cioreview low res march 13

Upload: sasank-raavi

Post on 03-Jun-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 CIOReview Low Res March 13

    1/26

  • 8/12/2019 CIOReview Low Res March 13

    2/26

    | | March 20132CIOReview

    Contents March 2013

    [In My Opinion]

    Technology Strategies Designed to Support the

    Workplace of the FuturePat Goepel, CEO, Asure Software

    [CEO Spotlight]Jeff Hudson, Venafi

    Dave Scholtz, Damballa

    Rajeev Chawla, CloudVelocity

    Mike Burkland, Five9

    Arvind Narain, MobileASaP

    [Meet the CIO]Think Differently toSupport newCapabilities in Business EnvironmentStuart Kippelman,Covanta Energy Corporation

    Trends driving RadicalChange in ConsumerBehaviordrive the IndustryKevin Vasconi, Dominos Pizza

    Changing Variables inthe CIOs EquationRama Prasad, Gogo Inc.

    [View Point]2013 Cloud Predictions:

    We will Finally GetReal About CloudJames Staten, Forrester Research

    Managed Mobility Servicesfor Enterprise Customers isa $60 Billion OpportunityArt King, SpiderCloud Wireless

    Big Data: Fueling the Rise of NoSQLBob Wiederhold, Couchbase

    BYOD and the CIO:A Location Impact Assessment forEnterprise Mobility

    Rip Gerber, Locaid

    The Emergence of the"Mobile Consumer Enterprise"Milind Gadekar, CloudOn

    [Technology]Are You OpeninJoel Bomgar, Bo

    Ushering in a NBy Jack Welde,

    [View Point]Guard the PerimCyber CrimesJVijay Basani, e

    [Technology]Hadoop MapReA Match-MadeJohn Bantleman

    [View Point]Time to DeliverCare Delivery POmar Hussain,

    [VC Talk]Digital Health aExciting Oppor

    Sachin Gupta, S

    [Company of thRichard Kirk, SPresident, Alien

    06

    08

    20

    22

    24

    26

    30

    28

    32

    34

    36

    38

    40

    42

    44

    46

    18

    Services in the Cloudand Winning

    Disrupting Technology

    PradAditBy Rachita Sharma

    Cover StoryPage 12

  • 8/12/2019 CIOReview Low Res March 13

    3/26

    | | March 20134CIOReview

    Publisher & Editor-in-ChiefHarvi Sachar

    Managing Editor Christo Jacob

    Editorial Staff

    Benita MRachita Sharma

    Sagaya ChristurajThomson Antony

    Joe Philip

    Visualiser Ashok kumar

    Mailing Address

    CIOReview44790 S. Grimmer Blvd

    Suite 202,Fremont, CA 94538

    T:510.440.8249, F:510.440.8276

    March 2013, volume 2-2 Published monthy byCIOReview

    subscription rate: $60for 12 issues

    To subscribe to CIOReviewVisit www.cioreciew.com

    Editorial

    L ast month, we witnessed Obama signing an executive orderon cyber security, vowing to strengthen the nation's criticalinfrastructure through cross-sector information-sharing andframework. While increasing the amount of IT infrastructure moves to

    the cloud, it is the right time to re ect on addressing security concernsin the cloud.Though security is one of the top concerns in the punch bag list inmost of the enterprises, majority of the companies are not safe usingthe cloud services. A GAO report based on the views of CIOs at 22major U.S. agencies, listed several security concerns: vendors usingineffective security practices, agencies not able to examine the securitycontrols of vendors, cyber criminals targeting data-rich clouds, andagencies losing access to their data if the relationship with a vendorends. Moreover, highly regulated industries such as banking, insurance,and healthcare face potential security threats owing to breaches andcompliance.Studies indicate that some merchants and businesses that manage orstore credit card numbers and other sensitive information do not usedata encryption software. But awareness towards security breachesand compliance issues is on a rise and more and more companiesare now looking towards cloud information protection. So as cloud

    technologies mature, cloud providers will need to address this concernso that customers who utilize cloud infrastructure can gain visibilityinto their security postures within the cloud.So going forward, Obamas new law would incorporate and address

    private sector concerns while at the same time providing informationsharing and collaboration between government and private sectorwhich will provide additional security to critical infrastructure suchas banking, industry, telecom and utilities sectors. What enterprisesneed to focus on is, while making the switch to cloud computing,organizations should search for cloud providers that use high-end

    rewalls and intrusion detection systems and which undertake regularindependent security tests of their environments. This would help us inmaximizing the cloud computing market, which is expected to grow to$206.6 billion by 2016.However neither the CIOs nor the enterprise IT entrepreneurs havetaken these issues relatively seriously and need to be more seriousabout it. It is sad that, The most important things that one's working

    on are not necessarily the most important things that one thinks one'sworking on. And Obamas new law calls for it to re ect.

    Please do let us know what you think.

    Christo JacobManaging Editor [email protected]

    Secure your Cloud

    Copyright 2009 CIOReview, Inc. All rights reserved. Reproduction inwhole or part of any text, photography or illustrations without writtenpermission from the publisher is prohibited. The publisher assumes no

    responsibility for unsolicited manuscripts, photographs or illustrations.Views and opinions expressed in this publication are not necessarily thoseof the magazine and accordingly, no liability is assumed by the publisherthereof.

    CIOReview

    CIOReview

    MARCH - 2013

    | | March 20134CIOReview

  • 8/12/2019 CIOReview Low Res March 13

    4/26

    | | March 20136CIOReview

    It happens almost daily: Newtechnological advanceschange how employeesaround the world get workdone. A great example ofthe impact technology on

    business is making work(and employees) more

    portable. Thanks to tablet computing,wi-fi, easy access to limitless datastorage, and smart phone technology,

    people can work from almost anywhereat anytime. And organizations leadingthe charge in mobilized workforcestrategies are realizing the benefitsof collaboration with better work

    products and increased productivity.When it comes to technology

    designed to support this evolvingworkplace of the future, whats next?Will anyone have a dedicated office orspace? Will a physical office presence

    become a thing of the past? Howcan leaders create a workplace that

    fosters productivity, efficiency andcollaboration and creates a companyculture current and future workforceswill embrace? Here are fourconsiderations your leadership teammust consider as they prepare, deployand support technology strategies fora truly portable workplace that is rightaround the corner.

    Continue to provide Employees withTechnology that helps themLaptops and mobile devices, coupledwith Internet access, are commonplaceoffice tools that we all expect in theworkplace. Employees must feelempowered to take their computersand smart phones with them whereverthey go. And when workers needto collaborate on projects, providethem with an atmosphere wherethey can meet and have access to theinformation they need. One recentexample: as part of a recent product

    implementation, a Fortune 500 clientreported drop-in sites with WiFi accesswere utilized 3 to 1 over fixed seatingoptions with wired network drops.

    As college graduates enter theworkforce, they are accustomedto working in small groups whilesimultaneously communicating withtheir social networks. Employers canleverage these skilled multi-taskers

    by ensuring they have access to thetechnologies they need namelythe Internet and the latest mobiledevices such as tablet computers andsmart phones. Employers shouldnot place narrow parameters on howthese former luxury devices get usedto complete projects. CumbersomeBring Your Own Device Policies andstrict rules around technology usagefrustrate an increasingly technology-savvy workforce and create a cultureof distrust. Instead, leadership teamsshould enable employees to use the

    tools to their fullest capabilities andreap the productivity gains.

    Use Technology to do things in moreInnovative waysThe information technology curve fora productive and efficient businesscan be summed up in four words:Cloud, applications, mobility andsocial. If you are not thinking abouthow to develop and deploy these four

    business-critical technologies, its time

    to rethink your IT strategy.Leveraging cloud-based services

    for software and data storage enablesemployees work virtually anytime,anywhere. Cumbersome VPNconnectivity and arcane file servernetwork searches will sink employeemorale when their social technologyexperiences have clearly shown themthere is a better way. The traditionalemployee backpack approach ofsupplying traditional desktop PCs,designated workspaces, and land linesare giving way to newer, productivity-enhancing applications designed fortablet and smart phone devices. Andwith access to data via the Cloud and

    the rise of sophisticated analytics viaBig Data employees can manageevery aspect of their jobs frommaking strategic decisions to recordingtime and managing expense reports from their mobile device.

    Speaking of mobility organizations that place high emphasison workplace mobility solutions willgenerate as much as 30 percent bottomline occupancy savings per year with a

    bit of real estate management diligence.Just like the technology that serves us,corporate workplaces are becomingsmaller with less traditional workcubes and more gathering spaces forcollaboration and social conversations.

    Lastly, organizations that usethe social networks your employeesare most familiar with enhancedoverall productivity. Do not deploy

    proprietary social network tools builtonly for business. Adapt and adopt to

    the proven social tools that make sensefor your business.

    Cater to Employees needs as theywork Remotely more FrequentlyAs technology drives change inhow companies and employeesdo business, the physical office orworkplace loses its importance inmany ways. Progressive organizations

    encourage employees to telecommutefrom their location of choice. Butfrequently, remote office workersand telecommuters find themselvesisolated from the organization. Theisolation can deteriorate employee/workplace relationships unless yourorganization connects people morethoughtfully.

