Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
IT NEXT
SECURITY: Is your
enterprise ready for
27 GREEN IT: Can you
cut the power cost
30 STRATEGY: How do
you define IT project
52 THE BIG Q
How to ensure adequate
mobile devices? in the data centre? requirements? bandwidth? Page 55
TEN HOT TECHNOLOGIES
YOU
VOTED!
IT MANAGERS IDENTIFY
TEN HOT
TECHNOLOGIES
VOLUME 01 | ISSUE 02
Driving business
value
To be the last to produce a technology
trend list is a difficult decision to make.
But, at IT Next we consciously choose to do “IT managers are
this, to avoid bombarding you with another me-too looking at technologies
prediction for the year. Instead, we decided to conduct a reality-check that can provide
of the “commonly announced predictions” by asking your peers— the IT
managers—to vote and rank the technologies that will matter during the year. clear, measurable
The parameters were simple—ability of the technologies to leverage cost savings”
existing IT infrastructure of an enterprise, its level of maturity, utility, and S H U B H E N D U PA R T H
the cost of implementation. But the outcomes were startling.
Several of the technologies that ranked high on low implementation cost,
faltered on either the ability to leverage the existing infrastructure or the
maturity and utility front.
The real surprises in the pack were the much touted XaaS (everything as
a service), business-grade social networking and green IT. Sure, they made
it to the top list, but scored relatively low on the utility front.
The message is clear: businesses and IT managers are looking at
technologies that can help them squeeze more from the existing infrastructure,
and provide clear, measurable cost savings—both in terms of improved
productivity and efficiency.
The top three in the list, security, BI and BA, and data center transformation,
clearly indicate that enterprise IT spending will continue to be driven by
the business value of technology. It looks like IT managers will adjust their
operational spending levels in direct proportion to corporate revenue, rather
than developing or implementing new systems or going for technology upgrades.
Virtualisation, which scored marginally lower than the top three
technologies in the list, reinforces the fact that the prevailing economic
Blogs To Watch!
scenario is compelling IT managers to leverage their existing IT assets to
www.infosysblogs.com/eim/
PHOTO GRAPHY: D R LOHIA
F E B R U A R Y 2 0 1 0 | IT NEXT 1
Twitter:
http://t witter.com/itnext
LinkedIn
http://www.linkedin.com/
groups?gid=2261770&trk=myg_
FOR THE L ATEST TECHNOLOGY UPDATES GO TO ITNEXT.IN FEBRUARY 2010 V O L U M E 0 1 | I S S U E 0 2 ugrp_ovr
TECHNOLOGIES
10
THAT MATTER
INDIA’S IT MANAGERS REVIEW,
ANALYSE AND REFLECT ON THE LATEST
TECHNOLOGY TRENDS—AND VOTE ON
THE ONES THAT WILL MAKE THE
CUT THIS YEAR.
Page
16
INSIGHTS BOSS TALK INTERVIEW
27 Defending new boundaries
How to secure your mobile enterprise environment
2 IT NEXT | F E B R U A R Y 2 0 1 0
MANAGEMENT
Managing Director: Dr Pramath Raj Sinha
Printer & Publisher: Vikas Gupta
EDITORIAL
Group Editor: R Giridhar
Page PUTTING THE SQUEEZE ON ENERGY
Editor: Shubhendu Parth
Consulting Editor: Pravin Prashant
30
CONSUMPTION | Rationalising power cost at Associate Editor: Shashwat DC
data centers can help build a greener enterprise
Sr Correspondent: Jatinder Singh
OFFICE ADDRESS
REGULARS Nine Dot Nine Mediaworx Pvt Ltd
K-40, Connaught Place, Outer Circle,
Editorial _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 01 New Delhi–110 001, India
Industry update_ _ _ _ _ _ _ _ _ _ _ 08
Printed and published by Vikas Gupta for
Event_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 62 Nine Dot Nine Mediaworx Pvt Ltd
Tech indulge _ _ _ _ _ _ _ _ _ _ _ _ _ 66 K-40, Connaught Place, Outer Circle,
Open debate _ _ _ _ _ _ _ _ _ _ _ _ _ 67 New Delhi–110 001, India
50
Check Point IBC REMOVE
INSERTS
© ALL RIGHTS RESERVED: REPRODUCTION IN WHOLE OR IN
Delta BC BEFORE
RECYCLING
PART WITHOUT WRITTEN PERMISSION FROM NINE DOT NINE
MEDIAWORX PV T LTD IS PROHIBITED.
F E B R U A R Y 2 0 1 0 | IT NEXT 3
MANAGING IT
Take more
on your plate
H
ave you noticed something
strange about human nature?
While we acutely aspire for
power and authority, we want
to lay hands on them with mini-
mum accountability and effort. I have often come
across managers aspiring for higher positions,
waiting for what they call the right time to show
their skills and talent, little realising that they
should be doing it all the time.
The idea that one needs to wait for a particular “The much vaunted right time, right
opportunity to display one’s skills is grossly
erroneous. Gone are the days when indulgent
place adage is no longer relevant. What
bosses used to mentor their juniors in the really works is all time, all place”
‘guru-shishya parampara’. With competition
becoming intense and time getting compressed, critical to thoroughly understand fundamental
the current crop of juniors are expected to excel theories and principles before learning through
by the dint of their abilities and commitment if hands-on practical work. This foundation
they really want to be noticed and mentored by helps tremendously.
their seniors for fast-track growth. And even while you do that, do not forget that
So what should an IT manager, who desires in today’s environment a good CIO is one who
to become the CIO some day, do to impress his comprehends technology and business equally
bosses and score over his peers? He should SUGGESTION BOX well. So, take keen interest in the business
proactively take more on his plate. Never evade your organisation is in, the market scenario,
assuming higher responsibilities just because competition, business processes and the ways
they are not part of your job description. But how the business and the end consumer can be served
should you go about it? better with the help of technology.
Typically, a CIO likes subordinates to In some organisations, there is a clear line
whom he can assign a task and forget about drawn between IT and users. It should be ‘we’
it. Therefore, ensure that your boss does not rather than ‘us versus them’. Work very closely
have to continuously remind you about the with other departments to see how you can help
task assigned. Keep communicating to him the them make IT a business enabler.
developments, both good and bad. It talks about the In the end, let me repeat that the much vaunted
Also, remember that when you are escalating Google founders, ‘right time, right place’ adage is no longer relevant.
a problem to your boss, you present a few and describes how What really works is ‘all time, all place’. So never
PHOTO GRAPHY: MEXI XAV IER
possible solutions, and your recommendation. technology has flinch from taking new and higher responsibilities.
This will make decision-making relatively easy changed the way What you take on today without asking, might be
for the boss and earn you higher responsibilities. we live and work yours for the taking tomorrow.
To be able to do that, ensure that you build WRITERS: DAVID A VISE &
MARK MALSEED The author is CTO of Meru Cabs and an open-source enthu-
a very strong foundation of technology know- PUBLISHER: PALGRAVE
siast who believes in being hands-on whenever possible. He
MACMILL AN
how during the initial years of your career. It is PRICE: INR 295.00 has also served as AVP-IT at Star India
4 IT NEXT | F E B R U A R Y 2 0 1 0
Brilliant IT magazine! I am
sure it’s going to be read by
every CIO in the country very
soon. Very well laid out, fantastic
design, coverage from logistics to
Cloud… superb advertisements
JANUARY 2010 backed by all market leaders. Way
to go!
IT NEXT THANKS
ITS READERS SHIVA SHANKAR SHIVA
FOR THE WARM Vice-President & Head—IT Infrastruc-
RESPONSE ture & Security (Operations & Engineer-
ing) | Reliance Communications
http://www.
scribd.com/
doc/25549135/IT-
Next-Vol-1-Issue-1
It was a nice feeling to realise
that I am actually reading some-
884 views
IT NEXT VALUES YOUR FEEDBACK thing which has been exclusively
We want to know what you think about the magazine, and how we can make it designed for my community of IT
http://issuu.com/
a better read. Your comments will go a long way in making IT NEXT the pre- itnext/docs/ managers.
it_next_issue_01_
ferred publication for the community. Send your comments, compliments, dec09-jan10
As you have pointed out in
complaints or questions about the magazine to editor@itnext.in. your editorial, the IT managers’
108 views
community often goes unnoticed
in the entire gamut of IT and IT
delivery. Thanks for bringing out
“It was nice to go through the first issue of IT Next, which READ THIS a magazine for us.
