enterprise sans borders

60
Technology for Growth and Governance March | 07 | 2011 | 50 Volume 06 | Issue 14 A 9.9 Media Publication Enterprise Sans Borders By adopting superior UC technologies, enterprises are increasingly becoming borderless. | Page 30 TECH FOR GOVERNANCE IT and the Adolescent Organisation PAGE 50 A QUESTION OF ANSWERS Transforming the Data Centre PAGE 16 ANDREW MILLER CEO, Polycom, talks about the metamorphosis underway in the UC market. PAGE 43 EXCLUSIVE INTERVIEW

Upload: ctof-magazine

Post on 11-Mar-2016

249 views

Category:

Documents


9 download

DESCRIPTION

ctof 7th march issue 2011

TRANSCRIPT

Page 1: Enterprise Sans Borders

S P I N E

Technology for Growth and Governance

CT

O

FO

RU

MVolum

e 06 | Issue 14

March | 07 | 2011 | 50Volume 06 | Issue 14

CR

OS

S-D

OM

AIN

CL

OU

D M

AN

AG

EM

EN

T | JU

ST

WH

AT

IS T

HE

CIO

'S R

OL

E? | C

AS

E F

OR

INF

OR

MA

TIO

N G

OV

ER

NA

NC

E

A 9.9 Media Publication

EnterpriseSans Borders

By adopting superior UC technologies, enterprises

are increasingly becoming borderless. | Page 30

TECH FOR GOVERNANCE

IT and the Adolescent OrganisationPAGE 50

A QUESTION OF ANSWERS

Transforming the Data CentrePAGE 16 ANDREW MILLER

CEO, Polycom, talks about the metamorphosis underwayin the UC market. PAGE 43

EXCLUSIVE INTERVIEW

Page 2: Enterprise Sans Borders

VIEWPOINT

64 07 FEBRUARY 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

AD

Page 3: Enterprise Sans Borders

EDITORIALRAHUL NEEL MANI | [email protected]

Game Changing Formula: Small Innovations

Help You Thrive

operator is able to incentivise its retailer appropriately to create greater loyalty. IT has made all this possible.

These rather small innova-tions have resulted in decent gains for Uninor. In a short span of time, they have been able to gain good traction in this already crowded space.

“We can’t win customers oth-erwise. Innovation is the only way to thrive,” says Mittal and accurately so. If there is one game-changing formula, it is innovation. If you can master it, business will follow.

If you have any winning formula, we will be glad to discuss. As always, I welcome your feedback.

Seven hundred million and counting … I am not talk-

ing about the population of any country. Nor am I talking about the revenue of any enterprise. What is it then? This is the total number of telecom subscribers in India - growing at a whop-ping 20-25 percent year-on-year. These numbers don't include passive subscribers.

Wondering what it is that I am trying to prove? The whole world knows about India’s tele-com story. That is the reason why every big international tele-

decided to quit an established incumbent to join Uninor as VP, IT, Networks and Value-Added Services. Uninor is a fairly new operator, and accord-ing to some media reports, the parent company even faced pressure from investors to pull out of India to cut losses.

Surprisingly my questions didn’t deter Avinash from giving me good answers. First, he said that Uninor offers only pre-paid connections, which eliminates a lot of operational hazards and expenditure from the system. Apart from that, the company deals with the demand and sup-ply in a unique way. Despite having a conventional route to the market, Uninor connects with its retailers directly, and unlike other service providers, this operator does it in real-time. This helps in two ways: One, the demand-supply gap is always under control. Two, the

com operator wants a pie of this business. But it is not easy. The incumbents have deep pockets to rattle any new player.

There are a few pertinent ques-tions these new telecom players have to answer before they enter this overcrowded space. What should they do for survival? What could be the winning for-mula for them? How can they create a differentiation in the market where the main source of revenue, voice, is almost free?

I also posed some of these questions to Avinash Mittal who

EDITORS PICK28

Making ERP Fashionable The House of Pearl Fashions deployed ERP to get better control over its processes and used it as a fashion statement to ensure employees started using it.

1 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

Page 4: Enterprise Sans Borders

2 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

MARCH 11

COVER STORY

30 | Enterprise Sans Borders By adopting superior UC technologies for responding swiftly to changing business needs, enterprises are increasingly becoming borderless.

COPYRIGHT, All rights reserved: Reproduction in whole or in part without written permission from Nine Dot Nine Interactive Pvt Ltd. is prohibited. Printed and published by Kanak Ghosh for Nine Dot Nine Interactive Pvt Ltd, C/o Kakson House, Plot Printed at Silverpoint Press Pvt. Ltd. D- 107, MIDC, TTC Industrial Area, Nerul, Navi Mumbai- 400706

COLUMNS04 | I BELIEVE: ‘WIN-WIN’ IS NOT A CLICHE The power of 'win-win' isn’t often as obvious as it should be. Just consider: who would like to lose? Got it? BY AIYAPPAN PILLAI

60 | VIEW POINT: WHY IS EVERYONE SO FIRED UP ABOUT BIG DATA? BY STEVE DUPLESSIE

FEATURES50 | TECH FOR GOVERNANCE: IT AND THE ADOLESCENT ORGANISATION As a start-up evolves, it offers IT an opportunity to prove its worth. BY DAVE RAMSDEN

Please Recycle This Magazine And Remove Inserts Before

Recycling

CO

VE

R D

ESI

GE

N B

Y P

C A

NO

OP

CO NTE NT S THECTOFORUM.COM

30

Page 5: Enterprise Sans Borders

3 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

Managing Director: Dr Pramath Raj SinhaPrinter & Publisher: Kanak Ghosh

Publishing Director: Anuradha Das Mathur

EDITORIALEditor-in-chief: Rahul Neel Mani

Executive Editor: Yashvendra SinghSenior Editor: Harichandan Arakali

Resident Editor (West): Minu Sirsalewala AgarwalAssistant Editor: Varun Aggarwal

DESIGNSr. Creative Director: Jayan K Narayanan

Art Director: Binesh Sreedharan Associate Art Director: Anil VK

Sr. Visualiser: PC Anoop Sr. Designers: Prasanth TR, Anil T, Joffy Jose

Anoop Verma, NV Baiju, Vinod Shinde & Chander Dange Designers: Sristi Maurya, Suneesh K, Shigil N & Charu Dwivedi

Chief Photographer: Subhojit Paul Photographer: Jiten Gandhi

ADVISORY PANELAnil Garg, CIO, Dabur

David Briskman, CIO, RanbaxyMani Mulki, CIO, Pidilite

Manish Gupta, Director, Enterprise Solutions AMEA, PepsiCo India Foods & Beverages, PepsiCo

Raghu Raman, CEO, National Intelligence Grid, Govt. of IndiaS R Mallela, Former CTO, AFL

Santrupt Misra, Director, Aditya Birla GroupSushil Prakash, Country Head, Emerging Technology-Business

Innovation Group, Tata TeleServicesVijay Sethi, VP-IS, Hero Honda Vishal Salvi, CSO, HDFC Bank

Deepak B Phatak, Subharao M Nilekani Chair Professor and Head, KReSIT, IIT - Bombay

Vijay Mehra, CIO, Cairns Energy

SALES & MARKETINGVP Sales & Marketing: Naveen Chand Singh

National Manager-Events and Special Projects: Mahantesh Godi (09880436623)

Product Manager: Rachit Kinger (9818860797)GM South: Vinodh K (09740714817)

Senior Manager Sales (South): Ashish Kumar Singh

GM North: Lalit Arun (09582262959)GM West: Sachin Mhashilkar (09920348755)

Kolkata: Jayanta Bhattacharya (09331829284)

PRODUCTION & LOGISTICSSr. GM. Operations: Shivshankar M Hiremath

Production Executive: Vilas MhatreLogistics: MP Singh, Mohd. Ansari,

Shashi Shekhar Singh

OFFICE ADDRESSPublished, Printed and Owned by Nine Dot Nine Interactive Pvt

Ltd. Published and printed on their behalf by Kanak Ghosh. Published at Bunglow No. 725, Sector - 1, Shirvane, Nerul

Navi Mumbai - 400706. Printed at Silver Point Press Pvt Ltd., A-403, TTC Ind. Area, Near Anthony Motors, Mahape,

Navi Mumbai-400701, District Thane.Editor: Anuradha Das Mathur

For any customer queries and assistance please contact [email protected]

www.thectoforum.com

46 | NEXT HORIZONS:CASE FOR INFORMATION GOVERNANCE Information cannot be manage without a plan. BY BARCLAY BLAIR

REGULARS

01 | EDITORIAL10 | ENTERPRISE

ROUND-UP

advertisers’ index

RICOCH IFC SCHNEIDER 05SAS 07VODAFONE 08-09CISCO 13ARC SIGHT 15ACE DATA 49AIRTEL IBCMICROSOFT BC

This index is provided as an additional service.The publisher does not assume

any liabilities for errors or omissions.

56 | NO HOLDS BARRED: HARVINDER S RAJWANT, VP, BORDERLESS NETWORKS, CISCO, talks about the increasing threats fired up by 3G.

56

A QUESTION OF ANSWERS

16 | Transforming the Data Center "CIOs today are faced with the challenge of transforming their data centres," says Hubert Yoshida, Vice President & CTO, Hitachi Data Systems.

46

16

Page 6: Enterprise Sans Borders

I BELIEVE

CURRENTCHALLENGE

MANAGING THE IT DEPARTMENT'S RELATIONSHIP WITH CUSTOMERS AND USERS WITHIN THE COMPANY

THE AUTHOR BRINGS over two decades of industry experience to his job, which

includes leading global IT development teams.

‘Win-Win’ Is Not a Cliche If you think, ‘win-win’ is a cliche, think again. Its power isn’t often as obvious as it should be. Just consider: who would like to lose? Got it?

other person has a right to his idea of how things should be in this world.

Personal experience is the best teacher and hence the firm belief. It is a no-brainer that everyone likes to win. No deal would get through if it does not result in a net win for either party/parties. When you play win-win, all parties involved are willing to understand the other perspectives and work out the best solution. This is applicable to customer-supplier, peer-to-peer as well as personal relationships.

I can think of two key areas related to the delivery of an IT solution, where if one always plays ‘win-win’ things will rarely go wrong. The first is the customer-supplier rela-tionship where, as customers, we demand technology solutions at the best prices. The second involves the relationship between technology or engineering teams as internal suppli-ers to the internal customers who are the end-users of the solution, within an organisation.

In the former instance, if the negotiation is not right, subsequent support falters, impacting project delivery schedules and budgets. The latter is a less apparent and under-stood aspect, as it is critical that the end-user sees value in the outcome of the project and hence owns the solution. Projects that have end-user ownership seldom fail. While IT teams would demand a lot of end-user involvement, potentially causing conflicts with their regular work, it is important that the end-user sees value in the time being spent and effort being made. Working this out would remove one major stumbling block in IT projects.

I STRONGLY believe that ‘playing Win-Win’ is the key to success in one’s personal and professional lives. What this means is not necessarily making compromises, but keeping an open mind and recognising the

BY AIYAPPAN PILLAI Vice President, Tata Communications

4 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

PH

OT

O B

Y J

ITE

N G

AN

DH

I

Page 7: Enterprise Sans Borders

VIEWPOINT

64 07 FEBRUARY 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

AD

Page 8: Enterprise Sans Borders

LETTERS

WRITE TO US: The CTOForum values your feedback. We want to know what you think about the magazine and how

to make it a better read for you. Our endeavour continues to be work in progress and your comments will go a long way in making it the preferred publication of the CIO Community.

Send your comments, compliments, complaints or questions about the magazine to [email protected]

SHOULD BFSI COMPANIES HOST THEIR APPLICATIONS WITH CRITICAL INFORMATION ON THE INTERNET?BFSI is one of the use cases for the private cloud. There are companies that are only looking to the public cloud but they're not paying attention to the private cloud possibilities. In summary, the private cloud allows new IT technologies to add value to the enterprise business as never before. —ENRIQUE CORRO

SE Manager MEX/NOLA at VMware

1. Place of publication Nine Dot Nine Interactive Pvt. Ltd. Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706

2. Periodicity of its publication Fortnightly

3. Printer’s name Kanak Ghosh Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Nine Dot Nine Interactive Pvt. Ltd. Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706

4. Publisher’s name Kanak Ghosh Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Nine Dot Nine Interactive Pvt. Ltd. Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706

5. Editor’s name Anuradha Das Mathur Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Nine Dot Nine Interactive Pvt. Ltd. Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706

6. Names and addresses of individuals who own the newspaper and partners or shareholders holding more than one per cent of the total capital

Nine Dot Nine Mediaworx Pvt Ltd. A-262, Defence Colony, New Delhi 110024.

I, Kanak Ghosh hereby declare that the particulars given above are true to the best of my knowledge and belief.

Form IVStatement of ownership and other particulars about the publication, CHIEF TECHNOLOGY OFFICER FORUM as per Rule 8

Dated: 1st March, 2011Sd/-

Signature of Publisher

6 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

Page 9: Enterprise Sans Borders

VIEWPOINT

64 07 FEBRUARY 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

AD

Page 10: Enterprise Sans Borders

10 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

Enterprise

ROUND-UP

FEATURE INSIDE

Data Warehousing Reaching Its Most

Significant Inflection Point Pg 12

Million: the size of On-demand CRM market in India

CRM Spending to Grow 30% Expected to see largest increase of all application software marketsSPENDING on customer relationship management

(CRM) software is expected to see the largest increase of all the application software markets worldwide in 2011, according to a survey by Gartner. Overall, 31 percent of respondents expect an increase in applica-tion software spending in 2011.

In comparing their 2011 fiscal budgets with 2010, 42 percent of survey respondents indicated that they expect to increase spending on CRM in 2011, com-pared to 39 percent on office suites and 36 percent on enterprise resource planning (ERP), which ranked second and third, respectively.

Gartner conducted an expansive primary research survey of more than 1,500 IT leaders of organisations

in 40 countries, which concluded in July 2010. The goal was to determine software spending allocations for IT budgets in 2010 and predictions for 2011.

“We’re expecting the CRM market to recover gradually as buyer confidence returns and as businesses begin refocusing on growing revenue as opposed to just reduc-ing costs,” said Hai Hong Swinehart, research analyst at Gartner. “Areas of investment are expected to include the online channel, SaaS based deployments and tech-nologies enabling customer loyalty management, and more-targeted levels of customer service. Along the way we can expect market shifts as acquisition activity escalates, adoption of SaaS grows, and service providers become a more visible force in the market.”

$18DATA BRIEFING

—Source: Zinnov Research

PH

OT

O B

Y P

HO

TO

S.C

OM

Page 11: Enterprise Sans Borders

E NTE R PR I S E RO U N D - U P

11 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

Symantec has exposed a rogue Android app that has been tweaked by hackers to hijack a smartphone and run up big tex-ting bills before the owner knows it. The reworked app is placed on unsanctioned third-party "app stores" where careless An-droid smartphones download and install it.

QUICK BYTE ON SECURITY

Juniper Networks Introduces Qfabric New data centre fabric Provides better scale, speed, savings and simplicity to power the cloud computing eraJUNIPER networks has unveiled QFabric, an outcome of “Project Stratus,” Juniper’s multiyear data center network research and development initiative. QFabric delivers quantum leap improvements in data centre performance, operating cost and business agility, from the enterprise to the large scale cloud provider. Engineered as a simplified, highly scalable data centre network solution, QFabric enables a superior approach to building and securing virtualised data centres that eliminates the tradeoff between quality of experience and economics that plagues today’s legacy networks.

QFabric enables improvements in data center speed, scale and efficiency, by removing legacy barriers and improving business agility. QFabric’s flat architecture also enables integrated security solution that provides visibility, enforcement and scale across the entire physical and virtual data centre fabric. Juniper has invested three years and more than $100 million in research and development to address these constraints, creating the new architecture.

Addressing the annual general meeting of the Federa-tion of Indian Chambers of Commerce and Industry (FICCI), Mukesh Ambani shared his mantra with members of India Inc on how to bring about the con-vergence of India and Bharat.

—Mukesh Ambani ,

Chairman, Reliance

Industries.com

“We should aim to create universities as academic centres of excellence, which will feature in the top 100 in the world and achieving this will be one of the cornerstones of a New India that we will need to build.”

THEY SAID IT

MUKESH AMBANI

Page 12: Enterprise Sans Borders

E N T E R PR I S E RO U N D - U P

12 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

Data Warehousing Reaching Its Most Significant Inflection PointYEAR 2011 will be the year when data

warehousing reaches what could well be its most-significant inflection point since its inception, according to Gartner. The big-gest, and possibly most-elaborate data man-agement system in the IT house is chang-ing. The new data warehouse will introduce new scope for flexibility in adding new information types and change detection.

