud, a full-featured application development platform should provide the following functionality:</p><ul><li><strong>Open standards –&nbsp;</strong>Developers require flexibility to develop in the languages and stacks in which the enterprise has elected to invest (e.g., Java, .NET).</li><li><strong>Integration –&nbsp;</strong>Any new, custom application is most likely going to need integration with existing systems. Some of the most commonly used adapters connect to SAP, salesforce.com and popular databases, so developers require flexibility to build integration workflows that minimize performance impact and security threats when connecting to back-end systems.</li><li><strong>Rapid iteration –&nbsp;</strong>Business users need to be able to provide quick feedback on features and functionality, so close collaboration between IT and end users is imperative to getting custom applications deployed quickly, and ensuring that they actually meet business users’ requirements.</li><li><strong>DevOps automation –&nbsp;</strong>Developers need the ability to confirm the application model’s integrity and generate and deploy the application with a single click. This is why the platform must track dependencies and isolate the impact of any change across a given application, and visual debugging should be in place to identify needed fixes.</li></ul><p><strong>To go cloud or not to go cloud?</strong></p><p>There is nothing more frustrating to a business executive than having a business opportunity that requires a custom application but not being able to get the app built quickly enough. This is why it’s time to weigh the benefits of the cloud for application development: flexible deployment models, quick time to launch, no need to deploy lots of on-premises infrastructure. Basically, cloud-based development platforms can change the game for highly constrained development organizations.</p><p>Often times, the problem with building new apps is the uncertainty over whether the promised revenue or potential benefits are real. Of course, no one can guarantee a new app will deliver the expected advantages until it is in production, but a cloud-based development approach enables organizations to quickly seize on business opportunities without putting off the overall IT agenda.</p><p>At the same time, with the cloud, development professionals no longer have to wait for the infrastructure to be in place. Instead, all of the infrastructure elements (network and server provisioning, database management and administration, security policies, disaster recovery planning and backup) are in the cloud. So the development objective will be building a great app quickly, focusing on business needs and user experience instead of foundations and resources.</p><p>Additionally, the cloud model aligns closely with mobile applications in terms of addressing scale, performance, availability and access. The flexibility and capacity of the on-demand cloud make it an ideal platform on which to build and deploy these applications.</p><p>In conclusion, what we have to remember is that cloud affords significant flexibility to perform rapid development, testing and application viability analysis. Also, the IT team needs the ability to migrate to an on-premises, private cloud or hybrid model if application or business requirements dictate.</p> http://www.enterprisecioforum.com/en/blogs/rickblaisdell/application-development-%E2%80%93-when-it%E2%80%99s-time#comments Technology Cloud Blog-post cloud apps cloud computing Thu, 18 Sep 2014 07:34:04 +0000 RickBlaisdell 9926 at http://www.enterprisecioforum.com SaaS Life Cycle Management for Multi Tenant Applications http://www.enterprisecioforum.com/en/blogs/karthikeyan-v/saas-life-cycle-management-multi-tenant <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> TechCello offers an end to end SaaS Life Cycle Management Solution, which can be used as a SaaS Development Framework to design, develop and manage the operations of your SaaS product. TechCello is a tested and proven SaaS Multi Tenant Framework built exclusively to meet the typical SaaS needs of your business and product. </div> </div> </div> <p><a title="SaaS" href="http://www.techcello.com" rel="nofollow">Techcello</a> offers a wide range of SaaS building blocks that can help in building and managing SaaS multi tenant applications. Techcello’s framework is designed with multi-tenant best practices and can work in a plug and play model so that integration can be extremely simple. ISVs get the flexibility to determine which modules to consume. Our plug and play architecture allows even existing products (SaaS or non-SaaS) to leverage Cello modules.</p><p>Cello is available in the form of APIs and libraries, which can be deployed along with your product. Developers can simply consume Techcello by invoking the required APIs to develop the business solution. Both the business solution and cello libraries/APIs can together be deployed in any cloud, including public, private and hybrid clouds. ISVs planning to operate on hybrid business model (SaaS and on-premise) can very well deploy Techcello as on-premise solutions.</p><div class="field field-type-emvideo field-field-video"> <div class="field-items"> <div class="field-item odd"> http://www.youtube.com/watch?v=L1Hidm5AVbQ </div> </div> </div> http://www.enterprisecioforum.com/en/blogs/karthikeyan-v/saas-life-cycle-management-multi-tenant#comments Technology Cloud Blog-post cloud; evolution; revolution; IaaS; PaaS; SaaS; multi-tenancy; software; database; process optimization Thu, 18 Sep 2014 04:45:44 +0000 Karthikeyan V 9921 at http://www.enterprisecioforum.com How Internet of Things (IOT) is Reshaping the World http://www.enterprisecioforum.com/en/blogs/sophinadillard/how-internet-things-iot-reshaping-world <p>After social media, it’s time for internet of things which helps devices to connect to each other virtually. Difference between both is that in social media people are getting connected and in internet of things devices will be connected. Gartner list internet of things (IOT) is one of the top ten strategic technology trends in 2014. Business Insider estimates that nine billion devices will soon be connected to the internet. IOT is reshaping the world in following ways.<br /> inte</p><h2>Better connected world</h2><p>From a source, research shows that by 2020, there will be 8 billion people on earth and 50 billion connected things with 5 million apps, representing nearly 6 things per person. It is estimated that by 2035 there will be around 1 trillion connected things with 100 million apps.<br /> <br /> By the connected world we mean to say it will be easier to access and share information. For example; suppose you are on the way to somewhere and the road on your route gets damaged due to some unforeseen conditions. Then with this new technology communication link will be developed between your car and the road via cloud hence informing you about the condition of road. For example, in future it is expected that the morning routine is going to be slightly different all credit goes to Internet of Things technology. Your alarm may ring up earlier than usual time indicating some traffic jam on your route. If you are allergic and you decide to wear a suit with sensors to detect the air quality. So with the IOT you may be warned about some high pollen count in air which could otherwise unnecessarily trigger an attack.</p><h2>Better manageability</h2><p>With the introduction of this connected world technology, people can now manage things easily. Our home, Car, and other things will be connected to each other and people will now be able to manage all things through their mobile phones.</p><h2>Big data for making things better</h2><p>Internet of Things technology will help industries to gather huge information as everything will be connected through internet via cloud. This information can then be used to understand the consumer behaviour by using data to make things better. For example; in medical industry the data collected from various sources can be used to understand the type of diseases and provide better care to the patients. Businesses can make use of the data collected via cloud by using internet of things technology to improve marketing practices and also quality of their products.</p><h2>New opportunities</h2><p>Internet of Things is totally a new concept and a big trend. It is not only going to transform the way things are communicating with each other but will also create numerous better opportunities. For example; IOT will bring the new opportunity for <a href="http://www.omniesolutions.com/" rel="nofollow">app development companies</a> to create varied apps for internet enabled devices. In future it is for sure that as the internet of things will be on rise it will surely demand new apps and platforms alongwith new mobile devices. <br /> <br /> It will not be false to say that those days are not far away when we will be living in a world where each and everything in our surrounding will be connected and also interact with each other and make our earth a smart planet.<br /> <em><br /></em> <em>[Image credited: Ocean Data System] </em></p><p><em>This article originally appeared at <a href="http://omniesolutions.blogspot.com/2014/09/how-internet-of-things-iot-is-reshaping.html" rel="nofollow">here</a><br /></em></p> http://www.enterprisecioforum.com/en/blogs/sophinadillard/how-internet-things-iot-reshaping-world#comments Technology Mobility Blog-post Business Internet of Things IoT Wed, 17 Sep 2014 10:48:54 +0000 sophinadillard 9916 at http://www.enterprisecioforum.com Android L vs iOS 8: The Battle of Smartphone OS http://www.enterprisecioforum.com/en/blogs/mehulb/android-l-vs-ios-8-battle-smartphone-os <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> The dynamics of the market are bound to change with two major platforms releasing new versions of their respective operating systems. </div> </div> </div> <p>The dynamics of the market are bound to change with two major platforms releasing new versions of their respective operating systems.</p><p>The latest versions of Google and Apple operating systems named Android L and iOS 8 have debuted at developer conferences. Here we have tried to draw a comparison and work out whether Apple and Google are treading their own paths or starting to converge.</p><ul><li><strong>UI – Minimalism is in</strong></li></ul><p>Android L&nbsp;is a big departure from the earlier designs as Google looks to unleash “Material Design”, a new look that’s consistent across Android, Chrome OS, the Chrome browser, and&nbsp;Android Wear.</p><p>&nbsp;</p><p>There are lots more animations for touch feedback and transitions between apps, there’s more of a 3D feel with shadows, and a nested scrolling effect that slots UI elements out of the way when you don’t need them.</p><p>Apple had nailed it with iOS 7, so major overhaul wasn’t necessary for&nbsp;iOS 8&nbsp;and it retains the same clean and uncluttered look</p><ul><li><strong>Under the surface</strong></li></ul><p>Android L has made a killing with its SDK offering more than 5,000 APIs vis-à-vis 4000 APIs for iOS 8. However, it remains to be seen what those APIs have to offer. Matching iOS 7, Android L now supports 64-bit processors.</p><p>General performance and battery life will get much needed boost as Google has finally dumped Dalvik and made ART (Android RunTime) the new engine, which should offer a significant speed boost. It uses AOT (Ahead-of-Time) instead of JIT (Just-in-Time) compiling.</p><p>Apple switched to the Swift programming language for iOS 8 and&nbsp;OS X development, which is intended to safeguard against errors and offer improved performance for developers when coding for iPhones and iPads.</p><p>These platforms will enable developers to make apps with reduced bugs and hence should be lapped up by them. We await the verdict on the platform with the best changes.</p><ul><li><strong>Smartwatch compatibility</strong></li></ul><p>Apps on your Android device will automatically download and update themselves on any Android Wear device that you link. Google plans at rolling out Android Wear apps which appeared briefly on the play store, this goes to show that Google believes that wearables is the future.</p><p>Apple has had the updated Health app and the HealthKit API for iOS 8 to track fitness and health data to show you just how fit and healthy you are. However, they are still to announce an&nbsp;iWatch,</p><ul><li><strong>Battery saving</strong></li></ul><p>As mentioned in the earlier brief, Android L provides greater control over battery life with new enhancements and modes to fine tune battery consumption by various apps.</p><p>This is where Apple has caught up with Google. iOS 8 will finally provide a Battery Usage screen to monitor and control apps which consume most power when running and on standby.