ISSUE ONLINE
focuses on the significant contribution made by IT While the first edition is
spot on in the content and
managers in the growth of an organisation. This is the only http://www.itnext.
in/resources/ presentation, I would like to know
magazine that provides IT mangers with ample guidance on magazine more about the best practices
how to become the next generation of CIOs. The magazine does in IT strategy as this will help
growing organisations to rise up
well by focusing on upcoming issues and recent trends in technology
to meet the growth challenges.
both from infrastructure as well as applications side.” But it is definitely a Maybach :).
SUBHASIS NAYAK PRASAD REDDY
Manager (IT) | Bata India Ltd Manager-IT & Administration | Prelude
Systems
The magazine looks good in content and on the gloss scale. The
article on GST is good. Other articles in Insight section are also good. Excellent work! Hope you can
However, the magazine can do with lesser and smaller photographs. keep up the quality.
The cover story is good, but has missed out on the opportunity to high- L C SINGH
light that today’s CIOs also help in the strategy process and are not lim- Founder CEO | Nihilent Technologies
ited to merely executing what someone else determines. This, of course,
requires experience, competence and “industry-specific” perspectives. I read through the magazine
Going ahead the magazine should include a feature on “Musings” or and found it excellent. Despite
“Higher Plane”, “Weekend Byte” or something else which will get the there being other similar sources
CIO talking of other interests or different perspectives than just about of information in the market, IT
IT. An in-depth case study will add value to the readers and will be in Next stands out on many counts—
keeping with your overall look, theme and feel. while the content is surely fabu-
The magazine should also take up unusual issues or topics and get lous, I am impressed with the
to depth and bring a refreshing perspective. It would also help to get a look and feel factor as well. Over-
few international quality bloggers to write and contribute. all, I think it’s a great effort from
I can see that you are structuring to be different. I feel you can work your end and kudos to the entire
ITNEXT<space>
to become the Forbes India of the IT magazine world. Some additions, team!
<your feedback>
some de-emphasis, some emphasis will help. and send it to SANCHIT VIR GOGIA
NAGARAJ BHARGAVA
COO | Synaptris
567678
*Special rates apply
Senior Analyst-IT Services |
Springboard Research
6 IT NEXT | F E B R U A R Y 2 0 1 0
W
Here are a few tips that can help IT
e all have learned managers reap rich benefits even with
the hard way low IT budgets.
that cost cutting Always plan technology for your
and cost reduc- needs, not on the basis of what you
tion need not can afford. One should look for
wait for a recession to strike. However, solutions that fit the budget without
recession has certainly taught all of us compromising needs. For everything
the lesson that high budget necessarily there is a solution. You have to put in
does not convert itself into high busi- extra effort to look around, or strike a
ness benefits. It is only validation and balance where necessary. Don’t forget to
participation from all levels that an review the actual benefits achieved after
organisation can achieve the right bal- the project.
ance between what it spends and the As an IT manager, you should never
benefit from IT investments. ignore the fact that gaps will continue
In the current day corporate scenario, to exist between the plan and the actual
most of the companies do not have expenditure. But the key to success lies
any formal or detailed IT budget. IT
is always considered as an expense,
“Always plan in reviewing and reducing the gaps
in the future. You can achieve that by
despite the fact that without it the technology for your making your IT an internal business.
business cannot operate anymore. I have
mostly seen planning for IT happening
needs, not on the Effective programme management and
control within IT and user departments
on an ad hoc basis, and requirements basis of what you will deliver far more benefits without
reaching the CIO’s desk as if they have
dropped suddenly from the sky. What
can afford” spending anything extra. To do that you
need to have the benchmarks to compare
this means is that the IT department performance. But do not stop there; try
has little room to plan. Most of the time always a gap between the needs and to create your own benchmarks for
and energy goes in managing what is at the capacity. Therefore, it is obvious others to follow.
hand, and very little focus is accorded to that with limited budget, the business In the end, remember that your wants
integrating business and IT, or planning benefits can never reach anywhere close may always not be the needs of the
how business can better leverage ICT. It to the business needs. Unfortunately, organisation. Think, involve others and
is very apparent that organisations that most organisations give low priority to evolve a consensus on requirements. By
have understood the power of IT have IT planning. Technology, now being the doing this and more, you can achieve
benefited immensely from the same. backbone of almost every organisation, the same result or even better ones
Remember the days, when visiting is akin to the nervous system of the by spending less. So the next time,
a hotel for our dinner, our first glance company. Its breakdown will mean you are asked to make an assessment,
used to be on the right hand side of direct loss of business and, therefore, remember the thumb rule, costliest is
PHOTO GRAPHY: MEXI XAV IER
the menu. Our taste buds were guided must be accorded a priority similar not always the best.
by the cost–the lower the better. This to sales, manufacturing or other core
mindset is all pervasive in every walk functions. The author has been a tech leader for more than
of today’s corporate life. When Deming and JM Juran started a decade, and has been associated with com-
panies like Hutchinson and the Reliance Group.
A budget is based on what the their quality campaign in the 1980’s, Currently, he is heading Sears IT & Management
company can afford, and there is the mantra was “Quality is everyone’s Services India
F E B R U A R Y 2 0 1 0 | IT NEXT 7
UPDATE
I N D U S T R Y
TRENDS
DEALS
PRODUCTS
SERVICES
PEOPLE
simplify solution
are designed network and application resources
to simplify in a self-managed environment.
technology The deal is expected to impact
TECH ALLIANCE | Understanding the rising complexities of IT environments earlier alliances made by IBM
environment across the globe, tech giants HP and Microsoft have for busi- and Oracle to save enterprise
entered into a partnership to jointly invest US $250 million in devel- nesses of all costs and Cisco, VMware and
oping solutions aimed at simplifying the technology environment sizes EMC on private clouds.
for enterprises. According to Microsoft, the
The partnership will enable the two companies build and integrate integrated portfolio would be
technologies like Microsoft Exchange, Microsoft SQL Server complemented by new design,
applications, and Microsoft Hyper-V Server with HP’s hardware, implementation and support
services for the joint solutions.
Both companies will also
work towards modernisation
MOSBTILE Advertisement support for mobile applications will generate of application services for large
ORE
APP almost 25% of all mobile app store revenues by 2013 Online Transaction Processing
(REVENUE PROJECTIONS IN US $ MILLION) (OLTP) implementations and
Application 30000 business intelligence (BI)
stores to be
25000
29,479 solutions.
a core focus
This integration also
PHOTO GRAPHY: PHOTOS .CO M
6,770
2010
2013
8 IT NEXT | F E B R U A R Y 2 0 1 0
storage on tap
storage devices. Those using
premium versions of Google
Docs can also use their accounts
for remote backup.
The move is not surprising,
TECH TIDINGS | Google docu- considering that Google has been
ment users can now create and trying to push its own cloud-based
share all kinds of online docu- operating system. It is expected
ments. While the company will that Google will try to offer as
still limit users to 500KB for many essential cloud services as
Microsoft Word documents, and possible before it launches the
10MB for PowerPoint presenta- Chrome OS netbooks.
tions and PDFs, the new limit for The company further states
all other files that cannot be con- that the Premier Edition Google
verted into a Google Docs format Apps customer will be able to
is 250MB. seamlessly upload many files
The company has, however, at once and sync them with
put a cap of 1GB on the amount their desktop in real-time using
of space for non-Google Docs The new cloud The new cloud storage third-party applications. With
files that are stored within Docs. storage capa- capability will help enterprise the battle of cloud heating up,
Users can upgrade though, by bility will help users collaborate on various the announcement is expected
buying additional storage for 25 enterprise kinds of large format documents, to stir the soup for many biggies,
cents per GB per year. as also enable them to make including Microsoft.
