cioreview low res march 13
TRANSCRIPT
-
8/12/2019 CIOReview Low Res March 13
1/26
-
8/12/2019 CIOReview Low Res March 13
2/26
| | March 20132CIOReview
Contents March 2013
[In My Opinion]
Technology Strategies Designed to Support the
Workplace of the FuturePat Goepel, CEO, Asure Software
[CEO Spotlight]Jeff Hudson, Venafi
Dave Scholtz, Damballa
Rajeev Chawla, CloudVelocity
Mike Burkland, Five9
Arvind Narain, MobileASaP
[Meet the CIO]Think Differently toSupport newCapabilities in Business EnvironmentStuart Kippelman,Covanta Energy Corporation
Trends driving RadicalChange in ConsumerBehaviordrive the IndustryKevin Vasconi, Dominos Pizza
Changing Variables inthe CIOs EquationRama Prasad, Gogo Inc.
[View Point]2013 Cloud Predictions:
We will Finally GetReal About CloudJames Staten, Forrester Research
Managed Mobility Servicesfor Enterprise Customers isa $60 Billion OpportunityArt King, SpiderCloud Wireless
Big Data: Fueling the Rise of NoSQLBob Wiederhold, Couchbase
BYOD and the CIO:A Location Impact Assessment forEnterprise Mobility
Rip Gerber, Locaid
The Emergence of the"Mobile Consumer Enterprise"Milind Gadekar, CloudOn
[Technology]Are You OpeninJoel Bomgar, Bo
Ushering in a NBy Jack Welde,
[View Point]Guard the PerimCyber CrimesJVijay Basani, e
[Technology]Hadoop MapReA Match-MadeJohn Bantleman
[View Point]Time to DeliverCare Delivery POmar Hussain,
[VC Talk]Digital Health aExciting Oppor
Sachin Gupta, S
[Company of thRichard Kirk, SPresident, Alien
06
08
20
22
24
26
30
28
32
34
36
38
40
42
44
46
18
Services in the Cloudand Winning
Disrupting Technology
PradAditBy Rachita Sharma
Cover StoryPage 12
-
8/12/2019 CIOReview Low Res March 13
3/26
| | March 20134CIOReview
Publisher & Editor-in-ChiefHarvi Sachar
Managing Editor Christo Jacob
Editorial Staff
Benita MRachita Sharma
Sagaya ChristurajThomson Antony
Joe Philip
Visualiser Ashok kumar
Mailing Address
CIOReview44790 S. Grimmer Blvd
Suite 202,Fremont, CA 94538
T:510.440.8249, F:510.440.8276
March 2013, volume 2-2 Published monthy byCIOReview
subscription rate: $60for 12 issues
To subscribe to CIOReviewVisit www.cioreciew.com
Editorial
L ast month, we witnessed Obama signing an executive orderon cyber security, vowing to strengthen the nation's criticalinfrastructure through cross-sector information-sharing andframework. While increasing the amount of IT infrastructure moves to
the cloud, it is the right time to re ect on addressing security concernsin the cloud.Though security is one of the top concerns in the punch bag list inmost of the enterprises, majority of the companies are not safe usingthe cloud services. A GAO report based on the views of CIOs at 22major U.S. agencies, listed several security concerns: vendors usingineffective security practices, agencies not able to examine the securitycontrols of vendors, cyber criminals targeting data-rich clouds, andagencies losing access to their data if the relationship with a vendorends. Moreover, highly regulated industries such as banking, insurance,and healthcare face potential security threats owing to breaches andcompliance.Studies indicate that some merchants and businesses that manage orstore credit card numbers and other sensitive information do not usedata encryption software. But awareness towards security breachesand compliance issues is on a rise and more and more companiesare now looking towards cloud information protection. So as cloud
technologies mature, cloud providers will need to address this concernso that customers who utilize cloud infrastructure can gain visibilityinto their security postures within the cloud.So going forward, Obamas new law would incorporate and address
private sector concerns while at the same time providing informationsharing and collaboration between government and private sectorwhich will provide additional security to critical infrastructure suchas banking, industry, telecom and utilities sectors. What enterprisesneed to focus on is, while making the switch to cloud computing,organizations should search for cloud providers that use high-end
rewalls and intrusion detection systems and which undertake regularindependent security tests of their environments. This would help us inmaximizing the cloud computing market, which is expected to grow to$206.6 billion by 2016.However neither the CIOs nor the enterprise IT entrepreneurs havetaken these issues relatively seriously and need to be more seriousabout it. It is sad that, The most important things that one's working
on are not necessarily the most important things that one thinks one'sworking on. And Obamas new law calls for it to re ect.
Please do let us know what you think.
Christo JacobManaging Editor [email protected]
Secure your Cloud
Copyright 2009 CIOReview, Inc. All rights reserved. Reproduction inwhole or part of any text, photography or illustrations without writtenpermission from the publisher is prohibited. The publisher assumes no
responsibility for unsolicited manuscripts, photographs or illustrations.Views and opinions expressed in this publication are not necessarily thoseof the magazine and accordingly, no liability is assumed by the publisherthereof.
CIOReview
CIOReview
MARCH - 2013
| | March 20134CIOReview
-
8/12/2019 CIOReview Low Res March 13
4/26
| | March 20136CIOReview
It happens almost daily: Newtechnological advanceschange how employeesaround the world get workdone. A great example ofthe impact technology on
business is making work(and employees) more
portable. Thanks to tablet computing,wi-fi, easy access to limitless datastorage, and smart phone technology,
people can work from almost anywhereat anytime. And organizations leadingthe charge in mobilized workforcestrategies are realizing the benefitsof collaboration with better work
products and increased productivity.When it comes to technology
designed to support this evolvingworkplace of the future, whats next?Will anyone have a dedicated office orspace? Will a physical office presence
become a thing of the past? Howcan leaders create a workplace that
fosters productivity, efficiency andcollaboration and creates a companyculture current and future workforceswill embrace? Here are fourconsiderations your leadership teammust consider as they prepare, deployand support technology strategies fora truly portable workplace that is rightaround the corner.
Continue to provide Employees withTechnology that helps themLaptops and mobile devices, coupledwith Internet access, are commonplaceoffice tools that we all expect in theworkplace. Employees must feelempowered to take their computersand smart phones with them whereverthey go. And when workers needto collaborate on projects, providethem with an atmosphere wherethey can meet and have access to theinformation they need. One recentexample: as part of a recent product
implementation, a Fortune 500 clientreported drop-in sites with WiFi accesswere utilized 3 to 1 over fixed seatingoptions with wired network drops.
As college graduates enter theworkforce, they are accustomedto working in small groups whilesimultaneously communicating withtheir social networks. Employers canleverage these skilled multi-taskers
by ensuring they have access to thetechnologies they need namelythe Internet and the latest mobiledevices such as tablet computers andsmart phones. Employers shouldnot place narrow parameters on howthese former luxury devices get usedto complete projects. CumbersomeBring Your Own Device Policies andstrict rules around technology usagefrustrate an increasingly technology-savvy workforce and create a cultureof distrust. Instead, leadership teamsshould enable employees to use the
tools to their fullest capabilities andreap the productivity gains.
Use Technology to do things in moreInnovative waysThe information technology curve fora productive and efficient businesscan be summed up in four words:Cloud, applications, mobility andsocial. If you are not thinking abouthow to develop and deploy these four
business-critical technologies, its time
to rethink your IT strategy.Leveraging cloud-based services
for software and data storage enablesemployees work virtually anytime,anywhere. Cumbersome VPNconnectivity and arcane file servernetwork searches will sink employeemorale when their social technologyexperiences have clearly shown themthere is a better way. The traditionalemployee backpack approach ofsupplying traditional desktop PCs,designated workspaces, and land linesare giving way to newer, productivity-enhancing applications designed fortablet and smart phone devices. Andwith access to data via the Cloud and
the rise of sophisticated analytics viaBig Data employees can manageevery aspect of their jobs frommaking strategic decisions to recordingtime and managing expense reports from their mobile device.
Speaking of mobility organizations that place high emphasison workplace mobility solutions willgenerate as much as 30 percent bottomline occupancy savings per year with a
bit of real estate management diligence.Just like the technology that serves us,corporate workplaces are becomingsmaller with less traditional workcubes and more gathering spaces forcollaboration and social conversations.
Lastly, organizations that usethe social networks your employeesare most familiar with enhancedoverall productivity. Do not deploy
proprietary social network tools builtonly for business. Adapt and adopt to
the proven social tools that make sensefor your business.
Cater to Employees needs as theywork Remotely more FrequentlyAs technology drives change inhow companies and employeesdo business, the physical office orworkplace loses its importance inmany ways. Progressive organizations
encourage employees to telecommutefrom their location of choice. Butfrequently, remote office workersand telecommuters find themselvesisolated from the organization. Theisolation can deteriorate employee/workplace relationships unless yourorganization connects people morethoughtfully.