    One technology trend organizationscan use to ensure employees stayconnected to the workplace is accessto the same tools available at the

    physical office location. For example,remote workers should be able toschedule meetings in the office when

    they need to with all the confidencethat the meeting room they schedulewill be available to them. In addition,organizations can maximize theiravailable real estate by providingremote workers with hotel office space

    that can be reserved in a

    Additionally, ad-hocand collaboration areas to find and access for are dropping into the dashboards, interactdisplays for space availalow cost solutions likeCodes can be leveragedexperience. Giving emto a physical workspa

    need it allows them to to the organization anworkers.

    Maintain a ThrivingA recent study called thWorkforce Index sho

    percent of workers feestay connected with of normal working htechnologies may iefficiency and produalso contributes to emand burnout. As our glcontinues to conduct buits vital that the orgemployees maintain

    balance.Companies must re

    work-life policies wCreate clear work-life bthat employees will adhere to. To ensure suthese policies from theweekend emails from should be a rarity, nothe workplace to take tseriously.

    In short, the revolution will continthe workplace and itto carefully detesolutions will posi

    workplace cost savingemployee productiviexamine opportunities continue to monitor animpact technology is organization and its peo

    Workplace of the FutureBy Pat Goepel, CEO, Asure Software

    Technology StrategiesDesigned to Support the

    Asure Software (Nasdaq: ASUR) provides cloud-based workplace managementsolutions to clients in North America and Europe. Headquartered in Austin, thecompany has a market cap of $35.96 million. Pat Goepel

    opinion

    in my

  • 8/12/2019 CIOReview Low Res March 13

    5/26

    | | March 20138CIOReview

    CEO Spotlight

    Cyber Security TrendsThe hot trend is cyber security and therelated adoption of next generationsecurity solutions required to addressthe sophistication behind today'scyber-attacks, commonly referred toas 'advanced malware. The enemy iswell-funded, patient and is leveragingan ecosystem and infrastructure thatthey have devel oped specifically forthe purposes of evading traditional

    layers of defense.The stakes are ever increasing

    as cyber criminals are targetingintellectual property, sensitive personalinformation, critical infrastructuresystems and more. Companies arenow realizing that prevention - centricapproach (think anti-virus solutionsand firewalls) to protecting theirnetwork and users is not enough.The information security communityat large is shifting to a detect-and-respond mentality, recognizing thatthey may not be able to prevent a

    breach. But it is imperative that theydetect infected assets within theirnetworks, particularly those under

    criminal control.

    The FutureThe Internet of Things. While it has notfully arrived yet, it is apparent that it isnot a question of will? but when?we will be living amidst the Internet of

    Things. With this impending reality,the industry is heading into a newfrontier of combatting cyber crime.Of course, not every IP -addressableobject will be a target or fall victim to

    cyber criminals, though we can expectto be challenged by a new wave ofthreats and threat vectors as thesecriminals seek new and innovativeways to exploit the pervasiveness ofan IP - connected world.

    Already today, enterprises mustreact to the erosion of the network

    perimeter and the proliferation of

    devices, operating systems and mobileusers that are connecting to theirnetworks. This is why Damballa andothers are delivering next-generationsecurity solutions that detect andterminate criminal activity bymonitoring network behavior.

    An EntrepreneursKeeping up with iand innovation morthe challenge to ento be aware of and of the trends and innon around them, wmaniacally focused oof their own unique owork to develop prodmarket and build a v

    Whether it is cloud cData, mobility, or any oservicesolutions to nais continuous innovatiat a rapid rate around tthat may impact the

    business. By being aentrepreneurs can put in making their bu

    productive and efficcan apply them to strategies to take advanopportunities or to avo

    All of this being good problem to hanever been a better ton an entrepreneurial

    the low cost and eascomputing power and that are now availableinfrastructure, softwarand best practices neces

    product and support a coperations.

    Atlanta headquartered Damballa protects businesses from bot-driven targeted attacks

    used for organized, online crime. Founded in 2006, the company has raised a totalamount of $44.5 million from Paladin Capital Group, Sigma Partners, Palomar Ventures, InterWest Partners, Imlay Investments, Blumberg Capital, GRA Venture Fund, AdamsStreet Partners and Noro-Moseley Partners.

    Embrace Technology Trendsto take Advantage ofMarket OpportunitiesDave Scholtz, CEO, Damballa

    The technology industryhas been in a stateof constant flux,and there have beenseveral prominentadvancements which

    have changed the face of businessoperations. The contraption ofdata based inventions such as cloudcomputing and big data have made itall the more convenient to superviseand store data.

    Organizations Vulnerable to InternalThreatsEven though organizations are

    conscientious while handlingcritical data and undertake to protectthemselves from cyber assaultsthrough several security measures,they are still vulnerable to attacks,

    both external and internal. A recenttrend which is shaping up in todaysindustrial scenario is the absence oflaws and precincts required to monitorand control confidential data from

    being accessed by threats presentinside the organization, in the form ofhuman resources like software agents,spy agents and so forth. This leavesorganizations in a dilemma of whereand how to place their trust regardingdata security.

    Recent incidents have proventime and again the importance ofoptimal and viable security to protectan organization from outsider as wellas insider threats. A study has shownthat almost 50 percent of the fortune

    500 companies have been attackedand infected and data has beencompromised. Preeminent techniquesto contradict security threats suchas consolidation are slow andcumbersome ineffectual on modernday threats. Even installing firewallsand barriers prove futile againstinside threats. Encryption answersall the security related problems ofmodern day business and is highlyeffective against attacks from insidethe organization. Encryption ensuresthat data in any form is protected asit is meaningless in possession ofindividuals who do not have the keyto decrypt it.

    The amount of data producedin the world today is enormousand managing the encryption keysgenerated is a herculean task. Venafiwas established to address this issue.

    By enabling organizations understandwhere their security certificates lieand who has access to it, we give themcontrol over the data. We also enablethem to change security around thecertificates and revoke access as andwhen required. Our role in the industryis to give the companies control overdata even if they do not own it.

    Shift in Technology in Recent YearsThe major shift in technology inthe recent years is the maturationof internet and its integration intoour daily lives. Another big changewitnessed is the recognition of mobile

    computing and advent of serviceslike drop box, cloud and other suchservices. The advent of Big Data hasalso raised ramifications regardingdata security. Proper encryption ofdata is required to make sure that

    private information is not misused by profit making organizations.

    The key challenge beforeentrepreneurs is to get largeorganizations adapt their technology.The process of getting an organizationof fortune 500 stature, listen to youridea and sell it to them is tediousand cumbersome and requires skilland expertise. It is a relatively uphilltask as these brands are unknown and

    organizations are skeptical about theirability to service them. Thus, the mostimportant requisite for entrepreneursis to get the big brands understandtheir technology and their ability toservice them.

    CEO Spotlight

    Changing Technology DemandsComplete Data EncryptionJeff Hudson , CEO, Venafi

    Founded in 2000, Venafi delivers enterprise encryption management solutions providing organizations significantimprovements in critical system uptime, operational efficiency, and compliance management. Headquartered in Salt LakeCity, the company has raised a total of $16 million to date from Foundation Capital, Origin Partners and UV Partners.

    Jeff Hudson

  • 8/12/2019 CIOReview Low Res March 13

    6/26

    | | March 2013 10CIOReview

    Adoption ofPublic Cloud is Tepid

    The business case forenterprises to developtheir own data centersis rapidly eroding.Many are opting forthird party facilities

    and cloud operating models, yetthere are serious shortcomings which

    prevent enterprises from taking fulladvantage of the transformative powerof public clouds. Running existingapplications in a public cloud is hard:today's multi-tier applications spanmultiple hosts and are comprisedof not only application binaries anddata, but also libraries, operatingsystem services, data servers andother network services residing in the

    enterprise. Today it requires extensivemanual configuration, provisioning,and a series of complicated and timeconsuming processes. The result isa costly, risky and slow approach toorchestrating workloads and services

    between data centers and clouds,impeding the business case for publicclouds for most enterprises. Soadoption of public cloud by enterpriseshas been tepid at best.

    We decided to tackle this problemat CloudVelocity. The CloudVelocity platform decouples enterprises fromtodays public and private cloudrestrictions and enables the ability totreat multiple clouds and data centersas a single, dynamic pool of resources.

    Advantages of a Hybrid CloudThe hybrid cloud is a hot trend,

    because it establishes a credible and powerful operating model for theenterprise adoption of public clouds. Itcombines the agility payoff of publiccloud and combines it with the controlthat enterprise IT expects to have inits own data center. It is the future ofenterprise cloud computing because itenables IT to operate at an even higherlevel of productivity and economy.

    Hybrid cloud will also enablea new generation of solutions thatwill be far superior to their hardware

    and premise-bound predecessors,including cloud migration andintegration, cloud cloning, cloudfailover and cloud bursting. All ofthese solutions will be a leap ahead ofthe solutions in use today. They offermore agility and economy with higher

    potentials for availability, and withfewer trade-offs and compromisesnow commonplace.

    There will be increasing agility

    pressures on enterprise IT and the needfor hybrid cloud operating models will become table stakes for all enterpriseIT departments. Service providers will

    be required to cater to this requirementin order to win significant portions ofthe enterprise cloud business.