Wireless backhaul:
30 lakh base stations by 2012
IDC predicts that the APAC carrier network
equipment market will have 30 lakh base stations
and over 18 lakh cell sites by 2012—a growth of
24.3% and 10.7% respectively from 2008-09. Half CISCO CEO JOHN CHAMBERS ON THE COM-
PANY’S GROWTH FORECAST
of these sites will be connected to fibre through “THE COMPUTER SWITCHING
Carrier Ethernet. Urban 3G/HSPA base stations will COLOSSUS IS CHANGING
FROM THE INTERNET’S
be linked to fibre by 2011 in most markets. The main ‘PLUMBER’ TO A PLATFORM
driver of this transformation is the need for mobile AND PROVIDER OF
operators to provide high bandwidth services with PRODUCTS FOR ONLINE
WORK AND LEISURE”
incremental capex outlays.
F E B R U A R Y 2 0 1 0 | IT NEXT 9
Global IT spending to
touch $3.4 trillion in 2010
TECH TRENDS | Giving indications that of 9.3%. While Gartner expects the
the global economy may be headed Middle East and African market to
for a recovery, international research grow by 7.7%, it predicts 7% increase in
firm Gartner has predicted that the Asia Pacific IT spending.
world will spend US $3.4 trillion on IT However, the report cautions that
in 2010. The projection exemplifies a the recovery in Western Europe,
significant improvement from 2009, United States and Japan will continue INTERVIEW
when worldwide IT spending regis- to register slower growth. While NEERAJ GILL
tered a negative growth of 4.6%. IT spending in Western Europe is Managing Director – India & SAARC,
Polycom
The report further predicts that all expected to grow by 5.2%, Gartner
major segments, including computing predicts that the US and Japan market
hardware, software, IT services, spending would grow by 2.5% and IT NEXT: How useful are the present-
telecom, and telecom services, will 1.8%, respectively. day conferencing solutions?
grow in 2010. % The report, however,
GILL: Present-day conferencing solutions
According to the research SPENDING points out that it is important
IN ASIA PACIFIC are well equipped to bring in operational
firm, IT spending growth in to understand the impact
7%
TO GROW BY efficiency, business continuity, and help
emerging markets—except of exchange rates on the
in reducing travel cost, giving competitive
central and eastern Europe, markets as well. The growth,
advantage for swift business decisions.
and some of the Gulf states— it says, is largely attributed
will lead the way, with Latin to a projected decline in How are you addressing the needs of
America registering the the value of the US dollar IT managers?
Source: Gartner
highest spending growth compared to 2009.
At Polycom, we value the contribution of
IT managers and continue to develop a
variety of resources that are useful for
Oracle completes
them. While we support our users by
providing adequate training, our technical
support team is equipped to help them
10 IT NEXT | F E B R U A R Y 2 0 1 0
HP expands
suite on the cloud security
The service
portfolio
is targeted at Betting big on rising security
medium to threats and growing business com-
large or- plexities, HP has introduced new
ganisations security solutions and services in
looking to use key areas of technology infrastruc-
SAP at a lower ture, consulting and training, for
cost both conventional and managed
business environments.
According to the company, the
new services and solutions will be
part of the HP secure Advantage
portfolio. It will include applica-
tions, business continuity, content,
data integrity, data center, end
points, networks, identity and ac-
cess management, risk manage-
ment, and security operations.
TECH TIDINGS | Taking a step forward to large enterprises that are looking The company claims that each
to realise its cloud ambition, Verizon to adopt cloud-based applications. category of offering is supported
has introduced a new cloud-based SAP The company says that it will offer by many individual services and
service. According to the company, the custom service-level guarantees that capabilities for various types of
service enables enterprises to more extend beyond server and application information security needs. With
effectively deploy and manage essen- availability to include transaction and this announcement, HP aspires to
tial SAP applications such as financial business process metrics. become a single-point source for
analysis and logistics management, While Verizon will provide service addressing diverse security needs
while reducing complexity and con- support using its dedicated help of an enterprise.
trolling costs. desk in India, San Francisco and UK, The new security solution is
The company claims to support customers will also have visibility also expected to help HP improve
the entire SAP portfolio, including into their SAP environment through its Enterprise Services division
software for customer relationship a Web interface. offering. The company has previ-
management, enterprise resource The offering has been certified ously acquired IT outsourcing firm
planning, product lifecycle, supply by SAP, and the platform already Electronic Data System (EDS) for
chain and corporate services. supports 100,000 customers $13.9 billion in 2008, which is now
The service is targeted at medium globally. called HP Enterprise Services.
There has been much hue and cry over the non-inclusion of Flash on the
latest gadget, with Apple CEO Steve Jobs calling Adobe “lazy” and Flash
“too buggy” for its devices. Lynch subtly debunked Apple’s “walled approach”
stating that, “the Web should remain an open environment with consistent
access to content and applications regardless of your viewing device”.
F E B R U A R Y 2 0 1 0 | IT NEXT 11
10
TECHNOLOGIES
THAT
MATTER
12 IT NEXT | F E B R U A R Y 2 0 1 0
The robust performance of the Indian of IT managers evaluate and rank them on
economy over the past few months has rein- four dimensions:.
forced the belief that downturn, at least in 1. Leverage of existing IT assets: With
India, is well and truly behind us. IT bud- increased organisational emphasis on cost
gets that were hurriedly slashed a few quar- control, the ability to reuse and leverage exist-
ters ago are being slowly reinstated. Shelved ing technology and infrastructure is a huge
project plans are being revived, and IT man- plus since it not only helps optimise capital
agers are once again being tasked to iden- expenditure but also reduces the difficulty of
tify and evaluate technologies that can help transitioning to a new paradigm.
their organisations capture and monetise 2. Maturity of technology: Technology
new opportunities, and improve operational maturity often has a direct correlation to ease
efficiencies. of installation, deployment and management.
The beginning of a new year is also the IT managers responsible for ensuring appli-
time when industry experts and vendors cation and infrastructure reliability tend to
ILLUSTRATION: ANIL T
F E B R U A R Y 2 0 1 0 | IT NEXT 13
CONCEPT &
METHODOLOGY SECURITY 2.0
The perennial concern
L
with security has not
OVERALL SCORE
WHY THIS SURVEY
IT Next asked IT managers to rate reduced 3.41/5
the top technology predictions and
trends for 2010 on a 5-point scale.
THE PARAMETERS
The technologies were evaluated on
L
a set of four parameters: 3.26
1. Leverage of existing IT
RESPONDENTS/SAMPLING
IT Next conducted a survey amongst 2.54
41 IT managers in various verti-
cals across the country. While a VIRTUALISATION
majority of respondents were from The focus remains on
3.08
leveraging existing
2.44
Delhi-NCR, Mumbai, Chennai and
Bangalore, cities like Hyderabad, IT assets and capex
in control
2.54
Pune, Nasik, Ludhiana, Vadodara
and Bhilai were also represented. 2.87
THE METHODOLOGY
2.79
Each respondent rated the identi-
fied technologies on four selected
OVERALL SCORE 2.44
parameters. The averages of these
scores were then taken to arrive
at the final scores—and the Top 10
2.75/5
Rankings. PRIVATE
We also pulled out a few additional CLOUD
Marrying the
3.03
technologies to include in the Fol-
benefits of a cloud
lowing Five list. The reason to have model to the secu-
this separate list is that while the rity of traditional
benefits of these five technologies set up appeals to XAAS
may not be realised during 2010, many Despite its ad- OVERALL SCORE
2.73/5
these would still be the ones to vantages over
box-based pricing
watch for. Also, for specific indus-
models, interoper-
tries or companies, their relevance ability issues are a
could grow more rapidly over the concern
following months.