One technology trend organizationscan use to ensure employees stayconnected to the workplace is accessto the same tools available at the
physical office location. For example,remote workers should be able toschedule meetings in the office when
they need to with all the confidencethat the meeting room they schedulewill be available to them. In addition,organizations can maximize theiravailable real estate by providingremote workers with hotel office space
that can be reserved in a
Additionally, ad-hocand collaboration areas to find and access for are dropping into the dashboards, interactdisplays for space availalow cost solutions likeCodes can be leveragedexperience. Giving emto a physical workspa
need it allows them to to the organization anworkers.
Maintain a ThrivingA recent study called thWorkforce Index sho
percent of workers feestay connected with of normal working htechnologies may iefficiency and produalso contributes to emand burnout. As our glcontinues to conduct buits vital that the orgemployees maintain
balance.Companies must re
work-life policies wCreate clear work-life bthat employees will adhere to. To ensure suthese policies from theweekend emails from should be a rarity, nothe workplace to take tseriously.
In short, the revolution will continthe workplace and itto carefully detesolutions will posi
workplace cost savingemployee productiviexamine opportunities continue to monitor animpact technology is organization and its peo
Workplace of the FutureBy Pat Goepel, CEO, Asure Software
Technology StrategiesDesigned to Support the
Asure Software (Nasdaq: ASUR) provides cloud-based workplace managementsolutions to clients in North America and Europe. Headquartered in Austin, thecompany has a market cap of $35.96 million. Pat Goepel
opinion
in my
-
8/12/2019 CIOReview Low Res March 13
5/26
| | March 20138CIOReview
CEO Spotlight
Cyber Security TrendsThe hot trend is cyber security and therelated adoption of next generationsecurity solutions required to addressthe sophistication behind today'scyber-attacks, commonly referred toas 'advanced malware. The enemy iswell-funded, patient and is leveragingan ecosystem and infrastructure thatthey have devel oped specifically forthe purposes of evading traditional
layers of defense.The stakes are ever increasing
as cyber criminals are targetingintellectual property, sensitive personalinformation, critical infrastructuresystems and more. Companies arenow realizing that prevention - centricapproach (think anti-virus solutionsand firewalls) to protecting theirnetwork and users is not enough.The information security communityat large is shifting to a detect-and-respond mentality, recognizing thatthey may not be able to prevent a
breach. But it is imperative that theydetect infected assets within theirnetworks, particularly those under
criminal control.
The FutureThe Internet of Things. While it has notfully arrived yet, it is apparent that it isnot a question of will? but when?we will be living amidst the Internet of
Things. With this impending reality,the industry is heading into a newfrontier of combatting cyber crime.Of course, not every IP -addressableobject will be a target or fall victim to
cyber criminals, though we can expectto be challenged by a new wave ofthreats and threat vectors as thesecriminals seek new and innovativeways to exploit the pervasiveness ofan IP - connected world.
Already today, enterprises mustreact to the erosion of the network
perimeter and the proliferation of
devices, operating systems and mobileusers that are connecting to theirnetworks. This is why Damballa andothers are delivering next-generationsecurity solutions that detect andterminate criminal activity bymonitoring network behavior.
An EntrepreneursKeeping up with iand innovation morthe challenge to ento be aware of and of the trends and innon around them, wmaniacally focused oof their own unique owork to develop prodmarket and build a v
Whether it is cloud cData, mobility, or any oservicesolutions to nais continuous innovatiat a rapid rate around tthat may impact the
business. By being aentrepreneurs can put in making their bu
productive and efficcan apply them to strategies to take advanopportunities or to avo
All of this being good problem to hanever been a better ton an entrepreneurial
the low cost and eascomputing power and that are now availableinfrastructure, softwarand best practices neces
product and support a coperations.
Atlanta headquartered Damballa protects businesses from bot-driven targeted attacks
used for organized, online crime. Founded in 2006, the company has raised a totalamount of $44.5 million from Paladin Capital Group, Sigma Partners, Palomar Ventures, InterWest Partners, Imlay Investments, Blumberg Capital, GRA Venture Fund, AdamsStreet Partners and Noro-Moseley Partners.
Embrace Technology Trendsto take Advantage ofMarket OpportunitiesDave Scholtz, CEO, Damballa
The technology industryhas been in a stateof constant flux,and there have beenseveral prominentadvancements which
have changed the face of businessoperations. The contraption ofdata based inventions such as cloudcomputing and big data have made itall the more convenient to superviseand store data.
Organizations Vulnerable to InternalThreatsEven though organizations are
conscientious while handlingcritical data and undertake to protectthemselves from cyber assaultsthrough several security measures,they are still vulnerable to attacks,
both external and internal. A recenttrend which is shaping up in todaysindustrial scenario is the absence oflaws and precincts required to monitorand control confidential data from
being accessed by threats presentinside the organization, in the form ofhuman resources like software agents,spy agents and so forth. This leavesorganizations in a dilemma of whereand how to place their trust regardingdata security.
Recent incidents have proventime and again the importance ofoptimal and viable security to protectan organization from outsider as wellas insider threats. A study has shownthat almost 50 percent of the fortune
500 companies have been attackedand infected and data has beencompromised. Preeminent techniquesto contradict security threats suchas consolidation are slow andcumbersome ineffectual on modernday threats. Even installing firewallsand barriers prove futile againstinside threats. Encryption answersall the security related problems ofmodern day business and is highlyeffective against attacks from insidethe organization. Encryption ensuresthat data in any form is protected asit is meaningless in possession ofindividuals who do not have the keyto decrypt it.
The amount of data producedin the world today is enormousand managing the encryption keysgenerated is a herculean task. Venafiwas established to address this issue.
By enabling organizations understandwhere their security certificates lieand who has access to it, we give themcontrol over the data. We also enablethem to change security around thecertificates and revoke access as andwhen required. Our role in the industryis to give the companies control overdata even if they do not own it.
Shift in Technology in Recent YearsThe major shift in technology inthe recent years is the maturationof internet and its integration intoour daily lives. Another big changewitnessed is the recognition of mobile
computing and advent of serviceslike drop box, cloud and other suchservices. The advent of Big Data hasalso raised ramifications regardingdata security. Proper encryption ofdata is required to make sure that
private information is not misused by profit making organizations.
The key challenge beforeentrepreneurs is to get largeorganizations adapt their technology.The process of getting an organizationof fortune 500 stature, listen to youridea and sell it to them is tediousand cumbersome and requires skilland expertise. It is a relatively uphilltask as these brands are unknown and
organizations are skeptical about theirability to service them. Thus, the mostimportant requisite for entrepreneursis to get the big brands understandtheir technology and their ability toservice them.
CEO Spotlight
Changing Technology DemandsComplete Data EncryptionJeff Hudson , CEO, Venafi
Founded in 2000, Venafi delivers enterprise encryption management solutions providing organizations significantimprovements in critical system uptime, operational efficiency, and compliance management. Headquartered in Salt LakeCity, the company has raised a total of $16 million to date from Foundation Capital, Origin Partners and UV Partners.
Jeff Hudson
-
8/12/2019 CIOReview Low Res March 13
6/26
| | March 2013 10CIOReview
Adoption ofPublic Cloud is Tepid
The business case forenterprises to developtheir own data centersis rapidly eroding.Many are opting forthird party facilities
and cloud operating models, yetthere are serious shortcomings which
prevent enterprises from taking fulladvantage of the transformative powerof public clouds. Running existingapplications in a public cloud is hard:today's multi-tier applications spanmultiple hosts and are comprisedof not only application binaries anddata, but also libraries, operatingsystem services, data servers andother network services residing in the
enterprise. Today it requires extensivemanual configuration, provisioning,and a series of complicated and timeconsuming processes. The result isa costly, risky and slow approach toorchestrating workloads and services
between data centers and clouds,impeding the business case for publicclouds for most enterprises. Soadoption of public cloud by enterpriseshas been tepid at best.
We decided to tackle this problemat CloudVelocity. The CloudVelocity platform decouples enterprises fromtodays public and private cloudrestrictions and enables the ability totreat multiple clouds and data centersas a single, dynamic pool of resources.
Advantages of a Hybrid CloudThe hybrid cloud is a hot trend,
because it establishes a credible and powerful operating model for theenterprise adoption of public clouds. Itcombines the agility payoff of publiccloud and combines it with the controlthat enterprise IT expects to have inits own data center. It is the future ofenterprise cloud computing because itenables IT to operate at an even higherlevel of productivity and economy.
Hybrid cloud will also enablea new generation of solutions thatwill be far superior to their hardware
and premise-bound predecessors,including cloud migration andintegration, cloud cloning, cloudfailover and cloud bursting. All ofthese solutions will be a leap ahead ofthe solutions in use today. They offermore agility and economy with higher
potentials for availability, and withfewer trade-offs and compromisesnow commonplace.
There will be increasing agility
pressures on enterprise IT and the needfor hybrid cloud operating models will become table stakes for all enterpriseIT departments. Service providers will
be required to cater to this requirementin order to win significant portions ofthe enterprise cloud business.