</p><p><strong>know more about our apps visit</strong>&nbsp;<a href="http://www.ebuild.co.in/blog/android-l-vs-ios-8-the-battle-of-smartphone-os.html" rel="nofollow">http://www.ebuild.co.in/blog/android-l-vs-ios-8-the-battle-of-smartphone-os.html</a></p> http://www.enterprisecioforum.com/en/blogs/mehulb/android-l-vs-ios-8-battle-smartphone-os#comments Technology Mobility Blog-post #Apple #iOS #backdoor #integrity #defenseindepth Wed, 17 Sep 2014 10:03:19 +0000 mehulb 9911 at http://www.enterprisecioforum.com Fashion first, function second in smart watches, wearables http://www.enterprisecioforum.com/en/blogs/jdodge/fashion-first-function-second-smart-watc <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> We #CIOchat about this at 2-3 p.m. ET, Thursday. </div> </div> </div> <p>It's simple. Most people won't don a smart watch or wearble device that's ugly. Consumers will not buy the new Apple Watch or forthcoming <a href="http://www.enterprisecioforum.com/en/blogs/enadhan/innovating-wearables-your-wrist-just-mat">HP Luxury Smartwatch</a>&nbsp;unless they are sharp and fashionable.</p> <p><span style="line-height: 1.4em;">Our weekly #CIOchat will center on this fun question: Is fashion as important as function with smart watches and wearable devices? We chat 2-3 p.m. ET on Thursday, hashtag #CIOchat .</span></p> <p><span style="line-height: 1.4em;">If you wish to go on at length, fashion versus features is also our current&nbsp;<a href="http://www.enterprisecioforum.com/en/question/fashion-important-features-when-it-comes">CIO Question</a> at the Enterprise CIO Forum.</span></p> <p><span style="line-height: 1.4em;">I'd argue fashion is more important. A watch can have all the functions in the world, but most consumers will pass on it if they don't get a charge glancing at it or showing it off. Smart phone makers learned this over the past several years.</span></p> <p><span style="line-height: 1.4em;">Some of the early digital watches like <a href="http://www.hp.com/hpinfo/abouthp/histnfacts/museum/personalsystems/0022/">the HP-01 wrist instrument</a> was something only an engineer could love. Introduced in 1977, the innovative HP-01 was not that bad looking in its day. It was a great companion to the pocket protector.&nbsp;<img src="/sites/default/files/Watch2.JPG" alt="Watch" title="Plain ol' watch" width="150" height="223" style="float: right; margin: 5px;" class=" caption" /></span></p> <p><span style="line-height: 1.4em;">Opposite case in point: I just got <a href="http://www.amazon.com/Victorinox-Swiss-241428-Master-Orange/dp/B004E4GRGO/ref=sr_1_3?ie=UTF8&amp;qid=undefined&amp;sr=8-3&amp;keywords=victorinox+watch+with+orange+face">a handsome Victorianox watch</a> for a birthday divisable by five. I love looking at, but by smart watch standards it's a wrist brick (it is quite heavy and bulky). All it does is tell the time and date. Oh, if I want to go scuba diving (I don't), I can hit depths of up to 1,500 meters and the watch promises to keep working and stay dry.&nbsp;</span><span style="line-height: 1.4em;">I like wearing it, though.</span></p> <p><span style="line-height: 1.4em;">Of course, fashion and function are both important, but the former is the gating qualification. If consumers do not like how it looks, they'll punt.</span></p> <p><span style="line-height: 1.4em;">We'll will also be exploring the IT implications of wearables. Hope to see you in chat.</span></p> <p><span style="line-height: 1.4em;">Follow <a href="http://www.twitter.com/thedodgeretort">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort">@thedodgeretort</a> on Twitter.&nbsp;</span></p> <p>&nbsp;</p> http://www.enterprisecioforum.com/en/blogs/jdodge/fashion-first-function-second-smart-watc#comments Technology Applications Mobility Security Blog-post Apple watch CIO HP IT Mobile Device wearable Tue, 16 Sep 2014 14:00:23 +0000 jdodge 9906 at http://www.enterprisecioforum.com Will Apple Pay change the way people make purchases? http://www.enterprisecioforum.com/en/blogs/rickblaisdell/will-apple-pay-change-way-people-make-pu <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> At the launch of the iPhone6, Apple introduced their Apple Pay Service. Promised as “Your wallet. Without your wallet.’’, Apple Pay allows users to upload their credit and debit card information by taking a picture and to pay with a single touch by using their iPhone. </div> </div> </div> <p>Using Near Field Technology, a chip that allows a user to ‘tap and go’, the new iPhone enables payments with a single touch. It can be used to pay online as well, in apps. It will also be available on the new announced Apple Watch.</p><p>Security was an issue that was strongly touched upon at the event. &nbsp;Instead of storing the credit card information, the technology communicates an encrypted placeholder ID to the store checkout system, which is then matched to the account information. Merchandisers don’t see the name or the credit card information of the purchaser.</p><p>Apple also says that they will not store information in regards to what was bought and how much it costed. If the phone is lost, the information can be locked/deleted. Apple got 3 majors credit cards and most major banks participating in the program, and 22.000 stores accepted this payment method, such as McDonald’s, Macy’s, Bloomingdale’s, Subway or Disney.</p><p>Since Apple Pay will be introduced in October, purchases with an iPhone are now made easy. However, remains the question whether merchandisers will integrate mobile-payment systems? But since Apple has usually helped technologies and services to be adopted by the mainstream population, we can assume that they will.</p><p>How will this influence mobile payment adoption? According to this Forbes<a href="http://www.forbes.com/sites/stevenbertoni/2014/09/10/apple-pay-is-doomed-unless-it-can-do-these-7-things/" rel="external nofollow" rel="nofollow">&nbsp;article</a>, mobile payments were a market of $235 billion last year and $15 trillion were transactions with cash and credit cards. &nbsp;Analysts predict that Apple Pay will significantly increase the mobile payments market:<a href="http://www.cnet.com/news/iphone-6-the-jolt-that-mobile-payments-needs/" rel="external nofollow" rel="nofollow">&nbsp;http://www.cnet.com/news/iphone-6-the-jolt-that-mobile-payments-needs/</a></p><p>Other services with integrated NFC technologies, such as the ones from Google, have not been massive successes, but with Apple the story could be different. &nbsp;With a history of redefining and getting to the mainstream technologies and services even though they were not the ones to invent them, (including the smartphone), Apple knows how to offer a great customer experience and how to package them better than anything else.</p><p>Will the customers habits when shopping change? Apple knows how to change customer behavior better than everyone else so I expect to see everyone soon paying with their iPhones.</p> http://www.enterprisecioforum.com/en/blogs/rickblaisdell/will-apple-pay-change-way-people-make-pu#comments Business Issues Services Blog-post apple pay mobile payments nfc Tue, 16 Sep 2014 09:58:19 +0000 RickBlaisdell 9901 at http://www.enterprisecioforum.com Explaining cloud computing benefits and the declining role of outsourcing http://www.enterprisecioforum.com/en/blogs/friedkin-companies-cio/explaining-cloud-computing-benefits-and <p>When I need to explain to non technical audience what the cloud is all about and what are the main business benefits that cloud provides, I prefer to use the following figure from Simon Wardley’s article “<a href="http://lef.csc.com/publications/911" rel="nofollow">A Lifecycle Approach to Cloud Computing</a>“. Well actually I’m using the life cycle diagram from his brilliant paper as a base and have augmented it with my vision of the cloud :</p><p>&nbsp;</p><p><a href="http://friedkincompaniescio.com/2014/09/15/explaining-cloud-computing-benefits-and-the-declining-role-of-outsourcing/" rel="nofollow">http://friedkincompaniescio.com/2014/09/15/explaining-cloud-computing-benefits-and-the-declining-role-of-outsourcing/</a></p> http://www.enterprisecioforum.com/en/blogs/friedkin-companies-cio/explaining-cloud-computing-benefits-and#comments CIO Leadership Cloud IT Performance Blog-post Mon, 15 Sep 2014 18:22:32 +0000 Friedkin Companies CIO 9891 at http://www.enterprisecioforum.com Four reasons why we are implementing DevOps – 4th reason: Insourcing http://www.enterprisecioforum.com/en/blogs/friedkin-companies-cio/four-reasons-why-we-are-implementing-dev-2 <p>Any IT change (cultural, structural or technological) should be driven by business needs. Our industry is about to go through dramatic and fundamental changes and our business needs maximum agility to adapt and keep on flourishing in this changing industry. This business change is driving us to implement private and public cloud as well as continuous delivery.</p><p><a href="http://friedkincompaniescio.com/2014/09/12/four-reasons-why-we-are-implementing-devops-4th-reason-insourcing/" title="http://friedkincompaniescio.com/2014/09/12/four-reasons-why-we-are-implementing-devops-4th-reason-insourcing/" rel="nofollow">http://friedkincompaniescio.com/2014/09/12/four-reasons-why-we-are-imple...</a></p> http://www.enterprisecioforum.com/en/blogs/friedkin-companies-cio/four-reasons-why-we-are-implementing-dev-2#comments CIO Leadership IT Performance Blog-post devops Sun, 14 Sep 2014 01:30:00 +0000 Friedkin Companies CIO 9886 at http://www.enterprisecioforum.com Imperfect Security: something will always get through http://www.enterprisecioforum.com/en/blogs/jdodge/imperfect-security-something-will-always <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> The weak link is employees. </div> </div> </div> <p>Our #CIOchat yesterday looked at security through the lens of recent credit card hacks via payment systems.</p><p>First the numbers: 23 participants spewing out 333 Tweets! We chat every Thursday 2-3 p.m. p.m. ET, hashtag #CIOchat .&nbsp;</p><p>All agreed that no security is foolproof and that something is going to get through. Several did not envy being a retail CIO given these high profile hacks at Target, Home Depot and most assuredly others.</p><p>What's more, employees are the point of the most vulnerability to cyber attacks.</p><p>Disney CTO&nbsp;<a href="http://twitter.com/keithbarret" rel="nofollow">@KeithBarrett</a>&nbsp;nicely sums up the inadequancy of security: "Security is prevention, DETECTION &amp; RECOVERY. Most focus on the 1st. Since most hacks are discovered later, this is not enough."&nbsp;Another Tweet from him showed how imperfect threat detection is: "It's not effective if the hacker has internal access or knows your processes."&nbsp;</p><p>Another of my favorite Tweets was from <a href="http://www.twitter.com/efeatherston" rel="nofollow">@efeatherston</a>:&nbsp;"I thought security was more like cricket. No one understands it and it can take a long time." That was, of course, until <a href="http://www.twitter.com/thedodgeretort" rel="nofollow">@joelhdobbs</a> noted that hacking really has no rules.</p><p>Next week we are talking fashion versus function in smart watches and wearables. What are the IT implications of wearables?</p><p>Here's two noteworthy conversations from yesterday's #CIOchat:</p><p><strong>-- #CIOchat conversation one: "At least Cricket has rules..."</strong></p><p>&nbsp;<img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" /><a class="_username networkName _userInfoPopup" title="Thedodgeretort" href="https://hootsuite.com/dashboard#" rel="nofollow">Thedodgeretort</a>: Q. 2 How can these org. gangs be stopped. Political problem? Or can you continually outsmart them? That's hard.<a class="_quickSearchPopup hash" title="CIOchat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOchat</a>2:19pm, Sep 11 from Hootsuite</p><div class="_previousTweets previousMessages"><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1453344096%2FEG_normal.jpg" alt="NadhanAtHP" /><a class="_username networkName _userInfoPopup" title="NadhanAtHP" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanAtHP</a>: A2.&nbsp;@<a class="_userInfoPopup" title="Thedodgeretort" href="https://hootsuite.com/dashboard#" rel="nofollow">Thedodgeretort</a>&nbsp;<a class="_quickSearchPopup hash" title="Security" href="https://hootsuite.com/dashboard#" rel="nofollow">#Security</a>is a game of chess -- Always plan your next moves in advance&nbsp;<a class="url" href="http://t.co/RmVhBzsnyA" target="_blank" rel="nofollow">http://t.co/RmVhBzsnyA</a><a class="_quickSearchPopup hash" title="CIOChat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOChat</a>2:25pm, Sep 11 from Twitter Web Client</div><div class="_comment comment"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F436895924162265088%2FduBYQ88K_normal.png" alt="cebess" /><a class="_username networkName _userInfoPopup" title="cebess" href="https://hootsuite.com/dashboard#" rel="nofollow">cebess</a>: .@<a class="_userInfoPopup" title="NadhanAtHP" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanAtHP</a>&nbsp;I thought security was more like cricket. No one understands it and it can take a long time.