    Lines between SME and EnterpriseMarkets are BlurredThis is a great time to be anentrepreneur as these hybrid cloud

    platforms will fuel entirely newopportunities for growth. This comingera won't be easy, but it will be easierto start a tech venture and obtaingrowth on a more level playing field.Service will be a key requirement, and

    both marketing and operations will play a more strategic role in success asthe lines between SME and enterprisemarkets are blurred by the rise ofhybrid clouds.

    Rajeev Chawla, CEO, CloudVelocity

    CEO Spotlight

    CloudVelocity is a provider of software that enables new and existing Linux and Windows multi-tier applications to runin the cloud without modification. Headquartered in Santa Clara, CA, the company recently raised $5 Million in series-A

    funding from Mayfield Fund.

    Rajeev Chawla

    BYOD: Empowered by tFounded in 2001, Five9 is a pure cloud-based contact center software provider. The California headquartered chas received a total funding of $49.6 million from Mosaic Venture Partners, Hummer Winblad Venture Partners,

    International and Adams Street Partners.

    Mike Burkland, CEO, Five9

    The softwareindustry is at aninflection point;aging, premised-

    based solutionsare beingreplaced withcloud solutions.

    This shift to the cloud is allowing businesses to move beyond outdatedtechnology paradigms to new, more

    flexible and cost effective models.Cloud based solutions are helping businesses achieve tangible resultswhile also controlling costs with aPay As You Go model. Today, manycloud solutions are as sophisticated

    and innovative as traditional software, but at a cost of ownership that is farlower than premise-based solutions.Cloud software providers can deliverrobust, enterprise applications as aservice that is affordable, scalable andreliable.

    In the near future mobile deviceswill outnumber PCs; this is a radicalchange in the market, which cloudenables. This consumer trend and

    proliferation of mobile devices israpidly moving into the enterprise.Many organizations today have orare considering Bring Your OwnDevice strategies for the workforce.This is forcing IT organizations to re-think infrastructure management, datastorage and security. In the future,the old model of knowledge workersusing laptops and PCs in a corporateoffice park will change to tablets beingused from coffee shops and homeoffices. This move toward mobility,enabled by the cloud, will lead to a farmore distributed workforce than ever

    before.

    Dodging the DartsEntrepreneurs rarely have a shortageof product and business ideas,however critical challenges do exist.Entrepreneurs must first find a largemarket opportunity, and then createa product that addresses the marketneed and has strong competitivedifferentiators and barriers to entry.The next step in value creation is

    building a repeatable and scalable business model with a strong

    leadership team capablon the vision. Five9 hasin the ability to meet thhead on to become

    market leader in cloudsoftware.

    By 2017, 25 percent ofwill have an entestore for managing sanctioned apps onmobile devices. app stores promicontrol over the appemployees, greateover software eand greater leverage with appbut this greater contpossible if the entestore would be widel

    Courtesy: Gartner

    CEO Spotlight

    Mike Burkland

  • 8/12/2019 CIOReview Low Res March 13

    7/26

    | | March 2013 12CIOReview

    If we have to pick one technology thatwould define this decade, it would be CloudComputing. With the proliferation of betterinternet bandwidth and improvements in webtechnology, cloud computing technologiesare disrupting the way companies look atIT. As with any emerging technology, thereare misconceptions and fears associated

    with Cloud computing too. Slowly yet steadily thesemisconceptions are dissolving as enterprises realize thehidden potential of the technology and the long list ofadvantages such as cost efficiency, energy efficiency,

    disaster recovery, flexibility etc that it ensues withitself.Enterprises in several verticals are embracing

    cloud open heartedly and experts believe that the cloudcomputing market will reach a whopping $14 billion

    by 2014. As the technology comes of age, innovationsare the key way forward. One such disruptor is AditiTechnologies, an award winning Microsoft CloudPartner which has pledged to help customers leverageemerging technologies and guide clients to gaincompetitive advantage through transforming their

    business to the cloud. Through their deep partnershipwith Microsoft, Aditi is at the forefront of Platform asa Service innovations.

    Founded in 1994 as a technology services company,Aditi Technologies has always been a contrarian ina fairly homogenous Indian IT services sector. As

    a result, clients regularly turn to them when a new paradigm emerge which requires serious technologydepth. Today, the worlds largest ISV, largest insurancecompany, largest gaming company, largest informationservices provider, largest mobile carrier and secondlargest social network count them as their R&Dinnovation partner.

    Cloud, a Common Denominator for InnovationIt has always been the large organizations which hadaccess to people, process and technology; in order tocome up with innovations. But cloud has changed all

    that. With the widespread adoption of Cloud applications

    1. Companies big or small have the same accresources, technology

    2. Users get a friendly user interface similar of consumer technology and reduce learning greatly

    3. They are without the usual complex installand integrations, ensuring that the applications courunning in hours

    4. No upfront cost with operational costs bausage make them easy to try and then buy

    As a trendsetter in emerging technologies,foresaw this shift and positioned themselves vehicle of choice for organizations, irrespecti

    Cover Story

    In 18 months,either yourbusiness will beon the cloud oryou will be in adifferent busine

    "

    "using itsHow an innovator is

    Disrupt Technology ServicestoCloud First Policy

    By Rachita Sharma

  • 8/12/2019 CIOReview Low Res March 13

    8/26

    | | March 2013 14CIOReview

    is convinced that by investing in thecloud, ahead of the curve, customersstand to gain significant competitiveadvantage in the long term. Enterprisesalso stand to gain velocity, agility andfocus on enabling their own businessobjectives rather than IT. This strategyalso guaranteed their customers toleverage cloud aggressively and learnmore. At first they are skepticalabout such a radical recommendation,

    but once they realize the actual potential, things become easy, addsa proud Rathinam. The company hasdelivered over 100 engagements oncloud, that by itself is often 5X or 3Xthe number of engagements most oftheir competitors have delivered.

    One of these engagements waswhen Aditi helped Restaurant.com, aweb company for restaurant booking& gifting; gain auto-scalability of datacenters during promotion days viacloud. Due to spike in the web trafficwhich went almost up to 10 timesduring the season days, RDC wasnot able to handle it efficiently whichresulted in losses. Aditi deployed itscloud solution and mirrored them atdifferent data centers for advantagesin proximity, availability & Disasterrecovery.

    Says Adnan Adamji, CIO ofRestaurant.com, Aditi has beeninvaluable in helping Restaurant.comimplement our cloudbased solution.Their extensive technical depth onMicrosoft Azure has been extremelycrucial to our success. But any move

    to the Cloud must be meticulously planned. Aditi sounds a word ofcaution to organizations planning tomake the move to the cloud as doingso without thoughtful planning cancreate problems down the road.

    In a bid to increase credibility ofits radical Cloud First ApproachAditi moved all of their functioningto the cloud as well. With a vision to

    be a zero server company they havesuccessfully moved their mailboxes,communication infrastructure,development platforms, intranet,corporate sites and analytics to thecloud. The company's strategic

    planning and reviews are conductedon Google+ hangouts and they alsomade a unique step of recruiting viaFacebook and Twitter. Aditi choseto build its solution using Microsoftvirtualization and cloud technologieson a Hyper-V platform. This moveensured a 40 percent reduction in costswhile consolidating physical servers

    by 60 percent. The transition was sosuccessful that Microsoft publisheda case study on it as a reference forfuture customers.

    Disrupting CompetitionWith an innovative yet effectiveCloud First Policy in place coupledwith the deep talent pool in theorganization, winning accolades forits dedicated work in the field of cloudcomputing has become a routine forAditi Technologies. The companyhas been graced as one of top 3 cloud

    consulting companies platform 3 years in a roglobal services comptheir ability to lead tsustain leadership. Onehow one could manage competition and emetime and again.

    The answer lies inadopted by the compadifferentiated identity

    portfolio. Aditi has technique of working intechnologies sector an

    their size and might to help them migrate theirfunctions to the cloud. This transition has opened newvistas and Aditi Technologies is steadily working toleverage this revolution. We believe that cloud can aidany organization innovate and accelerate their strategyto market domination, explains Pradeep Rathinam,CEO, Aditi Technologies.

    The largest part of their business comes from productcompanies, startups and ISVs. Product companies

    building social, media or data driven products are the biggest consumer of their services. The company isalso seeing rapid enterprise adoption in the past quarter

    specifically in the online commerce, healthcare, traveland financial services verticals.

    Cloud First PolicyWhile cloud had a great level playing effect for startupsand ISV, enterprises too cannot afford to ignore theinherent advantages of it. Customers always want togain first mover advantage to beat competition andreduced time to market and executing projects on cloudenables them with faster time to market & reducedcost, explains Rathinam.

    Contemplating the criticality of cloud in the future,Aditi has devised an ingenious Cloud First Policywhere they encourage all their customers to considerthe move to the cloud for every technology project.While the approach may sound radical, but the company

    The biggeschallenge ocustomers today is thunknown rcloud integNavigating journey anmanaging core to our

    Cloud provides us anopportunity to play asService as a softwareplayer by leveragingreusable cloud basedsoftware to deliver

    services faster, cheaperand smarter

    Cloud First in Practice-Restaurant.com

    ChallengeRestaurant.com (RDC) is the trusted andvalued source connecting restaurants anddiners in the US. The company offers the

    best deal on every meal at more than 18,000restaurants in US with nearly 50,000 dailygift certificate options. During their popular

    promotion days, their web site is crushed withsometimes a 10x spike in traffic.