"In 2011, we are seeing data warehouse platforms evolve from an information store supporting traditional business intelligence (BI) platforms to a broader analytics infra-structure supporting operational analytics, corporate performance management and other new applications and uses, such as operational BI and performance manage-

ment," said Donald Feinberg, vice presi-dent and distinguished analyst at Gartner. "Organisations are adding workloads with online transaction processing (OLTP) access, and data loading has moved to intra-day — approaching continuous — loading in many cases."

In 2010, cost control and performance optimisation became critical evaluation criteria and, consequently, the market has begun to accept a higher first cost in exchange for lower administrative and management costs over the life of the data warehouse.

"We are seeing revenue increases for software licensing in the data warehouse DBMS market as vendors have expanded

More Than 50 percent of data centres would have High-Density Zones by 2015. Less than 10 Percent of data centres had high-density zones in 2010.

their offerings and marketed their products as 'easier to implement and manage'," Fein-berg said. "While cost is driving alternative architectures, performance optimisation is driving multitiered data architectures, including a strong interest in in-memory data mart deployments. At the high end, data warehousing is now mission-critical."

Gartner firmly believes that the data ware-house "ideal" is changing and will give way to new kind of warehouse that addresses more extreme types of information assets. As a result, data warehouse DBMS vendors must begin to address numerous, new information asset formats, or be relegated to supporting roles in the future.

Analysts maintain that there is a real opportunity for data integration tools ven-dors to challenge the database management system (DBMS) vendors as the primary data management architecture, and the DBMS vendors should not underestimate this potential competition. The market is shift-ing from storage and access to delivery and comprehension, and that means context as depicted in metadata will become para-mount. Another contender for the crown of information provider is business process platforms, which deliver business process management. Although late to the game and less mature than either DBMS or data integration, these solutions assist in man-aging the business context of information management.

"By 2013, we predict that data warehouse DBMS vendors will combine their offerings to become something more like an informa-tion management platform. The DBMS will become, above all else, an execution plat-form. It will support and perform data man-agement and integration tasks as well as for query and analysis execution," said Mark Beyer, research vice president at Gartner. "Many traditional data warehouse DBMS vendors already offer both the DBMS and execution platforms — but the indepen-dents may surprise the mega vendors. By all indications, acquisitions as well as research and development will set the stage and the deciding factors for the big winners and los-ers when the 'title fight' begins."

GLOBAL TRACKER

Data Centre High-Density Zone

SO

UR

CE

: G

AR

TN

ER

IN

C.

50%

Page 13: Enterprise Sans Borders

VIEWPOINT

64 07 FEBRUARY 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

AD

Page 14: Enterprise Sans Borders

E N T E R PR I S E RO U N D - U P

14 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

were reset, with about as many

users losing their entire cache of

mails, chats, and attachments.

Google obviously began work-

ing hard to restore the accounts of

“0.29% of the Google Mail user-

base” immediately, and promises

that all the missing data will be

restored as soon as possible.

Google later revised its estimate

LESS THAN a percent of Gmail

users woke up to a fright this

morning, when they experienced

a blank inbox and a ‘Welcome to

Gmail’ message awaiting them

when they logged on. After the

first of these users aired their

plight on the Gmail Help Forum,

Google estimated that approxi-

mately 500,000 Gmail accounts

of the number of accounts affect-

ed to 150,000, or approximately

0.08% of all Gmail users, so if your

account was one of those hit by the

bug, you can count yourself as truly

unlucky. For the rest of us, this only

serves as an unpleasant reminder

to stop trusting cloud storage, and

to regularly take backups!

"Google Mail service has already

been restored for some users, and

we expect a resolution for all users

in the near future. Please note this

time frame is an estimate and may

change," a release from Google said.

Bug erases 150,000 Gmail accounts Google promises complete restoration

TALLY.ERP

Tally Solutions has released

Tally.ERP 9 Series ‘A’ Release

3.0, which features enhanced

functionalities including the new

Rupee symbol.

The improved version of the

software intends to improve Tal-

ly's reach in the Middle East with

the introduction of its bidirection-

al language feature, simplifies the

business processes via job work,

and payroll via income tax for pay-

roll, informed the company.

"Most often Simple is confused

with Basic, Tally.ERP 9 is very sim-

ple to use, yet comprehensive.

The focus has been to absorb the

complexity of providing a simple

yet functionally rich and flexible

product. With the inclusion of the

Rupee symbol, job work for out-

sourced manufacturing and Ara-

bic etc., the capability of Tally.ERP

9 has gone a couple of notches

up,” remarked Shoaib Ahmed,

president, Tally Solutions.

The software incorporates ‘inter-

currency’ conversion, and enables

user to select a base currency (say

INR in this case) and convert the

consolidated reports of all inter-

national branches of the business

into the same. Hence, if a business

unit has branches in the US as well

as UK, the reports will be churned

out not with the corresponding ‘$’

or ‘£’ values but in ‘rupee symbol’.

This facility however requires the

user to feed the current currency

values into the system to enable

this function.

POLYCOM has recently announced that the Poly-com UC Intelligent Core solution is transforming the UC experience by enabling interoperability with other vendors’ solutions, including the closed Cisco telepresence systems based on the Telepres-ence Interoperability Protocol (TIP).

Significant innovations in the Polycom UC Intelligent Core platform will soon enable cus-tomers to deploy multi-vendor UC solutions and protect their investments in legacy third-party sys-tems. The innovations continue Polycom’s com-

Polycom to Inter-operate with Com-peting Offerings In-teroperability to include support for non-stan-dard TIP from Cisco

FACT TICKER

mitment to UCEverywhereSM by Polycom, a strat-egy for seamlessly connecting communications across the continuum of consumer, mobility, SMB (small to medium businesses) and the enterprise, regardless of platform or network. These same innovations enable Service Providers to deploy open cloud-based UC telepresence services, giving customers the capability to communicate outside their organisations and across their supply chain to suppliers, partners and customers.

“Cisco customers have told us for years that they’ve been imprisoned by a closed telepresence platform that builds a wall around their UC environ-ment and keeps out non-Cisco users. Today, all that changes,” said Andrew Miller, CEO, Polycom. “With its support of open standards, the Polycom UC Intel-ligent Core solution gives customers more options for collaborating and expanding their UC environ-ments than ever before, without having to sacrifice their existing systems. Breakthroughs like this are fundamental to our vision of UCEverywhere.”

The ability to deploy Polycom solutions alongside competitors’ systems can deliver dramatic total-cost-of-ownership (TCO) savings. Polycom estimates that a mid-sized enterprise will spend up to $2.1 million less in the first year on a typical Polycom telepresence deployment – including equipment, bandwidth, services and maintenance costs – versus a comparable Cisco telepresence deployment.

Standards and open interoperability are also the foundation of Polycom’s portfolio of strategic alli-ances. This set of alliances is known as the Polycom Open Collaboration Network, and includes Micro-soft, IBM, HP, Avaya, Juniper, BroadSoft, McAfee and Siemens. These joint Polycom partnerships are critical to providing customers with the flexibility, best-of-breed solutions and investment protection.

Page 15: Enterprise Sans Borders

VIEWPOINT

64 07 FEBRUARY 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

AD

Page 16: Enterprise Sans Borders

A Q U E S T I O N O F AN SWE RS H U B E R T YO S H I DA

16 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

Embracing change: Today the acceptance to technology

is at a pace that we have never seen before.

Page 17: Enterprise Sans Borders

17 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

H U B E R T YO S H I DA A Q U E S T I O N O F AN SWE RS

CIOs today are faced with the challenge of transforming their data centres to stay in sync with changing business needs. In conversation with Rahul Neel Mani, Hubert Yoshida, Vice President & CTO, Hitachi Data Systems, provides insights into how Hitachi is aiding this transformation.

The data centre and IT services have become instrumental in almost every business in this age,

yet many are still being powered by legacy infrastruc-ture. The goal is to create a virtual, flexible and mobile infrastructure which is able to deliver services ‘On Demand’. How is it possible?IT is challenged today to reenergise the data centre to readily accommodate changing business requirements and demands for always-accessible information. The challenge lies in making information both available and secure. The transformation of the data centre infra-

structure initiates the creation of agile virtual flexible infrastructure which enables ‘On-demand’ services. It is more than just automation and virtualisation. Rather, it is a combination of dynamic provisioning, virtualisation and cloud computing, which is success-ful in arresting escalating storage operational costs and transforming the data centre to be agile, sustain-able, and business-oriented. We will continue to help customers transform their data centre into an informa-tion centre that is virtualised, automated, cloud-ready, and sustainable.

HUBERT YOSHIDA | CTO, HITACHI DATA SYSTEMS

Transforming theData Centre

Page 18: Enterprise Sans Borders

A Q U E S T I O N O F AN SWE RS H U B E R T YO S H I DA

18 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

What are the pressing chal-lenges regarding this trans-

formation in the data centre? How should a CIO be responding to these challenges?The complete transformation of the data centre can only be achieved when the infrastructure fosters cooperation among server, network and storage assets, and relies on a single platform for all data and delivers application transparency so that it can be synchronised with business objectives. A CIO’s approach towards data centre transformation is to optimise many types of virtualisation methods to consolidate resources, technologies and applications, thereby reducing the complexity of years of ‘bolting on’ and building-in future flexibility. A key enabler for agility and transformation is virtualisation which provides an abstraction of IT resources, so that it can be viewed as a common pool of resources which can dynamically create or change IT services to meet changing business requirements. Storage virtualisation separates the application and server view of data from the physical storage infrastructure so that we can change and transform the physical storage infrastructure without disruption to the application.

What are the most impor-tant steps organisations

should take when transitioning to the new data centre model? The first thing is to understand that storage virtualisation sepa-rates the application and server view of data from the physical stor-age infrastructure so that we can change and transform the physical storage infrastructure without dis-ruption to the application. The first step to do is to transform your leg-acy storage infrastructure without the need to rip and replace. Most virtualised storage systems will see an increase in performance just

In this approach two things are visible prominently.

These are virtualisation and cloud computing. What should organisations think before they plan for virtualisation and cloud? In the current transforming IT scenario, CIOs need a truly end-to-end data centre. Considering the next wave of virtualisation and cloud storage, organisations should focus on application and server-centric strategy instead of focusing on a conventional storage-centric view.

What are the focus areas of storage efficiency improve-

ments that can have a positive impact on the data centre?As infrastructure becomes more disruptive and resource intensive,

by sitting behind the large global cache of the USP V/VM. However, if one needs more performance, one can wide stripe his volumes or move them onto tier-one storage in the USP V/VM and do both. If you are converting servers or applica-tions as part of this transforma-tion, you can create non-disruptive clones of the data for conversion, extract/translate/load, development test on lower cost tiers of storage, or dynamically spin up new alloca-tions of virtual storage to support virtual servers. Not only can storage virtualisation protect your applica-tions and servers from changes in the physical storage infrastructure, but it can enable your applications and servers to change and grow dynamically.

“Organisations should focus on application and server-centric strategy instead of focusing on a conventional storage-centric view.”

There is a need

to reenergise the

data center to

accommodate

changing

business

requirements

and demands for

always accessible

information

The VSP

and HCS

management

suite provides

one platform

for all data to

automate, simplify

and protect

heterogeneous

storage resources

THINGS I BELIEVE IN

Page 19: Enterprise Sans Borders

H U B E R T YO S H I DA A Q U E S T I O N O F AN SWE RS

19 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

The VSP is the first enterprise storage sys-tem that has converted to Serial Attached SCSI for faster, point-to-point, perfor-mance and availability over conventional FC Arbitrated Loop disk connections and introduced small form factor 2.5 inch disks which consume less than half the power of conventional 3.5 inch disks. This, combined with a new design in packag-ing and front to back rack mount cooling, reduces data centre footprint to less than half that of competitive storage frames. These power and space saving features are particularly important for Asia Pacific data centres where power consumption is grow-ing faster than in Europe or the Americas.

The core message behind VSP is the notion of 3-D scaling and

management. How will this gel with virtualisation and cloud?A couple of years back, Hitachi Data Sys-tems had decided that that it will help the

“Substantial power savings can be achieved through replacement of power hungry legacy systems and more efficient utilisation of current systems.”

aging IT systems and infrastructure create a burden on maintenance. We believe the transformation of the data centre starts by designing flexibility and efficiency into the architecture with a priority on data and its storage. To achieve this, we are bringing together innovations in storage virtualisation, dynamic provisioning and archiving. We also offer proven method-ologies and human resources to help cus-tomers implement IT in a new way that offers predictability and adaptability for the future. The result is a data centre that is highly responsive to changing business and economic conditions, enables the ability to access and make sense of data in a moment’s notice and accommodates unpredictable bursts of transactions.

In many regions, affordable power is becoming scare and companies are forced to relocate to continue operations. Substantial power savings can be achieved through replacement of power hungry legacy systems and more efficient utilisation of current systems.

It’s important to have awareness about the tools that are available to transform legacy systems. These could be virtualisa-tion and system management tools that link business objectives with infrastructure performance and provide a return on your total assets. Some companies are doing this today by using virtualisation to seam-lessly migrate off peta bytes of legacy stor-age systems and recovering 40 percent or more of existing storage capacity through dynamic provisioning.

While we talk about other things, Hitachi Data Systems last year also

announced the new high-end platform - the Virtual Storage Platform. Yes, recognising the importance of a transformed data centre, Hitachi Data Sys-tems launched the industry’s first three-dimensional scaling platform. It enables organisations to scale up, out and deep for unprecedented levels of agility and cost savings in their virtualised data centres. The Virtual Storage Platform (VSP) intro-duces a platform that can scale up to meet the increasing demands of virtual servers and high performance data bases. The VSP is the only storage virtualisation platform that can support VMware VAAI across

What are your other plans with regards to virtualised storage

and cloud? Hitachi Data Systems is continuing to grow using virtualisation as a core compe-tency. It will continue to invest in innova-tion to enable its clients to attain competi-tive business advantage. We would love to see huge Hitachi storage implementations across verticals and turn our customers’ data centre to an information centre and translate that into business growth.

Hitachi Data Systems India plans to expand on solution selling and focus on Government and Healthcare Verticals. This aligns to the company’s global vision that data centre transformation is to have a single, virtualised platform for all data with the ability to manage multivendor environments.

[email protected]

internal and external, virtualised storage, providing improved VMware scalability and performance while preserving invest-ment in existing storage assets.

In conjunction with the new VSP storage platform, Hitachi Data Systems has also introduced new management software, the Hitachi Command Suite (HCS), which pro-vides closer integration with applications and virtual servers and provides a common management tool set to manage block, file, and content data across heterogeneous storage systems. The VSP and HCS man-agement suite provides one platform for all data to automate, simplify, and protect heterogeneous storage resources.

customers to build the infrastructure on cloud. And this particular platform pro-vides the perfect environment for organisa-tions to build their infrastructure on cloud to provide information services and infra-structure service.

Because of the unique capability of this platform to service block file and content data, we will help customers in integrating the content on cloud in the infrastructure cloud as well. And over a period of time, customers can bring in a whole lot of intelli-gence in transition through the information cloud. This platform provides an ideal envi-ronment and with this announcement we will help increase operational efficiencies.

Page 20: Enterprise Sans Borders

20 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

BEST OF

BREED

What is work in 2011? The Inter-net and the devices we have cre-ated to access it have removed all physical, temporal, and spatial boundaries from work.

In fact, work can pretty much happen in any setting, anytime, anywhere a work-related thought crosses

Constant Connectivity: The Way We Work TodayWhile the Internet and its access devices have removed all boundaries from work, they have made life tough for a CIO. BY MARK SETTLE

Just What is the CIO's role? Pg 26

Cross-Domain Cloud Management Pg 24

FEATURES INSIDE

your mind. An inconvenient consequence of this simple truth is that the employees of most American corporations expect their IT groups to supply them with the data and applications they require to act upon their work-related thoughts in any setting, any-time and anywhere.

It's a commonly known fact that over the past 40

EXPECTED GROWTH IN PC SHIPMENTS IN 2011 TO REACH 387.8 MILLION UNITS: GARTNER

10.5%DATA BRIEFING

Page 21: Enterprise Sans Borders

21 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

MO B I L I T Y B E S T O F BR E E D

years, the number of farm and manufac-turing jobs in America has declined while the number of service jobs and knowledge workers has grown. It's equally obvious that information technology has played a key role in enabling and leading the trans-formation of everyday work. For example, traditional farm and manufacturing jobs use IT to provide workers with up-to-date information about weather conditions, irri-gation needs, stock inventory, etc. The cabs of many tractors and harvesters have been transformed into instrumented cockpits, with GPS locators, onboard navigation, PC displays, and intercom capabilities to ensure that their operators are constantly connected to job-critical information.