&nbsp;<a class="_quickSearchPopup hash" title="CIOChat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOChat</a>2:27pm, Sep 11 from TweetChat powered by oneQube</div><div class="_comment comment originalComment"><img class="networkAvatar" src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1270238891%2FJHD_normal.JPG" alt="JoelHDobbs" /><a class="_username networkName _userInfoPopup" title="JoelHDobbs" href="https://hootsuite.com/dashboard#" rel="nofollow">JoelHDobbs</a>:&nbsp;@<a class="_userInfoPopup" title="cebess" href="https://hootsuite.com/dashboard#" rel="nofollow">cebess</a>&nbsp;@<a class="_userInfoPopup" title="NadhanAtHP" href="https://hootsuite.com/dashboard#" rel="nofollow">NadhanAtHP</a>&nbsp;It's worse than cricket. At least cricket has rules (at least I think it does)&nbsp;<a class="_quickSearchPopup hash" title="CIOchat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOchat</a></div><div class="_comment comment originalComment"><strong>-- #CIOchat conversation 2 - "How safe is safe enough?"</strong></div><div class="_comment comment originalComment"><p class="_baseTweetText _tweetText messageContent"><img class="networkAvatar" src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F1039958161%2FProfilePic_normal.jpg" alt="mskaff" /><a class="_username networkName _userInfoPopup" title="mskaff" href="https://hootsuite.com/dashboard#" rel="nofollow">mskaff</a>: How safe is safe enough?&nbsp;<a class="_quickSearchPopup hash" title="CIOchat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOchat</a>2:43pm, Sep 11 from Twitter Web Client</p><div class="_previousTweets previousMessages"><div class="_comment comment"><img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F2544916053%2Fimage_normal.jpg" alt="katweasle" /><a class="_username networkName _userInfoPopup" title="katweasle" href="https://hootsuite.com/dashboard#" rel="nofollow">katweasle</a>:&nbsp;@<a class="_userInfoPopup" title="mskaff" href="https://hootsuite.com/dashboard#" rel="nofollow">mskaff</a>&nbsp;Seatbelts, airbags, roll cages and people still die in car crashes.. How much is enough&nbsp;<a class="_quickSearchPopup hash" title="CIOChat" href="https://hootsuite.com/dashboard#" rel="nofollow">#CIOChat</a>2:44pm, Sep 11 from Twitter for iPad</div><div class="_comment comment originalComment"><img class="networkAvatar" src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000549871689%2Ff2a26a2b2354772d910cc499f5a1789f_normal.png" alt="KeithBarrett" /><a class="_username networkName _userInfoPopup" title="KeithBarrett" href="https://hootsuite.com/dashboard#" rel="nofollow">KeithBarrett</a>: .@<a class="_userInfoPopup" title="katweasle" href="https://hootsuite.com/dashboard#" rel="nofollow">katweasle</a>&nbsp;@<a class="_userInfoPopup" title="mskaff" href="https://hootsuite.com/dashboard#" rel="nofollow">mskaff</a>&nbsp;Exactly. You have to know the value (&amp; the harm) the thing you are protecting is worth 1st.&nbsp;<a class="_quickSearchPopup hash" title="ciochat" href="https://hootsuite.com/dashboard#" rel="nofollow">#ciochat</a>2:48pm, Sep 11 from TweetChat powered by oneQube</div><div class="_comment comment originalComment"><em>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a> and <a href="http://twitter.com/thedodgeretort" rel="nofollow">@thedodgeretort</a> on Twitter and see you next week.</em></div></div></div><div class="_comment comment originalComment">&nbsp;</div></div><p><br /></p><p><br /></p><p>&nbsp;</p><p><br /></p> http://www.enterprisecioforum.com/en/blogs/jdodge/imperfect-security-something-will-always#comments Business Issues Applications Mobility Security Blog-post CIO CISO CSO Cyber security infosec IT Fri, 12 Sep 2014 19:09:28 +0000 jdodge 9881 at http://www.enterprisecioforum.com The Best Information Governance Conference Yet: InfoGovCon14 http://www.enterprisecioforum.com/en/blogs/robertsmallwood/best-information-governance-conference-y <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> Learning, Life Lessons - and Laughter - at Information Governance Conference &#039;14 </div> </div> </div> <p>This past week I attended and spoke at #InfoGovCon 14, the inaugural conference focusing solely on information governance (IG) held in Hartford, CT. I’ll have to say, not only was I impressed with the speakers, but I was just as impressed with the attendees.&nbsp; Quality all the way around in a casual, collegial atmosphere. &nbsp;No agendas, cliques, or sniping politics. &nbsp;A clean slate. And although we were discussing serious IG issues, one thing stood out in every session I attended: laughter and a light-hearted atmosphere. You might say it was the culture that the core conference team (Nick Inglis, Jim Merrifield II, and Rich Mesquita) brought: can-do and free-wheeling, a sense that <em>“we’re going to pull this conference off and make it the best ever no matter what.”</em></p><p>Nick Inglis’ opening keynote was filled with enthusiasm, bright promise, and gratitude for those who stepped up to help make it happen. Then the next speaker, I’ll have to admit, I was skeptical about: a politician. On my way to the conference I was thinking, <em>“What the heck does a politician know about IG?” </em>&nbsp;But then as Connecticut State Representative William Tong got into his talk he underscored how important IG and records management can be: A case of life and death.&nbsp; He detailed the mistakes that led to the torture, rape and murder of a Connecticut family, and how prison and court records indicating that two convicted felons should never have been paroled were mishandled, and how critical information about one of them in particular that labeled him a “predator” was not properly shared between state agencies. This led Rep. Tong to write a new law dictating that these agencies must keep good records, and delineating just how they must share the information, and exactly who should pay for it. He underscored the fact that in some circumstance poor IG is a life and death scenario.</p><p>Barclay Blair's keynote was especially entertaining, but also, he got the audience to start thinking differently about information. Christian Buckley's keynote, "10 Steps Toward Information Governance Nirvana" was informative and entertaining and I atttended sessions given by Laurence Hart and Bryn Bowen that were equally as impressive. A closing keynote by Alan Pelz-Sharpeof 451 Research on social business was refreshingly new, showing just how social and intereactive business has become. And he informed us about a new IG study with some almost shocking findings about how IG is rising in importance in the ranks of organizations but stalling at the top. Then Jim Merrifield wrapped things up by educating the audience on how to sell IG programs to various stakeholders in the organization, even down to the details of how you should phrase your business case.</p><p>Even though I was horribly jet-lagged from flying from the west coast and not required to attend any sessions, I couldn’t pull myself away. They were pretty rapid-fire which kept the pace going, with most sessions being only 20-40 minutes. That meant the speakers had to boil down their presetations to the essential points. Each speaker had a slightly different take on things yet there were some common themes.</p><p>But everything didn’t go perfectly smoothly, there were some small missteps; Jason Baron of the IG Initiative quipped during their IG Boot Camp, “Sorry folks, but this is an off-Broadway production. We're rehearsing this before we take it on the road,” and the entire room erupted in laughter. And there were funny quips from Jay Brudz and Barclay Blair during the session too. It certainly was not "death by PowerPoint."But you know what?&nbsp; Everyone learned something, some very valuable lessons that we could all apply after leaving the conference.</p><p>I’d given a 4-hour workshop on IG basics the day before, and well, if you have ever conducted a half-day session on your own you know it is tiring. I have been giving training classes online based on my IG textbook, <em>Information Governance: Concepts, Strategies, and Best Practices </em>(Wiley, 2014) although this was the first time I’d conducted a session on-site. But the attendees were quality professionals and during the give-and-take of our session I think I learned as much from them as they did from me. Afterwards, one attendee took me aside and said, “I have your book, and I have benefitted immensely from it, but to tell you the truth, I signed up for another session since I wanted a different perspective. The speaker cancelled so I dropped in on your session, not really expecting much variation from the book. But you truly brought IG “to life” for me – now I have a solid grasp on it that I did not have just reading the book.” As a trainer, that was music to my ears. That was sort of the tone of the whole conference: mutual respect, open discussions, and clear and honest communications.</p><p>With about 200 attendees, the conference was small enough to make good business contacts, and to have time to engage in meaningful conversations. The awards ceremony was informal and fun, at times even raucous, with everyone milling around or standing around tabletops talking and eating appetizers&nbsp; while sipping drinks. I made 15-20 solid contacts each day and I cannot say that about any conference I have attended in years. People who stopped by our booth during the breaks were actually qualified prospects interested in my books and training classes. They weren’t just stopping by to get a card stamped so they could possibly win and iPad or something. No, everyone there was interested in learning as much about IG as possible and to educate each other.</p><p>I’ll be back next year, and I will eat my hat if the attendance doesn’t double!</p> http://www.enterprisecioforum.com/en/blogs/robertsmallwood/best-information-governance-conference-y#comments CIO Leadership Big Data IT Performance Security Blog-post IG InfoGovCon information governance Smallwood Fri, 12 Sep 2014 18:26:40 +0000 RobertSmallwood 9876 at http://www.enterprisecioforum.com Will public cloud market just be served by big vendors? http://www.enterprisecioforum.com/en/blogs/christian/will-public-cloud-market-just-be-served <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> I don&#039;t think so although some do. </div> </div> </div> <p>I don't agree with <a href="http://www.infoworld.com/d/cloud-computing/try-again-cloud-contenders-amazon-google-and-microsoft-have-won-247922" rel="nofollow" target="_blank" rel="nofollow">David Linthicum's post in InfoWorld</a>&nbsp;that contends&nbsp;the IaaS and PaaS markets will no longer support smaller providers. He also argues that the little guys will have to exit those markets and find something else to do.&nbsp;</p><p>The post was written after the news that veteran Cloud provider&nbsp;<a href="http://www.infoworld.com/d/cloud-computing/rackspace-bows-out-of-iaas-market-247737" rel="nofollow" target="_blank" rel="nofollow">Rackspace pulled out of the IaaS market</a>&nbsp;. My objective is not to comment on Rackspace’s move, but rather to reject David’s claims. Let me explain why.</p><p><strong>What Cloud are we talking about?</strong></p><p>When David refers to the players that won the IaaS and PaaS market, he sites Amazon, Google and Microsoft—all three providing public Cloud offerings. The Cloud market is much larger than that. It’s actually ironic that, at the same time but in a different publication,&nbsp;<a href="http://blogs.technet.com/b/it_pro/archive/2014/08/18/microsoft-it-introduction-modernizing-our-datacenter.aspx" rel="nofollow" target="_blank" rel="nofollow">Microsoft itself describes why it is using a hybrid Cloud environment, not just Microsoft Azure</a>. If you dig a little deeper you’ll find that Microsoft keeps its business-critical applications in-house. And in my experience, they’re not alone.</p><p>Many companies are doing just that, setting up private Clouds to run their enterprise. Or they rely on enterprise-class virtual private Clouds, where security can be audited, locations are clearly defined, contractual arrangements are established and appropriate support delivered. These Clouds are of a different nature than the three described by David. They clearly have their space in the marketplace. Cloud is not just one-size-fits-all.</p><p><strong>What role does public Cloud play?</strong></p><p>Public Clouds have their roles to play, and most companies use them in one way, form, or shape. They are officially used for software development and testing, and for running non-core applications (using only non-sensitive data); often applications that interact with customers or users. Beside that, businesses tend to use the public Cloud environment for “shadow-IT-type” activities.</p><p>Start-ups, particularly in the U.S., tend to run everything in the public Cloud. So they don’t need to set up their own environments. In Europe and other parts of the world, security and privacy concerns tend to make start-ups a little more cautious. The same applies for small and medium businesses. U.S. companies are much more public-Cloud-friendly than European companies, for example.