Tag Archive | "Cloud Computing"

Big Data or Big Brother? Security – Value Analytics – Privacy?

Tags: Analytics, Best Practices, Big Data, BSM, Business Alignment, Business Service Management, CIO, Cloud, Cloud Computing, Facebook, GPS, Healthcare, Huff Post Live, IDC, InformationWeek, IT Management, Privacy, RFID, Security, Social Media, WSJ


I know I have been quiet for the previous month, I took a little vacation and started becoming more attune to the discussion surrounding data, analytics, security, privacy and the value of our technologically connected world. First we have to rewind to the end of August when I had my first opportunity to discuss and explore the privacy discussion surrounding the use of technology and data to enrich our lives and business on Huff Post LiveGet off my Cloud:  Floating the Risks of Big Data Storage ” (previous Qmunity post, Cloud Discussion:  Data Privacy, Availability and Performance on Huff Post Live). All of this technology sits on vast amounts of data that awaits being cracked open whether it be healthcare, location & GPS, marketing attendance, safety, cellular, data services, etc. the list is endless.

When I responded to a request to be on a panel with Huff Post Live, my mind was in my usual place of availability and performance of technology, not data privacy.  As I stated during the discussion, I firmly believe if you use technology and electronically push information about yourself into the public, it is searchable and accessible.  The first conclusion is to jump directly to privacy and someone monitoring/watching our every move. This is also driven by the folks taking the first stab at using these vast stores of data for what I’ll call “tracking” purposes. This is usual technology behavior, let’s track things and manage our known environment better rather than coming at it from a side of value and a value-add services. Ok, let’s take a few specific examples.

Social Media:
The simplest is Facebook. I’ve had the discussion with colleagues and friends about the accessablity to this information, let’s say when you are seeking employment or acceptance into a program. If it is public,  why shouldn’t it be accessable and why wouldn’t you expect it to be searched? I do a regular search on myself to see what shows up as we have long expected background checks to be performed in the past, this is just part of a background check. If you have something questionable, why would you publish it? I was a late bloomer to the world of Facebook and social media for this reason of privacy, but it wasn’t because I didn’t understand the risk, it was because I didn’t understand how to secure and use it properly. However, I use my credentials and name as it is part of building my own brand and credibility very regularly when I publish and comment and thus how I end up on panels like Huff Post Live. I look at the value and positive side of participating in the conversation, managing and using my credentials accordingly. I do recognize it is on me to manage the data and thus how it could be subsequently used.

Healthcare:
While on vacation in the local paper, cayCompass.com, there was an article regarding a new healthcare facility and the technology going into it to provide higher levels of healthcare to the residents. One of the discussion points was doctors using data to better diagnose patients. Again, the article took the negative side first regarding the “must use” the technology for a diagnosis. I’m not sure I want to remove the human subjective element from my doctor, however, I would welcome the use of my history and an all encompassing view of my current condition, weighing that against a database of possibilities that no human could carry with them daily, to make a better diagnosis. Why not make use of being able to carry that encyclopedia of information around with you to deliver better patient care? Again, the value side of the equation versus the“monitoring” of the physicians side of the equation. Both are useful and valuable.

Earlier this week in InformationWeek, there was an article titled, “Healthcare Execs Must Prepare for Big Data“, where the same discussion continues as well as knowing the location of patients, doctors, equipment to insure a safer environment and getting people and equipment where it is most needed. I most enjoyed the Wayne Gretzky quote: “A good hockey player plays where the puck is. A great hockey player plays where the puck is going to be.”  We have embraced technological advances to assist in healing us faster, making surgery less invasive and remeding illnesses that just a decade ago were less treatable. Why is using the vast amounts of data for split second decisions any different?

 

GPS:
There are several technologies that fall into this category. The two that caused alarm and again I would suggest it is because it was hyped against the tracking feature as the initial focus versus the value it brings to the table. On Huff Post Live this week,  “Texas School District Reportedly Threatening Students Who Refuse Tracking ID, Can’t Vote For Homecoming, with the crux of the discussion being the embedding of an RFID chip into school ID cards to be used for tracking attendance and insuring that funding continues to the schools. This is useful, but not the value to the public and causes debate. How many of you ever punched a time clock? I have on multiple occasions, well that was an early and crude form of attendance monitoring / tracking. Why is it now that we can use technology to more accurately track and rapidly assess to take action of value with the data different?

Flip the debate and think about some of the most tragic incidents that have occurred in our schools in the last decade and one that is close to home for me at VA Tech. When I was in school, we roamed campus freely including all of the buildings. We didn’t have cell phones, we knew our dormmates, we phoned each other on land lines, we had an idea of where those close to us were, we stuck together in groups and I knew I could phone one of the boys from the dorm to meet me and walk me back to the dorm in the dark if I got stuck somewhere alone and felt unsafe. So again, I challenge folks not to just look at it from a tracking standpoint, but from a ease of security standpoint. Who’s in the building? Where are my kids? Did they make it to the bus? The list goes on.

During my discussion on Huff Post Live it was more around the use of cellular data. I watched a television segment recently on the tracking of license plates and taking pictures of cars around a city with the purpose being repossession. Again, under ordinary situations, no one is tracking the ordinary. Under stressful situations, it can assist in regaining a safe situation and uncovering details that might not have been available previously.