    SolutionAditi conducted a detailed design analysisover a three week period, and as a CloudFirst approach, recommended a cloud basedarchitecture based on Windows Azure. Asa follow up to the design, Aditi completedsix proof-of-concepts (POC) over a 6 week

    period that proved the technical viabilityof key aspects of the architecture to RDC.On the strength of the success of the POC,a Hybrid Cloud solution with sensitive datakept on-premises while application and data

    processing was built and deployed on thecloud.

    Benefits Automatic 10x Scalability in Minutes Consume server capacity on-demand duringsurge and contract during other normal

    periods Gain advantages of proximity, Azure

    availability and Disaster recovery throughdata center mirroring

    "

    "

    Quick Facts about Aditi Technologies

  • 8/12/2019 CIOReview Low Res March 13

    9/26

    | | March 2013 16CIOReview

    a step ahead of the technology curve,when most services companies findit difficult to understand and deliveran end to end solution in a disruptivetechnology space. We execute ata global scale, leveraging pre-builtframeworks and Intellectual Properties(IP) to accelerate time-to-market forour clients, adds Rathinam. Another

    point of differentiation is theircapability to solve complex problems.It is relatively easy to try a new cloud

    platform but on the contrary building,releasing and managing a cloud basedsolution does not come so easily toall. While many services providersare finding a lot of envisioning andPoC business, few of them have thecapability to solve the cloud problemwith a clear sense of challenges acrossSDLC and across markets. Owing tothe early starter advantage and over100 cloud engagements, Aditi iscapable of solving this problem wellgiving them a clear lead in the race.

    Customers leverage theseframeworks and codebases to accelerate

    time to market and reduce cost ofcloud development, says Rathinam.And crucially, the company makes it a

    point to involve their customers withthem on this journey. Today, we haveover 20 cloud customers who wouldrefer us and are strong advocatesof our cloud services. Most of ourgrowth in recent times has come fromcustomers and the ecosystem referringus to other customers. As long as wedeliver customer delight, we will be

    in a strong position, explain a proudRathinam.

    Aditis Customer Focused GrowthAditis simple yet disruptive operatingmodel is doing the trick. With a longlist of illustrious customers such asMicrosoft, Nokia, Intuit among others,the company showcases the trust putin it by these established stalwartsto battle the challenges that cloudthrows their way. These challengesare tough problems and require astutetechnology and business orientation.To deliver this, Aditi is insanelyfocused on getting the right talent. Thecompany only hires the top percentile

    technology talent and gives them thefreedom and direction to excel. Thisforms a sold ingredient of the core oftheir growth. We believe in pickingthe right battles and stay focused. So,we have deliberately stayed awayfrom commodity services and focusedinstead on high-value, high-complexityconsulting space, explains Rathinam.

    The company has its eyes set on itsgoal and is steadfast making its wayto make the most of the cloud. 2013is going to be the year of the cloudwhen it loses its buzz word statusand actually becomes a ground reality.More vendors and solution providerswill compete to offer customers

    services with more reliability, lower prices, better management and easieruse. This means stiffer competition butAditi is gearing up to make the mostof this shift and is rapidly evolving.The company envisions to become

    the top cloud consulting companyacross all major cloud platforms inthe next 2 years apart from seekingfaster profit growth. Investing heavilyin AWS, SFDC, TIBCO and having

    built up technology partnerships withmore than 20 cloud platform vendorsglobally they are surely making theirway to the top of this new peak. Wewant to become a complete cloudsolutions provider across core cloudchallenges like data, media and cloud

    integration for our customers, saysRathinam.

    Innovation is a core ingredientof Aditis DNA and the company isgearing up to build offerings aroundCloud Services. The core idea isto package frameworks and codelibraries that clients can deploywithout significant technologyinvestments. It helps our clients andhelps us scale without necessarily

    building huge teams. We want to be smart about scaling our businessand leverage repeatability, explainsRathinam. Having released one ofthe first 5 apps on Windows AzureStore around Task Scheduling thecompany will be releasing many moresuch services around data integration;mobile services this half to stay aheadof its competitors.

    Cloud: The Platform of Choice forFuture InnovationsThe verdict is clear. Cloud is here tostay and companies that do not makethe move will end up being the losers inthe race to the top. The future belongsto those who will truly understand the

    present scenario, manage risks, andinnovate using cloud. Disruptors likeAditi are making this critical transitionto the cloud seamlessly; which has

    become a cake walk for ISVs andenterprises. Be it their radical cloudfirst approach or the talented Cloud

    Ninjas, the company only aimsfor perfection, because for leaders;nothing less will suffice.

    Cloud provides usan opportunity toplay as Service asa software playerby leveragingreusable cloudbased software

    to deliver servicesfaster, cheaper andsmarter

    Mobile Densityin corporationsis increasing

    by leaps and bounds: threedevices per

    user in 2012 climbing to sevendevices in 2016. Mixed-use or BYOD(Bring Your Own Device) is nowmainstream. Mobile applicationdownloads from appstores such asApple and Android are into billions,and corporate applications areincreasingly mobile-centric. Throwin the shift to the Cloud, whichmeans anytime/anywhere access, and

    you can see why Mobile is the NEW NORMAL. With this kind of explosivegrowth, comes a risk, compliance, andsecurity headache.

    Let us deep-dive into this a bitmore. With the latest device in handand 20-30 apps downloaded to that

    personal device, the user (say anemployee or guest) comes into thecorporate network. Next, IT provisionsthe user with a handful of corporateapps. Now, the validated user hasunfettered access into the networkand the public cloud. In the process,this user consumes WAN bandwidth,accesses apps that may or may notmeet corporate content standards,

    and, maybe even use applicationsthat could expose that companysinfrastructure to security threats. Ineach of these scenarios, the problemmay not be the user or the device instead, it could be mobile app itself.

    Just as IT typically does not leaveanything to chance (or honor system)with laptops, nor can they afford to doso with mobile devices.

    Next, let us look at todays antidoteto this problem space IT has a set oftools that allows them to authenticatea user, gain visibility into the device,

    provision company apps, and, maybeeven look at the flow of data packetsfrom the device into the network.This passive approach may notrecognize that the bigger lurking riskis elsewhere in the form of admissioncontrol challenges around mobileapps, both public and private.

    Over the years, IT security hasevolved from a single-tier to a multi-tiered protection model: endpointsecurity (anti-virus) to gatewaysecurity to vulnerability assessmentto intrusion prevention. And, fromsimply inspecting packets of datato understanding context who theuser is and what application thetraffic belongs to. Just the same way,the mobile ecosystem needs to be

    protected. Unfortunately, instead ofdealing with hundreds of thousandsof device and applications, we haveto cope with millions of devices and

    billions of applications. In otherwords, IT controls need to be more

    specific, more active (or real-time),and have tools that allow them to BeSelective, Not Equally when it comesto apps, users and devices. And, ofcourse, like anything else in IT-land,it needs to be cloud-based, policy

    managed, and event-driThis mobile

    corporate Americopportunities. Along wand IT ConsumerizManagement offers

    entrepreneurial opportunot anticipate a one-sisolutions; instead, we emobile ecosystem of entrepreneurs, we haveto participate in this over the next one to five

    Our prescriptiveentrepreneurs is sattempt to solve a targand then expand (radiate; find a holethen, find a bigger hothe problem ahead, no(Wayne Gretzky, the g

    player used to say thawhere the puck was hea

    it is), and finally defin by what you have dcustomers, not by the funding you have raiseof Steve jobs: StayFoolish.

    By Arvind Narain, Founder &CEO, MobileASaP

    CEO Spotlight

    Mobile is Risky Business Headquartered in Fremont, MobileASaP delivers real-time mobile risk andsecurity solutions for a converged world of BYOD, mobile apps and enterpriseaccess.

    Arvind Narain

  • 8/12/2019 CIOReview Low Res March 13

    10/26

    | | March 2013 18CIOReview

    AlienVault:Changing the Dynamics ofSecurity Management

    The industrial ecosystem we operate inhas evolved progressively and so hasthe risk of security hazards. Complex ITinfrastructures are met by multifacetedthreats and attacks which results insecurity being compromised. One ofthe biggest challenges encountered bysecurity professionals worldwide is

    the need for visibility across a multitude of disparate pointsecurity solutions that desperately needed to work together.The present security measures in place fail to meet theneeds of organizations which are continuously vulnerableto threats from hackers around the world.

    The InitiationFounded in Spain in 2007 by Julio Casal and DominiqueKarg, AlienVault has revolutionized the process of securityand threat management. This California headquarteredcompany understood that the prime trepidation fortechnology buyers is the lack of desired requisition requiredto manage threats inspite of investing large sums of money.Another concern is the deficiency of skilled talent andexpertise in security which causes serious implications onhow efficiently an organization addresses security issues.