At the end of the day (and at the begin-ning), workers at home employ another assemblage of technology to stay connected to a world that is increasingly of their own making. Wi-Fi provides Internet access throughout the household and can be used for stock trading, vacation planning, gam-bling, retail purchases, video gaming, or Skyping with friends. Tweets, texts, e-mails, and RSS feeds provide a steady stream of information -- some for entertainment, some for education, some for work, and some for pure serendipity. (Let's face it, sometimes it's just plain cool to look up an arcane baseball statistic, find out what was served at last night's White House state din-ner, or see a real-time video display of Times Square during a snowstorm.)

In any given 30 minutes at work, I might read e-mails from my desktop support team in Frankfurt a distressed sales rep in England, the leader of one of my applica-tion support teams in Bangalore, and a note from my wife reminding me I need to leave work early. I might schedule a four-person teleconference for later in the week, select a hotel for a business trip to New York, review my son's resume and provide some tips, update a PowerPoint presentation, issue written instructions about the format of an upcoming opera-tions review, review stock ana-lysts' reports on a technology company whose products are of potential interest to us, check on snow conditions in Park City (in preparation for a ski weekend

later in the month), and adjust the duration of my last meeting of the day to ensure that I'm complying with my wife's instructions.

Following dinner at home, I might go online to review my late-day e-mail traffic from work, check stock prices, see if I've been upgraded on the flight to New York, briefly run through the slides I intend to use at my 9 a.m. meeting the next day, and make a dinner reservation for the weekend.

Any reader of this article could easily sub-stitute his or her own sequence of activities, but the point is this: When did work start and when did work stop during this hypo-thetical workday? The simple truth is that the Internet and the devices we have created to access it have removed all physical, tem-poral, and spatial boundaries from work. In fact, work can pretty much happen in any setting, anytime, anywhere a work-related thought crosses your mind. An inconvenient consequence of this simple truth is that the employees of most American corporations expect their IT groups to supply them with the data and applications they require to act upon their work-related thoughts in any set-ting, anytime and anywhere.

In his book The Innocents Abroad, pub-lished in 1869, Mark Twain made this obser-vation: "In America, we hurry--which is well; but when the day's work is done, we go on

thinking of losses and gains, we plan for the morrow, we even carry our business cares to bed with us." In his worst nightmares, Twain never could have imagined how we have transformed our obsession with work into a 24x7 addiction through the use of modern information technology.

Here's a story that supports Twain's observation: In my

recent travels, a fellow CIO told me that his network team had discovered a sharp sec-ondary peak in daily VPN traffic, extending roughly from 8 p.m. to midnight on most weeknights. Thousands of this company's employees were logging back onto the com-pany network every week at night to check e-mail, access SharePoint files, surf the Internet, etc.

The CIO ran a simple Zoomerang survey to determine why this traffic was occurring. There were two predominant reasons. The first was that people wanted to "get caught up" from the previous workday or "get a head start" on the next day. This would appear to be a perfectly logical and reason-able explanation.

The other dominant response was, "I log on because it's a more appealing use of my time than any other activity that is available to me." I personally find that response to be a little disturbing, but truth be told, I'm probably guilty of it myself.

As Americans have become more IT aware, and IT adept, it has become increas-ingly difficult for IT shops to keep up with their ever-changing tastes and predilections. Most IT shops have an approach to end-user computing that is akin to McDonald's, trying to furnish a limited selection of products reliably and consistently. The only problem is that our users (and their friends and families) have been dining at some higher-end establishments, and they are looking for a whole lot more variety in their personal technology capabilities.

In his autobiography My Life and Work, Henry Ford writes that one morning, in 1909, he announced to his sales team that in the future, the company was only going to build one model automobile, the Model T, and that the chassis would be exactly the same for all cars. Ford writes: "…and

77%OF SMBS FEEL

THEY 'D LOSE 50

PERCENT OF THEIR

DATA IN THE EVENT

OF A DISASTER

Most IT shops have an approach to end user computing that is akin to McDonald's, trying to furnish a limited selection of products reliably and consistently.

Page 22: Enterprise Sans Borders

22 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

B E S T O F BR E E D MO B I L I T Y

I remarked: 'Any customer can have a car painted any colour that he wants so long as it is black.' "

Such uniformity may be good for assembly line productivity. Motivated by similar pro-ductivity drivers, IT shops put similar limita-tions on the tools they are willing to procure and support for their end users. This is rap-idly becoming a losing strategy. It's difficult to maintain device standards when half of the members of your executive team bought themselves iPads for Christmas.

Smartphones and tablets are creating an interesting problem for IT organisations. Our users are not moving to new Internet access devices at the expense of old ones -- they are adopting new devices in addition to the old ones. Our employees are building their own, personalised technology work-benches in the same way that a blacksmith or furniture maker of yesterday would have configured his or her personalised work-bench. A smartphone, tablet, laptop, and home PC and printer are basic components of every knowledge worker's tool belt.

To add insult to injury, our employees are starting to subscribe to mobile applica-tions that allow them to access information they can't get through company-furnished applications and databases. They also have a much keener appreciation of the obstacles that limit their productivity, so they sub-scribe to applications that will forecast traffic conditions, find Starbucks locations, update airline departure times, etc., to over-come their personal obstacles.

Most IT shops bemoan the difficulty of supporting and securing smartphones and tablets. Mobile applications may be con-structed on Apple, Google, Microsoft, and HP/Palm operating systems and accessed on a dizzying array of physical devices. The challenge to the standard end user support

team seems totally overwhelming. I contend that the threat to "business as

usual" is much more profound and insidi-ous. The real problem is that most IT shops are geared to fight a classic European set piece battle, forming up in structured ranks to frontally assault a business problem or challenge. We like to build large, complex applications with scripted workflows, auto-mated approval processes, hard integrations with other systems, etc. Unfortunately, we are about to be drawn into a guerrilla war

whether we like it or not. During any given year, most IT shops

typically deliver new business capabilities to their internal clients through a couple of hundred releases that introduce new applications or, more commonly, enhance old ones. By contrast, Android developers are releasing more than 10,000 applications every month. Admittedly, many of these mobile applications have very little business significance, but some are clear productivity boosters. Little by little, our end users will gradually adopt specific mobile applications and build their own unique productivity "cocoons," customised for their needs. I fully expect that in three years or less, many of our employees will be routinely access-ing mobile applications at their work desks, because they will have become an integrated and essential part of the way work is performed.

Just look at the numbers: Even if 90 percent of Android applications have zero busi-ness relevance, that still equates to 1,000 applications of potential interest per month, relative to the 200 that a pro-ductive IT shop might deliver in a year. It's a numbers game whose outcome is largely pre-

ordained. The application guerrilla war we are about to be drawn into is far more sig-nificant than the device support and security issues that occupy much of today's debate regarding the role of smartphones and tab-lets in the enterprise.

In the book Nineteen Eighty-Four (pub-lished in 1949), author George Orwell wrote of a future dystopia in which an all-seeing force tracks the movements of all citizens in a mythical country called Oceania. Surely, no reader of this article believes that Orwell's vision of "Big Brother" has not become, at least, technologically possible in America today. The technology is certainly in place to track the day-to-day, hour-to-hour, or even minute-to-minute activities of most knowledge workers.

Our electronic fingerprints are every-where, from E-ZPass toll booths, to credit card readers, to bank ATMs, to AOL/Gmail/Hotmail messaging, to cell towers, to Face-book and other social networking sites, to … you fill in the blank. Anyone who believes that he or she can disguise or camouflage their electronic existence is seriously delu-sional. Anyone who believes he or she can maintain multiple electronic personas -- a work persona, a play persona, a parental persona, a political persona, etc. -- needs to read Internet Protocols for Dummies.

Most IT shops instinctively turn discus-sions about information security into debates about network engineering, spawn-ing endless conversations regarding future technology investments that will help secure the transport layer, the network layer, the data link layer, etc.. IT groups instinctively avoid a discussion of the social engineering and social discipline required to truly pro-tect a company's information assets.

Let's take a simple analogy that everyone can relate to. I personally have no desire

to share my annual W2 forms with my college-aged chil-dren. They are already getting enough of my money. The last thing I want them to realize is the remaining amount that they aren't getting. The tech-nology solution to this problem would be to reserve a room in my house for my confidential W2 files, secure it with retinal eye scan technology, install

Even if 90 percent of Android applications have zero business relevance, that still equates to 1,000 applications of potential interest per month.

6.5%Y-O-Y GROWTH

IN WORLDWIDE

SERVER SHIPMENT

IN Q4, 2010

Page 23: Enterprise Sans Borders

23 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

MO B I L I T Y B E S T O F BR E E D

laser intruder alarms in the room to thwart unwanted visitors, and finally require fin-ger print scans to open the file itself. The simpler solution is that I just put the W2 forms in a place where they can't get them. Embargo all access -- it's worked so far.

The same thing is true in private indus-try. Go talk to a hedge fund company or an investment firm that caters to "high wealth" individuals. Undoubtedly, these companies will have sophisticated technology to secure their IT assets, but more importantly, all employees will realize that their livelihood and personal job security is critically depen-dent upon avoiding the leakage of sensitive information. When USB ports are disabled on their PCs, they don't complain. When they are told that they can't have remote access to company systems, they don't com-plain. They "get it": An inadvertent security lapse could put them completely out of busi-ness and out of their jobs.

Many high-tech companies also "get it." When their executives travel overseas, they leave their personal PCs and BlackBerrys behind and employ loaner devices that carry only the information required to conduct the activities scheduled for that particular trip. Their intellectual property is too valuable to be transported casually outside the confines of their company's labs and headquarters.

Managing information security is a little like eliminating access to inappropriate con-

tent in the workplace. It's hard to get people to "clean up their act" until the threat of losing a job comes into play. If you are expe-riencing a loss of productivity due to the existence of suggestive information in the workplace, set a mandate with termination as a consequence. You will be amazed at the drop in access to offensive sites and content. The same is true for information security: Establish clear policies with clear penalties and just start performing some scans and searches. It's a lot more intrusive but a lot less expensive than buying more network security tools.

The subtitle of Stanley Kubrick's iconic 1964 movie Dr. Strangelove was How I Learned to Stop Worrying and Love the Bomb. Maybe CIOs in 2011 need to adopt a similar mantra: "How I Learned to Stop Wor-rying and Love Smartphones and Tablets." Most of our employees already have their electronic tool belts, fully equipped with smartphone, tablet, laptop, and home PC and printer. IT shops that are in denial, hoping the complexity of this landscape will some-how disappear over time, are sadly mistaken.

It's time to switch from being a reaction-ary force trying to hold onto the status quo to demonstrating true technology leader-ship by proactively supporting the use of new access devices throughout the enter-prise. We need to develop a new "support contract" with the employees using these

various devices. Here are three steps we can take today:

Step 1: Continue to support a very limited number of standard "tool belts" (maybe one?) for the IT-challenged employees who still remain in every large company, but pro-mote and evangelize the use of other devic-es with the "buyer beware" caveat that sup-port issues will largely be resolved through self service. Properly managed, this should become an exercise in expectation setting: If you use a standard, supported device, we (IT) can help you solve your problems. If you elect to use something different, we can only go so far (defining what so means) in helping you when something goes wrong. That approach won't work in all circum-stances but will provide an 80%+ solution for the majority of problems encountered by users of unsupported devices.

Step 2: Embrace the reality of mobile applications. It will take a while to redeploy existing headcount from the support of legacy applications and give them new skills for mobile application development. In the meantime, IT should become a clearing-house for "cool apps" that are already com-mercially available. Eventually, IT should be churning out its own monthly collection of "cool" mobile applications, but until that dream can become a reality, just start pro-

Managing information security is a little like eliminating access to inappropriate content in the workplace.

Page 24: Enterprise Sans Borders

24 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

B E S T O F BR E E D MO B I L I T Y

moting other people's products and learn how to be an "early adopter" of mobile tools that are already out there.

Step 3: Start Web-enabling everything. Become an inter-nal software-as-a-service (SaaS) provider to your own employees, and provide your users with browser-based access to the applications they need to perform their jobs. Look at the capabilities you are offering, and think about your users' desires to access those capabilities in any setting, at anytime, anywhere.

The three steps outlined above are tactical responses to the situation we find ourselves in. Two other, more fundamental, changes are desperately needed in the way we do business:

We need a new mental model for appli-cation development. We need to stop behav-ing like 19th century British generals and more like 21st century guerilla freedom fighters. We need a whole new paradigm for application development based upon user "pull" rather than IT "push." Users want to subscribe to the portions of applica-tions they need to do useful work; that's why they minimize so many applications

on their desktops everyday. They need only slivers of the large, complex applications we've constructed in the past. Ideally, they would like to assemble much smaller com-ponents of these applications into portals that are custom-ized for their unique needs. And they are coming to expect "zero latency" in the databases that are feeding these appli-cation components. Build-

ing highly componentized applications, with real-time data interfaces that can be accessed on a subscription basis, is a radi-cally new development paradigm for most IT shops, but one that we will all eventually be forced to adopt.

As a profession, we need to stop hiding behind network engineering as the ultimate cure for all security ills. We are going to have to participate in a much more difficult social conversation within our companies and start restricting data access instead of application access. Data is the ultimate source of competitive advantage. Every com-pany needs to determine what data is critical to its health and survival, and restrict the dissemination of that data on a true need-to-know basis. That will be a far more difficult

Cross-Domain Cloud ManagementIf your cloud initiatives are stalling, it's time to have a cross-domain services management team. BY DENNIS DROGSETH

conversation to have in most companies than debating the most appropriate tool for securing the transport layer. But ultimately, it will be a far more effective way to manage security-related risks and liabilities.

Pundits like to use Facebook and Twitter as the ultimate examples of how constantly connected we all have become. I don't need to observe the behavior of my college kids to convince myself that we live in a con-stantly connected world. I can find clearer examples much closer to home. When my wife gets up in the morning, she turns on the computer before she turns on the coffee maker (and before she talks to me). That's the world I live in today.

—Mark Settle, chief information officer for BMC

Software, joined the company in 2008. He has

served as the CIO of four Fortune 300 compa-

nies: Corporate Express, Arrow Electronics, Visa

International, and Occidental Petroleum. Settle

has worked in a variety of industries includ-

ing consumer products, high-tech distribution,

financial services, and oil and gas. He received

his bachelor and master's degrees from MIT and

a PhD from Brown University. He is also a former

Air Force officer and NASA Program Scientist.

—This opinion was first published in CIO Insight. For

more such stories please visit www.cioinsight.com

In this column, I'm going to pretend that you're already dealing with some cloud initiatives -- whether you had any-thing to do with them or not -- and trying to take some con-trol over chaos. I have been proposing appointing a "Cloud Tsar" to document and evaluate who was doing what inside

and outside of IT -- whether software-as-a-service (SaaS), infrastruc-ture-as-a-service (IaaS), or platform-as-a-service (PaaS).

But, in this column, I'm going to draw on some December data from a global research initiative EMA did called Operationalising Cloud to give you some pointers about what to do next. Just for the record, we surveyed 155 respondents globally across verticals for com-panies of 500 and above employees. Of the respondents, 26 percent were C-level and 57 percent were director level and above. We were seeking the "top-down" view on cloud deployments.

16.4%GROWTH IN

SERVER REVENUES

IN Q4, 2010:

GARTNER

Page 25: Enterprise Sans Borders

25 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

Starting overPerhaps what is most striking is 70 percent of respondents had to "redo" or "rethink" their initial cloud initiatives! The dominant change they wanted to make was process re-definitions so that different individuals and groups could work together more effectively to support the dynamic, cross-domain requirements cloud engenders.

Changes in management technology adop-tion for provisioning services and monitor-ing and assuring services for performance were near the top of the list, as well, along with changes in application development and design. It might be also worth noting that more than 25 percent of respondents also had to re-assign ownership for organisational leadership. And, as IT executives, you may well want to know just what those organisational changes are likely to be. To answer this, I'll combine a little data with a little observed insight from working with IT organisations and hope the combina-tion shapes up for you.