14 IT NEXT | F E B R U A R Y 2 0 1 0
BUSINESS
INTELLIGENCE &
LOW COST OF IMP BUSINESS ANALYTICS
LEME Rapidly changing business
NTA OVERALL SCORE
TI O environment drives the
N 3.27/5 need for greater data savvy
amongst users
LEVERAGE OF EX
ISTI
NG
IT
2.67
U T IL I T Y OVERALL SCORE
3.33
3.23/5
DATA CENTER
3.00/5
The twin benefits—
intra-organisation
coordination and
one-session query
Note: Dus ea vellessunt vel is endis resolution—propel
dolupta ssuntemquist qui sundip- this to the fore
sapis et porioremque nus a inihil id
magnam, atquas
F E B R U A R Y 2 0 1 0 | IT NEXT 15
Security 2.0
Just protecting devices in the network will speedier damage control in
not suffice—the focus of security needs to the aftermath of the crisis.
3.41 be the data Market intelligence teams
OVERALL in enterprises are now
SCORE As 2010 sees uptake of several community-based technology and placing greater emphasis
communication paradigms like UC, TP and Social Media, the on such tools to help their
traditional perimeter security models will need to change and give organisations captivate on
way to a paradigm that is more user-driven and user-propagated. new opportunities as the
Information dissemination and user awareness will play a more economy recovers.
PITFALLS important role, and IT managers will need to pay more attention to While business intelligence
Putting more implementing security policies in a relatively open and dynamic IT focuses on monitoring
emphasis on secu-
rity solutions and
framework. operational information for
somewhat less on Now that the boundaries of enterprise networks are no understanding the gaps and
the security policy longer rigid, with partner and client networks meeting in fuzzy taking corrective measures,
could lead to a
breach of data.
zones, protecting devices in the network is not enough. Even business analytics aims to
protecting the servers and storage devices that contain data will perform a predictive analysis
not suffice—the focus of security has to be on data. of the market and the
IT Next is of the view that it would be meaningful to business.
develop security policies that lay greater emphasis on data and In today’s globalised
information protection, followed by endpoint protection and and highly competitive
network protection. Essentially, it is about having data at the marketplace, BI and BA tools
center of the security policy. can help your organisation
It would be advantageous for IT managers to use the social compete better. Line
media and integrated communication tools to sensitise users managers increasingly rely
about security policies, and develop security champions for on their IT counterparts
addressing security-related concerns in the dynamic enterprise. for improved performance
management.
IT Next urges you to
evaluate and recommend
BI/BA tools that can be
neatly integrated with your
enterprise IT systems, and
Business Intelligence help market intelligence
and marketing teams in
and Analytics your organisation use the
data to formulate smart
While BI can help analyse business information growth strategies.
3.27 better, the value is in performing a predictive
OVERALL
SCORE analysis
PITFALLS
The economic crisis that caught many enterprises and gov- The biggest showstopper could be
the quality and format of underlying
ernments unprepared, also spawned the realisation that data that can mar effectiveness of a
a greater use of BI and BA tools could have facilitated a good BI/BA solution.
SECURITY 2.0
BI & BA
HOW THEY RANK DATA CENTER
VERTULISATION
Rank 1 2 3 4 5 6 7 8 9 10
16 IT NEXT | F E B R U A R Y 2 0 1 0
F E B R U A R Y 2 0 1 0 | IT NEXT 17
3.04
OVERALL
SCORE
PITFALLS PITFALLS
There is always the risk of UC works in an IP environment with a
user acceptance (of a EM large number of components. Making
solution) being compromised them work seamlessly and reliably
by management issues or could be a big challenge.
security concerns.
Unified
Enterprise Mobility Communication
Enterprise mobility solutions will give The key advantage of UC lies in its ability to resolve
businesses much-needed dynamic flex- a query in a given session. This increases productiv-
ibility in competitive market places ity, and reduces resource and time costs
The scope of enterprise mobility ranges from intra- The commonly accepted costs. This is radically
premise to inter-premise, and from intra-city to key components of a UC 3.00 different from traditional
OVERALL
inter-city connectivity, and seamless access to enter- solution are: e-mail, SCORE communication which
prise applications. As enterprises strive to better instant messaging, IP relies on a single medium,
compete in the marketplace, enterprise mobility is telephony, and pres- say email or telephony,
becoming a key differentiator. ence, with video conferencing and would typically involve
Enterprise mobility is expected to register higher getting added to the suite. multiple sessions spread over
adoption levels across a wide range of verticals in The benefit is the integrated many days, even weeks, to
2010. The fact that laptop shipments will continue to connectivity among different close a query, business deal or
grow at much higher rates than desktops, and smart communication media and customer complaint.
phone shipments are already higher than PC sales, is platforms like texting, voice IT Next recommends UC,
a testimony to the ground being ready for enterprise and video. It allows the user especially because the cost of
mobility. to switch from one medium to implementation is not high,
IT Next believes that enterprise mobility another, literally at the click of and given that UC leverages
solutions will give businesses the much-needed a button. and integrates existing
dynamic flexibility in competitive market places. You can use UC in your communication platforms like
In particular, if you manage IT in businesses organisation for, say, a customer IP, hybrid PBX, e-mail and IM
such as insurance, retail, logistics, transportation, query resolution, within the in the enterprise.
manufacturing and healthcare, adoption of EM span of a given session, to
could bring in substantial business benefits, and increase productivity and
also simplify concerns such as location tracking and reduce resource and time
integrated view of inventory.
ENTERPRISE MOBILITY
UC
HOW THEY RANK GREEN TECHNOLOGIES
PRIVATE CLOUDS
Rank 1 2 3 4 5 6 7 8 9 10
18 IT NEXT | F E B R U A R Y 2 0 1 0
F E B R U A R Y 2 0 1 0 | IT NEXT 19
XaaS
Since any thing as a service reduces fueled buyer interest and adoption. However, it
the risk of failure, it is a good bet can be correctly argued that an enterprise-wide
when experimenting with new usage would demand contract pricing to come
software and solutions into play, and perhaps render the cost advantage
of XaaS less obvious.
While software-as-a-service (SaaS) is the better Yet, XaaS will have a clear overall advantage
known and talked about category, but there are over box-based pricing models, despite the leasing
others too—infrastructure-as-a-service, and financing options promoted by box
platform-as-a-service, and so on. All these vendors.
PITFALLS
services are delivered over the cloud. 2.73 IT Next’s opinion is that XaaS
SaaS applications may OVERALL
pose integration and In India, as elsewhere, telecom service SCORE would be a particularly good bet when
interoperability issues providers are emerging as mainstream experimenting with new software and
with existing enterprise
XaaS channels and providers, as part of solutions for non-core functions, as it
applications. There
can be unplanned and their attempt to offset falling average revenue per lowers risks associated with failure. You may
unexpected downtime, user in their regular voice and data service offerings. consider XaaS alternatives for proven solutions
due to reasons beyond
XaaS has largely been marketed as a pay- deployed in the core, only after being convinced
the control of the
enterprise IT team. as-you-use or utility pricing model, which has by success studies and robust proofs of concept.
XAAS
HOW THEY RANK SOCIAL SOFTWARE
Rank 1 2 3 4 5 6 7 8 9 10
20 IT NEXT | F E B R U A R Y 2 0 1 0
Enterprise-grade
Social Software
By plugging social media tools into an enterprise application or proc-
ess, organisations can achieve ‘contextual collaboration’
Have you fought against the invasion that will help enterprises compete better
of various social media platforms into the in the marketplace.
PITFALLS enterprise, haunted by security concerns? A salient feature of enterprise social
The biggest pitfall It’s time to realise that the use networking is “collaboration in
would lie in the con- of social media is a cultural-cum- context”. This can be achieved
tradiction that a social
media platform essen-
generational shift in human-to- 2.62 by plugging in social media
human communication. The best OVERALL collaboration features into an
tially suited for a flat SCORE
world has with the hier- way to defend against its perils is enterprise application or process
archal structure still so to enable information sharing
to embrace it, with security filters
typical of enterprises.
built in. That’s what enterprise-grade between users right when the need for
social software is all about! sharing is felt.