Lines between SME and EnterpriseMarkets are BlurredThis is a great time to be anentrepreneur as these hybrid cloud
platforms will fuel entirely newopportunities for growth. This comingera won't be easy, but it will be easierto start a tech venture and obtaingrowth on a more level playing field.Service will be a key requirement, and
both marketing and operations will play a more strategic role in success asthe lines between SME and enterprisemarkets are blurred by the rise ofhybrid clouds.
Rajeev Chawla, CEO, CloudVelocity
CEO Spotlight
CloudVelocity is a provider of software that enables new and existing Linux and Windows multi-tier applications to runin the cloud without modification. Headquartered in Santa Clara, CA, the company recently raised $5 Million in series-A
funding from Mayfield Fund.
Rajeev Chawla
BYOD: Empowered by tFounded in 2001, Five9 is a pure cloud-based contact center software provider. The California headquartered chas received a total funding of $49.6 million from Mosaic Venture Partners, Hummer Winblad Venture Partners,
International and Adams Street Partners.
Mike Burkland, CEO, Five9
The softwareindustry is at aninflection point;aging, premised-
based solutionsare beingreplaced withcloud solutions.
This shift to the cloud is allowing businesses to move beyond outdatedtechnology paradigms to new, more
flexible and cost effective models.Cloud based solutions are helping businesses achieve tangible resultswhile also controlling costs with aPay As You Go model. Today, manycloud solutions are as sophisticated
and innovative as traditional software, but at a cost of ownership that is farlower than premise-based solutions.Cloud software providers can deliverrobust, enterprise applications as aservice that is affordable, scalable andreliable.
In the near future mobile deviceswill outnumber PCs; this is a radicalchange in the market, which cloudenables. This consumer trend and
proliferation of mobile devices israpidly moving into the enterprise.Many organizations today have orare considering Bring Your OwnDevice strategies for the workforce.This is forcing IT organizations to re-think infrastructure management, datastorage and security. In the future,the old model of knowledge workersusing laptops and PCs in a corporateoffice park will change to tablets beingused from coffee shops and homeoffices. This move toward mobility,enabled by the cloud, will lead to a farmore distributed workforce than ever
before.
Dodging the DartsEntrepreneurs rarely have a shortageof product and business ideas,however critical challenges do exist.Entrepreneurs must first find a largemarket opportunity, and then createa product that addresses the marketneed and has strong competitivedifferentiators and barriers to entry.The next step in value creation is
building a repeatable and scalable business model with a strong
leadership team capablon the vision. Five9 hasin the ability to meet thhead on to become
market leader in cloudsoftware.
By 2017, 25 percent ofwill have an entestore for managing sanctioned apps onmobile devices. app stores promicontrol over the appemployees, greateover software eand greater leverage with appbut this greater contpossible if the entestore would be widel
Courtesy: Gartner
CEO Spotlight
Mike Burkland
-
8/12/2019 CIOReview Low Res March 13
7/26
| | March 2013 12CIOReview
If we have to pick one technology thatwould define this decade, it would be CloudComputing. With the proliferation of betterinternet bandwidth and improvements in webtechnology, cloud computing technologiesare disrupting the way companies look atIT. As with any emerging technology, thereare misconceptions and fears associated
with Cloud computing too. Slowly yet steadily thesemisconceptions are dissolving as enterprises realize thehidden potential of the technology and the long list ofadvantages such as cost efficiency, energy efficiency,
disaster recovery, flexibility etc that it ensues withitself.Enterprises in several verticals are embracing
cloud open heartedly and experts believe that the cloudcomputing market will reach a whopping $14 billion
by 2014. As the technology comes of age, innovationsare the key way forward. One such disruptor is AditiTechnologies, an award winning Microsoft CloudPartner which has pledged to help customers leverageemerging technologies and guide clients to gaincompetitive advantage through transforming their
business to the cloud. Through their deep partnershipwith Microsoft, Aditi is at the forefront of Platform asa Service innovations.
Founded in 1994 as a technology services company,Aditi Technologies has always been a contrarian ina fairly homogenous Indian IT services sector. As
a result, clients regularly turn to them when a new paradigm emerge which requires serious technologydepth. Today, the worlds largest ISV, largest insurancecompany, largest gaming company, largest informationservices provider, largest mobile carrier and secondlargest social network count them as their R&Dinnovation partner.
Cloud, a Common Denominator for InnovationIt has always been the large organizations which hadaccess to people, process and technology; in order tocome up with innovations. But cloud has changed all
that. With the widespread adoption of Cloud applications
1. Companies big or small have the same accresources, technology
2. Users get a friendly user interface similar of consumer technology and reduce learning greatly
3. They are without the usual complex installand integrations, ensuring that the applications courunning in hours
4. No upfront cost with operational costs bausage make them easy to try and then buy
As a trendsetter in emerging technologies,foresaw this shift and positioned themselves vehicle of choice for organizations, irrespecti
Cover Story
In 18 months,either yourbusiness will beon the cloud oryou will be in adifferent busine
"
"using itsHow an innovator is
Disrupt Technology ServicestoCloud First Policy
By Rachita Sharma
-
8/12/2019 CIOReview Low Res March 13
8/26
| | March 2013 14CIOReview
is convinced that by investing in thecloud, ahead of the curve, customersstand to gain significant competitiveadvantage in the long term. Enterprisesalso stand to gain velocity, agility andfocus on enabling their own businessobjectives rather than IT. This strategyalso guaranteed their customers toleverage cloud aggressively and learnmore. At first they are skepticalabout such a radical recommendation,
but once they realize the actual potential, things become easy, addsa proud Rathinam. The company hasdelivered over 100 engagements oncloud, that by itself is often 5X or 3Xthe number of engagements most oftheir competitors have delivered.
One of these engagements waswhen Aditi helped Restaurant.com, aweb company for restaurant booking& gifting; gain auto-scalability of datacenters during promotion days viacloud. Due to spike in the web trafficwhich went almost up to 10 timesduring the season days, RDC wasnot able to handle it efficiently whichresulted in losses. Aditi deployed itscloud solution and mirrored them atdifferent data centers for advantagesin proximity, availability & Disasterrecovery.
Says Adnan Adamji, CIO ofRestaurant.com, Aditi has beeninvaluable in helping Restaurant.comimplement our cloudbased solution.Their extensive technical depth onMicrosoft Azure has been extremelycrucial to our success. But any move
to the Cloud must be meticulously planned. Aditi sounds a word ofcaution to organizations planning tomake the move to the cloud as doingso without thoughtful planning cancreate problems down the road.
In a bid to increase credibility ofits radical Cloud First ApproachAditi moved all of their functioningto the cloud as well. With a vision to
be a zero server company they havesuccessfully moved their mailboxes,communication infrastructure,development platforms, intranet,corporate sites and analytics to thecloud. The company's strategic
planning and reviews are conductedon Google+ hangouts and they alsomade a unique step of recruiting viaFacebook and Twitter. Aditi choseto build its solution using Microsoftvirtualization and cloud technologieson a Hyper-V platform. This moveensured a 40 percent reduction in costswhile consolidating physical servers
by 60 percent. The transition was sosuccessful that Microsoft publisheda case study on it as a reference forfuture customers.
Disrupting CompetitionWith an innovative yet effectiveCloud First Policy in place coupledwith the deep talent pool in theorganization, winning accolades forits dedicated work in the field of cloudcomputing has become a routine forAditi Technologies. The companyhas been graced as one of top 3 cloud
consulting companies platform 3 years in a roglobal services comptheir ability to lead tsustain leadership. Onehow one could manage competition and emetime and again.
The answer lies inadopted by the compadifferentiated identity
portfolio. Aditi has technique of working intechnologies sector an
their size and might to help them migrate theirfunctions to the cloud. This transition has opened newvistas and Aditi Technologies is steadily working toleverage this revolution. We believe that cloud can aidany organization innovate and accelerate their strategyto market domination, explains Pradeep Rathinam,CEO, Aditi Technologies.
The largest part of their business comes from productcompanies, startups and ISVs. Product companies
building social, media or data driven products are the biggest consumer of their services. The company isalso seeing rapid enterprise adoption in the past quarter
specifically in the online commerce, healthcare, traveland financial services verticals.
Cloud First PolicyWhile cloud had a great level playing effect for startupsand ISV, enterprises too cannot afford to ignore theinherent advantages of it. Customers always want togain first mover advantage to beat competition andreduced time to market and executing projects on cloudenables them with faster time to market & reducedcost, explains Rathinam.
Contemplating the criticality of cloud in the future,Aditi has devised an ingenious Cloud First Policywhere they encourage all their customers to considerthe move to the cloud for every technology project.While the approach may sound radical, but the company
The biggeschallenge ocustomers today is thunknown rcloud integNavigating journey anmanaging core to our
Cloud provides us anopportunity to play asService as a softwareplayer by leveragingreusable cloud basedsoftware to deliver
services faster, cheaperand smarter
Cloud First in Practice-Restaurant.com
ChallengeRestaurant.com (RDC) is the trusted andvalued source connecting restaurants anddiners in the US. The company offers the
best deal on every meal at more than 18,000restaurants in US with nearly 50,000 dailygift certificate options. During their popular
promotion days, their web site is crushed withsometimes a 10x spike in traffic.