Cloud teamsAs a single organisation, Cloud or Virtualisa-tion Support edged out Data Centre/Server Ops as the primary owner for cloud. This represents a radical jump upward (doubling in percentage) over a year ago. This is a self-styled, specifically focused team that may or may not have strong cross-domain capabilities, depending on the maturity of the organisa-tion and of the effective maturity of the cloud deployments -- the two go hand in hand. Per-haps more significantly, the third entrant here, architecture/infrastructure services, when combined with cross-domain service management, became the single, most pervasive organisational force in assimilating cloud and also the most successful one.

When we did the analysis, we saw that this group led in accelerat-ing cloud deployments, and was also more advanced in deploying critical service management technologies that in turn brought strong benefits based on our data. We tracked twelve technologies, but a few examples are CMDB/CMS, application dependency map-ping, service catalogs, integrated service desks, and IT process auto-mation, or runbook.

We also asked respondents if they had a "cross-domain services management group" as a general statement of maturity. Now, I know that this could mean many things and go by many different names but the data that came back was nevertheless astonishingly consistent: If you have a cross-domain services management group not only are you categorically ahead of IT organisations that do not, you are significantly more likely to see your IT budget increase!

In terms of cloud, you are advantaged in both the extent to which cloud services can be assimilated, and the effectiveness with which they can bring value. The value we tracked included opex and capex savings, provisioning new and existing services, improved service performance, and even enhancing business models and supporting revenue creation, among others.

This group, by the way, is more often than not led by… you! Better than 50 percent of the respondents indicated C-level oversight, and 70 percent were VP level and above.

If your cloud initiatives are sputtering and you don't have a cross-domain services management team (call it what you will including "architecture and infrastructure services") maybe it's time to create one. After all, the demands of cloud computing aren't limited to systems management. One could argue that virtual machines are fundamentally a networked phenomenon with disruptive impacts on the whole infrastructure, including storage, let alone applications that are themselves modular, dynamic and often unpredictable (e.g., Web 2.0) in terms of components.

CLO U D B E S T O F BR E E D

As a single organisation, Cloud or Virtualisation Support edged out Data Centre/Server Ops as the primary owner for cloud.

ILLU

ST

RA

TIO

N B

Y A

NIL

T

Page 26: Enterprise Sans Borders

26 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

B E S T O F BR E E D CLO U D

Just What is the CIO's Role?A CIO should know everything about information and the technology to deliver it. BY MIKE SCHEUERMAN

There has been a lot of discus-sion in many forums about the role of the modern CIO. To me it's fairly simple and it's in the title: Information.

The CIO's role is about information. Infor-mation to make strategic business deci-sions; Information to make tactical business decisions; Information about the state of the business; Information about the customer needs; Information about everything that is crucial to the operation and direction of the business. Generating information and the systems that acquire, house and dissemi-nate that information is the essence of the CIO's role.

The person with the CIO title must be able to understand everything there is to know about the information needs of the business and everything about how technol-ogy can be used to deliver that information

Reorg for the cloud?So should cloud computing make you rethink your

organisational structure? Maybe so. Once again, it's the tail wagging the dog, I know. But cloud computing has apparently gotten quite a lot of heft behind its tail.

And it's still worth doing. 57 percent of our respon-dents were "somewhat satisfied" and 34 percent were "completely satisfied" with their cloud deployments. That's up only a tad from last year.

To distill an awful a lot of words (five columns worth) into three key points I'd say:1 Cloud is a confusing admixture of technologies- it's important to prioritise where and how you want to adopt them; ·2 Cloud is not an end in itself, but provides a means to deliver ser-vices more flexibly, resiliently, cost-effectively and responsively if

well planned, managed and integrated with broader IT service directions; and ·3 Cloud is a fundamentally cross-domain vs. "systems-only" or even "systems-centric" phenomenon once understood -- and this has profound implications on process and organisational structures, as well as man-agement technologies for assuring, optimising and provisioning IT services.

So what's next for you with cloud? I'd love to hear from you on that score. —Dennis Drogseth is VP of Boulder, Colo.-based Enterprise

Management Associates, an industry research firm focused

on IT management. Dennis can be reached at ddrogseth@

enterprisemanagement.com

—This article appears courtesy www.cioupdate.com. To see more articles

regarding IT management best practices, please visit CIOUpdate.com.

70%OF RESPONDENTS

HAD TO REDO

OR RETHINK THEIR

CLOUD INITIATIVES

ILLU

ST

RA

TIO

N B

Y B

INE

SH

SR

EE

DH

AR

AN

Page 27: Enterprise Sans Borders

M A N AG E M E N T B E S T O F BR E E D

in a timely, cost-effective way. So here's a breakdown of what the CIO needs to do to fulfill the role chief information officer:

Strategy - The CIO participates in the development and management of the busi-ness strategy. Without this foundation the CIO can't know what information is needed for crucial business decisions and which is just nice to have.

The business strategy drives the tech-nology strategy. Developing a technology strategy with an architectural framework supporting the information needs of the various decision makers is the first step toward delivering that information.

Interpretation - The CIO has to have the business savvy as well as the technical savvy to interpret the business needs in a technol-ogy context; answering this key question: What kind of technology can best deliver the information that is required?

Acting as the intermediary between those with those who establish the business goals and strategies and those who know how to implement the technology is one of the key roles of the CIO.

Communication - Developing a com-munication plan to let all the stakeholders know what progress is being made on get-ting the information that they need is the next big area of focus for the CIO. You may be able to deliver a wonderful system, but if no one knows that there is forward move-ment, then you might as well not even do it because somebody is going to get impatient and unhappy because they don't know what's going on. Communication at all lev-els is vital. The information about progress is almost as important as getting the infor-mation for business decisions itself.

Delivery - Delivery of information is next big area for the CIO. Putting together plans for projects that meet deadlines and budgets goes a long way to determining the success or failure of a CIO.

There are multiple components to deliv-ery: project management; infrastructure; vendor due diligence/management; secu-rity; regulatory compliance; stakeholder input, etc. The list is almost endless. Each of these components has a role to play in deliv-ering that one piece of information that can

make or break a business strategy.Delivering information at the right time to

the right person is what the CIO does every day. If that information is faulty or late -- even if it's not be the CIO's fault -- they will still get blamed because the tools of modern business are technology based. Being a CIO is one of the toughest jobs in any company because you have to know everything about the business, everything about technology and be able to clearly explain it to people who haven't a clue or don't care about one or the other .

—Mike Scheuerman is an independent con-

sultant with more than 26 years experience in

strategic business planning and implementation.

His experience from the computer room to the

boardroom provides a broad-spectrum view of

how technology can be integrated with and con-

tributes significantly to business strategy. Mike

can be reached at [email protected]@

scheuerman.org.

—This article appears courtesy www.cioupdate.

com. To see more articles regarding IT manage-

ment best practices, please visit CIOUpdate.com.

Page 28: Enterprise Sans Borders

28 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

The textile industry is one of the largest employment generators in India, and yet remains a low-margin business. The only way to thrive in this highly com-petitive industry, filled with process inefficiencies, is to do things differently. This is exactly what House of

Pearl Fashions demonstrated with its ERP implementation.House of Pearl Fashions is a Rs 1,850 crore apparel manufacturing

conglomerate that helps bring many of the world’s leading clothing brands to market. The company has operations across six continents and plays a dominant role in the supply chain for brands including GAP, J.C Penney, Next, Liz Claiborne, and Esprit.

Since 2005, House of Pearl has expanded rapidly after a series of acquisitions that bought it manufacturing, sourcing, and distribu-tion facilities around the world. Its growth enables the company to produce more than 4,000 styles every year and warehouse and dis-tribute 5 million pieces of apparel annually in the UK and the U.S.

Good IT or GodRiding on the back of acquisitions, the company was growing at 30 percent, while the industry was growing at 4-5 percent.

“With growing business, you need lots of controls in place,” says House of Pearl Fashions, Group CIO, M Srivenkatesa. “If you have a business that goes beyond line of sight, then you need either God or good IT systems to manage it.”

Srivenkatesa, who gave up the top job as CEO at another company to become House of Pearl Fashions’ CIO, had been looking for “some

tool to get that control” from 2006 itself. The company had huge operations in geographies including India, the U.S., UK, Germany and Hong Kong.

“As we got more business, new channels came into being and we came to a situation where nobody knew what’s happening about annual reporting and so on," the CIO recalls.

Then there was the headache of dealing with disparate platforms. The company had a UNIX platform for ship-ping and commercial business, Oracle for production, and some homemade tools for merchandising, sales and procurement.

“None of these talked to each other. We had a situation where the left hand didn’t know what the right hand was doing,” Srivenkatesa says.

From being a CEO of a 300 crore rupee company, Srivenkatesa was getting into the CIO’s shoes to drive the ERP implementation for House of Pearl. Having worked on SAP earlier, he knew exactly what the solution could do for the apparel maker. With little IT experience, but formidable business domain expertise, Srivenkatesa embarked on a journey that required not just process re-engineering but also a massive change management initiative.

Selling SAPNot that change management was an easy thing to do with the deployment of this scale, the task at hand for Srivenkatesa was also to make people shift from paper registers to computers. However,

CASE STUDY | HOUSE OF PEARL FASHIONS LTD

Making ERP

CHALLENGE: House of Pearl Fashions DEPLOYED ERP to gain better control over its PROCESSES and USED IT as a fashion statement to ENSURE employees started using it.BY VARUN AGGARWAL

Fashionable

Page 29: Enterprise Sans Borders

29 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

CA S E S T U DY B E S T O F BR E E D

COMPANY DASHBOARD

COMPANY:HOUSE OF Pearl

Fashions Limited

REVENUES:

RS 1850 crore

HEADQUARTERS:

GURGAON, INDIA

EMPLOYEES: 10,000

better career opportunities and their market value would improve. That worked fairly well for us,” Srivenkatesa says.

Optimising Order Fulfillment ProcessesHouse of Pearl has been able to improve overall planning and forecasting to achieve greater cost and process effi-ciency. Centralised data collection has resulted in greater data integrity and accessibility to support strategic deci-sions and speedy monthly financial closings.

Perhaps the greatest gains have been through improved global supply chain management and collaboration. Before, with orders taken in the UK or the U.S. and the

M SRIVENKATESA, GROUP CIO, House of Pearl Fash-ions Ltd has been able to bring about transparency and efficiency in the entire supply chain process with SAP.

the biggest challenge for them was to ensure that busi-ness managers started using SAP.

For starters, the company went with an open stream approach wherein there were no checks (audit check, accounting check, compliance check etc) put into the sys-tem to see how the users responded to the system.

“We got a lukewarm response initially but we felt it was still better than what we would’ve had if we forced the sys-tem on people,” avers Srivenkatesa.

The company decided to go slow and took about two years to have the entire organisation use the solution.

“We ran an internal marketing campaign for SAP, creating positive vibes about SAP in the organisation. We also sent messages saying that people who started using it would have

Operations' Highlights 30 percent growth year-on-year brought its own challenges

ERP implementation reduced monthly book-closure cycle

time from 20–25 days to 10 days

Reduced order management lead time

Reduced inventory levels

Achieved greater supply chain efficiency and optimised

sourcing

Centralised operations data for enterprise wide consistency

Enhanced system performance to gain fast response times

Financial and Strategic Benefits Integrated enterprise-wide operations to improve planning

and forecasting and achieve greater cost and process

efficiencies

Increased internal control to ensure proper recording,

authorisation, and reporting of business transactions

Improved accuracy and access to operational data to

support strategic decisions

Gained real-time inventory visibility to optimise levels and

ensure delivery precision

Improved collaboration across supply chain to realise

optimal profit margins

corresponding goods purchased where they were most cost competitive, the processes were prone to gaps in communication or execution.

“Our distribution and logistics entities were entirely dependent on worksheets and manual follow-up at every stage,” Srivenkatesa says. “But orders can now be tracked in real time for better visibility and control. Plus, we’re electronically integrated with many of our U.S. customers to reduce our order management lead times.”

With SAP software, House of Pearl has gained a higher degree of adaptability so it can react more quickly to changes in demand and opportunities for growth.

[email protected]

Page 30: Enterprise Sans Borders

COVE R S TORY U N I F I E D COM M U N I CAT I O N

The coming together of superior UC technology and the need for businesses to be quick to grasp opportunities is set to transform the UC market in 2011. Early adopters are increasingly becoming borderless. By Minu Sirsalewala Agarwal

SANS BOR DERS

HE WORLD IS INCREASINGLY becoming flat, resulting in an agile workforce catering to a global market place. Today, for a company, located anywhere in the world, to reach out to any customer irrespective of his location is an imperative. While this is a huge challenge for enterprises, it is an even bigger opportunity.

Unified Communication (UC) has been playing a significant role in making this a reality. Today, UC has transitioned from being a pure communications platform to tools and applications to improve business processes and employee productivity. We have seen UC undergo some major changes to include new technologies that have helped bridge the

INSIDE33 | 2011: The defining year for Unified Communications

35 | From UC to Social Collaboration

38 | Case Study: Improving Efficiency

41 | UC as a Service

43 | Leading the Change

ENTERPRI SE

Page 31: Enterprise Sans Borders

U N I F I E D COM M U N I CAT I O N COVE R S TORY

31 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

SANS BOR DERSENTERPRI SE

IMA

GIN

G B

Y P

C A

NO

OP

Page 32: Enterprise Sans Borders

COVE R S TORY U N I F I E D COM M U N I CAT I O N

32 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

Moreover, this transformation can help them to create new business models, accel-erate decisions, increase productivity and innovation, and strengthen customer rela-tions. Over the long term, opportunities even exist to design entirely new businesses and approaches using mobility, which could include virtual manufacturing, virtual meetings, virtual logistics or new modes of operations, such as office-less businesses.

Employees are also realising the advantag-es of being able to connect and share infor-mation – regardless of time, location and device – based on their personal experiences with Web 2.0 technologies like Facebook, LinkedIn, and Wikis.

Frost & Sullivan also says that India has good potential for growth of UC applica-

communication gap further. From PBX systems to telepresence at your desktop, UC has slowly but surely assumed a quicker and more efficient avatar.

As UC applications became more preva-lent, organisations, of all sizes, were able to see, first-hand, the benefits that they could potentially derive from UC tools, prompting them to invest.

Gartner recently published its annual Magic Quadrant on UC for 2010. In the market over-view, the research firm notes, “The adoption of UC by enterprises continues to increase; however, actual penetration as a percentage of market, and, in some cases, usage rates across an enterprise, remain low.”

Getting the workforce to actually use UC tools is essential if companies are to reap

Enabling Strategic CommunicationEvery technology provider defines UC slightly differently. There are some provid-ers who include everything under telephony, including contact centres. Others define UC as a technology that is limited to desktops. On the one hand, business users today at any point touch multiple disruptive devices such as Blackberry, the i-Phone, i-Pad, and other smartphones.

On the other hand, with multiple users on Skype and various social networking sites, there is a very thin line between personal/ social life and professional life. This thin line too is fading rapidly as more and more interactions happen through Twitter and Facebook. There are some organisations that have integrated these applications into their systems.

In today's dynamic business environ-ment, perhaps the most important benefit will come from having a communications system that can change and grow at a moment's notice, enabling new capabilities for more effective business communica-tions, employee mobility, streamlining busi-ness processes, and improving profitability.

Larger enterprises that had deployed UC technology prior to the downturn have already seen its usefulness as it helped cut costs immensely. In turn, this feedback has had a huge impact on smaller organisations, influencing their decisions to implement it.

Key decision makers fundamentally want technology solutions that are not only cost effective but time effective as well. They are looking for technology that will make com-munication easy, fast and efficient. Reach-ing out to a subject matter expert or even a panel of experts based across the country should be a simple task and collaboration between teams and companies separated by geographical borders must be a constant and seamless activity. That said, multimedia conferencing and collaborative tools such as WebEx and TelePresence have experienced terrific demand from CIOs.

There has been a change in demand. IP phones are being complemented by con-ferencing solutions and enterprise social software. CIOs are veering to the idea that enhancing inter and intra company com-munication can be brought about by deploy-ing an entire UC framework rather a few select solutions.

rganisations are looking at connecting the external world into the enterprise network securely. This is a challenge which is faced by the CIOs of the country today.

the ‘soft’ benefits of increased collaboration and productivity and realise ‘hard’ metrics such as cost savings.

India AheadIn 2009, when it came to adopting UC and collaboration among companies, India saw the highest earnings in terms of 'return on collaboration' investment. According to a 2010 Frost & Sullivan study, currently, India leads the SAARC region's UC market in terms of total spending and better overall awareness of UC.