    The companys goal is to provide a comprehensive

    collection of tools which grant an administrator an eagleseye view of all security related aspects of their system.This is made possible by OSSIM (Open Source SecurityInformation and Event Management), the de facto s tandardSIEM which comprises a collection of tools designed toaid network administrators in computer security, intrusiondetection and prevention.

    AlienVault has ushered in a radical change in the waysecurity and threat was being managed before, by reducingthe time taken to deploy security measures from weeksand months to hours and days, thus reducing the overheadcosts. They managed to achieve this by bringing differentsolutions to one company and integrating it in a simpleconsole, the Unified Security Management platform. This

    platform integrates tools to detect threats and provides theadministrator ability to control and view all built in securitycontrols with one single console. This provides bettervisibility and control and helps organizations managethreats better.

    Responding to Threats EffectivelyOne of the toughest challenges being faced by organizationstoday is how to respond to security threats. The prevailing

    belief among many executives is that the right technologycan keep hackers at bay. Companies thus end up spending

    huge amount of money on varioussecurity services while the reality iscompletely different. Organizationsmay be better off by getting an accuratereport of previous attacks and howthey were performed, says BarmakMeftah, CEO, AlienVault. To wardoff the threat of hackers and arm usersagainst possible threats AlienVault haseventuated Open Threat Exchange, afree system for gathering, processingand sharing threat intelligence.Users of OSSIM platform can shareinformation regarding security threats.OTX is about collecting data fromindividual installations of AlienVault,

    bringing it together, analyzing it,and then sending it back so it can beautomatically installed and be used inthreat management and correlation.

    Nobody else is doing that today, saysRichard Kirk, Senior Vice President,AlienVault.

    Although a number of otherIT companies collect and shareinformation with their users,AlienVault differentiates itself owingto its high user base of 16,000 as wellas large number of commercial userswhich gives their researchers access totons of information. No other companyhas an open source community whichmakes it very unlikely for them to gethigh end commercial clients shareinformation. This puts AlienVault on adifferent pedestal altogether.

    AlienVault has a renownedhacking team which is instrumentalin the company being efficaciousconsistently. The AlienVault

    platform is uploading information onhourly basis. It is then immediately

    processed. Sure, it is not instant, butit is quicker than anything else today,

    beams Kirk.

    Next Level of Security ManagementAlienVaults entry into the markethas taken security managementtechnology to the next level.AlienVault saves companies moneyand time. If a company buys theequivalent point solutions separately,its software budget alone couldtotal between $10 million and $20million then it would spend $10million more on consultants to install,configure and integrate the software.But AlienVaults software costs 20to 25 percent of that total and takesabout a week to install says Meftah.

    The companys customers spanacross 80 countries and range from

    banks, financial institutions anddefense organizations. Moreover,while many companies would settlewith serving big clients, AlienVaulttargets small and medium sized

    business units equipping them with thesame quality of security technology as

    big enterprise solutions.

    Changing BusinessTimes are changing operations are adaptechnological flux. Thto bring a paradigm shmeasures and systemis working toward

    opportunities and breakthroughs by reclosed systems. The

    been growing by leaprecording a growth o

    per year. With a hileadership team which from Hewlett Packarmanaged to raise $2series C round. Alienfast and is on track double in revenue yadds Meftah. The comnamed 2013 Technoloworld economic forum

    The company envigrowth by serving org

    believe are underservcurrently has 120 peopthe organization. Throuinnovations, AlienVaulto continue leading the wand threat management

    Company of the Month

    | | March 2013 18CIOReview

    By CR Team

    Organizamay be boff by geaccurate

    previousand howwere per

    Richard Kirk, Senior Vice President, AlienVault

    "

  • 8/12/2019 CIOReview Low Res March 13

    11/26

    | | March 201320CIOReview

    Think DifferentlyBusiness Environment

    to Support new Capabilities in a

    New Technology trends shaping the IndustryThere are three current technology factors which arechanging the way companies operate and conduct

    business. They are the consumerization of technology,cloud computing, and social networking. These factorsare not necessarily new technology, but they convergemore and more to create a significant business disruption.Consumer based technology is changing rapidly, and oftenapplications are designed to only work on mobile devices,with cloud based data, and include a social component. Weall must think differently to support these new capabilitiesin a business environment.

    Cost Effective way of utilizing Data is a MustAlmost everything we do in IT is about getting accessto valuable information contained in the data we collect.Improving how we collect, manage and analyze this datawill provide much better intelligence about our company,translating into a growth enabler. There are many tools that

    promise success in providing data intelligence, but there

    is still no cost effective and simple way to do it. The newterminology for this issue is called Big Data, but it goes

    beyond that. The average company is only analyzing afraction of the data they have, and most likely not collectingall the data they should be. Solving this problem wouldenable companies to be more productive, more responsiveto customer needs, and better positioned for growth.

    Expectations to MeetEvery day, employee expectations of technology areincreasing to keep pace with the world of mobileapplications. These expectations demand access tolarge complex data at any time, on any device, and fromanywhere in the world. This is all great progress and I

    believe that it positively contributes to culture, making theworld a smaller place. However, it might be happeningtoo quickly. It was not that long ago that a web page thatloaded in 10 seconds was acceptable. Today if a web pagedoes not load in one or two seconds on a mobile device, we

    become impatient and often open another web site. That is

    a big expectation to meet.Technology is too complex, and not enough vendors are

    focusing on simplifying things. It takes far too much time,money and people to implement most solutions.

    The bar is set high. Everyone expects every applicationto look and operate like Google or Facebook. This can beunrealistic and difficult as we know the amount of timeand money those companies spend to make things look sosimple.

    While everyone wants the latest and greatest technologywith new capabilities, people are still very resistant tochange. Many times it is the technology team that winds

    up having to push these same individuals clamoring for thelatest and greatest, out of their comfort zones and into thefuture.

    Driving Innovation in the Team

    The foundation of encouraging innovation is to create aculture that not only allows and supports it, but expectsit from everyone. In order to deliver success based oninnovative thinking, everyone on the team needs to feelthey can think outside the box related to everything theydo. It might sound basic, and it is. However we constantlychallenge each other to ensure creativity and new ideas arealways brought to the table. From the most basic task tothe largest most complex projects, there is always a betterway to do things.

    A Gadget MarvelI am definitely a gadget lover, but my favorite is my Nest

    Learning Thermostat. It is like a smartphone and a homethermostat combined into one. Besides being a goodthermostat, it does everything automatically and can becontrolled over the Internet so no more forgetting to setthe heat or air conditioning. It is a great example of howtechnology is making everyday tasks easier.

    Covanta Energy (NYSE: CVA) owns and operates worldwide over 40new generation waste combustion facilities withadded benefit of energy recovery, also known as waste-to-energy or energy-from-waste power generation plants.

    Headquartered in Morristown, the company has a market share of $2.6 billion.

    Stuart Kippelman, VP & CIO, Covanta Energy Corporation

    Stuart Kippelman

    Meet the CIO

    To deliver succeon innovative theveryone on the needs to feel the

    think outside the

    "

    "

  • 8/12/2019 CIOReview Low Res March 13

    12/26

    | | March 201322CIOReview

    Consumer Behavior

    Trends drivingRadical Change in

    drive the Industry

    Previous Experience aiding Todays needsMy past experiences in other industries have prepared me very well, notablythe advanced technologies, process discipline and fast pace. Those are allelements of the Dominos IS culture that are very familiar to me. Dominoscustomer focus and drive for product excellence are also in my DNA, so thattransition has not been too hard.

    The biggest hurdle for me is that I do not yet know the businesses aswell as I want to. The more I understand how the business works, the moreimpactful I can make the technology. The good news is I am surrounded bya great leadership team, that are experts and they are doing a great job ofmentoring me.

    Technology an Enabler for DominosWe absolutely feel that technology is a competitive differentiator on a global

    basis. It starts with a single, common, global, Point of Sale system; extendsthrough a highly-optimized supply chain and meets the customer with one ofthe highest rated e-commerce experiences. All of our systems work together to

    help make this happen.Some areas of Focus for Dominos E-commerce with a strong investment

    in Mobile platforms Big Data & Real-Time Analytics E-Commerce Infrastructure

    Technology TrendsWe always look at Macro trends first,focusing on the big trends in society,consumer behavior and technologyand then we look for the inflection

    points. The biggest trends that willdrive our industry are the sameones that are driving radical changein consumer behavior: Mobility,Ubiquity & Personalization. Dominoshas active projects in all these areas.

    Challenges and SolutionsIt depends on what day of the weekit is. By that I mean the biggestchallenge is not the things you knowyou have to do, it is the unexpectedthat provides the real challenge andoften the greatest opportunity. Wehave objectives, budgets, project

    plans and portfolio managementto name a few, for all the things we

    plan to do. For planned activities itis all about flawless execution. Forthe unexpected or unplanned itsabout having a nimble, experiencedleadership team. We use the analogyof good technical athletes, so wecan field team no matter what sport

    (problem) we are aWe recruit and develtechnical team with this

    Road map aheadWe have a team of ab

    best IT professionals inhands down. We augmwith several technologycouple of world class ouvast majority of thoseour headquarters whe

    bringing Silicon Valleyto Ann Arbor, Michigvery cool. As we coglobally we will see mteam located in our regEurope and Asia.