SolutionAditi conducted a detailed design analysisover a three week period, and as a CloudFirst approach, recommended a cloud basedarchitecture based on Windows Azure. Asa follow up to the design, Aditi completedsix proof-of-concepts (POC) over a 6 week
period that proved the technical viabilityof key aspects of the architecture to RDC.On the strength of the success of the POC,a Hybrid Cloud solution with sensitive datakept on-premises while application and data
processing was built and deployed on thecloud.
Benefits Automatic 10x Scalability in Minutes Consume server capacity on-demand duringsurge and contract during other normal
periods Gain advantages of proximity, Azure
availability and Disaster recovery throughdata center mirroring
"
"
Quick Facts about Aditi Technologies
-
8/12/2019 CIOReview Low Res March 13
9/26
| | March 2013 16CIOReview
a step ahead of the technology curve,when most services companies findit difficult to understand and deliveran end to end solution in a disruptivetechnology space. We execute ata global scale, leveraging pre-builtframeworks and Intellectual Properties(IP) to accelerate time-to-market forour clients, adds Rathinam. Another
point of differentiation is theircapability to solve complex problems.It is relatively easy to try a new cloud
platform but on the contrary building,releasing and managing a cloud basedsolution does not come so easily toall. While many services providersare finding a lot of envisioning andPoC business, few of them have thecapability to solve the cloud problemwith a clear sense of challenges acrossSDLC and across markets. Owing tothe early starter advantage and over100 cloud engagements, Aditi iscapable of solving this problem wellgiving them a clear lead in the race.
Customers leverage theseframeworks and codebases to accelerate
time to market and reduce cost ofcloud development, says Rathinam.And crucially, the company makes it a
point to involve their customers withthem on this journey. Today, we haveover 20 cloud customers who wouldrefer us and are strong advocatesof our cloud services. Most of ourgrowth in recent times has come fromcustomers and the ecosystem referringus to other customers. As long as wedeliver customer delight, we will be
in a strong position, explain a proudRathinam.
Aditis Customer Focused GrowthAditis simple yet disruptive operatingmodel is doing the trick. With a longlist of illustrious customers such asMicrosoft, Nokia, Intuit among others,the company showcases the trust putin it by these established stalwartsto battle the challenges that cloudthrows their way. These challengesare tough problems and require astutetechnology and business orientation.To deliver this, Aditi is insanelyfocused on getting the right talent. Thecompany only hires the top percentile
technology talent and gives them thefreedom and direction to excel. Thisforms a sold ingredient of the core oftheir growth. We believe in pickingthe right battles and stay focused. So,we have deliberately stayed awayfrom commodity services and focusedinstead on high-value, high-complexityconsulting space, explains Rathinam.
The company has its eyes set on itsgoal and is steadfast making its wayto make the most of the cloud. 2013is going to be the year of the cloudwhen it loses its buzz word statusand actually becomes a ground reality.More vendors and solution providerswill compete to offer customers
services with more reliability, lower prices, better management and easieruse. This means stiffer competition butAditi is gearing up to make the mostof this shift and is rapidly evolving.The company envisions to become
the top cloud consulting companyacross all major cloud platforms inthe next 2 years apart from seekingfaster profit growth. Investing heavilyin AWS, SFDC, TIBCO and having
built up technology partnerships withmore than 20 cloud platform vendorsglobally they are surely making theirway to the top of this new peak. Wewant to become a complete cloudsolutions provider across core cloudchallenges like data, media and cloud
integration for our customers, saysRathinam.
Innovation is a core ingredientof Aditis DNA and the company isgearing up to build offerings aroundCloud Services. The core idea isto package frameworks and codelibraries that clients can deploywithout significant technologyinvestments. It helps our clients andhelps us scale without necessarily
building huge teams. We want to be smart about scaling our businessand leverage repeatability, explainsRathinam. Having released one ofthe first 5 apps on Windows AzureStore around Task Scheduling thecompany will be releasing many moresuch services around data integration;mobile services this half to stay aheadof its competitors.
Cloud: The Platform of Choice forFuture InnovationsThe verdict is clear. Cloud is here tostay and companies that do not makethe move will end up being the losers inthe race to the top. The future belongsto those who will truly understand the
present scenario, manage risks, andinnovate using cloud. Disruptors likeAditi are making this critical transitionto the cloud seamlessly; which has
become a cake walk for ISVs andenterprises. Be it their radical cloudfirst approach or the talented Cloud
Ninjas, the company only aimsfor perfection, because for leaders;nothing less will suffice.
Cloud provides usan opportunity toplay as Service asa software playerby leveragingreusable cloudbased software
to deliver servicesfaster, cheaper andsmarter
Mobile Densityin corporationsis increasing
by leaps and bounds: threedevices per
user in 2012 climbing to sevendevices in 2016. Mixed-use or BYOD(Bring Your Own Device) is nowmainstream. Mobile applicationdownloads from appstores such asApple and Android are into billions,and corporate applications areincreasingly mobile-centric. Throwin the shift to the Cloud, whichmeans anytime/anywhere access, and
you can see why Mobile is the NEW NORMAL. With this kind of explosivegrowth, comes a risk, compliance, andsecurity headache.
Let us deep-dive into this a bitmore. With the latest device in handand 20-30 apps downloaded to that
personal device, the user (say anemployee or guest) comes into thecorporate network. Next, IT provisionsthe user with a handful of corporateapps. Now, the validated user hasunfettered access into the networkand the public cloud. In the process,this user consumes WAN bandwidth,accesses apps that may or may notmeet corporate content standards,
and, maybe even use applicationsthat could expose that companysinfrastructure to security threats. Ineach of these scenarios, the problemmay not be the user or the device instead, it could be mobile app itself.
Just as IT typically does not leaveanything to chance (or honor system)with laptops, nor can they afford to doso with mobile devices.
Next, let us look at todays antidoteto this problem space IT has a set oftools that allows them to authenticatea user, gain visibility into the device,
provision company apps, and, maybeeven look at the flow of data packetsfrom the device into the network.This passive approach may notrecognize that the bigger lurking riskis elsewhere in the form of admissioncontrol challenges around mobileapps, both public and private.
Over the years, IT security hasevolved from a single-tier to a multi-tiered protection model: endpointsecurity (anti-virus) to gatewaysecurity to vulnerability assessmentto intrusion prevention. And, fromsimply inspecting packets of datato understanding context who theuser is and what application thetraffic belongs to. Just the same way,the mobile ecosystem needs to be
protected. Unfortunately, instead ofdealing with hundreds of thousandsof device and applications, we haveto cope with millions of devices and
billions of applications. In otherwords, IT controls need to be more
specific, more active (or real-time),and have tools that allow them to BeSelective, Not Equally when it comesto apps, users and devices. And, ofcourse, like anything else in IT-land,it needs to be cloud-based, policy
managed, and event-driThis mobile
corporate Americopportunities. Along wand IT ConsumerizManagement offers
entrepreneurial opportunot anticipate a one-sisolutions; instead, we emobile ecosystem of entrepreneurs, we haveto participate in this over the next one to five
Our prescriptiveentrepreneurs is sattempt to solve a targand then expand (radiate; find a holethen, find a bigger hothe problem ahead, no(Wayne Gretzky, the g
player used to say thawhere the puck was hea
it is), and finally defin by what you have dcustomers, not by the funding you have raiseof Steve jobs: StayFoolish.
By Arvind Narain, Founder &CEO, MobileASaP
CEO Spotlight
Mobile is Risky Business Headquartered in Fremont, MobileASaP delivers real-time mobile risk andsecurity solutions for a converged world of BYOD, mobile apps and enterpriseaccess.
Arvind Narain
-
8/12/2019 CIOReview Low Res March 13
10/26
| | March 2013 18CIOReview
AlienVault:Changing the Dynamics ofSecurity Management
The industrial ecosystem we operate inhas evolved progressively and so hasthe risk of security hazards. Complex ITinfrastructures are met by multifacetedthreats and attacks which results insecurity being compromised. One ofthe biggest challenges encountered bysecurity professionals worldwide is
the need for visibility across a multitude of disparate pointsecurity solutions that desperately needed to work together.The present security measures in place fail to meet theneeds of organizations which are continuously vulnerableto threats from hackers around the world.
The InitiationFounded in Spain in 2007 by Julio Casal and DominiqueKarg, AlienVault has revolutionized the process of securityand threat management. This California headquarteredcompany understood that the prime trepidation fortechnology buyers is the lack of desired requisition requiredto manage threats inspite of investing large sums of money.Another concern is the deficiency of skilled talent andexpertise in security which causes serious implications onhow efficiently an organization addresses security issues.