Indian companies are realising that transformation into a collaborative, border-less enterprise will allow them to harness the efforts and collective wisdom of indi-viduals across and outside the organisa-tion. This is the single biggest reason driv-ing UC demand.

tions as demonstrated by the projected CAGR of 7.9 percent in the period from 2008 to 2015. It is clear that there is a huge market waiting out there to be tapped and companies are focused on addressing it. To effectively tap this segment, it is important that vendors develop customised solutions, which offer a cost-effective and easy to deploy alternative.

Organisations are looking at connecting the external world into the enterprise net-work securely.

This is a challenge which is faced by the CIOs of the country today. So with these changes, UC has to be implemented across all technologies and across all devices. It cannot be limited to the desktop or mobile, it has to be on every interface that a user touches.

Page 33: Enterprise Sans Borders

U N I F I E D COM M U N I CAT I O N COVE R S TORY

33 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

ocial Communications and Collaboration and Video are among the top 10 strategic

technologies for 2011, according to research and analyst firm Gartner. On the other hand, International Data Corporation (IDC) also views Unified Communications (UC) moving into a critical phase in 2011 where there needs to be more overall awareness and understanding — and customer hand-holding if necessary — around real-world UC applications, deployments, and success stories — proof points for validating UC's effectiveness. It's prime time for UC exper-tise to develop and propel to a level that matches the considerable amount of tech-nology that is available.

As a matter of fact, the usage of unified communication and collaboration tools has been significantly growing in India. With justified Return on Investment (ROI) and direct saving on costs, there is a strong belief that companies will increase their budgets toward video conferencing, instant messaging and other collaboration tools in the future.

With this as a background, CTO Forum conducted a survey to understand the adoption of unified communications and collaboration in India. We surveyed the CIOs from mid-sized and large enterprises on their current preparedness, usage and future plans. Nearly 110 CIOs from across

2011: THE DEFINING YEAR FOR UNIFIED COMMUNICATIONS

Status of Current Collaboration Infrastructure

Usage of Telepresence

Web-based tools including IP telephony

18%

voice – using wire lines

25%video – via the Internet

22%

videoconferencing – using phone lines and

television monitors

28%

voice, video and data via telepresence

7%

Internal collaboration

21%

Appraisals 9%

Recruitments 17%Training 17%

Products rollouts

10%

Executive management meetings

25%Others 1%

In 2011, UC will be entering into a critical phase where there would be a greater need for overall awareness and understanding on it.

Page 34: Enterprise Sans Borders

COVE R S TORY U N I F I E D COM M U N I CAT I O N

34 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

the industry spectrum filled in the full sur-vey. The survey was targeted at measuring the corporate awareness, level of current usage and assessment of the future inten-tions within organisations who intend to use the UCC tools.

According to the CTO Forum survey on the Opportunities and Challenges in Uni-fied Communications, 35 percent of the respondents said they were already using video conferencing with the help of phone lines, television monitors or through tele-presence. Another 22 percent respondents were using video over the Internet. The remaining 43 percent respondents leverage either Web-based tools including IP tele-phony or plain wire-line voice telephony for their communication needs.

Telepresence, which is slowly gain-ing momentum in India, was found to be used for various purposes in Indian organisations. 25 percent of the corpo-rates using telepresence do so for execu-tive meetings, while 21 percent also use it for internal communications. The other usages of telepresence were found to be for appraisals, recruitment, training and even product rollouts.

When asked what were the key drivers for adopting Unified Communications, we got a variety of responses. While 16 percent of the respondents were found to be using UC to reduce travel costs, another 16 per-cent used it for enhancing productivity. Yet another 16 percent respondents have adopt-ed UC to improve collaboration with both internal and external customers. Twelve percent of the respondents also believe that UC helps in improving decision-making in the organisation.

There are however, many obstacles that lay ahead in the widespread UC adoption in the country. The biggest challenges still remains the management buy-in, with 28 percent respondents facing this problem. Lack of knowledge about the best UC solu-tions and vendors also came out as a big hinderance as 36 percent of respondents are still looking forward to deploying UC this year. Among those who have already deployed UC, 18 percent are planning to migrate to high-definition and 14 percent want to deploy UC on the desktop.

—A CTO Forum-Polycom Initiative

Reasons for adopting UC

Biggest Obstacles to UC deployment

Vision for UC 2011

Cuts Travel

16%

Improves collaboration

16%

Improves productivity

16%

Quicker access to information

11%

Better response

9%

Improves decision-making

12% Improves work/life balance

10%

Earth-friendly practice

9%

Other 1%

Getting management buy-in

28%

Getting end-user buy-in

16%

Lack of technical knowl-edge about the best UC

solutions/vendors

22%

Finding the money for it

24%

Security

10%

Upgrade room(s)

8%

Add rooms

6%

Migrate to hi-definition

18%

Move to desktop

14%

Implement unified communication

36%

No specific plans

18%

Page 35: Enterprise Sans Borders

35 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

We’re social animals, after all. The future success of businesses may depend on the degree to which they recognise, accept, and enable this, so people can be, well people. That’s the way UC is headed and there seems to be no stopping it. By Minu Sirsalewala Agarwal

FROM UC TO SOCIAL COLLABORATION

S ORGANISATIONS BECOME more diverse in business applications, acquisitions and mergers become more common and multi-national workforces become the norm, decision makers are looking for ways to make communication as easy as possible for everyone.

An important focus area for many organisations is how to mobilise their employees in a way that allows them to work efficiently wherever they are.

UC has become the most important ‘must have’ in any organisation and users expect to get one solution that collaborates everything on the same platform, email, slide presentations, file sharing and so on, along with the video conferencing facilities.

Page 36: Enterprise Sans Borders

COVE R S TORY U N I F I E D COM M U N I CAT I O N

36 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

Most companies’ communications framework is synonymous with UC and it is important that a successful conversion is made possible. As given in any implementation, understanding of the requirement, doing right sizing, and proper project planning and migration plan to ensure a zero downtime is the way to go.

UC is a journey and cannot be deployed 100 percent on day one, it is a stepwise process. Every IT organisation faces the need for more hi-tech deployments each year. Ideally, the first step would be to cut down the cost by unifying all the offices, bringing everyone onto the same platform, centralised management, centralised con-ferencing, and centralised video conferencing.

Enterprise decision makers should be wary of a UC plan that does not provide specific and actionable strategies for end-user adoption. Enterprises and UC vendors need to treat the end user like a consumer rather than attempting to control their collaboration tools and devices.

For some enterprises, the idea of user-owned devices may seem impractical and even daunting. That doesn’t mean end users and their preferences can be ignored. The way would be to start with small training and follow-up sessions coupled with marketing the new tools through internal communications and evangelising within the organisation.

IT groups of most enterprises today have implemented UC to some extent in the form of integration of PBX systems (especially voice mail) with email and calendar. Enterprises in advanced stages of UC have integrated other channels of communication such as instant messaging, combined with support for audio and video and desktop-sharing for collaboration to enhance the UC experience. Though still in nascent stages, Communications-Enabled Business Process (CEBP) is getting introduced into enterprises. It involves traditional enterprise work-flows getting integrated with enterprise communication systems to simplify the progress of such work-flows.

More VideoWith the emergence of the Internet and the evolution of network-centric business practices, many companies had turned to mul-timedia conferencing; others embraced applications that allowed

groups to share documents and collaborate on projects in real time. Now, some companies, including a growing number of small and medium-sized businesses (SMBs), are combining these capa-bilities to create virtual meetings.

About 50 percent of the traffic on the Internet comprises videos, reflecting the importance of video to UC. The next slew of enterprise gadgets will use videos as a form of communication as it allows the transfer of information in real time and in a way it is cost effective. Reaching out to a subject matter expert or even a panel of experts based across the country will become easier with the use of video-enabled endpoints and will allow teams and companies separated by geographical borders to communicate with the push of a single button.

Additionally, the availability of 3G definitely opens up new roads for technologies and applications owing to the greater bandwidth available, as well as faster data transfer.

More Smart DevicesIf you see the evolution of the whole piece then the disruption first happened because of the Internet. The next high-end disruption that markets are seeing is the proliferation of smart devices in the enterprise network. There is a significant traction in the usage of mid and low-range devices in the enterprise space. Indian enter-prises being price sensitive will see faster adoption at the mid-level range and the penetration of the high-end smart devices will be limited to a select circle of employees.

The new generation of employees is already fast adopting these tools and devices. With the end users opting for do-not-call options, the other channel that is attractive is social networking.

The increased use of mobile phones in the enterprise can be attributed to the affordability and availability of smartphones, rea-sonable tariffs, convenience and ease of use, ubiquitous data cover-age and the personal flavour added to communication.

Mobile UC focuses on tighter integration of mobile phones with Enterprise applications such as email, address books and calen-dar as well as bringing in additional messaging channels such as SMS/MMS to improve employee productivity. Many Enterprises have deployed Mobile UC to some extent.

obile UC focuses on tighter integration of mobile phones with Enterprise applications such as email, address books and calendar as well as bringing in additional messaging channels such as SMS/MMS to improve employee productivity.

Page 37: Enterprise Sans Borders

U N I F I E D COM M U N I CAT I O N COVE R S TORY

37 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

As a result of the pro-liferation of smartphones people are more active on social networking sites. Increasingly the compa-nies are integrating social networking into their CRM network, so that the sys-tem filters all the relevant tweets, for instance, and comments on the social networking site into their CRM network. Research shows that on 5-7 percent of the tweets are relevant to the company; this helps the companies to even take immediate action on the tweets from the customers. This helps the company cre-ate a ‘wow’ factor, because they can take instant action on complaints and give information to their cus-tomers immediately. This also helps in reaching out proactively to the custom-ers who have otherwise not

Social Animals, After AllCollaboration technologies (UC, videoconferencing, Web 2.0 applications) and mobility solutions (solu-tions that enable users to access the network irrespective of his/her loca-tion, solutions for mobile workforces) will be the areas of focus.

In addition, UC and its component technologies are speeding-up business-es on their path to going green while reducing carbon-heavy overheads.

Enterprise Social Soft-ware is another area generating great interest amongst corporate IT planners/decision makers. According to Cisco’s Col-laboration Nations 2010 report, 60 percent of the users surveyed, admitted to ignoring the companies’ social media policies at

Smart ‘enterprise collaboration’ vendors will provide following capabilities off their platforms:

1 Ability to extend and consume functionality across different media, publishing and user interfaces

2 Ability to seamlessly integrate with enterprise infrastructure to enable organisations manage enterprise security, applications and administration

3 Reporting and Analytics capabilities, which will enhance the value of the social actions, conversations, transactions, content and networks that gets generated out of the usage of the collaboration platform

In the true sense of collaboration, many enterprise business software vendors are likely to partner with, and acquire other relevant technology to leverage the complementing collaboration features and provide richer solution and business value to the businesses and end-users.

The Take Offs

approached the company directly.Today with these social networking sites the challenge is that one

negative tweet about the product/service of the company results in millions of other tweets which result in forming an opinion about the company.

Faster DecisionsTake the example of supply chain: most of the companies follow just-in-time approach so as to reduce their inventory cost. Howev-er, if there is non-availability of a critical raw material, production could stop.

Today most of the companies have ERP and SCM but the action on a particular situation is taken by people. All the delays that gen-erally happen are because of the human latency. If an alert is not addressed on time, the entire cycle gets delayed.

There are now solutions that trigger a communication exigency. Once the trigger comes in from the backend ERP, it can start new alerts bringing in all the right stakeholders and the people responsible to take the decision on to a conference call across devices. This will enable them to discuss the situation and take immediate action.

People can even follow up and reply to the case by either pressing 'yes' or 'no' on their devices. This reduces hours of decision making process to minutes. Every company has an emergency group thattakes action at the time of crisis. It is important to get this group activated at the time of exigency and take necessary steps.

least once a day while close to 20 percent claimed that they ignore these policies multiple times a day.

ESS is not a replacement for publicly available Social Network-ing tools. It attempts to use the concept of social media to improve productivity at work. Some reasons why this software is in demand is because the need for socially-driven collaboration has increased. Virtual teams and communities can quickly share ideas through blogs and wikis, schedule meetings and enable IM, voice, and video communication.

Collaboration has evolved from its 1.0 ways of being a point of one-way conversation and communication to 2.0 which is a more comprehensive, integrated and multi-way approach to community collaboration to providing real business benefits for organisations and communities.

The difficulty with 1.0 is that it has limited visibility or empow-erment for general users, is hardly discoverable, and provides no means to extend the functionality. On the other hand, 2.0 tools and techniques have emerged as platforms of the people, for the people, by the people.

[email protected]

Page 38: Enterprise Sans Borders

COVE R S TORY U N I F I E D COM M U N I CAT I O N

38 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

IMPROVING EFFICIENCY

CASE STUDY | ESSAR GROUP

N Jayanta Prabhu, Essar Group’s Head of IT Infrastructure and Technology, decided to deploy a centralised communication platform in Essar. He brought in standardisation, optimised

costs, and ensured users got seamless communication, be they iPhone lovers or Blackberry addicts. By Minu Sirsalewala Agarwal

SSAR GROUP, the $24 billion telecommunications -to-oil conglomerate, has aggressive expansion plans, with one group company Aegis alone making an average of five acquisitions every 12 months in the last three financial years.

Consolidation of IT infrastructure, then, was a given. N. Jayantha Prabhu, Head IT Infrastructure and Technology at the group is overseeing the consolidation of the company’s IT infrastructure, a process that started close to four years back, and includes putting in place a state-of-the-art communications infrastructure.

“From $5 billion five years back, we’ve grown almost five fold to $24 billion,” Prabhu points out. “I do not want to maintain multiple set ups.”

What Prabhu and his team were looking for was a communications solution that would allow them to exploit all the tools of modern unified communication.

COMPANY DASHBOARD

COMPANY:ESSAR GROUP REVENUES:$24 BILLION HEAD QUARTERS:MUMBAI, INDIA EMPLOYEES: 70,000

SECTORS: OIL, POWER, Communications, Minerals, Shipping & Logistics

Page 39: Enterprise Sans Borders

U N I F I E D COM M U N I CAT I O N COVE R S TORY

39 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

At the same time the platform had to be amenable to integration of disparate legacy systems so that they could be managed from one centralised location.

Needed: A Cost-Efficient SolutionIt all began with Essar incurring high costs for communications between employees located across different facilities globally. That Essar had multiple IT locations man-aging different systems was another factor influencing the decision to consolidate as Essar expanded.

Employee travel was on the rise and con-sidering the economically challenging global environment, Essar was keen to cut expendi-ture. The need was a cost-effective and effi-cient solution that would reduce travel.

The acquisitions naturally brought in disparate systems and the attendant growth-

related challenges: multiple locations in multiple countries with little standardisa-tion. Communication was becoming dif-ficult, and cost was becoming a problem — not just operational cost, but also that of management and technology maintenance.

On the communications front, Prabhu and his team were looking at centralising their operations with common facilities such as audio and video conferencing, voice mail, and VOIP.

Integrated SolutionUsing technology from Avaya, the chosen communications platform provider, “We deployed applications for conferencing, centralised management and mobility,” Prabhu said.

Prabhu’s team, was already familiar with an earlier Avaya platform — CM 3. They

then had the option of upgrading it to a newer version, CM5, and extend the func-tionality to all the users. Instead of upgrad-ing existing set ups, what Prabhu decided was to procure a telephonic exchange from the vendor and integrate both CM3 and CM5. “This has been done in India for the first time,” he said.

Essar is following a phased approach to implement and deploy the hardware and the applications across its various sites. As of now, a Session Manager and other compo-nents are being deployed.

The deployment allows Essar to exploit the advantages of open standards: The platform is “reliable, scalable and secure, and enabled Essar Group to further save on communications costs,” Prabhu says. It has allowed Essar to put in place a single, integrated dial-plan across the organisation;

Page 40: Enterprise Sans Borders

COVE R S TORY U N I F I E D COM M U N I CAT I O N

40 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

the session manager facilitates centralised routing with smarter on-net calling.

Communication infrastructure man-agement costs are coming down, as the deployment rolls out across the group, with enterprise-wide architecture and centralised management. Essar has been able to retain existing communication features, while consolidating and centralis-ing applications such as messaging and conferencing.

Huge BenefitThe benefits for the group are both qualita-tive and quantitative. On the qualitative side – there is easy access to all, anybody can contact any location through VOIP. Essar has configured conference bridges for both audio and video meetings.

A mobility application allows anybody in Essar Group to login within their network and have a conference call. Essar was ear-lier paying to a private service provider to access this service, so the rates they were paying were much higher. The in-house conferencing solution has significantly pared this cost.