</p><p>The large security breaches that have come to light lately tend to also play against public Cloud, although there is no correlation between the two. Many companies are increasingly concerned to put valuable data on these massive Cloud platforms—even if they recognize these are probably well secured. The lack of transparency of how public Cloud environments are managed and secured is counter-productive.</p><p><strong>Cloud and the Internet of Things</strong></p><p>The public Cloud market will change drastically in the next five years. Indeed, the Internet of Things, which<a href="http://www.forbes.com/sites/gilpress/2014/08/18/its-official-the-internet-of-things-takes-over-big-data-as-the-most-hyped-technology/" rel="nofollow" target="_blank" rel="nofollow">according to Gartner just reached hype peak</a>, is creating new opportunities. Beyond the market of virtual infrastructure commodities (IaaS), and development/runtime environments (PaaS), a new space is appearing, as the one who owns the data provided by the sensors can now monetize the data. Should we call this “Data as a Service” or DaaS? I don’t know, but we see the need for Cloud resources moving increasingly to data analysis. None of the existing IaaS/PaaS players have major offerings in this space beyond the provision of infrastructure resources. So new, next-generation Cloud environments are destined to arrive on the market.</p><p>Often they will supersede the existing Clouds, because they build on the learnings from the first generation. They may even wipe out generation one. Let me give you an example: Do you remember Visicalc and Lotus 1,2,3? The same can happen in the Cloud space.</p><p><strong>Public Cloud lock-in</strong></p><p>Beyond this, there is another element increasingly guiding enterprise decisions—the fear of lock-in. Whether it is AWS, Google or Microsoft, all three environments are proprietary. If you develop an application within Microsoft Azure, you cannot easily take it to AWS or to any other Cloud environment. An increasing amount of companies are looking at alternatives where they are not locked into a proprietary environment. And here the Open Source initiatives (such as OpenStack) have a fundamental role to play. As these platforms mature, they will play an ever-increasing role. It’s actually quite probable they will be the basic platform for the <a href="http://bit.ly/1wyuZ9c" rel="nofollow">next generation of Cloud environments</a>.</p><p>If we go back in history once again, I remember the proprietary operating systems. Most of them have disappeared by now, first in favor of flavors of Unix and then with Linux. It took about 20 years to get there, but we know the world is accelerating drastically and, to give an example, OpenStack reached in 4 years the state it took Linux 15 years to reach. What happened in the operating system space will also happen here. The market is out for commoditization of basic services, while innovation and high-value services are valued.</p><p><strong>Politics, legislation and compliance</strong></p><p>Final reasons for the emergence of other large public Cloud providers are politics, legislation and compliance. The concept of public Cloud is such that the location of information and processing doesn’t matter. The reality is that it does. Some countries make access to foreign-based Cloud environments difficult. Others force specific types of data (personal information, healthcare, financial) to reside within given geographical boundaries. Others claim the right to access information owned by national enterprises anywhere in the world.</p><p>These elements are counter-productive. Mostly outside the U.S., politics plays a role in the Cloud decisions taken by companies. This is probably one of the reasons why Cloud in general, and the public Cloud in particular, grows slower than in the U.S.</p><p>Incompatible legislation has to be addressed and streamlined, and stringent compliance has to be standardized for Cloud to really become the global information backbone that will drive our migration to the digital economy.</p><p><strong>Iaas and Paas are not dead</strong></p><p>AWS, Google and Microsoft are important players in the public Cloud space. Today they may seem to be the only options. However, this is a myopic view at the Cloud marketplace. It reduces Cloud to public Cloud, not taking into account the other Cloud models that exist (managed and private Cloud). And it implies a status quo thinking, where the market is quickly evolving beyond Cloud to Big Data, the Internet of Things and the digital economy. This is why I disagree with David’s article. There is much more to Cloud than what he describes. Now, you may argue he speaks about IaaS and PaaS. Albeit infrastructure or development/runtime environments, we are just scratching the surface of what is feasible. And as far as that is concerned, the future is bright. However, it is companies that continuously innovate that will lead the pack. I leave it up to you to decide who that can be.</p> http://www.enterprisecioforum.com/en/blogs/christian/will-public-cloud-market-just-be-served#comments Business Issues Technology Applications Cloud Blog-post AWS CIO Cloud Google HP IaaS IT Microsoft PaaS public cloud Fri, 12 Sep 2014 15:13:01 +0000 Christian 9871 at http://www.enterprisecioforum.com Apple Drives the PADS Framework http://www.enterprisecioforum.com/en/blogs/gabriellowy/apple-drives-pads-framework <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> PADS is a higher-level strategic framework that establishes best practices for assuring user experience, reducing risk and improving operational decision making in a more efficient, secure and timely fashion. </div> </div> </div> <p>Once again, Apple has shown its product and marketing prowess with the launch of the iPhone 6 models and the Apple Watch.&nbsp; Cool as they may be, ApplePay could be the most significant illustration of how Apple necessitates the PADS Framework.</p><p>The PADS (Performance Analytics and Decision Support) Framework, links advanced performance management and big data analytics technologies.&nbsp; It enables enterprises and service providers to gain deep and real-time visibility into, and predictive intelligence from, increasingly complex IT systems across the entire application delivery chain.</p><p>PADS is a higher-level strategic framework that establishes best practices for assuring user experience, reducing risk and improving operational decision making in a more efficient, secure and timely fashion.</p><p>Without doubt, the new iPhones will stimulate both existing customer upgrades and attract new ones.&nbsp; In turn, the larger screens will drive more data services.&nbsp; This sustains demand for performance analytics and operational intelligence.&nbsp; While Apple Watch may take some time to find its market, it too is an incremental traffic generator.</p><p>Longer term, ApplePay has significant potential ramifications for PADS vendors.&nbsp; If Apple succeeds in changing consumer purchasing habits – again – the new traffic ApplePay will generate plays into PADS capabilities for cybersecurity and big data analytics.&nbsp; Authentication, verification and user experience will be paramount to service providers, merchants that accept the service (retail and restaurants are just a start) as well as to the credit card companies and banks that support the system.</p><p><strong>A More Strategic Approach To Operational Intelligence</strong></p><p>Uptime is the benchmark of an IT team’s success or failure.&nbsp; CIOs and business users consistently rank high-availability of applications and services as their top priority.&nbsp; Lost efficiency and productivity from poor transaction performance can be measured at up to $1 million per hour.&nbsp; Collateral fallout includes dissatisfied customers, disgruntled end-users, fines for non-compliance, and reputation damage.</p><p>New agile processes and cross-platform development for cloud and mobility challenge IT’s ability to keep networks and apps running smoothly.&nbsp; Increased systems complexity begets performance degradation.&nbsp; As more business processes rely on shared services and compute resources that are controlled outside the enterprise, the less visibility IT and business owners have into the application delivery chain.</p><p>Enterprises must stop monitoring and managing performance and user experience from traditional technology domains such as servers, network, application, operating system or security.&nbsp; Legacy performance monitoring solutions are overwhelmed by the scale of data required to comprehensively manage application performance.&nbsp; Data gathered from different tools is not normalized or time synchronized, resulting in too many false positives that end up being ignored.&nbsp; Analysis and rapid problem resolution is impossible.</p><p>To better understand the properties of system components and their place in the overall application delivery chain requires a higher-level assessment of the relationships to each other as well as to the wider system and environment.&nbsp; Enter the PADS Framework.</p><p>The PADS framework connects unified next-generation performance management and operational intelligence technologies into holistic, integrated platforms that consolidate multiple previously discrete functions.&nbsp; These platforms work in concert, as performance data analytics provides physical and logical knowledge of the computing environment to allow for more powerful and granular data queries, discovery and manipulation.&nbsp; Modeling and mapping capabilities enable faster drill-down and problem resolution.</p><p>The twin missions of the Framework are to:</p><ul><li>allow IT to be more proactive in anticipating, identifying and resolving performance problems by focusing on user/customer experience; and,</li><li>enable IT to become a strategic provider and orchestrator of internally and externally sourced services to business units that can leverage operational intelligence.</li></ul><p><br /></p><p><strong>The Better You Can Measure It, the Better You Can Manage It</strong></p><p>The most relevant metric for any IT organization is not about infrastructure utilization.&nbsp; Instead, it is at what point of utilization the user experience begins to degrade.&nbsp; IT can then feed this information about the application delivery chain and user experience upstream into an operational intelligence (OI) platform.&nbsp; An OI platform collects, indexes, correlates and analyzes log and other forms of machine data at massive scale to help IT organizations and line of business users gain real-time insights from disparate data types and sources.</p><p>Consolidating this data to make it readily searchable can reveal previously undetected patterns or unique events.&nbsp; The value of this information allows IT to quickly identify and troubleshoot systems, investigate security incidents and demonstrate compliance efficiently and cost effectively.&nbsp; When combined with historical data in traditional BI systems and data warehouses and newer data discovery tools that provide easy-to-use visualization techniques, the broader intelligence IT and business users gain drive better operational decision making.</p><p>While no one solution can provide everything, deploying too many solutions only increases complexity, cost and frustration.&nbsp; High-performing enterprises use no more than three solutions, with forward-thinking IT teams linking performance management and operational intelligence platforms.&nbsp; Is the PADS Framework for you? &nbsp;</p><p><br /></p><p><br /></p> http://www.enterprisecioforum.com/en/blogs/gabriellowy/apple-drives-pads-framework#comments Technology Applications IT Performance Mobility Blog-post : IT Performance Management analytics operational intelligence PADS Framework Fri, 12 Sep 2014 14:05:00 +0000 Gabriel_Lowy 9866 at http://www.enterprisecioforum.com Shadow IT—the good, the bad, and the ugly. How to deal with it? http://www.enterprisecioforum.com/en/blogs/terencengai/shadow-it%E2%80%94-good-bad-and-ugly-how-deal-it <p>The debate over shadow IT is like a three-man standoff in a spaghetti Western. On one side you have the business leaders and developers, who view external cloud resources as a quick and inexpensive way to get a project up and running. On the other you have IT, who feels it’s losing control when the business turns to external service providers. And in the middle you have the CIO, who faces pressure to meet the needs of the business, but who also has to weigh the risks involved with using an external service provider.</p><p>As I wrote in my previous post on <a href="http://h30499.www3.hp.com/t5/Grounded-in-the-Cloud/How-do-business-pressures-and-cloud-disrupt-the-CIO-role/ba-p/6590368#.VAjH6Ll0xHg" rel="nofollow">the changing role of the CIO</a>, if IT’s not aligned with the business, then you leave the business no choice but to seek an external service provider. But going outside is not always a bad thing. If employees put non-mission critical applications or non-sensitive data on those external resources, then it may be fine to use an external service provider.