The companys goal is to provide a comprehensive
collection of tools which grant an administrator an eagleseye view of all security related aspects of their system.This is made possible by OSSIM (Open Source SecurityInformation and Event Management), the de facto s tandardSIEM which comprises a collection of tools designed toaid network administrators in computer security, intrusiondetection and prevention.
AlienVault has ushered in a radical change in the waysecurity and threat was being managed before, by reducingthe time taken to deploy security measures from weeksand months to hours and days, thus reducing the overheadcosts. They managed to achieve this by bringing differentsolutions to one company and integrating it in a simpleconsole, the Unified Security Management platform. This
platform integrates tools to detect threats and provides theadministrator ability to control and view all built in securitycontrols with one single console. This provides bettervisibility and control and helps organizations managethreats better.
Responding to Threats EffectivelyOne of the toughest challenges being faced by organizationstoday is how to respond to security threats. The prevailing
belief among many executives is that the right technologycan keep hackers at bay. Companies thus end up spending
huge amount of money on varioussecurity services while the reality iscompletely different. Organizationsmay be better off by getting an accuratereport of previous attacks and howthey were performed, says BarmakMeftah, CEO, AlienVault. To wardoff the threat of hackers and arm usersagainst possible threats AlienVault haseventuated Open Threat Exchange, afree system for gathering, processingand sharing threat intelligence.Users of OSSIM platform can shareinformation regarding security threats.OTX is about collecting data fromindividual installations of AlienVault,
bringing it together, analyzing it,and then sending it back so it can beautomatically installed and be used inthreat management and correlation.
Nobody else is doing that today, saysRichard Kirk, Senior Vice President,AlienVault.
Although a number of otherIT companies collect and shareinformation with their users,AlienVault differentiates itself owingto its high user base of 16,000 as wellas large number of commercial userswhich gives their researchers access totons of information. No other companyhas an open source community whichmakes it very unlikely for them to gethigh end commercial clients shareinformation. This puts AlienVault on adifferent pedestal altogether.
AlienVault has a renownedhacking team which is instrumentalin the company being efficaciousconsistently. The AlienVault
platform is uploading information onhourly basis. It is then immediately
processed. Sure, it is not instant, butit is quicker than anything else today,
beams Kirk.
Next Level of Security ManagementAlienVaults entry into the markethas taken security managementtechnology to the next level.AlienVault saves companies moneyand time. If a company buys theequivalent point solutions separately,its software budget alone couldtotal between $10 million and $20million then it would spend $10million more on consultants to install,configure and integrate the software.But AlienVaults software costs 20to 25 percent of that total and takesabout a week to install says Meftah.
The companys customers spanacross 80 countries and range from
banks, financial institutions anddefense organizations. Moreover,while many companies would settlewith serving big clients, AlienVaulttargets small and medium sized
business units equipping them with thesame quality of security technology as
big enterprise solutions.
Changing BusinessTimes are changing operations are adaptechnological flux. Thto bring a paradigm shmeasures and systemis working toward
opportunities and breakthroughs by reclosed systems. The
been growing by leaprecording a growth o
per year. With a hileadership team which from Hewlett Packarmanaged to raise $2series C round. Alienfast and is on track double in revenue yadds Meftah. The comnamed 2013 Technoloworld economic forum
The company envigrowth by serving org
believe are underservcurrently has 120 peopthe organization. Throuinnovations, AlienVaulto continue leading the wand threat management
Company of the Month
| | March 2013 18CIOReview
By CR Team
Organizamay be boff by geaccurate
previousand howwere per
Richard Kirk, Senior Vice President, AlienVault
"
-
8/12/2019 CIOReview Low Res March 13
11/26
| | March 201320CIOReview
Think DifferentlyBusiness Environment
to Support new Capabilities in a
New Technology trends shaping the IndustryThere are three current technology factors which arechanging the way companies operate and conduct
business. They are the consumerization of technology,cloud computing, and social networking. These factorsare not necessarily new technology, but they convergemore and more to create a significant business disruption.Consumer based technology is changing rapidly, and oftenapplications are designed to only work on mobile devices,with cloud based data, and include a social component. Weall must think differently to support these new capabilitiesin a business environment.
Cost Effective way of utilizing Data is a MustAlmost everything we do in IT is about getting accessto valuable information contained in the data we collect.Improving how we collect, manage and analyze this datawill provide much better intelligence about our company,translating into a growth enabler. There are many tools that
promise success in providing data intelligence, but there
is still no cost effective and simple way to do it. The newterminology for this issue is called Big Data, but it goes
beyond that. The average company is only analyzing afraction of the data they have, and most likely not collectingall the data they should be. Solving this problem wouldenable companies to be more productive, more responsiveto customer needs, and better positioned for growth.
Expectations to MeetEvery day, employee expectations of technology areincreasing to keep pace with the world of mobileapplications. These expectations demand access tolarge complex data at any time, on any device, and fromanywhere in the world. This is all great progress and I
believe that it positively contributes to culture, making theworld a smaller place. However, it might be happeningtoo quickly. It was not that long ago that a web page thatloaded in 10 seconds was acceptable. Today if a web pagedoes not load in one or two seconds on a mobile device, we
become impatient and often open another web site. That is
a big expectation to meet.Technology is too complex, and not enough vendors are
focusing on simplifying things. It takes far too much time,money and people to implement most solutions.
The bar is set high. Everyone expects every applicationto look and operate like Google or Facebook. This can beunrealistic and difficult as we know the amount of timeand money those companies spend to make things look sosimple.
While everyone wants the latest and greatest technologywith new capabilities, people are still very resistant tochange. Many times it is the technology team that winds
up having to push these same individuals clamoring for thelatest and greatest, out of their comfort zones and into thefuture.
Driving Innovation in the Team
The foundation of encouraging innovation is to create aculture that not only allows and supports it, but expectsit from everyone. In order to deliver success based oninnovative thinking, everyone on the team needs to feelthey can think outside the box related to everything theydo. It might sound basic, and it is. However we constantlychallenge each other to ensure creativity and new ideas arealways brought to the table. From the most basic task tothe largest most complex projects, there is always a betterway to do things.
A Gadget MarvelI am definitely a gadget lover, but my favorite is my Nest
Learning Thermostat. It is like a smartphone and a homethermostat combined into one. Besides being a goodthermostat, it does everything automatically and can becontrolled over the Internet so no more forgetting to setthe heat or air conditioning. It is a great example of howtechnology is making everyday tasks easier.
Covanta Energy (NYSE: CVA) owns and operates worldwide over 40new generation waste combustion facilities withadded benefit of energy recovery, also known as waste-to-energy or energy-from-waste power generation plants.
Headquartered in Morristown, the company has a market share of $2.6 billion.
Stuart Kippelman, VP & CIO, Covanta Energy Corporation
Stuart Kippelman
Meet the CIO
To deliver succeon innovative theveryone on the needs to feel the
think outside the
"
"
-
8/12/2019 CIOReview Low Res March 13
12/26
| | March 201322CIOReview
Consumer Behavior
Trends drivingRadical Change in
drive the Industry
Previous Experience aiding Todays needsMy past experiences in other industries have prepared me very well, notablythe advanced technologies, process discipline and fast pace. Those are allelements of the Dominos IS culture that are very familiar to me. Dominoscustomer focus and drive for product excellence are also in my DNA, so thattransition has not been too hard.
The biggest hurdle for me is that I do not yet know the businesses aswell as I want to. The more I understand how the business works, the moreimpactful I can make the technology. The good news is I am surrounded bya great leadership team, that are experts and they are doing a great job ofmentoring me.
Technology an Enabler for DominosWe absolutely feel that technology is a competitive differentiator on a global
basis. It starts with a single, common, global, Point of Sale system; extendsthrough a highly-optimized supply chain and meets the customer with one ofthe highest rated e-commerce experiences. All of our systems work together to
help make this happen.Some areas of Focus for Dominos E-commerce with a strong investment
in Mobile platforms Big Data & Real-Time Analytics E-Commerce Infrastructure
Technology TrendsWe always look at Macro trends first,focusing on the big trends in society,consumer behavior and technologyand then we look for the inflection
points. The biggest trends that willdrive our industry are the sameones that are driving radical changein consumer behavior: Mobility,Ubiquity & Personalization. Dominoshas active projects in all these areas.
Challenges and SolutionsIt depends on what day of the weekit is. By that I mean the biggestchallenge is not the things you knowyou have to do, it is the unexpectedthat provides the real challenge andoften the greatest opportunity. Wehave objectives, budgets, project
plans and portfolio managementto name a few, for all the things we
plan to do. For planned activities itis all about flawless execution. Forthe unexpected or unplanned itsabout having a nimble, experiencedleadership team. We use the analogyof good technical athletes, so wecan field team no matter what sport
(problem) we are aWe recruit and develtechnical team with this
Road map aheadWe have a team of ab
best IT professionals inhands down. We augmwith several technologycouple of world class ouvast majority of thoseour headquarters whe
bringing Silicon Valleyto Ann Arbor, Michigvery cool. As we coglobally we will see mteam located in our regEurope and Asia.