We could go on for hours with this one as it generates the most debate, however, we all have location tracking in our cell phones and tablets. We like to be able to sound an alarm or find our device, pinpoint a good restaurant, provide directions in a pinch, the list is endless. There is great value in using the technology and data and we use it everyday whether consciencously or not.

Marketing:
In the Wall Street Journal earlier this week the article, “Big Brother, Now at the Mall, discussed how a mall kiosk is using facial recognition software to estimate sex and age to present advertisements to those seeking information. This is using data to drive value to both the consumer and the retail organizations. This has been going on for a very long time. How many rewards cards do you carry and use? The ability to present items to you has been happening here for quite a while. If this use of data is troublesome, stop using the cards for the points / discounts and asking for assistance. However, the value is to both the organization and us as consumers in finding items that might interest us more than others and stocking retail organizations with items more in tune with the demographics of the location and patron buying patterns. Again, let’s seek the value in the technology and stop jumping to the Big Brother conclusion, but the answer is always simple, don’t use the technology.

Security:
I’ll end with this final article also from this week’s Wall Street Journal“House Report On Huawei, ZTE Will Pose Security Questions For CIOs”. The article suggests that a manufacturer of a cellular device is collaborating for purposes of espionage. Whether the threat is true or not, it points out the very real requirements to take security and use of data and devices very seriously in our organizations and plan for it appropriately. This week Sally Hudson, Security Research Director, of IDC and a colleague of mine, Tom Crabb, Senior Product Marketing Manager, presented a webinar, Security Access Governance and the New Normal”, on this topic of knowing who, where, why, etc. is accessing data you own and for what purpose as the perimeter has widened over night and is extremely fluid. They discuss the risks and how to best secure your data. Ensuring you have secured your data then enables you to leverage that data with analytics in powerful ways to drive competitive advantage into your organization.

This is only the tip of the iceberg of the possibilities that lie ahead in our digital world. As IT professionals, we must constantly think of security, build it into our services, use of data and the value we can provide to our customers everyday. Technology, including the use of big data, will drive competitive advantage and the next generation of innovation, but it must be used, managed and secured wisely.

Finally, “Technology without Imagination – Commodity — Technology with Imagination – Endless  Possibilities” is something I firmly believe and we have all benefited. I challenge this coming wave of technologists to not make the mistake of the past in first applying the use of big data technology as inward focused analytics, but seek how to create value first and secure / manage it appropriately.

Cloud Discussion: Data Privacy, Availability and Performance – Huff Post Live

Tags: Availability, Big Data, BSM, Business Alignment, Business Service Management, CIO, Cloud, Cloud Computing, IT Management, Privacy, Security, Transformation, Trends


I had the fantastic opportunity to participate in a live Cloud discussion: Get off my Cloud:  Floating the Risks of Big Data Storage on Huff Post Live during their inaugural week of going live with streaming news and discussions leveraging Google+ Hangouts to bring in live guests. This Cloud and technology thing might be catching on. A longstanding benefit of being a virtual worker is working in very casual wear not likely suitable for even the most casual of offices. After last week, I’m rethinking my morning routine and understanding how the home office is an extension of the overall virtual office after participating in and being live at a moments notice in a Google Hangout, or a Skype session, etc. with a webcam bringing us all together as if in the office. Oh, it’s a small world.

The host, Alyona Minkovski [ @AlyonaMink ], orchestrated a discussion with a live guest in the studio, John Villasenor, (Los Angeles, CA) [ @JohndVillasenor ] Professor of UCLA, and 2 of us via Google Hangouts, myself and John Warren (Seattle , WA). We bantered just 2 of the points to consider when seeking to leverage Cloud based services. The first was the privacy of data and who should control or define guidelines. Of course we all like to believe the service providers offer a level of security to the data that we share, but the onus of the security of your data is really on you the individual consumer or the business contracting the services. As a business, you can safe guard to some degree with contracts and defined services and service levels regarding security and penalties for breaches, however, the more risk and more scrutiny to customize the service forced upon the service provider, the higher the cost of the service. This is why I speak of categorizing your services. The commodity is the low hanging fruit to take advantage of external service providers.

Another twist to this is law enforcement and how much should they have access to via a subpeona. If your computer and records were in your home, they would subpeona access to the data to solve a crime, thus there is the ability to subpeona the service provider to hand over data – Check out the new Australian law @NetIQ tweeted on earlier this week. The twist is how much can they request and how much will the service provider hand over. Certainly the service provider isn’t going to take the time on a request that is too wide and narrow down the data before handing it over. Again, the onus resides on the individual consumer and business to understand this and make the decisions of what they choose to externalize. There are pros and cons to both sides of this debate. There is a lot of hype about law enforcement monitoring transmissions and privacy, but the flip side to that debate is someone who has been stalked and taken advantage of by a predator. We would expect that all the evidence should be examined. This is one of those topics where I tread lightly; not going too deep on, like politics and religion. So I keep advice simple, turn off your GPS, location services on your phone, your Bluetooth and stay unplugged from the internet from a data perspective if you want to insure privacy, but you’ll also lose many capabilities that have enhanced our lives.