</p><p>But if employees put customer data on an external service provider such as Amazon without thinking through their business unit’s compliance or security needs and IT doesn't know what they are doing, then that’s bad, because they’re not examining whether the external service provider is protecting all of their business interests.</p><p>&nbsp;</p><p><strong>Partner with the business leaders</strong></p><p>As a CIO, how should you deal with shadow IT? My advice is, don’t prohibit it in a draconian way.&nbsp; The best way to deal with shadow IT is to shine a light on it.&nbsp;</p><p>To shine a light on shadow IT, the CIO has to have a conversation with the CFO and business leaders, along the lines of, I know you’ve been wanting us to leverage technology services, especially cloud services to deliver more business agility and speed innovation. We’re on our way, but we’re not quite there yet. I know short term you need more IT resources to develop new products faster or run a marketing campaign, and I know you’ve been looking at external service providers. I would like to work with you to help evaluate these external service providers so we don’t put our business at risk.</p><p>As part of this conversation, the CIO and the business need to consider these issues:</p><p>&nbsp;</p><ul><li><strong>Timeliness:</strong> If the marketing department wants to seize an opportunity and run a time-sensitive promotion, they’ll need resources for customer facing websites, content management, and maybe pushing the promotion to a mobile app. If IT can’t provide resources for them, then they’ll lose revenue.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</li><li><strong>Security:</strong> When you’re using someone else’s servers, storage, or network, you always have to weigh the potential risk of a breach. On almost a daily basis the headlines report the theft from the public cloud of credit card information, intellectual property, and personal data.</li><li><strong>Compliance:</strong> How do you make sure that the external service provider is taking all the necessary measures to protect your data and your applications? Are they able to meet all the regulatory requirements specific to an industry such as finance, healthcare, or the public sector? And if they can’t meet the requirements today, will they ever be able to?</li><li><strong>Management:</strong> How are you going to manage the services that you need? If the cloud service or infrastructure is down, who do you call? Do you have visibility into what the cause is and how to fix the problem? Unlike with internal IT, you don’t have visibility or control over your service provider.</li><li><strong>Finance:</strong> Without going through central procurement and internal IT, how do you make sure there’s no cost overrun? How can you be sure the budget is being managed? Who determines whether you’re buying resources at the right cost level?</li><li><strong>Viability:</strong> Is your external service provider going to be in business in five years? Consider the case of <a href="http://www.infoworld.com/d/virtualization/cloud-storage-provider-nirvanix-closing-its-doors-227289" rel="nofollow">Nirvanix</a>, a cloud storage provider that went belly-up in September 2013. Customers were given two weeks to move their data. Nirvanix is not the norm, but the point is whenever you have to rely on someone else, you’re taking a risk.</li><li><strong>Technology lock-in:</strong> Most of the cloud service providers suffer from what I call the “Hotel California” problem: You can check in anytime, but can you check out? If you’re not happy with your service provider for whatever reasons—it’s raising its fees, or it’s not innovating fast enough, or you’re displeased with its service—how easily can you take out your data and applications and move them elsewhere? Do you need to rewrite your application? This can create problems with migration and change management.</li></ul><p>&nbsp;</p><p><strong>Become a hybrid service provider</strong></p><p>Business leaders aren’t going to be technical experts on how to evaluate external service providers. The CIO can say, let me help you make the right choice, because if we get breached or we’re not compliant as a business, then it’s not good for any of us.</p><p>Enterprise IT is evolving into a mix of internal and external resources, with the CIO as a hybrid service provider. If an external service provider is less expensive and can provide the same quality of service and meet the requirements your business needs, why would you want to build it yourself?</p><p>It’s okay to think about using a third-party service provider, as long as you examine them based on a well-defined set of evaluation criteria that is important to your business. &nbsp;To learn more about how to work with a trusted partner, please visit <a href="http://www.hp.com/helion" rel="nofollow">www.hp.com/helion</a></p> http://www.enterprisecioforum.com/en/blogs/terencengai/shadow-it%E2%80%94-good-bad-and-ugly-how-deal-it#comments CIO Leadership Cloud Blog-post business and IT alignment CIO role HP Helion hybrid cloud Hybrid IT IT transformation managed cloud private cloud public cloud Service Provider Fri, 12 Sep 2014 02:26:53 +0000 terencengai 9861 at http://www.enterprisecioforum.com CFOs discuss their technology priorities http://www.enterprisecioforum.com/en/blogs/mylessuer/cfos-discuss-their-technology-priorities <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> CIOs this your opportunity to build a better relationship </div> </div> </div> <p>Recently, I had the opportunity to talk to a number of CFOs about their technology priorities. These discussions represent an opportunity for CIOs to hear what their most critical stakeholder considers important. The CFOs did not hesitate or need to think much about this question. They said three things make their priority list. They are better financial system reliability, better application integration, and better data security and governance. The top two match well with a recent KPMG study which found the biggest improvement finance executives want to see—cited by 91% of survey respondents—is in the quality of financial and performance insight obtained from the data they produce, followed closely by the finance and accounting organization’s ability to proactively analyze that information before it is stale or out of date”</p><p><strong>Better financial system reliability</strong></p><p>CFOs want to know that their systems work and are reliable. They want the data collected from their systems to be analyzed in a timely fashion. Importantly, CFOs say they are worried not only about the timeliness of accounting and financial data. This is because they increasingly need to manage upward with information.&nbsp; For this reason, they want timely, accurate information produced for financial and business decision makers. Their goal is to drive out better enterprise decision making.</p><p>In manufacturing, for example, CFOs say they want data to span from the manufacturing systems to the distribution system. They want to be able to push a button and get a report. These CFOs complain today about the need to manually massage and integrate data from system after system before they get what they and their business decision makers want and need.</p><p><strong>Better Application Integration</strong></p><p>CFOs really feel the pain of systems not talking to each other. CFOs know firsthand that they have “disparate systems” and that too much manual integration is going on. For them, they see firsthand the difficulties in connecting data from the frontend to backend systems. They personally feel the large number of manual steps required to pull data. They want their consolidation of account information to be less manual and to be more timely. One CFO said that “he wants the integration of the right systems to provide the right information to be done so they have the right information to manage and make decisions at the right time”.</p><p><strong>Data Security and Governance</strong></p><p>CFOs, at the same time, say they have become more worried about data security and governance. Even though CFOs believe that security is the job of the CIO and their CISO, they have an important role to play in data governance. CFOs say they are really worried about getting hacked. One CFO told me that he needs to know that systems are always working properly. Security of data matters today to CFOs for two reasons. First, data has a clear material impact. Just take a look at the out of pocket and revenue losses coming from <a href="http://www.enterprisecioforum.com/en/blogs/mylessuer/real-value-it-may-just-be-brand-promise" rel="nofollow">the breach at Target.</a> Second, CFOs, which were already being audited for technology and system compliance, feel that their audit firms will be obligated to extend what they were doing in security and governance and go as a part of regular compliance audits. One CFO put it this way. “This is a whole new direction for us. Target scared a lot of folks and will be to many respects a watershed event for CFOs”.</p><p><strong>Take aways</strong></p><p>So the message here is that CFOs prioritize three technology objectives for their CIOs-- better IT reliability, better application integration, and improved data security and governance. Each of these represents an opportunity to make the CFOs life easier but more important to enable them to take on a more strategic role. The CFOs, that we talked to, want to become one of the top three decision makers in the enterprise. Fixing these things for CFOs will enable CIOs to build a closer CFO and business relationships.</p><p><strong>Related links</strong></p><p><strong>Solution Brief</strong>: <a href="http://www.informatica.com/us/vision/intelligent-data-platform/#fbid=6HpVUXgm3ow" rel="nofollow"><strong>The Intelligent Data Platform</strong></a><strong></strong></p><p><strong>Solution Brief</strong>: Secure at Source<strong></strong></p><p><strong>Related Blogs</strong></p><p><a href="http://blogs.informatica.com/perspectives/2014/09/03/the-cfo-viewpoint-upon-data/#fbid=nL6vd61grIg" rel="nofollow">The CFO Viewpoint upon Data</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/07/07/how-cfos-can-change-the-conversation-with-their-cio/#fbid=nL6vd61grIg" rel="nofollow">How CFOs can change the conversation with their CIO?</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/06/30/new-type-of-cfo-represents-a-potent-cio-ally/#fbid=nL6vd61grIg" rel="nofollow">New type of CFO represents a potent CIO ally</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/08/22/competing-on-analytics-a-follow-up-to-thomas-h-davenports-post-in-hbr/#fbid=nL6vd61grIg" rel="nofollow">Competing on Analytics</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/06/25/the-business-case-for-better-data-connectivity/" rel="nofollow">The Business Case for Better Data Connectivity</a></p><p><strong>Twitter</strong>: <a href="https://twitter.com/MylesSuer" rel="nofollow"><strong>@MylesSuer</strong></a><strong></strong></p><p>&nbsp;</p> http://www.enterprisecioforum.com/en/blogs/mylessuer/cfos-discuss-their-technology-priorities#comments CIO Leadership IT Performance Blog-post Application integration CFO CIO Data Governance Data security priorities Thu, 11 Sep 2014 17:34:44 +0000 myles.suer 9856 at http://www.enterprisecioforum.com Credit card hacks abound. What's going on? http://www.enterprisecioforum.com/en/blogs/jdodge/credit-card-hacks-abound-whats-going <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> We chat about this 2-3 p.m. ET today... #CIOchat </div> </div> </div> <p>This week, it Home Depot's credit cards. A few weeks ago, it's Target's. Is any of your financial information safe?&nbsp;</p><p>That's what we are discussing in today's Twitter chat. Our main question is "What does the recent spate of credit cards hacks say about the state of cybersecurity?"</p><p>The chat is from 2-3 p.m. ET, hashtag #CIOchat</p><p>Next week, we chat about fashion versus features in smart watches and wearable devices. Check out <a href="http://www.enterprisecioforum.com/en/question/fashion-important-features-when-it-comes" rel="nofollow">our CIO Question</a>&nbsp;and HP blogger <a href="http://bit.ly/1pbkFds" rel="nofollow">E.G. Nadhan's post</a> on the topic. &nbsp;</p><p>I hope you can join us for both chats.&nbsp;</p><p>Follow <a href="http://www.twitter.com/ecioforum" rel="nofollow">@ecioforum</a>&nbsp;and <a href="http://www.twitter.com/thedodgeretort" rel="nofollow">@thedodgeretort</a> on Twitter.