Deployment of social media in IT Next suggests that IT managers
the enterprise will earn IT managers spend time in evaluating various
accolades, not just for providing the enterprise-grade social media solutions
communication environment that and looking for success studies. Carry
employees are already used to, but more out the deployment only after you are
importantly for initiating a cultural shift convinced of the benefits.
F E B R U A R Y 2 0 1 0 | IT NEXT 21
24 IT NEXT | F E B R U A R Y 2 0 1 0
“WE HAVE AN
EDGE OVER
GOOGLE APPS”
Ponani Gopalakrishnan, Vice-President for IBM’s India Software
Lab, in a conversation with Shashwat DC, dwells on the benefits
that enterprises can draw from LotusLive offerings, and how they
compare with Google Apps
What are the need to shift to the cloud model ponents such as Gmail, Google
compelling business more urgent. So, the draw is not Docs and Google Sites. LotusLive,
reasons for LotusLive? only lower costs, but also the on the other hand, is designed to
Ponani: If you really look at ability to avoid purchase, deploy- complement the existing collabo-
enterprise computing today, you ment, management of hardware ration infrastructure. It takes
will discover that the primary and software stacks, and also to collaboration to the next level by
requirement of CIOs is a lot more ensure a lower IT administrative making it effortless to work with
flexibility in their infrastruc- headcount. LotusLive is the per- both co-workers as well as exter-
ture as business requirements fect match for all these require- nal stakeholders such as custom-
are changing rapidly. This puts ments. It is a suite of business ers or partners.
a lot of pressure on the CIO as networking and collaboration
the infrastructure needs to be cloud-based services. The inte- Can you explain some of
ready to take loads during an grated services include email, these features in LotusLive?
sudden upsurge or spike in busi- social networking for businesses, Being able to collaborate seam-
ness requirements. According to online meetings, file sharing and lessly is one of the biggest fea-
our estimates, even today, huge instant messaging. tures of LotusLive. A lot of
amounts of IT infrastructure applications have been designed
remain unutilised. According How does LotusLive compare around it. There are plenty of
to one assessment, servers are to other enterprise services tools and applications that an
usually utilised at close to 20% like Google Apps? enterprise can make use of.
to 25%. That is a huge waste of LotusLive has built in a rich set of For instance, we support a web
computing power. This is what features that are designed to han- meeting... so if you have a small
PHOTO GRAPHY: RAHUL KN
compelled people to look at other dle this range of requirements. work group spread around dif-
services and models, and why The reason why Google Apps is ferent cities, then you can bring
cloud computing came to the fore. not the best fit for enterprise users them around to a common
The fact that IT budgets are flat or is because it is not designed to be meeting platform. It integrates
shrinking due to the current eco- one. It is essentially a conglom- audio, video and presentation.
nomic scenario has only made the eration of several popular com- We also have the ability to pull
F E B R U A R Y 2 0 1 0 | IT NEXT 25
26 IT NEXT | F E B R U A R Y 2 0 1 0
DEFENDING
NEW BOUNDARIES
Growing adoption of mobile Barely had Manish Jain, senior IT
manager of a mid-size packaging firm,
enterprise devices is compelling settled down for a late dinner, that he got
IT managers to bring in best a call from his boss, the CIO. Apparently,
the boss, who was travelling abroad, had
security practices at their end misplaced his Blackberry and was sweat-
ing with worry. “Manish, disable the darn
instead of putting the onus on the thing and erase the data immediately.”
F E B R U A R Y 2 0 1 0 | IT NEXT 27
The good thing about this incident was Shankarnarayan Dharmarajan, Marketing
that Jain was aware of the remote-wiping Manager, Wireless, Security and Routing
capabilities in the device and was prepared to Technology Group, Cisco India & SAARC.
handle the eventuality. But that is not the case
with hundreds of other IT managers. While Back to basics
mobile enterprise usage has grown manifold, Organisations often fail to lay appropriate
the threats have increased in tandem. emphasis on cannons that are indispens-
Mobile enterprise devices are not just able for IT security of an enterprise. For
portable but also allow users to send and instance, have you given a serious thought
receive updates in real time across branches. to the number of times your employees
However, the device has also brought with it expose company data, deliberately or inad-
a confusing tangle of mobile platforms, with vertently, through their USB and removable
endless number of technology challenges, storage devices? And more importantly, are
revolving around device provisioning, you constantly evaluating which data needs
“FORANYITMANAGER compliance, security, performance to be protected, at which level, and for what
IT IS ESSENTIAL management support, and decommissioning. period? If not, then you too, might end up in
TO DESIGN BEST “It is vital to evaluate the security a predicament similar to Jain’s.
framework for mobile devices as lost or “Designing best business practices to
BUSINESS PRACTICES stolen devices can endanger confidential secure valuable information, irrespective of
TO SECURE VALUABLE data and compliance efforts, causing the location or the device, is a critical job for
INFORMATION terrible pain in the long run,” says any organisation. We constantly attempt to
improve our policies as per the necessity
IRRESPECTIVE OF THE of our operations,” says Prakash Pradhan,
LOCATION OR THE
DEVICE”
— Prakash Pradhan, Head IT,
7 STEPS Head IT at Jagsanpal Pharmaceuticals.
For an IT manager, managing devices,
applications, data and communications
Jagsanpal Pharmaceuticals, India TO SECURE MOBILE proactively is critical to the success of
28 IT NEXT | F E B R U A R Y 2 0 1 0
APPLE IPHONE
Unil the recent launch of iPhone OS 3.0, remote-wiping meant much trouble. Now
Apple offers a MobileMe service that lets users perform a remote-wipe on a lost or
stolen iPhone. Besides, the application also allows Mac users the ability to push e-mail,
contacts and calendar entries to the iPhone.
“WITH DLP SOLUTION,
ORGANISATIONS
ANDROID PHONE CAN BE SURE THAT
The good thing about Android Phone is that being an open platform it offers a handful
of remote security options. One such application is remote-wipe for Root users. The
CUSTOMER LISTS ARE
other application is SMobile Anti-Theft for Android. NOT COPIED TO USB
FLASH DRIVES OR
SYMBIAN/WINDOWS MOBILE
There are scores of applications that are available for Symbian (Nokia) and Windows
OTHER REMOVABLE
Mobile phone. Kaspersky Lab has a product Windows Mobile and Symbian that will MEDIA”
send SMS with a Google maps location, lock or wipe the phone, and can also send back —Vishal Dhupar, Managing
the new number, if any other SIM is inserted. It also has anti-virus and firewall, as well Director-India & SAARC, Symantec
as tools that can help block SMS spam.
code is not copied or pasted to a new file, changing the pasword or not auto and F-Secure have specific tailored
design documents are not burnt to CDs saving them, which can strengthen or offerings for different levels. While
or DVDs, price lists are not printed out weaken the entire data security plan,” Trend Micro’s Office Scan 10.0 claims
or faxed to competitors and much more,” says N Rangnathan, Project Manager at to defend laptops and smart phones at
elucidates Vishal Dhupar, Managing Mahindra & Mahindra. all levels of network, companies like
Director-India & SAARC, Symantec. Sybase are offering Afaria, a mobile
Automatic kill and permanent Multi-flavoured menu device management and mobile
lockdown are some of the other measures “Security labs see thousands of new security solution from a single console,
that can help IT managers wipe all the malware samples every day and it is providing protection against security
data automatically in case the device simply not possible to create detection threats and compliance issues.
fails to connect with the central console signatures for each of them. So, differ- However, at the end of the day, what
within a stipulated period of time. ent detection and protection techniques matters most is the implementation of
“Also, policies can be put in place like whitelisting and blacklisting are a solution that not only manages and
so that not all data is displayed in all being developed. These techniques des- secures mobile data and devices but
geographies. For example, certain ignate specific programmes as ‘known also provides the best ROI along with
e-mail data could be restricted to good’ or ‘known bad’ and treat them as improved efficiency, customer service
specific locations. Once outside the per behavioural analysis,” says Roger and, ultimately, profitability.
defined area, the data would not get Thompson, Chief Research Officer at So be well advised like Mr Jain was,
transmitted,” suggests Franck Rougier, AVG Technologies. and prepare in advance so you do not
President of Blue Helios, a New York- There are many security solutions end up losing your midnight sleep over
based consulting firm. in the market, claiming to provide a lost device.