Another piece of the conversation touched upon availability of services, especially when your business depends upon those services. Again, categorizing your services to best understand what is the most important and therefore requiring an investment in higher levels of service is your road-map to success. The challenge today is that business has hit a boiling point with their internal IT departments at a time when the competition [Cloud Providers] is exploding, providing simple buying options and the business is making the purchases and growing the New IT within the business, without the IT department. The first challenge is that they have treated all services as if they were created equal with their in-house staff, not enabling them to create standards and different levels of service. However, now the providers will impose standards and their standard terms to gain the economies of scale of shared services. This is a good thing as all things ebb and flow and just as the pendulum swings to the side of the Cloud Providers currently, it with come back to a level state when costs escalate without controls in place. The second challenge is that the business doesn’t know what they don’t know regarding best practices for Disaster Recovery, redundancy and fail over to other providers, different geographies, etc. Read more in this previous post on Cloud Availability where I discuss this topic more fully. The point is the business is making emotional choices without the expertise to deploy these flexible options with the proper controls allowing them to reap the greatest reward from the technology.

The Transformation of IT is being driven largely in part by the cloud service providers and the options that are available today that were not available just a couple of years ago and what is old is new again, management of the technology to derive the greatest benefits.

Big Brother, Now at the Mall – Wall Street Journal

Tags: Big Data, BSM, Business Alignment, Business Service Management, CIO, Cloud, Cloud Computing, IT Management, Security, Transformation, Trends


This article discusses how a mall kiosk is using facial recognition software to estimate sex and age to present advertisements to those seeking information.  This is using data to drive value to both the consumer and the retail organizations.  This has been going on for a very long time.  How many rewards cards do you carry and use?  The ability to present items to you has been happening here for quite a while.  If this use of data is troublesome, stop using the cards for the points / discounts and asking for assistance.  However, the value is to both the organization and us as consumers in finding items that might interest us more than others and stocking retail organizations with items more in tune with the demographics of the location and patron buying patterns.  Again, let’s seek the value in the technology and stop jumping to the Big Brother conclusion, but the answer is always simple, don’t use the technology.

_______________________________________________

Shoppers at the new International Finance Center Mall in Seoul can find their way around the four-story complex by approaching one of 26 information kiosks. When they do, they also are being watched.

Kiosks at a Seoul mall, above, would use facial recognition software to decide what ads to present shoppers.  Just above each kiosk’s LCD touch screen sit two cameras and a motion detector. As a visitor is recorded, facial-identity software estimates the person’s gender and age.  Read More Here . . .

IT Transformation – Who Does Gartner Show Winning in the $3.6T IT Business? – Qmunity

Tags: Availability, Best Practices, BSM, Business Alignment, Business Service Management, CIO, Cloud, Cloud Computing, Cost Reduction, Forrester, Gartner, Innovation, IT Management, Service Value, Transformation


IT Transformation is and has been a hot topic for >20 years. Wow!  I was speaking to one of my analyst friends at Forrester not too long ago and we were chatting about how much waste exists in annual IT spend just “Keeping the Lights On” and how these metrics haven’t changed in >20 years. The answer has been simple, no competition, no catalyst for change.

This week I was reading an article from the NY Times Technology section, “Information Technology Spending to Hit $3.6 Trillion in 2012”, supported by information from Gartner and it pointed to this pent up demand for transformation within IT organizations. Much of the increase in spending is going to Cloud Service Providers and Consultancies even with economic challenges in Europe and China. There is an increase in Public Cloud spending by 20% representing considerable computing power and more efficient IT Systems due to complex systems, cloud computing and analytics. My reaction as I read the article was Wow again. Ironically, this comes on the heals of articles from the previous 2 weeks regarding the outage of the cloud and Amazon’s Ashburn, VA data center.

My first comment is no one outsources services because it is cheaper. Services are outsourced to create change that cannot be achieved from within. So let’s break this down into the great change that is underfoot and IT Transformation based upon cost, value and innovation.

Read full story here …….

Storm Cloud Busting – Service Enable Your Infrastructure – Qmunity

Tags: Amazon EC2, Availability, BSM, Business Alignment, Business Service Management, Cloud, Cloud Computing, DR, IT Management, Service Providers, Service Value, Transformation


I live in the Washington, DC metro area, specifically the 51st state – Northern VA or better known as NoVA.  Fortunately, I was not affected by the storms and power outages of a couple weeks ago.  However, Amazon and their Ashburn data center once again.  Once again, many of us social media users found the pain of the outage.

How many outages do we have to endure before these folks put together better monitoring and DR plans?  The outage begs the question of how important are these sites in the grand scheme of things as it relates to human life, power outages, tainted water and housing destruction during a storm.  My response is all in how you look at the situation.  One way to look at it is this is their business and livelihood, so DR should be relevant.  Another is that many of us use these sites during times of destruction to communicate with the rest of the world, not just for fun or business.

As a marketer and business persoin, I find it interesting none of them have found it a competitive advantage to have the best plan and be alive when their competition is down as Okta exclaimed over this last outage, but security is their business and they must be alive at all times to retain customers.

I’m excited about all of the change with technology underfoot, but control and flexibility must be weighed.

How are you preparing to manage your mixed environment?