</p><p>&nbsp;</p><p>&nbsp;</p> http://www.enterprisecioforum.com/en/blogs/jdodge/credit-card-hacks-abound-whats-going#comments Technology Applications Security Blog-post CIO Hack infosec IT Security Thu, 11 Sep 2014 15:41:43 +0000 jdodge 9851 at http://www.enterprisecioforum.com Is fashion as important as features when it comes to smart watches and other consumer wearable devices? http://www.enterprisecioforum.com/en/question/fashion-important-features-when-it-comes http://www.enterprisecioforum.com/en/question/fashion-important-features-when-it-comes#comments Technology Applications Mobility Security CIO Questions Thu, 11 Sep 2014 15:20:54 +0000 jdodge 9846 at http://www.enterprisecioforum.com Attributes to Consider When Hiring an IT Manager http://www.enterprisecioforum.com/en/blogs/dmpeltier/attributes-consider-when-hiring-it-manag <p>Hiring an IT Manager is never easy.</p><p>IT Manager is unique position that requires a mix of technical skills as well as a bit of human resources knowledge. To hire an effective IT Manager you must consider both of these aspects of the job. To find the right person, consider some of these key attributes during your interview process.</p><ul><li>Technical IT Skills</li><li>Leadership Abilities</li><li>Interpersonal Skills</li><li>Conflict Management</li><li>Vision</li></ul><p><strong>Technical IT Skills</strong></p><p>While it may seem obvious, many hiring managers overlook the simple fact that their IT Manager must be able to handle any technical issues that may arise. While this person will be managing a team of IT professionals, it is still important that they be able to resolve all technical situations.</p><p><strong>Leadership Abilities</strong></p><p>Another important attribute of an IT Manager is their leadership abilities.</p><p>Typically, this is an area where a lot of IT Managers fall short. Often candidates will be adept at the technical side of things, but lacking in <a href="http://businessdegrees.uab.edu/resources/articles/management-techniques-and-leadership-strategies-you-can-use-right-now/" rel="nofollow">management techniques</a> and leadership skills. An IT Manager must be able to lead a team in order to be successful, regardless of their technical prowess. An effective IT Manager will possess leadership qualities that typically come from previous managerial experience.</p><p><strong>Interpersonal Skills</strong></p><p>Another area that people tend to overlook when hiring an IT Manager is interpersonal skills.</p><p>As mentioned before, this person will be managing a team. Along with the ability to lead, an IT Manager should have excellent <a href="http://www.udemy.com/blog/list-of-interpersonal-skills/" rel="nofollow">interpersonal skills</a> as well. These types of skills are not only important for managing their own team, but also for interacting with other departments within the company.</p><p>When trying to determine interpersonal skills, you should be considering emotional IQ. Emotional IQ is a measure of a person’s ability to understand and manage emotions effectively. A high emotional intelligence is crucial to interpersonal skills as the ability to better control your emotions will allow a person to interact with others more positively and handle stressful situations more skillfully. <a href="http://onlinemba.umd.edu/resources/webinars-and-infographics/emotional-iq-and-you/" rel="nofollow">This infographic</a> discusses the importance of a high emotional intelligence for managers.</p><p><strong>Conflict Management</strong></p><p>Conflict management is another attribute that is paramount for a successful IT Manager.</p><p>As much as the IT Manager needs to have interpersonal skills to manage their own relationships with other departments, they also must be able to manage the relationships between their employees and the other departments – as well as relationships within their own department. A large part of managing these relationships is conflict management and <a href="http://communicationmgmt.usc.edu/msp-resources/conflict-workplace/" rel="nofollow">conflict in the workplace</a>.</p><p>The IT Department is a unique position where they must interact with other departments quite frequently. This is the nature of the beast and can often lead to conflict between employees. Consider a candidates ability to manage multiple personalities and handle these conflicts as they arise.</p><p>&nbsp;<strong>Vision</strong></p><p>Finally, vision and the ability to look at the big picture is something an IT Manager must possess.</p><p>While the day-to-day operations of the IT department are important, finding ways to increase efficiency and improve processes is equally important. An effective IT Manager should always be working to make the IT department better and this requires an ability to forecast into the future. Consider a candidate that possesses strong strategic vision.</p><p>As mentioned before, finding the right person for an IT Manager position can be quite difficult. However, considering these key attributes will provide a foundation to help guide your decision making. &nbsp;</p> http://www.enterprisecioforum.com/en/blogs/dmpeltier/attributes-consider-when-hiring-it-manag#comments Business Issues IT Performance Blog-post IT hiring IT Management IT Manager Tue, 09 Sep 2014 22:06:00 +0000 DMPeltier 9841 at http://www.enterprisecioforum.com Changing styles of IT driven by the fashionable world of IoT http://www.enterprisecioforum.com/en/blogs/enadhan/changing-styles-it-driven-fashionable-wo <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> A cool bracelet from – wait for IT – Intel! </div> </div> </div> <p>“For most wearable makers, it would be in their best interest to stop worrying about the gizmos inside, and start worrying about the look and feel of their products -- says <a href="https://twitter.com/nickbilton" rel="nofollow">Nick Bilton</a> in this <a href="http://www.nytimes.com/2014/09/04/fashion/intel-and-opening-ceremony-collaborate-on-mica-a-stylish-tech-bracelet.html?_r=0" rel="nofollow">New York Times article</a> that refers to various wearables including the <a href="http://www.usatoday.com/story/tech/2014/09/03/intel-smart-bracelet-opening-ceremony/14992131/" rel="nofollow">MICA –bracelet</a> recently announced by Intel.&nbsp; “We need to create accessories that people are proud to put on their body.” says Ayse Ildeniz, vice president of Intel’s New Devices Group, the team behind the MICA (<strong>M</strong>y <strong>I</strong>ntelligent <strong>C</strong>ommunication <strong>A</strong>ccessory) bracelet.</p><p>Even Apple with the introduction of the Apple Watch this week recognized that fashion is as important as features. Maybe more so.&nbsp;</p><p>Internet of Things (IoT) is (re)defining fashion with the introduction of wearable jewelry like this bracelet from Intel, Barneys New York and Opening Ceremony.&nbsp;The fashionable world of IoT also impacts the traditional world of IT.&nbsp; Enterprise IT needs to <a href="http://owl.li/wiwjt" rel="nofollow">adapt to new styles</a> as well in the emerging world of <a href="http://hp.nu/AKkrG" rel="nofollow">designer IoT</a>.</p><p>Take, for instance, my co-worker in Enterprise IT, <a href="https://twitter.com/JenessaE" rel="nofollow">Jenessa Ayache</a> who wants to take a “fashionable” approach to celebrating an upcoming milestone in her life.&nbsp; Ayache is looking at a <a href="http://1cr.it/xC" rel="nofollow">ring</a> or a <a href="http://hp.nu/AKkrG" rel="nofollow">wrist-watch</a> – perhaps, this bracelet – and even <a href="http://www.liveathos.com/" rel="nofollow">smart clothes</a>. &nbsp;One such tech-infused, wearable seeker might even enjoying an <a href="http://intel.ly/1qpU4P3" rel="nofollow">intelligent cup of cappucino</a> in her temperature-controlled smart kitchen.&nbsp; While sporting the wardrobe of the next generation might have a “cool” appeal, are consumers like Ayache ready for the implications of having incessant access to data through all these channels?&nbsp; A question that is as applicable, if not more, to enterprises as well.</p><p>There are many “Ayaches” within the ecosystem of global enterprises today and the “fashionable” world of IoT is upon us whether Enterprise IT and the CIO is ready for it or not.&nbsp; <em>So, what are key factors that enterprises must take into consideration to be “cool” as well?</em></p><ul><li><strong>Business Value.&nbsp; </strong>Have the appropriate Information Strategy in place to apply complex analytical techniques to gain insight from data that matters.&nbsp; And more importantly take timely action on this insight to realize their <a href="http://bit.ly/VAsuAK" rel="nofollow">Return on Information</a>.<strong></strong></li><li><strong>Security.&nbsp;&nbsp; </strong>Continuously refine the secure posture for the enterprise while balancing the need for the right level access for the right stakeholders while proactively combating of <a href="http://owl.li/oVcR8" rel="nofollow">Adversaries R Us</a>.&nbsp; Looking to secure the wearables in your ecosystem – how about starting with the <a href="http://hp.nu/AZxYM" rel="nofollow">apps for a change</a>?<strong></strong></li><li><strong>Governance.</strong>&nbsp; Enterprises must ensure that there are appropriate levels of both Information and Data governance policies in place.&nbsp; Checkout this enlightening article on <a href="http://blogs.informatica.com/perspectives/2014/09/03/information-governance-vs-data-governance-who-cares/#fbid=Zc0BVGH9tEz" rel="nofollow">Information Governance vs Data Governance - Who Cares?</a> by Informatica VP of Global Integration Services, <a href="https://twitter.com/JohnGSchmidt" rel="nofollow">John Schmidt</a>.<strong></strong></li></ul><p>Enterprises that don’t take the right steps today will be deemed old-style very soon.&nbsp; They will be in a fashionably cool world of Oh-so-cool IoT with a not-so-cool IT.&nbsp; Is it time that Enterprises evolved to a <a href="http://hp.nu/B6ctz" rel="nofollow">New Style of Business Intelligence</a>?</p><p>How about you? What steps would you recommend for Enterprise IT to be as cool – if not more – than the world of IoT? What wearables would you add on to the information-rich wrist-watches, bracelets, rings and smart clothing to define the cooler wardrobe of the next generation?&nbsp; Please let me know.</p><p>Team up with&nbsp;<a href="http://www.hp.com/go/easwarannadhan" target="_self" rel="nofollow">HP Technology Expert, E.G.Nadhan</a></p><p>Connect with <a href="https://twitter.com/NadhanAtHP" target="_self" rel="nofollow">Nadhan</a>&nbsp;on: <a href="https://twitter.com/NadhanAtHP" target="_self" rel="nofollow">Twitter</a>, <a href="http://www.facebook.com/easwaran.nadhan" target="_self" rel="nofollow">Facebook</a>, <a href="http://www.linkedin.com/profile/view?id=102637222&amp;trk=tab_pro" target="_self" rel="nofollow">Linkedin</a> and <a href="http://bit.ly/VDfGGn" target="_blank" rel="nofollow">Journey Blog</a>.<strong></strong></p> http://www.enterprisecioforum.com/en/blogs/enadhan/changing-styles-it-driven-fashionable-wo#comments Technology Big Data Blog-post Bracelet Data Governance devices enterprise IT Governance information governance IoT IT IoT Ring Security Wearables Wrist-Watch Tue, 09 Sep 2014 20:58:57 +0000 enadhan 9831 at http://www.enterprisecioforum.com The importance of cloud computing in manufacturing http://www.enterprisecioforum.com/en/blogs/rickblaisdell/importance-cloud-computing-manufacturing <p>Because lately we kept discussing about the Internet of Things, we should perhaps mention that this trend is part of a larger industry, cloud manufacturing. With a large impact over the industries of aerospace, healthcare, education and financial services, here is another industry that cloud computing is highly influencing lately: manufacturing.</p><p>The traditional manufacturing model is now changed with the aid of IT and lately, cloud based technologies. &nbsp;Ways in which cloud computing can be applied to the manufacturing industry are various. Here are some areas in which<strong>cloud computing technologies can be easily integrated in manufacturing</strong>:</p><ul><li>cloud based business intelligence solutions</li><li>built in services/functionalities in the cloud</li><li>collaborative designing in the cloud</li><li>managing the marketing</li><li>managing the sales</li><li>automatic customer service</li><li>human resources automation</li><li>accelerationg new product development</li><li>ERP</li></ul><p>Therefore there are&nbsp;<a href="http://cloudtweaks.com/2014/08/cloud-networked-manufacturing/" rel="external nofollow" rel="nofollow">many branches to cloud manufacturing</a>, such as: Design as a service (DaaS), Manufacturing as a service (MFGaaS), Experimentation as a service (EaaS), Simulation as a service (SIMaaS), Management as a service (MaaS), Maintain as a service (MAaaS), Integration as a service (INTaaS).</p><p>Overall,&nbsp;<strong>cloud based technologies can be applied to all stages of product management</strong>&nbsp;– from projecting, designing, testing, production and go to market strategies. They also bring the advantage that they allow real time, live collaboration of the entire team, thus increasing productivity and reducing the time needed to develop a product. Therefore, the process of data exchanging is streamlined.