“It’s indispensable to get employees highest level of security for mobile
Find similar stories online
trained in the basics of security. There enterprise devices. Vendors such as on the website
are several minor things like regularly Symantec, Trend Micro, AVG, McAfee www.itnext.in/Insight
F E B R U A R Y 2 0 1 0 | IT NEXT 29
PUTTINGTHE
SQUEEZE
ON ENERGY CONSUMPTION
Rationalising power and energy
costs in data centers can help
improve resource allocation and
facilitate the move towards green
enterprises
BY MOHIT CHHABRA
30 IT NEXT | F E B R U A R Y 2 0 1 0
I
T managers are at the crossroads an associated level of service. For instance,
today with the economic scenario not every type of data needs the same
squeezing them from all sides. On level of protection, replication, disaster
one hand, the number of IT hands- management and recovery services. Hence,
on-deck are being rationalised. On savings and efficiencies can be gained by
the other, the team is under greater pres- identifying and classifying data sets into
sure to make ‘wise’ decisions about IT their associated levels of service. Certain
infrastructure planning to make the best technologies are helping IT organisations
use of their existing resources. get there faster.
Meanwhile, demands from the business
and mission critical business applications Understanding usage
are increasing. patterns
On the data centre front, the IT manager Most data centers are sized for peak condi-
can control costs by juggling a range tions that rarely exist. According to a study
of variables. Some of these are delay in by Emerson, in a typical business data cen-
Blade servers
10
capital expenditure, reduction of total cost tre, daily demand progressively increases
of ownership, reduction in risks associated from about 5 a.m. to 11 a.m. and then begins consume about
with remote disaster recovery and lowering to drop at 5 p.m. However, server power
of maintenance expenditure. consumption remains relatively high even
In addition, the IT team also has the as server load decreases. In the idle mode,
option of cutting cost by reducing energy many servers consume between 70% and
spend in many ways—from introducing
efficient cooling systems to decreasing
85% of full operational power.
This means that a facility operating %
server and storage footprints, managing at just 20% capacity may be consuming less power than rack
data growth efficiently to storing more 80% of the energy as the similar facility
mount servers of equal
data within the existing infrastructure. operating at peak capacity. A vast majority
performance
45
But adopting any of these options is of server processors have built-in power
riddled with huge challenges. Until about management features that can be used to
a few years ago, the key challenge faced by dramatically reduce power consumption
%
a data centre manager was that of space in idle mode. However, many times, for
and availability. Today, with technology the fear of increasing response times, the
becoming robust and efficient, and features remain disabled. It would be
mean-time-between-failures nose diving, prudent to analyse usage patterns and
availability is the least of an IT manager’s re-examine the disabling of the power
worries. savings feature in server processors.
Energy efficiency, power density and Another disadvantage of building
of the TCO for a
cooling density are the top issues facing and running data centers for peak loads, typical rack in a high
today’s data centre manager. This is is the cost of cooling. “Computer Room availability 2N data
obvious, considering the fact that nearly Air Conditioners or CRACs are fitted centre is contributed
45% of the total cost of ownership for a with fans that run at constant speed to by power and cooling
20
typical rack in a high availability 2N data deliver a constant volume of air flow. equipment
centre is accounted for by power and Newer technologies can convert these
cooling equipment. fans to variable frequency drive fans.
“Going after cooling equipment can This controls and adjusts the fan speed
actually serve two purposes. It can create according to the server load, thereby
energy efficiency that directly translates optimising and bringing efficiency to
%
into cost savings thus converging the power consumption,” says Pratik Chube,
objectives of green IT with that of business,” Country General Manager (Product
says Bhairav Kulshrestha, Manager (IT) at Management & Marketing) at Emerson
Atul Group of Companies. Network Power India.
reduction in the fan
Planning, or sharpening the axe, is a And these savings are easily quantifiable. speed of computer
great tool to generate cost efficiencies. Like For instance, a 20% reduction in fan speed room ACs can help
all other asset classes, data and applications results in savings of nearly 50% on power cut over 50% of power
should be identified and accordingly consumed by fans. The advantage of this consumption by these
classified into categories that then deliver new technology is that these variable fan- fans
F E B R U A R Y 2 0 1 0 | IT NEXT 31
“WHEN RACK
MOUNT
SERVERS ARE
REPLACED WITH
BLADE SERVERS,
IT CAN RESULT
IN HUGE ENERGY
SAVING”
—Pratik Chube, Country
General Manager (Product
Management & Marketing),
Emerson Network Power
India
speed drives can be retrofitted into the replaced with blade servers, it results in a
existing CRACs with minimal investment, 1% saving on total energy consumption,”
“…GOING one which pays back for itself within a year. explains Chube.
32 IT NEXT | F E B R U A R Y 2 0 1 0
GETTING ’EM
WORK
HOME
FROM
W
ork is something proved to be favourable for both point to the growing importance of
we do, not some- employer and employee. telecommuting among Indian SMBs.”
thing we travel If your company is in a business In small businesses, telecommuting
to. While this is where employees do not need to be penetration is highest among
not yet a catch physically present to carry out work, or professional businesses followed by
phrase in Indian organisations, but if your organisation is facing problem manufacturing units, that have remote
it seems well on its way getting there. finding an adequate and suitable production facilities and specific
With urban centres such as Delhi, workspace, then telecommuting can be service needs. However, in the medium
Mumbai, Bangalore and Hyderabad an answer. The concept has come of age, business segment, the penetration is
getting more congested, the corporate thanks to the availability of high-speed highest in the banking and finance
sector is presenting its employees flex- connectivity and handheld devices, at sector as they have agents and brokers
ible work options that enable them to least in major Indian cities. working from remote locations.
cut travel time and boost productiv- According to Kalyan Banga, But, like in other technology
ity. A recent survey conducted by Research Analyst at AMI Partners, deployment, the concept cannot be
IDC revealed that 81% of executives “Telecommuting penetration is on rolled out without a proper enterprise
polled across the Asia-Pacific region the rise across Indian enterprises, strategy for telecommuting. IT
strongly agree that telecommuting particularly amongst SMBs. While it managers need to understand a
improves productivity. In 2005, only has increased from 3% in 2006 to 11% host of issues—from security to
61% thought so. in 2008 amongst smaller companies, it performance management, policies for
For a growing number of has jumped from 8% to 27% amongst data classification and defining access
businesses, telecommuting has medium level enterprises. These figures rights—to prepare their organisations.
34 IT NEXT | F E B R U A R Y 2 0 1 0
downloading of files
Security and performance n Help telecommuters understand the tools, and provide special
management handbooks or reference guides to help them use technologies, ac-
Security becomes a major issue in telecommut- cess information and expertise
ing. Adopting measures such as secured access
to business data, phone systems, applications
F E B R U A R Y 2 0 1 0 | IT NEXT 35
36 IT NEXT | F E B R U A R Y 2 0 1 0
“TELECOMMUTING IS
POSSIBLE WHEREVER
THERE IS CLARITY
IN THE ROLE, AND
DATA SECURITY IS IN
PLACE”
—Dr Deepak Shikarpur,
Computer Society of India
balance, less exhaustion due to reduced case of women staff, this option works Besides, telecommuting can also help
or no commutes and, more importantly, particularly well during times of family enterprises in terms of talent retention
reduction in carbon footprint outweigh pressures or maternity leave. and offering the staff flexibility on a
the negatives, the proportion of organi- Says Rajesh A R, Vice-President regular basis, or when they are on long
sations adopting telecommuting is still (temporary staffing) at TeamLease vacation or leave.
small. Services, “The concept can bring in However, to be the change agent
Many employers have difficulty in potentially large gains in productivity driving the concept, IT managers
breaking free from the ‘keeping an eye’ and substantial savings in time and need to carefully explore the options
mindset, and evaluating the employees cost. At the same time, it offers good provided by various vendors. They also
on the basis of their physical presence, work-life balance to the telecommuting need to examine the various technology
rather than their performance. workforce. However, for these benefits options (see box: Technology is the key)
However, providing flexible working to come to fruition, it is extremely and weigh the pros and cons before
options does enable organisations to important for companies to have offering a solution that can help the
retain the best talent, even when they excellent performance management organisation extend this facility to
are facing personal problems. In the systems in place.” employees.