Domino's Pizza (NYSE: DPZ) is a restaurant chain known for its pizza delivery
operating a network of company-owned and franchise-owned stores in theUnited States and in international markets. Founded in 1960, the company hasa market cap of $ 2.58 billion.
Kevin Vasconi, EVP, CIO, Dominos Pizza
The biggestchallenge is
things you kyou have tothe unexpethat providereal challenoften the gropportunity
"
Meet the CIO
Kevin Vasconi
| | March 201322CIOReview
-
8/12/2019 CIOReview Low Res March 13
13/26
| | March 201324CIOReview
In todays times, architectural elegance is agrowing requirement in organizations. With
problems requiring newer solutions in termsof disruptive technologies we can see plenty ofopportunities but at the same time this makesthe architecture more complex which gives rise
to the requirement of greater planning. This is anarea that a CIO must monitor. Needs of business partnerssuch as marketing and customer support are also growingand they need to be aligned with the budget and guidelineslaid out by the senior management. A CIO is expectedto balance multiple constituents like these together. Thisseems tougher in todays era than ever because of multitudeof opportunities present.
Disruptive technologies are well on their way tochange the face of enterprises and the way they look atIT. Cloud computing is one of the crucial technologytrends that is molding the future of the industry in a bigway. Moving assets and process components to the cloudhas a huge impact on streamlining business processes andimproving cycle time. This technology entails advantagessuch as it being asset-light, which helps IT organizationssteer the focus towards the core issues more and making an
organization move faster.With cloud computing gaining momentum, mobile
is another trend that is already changing the way theenterprise and consumers interact. The penetration ofsmart phones has made computing truly mobile today.
These devices bring the end user closer to the business andhave managed to cut out a lot of the processes and layersin between. This has also increased the importance of thetechnology organization. More than ever, IT now plays a
transformational role in an organization.As technology advances and companies adapt to these
change; in this environment a CIO always requires to focuson finding the right talent that fits the requirements of a job.This process has always been tough but the complexitiesare growing manifolds now with the advent of newer
technologies.To solve all these issues and to ensure growth,
innovation is the key. It is very important to create aculture within the team that fosters innovation. People who
become good examples to the rest of the organization must
Gogo Inc., headquartered in Itasca provides in-flight broadband Internet service, streaming video and other connectivityservices for commercial and business aircraft.
Rama Prasad, SVP & CIO, Gogo Inc.
be hired. Recognizing and rewardinginnovation at all levels of theorganization irrespective of its size isa necessity. Apples iPhone is a greatexample of innovation in technology.The simplicity of intuitiveness of thedevice has changed the expectationsof user interfaces for all software.Companies should try and incorporatethis streak of innovation in all their
products and services.But innovations alone will not help
growth. The enterprise environmentfaces several challenges; the solutionsfrom different vendors cannot benitrated easily. It becomes mandatoryfor the vendors to follow or adapt up
to date industry standaof the hour is to addwhere the equation in dfacilitated.
A CIO also needs demands pertaining toand opportunities, of ththe limited supply in tand manpower. This is challenge faced by a Ca project prioritizatio
puts the business partof prioritization is a poThe concept though ithan done. All thesetogether will enable thenterprise alike.
Changing Variables in the
CIOs Equation
Meet the CIO
Rama Prasad
A CIO also needsto balance thedemands pertainingto projects, ideas andopportunities, of thebusiness with the
limited supply in terms of budgetand manpower
-
8/12/2019 CIOReview Low Res March 13
14/26
| | March 201326CIOReview
At the end of 2012 there was one cleartakeaway about the cloud computingmarket enterprise use has arrived.Cloud use is no longer solely hidingin the shadows, IT departments areno longer denying its happening, and
legitimate budgeting around cloud is now taking place.According to the latest Forrsights surveys, nearly half ofall enterprises in North America and Europe will set aside
budget for private cloud investments i n 2013 and nearlyas many software development managers are planning todeploy applications to the cloud.
So what does that mean for the coming year? In short,cloud use in 2013 will get real. We can stop speculating,hopefully stop cloudwashing, and get down to the real
business of incorporating cloud services and platforms intoour formal IT portfolios. Here is what we expect to happenwhen enterprise gets real about cloud in 2013:
1. We will finally stop saying that everything is goingcloud, and get real about what fits and what does not. Wenow have enough understanding about what makes cloud
We will FinallyGet RealAbout CloudBy James Staten, Vice President & Principal Analyst, Forrester Research
2013Cloud Predictions:
platforms different from traditionalvirtual infrastructures and traditionalhosting environments to makearchitecturally sound decisions aboutwhich applications to move to thecloud.
2. Cloud and mobile will become one. Whats the value
of a mobile app that does notcall out through the Internetto back-end services? Notmuch. More often thannot, we are finding mobileapplications connected
to cloud-based back-endservices that can elastically
respond to mobile clientengagements and shield your data
center from this traffic.3. We will stop stressing about
cloud SLAs, and recognize that appshave to protect themselves. The best
practice for cloud application designand configuration is to build resiliencyinto the application rather than expectit from the cloud platform. This wayyou can achieve any service-levelagreement regardless of the base SLA
provided by the cloud platform.4. We will get real about cost
modeling. Do the math, understand theeconomics, and monitor and optimize
as your use evolves. If you want to getthe best ROI out of your use of cloudservices and platforms, you need toactively model the cost profile of yourapplications, monitor their resourceuse, and adjust accordingly. Costshould not solely drive your clouddeployment decisions, but cost can nolonger be ignored or assumed.
5. Infrastructure & operations willfree the development teams to buildapps in the cloud. The developers donot really need I&Os permission, andour surveys show the business-unit-aligned developers certainly are notwaiting for it. In 2013 the I&O teamwill get comfortable with the factthat development on public cloudsis going to happen whether they likeit or not and it is easier for them toengage developers and be part ofthe conversation about how to do itsafely, securely, and with appropriateoversight.
6. We will get real about usingthe cloud for backup and disasterrecovery. Instead of enterprises
buying resources in case of a disaster,cloud computing and its pay-per-use
pricing model lets you pay for long-term data storage while only payingfor servers when testing or declaringa disaster. It probably will not replaceyour existing BC/DR resourcescompletely, but the cloud is turningthe cost of storage upside down fasterevery month, and what was cheaper to
back up to traditional DR storage lastyear will be cheaper and easier to putin the cloud is short order and fasterto recover.
7. We will stop equating cloudwith commodity. Cloud services arehighly standardized and automated,
but standardization does not have tomean commodity. We are alreadyseeing cloud services backed by high-end hardware, offering GPUs, SSDs,and other clearly non-commodityinfrastructure options. In 2013 expectto see the proliferation of these typesof choices as cloud providers leverage
them to meet specific mand to differentiate com
8. We will stop with AWS. While Services has opened ulead in the cloud platfoarguably as large as 70 share in 2013 wemarket position give wof strengthening compentrants. Microsoft anmade significant imptheir platforms, and by twe fully expect to seesubstantial OpenStack
building strong positio9. We will ack
advanced virtualizatiothing, and no, its The cloudwashing awdefinitely goes to edepartments who relabVMware environment so they could get teyes of their CIO. Verenvironments offereto the developer,
provisioning, standardor cost transparency. get real about these A mostly static virtuathat successfully driconsolidation, operatioand fast recovery is a gvery good thing.
10. Developers wDevelopment is not all the cloud. Our cloud deshows that the majorityframeworks, and methodologies we use inare also in use in the different isnt the cservices orientation anconfigure the applicatits own availability andAnd frankly this is noeither. So, while som
practices and cloud senew, there are few excutrained developer to noin the cloud.James Staten
View Point
We are finding mobileapplications connectedto cloud-based back-end services that canelastically respondto mobile client
engagements andshield your data centerfrom this traffic
"
" | | March 201326CIOReview
-
8/12/2019 CIOReview Low Res March 13
15/26
| | March 201328CIOReview
We are in the midst ofthe most rapid mobilenetwork change we haveseen in over 15 years.Mobility and the use ofwireless spectrum is thedigital oxygen that drives
productivity the mobileindustry's equivalent to crude oil deposits. Spectrum reuseand targeted capacity using small cells indoors is rapidly
becoming the answer to deal with networks at capacityand poor indoor service. So where is the $60 billionopportunity? It starts with providing a scalablesmall cell network that can deliver reliable indoor
3G/LTE and Wi-Fi coverage and capacity forenterprises that recaptures vastly under-utilizedlicensed spectrum indoors, and is positivelyimpacting the outdoor macro cellular network.
Mobility and agile network services forenterprises can create competitive advantage
The enterprise mobility servicesmarket opportunity is arising asa result of several key trends:mobility and the needfor BYOD policies andcontrol, cloud computingand the emergence ofenterprise small cellsystems capabilities that
go beyond coverage andcapacity. In 2013 and
beyond, enterpriseshave an unrivalledopportunity to move
their mobile relationships beyond minutes, Megabytes,subsidized devices, and engage mobile operators as trusted
partners to their business. As more hardware and Wi-Fivendors start to offer managed SaaS and WaaS services, sothey leave the door open for fixed service providers to dothe same. Enterprise customers now have valuable optionsto curtail CapEx spending. The advantage that the mobileoperators have is that they can offer a full suite of OpEx-only mobility services with reliable licensed spectrumcoverage and capacity using multi-mode small cell systems
and still deliver WaaS, SaaS, security and complianceservices.