    Domino's Pizza (NYSE: DPZ) is a restaurant chain known for its pizza delivery

    operating a network of company-owned and franchise-owned stores in theUnited States and in international markets. Founded in 1960, the company hasa market cap of $ 2.58 billion.

    Kevin Vasconi, EVP, CIO, Dominos Pizza

    The biggestchallenge is

    things you kyou have tothe unexpethat providereal challenoften the gropportunity

    "

    Meet the CIO

    Kevin Vasconi

    | | March 201322CIOReview

  • 8/12/2019 CIOReview Low Res March 13

    13/26

    | | March 201324CIOReview

    In todays times, architectural elegance is agrowing requirement in organizations. With

    problems requiring newer solutions in termsof disruptive technologies we can see plenty ofopportunities but at the same time this makesthe architecture more complex which gives rise

    to the requirement of greater planning. This is anarea that a CIO must monitor. Needs of business partnerssuch as marketing and customer support are also growingand they need to be aligned with the budget and guidelineslaid out by the senior management. A CIO is expectedto balance multiple constituents like these together. Thisseems tougher in todays era than ever because of multitudeof opportunities present.

    Disruptive technologies are well on their way tochange the face of enterprises and the way they look atIT. Cloud computing is one of the crucial technologytrends that is molding the future of the industry in a bigway. Moving assets and process components to the cloudhas a huge impact on streamlining business processes andimproving cycle time. This technology entails advantagessuch as it being asset-light, which helps IT organizationssteer the focus towards the core issues more and making an

    organization move faster.With cloud computing gaining momentum, mobile

    is another trend that is already changing the way theenterprise and consumers interact. The penetration ofsmart phones has made computing truly mobile today.

    These devices bring the end user closer to the business andhave managed to cut out a lot of the processes and layersin between. This has also increased the importance of thetechnology organization. More than ever, IT now plays a

    transformational role in an organization.As technology advances and companies adapt to these

    change; in this environment a CIO always requires to focuson finding the right talent that fits the requirements of a job.This process has always been tough but the complexitiesare growing manifolds now with the advent of newer

    technologies.To solve all these issues and to ensure growth,

    innovation is the key. It is very important to create aculture within the team that fosters innovation. People who

    become good examples to the rest of the organization must

    Gogo Inc., headquartered in Itasca provides in-flight broadband Internet service, streaming video and other connectivityservices for commercial and business aircraft.

    Rama Prasad, SVP & CIO, Gogo Inc.

    be hired. Recognizing and rewardinginnovation at all levels of theorganization irrespective of its size isa necessity. Apples iPhone is a greatexample of innovation in technology.The simplicity of intuitiveness of thedevice has changed the expectationsof user interfaces for all software.Companies should try and incorporatethis streak of innovation in all their

    products and services.But innovations alone will not help

    growth. The enterprise environmentfaces several challenges; the solutionsfrom different vendors cannot benitrated easily. It becomes mandatoryfor the vendors to follow or adapt up

    to date industry standaof the hour is to addwhere the equation in dfacilitated.

    A CIO also needs demands pertaining toand opportunities, of ththe limited supply in tand manpower. This is challenge faced by a Ca project prioritizatio

    puts the business partof prioritization is a poThe concept though ithan done. All thesetogether will enable thenterprise alike.

    Changing Variables in the

    CIOs Equation

    Meet the CIO

    Rama Prasad

    A CIO also needsto balance thedemands pertainingto projects, ideas andopportunities, of thebusiness with the

    limited supply in terms of budgetand manpower

  • 8/12/2019 CIOReview Low Res March 13

    14/26

    | | March 201326CIOReview

    At the end of 2012 there was one cleartakeaway about the cloud computingmarket enterprise use has arrived.Cloud use is no longer solely hidingin the shadows, IT departments areno longer denying its happening, and

    legitimate budgeting around cloud is now taking place.According to the latest Forrsights surveys, nearly half ofall enterprises in North America and Europe will set aside

    budget for private cloud investments i n 2013 and nearlyas many software development managers are planning todeploy applications to the cloud.

    So what does that mean for the coming year? In short,cloud use in 2013 will get real. We can stop speculating,hopefully stop cloudwashing, and get down to the real

    business of incorporating cloud services and platforms intoour formal IT portfolios. Here is what we expect to happenwhen enterprise gets real about cloud in 2013:

    1. We will finally stop saying that everything is goingcloud, and get real about what fits and what does not. Wenow have enough understanding about what makes cloud

    We will FinallyGet RealAbout CloudBy James Staten, Vice President & Principal Analyst, Forrester Research

    2013Cloud Predictions:

    platforms different from traditionalvirtual infrastructures and traditionalhosting environments to makearchitecturally sound decisions aboutwhich applications to move to thecloud.

    2. Cloud and mobile will become one. Whats the value

    of a mobile app that does notcall out through the Internetto back-end services? Notmuch. More often thannot, we are finding mobileapplications connected

    to cloud-based back-endservices that can elastically

    respond to mobile clientengagements and shield your data

    center from this traffic.3. We will stop stressing about

    cloud SLAs, and recognize that appshave to protect themselves. The best

    practice for cloud application designand configuration is to build resiliencyinto the application rather than expectit from the cloud platform. This wayyou can achieve any service-levelagreement regardless of the base SLA

    provided by the cloud platform.4. We will get real about cost

    modeling. Do the math, understand theeconomics, and monitor and optimize

    as your use evolves. If you want to getthe best ROI out of your use of cloudservices and platforms, you need toactively model the cost profile of yourapplications, monitor their resourceuse, and adjust accordingly. Costshould not solely drive your clouddeployment decisions, but cost can nolonger be ignored or assumed.

    5. Infrastructure & operations willfree the development teams to buildapps in the cloud. The developers donot really need I&Os permission, andour surveys show the business-unit-aligned developers certainly are notwaiting for it. In 2013 the I&O teamwill get comfortable with the factthat development on public cloudsis going to happen whether they likeit or not and it is easier for them toengage developers and be part ofthe conversation about how to do itsafely, securely, and with appropriateoversight.

    6. We will get real about usingthe cloud for backup and disasterrecovery. Instead of enterprises

    buying resources in case of a disaster,cloud computing and its pay-per-use

    pricing model lets you pay for long-term data storage while only payingfor servers when testing or declaringa disaster. It probably will not replaceyour existing BC/DR resourcescompletely, but the cloud is turningthe cost of storage upside down fasterevery month, and what was cheaper to

    back up to traditional DR storage lastyear will be cheaper and easier to putin the cloud is short order and fasterto recover.

    7. We will stop equating cloudwith commodity. Cloud services arehighly standardized and automated,

    but standardization does not have tomean commodity. We are alreadyseeing cloud services backed by high-end hardware, offering GPUs, SSDs,and other clearly non-commodityinfrastructure options. In 2013 expectto see the proliferation of these typesof choices as cloud providers leverage

    them to meet specific mand to differentiate com

    8. We will stop with AWS. While Services has opened ulead in the cloud platfoarguably as large as 70 share in 2013 wemarket position give wof strengthening compentrants. Microsoft anmade significant imptheir platforms, and by twe fully expect to seesubstantial OpenStack

    building strong positio9. We will ack

    advanced virtualizatiothing, and no, its The cloudwashing awdefinitely goes to edepartments who relabVMware environment so they could get teyes of their CIO. Verenvironments offereto the developer,

    provisioning, standardor cost transparency. get real about these A mostly static virtuathat successfully driconsolidation, operatioand fast recovery is a gvery good thing.

    10. Developers wDevelopment is not all the cloud. Our cloud deshows that the majorityframeworks, and methodologies we use inare also in use in the different isnt the cservices orientation anconfigure the applicatits own availability andAnd frankly this is noeither. So, while som

    practices and cloud senew, there are few excutrained developer to noin the cloud.James Staten

    View Point

    We are finding mobileapplications connectedto cloud-based back-end services that canelastically respondto mobile client

    engagements andshield your data centerfrom this traffic

    "

    " | | March 201326CIOReview

  • 8/12/2019 CIOReview Low Res March 13

    15/26

    | | March 201328CIOReview

    We are in the midst ofthe most rapid mobilenetwork change we haveseen in over 15 years.Mobility and the use ofwireless spectrum is thedigital oxygen that drives

    productivity the mobileindustry's equivalent to crude oil deposits. Spectrum reuseand targeted capacity using small cells indoors is rapidly

    becoming the answer to deal with networks at capacityand poor indoor service. So where is the $60 billionopportunity? It starts with providing a scalablesmall cell network that can deliver reliable indoor

    3G/LTE and Wi-Fi coverage and capacity forenterprises that recaptures vastly under-utilizedlicensed spectrum indoors, and is positivelyimpacting the outdoor macro cellular network.

    Mobility and agile network services forenterprises can create competitive advantage

    The enterprise mobility servicesmarket opportunity is arising asa result of several key trends:mobility and the needfor BYOD policies andcontrol, cloud computingand the emergence ofenterprise small cellsystems capabilities that

    go beyond coverage andcapacity. In 2013 and

    beyond, enterpriseshave an unrivalledopportunity to move

    their mobile relationships beyond minutes, Megabytes,subsidized devices, and engage mobile operators as trusted

    partners to their business. As more hardware and Wi-Fivendors start to offer managed SaaS and WaaS services, sothey leave the door open for fixed service providers to dothe same. Enterprise customers now have valuable optionsto curtail CapEx spending. The advantage that the mobileoperators have is that they can offer a full suite of OpEx-only mobility services with reliable licensed spectrumcoverage and capacity using multi-mode small cell systems

    and still deliver WaaS, SaaS, security and complianceservices.

