Step 1 – Over commit and under deliver. Large corporations are seeking ways to drive their cost models down in the market place today by using Cloud based services. Bespoke outsourcing is not a Cloud based delivery model and yet many large Outsourcing companies are billing their services this way to large enterprise. Committing a custom delivery for thousands of subscribers with thousands of applications will lead to a higher cost model and lower customer satisfaction. If you are a Service Provider, better to start with a catalog of applications and meet the needs of the SMB first, then move up stream to the larger businesses. Migration of subscribers from large enterprise into a cloud data center is very time consuming.
Step 2 – If you build it they will come. Cash is king… it always has been so why develop an environment spending tens of millions of dollars/euros unless you have adequately done the research for who needs what and where. Looking at IaaS purchases in the last three years should give a clue. How many of these purchases (buy vs. build) have led to the success in cloud delivery of services? Again, Service Providers should develop a business model based on the demand for apps, desktops and data in the SMB and stoke your cash flow engine before sinking huge capital costs in data centers?
Life as a Chief Compliance Officer is not so easy. The job, as defined, means living with day-to-day risks, any one of which is significant enough to damage or even destroy the company for whom you work. CCOs learn to live with risk.
When a CCO has the backing of the board and the CEO, their job is relatively easier. That does not mean it is an easy job. To the contrary, every CCO has their challenges in their company to secure adequate resources, to gain the cooperation of other business components, and to persuade senior managers and employees that ethics and compliance is important to the company bottom line.
The inherent difficulty for the CCO is to demonstrate his or her importance to an organization by proving a negative – we have not had any serious law violations because of the existence of the company’s ethics and compliance program. That is a hard argument to make, but luckily it is intuitive and it naturally appeals to intelligent senior managers and a CEO.
Struggling with what comes after “instant news,” I’ve tried to come up with a way of describing the dramatic change in real time information sharing that was powerfully demonstrated in the Boston manhunt. For better or worse, I’m using “NanoNews” to describe it.
I created a video in lieu of an in-person presentation I was invited to make at the National Capital Region’s Social Media in Emergencies conference. That presentation was just concluded so now I’m sharing this with you.
In 2001, when I wrote the first version of “Now Is Too Late: Survival in an Era of Instant News” I used the term instant news to help communicate that news cycles were gone, that as fast as news helicopters could get overhead the news of your event or disaster would be live on the air. I was thinking of the ubiquitous breaking news as well as the already emerging trend of sharing information via the Internet—at that time primarily through email.
But compared to the “instant news” we have today, “breaking news” corresponds more to snail mail. It’s practically dead and gone, and not just through over-use. When millions are tuned into the police scanner chatter broadcast live through Ustream or converted into a Reddit thread using websites like Broadcastify or scanner apps like 5_0 Scan, it’s obvious that breaking news can’t keep pace. By the time even the fastest news crews get the information from such sources, and relay it, it will be minutes old—and minutes old is unacceptable when you could have real time information.
Enterprises are struggling to understand the risk and privacy impacts of the mobile applications in use in their environment. As the consumerization of mobile continues to shove BYOD into the enterprise, the number of applications in use is growing exponentially. Organizations must get a better handle on just how much risk is accumulating from the proliferation of mobile apps on their user’s devices.
I'm currently researching a concept designed to help an enterprise know where they are on the mobile application security maturity curve. Understanding where one currently resides is the quickest method to determine the path required to improving your standing in the future.
For businesses, going green often means cost savings. Nowhere can this be truer than in the area of IT. Smaller, more efficient computers and servers, cloud computing and even advancements in software can bring about significant budgetary and carbon-footprint savings for the business. This brings many companies to start thinking about creating greener data centers.
But where and when do you begin to adopt greener policies? How do you know what to buy?
The book “Green Computing: Tools and Techniques for Saving Energy, Money, and Resources,” by Bud E. Smith provides an in-depth look at green IT initiatives. It begins by explaining why a company should go green, and then continues with chapters that give detailed explanations on cost savings, environmental drivers and climate change issues. Other chapters give informative looks into:
I remember the first time I heard the terms “business intelligence” and “analytics.” Business. Intelligence. Yep, that was something I could get behind.
Then I figured out that it really amounted to business statistics, automated to a certain extent by a computer. It was a bit of a bummer, really.
It seems the term "data science” is likewise overrated.
IT consultant Robin Bloor, in a fabulous piece, points out that there’s really no such thing as “data science.” In fact, what we’re calling data science has very little to do with science and everything to do with mathematics — specifically, statistics.