In the market analysis, Enterprise MobilityServices: Market Opportunity for Mobile
Service Providers, Exact Ventures, ananalyst firm focused on technology marketintelligence, analyzed the managed mobilityservices opportunity for businesses of 100to 4999 employees in the United Statesand the European Union. In leveraging the
mobile ecosystem and small cell systems for in- building coverage, capacity and services,
operators have the ability tohelp enterprise customers
remove IT challengeswith mobility, unifiedcommunications, secureaccess to applications,device management andintegration of cloud andtelephony, as well as
leverage the emergence ofnew context and location-
based services.With enterprise IT
teams under constant pressure
Customers is a $60 Billion OpportunityManaged Mobility Services for Enterprise
The San Jose based SpiderCloud Wireless develops small-cell network platforms that allow mobile operators to deliverunprecedented cellular coverage, capacity and smart applications to enterprises. Founded in 2007, the company hasraised a total funding of $75 million from Charles River Ventures, Matrix Partners, Shasta Ventures and Opus Capital.
By Art King, Director of Enterprise Services & Technologies, SpiderCloud Wireless
to do more with less budgets andresources, the opportunity for trustedmobility services is tremendous, saysGreg Collins, Principal with ExactVentures. Until now, there has beenlittle reason for enterprises to have arelationship with operators beyondminutes and mobile devices. Smallcell systems that go beyond coverageand capacity can change this modeland open up new business models thatcan help enterprise customers save
significantly on CapEx and OpEx.Enterprise IT can save
approximately $60 billion between2014 and 2020
By outsourcing telecommunicationsservices, enterprises can leveragenew in-building mobile services andsave up to 35 percent per year bytransitioning from a CapEx to a per-user/month OpEx model savingenterprise IT over $60 billion between
2014 and 2020, and allowing finiteIT resources to be either re-allocatedto focus on differentiation andcompetitive advantage, or for the costsavings to fall to the bottom line.
Managed Mobility Services Mobile operators will start to offertrue managed mobility services tothe enterprise, starting with basiccoverage and capacity, and follow on
with services such as BYOD, MDMand PBX Integration, even Wi-Fi as aService.
Enablement of such servicesstarts with the deployment of a multi-access small cell system that includes3G, LTE and Wi-Fi, and can scale
beyond a few small cells to deliverreliable mobile services indoors forenterprise customers of any size. Toenable managed cloud and applicationservices, a locally deployed controller
or services node maintains secureservices access to and from any mobiledevice on the network.
Hosted Unified Communications(UC)refers to a set of real-timecommunications services suchas instant messaging, presenceinformation, telephony and videoconferencing, as well as non-real-timecommunication services like e-mail,SMS, voicemail and fax. UC is notnecessarily a single product, but is
often a set of products that provides a consistent unifieduser interface and userexperience across multiple
devices and media types.
Security: Cloud-basedWeb Filtering :Enterprisesincreasingly employ cloud-
based web filtering as away to monitor and controlwebsite access and usageto enhance productivityand improve security by
protecting against malwareand spyware.
Mobile Device Management (MDM)entails lifecycle management of bothcompany and employee providedmobile devices to manage and secure
enterprise data and access.
Compliance ServicesMany industries are subject toregulatory record keeping, requiringdocumentation of all communications
within an orgaconjunction with
based telecommunicatoperators can centralizestorage, and reportinghelping customers reliadhere to regulatory ocompliance.
Wi-Fi-as-a-Service is enterprise-focused sersecure internal and gues
the operator is already icells with Wi-Fi, it cancustomers Wi-Fi accopportunity is available
Context-Aware (orServices can offer enterprises ause cases. The opportunthe very sophisticated mlocation capabilities in sextend them into the mcreates unique oppinnovate enterprise buin ways that have nevavailable.
Enterprise CIOs a
expect mobility servicommunications partnelonger-term strategy toand improve productiviagility.
NaaS: The next BigAs we look forward, the emergence of a comnetwork infrastructuremicro and small cells tandem with intelligenvirtual routing of acces
Network-as-a-Service becoming a reality muexpected. Mobile opeoffering their enterprclientless-UC access applications and cloud-that create more vaservices, and build drelationships for years t
View Point
Art King
-
8/12/2019 CIOReview Low Res March 13
16/26
| | March 201330CIOReview
When people say Big Data, theyare usually talking about theanalysis of petabytes of data toget insights hidden in massivedatasets. New technologies likeHadoop get lots of attention
because they make analyzingthese huge datasets possible.
But Big Data also affects another part of the databaseworld: operational databases. These databases provideinteractive web and mobile applications with millisecondaccess to small pieces of data in a large database andare crucial to meeting the response time user demands.Big Data dramatically changes the requirements theseinteractive applications place on operational databases,which is why developers are seeking alternatives to therelational databases used for the last 40 years.
Current Generation of Interactive Applications mustCapture and Process more DataBig Data is all about capturing and processing growingamounts of data to bring valuable new capabilities tousers. The current generation of interactive applicationsmust capture and process far more data than those of
just a few years ago. Personal user information, sessionstates, geo location data, social graphs, purchase histories,user-generated content, machine logging data and sensor-
generated data are just a few examples of the ever-expandingarray of data that is captured, stored and processed in anapp or acquired from third parties. The use of this data istransforming the nature of communications, shopping,advertising, entertainment, relationship management andeven how we do everyday things like hail a cab. Developersare discovering ways to leverage this data to enrich existingapplications and create new ones made possible by it
because if they do not, they will fall behind.
But managing this ever-growingamount of data is increasingly
problematic. Not only is there moredata to manage, there are also moreusers accessing it (see Figure 1).Today, most applications are accessedthrough a browser or thin mobile app
but run in the cloud. That means adatabase might need to store terabytesof data for tens of millions of userswho have downloaded the app andsupport the database operations formillions of concurrent users.
Compounding the problem, themajority of the new kinds of Big
Data being stored are unstructuredor semi-structured data (See Figure2). This means the data does not fitwell into the highly structured rowsand columns of a schema-basedrelational database. App developerswant something more flexible thatcan easily store any new type of dataand easily handle content structurechanges.
Addressing the challenges of BigDataTo address the challenges of BigData and Big Users, more and moreapplication developers are looking to
NoSQL databases. The use of NoSQLtechnology is rising rapidly amongInternet companies and enterprises.Many consider it a viable alternativeto relational databases, especially asorganizations recognize that operating
at scale is moree f f e c t i v e l ya c h i e v e dwith clustersof standard,c o m m o d i t yservers, and that aschema-less datamodel is often a
better approachfor handling thevariety and typesof data used bya p p l i c a t i o n stoday.
NoSQL databases were developedfrom the ground up as distributed,scale out databases (unlike the scale-up, shared-everything architectureof relational technologies). Theyuse a cluster of standard, physicalor virtual servers to store data andsupport database operations. To scale,additional servers are joined to thecluster and the data and databaseoperations are spread across the largercluster. Since commodity servers areexpected to fail from time to time,
NoSQL databases are highly resilient, built to tolerate and recover from suchfailure.
NoSQL databases provide a mucheasier, linear approach to databasescaling. If 10,000 new users startusing your application, you simplyadd another database server to yourcluster. Add 10,000 more users andadd another server. There is no needto modify the application as you scalesince the application always sees asingle (distributed) database. Sincedatabase operations are spread overmany servers, consistently very high
performance can be maintained.Since the use of Big Data is
increasingly important to the successof an application, being able toefficiently interact with a databasetakes on added importance. Sincedevelopers generally use object-oriented programming languages to
build applications, it is usually most
efficient to work withthe form of an object wstructure consisting olists and arrays.
Relational Data forthcomingsThe relational data movery limited data strucnot map well to the Instead data must bretrieved from tens or of interrelated tabrelational frameworksrelief but the fundamemismatch still exists bean application would data and the way it is in a relational database
NoSQL databasedocument databases an entire object in adocument and supportstructures. This makeconceptualize data as debug, and evolveoften with fewer lines advantage in a Big Da
Big Data:Fueling the
Rise of NoSQLBy Bob Wiederhold, CEO, CouchbaseThe California based Couchbase is a provider of NoSQLdatabase technology and is the company behind theCouchbase open source project. Founded in 2009, thecompany has raised a total funding of $31 million from
Mayfield Fund, Accel Partners, North Bridge VenturePartners, Ignition Partners and DoCoMo Capital
Figure 2. Big Data: The amount of data is growingrapidly, but the vast amount of new data being storedin unstructured and semi-structured.
Figure 1. Big Users: Global Internet usage is growing rapidly, as is theamount of time each user spends online daily. With the proliferation ofsmart phones, people use their apps even more frequently.