The integrated, centrally managed com-munication platform has simplified Essar’s complex communications networks, reduced infrastructure costs and facilitated quick delivery of new voice, video, mes-saging, presence, and web applications to employees everywhere.

Services such as Netcalling, and applica-tions such as Voice Mail, Conferencing, and any third-party applications can be rolled out across sites using sequencing from one data centre. There is now Centralised Management, Centralised Voice Mail, and Centralised Audio Conferencing.

The Session Manager allows for sites to be added at a later stage as and when required. The Session Manager signifi-cantly reduces inter-office communication costs by utilising SIP and enabling CUG calling. Additional features such as audio conferencing facility for the entire group within the CUG network through the Cen-tralized Meeting Exchange also delivers further savings.

“It is a huge benefit for me,” Prabhu says. “Also the usage of any device; for example I can use an iPad and all the col-laboration tools and at the same time can

RESULTSREDUCED COSTS. The Avaya solution has cut costs on employee travel by providing a more robust communications platform. In addition, the IP-based voice solution allowed “free of cost” STD and ISD calls leading to savings of up to Rs. 12 Lakhs per month.IMPROVED PRODUCTIVITY AND EFFICIENCY. The Avaya solution has enabled enhanced collaboration when resolving issues between IT teams across various locations. The solution also provided enhanced mobility to employees at a manageable cost. As a result, there is an increase in produc-tivity, and significant reduction in employee downtime. In addition, clients are able to reach employees easily thereby avoiding business disruptions.MORE PERSONAL INTERACTION. Through the Avaya solution, Essar achieved more personal interaction with employees at all locations for prob-lem resolution without increased communication costs.LOWER OWNERSHIP COSTS. Avaya IP phones support both SIP and H.323 communication protocols to enable standardization on a single client for the entire workforce.REDUCED NEED FOR TRAINING. Avaya products deliver a consistent, easy-to-use interface across multiple platforms so employees can stay updated without expensive training sessions.EXPAND AND EXTEND ESSAR’S VOICE NETWORK. This was done using the existing communications infrastructure with minimal incremental investment.

MORE BANG FOR THE BUCKINVESTMENTRs 5-10 crores in recent locations in Mumbai. Planning another RS 10-15 CRORES WITHIN NEXT ONE TO TWO YEARS.

ROIAt Hazira plant, COMMUNICATION BILL WAS AROUND RS 10 LAKH PER MONTH. Now it has come down to 2 lakh after implementing VOIP.

SOURCE: ESSAR

extend it to BlackBerry or any other device seamlessly.” This open architecture with the corresponding flexibility is benefitting the entire group, he says.

Roadmap “We have prepared a roadmap and based on that roadmap we are operating exist-ing set ups and at some places we are replacing existing telecom exchange with Avaya,” Prabhu says. Essar is using Flare POC now. “They have given us a few POC equipments on Flare, the smartphone. We have already successfully tested a POC in

our environment. Now we have ordered 25 Flare equipments.”

The plan is to integrate Essar’s SAP CRM with the Avaya platform.

“The integration is already going on. They want to bring all the SAP, internet and all the backend access through that on Flare,” Prabhu explains.

The roadmap also includes the creation of a DR strategy for the existing communica-tions platform.

[email protected]

Page 41: Enterprise Sans Borders

41 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

As companies put the impact of the recent financial crises behind them, UC adoption is expected to increase significantly. More companies may consider the purchase of UC as a service or as a hosted solution as a future option. By Minu Sirsalewala Agarwal

UC AS A SERVICE

DOPTION OF UC IS DEPENDENT on companies training their users on the use of this technology and for decision-makers to quantify its benefits. While market growth is improving, newer cloud service offerings may be a significant fac-tor in its longer term success.

UCaaS has also radically altered some equations—as a hosted, managed, and utility or usage-based offering, UCaaS can remove the barrier of up front expens-

es and greatly improve the bias for action within the CIO’s office. Offered on a per-seat basis, UCaaS can include a standard suite of UC feature sets as part of the monthly seat cost. Typically, these capabilities can include presence

Page 42: Enterprise Sans Borders

COVE R S TORY U N I F I E D COM M U N I CAT I O N

42 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

Buyers are very interested in UC; new solutions that solve business problems are being delivered; and interoperability in its many varieties is on every vendor’s agenda. This, together with new busi-ness and delivery models that rapidly deliver UC capabilities and benefits, positions the market for rapid accelera-tion by 2012. The first movers will be in industries

that value the speed of information-based business processes; for example, business services and healthcare. IT professionals charged with UC initiatives today generally believe that UC will be part of their standard operating environ-

ment over a five-year deployment cycle. These same professionals are looking for the internal workgroups and roles (for example, sales forces and R&D teams will be early adopters) that will realise the highest value from faster, more col-laborative business processes that can prove the case for UC once and for all within their companies. Vendors will be able to use buyer

interest in cloud (particularly private cloud) deployment models to increase consideration of UCaaS — but will have to deliver communications and collabo-ration capabilities that can interoperate with on-premises solutions like direc-

tory or security. Buyers want to deal with fewer vendors and service provid-ers in all areas; therefore, vendors will recruit and/or develop channels (either sole providers or those that can lead a consortium of systems integrators (SIs), value-added resellers (VARs) and service providers (SPs) that can deliver the full gamut of ICT capabilities. Those ecosys-tems of vendors and channels that can-not fulfill a broader set of requirements in a tightly coupled hybrid deployment will risk losing a competitive edge to those who do.SOURCE: FORRESTER

management, soft phones, single number reach, unified messaging, conferencing, and the necessary communications and messaging hardware to support the offer. Since these capabilities are provided in the cloud, consistent service experience and business continuity are intrinsic. In short, UCaaS provides UC capability via a cloud-based, standardised, and predictable model of cost and delivery.

UC for SMBsNot just large global enterprises, organisations of every size are turn-ing to UC—inside and outside their companies.

Currently, adoption in the mid-market segment is seen to have increased and is growing rapidly. The SMB-potential for UC is tre-mendous as UC offerings span across budgets and requirements. The bouquet of UC offerings, currently available in the market, is so versatile that any organisation, large, medium or small, can find technology that best suits both its needs and budget.

"Not just for large global enterprises, organizations of every size are turning to unified communications—inside and outside their compa-nies." articulates Neeraj Gill, MD , India & SAARC, Polycom.

According to a NASSCOM report, approximately 50-60 per cent of IT expenditure in the country is expected to come from the flourish-ing SMB segment. There is also a huge potential in small towns for UC as it is currently an untapped market. As companies get more glo-balised UC will be more in demand. More and more SMBs are now adopting UC because of the many benefits that it can offer.

Not Quite There Yet One of the major limitations in the Indian market is the govern-ment regulation on PSTN and VoIP interconnection, which limits the full potential of an IP telephony system.

UC IN 2012

Interoperability is yet another issue that needs to be resolved. Not all phones, soft phones, gateways, call managers are interoperable as they support some proprietary variant of a standard protocol. This limits enterprises from a free mix and match of components.

The usage of open standards can tackle this issue. Many suppli-ers have developed products that support open standards such as the Session Initiation Protocol (SIP). SIP not only allows for VoIP communication but also supports video, fax, presence and instant messaging. Open standards are important because they provide a foundation that can be built upon.

One common problem faced in the deployment of enterprise UC applications is often the kind of bandwidth available for use within the office space. While we have definitely seen the digital divide reduce, we still have a long way to go. A 2 mbps connection, for a year, continues to be quite expensive, prompting many organisa-tions to opt for connectivity of poor quality. This, sometimes, affects the performance of enterprise technologies and tools and does not leverage the true capabilities of the application in question.

Often when an organisation considers change that impacts every employee, such as an enterprise-wide IP telephony implementation, the process tends to focus on hardware, software, and getting the technology up to speed as quickly as possible. However, a company's infrastructure is also composed of people. Resistance to change is normal and should always be anticipated.

Page 43: Enterprise Sans Borders

43 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

In the 10 months since ANDREW MILLER took over as the CEO of Polycom, he has been leading the company from the front. In conversation with Yashvendra Singh and Rahul Neel Mani, Miller talks about the metamorphosis undergoing in the unified communications market, and how Polycom is addressing it.

LEADING THE CHANGE

Page 44: Enterprise Sans Borders

44 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

How is the overall enterprise communication and collaboration

space changing? There are lots of exciting changes and strong growth drivers that are propelling the market for unified communications (UC). First, we see an expanding market for UC both within and beyond the enterprise to SMB, mobile and consumer applications. This growth is driven by three factors: adop-tion of open standards and integration into best-of-breed UC solutions like Microsoft Lync; accessibility of telepresence solutions ranging from consumers and the mobile market to SMBs, enterprises and service providers; and the widespread availability of cost-effective bandwidth.

Second, the underlying business drivers for UC are increasing as more businesses of all sizes are operating globally and look-ing for ways to improve communication and collaboration across locations and time zones to accelerate decision making and time to market, and to lower operation costs and better leverage existing resources.

The market for Unified communica-tions has immense potential. According to a Frost & Sullivan research study in 2009, the APAC market size of video conference-infrastructure is around 330-350 million dollars, of which, India’s contribution is around 9%. But, by 2015 this industry is expected to reach around 850- 900 million dollars and the growth in India is expected to be 15%.

You have been leading Polycom's Open Collaboration Network initia-

tive. How has the progress been so far? The Polycom Open Collaboration Network (POCN) is a key strategy for Polycom that provides significant value for our custom-ers. By working with leading unified com-munications platform providers, Polycom is able to deliver its productivity-enhancing and cost-saving telepresence, video and voice collaboration products as an inte-grated part of core unified communication environments, making the technologies easily accessible as part of the everyday workflow within a comprehensive solution that is easy to deploy and manage. Our stra-tegic Polycom Open Collaboration Network partners include Microsoft, Avaya, Broad-Soft, HP, McAfee, IBM, Juniper Networks

and Siemens. Through this initiative, our customers can stay assured their solutions continue to interoperate in a best-in-class environment, rather than being tied to one particular vendor.

2010 was the year when you believed in "sell-through

philosophy" where the service provider sells and fulfills services to customers. Will this strategy continue in 2011 too?It will definitely continue. In fact, we think 2011 and moving into 2012 will be when the service provider market for UC really gains momentum. One of Polycom’s key strategies is to enable the next generation of cloud-based services in conjunction with our service provider partners. We will do this by powering service provider networks through the Polycom UC Intelligent Core infrastructure platform, and by bringing together partners around standards and open interoperability to drive a network effect for customers.

How is Polycom enabling the service provider channel to host and

manage services for end users? In India, Polycom has a 2-tier distribution structure. There are 3 distributors and 50+ channel partners. By first quarter of 2011, Polycom will be launching ‘Polycom

Choice Programme’ for defining its chan-nel partners, their certification and grow-ing their reach.

To enable service providers to deliver UC services reliably, cost-effectively and with a differentiated experience, Polycom is build-ing the most scalable and robust platform to deliver these services through the Polycom UC Intelligent Core.

How do you see consolidation in the industry affecting technology

advancement? Consolidation is happening, but Polycom is winning in the market, because we remain focused on delivering greater customer value, flexibility and investment protection. Polycom believes it is critical to continue to innovate in a standards-based way and to provide seamless UC integration through our POCN partners, while also solving the interoperability challenges for our custom-ers by connecting the islands of commu-nications that exist between enterprise, mobile and consumer applications.

This is also proven through Polycom’s commitment to UCEverywhere, a strategy for seamlessly connecting communications across the continuum of consumer, mobil-ity, SMB (small to medium businesses) and the enterprise, regardless of platform or net-work. These same innovations enable ser-

Page 45: Enterprise Sans Borders

U N I F I E D COM M U N I CAT I O N COVE R S TORY

45 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

vice providers to deploy open cloud-based UC telepresence services, giving customers the capability to communicate outside their organisations and across their supply chain to suppliers, partners and customers.

While yourn ‘UC Everywhere’ strategy includes a cloud computing

solution, there are issues such as end-point equipment installation, training, lighting and sound, and operating procedures in migrating video conferencing to the cloud. What is your take on it?There is no doubt in my mind that real-time communications in the cloud is coming and will drive broader adoption, because it solves many of the issues limiting adop-tion today that we have discussed previ-ously. However, you question is a good one. Regarding equipment installation, the barri-ers for businesses today is not actually plug-ging in the cameras and codecs, it is making sure they systems can easily connect across the network and between firewalls. The cloud will solve these issues. Areas like training, specialised lighting and sound, etc. provide a great opportunity for value-added services through service providers and chan-nel partners.

One example is BT, which has created ref-erence architectures to give customers the

assurance that Microsoft and Polycom tech-nologies will be deployed and managed in solutions that not only consider the server and software platform, but also at the full network impact and utilization.

Telepresence adoption in India seems to be quite far. What is your

strategy to push its growth? Yes. Polycom believes there will be several major factors driving growth of telepresence. Polycom is helping to enable the cloud-based services that will simplify how customers purchase and use visual communications technologies like telepresence and make it easier to extend video use across business, mobile and consumer applications.

Regionally, there are two key areas that need to align so that you see growth, namely broadband infrastructure deployments and then industries see the bottom benefits of adopting the telepresence solutions.

Firstly the India government is very committed to the deployment of high-speed networks both wireless and fixed broadband across the breadth of India, this then becomes the foundation to build from and we are working closely with them on this initiative.

Next, we have aligned with a number of key channel partners in India which include

leading telecommunications player. Togeth-er with these channel partners and our PCON partners, we are developing innova-tive solutions for many end user customers especially in the verticals of Government, Healthcare and Education.

But why is the market still reaching out for closed technologies as

opposed to open, standards-based ones?The market is undergoing a sort of meta-morphosis. We are seeing tremendous traction for open and interoperable tech-nologies. Enterprises are realising multiple benefits by choosing open platforms based technologies. There is also confusion in the market, some of it propagated by other vendors, about the current state of interop-erability. For example, we hear from Cisco Telepresence customers all the time that were promised interoperability, but find themselves locked behind proprietary walls. It is this customer demand that led us to support Cisco TIP on our infrastructure platform. We are breaking these customers out of the proprietary walls and providing a way to leverage their existing systems, but scale their network with standards-based solutions moving forward.

UC’s full IP-based approach can introduce reliability, security and

regulatory issues that are frightening to certain industries such as healthcare, for instance. What is the way ahead?On the Healthcare front, organisations face challenges mainly in three areas; deliver-ing quality patient care, streamlining care delivery processes, and improving busi-ness processes. These challenges are com-pounded by an environment with many time-dependent critical processes, multiple modes of communication, and many mobile caregivers and other workers with widely varying availability throughout the day. Polycom offers a portfolio of end-to-end, scalable, secure, Unified Collaborative solutions, which increases productivity of healthcare professionals, are used exten-sively for training of hospital staff, can extend patient care and expertise to remote areas, and also improve patient care with mobility solutions.

“There is no doubt in my mind that real-time communications in the cloud is coming and will drive broader adoption”

Page 46: Enterprise Sans Borders

NEXTHORIZONS

46 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

BARCLAY BLAIR SAYS

Success in IG requires funda-mental changes to the way that companies think about infor-mation and how they should manage it. This means that IG,

more than anything, is a change manage-ment exercise. And change management requires powerful simple messages to drive it. That's what I hope to provide here and in my next few columns.

Reason 1: We can't keep everything forever  "Information workers, who comprise about 63 percent of the U.S. work force, are each bombarded with 1.6 gigabytes of information on average every day through emails, reports, blogs, text messages, calls and more." — "Don't You Dare Email This Story," Wall Street Journal.

IG makes sense because it enables organi-sations to get rid of unnecessary informa-tion in a defensible manner. Organisations need a sensible way to dispose of informa-tion in order to reduce the cost and com-plexity of IT environment. Having unneces-sary information around only makes it more difficult and expensive to harness informa-tion that has value.

There is just too much information now to manage without a plan. BY BARCLAY BLAIR

Case for Information Governance

“It is not uncommon to find that 30 percent or more of the data we collect from clients is duplicate information.”

Page 47: Enterprise Sans Borders

47 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

I N F O R M AT I O N G OVE RN A N CE N E X T H OR I ZO N S

Most statistics on the volume of digital information organisations create contain numbers so large that they are hard to comprehend (for example, "the digital uni-verse" is estimated by IDC at 281 exabytes in size or 1 EB = 1,000,000,000,000,000,000 = 1 million terabytes = 1 billion gigabytes). Organisations experience 30, 50, or even 100 percent annual growth in the volume of information they store. And the trend doesn't seem to be slowing down.