Michele

___________________

Travis just posted, “Unlike the Weather, You Can Choose Your Cloud”, discussing the recent power outages we experienced here in the Northern VA area last week. As a native of this area, thunder storms and hurricanes do pass our way and affect us during this time of year. Late May of 2008, we had a storm very similar to this one and this isn’t the first Amazon outage, Amazon EC2 Outage Downs Reddit, Quora April 2011, nor will it be their last. Intuit’s SaaS QuickBooks was down 36 hours in June 2010, Update:  Intuit Sites Outage Strands Thousands of SMBsOr just this past Tuesday Salesforce.com was down, triggered by a power outage at an Equinix data center in Silicon Valley. Each time one of these outages occurs, it gains big headlines that the cloud has failed.  (Read more here …..)

Convergence is in the Air or Clouds – Qmunity

Tags: Availability, Best Practices, BSM, Business Alignment, Business Service Management, CIO, Cloud, Cloud Computing, Cost Reduction, Forrester, Gartner, IT Investment, IT Management, IT Management Tools, Outsourcing, Service Level, Service Providers, Service Value, Spending, Transformation, Trends


I have posted a couple of new posts on NetIQ’s Qmunity and wanted to share here as well.  IT is under great Transformation to get to Service Brokers who can manage Service Governance.  This is the convergences of Development, Operations and Security functions within IT.  In the first post I discuss the convergence and the second post is on the topic of Service Governance and new research from Forrester.

Enjoy!

 

 

Overhauling Service Management – Developing, Operating and Securing

Previously I posted, “Why Service Management” discussing the melding of IT and the business for common objectives in managing, measuring and communicating service performance.  The recent Gartner Infrastructure and Operations Management Summit (IOM) also provoked the status quo of IT Operations andCameron Haight began to challenge and discuss a new term, DevOps, where development and operations are more closely aligned.  The post event Trip Report provides a glimpse into the many thought provoking challenges and discussions of the week.  continue reading…

 

 Communicating Service Performance – Beware of the Competition

We’ve discussed service management and the transformation that IT is undergoing with the catalysts being the cloud, service providers, SaaS, social media, collaboration, mobility, BYOD, etc.  The root catalyst is choice and options in the market and the competition speaks in terms of service value and service performance. I posted a question in LinkedIn regarding how much of your services are in the cloud today and expected to be next year?  Join the discussion.  The first answer was as I expected, a law firm that isn’t in the cloud and isn’t going there because of security concerns.  I responded as I bet they use services that are internet based, research likely, and thus they are in the cloud.  Just like a recent customer discussed having hundreds of apps in the cloud that now need to be reconciled, rationalized and managed for cost.  How did they get this point?  Easy, credit card subscriptions – cheap and easy to do business with.  continue reading….

 

Road Trip – Gartner Infrastructure & Operations Mgmt Summit

Tags: Availability, Best Practices, BSM, Business Alignment, Business Service Management, Change, CIO, Cloud, Cloud Computing, Gartner, IT Management, ITSM, Mobile, Monitoring, Service Level, Service Providers, Service Value, Social Media, Spending, Transformation, Trends, VDI, Virtualization


I traveled the globe from October to February meeting with customers and our sales teams discussing NetIQ’s IT Operations Management (ITOM) value and solutions, then I traded in wings for a bit.  Now it’s time for one of my favorite battery re-charging conferences of the year, the Gartner Infrastructure and Operations Management Summit (IOM).  I enjoy the Summit to see old friends in the vendor community as well as many old analyst friends, but this year there is a lot of buzz around the Summit and ITOM has become the talk of the town again.  Here are few quotes and phrases from the opening pages of the Summit Agenda:

  • “Delivering Accelerated Business Value:  Cloud, Mobility and More”
  • Hot Topics:
    • Enterprise mobility
    • Private/Public cloud computing
    • Moving beyond server virtualization
    • Cost optimzation
    • Data center space, power and cooling
    • ITIL and process improvement
    • Improving IT service quality
    • Business value
  • “The reign of the PC is over.  A new era is emerging, one that will require enterprises to fundamentally rethink how they deliver services to users.”

There are many sessions on the power of these emerging technologies, how we will manage them, how we will deliver value to the business and how technology is no longer just operating the business – technology is powering the business.  At least that’s what our businesses are expecting in the coming couple of years and how the competition with the service providers is stacking up and pushing the IT Wake Up call.

I’m jazzed to start my day tomorrow with 3 back to back keynotes with a couple of old friends:

  • 10 Emerging Trends that will Impact Infrastructure and Operations – David Cappuccio
  • Applications 2020:  The Impact on Infrastructure and Operations of Current and Emerging Trends in Applications – Valentin Sribar
  • The IT Operations Scenario – Ronni Colville & Deb Curtis

 

Then we move into lunch, come see us at the NetIQ solution showcase to chat about the sessions with my old friends and how we see their insights coming to life in our every day worlds.  I’ve been posting on the need for IT to better align in how it speaks of technology in the business as services and driving top line revenue rather than just bottom line with cost savings for a while now.  In the last bullet above from the opening pages of the agenda, the one thing that did strike me odd is “deliver services to users”.  I would restate that as it is how we will “deliver services to our customers”  to drive revenue.  Yes, driving efficiency into the organization is part of the IT balancing act, but the first focus has shifted to the customer and value.