</p><p>In addition, after launching, production can be scaled up and down by demand. Using cloud computing technologies in manufacturing can allow manufacturers to focus more time and attention for their products, rather for their business/operational duties.</p><p>Can you think of any other ways in which the cloud is influencing the manufacturing industry? Please share your thoughts in the comments below.</p><p>Photo credit:&nbsp;https://www.flickr.com/photos/12836528@N00/2737698737/</p> http://www.enterprisecioforum.com/en/blogs/rickblaisdell/importance-cloud-computing-manufacturing#comments Technology Cloud Blog-post #Cloud cloud computing manufacturing manufacturing ERP software Tue, 09 Sep 2014 07:24:25 +0000 RickBlaisdell 9826 at http://www.enterprisecioforum.com Driving Classes in Toronto Make You Confident On the Road http://www.enterprisecioforum.com/en/blogs/richardmanning/driving-classes-toronto-make-you-confide <p>Knowing how to drive a vehicle is something that all of us aspire for. It is a thrilling experience and the same time allows you to be anywhere anytime without having to depend on anyone else. Though you can learn it from a friend or a family member it is always advisable that you join a professional <a href="http://www.todaysdriver.ca/" rel="nofollow">driving school</a> in Toronto. MTO approved schools adopt organized curriculums which make you confident on the road. By joining one you would be investing on a skill for a lifetime. Here we shall discuss some of the benefits that you can draw out of such a driving school.<br /><br /><strong>Know the Rules</strong><br /><br />Roads and vehicular movements are governed by rules and you need to be aware of them to prevent violations. There are dozens of rules related to driving in different kinds of road, lane discipline, traffic signs etc. Add to it the variations among different regions and provinces and it can be quite a tough task. Though you might be aware of some of these you need to know all of them to be able to drive a vehicle. A professional school would conduct in-house training sessions where you would be taught about these rules on details. They would also follow this up during the in-vehicle training.<br />&nbsp;<br /><strong>Overcome Nervousness</strong><br /><br />When you are sitting behind the wheels of a car for the first time you would be nervous. This is quite common and perhaps necessary to prevent you from becoming over-confident. But you need to gradually overcome this nervousness and this where joining driving classes is beneficial. An experienced trainer would put you through the paces gradually and help you become confident. During the in-vehicle training having a professional instructor by your side acts as a huge psychological boosts.<br /><br /><strong>Defensive/Pro-Active Driving</strong><br /><br />Let’s put it straight, the roads aren’t safe. There are many drivers with bad driving habits all around you. This is where defensive or pro-active driving skills come into play. Driving schools would train you in these skills which helps in preventing collisions and keeping you and other occupants in the vehicle safe. They would simulate different kinds of scenarios and teach you the dos and the don’ts in such situations. You would be trained to react in emergency situations without losing your calm and bring your car to a halt.<br /><br /><strong>Insurance Discount Eligibility</strong><br /><br />Each year you would need to pay a high insurance premium to drive on the road. What if you were to get a discount on this? Undergoing training in an MTO approved school makes you eligible for insurance discounts. You would be issued a discount certificate which is easily redeemable. It is as much a monetary gain as it is a stamp on your driving skills. A trained driver is considered safer behind the wheels and less likely to cause an accident on the road and thus insurance firms would lower your premiums. This is substantial saving and within a few years you would be able to recover the course fee you would pay at the school.<br /><br />As mentioned earlier it is a skill for a lifetime and you shouldn’t compromise on the quality of the training at any cost. Make sure the school where you enrol yourself for the course is certified by the Ministry of Transportation, Ontario.</p> http://www.enterprisecioforum.com/en/blogs/richardmanning/driving-classes-toronto-make-you-confide#comments Business Issues Services Blog-post driving classes in Toronto driving classes Toronto Driving School Tue, 09 Sep 2014 06:05:18 +0000 Richard_Manning 9821 at http://www.enterprisecioforum.com CIOs: How does your CFO look at data? http://www.enterprisecioforum.com/en/blogs/mylessuer/cios-how-does-your-cfo-look-data <p>According to the Financial Executives Institute, CFOs say their second highest priority this year is to harness business intelligence and big data. Their highest priority is to improve cash flow and working capital efficiency and effectiveness. This means CFOs highest two priorities are centered around data. At roughly the same time, KPMG has found in their survey of CFOs that 91% want to improve the quality of their financial and performance insight obtained from the data that they produce. Even more amazing 51% of CFO admitted that “collecting, storing, and retrieving financial and performance data at their company is primarily accomplished through a manual and/or spreadsheet-based exercise”. From our interviews of CFOs, we believe this number is much higher.</p><p><strong>Digitization increasing but automation is limited for the finance department</strong></p><p>Your question at this point—if you are not a CFO—should be how can this be the case? After all strategy consultants like Booz and Company, actively measure the degree of digitization and automation taking place in businesses by industry and these numbers year after year have shown a strong upward bias. How can the finance organization be digitized for data collection but still largely manual in its processes for putting together the figures that management and the market needs?</p><p><strong>CFOs do not trust their data</strong></p><p>In our interviews of CFOs, one CFO answered this question bluntly by saying “If the systems suck, then you cannot trust the numbers when you get them.” And this reality truly limits CFOs in how they respond to their top priorities. Things like management of the P&amp;L, Expense Management, Compliance, and Regulatory all are impacted by the CFOs data problem. Instead of doing a better job at these issues, CFOs and their teams remain largely focused on “getting the numbers right”. And even worse the answering of business questions like how much revenue is this customer providing or how profitable this customer is, involves manual pulls of data today from more than one system. And yes, similar data issues exist in financial services which closes the books nightly.</p><p><strong>CFOs share openly their data problem</strong></p><p>The CFOs, that I have talked to, admit without hesitation that data is a big issue for them. These CFOs say that they worry about data from the source and the ability to do meaningful financial or managerial analysis. They say they need to rely on data in order to report but as important they need it to help drive synergies across businesses. This matters because CFOs say they want to move from being&nbsp; just “bean counters” to being participants in the strategy of their enterprises.</p><p>To succeed, CFOs say that they need timely, accurate data. However, they are the first to discuss how disparate systems get in their way. CFOs believe that making their lives easier starts with the systems that support them. What they believe is needed is real integration and consolidation of data. One CFO said what is needed this way, “we need the integration of the right systems to provide the right information so we can manage and make decisions at the right time”. CFOs clearly want to know that the accounting systems are working and reliable. At the same time, CFOs want, for example, a holistic view of customer. When asked why this isn’t a marketing activity, they say this is business issue that CFOs need to help manage. “We want to understand the customer across business units.&nbsp; It is a finance objective because finance is responsible for business metrics and there are gaps in business metrics around customer. How much cross sell opportunities is the business as a whole pursuing?”</p><p><strong>Chief Profitability Officers?&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong></p><p>Jonathan Brynes at the MIT Sloan School confirms this viewpoint is becoming a larger trend when he suggests that CFOs need to take on the function of “Chief Profitability Officers”. With this hat, CFOs, in his view, need to determine which product lines, customers, segments, and channels are the most and the least profitable. Once again, this requires that CFOs tackle their data problem to have relevant, holistic information.</p><p><strong>Target considered a watershed event by CFOs</strong></p><p>CFOs are worried as well about data security. One CFO said to me that they need to know that systems are always working properly. Security of data is more and more important. Because of its clear material impact, the auditors are going after this as part of their regular compliance audits. CFOs say they are really worried about getting hacked. “This is a whole new direction for us, but Target scared a lot of folks and was to many respects a watershed event”.</p><p>With this said, CFOs believe that CIOs remain responsible for how data is delivered. CFOs, however, say they need to lead in creating validated data and reports. Clearly, if this remains a manual process, then the CFO will be severely limited in their ability to adequately support their new and strategic charter. Yet CFOs when asked if they see data as a competitive advantage say that “every CFO would view data done well as a competitive advantage”. Some CFOs even suggest that data is the last competitive advantage. This fits really well with the view of <a href="http://blogs.informatica.com/perspectives/2014/08/22/competing-on-analytics-a-follow-up-to-thomas-h-davenports-post-in-hbr/#fbid=nL6vd61grIg" rel="nofollow">Davenport in “Competing on Analytics”</a>. The question is how soon will CIOs and CFOs work together to get the finance organization out of its mess of manually massaging and consolidating financial and business data.</p><p><strong>Related links</strong></p><p><strong>Solution Brief</strong>: <a href="http://www.informatica.com/us/vision/intelligent-data-platform/#fbid=6HpVUXgm3ow" rel="nofollow"><strong>The Intelligent Data Platform</strong></a></p><p><strong>Related Blogs</strong></p><p><a href="http://blogs.informatica.com/perspectives/2014/07/07/how-cfos-can-change-the-conversation-with-their-cio/#fbid=nL6vd61grIg" rel="nofollow">How CFOs can change the conversation with their CIO?</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/06/30/new-type-of-cfo-represents-a-potent-cio-ally/#fbid=nL6vd61grIg" rel="nofollow">New type of CFO represents a potent CIO ally</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/08/22/competing-on-analytics-a-follow-up-to-thomas-h-davenports-post-in-hbr/#fbid=nL6vd61grIg" rel="nofollow">Competing on Analytics</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/06/25/the-business-case-for-better-data-connectivity/" rel="nofollow">The Business Case for Better Data Connectivity</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/07/31/is-big-data-destined-to-become-small-and-vertical/" rel="nofollow">Is Big Data Destined To Become Small And Vertical?</a></p><p><a href="http://blogs.informatica.com/perspectives/2014/05/27/what-is-big-data-and-why-should-your-business-care/" rel="nofollow">What is big data and why should your business care?</a><strong></strong></p><p><strong>Twitter</strong>: <a href="https://twitter.com/MylesSuer" rel="nofollow"><strong>@MylesSuer</strong></a><strong></strong></p> http://www.enterprisecioforum.com/en/blogs/mylessuer/cios-how-does-your-cfo-look-data#comments CIO Leadership IT Performance Blog-post CFOs CIOs Data Trust FEI KPMG Mon, 08 Sep 2014 15:34:00 +0000 myles.suer 9816 at http://www.enterprisecioforum.com Pinning down a definition for converged infrastructure http://www.enterprisecioforum.com/en/blogs/jdodge/pinning-down-definition-converged-infras <p>I have seen studies that forecast the coverged infrastructure (CI) market to be between <a href="http://www.crn.com/news/data-center/240155540/converged-infrastructure-bets-are-in-where-are-they-paying-off.htm" rel="nofollow">$17.2</a>&nbsp;billion and <a href="http://wikibon.org/wiki/v/Converged_Infrastructure_Takes_the_Market_by_Storm" rel="nofollow">$402 billion</a> over roughly the same time frame (by 2016 or 2017).</p><p>Such a variance speaks to the confusion about converged infrastructure. Convergence, after all, isn't new. Converging and integrating technologies has been an IT goal for decades. You're just never finished doing it. Data center consolidation has long been part of that movement.