Although the cost of storage hardware continues to drop, storage hardware costs are just the beginning. According to IDC, the total cost of storage ownership "far outweighs the initial purchase price" of the hardware, and includes factors such as migration, outage, performance, informa-tion governance, environmental, data pro-tection, maintenance, and staff costs.

Organisations often claim that they are just keeping a piece of information "for now." Without a firm plan in place, this really means "keeping it forever." After all, unless you plan on keeping a piece of information forever, you will need to make a destruction decision about it at some point.

Will that destruction decision be easier or more difficult in the future? After all, in three, five, or ten years will:

IG, with its legal and compliance founda-tions, provides a defensible approach to disposing off unnecessary information. The combination of good policies around reten-tion of information during normal business operations and preservation of information during legal holds and litigation or regulato-ry investigation protects your organisation.

It's important to note that the law doesn't require us to keep everything forever, but only IG provides a defensible framework to help us get rid of the information we don't want and aren't required to keep.

Reason 2: We can't throw everything away "Ensuring the right information is available to users when needed is regarded as the highest business priority for large com-panies. And the vast majority of decision-makers believe that an effective information strategy has a very significant impact on this top business goal." — "Managing Informa-tion: Research Study on Customer Priorities and Challenges," RONIN Corporation.

IG makes sense because organisations can't keep every-thing forever, nor can they throw everything away. We need the right information, in the right place, at the right time. Only IG provides the framework to make good decisions about what infor-mation to keep.

If we could throw away every piece of information created and received in our institutions whenever we wanted to, there would be little need for IG. The reality, of course, is much different. Information is how we do business and, to a greater degree each year, business success is influenced by how well we manage that information. Although most information is created by individuals, enterprises are responsible for the security, privacy, reliability, and compliance of most of the information these individuals create. This is the role of IG.

Some information we keep because of its business value. Some we keep because of legal requirements. By some calculations, there are thousands of laws and regula-

tions in the U.S. alone that speak to the way organisations must manage their informa-tion. The role of IG is to parse those laws and regulations into practical policies and retention schedules that guide the organisa-tion on its proper management.

Without an IG program, organisations are at risk of breaking the law. Certain external events, such as litigation or a regulatory investigations, also create special legal requirements for the management of infor-mation. In these situations, even informa-tion that could normally be thrown away has to be preserved and properly managed. Failure to do so opens an organisation and its employees up to serious criminal and civil penalties, such as those spelled out in

Section 802 of Sarbanes Oxley: "Whoever knowingly

destroy[s] any record, document, or tangible object with the intent to impede, obstruct, or influ-ence the investigation or proper administration of any matter shall be fined under this title, imprisoned not more than 20 years, or both.

We can't throw everything away. We need some way to

determine which information has value either because of business goals or legal requirements. IG helps us with this.

Reason 3: E-Discovery  "It costs about 20 cents to buy 1GB of storage, however, it costs around $3500 to review 1 GB of storage."- AIIM Internation-al Email Management ROI Calculator

IG makes sense because it reduces the cost and pain of legal discovery, now referred to as ediscovery since most infor-mation is stored electronically. Proactively managing information reduces the volume of information subject to ediscovery and

simplifies the task of finding and producing responsive information.

In the past five years, ediscovery has evolved from a specialised legal issue into a disruptive force in the business, IT, legal, and information management realms. This transformation was kicked off in the U.S. by the 2006 amendments to the Federal Rules of Civil Procedure, and fueled by years of inattention to information management at many organisations, which had allowed vast stockpiles of unnecessary email, docu-ments, and databases to accumulate.

Today, organisations can expect to spend millions of dollars finding, processing, and producing responsive digital information in the course of a major lawsuit. According

62%GROWTH

OF DIGITAL

UNIVERSE IN 2010,

ACCORDING TO

IDC

Information Governance, with its legal and compliance foundations, provides a defensible approach to disposing off unnecessary information.

Page 48: Enterprise Sans Borders

N E X T H OR I ZO N S I N F O R M AT I O N G OVE RN A N CE

to Fullbright and Jaworski LLP, one in five large organisations spends more than $10 million each year on litigation (exclud-ing settlements and judgments). By 2011, it is expected that organisations will spend nearly $5 billion annually on ediscov-ery tools, according to Forrester.

The expense of ediscovery comes from many sources, but one of the most significant is the cost of finding, processing, and reviewing information that has been unnecessarily retained. The law on this point is quite simple: if you possess information at the time you know or suspect it will be responsive to a legal matter, you must preserve it -- even if you could have normally disposed of it in accordance with your records management program.

The proactive nature of IG means that unnecessary information is disposed of as soon as it is no longer needed and all legal requirements for its retention or preservation

have been satisfied. IG enables us to get rid of unnecessary information in a defensible manner. As such, it can reduce the amount of information that needs to be reviewed in the course of a legal matter.

When working with clients, it is not uncommon to find that 75 to 95 percent of the information created by the organisation in the email system, for example,

has no long-term business value or legal retention requirement and can be disposed of in the ordinary course of business. These percentages vary by system and industry, but the amount of "record" content is usu-ally much lower than "non-record." Further, a good IG program reduces the amount of duplicate information stored by an enter-prise. Duplication is expensive and wasteful. In our ediscovery practice, it is not uncom-mon to find that 30 percent or more of the data we collect from clients is duplicate information.

The value of IG then, is that it can help organisations defensibly reduce the amount of information stored by orders of magnitude — a benefit that is felt not only in reduced management costs, but also reduced e-discovery costs and risks.

—Barclay T. Blair is a consultant to Fortune 500

companies, software and hardware vendors,

and government institutions, author, speaker,

and internationally recognised authority on a

broad range information governance issues. He

is the founder and principal of ViaLumina Group,

Ltd. His blog, Essays in Information Governance

, is highly regarded in the information gover-

nance community. Barclay is the award-winning

author of several books, including Information

Nation, and is currently writing Information

Governance for Dummies. Barclay is a faculty

member of CGOC (www.cgoc.com).

—This article appears courtesy www.cioupdate.

com. To see more articles regarding IT manage-

ment best practices, please visit CIOUpdate.com.

30%OF THE DATA

WE COLLECT

FROM CLIENTS

IS DUPLICATE

INFORMATION

Page 49: Enterprise Sans Borders

VIEWPOINT

64 07 FEBRUARY 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

AD

Page 50: Enterprise Sans Borders

50 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

T E CH F OR G OVE R NAN CE M A N AG E M E N T

As a start-up evolves into a mature company, it offers IT an opportunity to prove its worth. BY DAVE RAMSDEN

POINTS5

ADOLESCENCE AND EXECUTIVE function

RECOGNISING THE onset of corporate

adolescense

CHALLENGES OF business adolescense

UNITING THOUGHT AND action through IT

FROM COST centre

to difference maker

IT AND THEADOLESCENTORGANISATION

PH

OT

O B

Y P

HO

TO

S.C

OM

Page 51: Enterprise Sans Borders

51 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

M A N AG E M E N T TE CH F OR G OVE R NAN CE

But as the business grows, these needs begin to become pressing -- often challeng-ing the leadership of the organisation to recognise that there are new requirements for both their leadership and the business’s functions. From an IT perspective, this entrance into the maturing phases of busi-ness growth can be an excellent opportunity to support and accelerate company perfor-mance. Moreover, if IT truly embraces its potential, this can be a transitional moment that allows it to develop a vital strategic role in the organisation.

There are many models which analyse the phases of business growth. Although there are many other outstanding sources on this topic, many of my observations ref-erence the work of Neil Churchill and Vir-ginia Lewis, who recordedThe Five Stages of Small Business Growth in a 1983 edition of the Harvard Business Review. Whichever business expansion model is examined, however, you will undoubtedly recognise the period of growth in which a business struggles to progress from its initial success as a small business to a more mature organisation which maintains sustainable growth.

If we compare this phase of the company’s growth to our own human development, it parallels adolescence. New opportunities are accompa-nied by awkward growth and frequent confusion. More sig-nificantly, though, the specific

is most likely unfamiliar with HR best prac-tices. Some executives cannot navigate this change. Some may be emotionally tied to the earlier corporate culture or to their role as the singular heroic leader. As a result, their companies may either fail or eventu-ally migrate to new ownership. Other lead-ers may fair better, but never be able to push the company into the growth mode, which is necessary to attain business maturity in later years.

Recognising the onset of corporate adolescenceSo how does IT rise to the call and assist in helping the company through these chang-ing times? By recognising the signs of these phases, understanding the larger business changes at work, and engaging strategically with executive leadership to augment the skills they need most. By truly understand-ing the business requirements of their com-pany during their adolescence and recognis-ing the unique factors at work, IT can take advantage of this period to demonstrate powerful strategic value, and ultimately drive the performance of the organisation to new heights.

To begin, it is important to understand the hallmarks of a business entering adoles-cence. Here are some characteristics to help define this stage:n An organisation at this stage has already passed through the times when the owner did everything and constantly worried about adding clients, delivering product, and generating enough cash to break even. The owner is now withdrawing from day to day responsibilities.n The organisation has lived to see the addi-tion of functional managers, and responsi-bility for budgets and major decisions are beginning to be pushed out to them.n Financially, there is a growing sense of stability, both in terms of client base and cash flow. The company is recognising regular profits and reinvesting them into growth.n Systems are often unevenly deployed and departmentally isolated with little or no cross functional capabilities.

This is the point when the leaders of the organisation typically need to make a deci-sion regarding future growth.

To plunge into expansion mode, they must actively reinvest their profits into

skills needed to deal with these opportuni-ties (and hurdles) change, as well.

Adolescence and the executive functionIn middle schools, many students are chal-lenged because the focus of learning shifts from primarily technical functions (such as reading or mathematics) to a new require-ment for assuming more executive func-tions. These executive functions are skills like prioritisation, delegation, organisation, collaboration, and work planning. We may all recall that age when long term assign-ments and projects suddenly became a lot more complex.

Businesses at this adolescent stage feel pressure from the same challenges. The strengths of the organisation need to trans-form. The executive functions in any well-organised business become more essential every day. The company cannot rely solely on the success of its traditional product to solve all its problems. This is not to say that

the company loses its identity, but it does go through an awk-ward period of change and adjustment to the new priori-ties at hand.

For example, the owner of a design firm may be a creative genius, but may also need help managing cash flow or setting up a quality assurance process. A brilliant engineer-ing entrepreneur may have difficulty delegating work and

Businesses go through several stages of evolutionary development and in each one they demand different things in order to survive and to prosper. In an organisation’s early entrepreneurial beginnings, the focus lies in getting customers and generating enough revenue to stay alive. Centralised systems for managing workflow, delegated leadership, and formal business planning lay far off in the future.

17.4%EXPECTED CAGR

FOR CRM MARKET

IN INDIA FROM

2010 TILL 2014

Page 52: Enterprise Sans Borders

52 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

T E CH F OR G OVE R NAN CE M A N AG E M E N T

funding growth to drive the company into this new age. In doing so, they also intro-duce functional managers, who are more forward-looking, and work towards a vision of the future rather than managing the status quo. These managers may be given responsibilities such as developing their own respective budgets and collaborating to develop strategic plans to march forward as a united group.

The growing focus on the future, from developing shared vision to budgeting for

growth and strategic planning, are all signs that an organisation is going through a sig-nificant change.

What follows are guidelines how IT can use this knowledge to transform from a functional cost center to a key strategic player with a seat at the executive table.

Transforming from cost center to difference makerThe CEO needs help more than ever at this moment (this can be said of mature organi-sations as well today). As we have said, most entrepreneurs have outstanding skills in at least one key area, and that is how they were able to create and develop the success which all of their staff share in. But not all entrepreneurs have developed the skill of collaborating with a dispersed leadership team, nor that of accurately gauging their performance and manag-ing toward strategic goals.

By anticipating these needs and recommending business solutions (i.e., software pack-ages and the appropriate deliv-ery models -- cloud, on prem-ise, SaaS, etc.) that are catered

to them, IT leadership can have a remark-able effect on the success of the company. Consolidating applications into systems that provide forward-looking intelligence will be crucial to effective strategic planning. And the ability to measure progress and tweak tactics accordingly will enable the CEO and functional leaders to be nimble even as the company reaches its growth goals.

IT’s ability to unite thought and action from the executive level throughout the company is a lasting strength. Mature

organisations entering any new market or growth challenge need this advantage like never before. Global organisations coming out of the Great Recession are seeing major business growth in emerging markets. These businesses need to approach that growth in new ways; ways that mesh with the cultures and economies of the commu-nities they are selling into. New challenges like these tax the flexibility of large organisa-tions. Strategic use of technology can not only help meet those challenges, but trans-form them into opportunities.

In all of these cases, from growing entre-preneurial companies to global corpora-tions, the IT function transforms into the architecture of the executive function itself.

The infrastructure must be reliable and fast. The systems must be integrated and easily accessible onsite or remotely. More importantly, the applica-tions must enable those same abilities we struggled to grasp in middle school. They must provide executive leadership with information that helps them collaborate, assess, priori-tise, and organise while provid-

ing the CEO with the ability to better coach and delegate. In this way, vision, strategy, and tactics are easily translated from the top down through all levels of the organisation.

The CEO can no longer be everywhere at once, though they may deeply wish they could. Their vanishing sense of control can cause real grief. Having reliable systems that keep interdependent functions run-ning smoothly can be an enormous gift at this moment. Moreover, the ability to easily access performance metrics from these sys-tems greatly aids in both tactical and strate-gic decision making.

From process automation to collabora-tion, unified communications and deci-sion support intelligence, IT must deploy the solutions that the new organisation is going to need to truly thrive at this stage of its life.

The best IT leaders will recognise these signs and effectively introduce solutions that empower the organisation to suc-ceed. They will consult with leadership from the top down, creating business solutions which are instantly recognised as such, instead of technical solutions which may be less accessible to the C-level audience. And by focusing these solutions on the adolescent organisation’s new need for analysis, planning, com-munication, and control, they will reveal their own strategic value in the vision of the future.

—Dave Ramsden is chief intelligence officer

at Atrion Networking Corporation, where he is

responsible for the Information Services team.

His focus is on applying technology, process

improvement and business intelligence to drive

strategic execution across the organization. He

has over 16 years of leadership experience work-

ing for companies such as Eastern Telecom, Data

Comm Systems and Dimension Data. Dave can be

contacted at [email protected].

—This article appears courtesy www.cioupdate.

com. To see more articles regarding IT manage-

ment best practices, please visit CIOUpdate.com.

53%OF INDIAN CIOS

HAVE PLANS TO

INCREASE THEIR IT

SPENDING

From process automation to collaboration, unified communications and decision support intelligence, IT must deploy the solutions that the new organisation is going to need to truly thrive at this stage of its life.

Page 53: Enterprise Sans Borders

VIEWPOINT

64 07 FEBRUARY 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

AD

Page 54: Enterprise Sans Borders

54 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

T E CH F OR G OVE R NAN CE CLO U D

Cloud Attributes Apply Across the StackThe functional and operational attributes of storage must embrace the core attributes of cloud. BY KEN OESTREICH

fail-over etc., we must also implicitly speak of managing data dynamics, replication and mobility. When we talk about automation, self-service provisioning and service elasticity, we’re implicitly talking about dynamic data/storage provisioning and expansion.

From a broader perspective , begin to consider implications of global availability and hyper-scale. The terabytes of data that embody virtual servers and their data might need to be migrated to (or duplicated in) multiple hemispheres. We can know (or hope) that the physical servers will be there but it’s the bits that still have to travel.

The next idea these observations triggered was the need to keep com-pute, network and storage stacks in lock-step when rolling-out cloud ser-vices. The answer (not surprisingly) is converged infrastructure. But I'm now encouraging everyone to view storage of bits in a completely differ-ent light – one where the functional and operational attributes of storage must be architected to embrace the core attributes of cloud computing. For without the bits, there can be no servers, no data, and no services.

—Ken Oestreich is a marketing and product management veteran in the

enterprise IT and data center space, with a career spanning start-ups to

established vendors. This article was first published on http://fountnhead.

blogspot.com/ and appears here with prior permission from the author.

My “aha” moment here at EMC came during my first week when I was asked to describe the generic attributes of cloud infrastructure. Here I was, in an organisation that’s made

billions on storage, and I was about to talk about cloud attributes solely from a compute perspective.Was I missing something?

I then realised that I’d always related to storage as a “big, fat, dumb disk in the sky”, and assumed that it was merely subservient to the compute stack. Well, not exactly.