Then I’ll finish the afternoon with:

  • Top 10 Strategic Technologies for 2012:  Will You Be Able to Manage Them? (Before They Manage You?) – Cameron Haight
  • Compuware, VMware and Dell will provide simultaneous session with a App Performance, Cloud Mgmt and a CIO Panel, repsectively – How will I choose?
  • 2 More Choices to Make:
    • VDI and other Virtualization Strategies to Securely Support and Manage a Dynamic Workforce – Neil MacDonald & Philip Redman
    • Leveraging Mobility, Content and Communication in you Business Processes – Bern Elliot
  • 2 More Final Choices to Make:
    • Lessons Learned from Early Adopters of Social IT Management – Jeffrey M. Brooks & George Spafford
    • Networking and Mobility Trends for the Next Decade – Tim Zimmerman

Then we are back to wrap up at the NetIQ solution showcase with a head spinning with many new viewpoints and ideas.  I look forward to speaking with many of the attendees to gain their insights into the sessions, stop on by and join the conversation, follow us in real-time on Twitter and send your comments to these posts.

As you can see from my agenda for just the first day, many new trends to wrap our management arms around to provide flexibility with balance of controls.  Change is coming fast and furious and managing it with controlled risk will be the key to the successful in the coming year.   I have some choices to make tomorrow regarding the sessions I can attend, but look forward to hearing about the risks and value of new technologies applied to our business challenges.  You even see a little Social Media has creeped into IT Management.  Wonder what that’s all about?  🙂

I’ll send a few early comments on Twitter tomorrow during my adventures.  Follow:  @BSMHub this week and catch the real-time insights, at least my perspective, of the conference.  I’ll post my take aways each evening.  Drop me your comments, I’d love to hear what’s happening out there in the real-world.

Michele

Microsoft’s All in On Cloud, How About You?

Tags: BSM, Business Service Management, Cloud Computing, Enterprise IT, Microsoft, Microsoft Azure, Vivek Kundra


Business Service Management Commentary on IT Service Management, Service Level Management & Performance ManagementCloud computing is clearly having a huge impact on the technology industry. Recent reports have US CIO Vivek Kundra putting pressure on departments to get involved in cloud computing and to do it quickly. Just the other day news reports surfaced that Microsoft is intending to devote 90 percent of its R&D budget to the cloud. If these major players are in, what’s holding you back?

Now, just because the other kids are doing is not necessarily a good reason to shift your entire IT focus to the cloud. Think about what your mom said: If all the kids jumped off a bridge, would you? Peer pressure is a powerful force, but it shouldn’t be the driving force behind your IT decisions. It should be about how it maps to your particular business requirements.

But when Microsoft announces that it’s devoting $9 of every $10 to cloud development, you have to at least wonder what the heck is going on. This isn’t some small amount of money we are talking here. As Kevin Jackson points out on the Forbes Cloud Musings blog, “Since Microsoft’s annual R&D budget this year is $9.6 billion, this investment translates to a massive $8.6 billion.” That’s some serious dough.

What’s more, Microsoft’s bread and butter is on the desktop where mainstays Windows and Office continue to generate the majority of the profits. But perhaps Microsoft sees the future in the cloud and realizes that the money from these sources could dry up at some point as companies move away from expensive licensing and toward cloud-based solutions (like Office 365).

I’m not sure what Microsoft’s long-term strategy is or how much you can believe the hype about their foray into the Cloud, but the company is clearly spending money there and hope to at least have a stake. Windows Azure, the company’s Platform as a Service (PaaS), is certainly getting some attention.

But regardless of what Microsoft really does, the fact they are making this noise about the cloud is a bell weather, and as such you need to at least be paying attention. It doesn’t mean you have to put that kind of percentage of your budget in the cloud today, but you have to at least begin looking at it and the pieces you will need in place to help build and monitor that cloud when the day comes to flip the switch. All the kids are doing it may not be any better a reason now than when you are kid, but in this case, maybe there’s a good reason they’re all doing it, besides being slaves to fashion.

Photo by Web_Anna on Flickr. Used under Creative Commons License.

Outages, Monitoring and Being Prepared

Tags: Amazon EC2, Business Service Management, Cloud Computing, Disasters, Enterprise IT, Outages


Last week, Lori MacVittie had a blog post on DevCentral about earning your data center merit badge. The message was delivered up front and it was simple to understand: Be prepared. MacVittie is right of course, the best way to stay out of trouble is to put systems in place to prevent it from happening in the first place.

But today’s outage at Amazon EC2 showed us something else — that no matter how well prepared you are, stuff happens that’s totally out of your control and it can spiral out of your control pretty quickly. Lest you think just because you don’t use public Cloud Infrastructure as a Service (IaaS) like Amazon EC2 and hence have nothing to worry about, think again.

If it can happen to Amazon, it can happen to you because at its heart what is Amazon but a giant data center, whose core business is keeping other businesses going. That would suggest that Thursday’s outage was something extraordinary to bypass all of the fail-safes that a system like Amazon has to have in place to keep things going. Today it all fell apart, and it could just as easily happen to you because chances are, your data center doesn’t have nearly the number of contingencies in place that Amazon has.

That means that ultimately you’re probably closer to a disaster like yesterday morning than Amazon ever was (yet it happened anyway).