    In the market analysis, Enterprise MobilityServices: Market Opportunity for Mobile

    Service Providers, Exact Ventures, ananalyst firm focused on technology marketintelligence, analyzed the managed mobilityservices opportunity for businesses of 100to 4999 employees in the United Statesand the European Union. In leveraging the

    mobile ecosystem and small cell systems for in- building coverage, capacity and services,

    operators have the ability tohelp enterprise customers

    remove IT challengeswith mobility, unifiedcommunications, secureaccess to applications,device management andintegration of cloud andtelephony, as well as

    leverage the emergence ofnew context and location-

    based services.With enterprise IT

    teams under constant pressure

    Customers is a $60 Billion OpportunityManaged Mobility Services for Enterprise

    The San Jose based SpiderCloud Wireless develops small-cell network platforms that allow mobile operators to deliverunprecedented cellular coverage, capacity and smart applications to enterprises. Founded in 2007, the company hasraised a total funding of $75 million from Charles River Ventures, Matrix Partners, Shasta Ventures and Opus Capital.

    By Art King, Director of Enterprise Services & Technologies, SpiderCloud Wireless

    to do more with less budgets andresources, the opportunity for trustedmobility services is tremendous, saysGreg Collins, Principal with ExactVentures. Until now, there has beenlittle reason for enterprises to have arelationship with operators beyondminutes and mobile devices. Smallcell systems that go beyond coverageand capacity can change this modeland open up new business models thatcan help enterprise customers save

    significantly on CapEx and OpEx.Enterprise IT can save

    approximately $60 billion between2014 and 2020

    By outsourcing telecommunicationsservices, enterprises can leveragenew in-building mobile services andsave up to 35 percent per year bytransitioning from a CapEx to a per-user/month OpEx model savingenterprise IT over $60 billion between

    2014 and 2020, and allowing finiteIT resources to be either re-allocatedto focus on differentiation andcompetitive advantage, or for the costsavings to fall to the bottom line.

    Managed Mobility Services Mobile operators will start to offertrue managed mobility services tothe enterprise, starting with basiccoverage and capacity, and follow on

    with services such as BYOD, MDMand PBX Integration, even Wi-Fi as aService.

    Enablement of such servicesstarts with the deployment of a multi-access small cell system that includes3G, LTE and Wi-Fi, and can scale

    beyond a few small cells to deliverreliable mobile services indoors forenterprise customers of any size. Toenable managed cloud and applicationservices, a locally deployed controller

    or services node maintains secureservices access to and from any mobiledevice on the network.

    Hosted Unified Communications(UC)refers to a set of real-timecommunications services suchas instant messaging, presenceinformation, telephony and videoconferencing, as well as non-real-timecommunication services like e-mail,SMS, voicemail and fax. UC is notnecessarily a single product, but is

    often a set of products that provides a consistent unifieduser interface and userexperience across multiple

    devices and media types.

    Security: Cloud-basedWeb Filtering :Enterprisesincreasingly employ cloud-

    based web filtering as away to monitor and controlwebsite access and usageto enhance productivityand improve security by

    protecting against malwareand spyware.

    Mobile Device Management (MDM)entails lifecycle management of bothcompany and employee providedmobile devices to manage and secure

    enterprise data and access.

    Compliance ServicesMany industries are subject toregulatory record keeping, requiringdocumentation of all communications

    within an orgaconjunction with

    based telecommunicatoperators can centralizestorage, and reportinghelping customers reliadhere to regulatory ocompliance.

    Wi-Fi-as-a-Service is enterprise-focused sersecure internal and gues

    the operator is already icells with Wi-Fi, it cancustomers Wi-Fi accopportunity is available

    Context-Aware (orServices can offer enterprises ause cases. The opportunthe very sophisticated mlocation capabilities in sextend them into the mcreates unique oppinnovate enterprise buin ways that have nevavailable.

    Enterprise CIOs a

    expect mobility servicommunications partnelonger-term strategy toand improve productiviagility.

    NaaS: The next BigAs we look forward, the emergence of a comnetwork infrastructuremicro and small cells tandem with intelligenvirtual routing of acces

    Network-as-a-Service becoming a reality muexpected. Mobile opeoffering their enterprclientless-UC access applications and cloud-that create more vaservices, and build drelationships for years t

    View Point

    Art King

  • 8/12/2019 CIOReview Low Res March 13

    16/26

    | | March 201330CIOReview

    When people say Big Data, theyare usually talking about theanalysis of petabytes of data toget insights hidden in massivedatasets. New technologies likeHadoop get lots of attention

    because they make analyzingthese huge datasets possible.

    But Big Data also affects another part of the databaseworld: operational databases. These databases provideinteractive web and mobile applications with millisecondaccess to small pieces of data in a large database andare crucial to meeting the response time user demands.Big Data dramatically changes the requirements theseinteractive applications place on operational databases,which is why developers are seeking alternatives to therelational databases used for the last 40 years.

    Current Generation of Interactive Applications mustCapture and Process more DataBig Data is all about capturing and processing growingamounts of data to bring valuable new capabilities tousers. The current generation of interactive applicationsmust capture and process far more data than those of

    just a few years ago. Personal user information, sessionstates, geo location data, social graphs, purchase histories,user-generated content, machine logging data and sensor-

    generated data are just a few examples of the ever-expandingarray of data that is captured, stored and processed in anapp or acquired from third parties. The use of this data istransforming the nature of communications, shopping,advertising, entertainment, relationship management andeven how we do everyday things like hail a cab. Developersare discovering ways to leverage this data to enrich existingapplications and create new ones made possible by it

    because if they do not, they will fall behind.

    But managing this ever-growingamount of data is increasingly

    problematic. Not only is there moredata to manage, there are also moreusers accessing it (see Figure 1).Today, most applications are accessedthrough a browser or thin mobile app

    but run in the cloud. That means adatabase might need to store terabytesof data for tens of millions of userswho have downloaded the app andsupport the database operations formillions of concurrent users.

    Compounding the problem, themajority of the new kinds of Big

    Data being stored are unstructuredor semi-structured data (See Figure2). This means the data does not fitwell into the highly structured rowsand columns of a schema-basedrelational database. App developerswant something more flexible thatcan easily store any new type of dataand easily handle content structurechanges.

    Addressing the challenges of BigDataTo address the challenges of BigData and Big Users, more and moreapplication developers are looking to

    NoSQL databases. The use of NoSQLtechnology is rising rapidly amongInternet companies and enterprises.Many consider it a viable alternativeto relational databases, especially asorganizations recognize that operating

    at scale is moree f f e c t i v e l ya c h i e v e dwith clustersof standard,c o m m o d i t yservers, and that aschema-less datamodel is often a

    better approachfor handling thevariety and typesof data used bya p p l i c a t i o n stoday.

    NoSQL databases were developedfrom the ground up as distributed,scale out databases (unlike the scale-up, shared-everything architectureof relational technologies). Theyuse a cluster of standard, physicalor virtual servers to store data andsupport database operations. To scale,additional servers are joined to thecluster and the data and databaseoperations are spread across the largercluster. Since commodity servers areexpected to fail from time to time,

    NoSQL databases are highly resilient, built to tolerate and recover from suchfailure.

    NoSQL databases provide a mucheasier, linear approach to databasescaling. If 10,000 new users startusing your application, you simplyadd another database server to yourcluster. Add 10,000 more users andadd another server. There is no needto modify the application as you scalesince the application always sees asingle (distributed) database. Sincedatabase operations are spread overmany servers, consistently very high

    performance can be maintained.Since the use of Big Data is

    increasingly important to the successof an application, being able toefficiently interact with a databasetakes on added importance. Sincedevelopers generally use object-oriented programming languages to

    build applications, it is usually most

    efficient to work withthe form of an object wstructure consisting olists and arrays.

    Relational Data forthcomingsThe relational data movery limited data strucnot map well to the Instead data must bretrieved from tens or of interrelated tabrelational frameworksrelief but the fundamemismatch still exists bean application would data and the way it is in a relational database

    NoSQL databasedocument databases an entire object in adocument and supportstructures. This makeconceptualize data as debug, and evolveoften with fewer lines advantage in a Big Da

    Big Data:Fueling the

    Rise of NoSQLBy Bob Wiederhold, CEO, CouchbaseThe California based Couchbase is a provider of NoSQLdatabase technology and is the company behind theCouchbase open source project. Founded in 2009, thecompany has raised a total funding of $31 million from

    Mayfield Fund, Accel Partners, North Bridge VenturePartners, Ignition Partners and DoCoMo Capital

    Figure 2. Big Data: The amount of data is growingrapidly, but the vast amount of new data being storedin unstructured and semi-structured.

    Figure 1. Big Users: Global Internet usage is growing rapidly, as is theamount of time each user spends online daily. With the proliferation ofsmart phones, people use their apps even more frequently.