My re-think was that attributes of compute, storage, and yes, network, all had to be reconsidered in the context of a holistic cloud-based infrastructure.

Cloud Attributes:Most will agree that the following attributes describe the operational profile of a generic cloud: (HT to IDC)n Shared, standard service. Built for a market (public),

not a single customern Solution packaged. A “turnkey” offering, integrates required

resourcesn Self-service. Admin, provisioning; may require some “onboard-

ing” supportn Elastic scaling. Dynamic and fine grained

I’ll add a few functional attributes as well:n Consolidation: ability to make optimal use of lower-level resourcesn Automation: ability to self-configure to provide the required servicen Multi-tenancy, Multi-tiered-SLA: ability of resources to securely

house individual services & service-levels across shared infrastructuren Global availability: ability to provide a shared service across mul-

tiple availability zones

Attributes in a Storage ContextThe first assumption most make is these traits apply exclusively to the compute layer (physical servers, VMs etc). But pause and consider the storage (and network) facilities too need to embody most. But consider this: In virtualised world, servers are files, and files are just data.

So, when we talk about cloud-related scaling, service migration, server

Page 55: Enterprise Sans Borders

VIEWPOINT

64 07 FEBRUARY 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

AD

Page 56: Enterprise Sans Borders

56 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

N O H O LDS BARR E D H A RV I N D E R S R A JWA N T

Will Attract More Cyber-ScamstersHarvinder S Rajwant, Vice President, Borderless Networks – Security, Cisco Systems talks to Varun Aggarwal about the increasing threats on the mobile platform, fired up by 3G.

DOSSIER

COMPANY:Cisco Systems

ESTABLISHED:

1984

REVENUES:

$40 Billion

HEADQUARTERS:

San Jose, California,

U.S.

PRODUCTS:

Networking Device,

Network Management,

Interface and Module,

Optical networking,

SAN, Wireless,

Telepresence, VOIP,

Security Datacenter

3G Devices

Page 57: Enterprise Sans Borders

57 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

H A RV I N D E R S R A JWA N T N O H O LDS BARR E D

What trends do you see in the way various cyber-threats are emerging?

While it’s only beginning to percolate, a trend is clearly emerging—Cyber criminals are looking for new opportunities outside of the PC environment. They are investing more resources toward developing exploits that specifically target users of mobile devices. Taking advantage of the rapidly multiplying number of mobile users world-wide makes business sense. Less developed nations are particularly ripe for opportunity:

Due to vulnerability exploits in various Windows PC operating systems, Microsoft has improved security in Windows 7 and taken a more aggressive approach to patch-ing vulnerabilities. This makes it tougher for scammers to infiltrate Windows 7 effectively; having reached the Windows vulnerability ‘tipping point,’ they have moved on to other operating systems, applications, software services, and devices such as smartphones, iPads, and iPods. Apple and its products, including iPhones, iPads, and the iTunes media service, have all experienced an increase in exploits. Just as important in driving this trend is the embrace of mobile devices and applica-tions by consumers and enterprises.

The worldwide adoption of mobile devices presents even more opportunities for intrusions and theft. While security researchers have identified many focused scams that target mobile devices, a wide-spread incident is almost certainly on its way. To date, scams have targeted select groups of mobile users, such as customers of a specific bank. The massive and rela-tively new market for mobile applications also offers new markets for criminals. Researchers have detected exploits in which wallpaper apps for Android Market, the app store for the Android mobile oper-ating system, have been collecting mobile subscriber information and sending it to a website owned by a scamster.

According to market research firm IDC, the number of mobile devices, from smart-phones to tablet PCs, accessing the Internet will surpass 1 billion by 2013, creating more opportunities for cybercrime.

In the Indian market, with the advent of 3G, as mobile data traffic increases it will lead to increased threats in the mobile space. According to the Cisco Visual Net-

working Index (VNI) Global Mobile Data Traffic Forecast for 2010 to 2015, in India, mobile data traffic will grow 114-fold from 2010 to 2015.

What impact do you see with the increased focus on Java as

an attack vector by various malware writers?Cybercriminals aim their campaigns at software programs, devices, and operat-ing systems where they can reach the widest net of potential victims. This is demonstrated by the noticeable increase in exploits involving the Java programming language, and the ongoing use of PDF documents to launch exploits.

At this point, Java appears to be the great-er threat. The flaws in Java have made it a promising target for criminals.

appears the mobile malware, which users download after falling prey to a social engineering ploy, is designed to defeat the SMS-based two-factor authentication most banks use to confirm online funds trans-fers by customers.

Cisco security experts anticipate that the real focus of cybercriminal investment for 2011, however, will be on improving the success and expanding the number of cash-out services (‘money-muling’ operations). These operations are a vital component of the cybercrime lifecycle and are becoming more elaborate and international in scope.

‘Money Mules’ are individuals who help launder money by accepting and transfer-ring funds earned in online scams. Money mules are sometimes criminals; more often, however, they are people in need of money who are tempted into this activity by ‘work-

at-home’ spam. Regardless of whether they are willing participants or unsuspecting vic-tims, money mules are integral to enabling criminals to profit from their campaigns. Users can limit these operations by not becoming unwitting accomplices.

Since people are the weak point in form-ing a defense against socially engineered scams, user education must be ongoing and effective. However, in spite of many organi-sations’ best efforts to teach workers to exer-cise caution when responding to emails or social network messages, social engineering continues to be a highly successful method for cybercriminals.

How would 3G change the mobile threat landscape?

Third-generation (3G) mobile networks are opening the way for access to an ever-expanding array of high-bandwidth applica-tions and data services to mobile subscribers. The ability to use applications such as Skype, which within a year have been

When it comes to PDFs, organisations rely heavily on these documents to con-duct business, so the idea of limiting their use within corporate networks is seen as impossible. Yet Adobe Reader and Acrobat continue to be strong threat vectors online. It’s the rare business or personal com-puter that doesn’t have the Adobe Reader software for viewing PDFs, and computer users continue to place an undue amount of trust in these documents. With people increasingly accessing official documents on smartphones, it poses a huge threat in the mobile space.

New on the horizon are exploits delivered via social networking that can infiltrate mul-tiple platforms.

The massively successful banking Tro-jan, Zeus — which, according to the U.S. Federal Bureau of Investigation (FBI), has played a key role in the theft of more than $70 million from 400 U.S. organisations over the past several years — is already being adapted for the mobile platform. It

“High-end cell phones are getting infected with deadly viruses such as the Cabir virus, causing untold damage by deleting all stored information. This is the first cell phone virus, which originated in Philippines.”

Page 58: Enterprise Sans Borders

58 07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM

N O H O LDS BARR E D H A RV I N D E R S R A JWA N T

downloaded more than 17 million times, on a mobile network may change all pro-visioning assumption used in its design. “Always-on” connections, as made pos-sible by mobile data access networks such as General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), wireless LAN (WLAN), and 3G, expose subscribers to a growing number of malicious threats such as the upcoming mobile viruses or even traditional broad-band viruses and worms, degrading the overall user experience.

High-end cell phones are getting infected with the deadly viruses such as the Cabir virus, causing untold damage, deleting all stored information. This is the first cell phone virus, which originated in Philip-pines and has already infected many high-end cell phones. Another virus, Cardtrap-A, targets Series 60 Symbian devices and spreads via Bluetooth or if it is downloaded and executed on the phone from the web. After infecting the phone, Cardtrap-A cop-ies two Windows worms (Padobot-Z and Rays) to the memory card of the phone in an attempt to get onto other devices.

What should organisations do to mitigate these new threats?

Since social networking is one of the main causes for security breaches, it is important for organisations to adopt strict policies around this. It is important to have tighter controls on how workers use social net-works such as Facebook. Security solutions that allow businesses to fine-tune how indi-viduals navigate around a social networking site, and what information they can post and share, already are in the market.

For corporations today, products are driv-en by the ‘User Experience’ which is driven by the latest tools and applications that are part of their social networking. Corporate IT is now forced to not only give access to these sites but also ensure security without compromising the ‘User Experience.’ So corporate IT policy has to keep track of all the ‘SMART’ devices getting connected to the corporate network, identify their context and profile and dynamically enforce policies based on the service requirement identified by each business demand. This policy not only should cover the end devices or for that matter any SMART entity getting connected

to the network, but also the network itself, which should be intelligent enough to adopt itself to the changing demands and should cover the underlined network services and selectively give access to the resources such as application servers and back-end data-base servers.

What role can service providers play in securing the mobile device?

How viable is it to do this in India at the moment?The opportunity provided by data services has prompted mobile operators around the world to launch new architectures, market-ing campaigns, and service strategies to gain market share and revenue. With the adoption of IP-based service models, and with the introduction of ‘true’ high-speed mobile access, operators are facing an increasing number of new challenges that threaten the success of their initiatives by turning their data networks into generic access pipelines with little service differ-

“It is important to have tighter controls on how workers use social networks such as Facebook.”

entiation. Moreover, as service offerings mature and are supported by higher access bandwidth, subscriber quality expectations increase tremendously.

As operators capitalise on IP networks, they need to create higher-margin, higher-revenue premium services such as video streaming, push-to-talk, or interactive gaming. Mobile operators are looking for profitable ways to deliver such value-added, bundled, or personalised IP services to greater numbers of subscribers. Critical to the current strategy is the ability to under-stand at a granular level how subscribers are using the network, identify what applica-tions or services are being consumed, and then intelligently apply network resources to applications and subscribers that promise the highest return on investment.

Operators need to manage and control subscriber traffic. This can be accom-plished by implementing service control technology, which enhances the transport network with application and subscriber awareness. Service control allows the net-work to identify, classify, and guarantee performance for services based on unique application content and subscriber cri-teria. Service control reinforces the new paradigm in which mobile service provid-ers can define and enforce the policies for application traffic management on their network. In this way, operators can optimise network performance, overcome QoS constraints, ensure that infrastruc-ture is used for maximum return on investment and secure their network from malicious traffic.

Mobile service providers will play a major role in securing the Mobile device connec-tivity as they are in the best position to reach and service this vast population with dis-parate end devices which converge at their network layer.

In fact we have partnered with most of the large service providers today who are offering securing email services and secure web browsing services and secure corporate connectivity services for their broadband and enterprise users who have availed their bandwidth connectivity services and it is a matured market with stable technology.

[email protected]

Page 59: Enterprise Sans Borders

59 07 MARCH 2011 CTO FORUMTHE CHIEF

TECHNOLOGYOFFICER FORUM

ABOUT THE REVIEWER

Mahesh Ravi is

the Managing

Editor of India

Now magazine.

He can be con-

tacted at mahesh.

[email protected]

interpret strengths and opportuni-ties, and focus specific actions that will likely pay off the next year when we assess them.”

In addition, Barney outlines nine dimensions of “Infosys Leadership”. He combines the interrelated Strate-gic, Change, Adversity and Transition dimensions into one chapter.

Other dimensions are Operational, Talent, Relationship and Networking, Content and Entrepreneurial.

Each chapter in the book focuses on one of these dimensions and select Infosys leaders share their insights and experiences within that particular dimension.

The epilogue from T.V. Mohandas Pai, Director and Member of the Board, is no less inspirational. Pai says “leadership is about getting ordinary people to achieve extraor-dinary goals,” something which he acknowledges is an “exceptionally dif-ficult task.” But he concludes that it is only a “team of excellent, passionate, visionary leaders with a wide range of viewpoints” that can provide long-term sustainable leadership.

[email protected]

INFOSYS Technologies Ltd has been heralded as one of corporate India’s leading lights. It typifies every aspir-ing entrepreneur’s dream, as the success story of seven driven men from India’s middle class, with only a dream to bind their aspirations.

Leadership @ Infosys is perhaps the first book to systematically anal-yse the key factors that have helped the company grow rapidly, from a seed capital of just $ 200, in 1981, to crossing the four billion-dollar mark in 2008.

The book is an interesting anthol-ogy of articles from senior leaders of Infosys and edited by Matt Barney, PhD, Vice President and Director of the Infosys Leadership Institute (ILI), in Mysore, near Bengaluru, Karna-taka. The institute serves as the com-pany’s corporate training facility.

The foreword, written jointly by N.R. Narayana Murthy, Chairman and Chief Mentor and Kris Gopalakrish-nan, CEO, sets the tone for the rest of the book with its refreshing candour. The writers acknowledge the transfor-mation that Infosys has undergone and with characteristic modesty, admit to “not being perfect”.

The vision is grand, as they express their desire to see Infosys thrive for the next 200 years; a grand ambition, no doubt. They identify Infosys’ val-ues as the key driver to sustainability. And they point to how Infosys always strove for ‘respect’ – their vision exhorted them to become a ‘globally respected corporation.’ They also believe that the leadership should set a positive example for the rest of the organisation, as that would provide the “moral authority to lead.”

Inspiring words, indeed. And Info-sys has certainly lived up to its lofty ideals over the last three decades.

Matt Barney’s introductory chapter takes the reader by the hand and leads him into the inner sanctum of the Infosys edifice. Here, he sets out the core Infosys values as C-LIFE—Customer delight, Leadership by example, Integrity and transparency, Fairness and the pursuit of Excel-lence. Then he explains how Infosys selects, trains and nurtures its lead-ers. The ILI assigns counsellors to the cadre of leaders who have been identified for senior positions. These counsellors serve as coaches who, according to Barney, “help the leader

New Paradigm in Leadership Infosys gives insights into developing effective leaders for the 21st century

Auth

or: M

att B

arne

y“The book codifies Infosys' unique

values and leadership practices.”

HIDE TIME | BOOK REVIEW

Page 60: Enterprise Sans Borders

VIEWPOINT

07 MARCH 2011 CTO FORUM THE CHIEF

TECHNOLOGYOFFICER FORUM60

ABOUT THE AUTHOR: Steve Duplessie

is the founder of

and Senior Analyst

at the Enterprise

Strategy Group.

Recognised

worldwide as

the leading

independent

authority on

enterprise storage,

Steve has also

consistently been

ranked as one of

the most influential

IT analysts. You

can track Steve’s

blog at http://www.

thebiggertruth.com

ADVANCED analytical capabilities? Enhanced business intelligence? Superior decision support abilities? The ability to turn data into money?

Nope. While all those are good things and very worthwhile pursuits, they are not the reasons our industry is so enamored with the construct of big data. The reason we love big data is far less complex.

There are really two reasons: first, because Oracle decided to get into the game and second, because once we figured out why they wanted to get into the game, we realized there was a ton of money to be made–or lost.

The IT industry has been built on the back of transactional systems. Those are the most expensive, most important systems in our worlds and as such have the best people on them.

Transactions occur once. We make sure our systems scale to meet trans-actional demands–once. We pay a lot to over-provision in every aspect because transactional scale is not a nice to have, it’s mandatory.

Big data is created by copying transactional data and sticking it on another system. Over time, those

hardware by packaging up commodity stuff purpose-built to handle the big data issues. He then bundles all of his magic software–which now con-sumes 80 percent of the spend–and puts a bow on it for customers. Then he gets downright evil (and even more brilliant): he runs into all the big sites, performs a quick software audit, and finds out those sites are all out of licensing compliance. Sud-denly, customer A gets handed a bill for $4M–but not to fret, because the good people at Oracle have a simple solution: instead of just paying up, why not just buy a new Exadata sys-tem–which will greatly simplify your life–and we’ll make that little compli-ance issue disappear? Genius, really. I figure there is at least $6B in big iron at risk in this area alone.

Now, not to be overtly pessimis-tic, there is a silver lining. Once all the plays have been made for their ulterior motives, then everyone will get down to the real value at hand, which is making those random piles of data start generating customer value. That will happen.

systems become supersets of our transactional systems. We make lots of copies and put them in lots of big data systems.

Since we used big iron/big data-bases/big money stuff on our transac-tional systems, we had the tendency to duplicate those investments on our big data systems even though those systems behave completely differently from each other. So we found our-selves with giant systems and giant expenses all over the enterprise, built for transaction processing, that don’t ever do transaction processing. They sit idle 90% of the time, waiting for an “analyst” to come up with some query to run against the data set.

Oracle sells TONS of RDB licenses for big data infrastructure, even though it seems stupid that that type of data sits inside an RDB. People are creatures of habit. Industry counts on it. So, along comes the benevolent Mr. Ellison. He sees that the masses are paying $3M+ in infrastructure costs for each of their big data piles. He doesn’t think he is getting enough of that pie.

So he brilliantly decides that he can radically reduce the spend on

Why is Everyone so fired up about big data?

STEVE DUPLESSIE | [email protected]