F E B R U A R Y 2 0 1 0 | IT NEXT 37
MOVING
AWAY FIRMA TERRA
FROM
“A hundred years ago, companies
While cloud computing offer
stopped generating their own power
some great benefits, the transition with steam engines and dynamos, and
may not be easy for an enterprise. plugged into the newly-built electric
But if you knowwhat to expect, you grid. The cheap power pumped out
by electric utilities didn’t just change
can prepare for it how businesses operate. It set off a
BY S H AS H WAT D C chain reaction of economic and social
transformations that brought the
modern world into existence. Today,
a similar revolution is under way.
Hooked up to the internet’s global
computing grid, massive information-
processing plants have begun
pumping data and software code into
our homes and businesses. This time,
it’s computing that’s turning into a
utility.”
—Nicholas Carr in the Big Switch
38 IT NEXT | F E B R U A R Y 2 0 1 0
46
That’s as far as the concept goes. The supplemented by cloud computing.
real issue is in shifting to a cloud-based Though even in times of placid growth,
setup within an enterprise. And no matter cloud computing can come handy as a
how easy the vendors portray it to be, it cost saving measure.
is not a slam dunk. Many IT managers,
who made the shift from a traditional How secure is the cloud?
on-the-premise infrastructure to a SaaS Crooks and hackers are always on the
or an IaaS model, recall with horror the
transition process.
lookout for vulnerabilities to exploit, and
systems that can be compromised. In such
%
In fact, the more complex the current a scenario, trusting a third party vendor Overall awareness
infrastructure, the more vexing the with sensitive information can be fairly level of cloud computing
shift will be. Interestingly, most of the nerve-wracking. Even if the vendor has in Asia Pacific (excluding
challenges that crop up are not technical fortified its networks against attacks or Japan)
ones, but process or people oriented. intrusion, do not forget that the data will SOURCE: SPRINGBOARD RESEARCH
F E B R U A R Y 2 0 1 0 | IT NEXT 39
1
SEVEN-STEP
CSP
BUSINESS VIABILITY
Pedigree: Brand visibility
of cloud service provider,
entrepreneur track record, 2
SELECTOR management, strategic
investors or VCs
Financials: Balance sheet, STRATEGIC
cash flows, VC funding rounds, CAPABILITIES
Collated by Sameer
equity structure
Commitment level: Capex
Manpower: Quality of
manpower, average industry 3
Kulkarni, Head—IT committed to cloud per-se, experience, qualifications,
Automation Architecture R&D or innovation budget certifications, attrition rate PORTFOLIO AND
(Data Center Business),
Roadmap: Expansion plans Partnerships and tie-ups: PRICING
Reliance Communications
announced publicly and Published track record of Portfolio: Breadth and depth
commitment to growth partnerships (the more the of portfolio offerings, medium
better) to long-term roadmap
Industry rankings:
Assessments from third party Forums: Forums hosted, Pricing flexibility: Maturity
analysts like Gartner, Yankee steered, sponsored and flexibility of the pricing
and IDC Patents filed: (if any) model and up sell model
40 IT NEXT | F E B R U A R Y 2 0 1 0
OPERATIONAL
EXCELLENCE
Portal experience: Portal of
a company says a lot about it
(how rich, contemporary and up
to date?)
Web enablement: Degree
of sophistication in web
enablement of customer
5 6
operations
Customer empowerment:
SLAS AND CONTRACTS
TECHNOLOGY Measurements:
Extent of “self-care” ARCHITECTURE How transparent is the
automation of customer and Choice of platforms: Choice
7
measurement and reporting,
service life cycle management of virtualisation platforms, and is it automated
Real time visibility: Real time servers, OS, ISVs
Enforceability: Contractual
reporting, application visibility, Eco-system: Extent of terms and obligations to the
topology, dependency maps vendor neutrality, migration, SLAs
Notification & escalation commitment to open source SECURITY AND LEGAL
process: Means, processes option Privacy policy: Stated privacy
and sophistication Extensibility: How policy and enforceability
Disaster recovery: seamlessly extensible (on-tap Jurisdiction: In which
Architecture, tools and available) is the compute, country is the CSP located and
readiness storage and network covered by what jurisdiction
The confusion is further aggravated to examine them thoroughly before Manjit Tomar, Business Development
by the numerous CSPs and their var- committing yourself. Manager at Wipro Infotech.
ied offerings. Depending on the service “Apart from these issues, some of “Plan ahead for the exit route, and have
provided, CSPs have a tiered pricing the barriers are privacy, security and options for the time when you decide
model. The best way would be to study regulatory compliances in different to move away from the cloud,” Tomar
the different pricing models in detail, countries. Unless these issues are suggests adding that, organisations
and make a valued comparison. Also, addressed, I do not think it is prudent might need to move away from the cloud
remember that vendors yield to negotia- to jump into public clouds as of now. due to relationship or technology issues.
tion; so do not feel shy to bargain. May be people need to consider these “You need to have a standby plan for
“The major issue with cloud computing new concepts during IT refreshment such situations. Provision the necessary
is the adoption, and the ROI factor,” says in a phased manner,” advises Ratnakar conditions in the agreement with the
Ajay Kumar Meher, Vice-President– Nemani, CIO & Head—IT Projects Wing cloud provider so that you are safe
IT, Sony Entertainment Television. He at VST Industries. in case you need to move away from
further classifies the enterprise apps the cloud computing service. Outline
as commodity type (e-mail), and that of Are you ready for the clauses that will detail how you can get
enterprise class (ERPs and SCM). after? your data back. These clauses should
“Taking the first one on the cloud Cloud computing should be viewed as a outline the data formats and how you
may be feasible, but pay back will be journey to the end and not an end in itself. can handle migration of this data onto
more time consuming than creating one. There are numerous issues that could go your future application,” he advises.
For the second type, the apps are very wrong along the way, and it is always In the end, remember that going on to
customised and getting them migrated to good to know where the parachute is. The the cloud or staying put should be based
cloud (third party) will be very difficult. important thing is to be clear and firm on on well thought out plan and not merely
Besides, getting the desired SLA may the SLAs. Work with the CSP to define because you should be on it.
also be difficult at times,” he warns. and detail what exactly the commitment We all know that clouds can be
Another factor, and often the most of 99.9% uptime implies, and what hap- very unpredictable in real life. They
critical one in making the shift is the pens if it is not. Well worked SLAs can may not be different in the enterprise
issue of legacy infrastructure. Do not save a lot of trouble in the long run. space too.
forget to account for the migration And then finally, what happens
time, and the costs of the legacy and if you do not want to be in the cloud
How did you like this story?
in-house applications. The devil anymore? It is important to work Send your feedback at
clearly lies in the details; do not forget that out before you join in, cautions editor@itnext.in
F E B R U A R Y 2 0 1 0 | IT NEXT 41
PLAYING
STORAGE THE
42 IT NEXT | F E B R U A R Y 2 0 1 0
As enterprise data volume continues priority, compliance requirement, and You will also be able forecast for
to grow in a colossal fashion, an IT man- other parameters. We need to be cost- cumulative storage needs—the trick is
ager is challenged to keep the storage conscious and prudent in choosing the to keep adding each passing year’s data
infrastructure responsive to informa- storage media. to cumulative storage.
tion and compliance needs, both from
within and outside the organisation. Getting started What storage management
IT Next will help you find the way Running a detailed audit of the storage system is currently in use, and
out. But first, you need to answer a few infrastructure and needs in your enter- what are its advantages and
questions. prise should get you started. The objec- disadvantages?