    View Point

    Bob Wiederhold

    The rapid take-upcombined with thacceptance of purchasing andcurrencies will reestimated $3.03 sales in 2016, rea10 times the $3figure calculated fomigration to tablis due to the fact thave to be purchas

    and the gamingthemselves often dofor a 3G or 4G con

    Courtesy: Juniper re

  • 8/12/2019 CIOReview Low Res March 13

    17/26

    | | March 201332CIOReview

    For the last two yearsI have written a

    blog called ChiefLocation Officer.Why? Becau se today,mobile location-

    based services aremainstream. Most of your employees,contractors and customers carry asmartphone or GPS-enabled handset.Even your assets are connected tothe network, from vending and ATMmachines to fleets and pallets to

    medical equipment to drones.Which means you can locate,

    track and monitor nearly any device,anywhere. And that poses big issues and opportunities for the enterprise.

    How do you keep your in-the-clouddata secure in a bring-your-own-device (BYOD) world? Who canyou track, and why, without violating

    privacy regulations? How can youturn your customers and workers intoinformation gatherers that you can useto reduce operating costs, slash fraud,improve efficiencies and enhancecustomer insight? How can you tapinto all the treasures of location in amobile world?

    Chief Information Officer (CIO),

    meet the Chief Location Officer(CLO). Last month I attended aconference of information officers,and these four questions kept comingup. Here is what a CIO should ask

    a CLO on the elevator ride up to theCEOs office.

    How big is this mobile and locationthing?Big and exploding. Of the 7.1 billion

    people on the planet, about 4.3 billionhave mobile phones, according tothe TomiAhomen Almanac 2013. By2015, it is assumed that the numberof IP-ready devices that will beconnected to the internet will grow toa total of 6,593 billion (source: ITU).This growth cannot be ignored. It is a

    boardroom topic.

    Location matters to the CIOBecause we live in a mobile society.Mobile-broadband s ubscriptions havegrown 45 percent annually over thelast four years and today there are twiceas many mobile-broadband as fixed-

    broadband subscriptions (source:MobiThinking, 'Global mobile st atistics2012'). But what does location mean tothe CIO? Depends on your business.I divide the entire location industryinto 10 service categories. Youmay need t o

    know about more than just one. TheBig Ten are 1) navigation, 2) search,3) advertising, 4)social networking,5) entertainment, 6) people locatorservices, 7) resource management,8) authentication, 9) operationsimprovement and 10) analytics.

    Location and its benefitsCost savings, Reducing risk,Increasing revenues and Enhancinginsight. Your answer depends onwhere your pain or opportunity isgreatest. The Fortune 1000 CEOs Italk to tell me their CIOs are diggingin on the last five categories listedabove. Why? The reason is mobilelocation delivers a new and dynamicdata feed that can save significantoperations cost, reduce fraud and risk,

    protect security and pull actionableinsight into the product, marketingand sales teams. The first five are keyfor the front line and companies in thetechnology, consumer and marketingagency sectors.

    Where do I get location?Most people think location comesfrom their smartphone. It does not.

    That is just the applicationasking for permission, as in:This app would like to useyour location. OK? The three

    primary location sourcesare a) satellites that signalwith GPS chips in devices

    b) cell towers operated bywireless carriers and c)

    WiFi access points, suchas hotspots. There areother sources too, such as

    IP location for computersand connected devices, third

    party sources from Google andother data mapping companies. Thereis even NFC. The trouble for the CIOis grabbing and controlling all thesesources. That is what Locaid, does.We are like the Amazon of location;we pull together all those sources oflocation through a single Application

    Programming InterfaSoftware Developmentmake them easy to acceOr you can direct the so

    Top 3 Things to BYOD and locatioAs the CIO, you are trand protect your infrsystems in a rapidly eConsumers are mor

    bad guys more capain the cloud, mini comemployees pockets anthree things you need t1. Never violate a pe2. Fully vet any ven

    provider in mobile, data. These are exploand there are lots of brshiny new things thaaround in a few years.3. Stay ahead of the cyour biggest risk is scompetitors are movinnot just an app on an iPis not just GPS aconsumer data.

    Stay ahead of themore about location, bmatters.

    Locaid operates a location privacy platform that allows mobile developersto locate over 350 million devices for enterprise authentication, fraudmanagement, and consumer location services and opt-in mobile marketing.The San Francisco based company has raised a total funding of $26.2 million

    from InterSouth Partners and H.I.G. Ventures.

    and theCIO:A Location ImpactAssessment forEnterprise Mobility

    BYOD

    By Rip Gerber, Founder & CEO, Locaid

    Rip Gerber

    View Point

    The trouble CIO is grabbcontrolling tlocation souothers such location for and connect& third partyfrom Google

    | | March 201332CIOReview

    "

  • 8/12/2019 CIOReview Low Res March 13

    18/26

    | | March 201334CIOReview

    The Emergence of the

    "Mobile Consumer Enterprise" This will fundamentally change how and boost productivity in an increasingenterprise.

    Strategies for the GTM barriersThe cost to start a company and roll has significantly been reduced, therebyover-supply of solutions for any given challenge is now less about developm

    but more about go-to-market (GTMdistribution barriers. With some seed caquickly overcome the development riskto roll out a solution. If it is a mobile has to now crack the distribution and challenges across Apple AppStore, Goothe plethora of new app marketplaces. capital is the source of "oxygen" for entr

    bar for Series A has gotten much higher aexpected to have solved the GTM and requirements earlier in the life-cycle of The funding chasm, which was traditionSeries A and Series B, has been broug

    between the Seed round and Series Ais increase in the trend of entrepreneur

    platform or OS to develop and focusuccess and unfortunately for (Windowit tends to be either iOS (Apple) or Andro

    A perfect storm is brewing in theenterprise with the current wavesof mobile adoption, BYOD and"consumerization of IT", each

    bringing its unique requirementsto be addressed. This has createdan opportunity for a range of

    point solutions such as MDM(Mobile Device Management), MAM (Mobile ApplicationManagement), Federated SSO (Single Sign On), EnterpriseAppStores, etc.

    The untapped opportunity is for new software servicesto focus on knowledge workers with an ease-of-use andmobile-first experience, all with the intent to enable anew wave of mobile productivity. Knowledge (or content)creation, consumption and sharing has been "stuck" in thePC paradigm for over 30 years. It is time to be unshackledand head into an increasingly mobile and social workforce,and not just through cloud-based file storage, but by

    bringing social context to content creation/consumption andenabling new models for sharing knowledge.

    Mobile: The World in your PocketMobile is by far the biggest disrupting

    force in the industry. With individualscarrying a computer in their pockets,

    in the form of a smartphone, phablet ortablet, there is a need for instant gratification

    when it comes to information. Over the past30 years, the industry has consolidated around the

    Windows PC platform and the innovation was limited by the possibilities of the end-point. Now with a range

    of different mobile devices with different OS and a widearray of capabilities, innovation has been awakened onceagain, and it is refreshing to see old habits being challenged.The near ubiquity of broadband networks (in most parts ofthe world), infinite storage and compute capacity in the"cloud", and the rich capabilities of the end points lay thefoundation for new services to be rolled out and utilizedalmost instantly. Employees find themselves empowered toselect their solutions of choice on their device of choice.

    Founded in 2009, CloudOn provides access to the productivity and collaboration tools required fordevices. Headquartered in Palo Alto, the company has received a total funding of $25.5 million fromThe Social+Capital Partnership, Translink Capital, Foundation Capital and Rembrandt VenturePartners.

    By Milind Gadekar, Founder & CEO, CloudOn

    View Point

    Milind Gadekar

    The cost to start a coand roll out a produsignificantly been recreating an over-supof solutions for any

    problem

    "

    "

    | | March 201334CIOReview

    Technolog

  • 8/12/2019 CIOReview Low Res March 13

    19/26

    | | March 201336CIOReview

    Are You Opening a Door for Hackers?

    Today, no CIO is safe from a data breach. In 2013alone, we have already seen major data breachreports from big government organizations,hospitals, restaurant chains and some of themost revered technology companies. But eventhough we cannot completely protect ourselvesfrom hackers, we can reduce our risk by makingit a lot harder for them to do their dirty work.

    In 2008, the Verizon Business RISK team issued the first inwhat has become an annual report analyzing hundreds of actual data

    breaches. One of the angles they examine is what attack pathwayhackers use to gain access to confidential data. According to thatfirst report, In over 40 percent of the breaches investigated during

    this study, an attacker gained unauthorized access to the victim viaone of the many types of remote access and control software, andIn many of these cases, the remote access account is configuredwith default settings, making the attackers job all too easy.

    In the five years since that report came out, it would seemobvious to assume that IT organizations have secured their remoteaccess and control software against hackers. But in the most recentData Breach Investigations Report, the Verizon team discovered,Remote access services (e.g., VNC, RDP) continue their rise in prevalence, accounting for 88 percent of all breaches leveraging

    hacking techniquesmore than any other vector. How can that be? How could the percentage of attacks via remote access

    more than double even after loud warnings every single oneof the last five years?

    Service desk reps, IT administrators, and applicationspecialists use remote control and remote access tools every

    day to access, control and fix remotesystems. In m