</p><p>So trying to find a univerally accepted definition that puts new shine on old idea can be challenging. Here's a few:</p><p>"<a href="http://en.wikipedia.org/wiki/Converged_infrastructure" rel="nofollow"><strong>Converged infrastructure</strong>&nbsp;operates</a> by grouping multiple&nbsp;<a title="Information technology" href="http://en.wikipedia.org/wiki/Information_technology" rel="nofollow">information technology</a>&nbsp;(IT) components into a single, optimized computing package." Wikipedia</p><p>I like this one because it's blissfully brief, but isn't this what data center admins have strove for since server time immemorial? I think so.</p><p>Try this one from <a href="http://wikibon.org/wiki/v/Wikibon:About" rel="nofollow">Wikibon</a>, a consulting concern.</p><p>"Converged infrastructure (CI) is an integrated set of compute, storage, and networking components with infrastructure management software that provides a single logical chunk of hardware and software that is either specifically engineered together or at the very least tested and proven in a variety of configurations and applications. Converged infrastructure simplifies hardware and software management and accelerates the deployment of infrastructure for private clouds."</p><p>A bit more wordy, but not bad. I just wonder if CI always includes the applications. But again, haven't data center admins been trying to shut down silos and create "a single, optimized computing package (s)" all along?"</p><p>Here's an intriguing <a href="http://searchdatacenter.techtarget.com/definition/converged-infrastructure" rel="nofollow">one from TechTarget</a> that not so subteley suggests vendor lock in. &nbsp;</p><p>"CI is an apporach to data center management that relies on a specific vendor and the vendor's partners to provide pre-configured bundles of hardware and software in a single chassis."</p><p>This one should set off alarm bells. It's reminiscent of the old mainframe days where everything came one big vendor starting with the letter I.</p><p>Which one is your favorite? There's plenty more out there. &nbsp;</p><h2 class="definition-subtitle">&nbsp;</h2> http://www.enterprisecioforum.com/en/blogs/jdodge/pinning-down-definition-converged-infras#comments Business Issues Cloud Converged Infrastructure Blog-post CIO Converged Infrastructure IT IT silos servers storage Mon, 08 Sep 2014 13:31:32 +0000 jdodge 9811 at http://www.enterprisecioforum.com Mobile access to the enterprise essential http://www.enterprisecioforum.com/en/blogs/jdodge/mobile-access-enterprise-essential <div class="field field-type-text field-field-ss-subtitle"> <div class="field-items"> <div class="field-item odd"> CIO must evaluate security implications. </div> </div> </div> <p>Yesterday's Twitter chat focused on the balancing act between mobile access and security. Most agree that mobile workers must be given acccess to perform their jobs. Others weighed mobile access in terms of business value: if there's value in access, it must be given.&nbsp;</p> <p>With that in mind, the Tweets of the week came from CIO Wilfredo Lasalle (@wlassalle). There's two:&nbsp;</p> <p><span>"The attention to BYOD mattered when it was wanted by the users/business. Now the CIO needs to manage its security implications."</span></p> <p><span>I take this to mean BYOD is here to stay so CIOs have to figure out the security implications and then act accordingly. Of course, that could be banning BYOD altogether although no one in the chat (33 participants, 233 Tweets) expressed such an extreme view.</span></p> <p><span>Here's Tweet two: &nbsp;</span></p> <p><span>"</span><span style="line-height: 1.4em;">I really don’t see demand for BYOD w/phones much anymore. I see it more with iPads the last few years."</span></p> <p><span style="line-height: 1.4em;">I interpret this to mean serious work is being performed in the mobile galaxy given that the tablet is a more able device than a smart phone. That said, HP Fellow Charlie Bess noted (@cebess) that he could foresee a day when most data are on mobile devices like smart phones.</span></p> <p><span style="line-height: 1.4em;"><span>"In a few years we will likely have the capability for TB of data on mobile devices -- how will this shift the problem?"</span></span></p> <p><span style="line-height: 1.4em;">As you can tell, it was robust #CIOchat as always. We chat every Thursday 2-3 p.m. ET, hashtag #CIOchat. Please join us.</span></p> <p><span style="line-height: 1.4em;">Here's a couple of noteworthy conversations.</span></p> <p><em><strong>Conversation one - "An illusion of control"&nbsp;</strong></em></p> <div class="_previousTweets previousMessages"> <div class="_comment comment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F436895924162265088%2FduBYQ88K_normal.png" alt="cebess" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="cebess" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">cebess</a><span style="line-height: 1.4em;">: I think most people learned that once you can get to the console, no system is secure.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:20pm, Sep 04 from TweetChat powered by oneQube</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="cebess" class="_userInfoPopup" style="line-height: 1.4em;">cebess</a><span style="line-height: 1.4em;">&nbsp;Just ask Jennifer Lawrence.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:21pm, Sep 04 from Hootsuite</span></div> <div class="_comment comment"><img src="https://d1cmhiswqj5a7e.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F2625360156%2Fwgfzywthhifyjqqijq7h_normal.jpeg" alt="ChrisNerney" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="ChrisNerney" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">ChrisNerney</a><span style="line-height: 1.4em;">: RT&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="cebess" class="_userInfoPopup" style="line-height: 1.4em;">cebess</a><span style="line-height: 1.4em;">&nbsp;Just ask Jennifer Lawrence.</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span style="line-height: 1.4em;">&nbsp;Is she joining us?</span><span class="date" style="line-height: 1.4em;">2:21pm, Sep 04 from TweetChat powered by oneQube</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="ChrisNerney" class="_userInfoPopup" style="line-height: 1.4em;">ChrisNerney</a><span style="line-height: 1.4em;">&nbsp;Well, I asked.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:23pm, Sep 04 from Hootsuite</span></div> <div class="_comment comment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F378800000838421179%2Fe15e7fe3c944e2a52de64febc4a8cd2e_normal.jpeg" alt="zslayton" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="zslayton" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">zslayton</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;She's busy switching to dropbox.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span class="date" style="line-height: 1.4em;">2:26pm, Sep 04 from TweetDeck</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="zslayton" class="_userInfoPopup" style="line-height: 1.4em;">zslayton</a><span style="line-height: 1.4em;">&nbsp;It will be interesting to see how the celeb photo breach plays out.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:28pm, Sep 04 from Hootsuite</span></div> <div class="_comment comment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F436895924162265088%2FduBYQ88K_normal.png" alt="cebess" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="cebess" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">cebess</a><span style="line-height: 1.4em;">: .</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;Do you think there will be more or less. Remember what Mae West said&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:29pm, Sep 04 from TweetChat powered by oneQube</span></div> <div class="_comment comment originalComment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F436895924162265088%2FduBYQ88K_normal.png" alt="cebess" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="cebess" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">cebess</a><span style="line-height: 1.4em;">: A3 - actually I think BYOD has moved on from being 'managed'. Most only have an illusion of control.&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:32pm, Sep 04 from TweetChat powered by oneQube</span></div> <div><em><strong>Conversation two - "Just get two phones"</strong></em></div> <div class="_comment comment originalComment"> <p class="_baseTweetText _tweetText messageContent"><br /><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F459794644738404353%2F9UjgqvEb_normal.png" alt="wlassalle" style="line-height: 1.4em;" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="wlassalle" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">wlassalle</a><span style="line-height: 1.4em;">:&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span style="line-height: 1.4em;">&nbsp;A2 the attention to BYOD mattered when it was wanted by the users/business. Now the CIO needs to manage its security implications.</span><span class="date" style="line-height: 1.4em;">2:35pm, Sep 04 from TweetDeck</span></p> <div class="_previousTweets previousMessages"> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F426180744856092672%2FZWu4Kl5H_normal.png" alt="Thedodgeretort" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="wlassalle" class="_userInfoPopup" style="line-height: 1.4em;">wlassalle</a><span style="line-height: 1.4em;">&nbsp;Indeed. How do you handle it as a CIO? Do you see a lot of BYOD?&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:37pm, Sep 04 from Hootsuite</span></div> <div class="_comment comment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F459794644738404353%2F9UjgqvEb_normal.png" alt="wlassalle" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="wlassalle" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">wlassalle</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="Thedodgeretort" class="_userInfoPopup" style="line-height: 1.4em;">Thedodgeretort</a><span style="line-height: 1.4em;">&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOChat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOChat</a><span style="line-height: 1.4em;">ever since orgs started offering iPhones/Droids as corp phone choices i’ve seen BYOD on phones drop.</span><span class="date" style="line-height: 1.4em;">2:40pm, Sep 04 from TweetDeck</span></div> <div class="_comment comment"><img src="https://d2zfw9brtww0cv.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F436895924162265088%2FduBYQ88K_normal.png" alt="cebess" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="cebess" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">cebess</a><span style="line-height: 1.4em;">: .</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="wlassalle" class="_userInfoPopup" style="line-height: 1.4em;">wlassalle</a><span style="line-height: 1.4em;">&nbsp;Does that mean they don't use the 'work' device as their personal phone???&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="CIOchat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#CIOchat</a><span class="date" style="line-height: 1.4em;">2:42pm, Sep 04 from TweetChat powered by oneQube</span></div> <div class="_comment comment originalComment"><img src="https://df9hgdowc06if.cloudfront.net/http%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F459794644738404353%2F9UjgqvEb_normal.png" alt="wlassalle" class="networkAvatar" /><a href="https://hootsuite.com/dashboard#" title="wlassalle" class="_username networkName _userInfoPopup" style="line-height: 1.4em;">wlassalle</a><span style="line-height: 1.4em;">:&nbsp;</span><span class="at" style="line-height: 1.4em;">@</span><a href="https://hootsuite.com/dashboard#" title="cebess" class="_userInfoPopup" style="line-height: 1.4em;">cebess</a><span style="line-height: 1.4em;">&nbsp;</span><a href="https://hootsuite.com/dashboard#" title="ciochat" class="_quickSearchPopup hash" style="line-height: 1.4em;">#ciochat</a><span style="line-height: 1.4em;">&nbsp;however most just get two phones like me. The $50-80/month for most is not a big deal.</span><span class="date" style="line-height: 1.4em;">2:46pm, Sep 04 from TweetDeck</span></div> <div class="_comment comment originalComment"><em><span class="date" style="line-height: 1.4em;">Follow <a href="http://www.twitter.com/ecioforum">@ecioforum</a> and <a href="http://www.twitter.com/thedodgeretort">@thedodgeretort</a></span></em></div> </div> </div> <div class="_comment comment originalComment"> <div class="_previousTweets previousMessages"> <div class="_comment comment"> <p class="commentContent">&nbsp;</p> </div> </div> </div> </div> http://www.enterprisecioforum.com/en/blogs/jdodge/mobile-access-enterprise-essential#comments Business Issues Mobility Security Blog-post ByoD CIO IT mobile security smart phone Tablet Twitter Fri, 05 Sep 2014 14:46:55 +0000 jdodge 9806 at http://www.enterprisecioforum.com