All of this is not to scare you because IT pros know the score about these things, but it is to remind you that having systems in place to monitor and alert you *before* that disaster strikes is more important than ever. Now, it may end up that it doesn’t matter how prepared you are if a disaster strikes that’s completely beyond the scope of anything you could possibly have imagined in a reasonable contingency plan.

All you can do is follow MacVittie’s simple advice and be prepared for whatever comes. It might not always be enough, but if you do your best, you’ll minimize those major outages and be ready to deal with them when they do happen. But remember disasters happen to everyone at some point, whether your in the cloud or in-house in a data center, and you need to be ready.

Photo by rbrwr on Flickr. Used under Creative Commons License.

Reducing Complexity in the Enterprise

Tags: Business Service Management, Cloud Computing, Enterprise IT, Microsoft, VMware


Business Service Management Commentary on IT Service Management, Service Level Management & Performance ManagementBusiness Service Management Commentary on IT Service Management, Service Level Management & Performance ManagementWhile attending the CeBIT technology trade fair in Hannover, Germany, I saw a presentation by Paul Strong, CTO at VMware for Europe, Middle East and Africa, where he spoke about the relationship between cloud services and IT.  One thing he said really struck me: “When you pull apart software, you’re pulling out business processes.”

It’s a notion that really makes sense, but he took it even further. He said that 80-85 percent of your business costs are related to software. If I had been asked that before seeing this presentation, I think I would have said hardware was more costly, but Strong pointed out that this is because it’s very difficult for most enterprises to achieve the kinds of economies of scale to bring cost down. What’s more, he said that complexity drives cost.

That brings to mind the Dawn of a New Day farewell email that Ray Ozzie sent to Microsoft employees to announce his departure last fall in which he said, “complexity kills.” Specifically he said:

Complexity sucks the life out of users, developers and IT.  Complexity makes products difficult to plan, build, test and use.  Complexity introduces security challenges.  Complexity causes administrator frustration. And as time goes on and as software products mature – even with the best of intent – complexity is inescapable.

Software complexity is not only bad from a design standpoint, it also has a profound impact on IT and how they deal with patch management and upgrades and the myriad of problems and challenges associated with maintaining software in the enterprise.

That’s why Strong says moving non-critical processes to the cloud makes so much sense because cloud software vendors remove a lot of the complexity associated with enterprise software maintenance. They reduce the processes to a smaller, more manageable number of patterns, and they deal with upgrades and server maintenance for you.

From  your perspective, it changes the role of IT. As Strong said, it enables IT to return to its core purpose to map technology to business needs and to make smarter choices. Your job is no longer babysitting the software, but watching the entire system and making sure those systems work as they should and meet the needs of your organization.

Photo by Jimmie, Jackie, Tom and Asha on Flickr. Used under the Creative Commons License.

Is SLA Nirvana Achievable?

Tags: Business Service Management, Cloud Computing, info360, IT, Service Level, SLA


Business Service Management Commentary on IT Service Management, Service Level Management & Performance ManagementIn recent post, fellow BSM Blogger, Lee Frazier, gave The Top Reasons We Have Not Reached SLA Nirvana – Yet. Lee gave a lot of good reasons why we’ve failed to reach that perfect state just yet when it comes to service level agreements (SLAs).

At a session recently at the AIIM/info360 conference, analyst Jarrod Gingras from the Real Story Group gave a presentation on what he considered to be cloud myths. Gingras wasn’t there to sing the cloud’s praises that’s for sure. In fact, using content management as the example, he put a decidedly negative spin on things. That’s not because he wanted to be contrary just for the sake of it. He wanted us as individuals to think through the pros and especially the cons of this approach.

And one of those myths was that you could protect yourself legally via the SLA. Hold on a second! I was always under the impression the SLA was the final abriter and the saving grace of cloud computing. Not so says Gingras and not for any of the 7 reasons Lee Frazier outlined in his post — but because of technical limitations.

He gave the example of a Canadian company that wanted to go with a Cloud solution, but because it was dealing with public records that had to remain inside Canada, and there were no guarantees the files would not be stored on a server in the U.S., they simply couldn’t go with the solution they liked, and no SLA language could have protected them in that instance.

He went to discuss instances where a company needs to ensure that files are deleted completely, a process he referred to as “digital shredding.” Gingras said that to his knowledge there wasn’t a provider that would put such a guarantee in an SLA because it was too hard to ensure. As he put it, “If you think the SLA will protect you [in this instance], think again.”

So perhaps we should an eighth item to Lee’s list.

8. Legal System hasn’t caught up with technology.

As Lee indicated, none of these are necessarily show stoppers for every company, nor are they insurmountable. Some are cultural, some are technical and some are legal. Sooner or later we may actually reach SLA nirvana, but for now we have people like Frazier and Gingras making sure we understand there is no such thing as an iron clad agreement just yet.

Photo by Cletch on Flickr. Used under Creative Commons License.

How Do You Tell if the Cloud is Greener?

Tags: BSM, Business Service Management, Cloud Computing, Enterprise IT, Green IT


I came across an article the other week questioning whether cloud computing was actually greener than conventional enterprise computing. On its face, the fact that you are using resources more efficiently would suggest that it is, but how do you prove it? 