View Point
Bob Wiederhold
The rapid take-upcombined with thacceptance of purchasing andcurrencies will reestimated $3.03 sales in 2016, rea10 times the $3figure calculated fomigration to tablis due to the fact thave to be purchas
and the gamingthemselves often dofor a 3G or 4G con
Courtesy: Juniper re
-
8/12/2019 CIOReview Low Res March 13
17/26
| | March 201332CIOReview
For the last two yearsI have written a
blog called ChiefLocation Officer.Why? Becau se today,mobile location-
based services aremainstream. Most of your employees,contractors and customers carry asmartphone or GPS-enabled handset.Even your assets are connected tothe network, from vending and ATMmachines to fleets and pallets to
medical equipment to drones.Which means you can locate,
track and monitor nearly any device,anywhere. And that poses big issues and opportunities for the enterprise.
How do you keep your in-the-clouddata secure in a bring-your-own-device (BYOD) world? Who canyou track, and why, without violating
privacy regulations? How can youturn your customers and workers intoinformation gatherers that you can useto reduce operating costs, slash fraud,improve efficiencies and enhancecustomer insight? How can you tapinto all the treasures of location in amobile world?
Chief Information Officer (CIO),
meet the Chief Location Officer(CLO). Last month I attended aconference of information officers,and these four questions kept comingup. Here is what a CIO should ask
a CLO on the elevator ride up to theCEOs office.
How big is this mobile and locationthing?Big and exploding. Of the 7.1 billion
people on the planet, about 4.3 billionhave mobile phones, according tothe TomiAhomen Almanac 2013. By2015, it is assumed that the numberof IP-ready devices that will beconnected to the internet will grow toa total of 6,593 billion (source: ITU).This growth cannot be ignored. It is a
boardroom topic.
Location matters to the CIOBecause we live in a mobile society.Mobile-broadband s ubscriptions havegrown 45 percent annually over thelast four years and today there are twiceas many mobile-broadband as fixed-
broadband subscriptions (source:MobiThinking, 'Global mobile st atistics2012'). But what does location mean tothe CIO? Depends on your business.I divide the entire location industryinto 10 service categories. Youmay need t o
know about more than just one. TheBig Ten are 1) navigation, 2) search,3) advertising, 4)social networking,5) entertainment, 6) people locatorservices, 7) resource management,8) authentication, 9) operationsimprovement and 10) analytics.
Location and its benefitsCost savings, Reducing risk,Increasing revenues and Enhancinginsight. Your answer depends onwhere your pain or opportunity isgreatest. The Fortune 1000 CEOs Italk to tell me their CIOs are diggingin on the last five categories listedabove. Why? The reason is mobilelocation delivers a new and dynamicdata feed that can save significantoperations cost, reduce fraud and risk,
protect security and pull actionableinsight into the product, marketingand sales teams. The first five are keyfor the front line and companies in thetechnology, consumer and marketingagency sectors.
Where do I get location?Most people think location comesfrom their smartphone. It does not.
That is just the applicationasking for permission, as in:This app would like to useyour location. OK? The three
primary location sourcesare a) satellites that signalwith GPS chips in devices
b) cell towers operated bywireless carriers and c)
WiFi access points, suchas hotspots. There areother sources too, such as
IP location for computersand connected devices, third
party sources from Google andother data mapping companies. Thereis even NFC. The trouble for the CIOis grabbing and controlling all thesesources. That is what Locaid, does.We are like the Amazon of location;we pull together all those sources oflocation through a single Application
Programming InterfaSoftware Developmentmake them easy to acceOr you can direct the so
Top 3 Things to BYOD and locatioAs the CIO, you are trand protect your infrsystems in a rapidly eConsumers are mor
bad guys more capain the cloud, mini comemployees pockets anthree things you need t1. Never violate a pe2. Fully vet any ven
provider in mobile, data. These are exploand there are lots of brshiny new things thaaround in a few years.3. Stay ahead of the cyour biggest risk is scompetitors are movinnot just an app on an iPis not just GPS aconsumer data.
Stay ahead of themore about location, bmatters.
Locaid operates a location privacy platform that allows mobile developersto locate over 350 million devices for enterprise authentication, fraudmanagement, and consumer location services and opt-in mobile marketing.The San Francisco based company has raised a total funding of $26.2 million
from InterSouth Partners and H.I.G. Ventures.
and theCIO:A Location ImpactAssessment forEnterprise Mobility
BYOD
By Rip Gerber, Founder & CEO, Locaid
Rip Gerber
View Point
The trouble CIO is grabbcontrolling tlocation souothers such location for and connect& third partyfrom Google
| | March 201332CIOReview
"
-
8/12/2019 CIOReview Low Res March 13
18/26
| | March 201334CIOReview
The Emergence of the
"Mobile Consumer Enterprise" This will fundamentally change how and boost productivity in an increasingenterprise.
Strategies for the GTM barriersThe cost to start a company and roll has significantly been reduced, therebyover-supply of solutions for any given challenge is now less about developm
but more about go-to-market (GTMdistribution barriers. With some seed caquickly overcome the development riskto roll out a solution. If it is a mobile has to now crack the distribution and challenges across Apple AppStore, Goothe plethora of new app marketplaces. capital is the source of "oxygen" for entr
bar for Series A has gotten much higher aexpected to have solved the GTM and requirements earlier in the life-cycle of The funding chasm, which was traditionSeries A and Series B, has been broug
between the Seed round and Series Ais increase in the trend of entrepreneur
platform or OS to develop and focusuccess and unfortunately for (Windowit tends to be either iOS (Apple) or Andro
A perfect storm is brewing in theenterprise with the current wavesof mobile adoption, BYOD and"consumerization of IT", each
bringing its unique requirementsto be addressed. This has createdan opportunity for a range of
point solutions such as MDM(Mobile Device Management), MAM (Mobile ApplicationManagement), Federated SSO (Single Sign On), EnterpriseAppStores, etc.
The untapped opportunity is for new software servicesto focus on knowledge workers with an ease-of-use andmobile-first experience, all with the intent to enable anew wave of mobile productivity. Knowledge (or content)creation, consumption and sharing has been "stuck" in thePC paradigm for over 30 years. It is time to be unshackledand head into an increasingly mobile and social workforce,and not just through cloud-based file storage, but by
bringing social context to content creation/consumption andenabling new models for sharing knowledge.
Mobile: The World in your PocketMobile is by far the biggest disrupting
force in the industry. With individualscarrying a computer in their pockets,
in the form of a smartphone, phablet ortablet, there is a need for instant gratification
when it comes to information. Over the past30 years, the industry has consolidated around the
Windows PC platform and the innovation was limited by the possibilities of the end-point. Now with a range
of different mobile devices with different OS and a widearray of capabilities, innovation has been awakened onceagain, and it is refreshing to see old habits being challenged.The near ubiquity of broadband networks (in most parts ofthe world), infinite storage and compute capacity in the"cloud", and the rich capabilities of the end points lay thefoundation for new services to be rolled out and utilizedalmost instantly. Employees find themselves empowered toselect their solutions of choice on their device of choice.
Founded in 2009, CloudOn provides access to the productivity and collaboration tools required fordevices. Headquartered in Palo Alto, the company has received a total funding of $25.5 million fromThe Social+Capital Partnership, Translink Capital, Foundation Capital and Rembrandt VenturePartners.
By Milind Gadekar, Founder & CEO, CloudOn
View Point
Milind Gadekar
The cost to start a coand roll out a produsignificantly been recreating an over-supof solutions for any
problem
"
"
| | March 201334CIOReview
Technolog
-
8/12/2019 CIOReview Low Res March 13
19/26
| | March 201336CIOReview
Are You Opening a Door for Hackers?
Today, no CIO is safe from a data breach. In 2013alone, we have already seen major data breachreports from big government organizations,hospitals, restaurant chains and some of themost revered technology companies. But eventhough we cannot completely protect ourselvesfrom hackers, we can reduce our risk by makingit a lot harder for them to do their dirty work.
In 2008, the Verizon Business RISK team issued the first inwhat has become an annual report analyzing hundreds of actual data
breaches. One of the angles they examine is what attack pathwayhackers use to gain access to confidential data. According to thatfirst report, In over 40 percent of the breaches investigated during
this study, an attacker gained unauthorized access to the victim viaone of the many types of remote access and control software, andIn many of these cases, the remote access account is configuredwith default settings, making the attackers job all too easy.
In the five years since that report came out, it would seemobvious to assume that IT organizations have secured their remoteaccess and control software against hackers. But in the most recentData Breach Investigations Report, the Verizon team discovered,Remote access services (e.g., VNC, RDP) continue their rise in prevalence, accounting for 88 percent of all breaches leveraging
hacking techniquesmore than any other vector. How can that be? How could the percentage of attacks via remote access
more than double even after loud warnings every single oneof the last five years?
Service desk reps, IT administrators, and applicationspecialists use remote control and remote access tools every
day to access, control and fix remotesystems. In m