“If you are already tired of the term ‘big data,’ but not yet tired of the term ‘data science,’ let me help you get there as swiftly as possible,” Bloor writes. “If there were a particular activity devoted to studying data, then there might be some virtue in the term ‘data science.’ And indeed there is such an activity, and it already has a name: it is a branch of mathematics called statistics.”
Software audits are an irritating and time consuming part of life.
To survive one unscathed you'll need a thorough understanding of your licensing requirements.
'IT executives being thrown into prison' is the usual battle cry of software industry bodies such as the BSA and FAST (despite no executive going to prison in my knowledge in the last 15 years).
The more realistic pain of software audits is unbudgeted cost and distraction from delivery of projects. It takes time to defend an audit; to collect the appropriate data and documentation - precious time that should have been spent focusing on business priorities.
Microsoft, Oracle, Adobe, IBM, SAP, Attachmate and other large software publishers regularly audit their customers. Research with ITAM Review readers in the past suggest that, faced with a vendor audit, Microsoft are said to be most helpful, and Oracle least helpful.
There is no question that we are becoming more visually oriented in our approach to thinking today. You can see it in the increasing numbers of PowerPoint presentations given with the admonition that fewer words will suffice. You can see it in the increase in infographics, catchy photographs, and pictorial slogans that continue to spread across social media. And you can see the result in BI dashboards and an increasing array of visually oriented approaches to the display, digestion, and understanding of data. It is no wonder, then, that visual discovery tools should emerge as an important and rapidly growing part of BI.
Visual discovery tools are applications that typically enable non-analyst users to “play” with relationships between data items and explore an array of hidden possibilities that might yield interesting trends. They are available in some form from every major BI vendor, with a few pure play solutions leading the way. Current leaders are QlikView, Tableau, and TIBCO Spotfire, although rankings are somewhat obscured by increasing incorporation of this capacity in larger BI solutions.
Computerworld — While online data storage services claim your data is encrypted, there are no guarantees. With recent revelations that the federal government taps into Internet search engines, email and cloud service providers, any myth about data "privacy" on the Internet has been busted.
Experts say there's simply no way to ever be completely sure your data will remain secure once you've moved it to the cloud.
"You have no way of knowing. You can't trust anybody. Everybody is lying to you," Security expert Bruce Schneier said. "How do you know which platform to trust? They could even be lying because the U.S. Government has forced them to."
While providers of email, chat, social network and cloud services often claim -- even in their service agreements -- that the data they store is encrypted and private, most often they hold the keys, not you. That means a rogue employee or any government "legally" requesting encryption keys can decrypt and see your data.
Partnership Helps Boston-Area Venture Capital Firms with Data Backup and Business Continuity
Baton Rouge, LA – Venyu, a leading provider of cloud services, business continuity and battle-tested data recovery solutions, today announced its partnership with Coretelligent, a provider of world-class IT services to the small- to mid-sized business market. The partnership enables Coretelligent to bring Venyu’s award-winning data backup services to venture capital (VC) investment firms in New England and California’s Bay area to better secure and protect their critical information.
Coretelligent is leveraging Venyu’s RestartIT® – a battle-tested cloud data backup and recovery platform specifically designed to quickly recover data lost to disasters, outages, or common IT network disruptions. Venyu helped pioneer the online data backup industry as one of the first service providers 13 years ago, and services Fortune 100 companies, small to medium enterprises, and state governments across the country.
Ensuring VC firms have the ability to backup and restore company files as well as individual emails is essential to their business. Kevin Routhier, Coretelligent Founder and CEO, explains more.
“The VC community has exacting standards when it comes to backing up their email and critical data,” Routhier said. “Venyu’s best in class offering is a perfect complement to Coretelligent’s white glove, concierge-approach IT services-- their technology and support has been 100 percent bulletproof.”
“We take great pride in supporting Coretelligent’s meticulous IT service work, and helping them expand their VC and financial market penetration,” said Scott Thompson, Chief Executive Officer, Venyu. “They know they can count on the protection and rapid recovery of their clients’ data through our RestartIT cloud data backup service.”
Coretelligent provides comprehensive IT support and managed services to help small and mid-sized businesses seamlessly power and grow their businesses. Since its founding, Coretelligent has consistently focused on the success of its clients, delivering unprecedented service and support in order to meet their needs and achieve their goals. Coretelligent is proud to have earned the reputation as a trusted advisor from some of the most demanding clients from a broad range of industries.
Venyu is a premier provider of data center, managed hosting, cloud, virtualization and data protection solutions. By leveraging Venyu's portfolio of innovative, ROI-focused solutions, including VenyuCloud and RestartIT within secure, highly available data centers, organizations can reduce IT costs while increasing security and scalability. For more information about Venyu and its industry-leading offerings, please visit www.venyu.com. Your Data Made Invincible™.