One of the cornerstone concepts of cloud computing, whether you’re using a private cloud in-house or a public cloud is the ability to use fewer resources more efficiently. Last year while attending the MIT Sloan CIO Symposium, I learned that Salesforce.com uses less than 2000 servers to support more than 72,000 customers. That’s efficient.

But it’s not just the efficiency that’s a factor here, companies like Google, Yahoo! and Amazon  that are running hundreds of huge data centers have a stake in making sure they are running as efficiently as possible because extra energy isn’t just bad for the environment. It’s bad for business.

When I was at CeBIT a few weeks ago in Hannover, Germany I saw Chang-Gyu Hwang, who is National CTO of South Korea talking about using the heat generated by buildings in cities to generate more energy. This same principal could be applied to server farms to generate the electricity to run them.

But it’s still open to debate, which brings us to measurements. When you have a system in place that enables you to measure the energy you’re using, you can begin to quantify your energy usage to the extent possible.

On one hand, if you move some of your functions to a public cloud, you off-load some of that energy consumption to the vendor (but you could still see it as part of your company’s carbon footprint).

If your vendors provide this type of information, you could plug it into your monitoring infrastructure to track energy usage as part of your overall business measurement goals.

And if you use virtualization in-house, you might be using the same number of servers (or even less due to increased efficiency), but you’ll be using them to greater capacity meaning that they aren’t just sitting there doing nothing a good part of the time (yet still using the same amount of electricity regardless).

Having tools in place that manage your entire business IT infrastructure across different types of measurements including energy consumption, can help you fully understand your business and the impact your energy usage is having on the environment and your bottom line.

Photo by AleBonvini on Flickr. Used under the Creative Commons License.

Cisco gets cloud service portal with newScale purchase

Tags: Business Service Management, Cisco, Cloud Computing, IT Management, newScale, Private Cloud, Service Portal


Cisco today announced they had grabbed newScale, a service catalogue and service portal software developer. The purchase gives Cisco a valuable piece in the emerging private cloud business, one which makes it easier for customers to create an in-house service center.

A private cloud operates in the same fashion as a public one, offering web-based services, but instead of venturing outside the firewall, you get all your services in-house. This offers a number of advantages from a service and security standpoint, and provides a way to charge back customers for exactly  what they use. Your users like it because they only pay for services they use and you can plan resource requirements better from an IT perspective. As I wrote in a blog post earlier this month, Cost Transparency is a Two-way Street, “when your users understand the relationship between cost and consumption, everybody wins.”

What that means essentially is that by placing a set of clearly defined services inside a delivery mechanism like the one that Cisco bought with newScale, you can provide a clear set of costs associated with usage. That’s because, a service portal gives you the means to create a “store” where your users come for standard services offerings. For instance, you might set up a SharePoint collaboration site and a SharePoint file storage site. It provides a way to get in-house services as easily as going online to get services from say Google or Yahoo!.

Parvesh Sethi, senior vice president of Cisco Services said in a statement that they bought newScale because they were seeing a need in the market for this type of service. “Cloud computing represents a major shift in the evolution of the Internet, and as more customers migrate from traditional IT infrastructures, the need for rapid self-provisioning and efficient management becomes increasingly critical,” he explained.  This purchase does precisely that by providing Cisco with a tool the enables customers to create self-service portals quickly.

It’s a smart play because more companies are looking in this direction and looking for tools to help them set up service portals for their private cloud offerings. The deal is expected to close some time in the second half of the year.

Understanding the Different Levels of Cloud Computing

Tags: Business Service Management, Cloud Computing, Enterprise IT, IaaS, PaaS, SaaS


Business Service Management Commentary on IT Service Management, Service Level Management & Performance ManagementBusiness Service Management Commentary on IT Service Management, Service Level Management & Performance ManagementAs you look at cloud computing, it’s useful to understand that there are three types of services offered:

  • Infrastructure as a Service (IaaS): This gives you access to storage and servers in the cloud. Examples of vendors in this space include Amazon, IBM, Rackspace and Verizon. The advantage of this approach is that you can expand and contract as needed. If you anticipate having a rush coming such as a big sale, you can expand your servers to meet the increased demand, then go back to your normal numbers when the sale period is over. It prevents your system from going down from because you don’t have the server capacity to handle the traffic. This elasticity (scaling capacity up and back as needed) and paying for what you use are two of the hallmarks of using IaaS.
  • Platform as a Service (PaaS): This service provides a platform on which you can build applications usually linked to a particular vendor. A good example of this is Salesforce.com’s Force.com service, a cloud-based development environment for building applications on top of the Salesforce.com service. Force.com gives you access to a number of developer services you can tap into to help you build your applications.
  • Software as a Service (SaaS): Perhaps the most recognized of the three cloud computing types, it provides access to a software service in the cloud.  There are countless examples of this available today  such as Google Docs or Gmail, which gives you access to word processing and email in the cloud. No documents or mail are stored locally and you can access your content from anywhere. All backups and updates are handled on the back end by the provider, greatly simplifying software maintenance.

Once you have a basic understanding of how cloud services break down, it’s useful to think about how these different levels of cloud services could affect your IT environment, how comfortable you might be farming out some of these services to the cloud and what impact it would have on your ability to understand and monitor these different services as part of your overall IT job function.

Photo by Lucien Savluc on Flickr. Used under Creative Commons License.

Too Many Systems, Not Enough Vision

Tags: BSM, Business Service Management, Cloud Computing, Enterprise IT, IT


Once upon time, you tended to side with a single vendor. You were an IBM shop or a Microsoft shop. Those days have disappeared for most organizations. Heterogeneity rules the day and it complicates the life of any IT pro. 

When you take the diverse set of hardware and software found in any large enterprise today and you factor in the cloud with a set of virtual services and external cloud vendors, it complicates the situation even further. And it begs the question about how you control it and get a broad view across the entire spectrum of hardware and software inside and outside your organization.

There are no simple answers to monitoring an increasingly complex computing environment, but a recent article on ITBusinessEdge called A Growing Problem: Data Management on the Cloud suggests there is a way to gain some semblance of control of this situation. And that is the subject of this blog: Business Service Management tools.

The article quotes,  Vikas Aggarwal, CEO at Zyrion, who calls BSM, “the ideal approach for addressing the rapidly growing cloud manageability issues.”

That’s because BSM tools at their best give you the ability to look across the entire environment, to see what’s working and what’s not, but it’s not just simply what’s on and what’s not. A good BSM system gives you insight across the business and the impact it has on what you do.

And it’s not just the fact that you are in the cloud that’s the issue. It’s so much more than that. You are spread across geographies. You are physical and virtual. You have a set of services you provide and all of the components that make up that service have to be in sync.

No tool is a panacea to the problems that face IT, but one way to get on top of the situation is to have a broad view across your computing landscape, whatever it comprises and wherever it lives and BSM, at least gives you a fighting chance to see the big picture.

Photo by ny156uk on Flickr. Used under the Creative Commons License.

Microsoft Shows Off Cloud Monitor Prototype at CeBIT

Tags: BSM, Business, Business Service Management, Cloud Computing, Microsoft, Microsoft Windows, Personal computer, Servers, Windows Intune


Microsoft seems to be paying attention to the Business Service Management (BSM) space, at least in its own way.  At the recent CeBIT show in Hannover, Germany, Microsoft unveiled a new PC monitoring tool called Windows Intune, and they also displayed the prototype of a new cloud monitoring system they are calling Microsoft Dynamic IT.

Microsoft Dynamic IT

Designed in Microsoft Silverlight, the tool is visually appealing and they displayed it on a huge LCD screen giving it Mission Control feel. Instead of monitoring PCs as with the Windows Intune product, it gives you insight into the overall health of the servers running your cloud services.

If everything is running smoothly, a green check mark appears next to the server name, but if there is a problem a red X appears letting you know there could be an issue that requires your attention. The prototype was connected to three servers located somewhere in Microsoft’s vast booth. A picture of the main control panel is shown below:

Microsoft Cloud Monitor
As administrator, should you encounter a problem,  you can drill down into the server in question, as you can with Windows Intune, discover the nature of the problem and take action to fix it. In the example shown below, the Redmond server needed a patch installed.

Monitoring tools like BSM of course give you a much more comprehensive view of your systems, but this type of tool proves that monitoring in general is becoming a key task for IT, and that having these types of tools in place will become increasingly important moving forward.

Enhanced by Zemanta

Microsoft Intune Moves Monitoring to the Mainstream

Tags: BSM, Business, Business Service Management, Cloud Computing, Microsoft, Microsoft Security Essentials, Microsoft Windows, Personal computer, Windows Intune


Windows Intune

This week at the CeBIT technology fair in Hannover, Germany;  Microsoft was showing off Windows Intune, a cloud-based PC monitoring tool that lets IT pros monitor the health of all the Window PCs in their charge from a simple Web-based interface. What’s interesting about it from a BSM standpoint, is that it brings monitoring of this sort into the mainstream.

The system has a series of tools to enable administrators to see problems at glance, whether it’s a malware infestation or a PC that needs a patch. The administrator can troubleshoot problems by drilling down to the PC in question and going so far as seeing all the software installed, whether it’s from Microsoft or another vendor.

The system uses the same anti-virus engine found in Microsoft Security Essentials, the free anti-virus program available from Microsoft for consumers.

If you’re an administrator, once you see a problem, you can fix it on a single machine, a group of machines (which you can define by type, department or any organization you wish). You can even apply a patch to a test bed if you have defined one to test it before deploying.

Because it’s cloud-based, users don’t need to be attached to the network to receive a patch or remove a virus. If your CEO runs into a problem on the road, you can fix it from the Console and any patches or fixes are downloaded to the monitored machine.

While Microsoft hasn’t developed a mobile application to work in conjunction with Intune, you can configure it to receive an email whenever a crisis happens, and you can define what constitutes a crisis, so that you don’t receive email for every little problem reported by the system.

From the email  notification, you can view the console in your mobile phone’s browser.

The product will be available starting on March 23rd and cost $11 per PC per month with volume discounts, depending on the number of PCs you are monitoring.

While this tool doesn’t have the sophistication of a full-scale Business Service Management console, it shows that there is a desire for this type of monitoring on a broad level, and it puts monitoring within reach of even small businesses (although Microsoft doesn’t see this as being limited to the SMB market by any means).