Does all data in your organisation tive is to discover the following: Without the right management sys-
have equal storage importance tem in place, even cheap storage can
and retrieval priority? What is the total installed lead to a higher overall spend in the long
Do you have no budget constraints capacity and how much of that run. An ineffective management system
when it comes to buying addi- has been utilised? would also result in more energy costs
tional fibre channel (FC) disk arrays? This is not just to estimate the capacity associated with higher runtimes.
Has the economic slowdown that will be available but to also gauge
also slowed down your storage how much capacity is being utilised on What is the level of virtualisa-
requirements? a cumulative basis versus annually. In tion, if any, that has been carried
Of course, a common answer to the other words, this is to get a ratio of the out?
queries would be a clear no. archived data versus current data. While cost saving by way of leverag-
Now that we have done that, let’s see This first level of data segregation ing existing storage infrastructure is a
how it can be of help. gives you a simple, yet effective basis major driver of virtualisation, another
for determining how much of higher- important benefit is that it enables
Add, add, add…? speed storage media is necessary easier handling of heterogeneous stor-
Traditionally, that is what we have been while the rest can reside on lower- age environments, something that is
doing. We have bulk-stored enterprise speed media. quite common due to the “add, add,
data on arrays of disks, and kept adding add” strategy.
disks when the data inflow exceeds the Which kinds of storage media The other management benefit of
installed capacity. have been deployed, and what is virtualisation is that it gives you an
After a while, the process starts the distribution? effective way to deal with file-based data
appearing as mundane as adding chairs This will give you an estimate of in a secured manner.
in the back of a conference room as new how much storage media is available A point to remember here is that
attendees keep pouring in. across high, medium and low-speed while virtualisation helps improve
And you thought data storage segments. This, along with data seg- utilisation, it is not an alternative to the
was about information lifecycle mentation, should get you started tiered approach. A right mix of the two
management (ILM)? Yes, it is indeed with mapping the high-priority data should be considered.
about management! In fact, the task is to high-speed storage media, and help Subhasish Saha, Chief Technology
getting more and more complex by the document the need for procuring any Officer at Apeejay Surrendra Group
day, not to mention that adding disk additional media. says that his organisation found an
arrays linearly is going to make this Along the way, you will also get to audit to be extremely rewarding in
complexity even more baffling. know if low-priority data is sitting highlighting core issues.
So what is the solution? Before on high-speed storage and take the “We had three striking observations.
coming to that, let’s first visit the necessary corrective measures. First, we did not have any policies
answer to question number 1: not all Essentially, high-speed storage could be of storage across the organisation.
data are equal. freed up for use by high-priority data. Second, storage provisioning was in
Why do we then treat all data as silos without any optimisation thrown
almost equal? We store all enterprise How many users are there in in, which resulted in utilisation levels
data on the same storage media the enterprise and how much varying from 10% to 95%. Third,
without discrimination. Agreed, the data do they generate annually? demand for business critical application
prevailing data storage practices are This will help you forecast the addi- data was the lowest,” he elaborated.
an outcome of tradition than of your tional storage requirement for the Appejay Surrendra implemented a
conscious choice. But then, probably it coming year, and even for a three to virtualisation solution from a leading
is time for one to take more conscious five year period. It can also help you vendor, which has already resulted in
decisions, proactively. We need to forecast storage requirements by consolidation of 15 out of 40 servers and
segregate data by its sensitivity, access speed segments. improved utilisation by 35%.
F E B R U A R Y 2 0 1 0 | IT NEXT 43
44 IT NEXT | F E B R U A R Y 2 0 1 0
MAKING
THE
RIGHT
O N C I N
C N E TO S The right cabling solution need
not be bleeding-edge, but must be
standards-compliant and suitable
for existing and potential application
requirements
78
BY JATIN D E R S I N G H
“ %
A CABLING CALL THAT the IT team at Birla Tyres took almost a year ago is now
serving the country’s fifth-largest tyre manufacturer well.
The Cat 6-based solution provides uninterrupted bandwidth and availability to of network related
meet the company’s ever-growing applications requirements, ranging from data problems occur
and voice to video.
because of a wrong
Looking back, Birla Tyres was determined to take a holistic view of the cabling
decision in deploying
infrastructure, as it also planned to integrate the networking infrastructure at their
two Orissa-based production units.
efficient structured
”
They believed that this approach would not only save on the overall capital
cabling solution
expenditure but also lead to an improved ROI. The team evaluated a number of —Milind Tamhane,
solutions from different vendors and even took inputs from external consultants Vice President- ITS,
to arrive at the best fit for the organisation’s strategic needs. Manufacturing, Digilink
46 IT NEXT | F E B R U A R Y 2 0 1 0
S Ojha, who is the IT Head at Birla more efficient operations, reduced power
Tyres’ Balasore unit says, “Appropriate consumption and lower life cycle costs.
planning for cabling is a prerequisite to IT managers, should, therefore carefully
avoid any issues in the performance.” assess the future voice and data require-
Structured cabling indeed has ments of the organisation when planning
come a long, long way from the times for a new cabling system.
when it would attract only peripheral While Cat 5e solutions are still being
involvement of IT managers… considered for environments where the
applications are not very bandwidth
Planning matters intensive in nature, Cat 6 solutions
When Birla Tyres planned to augment are perhaps seeing the largest share of
their production capacity to 500 tonnes greenfield deployments.
of tyres per day, the IT team decided to Cat 6A solutions which offer 10G
take a close and careful look at the struc- Ethernet over unshielded twisted
tured cabling plan, as part of the bigger copper have gained a great deal of
IT infrastructure plan. traction over the last couple of years,
“IFISTHE SOLUTION
S
The company wanted to take a holistic especially in data center environments.
view of the cabling infrastructure, as it
also planned to integrate the networking
For higher requirements, fiber is
still a preferred media, also because
DEPENDABLE
infrastructure at their two Orissa- it is immune to electromagnetic AND ADHERES
based production units. Of course, interferences and cross talk. However, TO STANDARDS,
it was necessary that the solution be
standards-compliant.
technological advances have also made
copper-based solutions for a number
SUBSTANTIAL
Finally, a combination of Cat6 copper of applications. AMOUNT OF OPEX
cable and single-mode fiber optic Market data suggests that over 85% CAN BE SAVED ON
structured cabling was selected.
While factors such as vendor’s
of all new installations will be cabled
with Cat6 solutions, which costs about
ITS UPKEEP OVER
A LONG RUN
reputation, high quality performance,
budget and lower installation costs
influenced the company to select the
35% more than the Cat5e.
In view of this significant cost
difference, it is often argued that if there
—Ajay Kumar Pandey, DGM
(IT), BL Kashyap
”
solution, the decision to upgrade to the is no visible requirement for high-gig
Cat6 standard was largely driven by the applications, or if your organisation has
high bandwidth requirement to support plans to move to a new premise or site
future applications. in 2-3 years time, then Cat 5e solutions
Emphasising upon the detailed may still be worth considering.
planning that went into determining However, such exceptions apart, Cat
the right solution, Ojha says, 6 solutions are a de-facto standard. This
“There is always ambiguity over the also helps you accommodate other IT
bandwidth needed to support future initiatives such as Fibre Channel over
communication models. Therefore, an Ethernet (FCoE), IP convergence and
appropriate planning is a prerequisite server virtualisation.
to avoid any issues in performance.” “IT professionals upgrading or
“APPROPRIATE
Agrees Milind Tamhane, Vice deploying their network today should
President-ITS, Manufacturing at therefore consider MPO solutions, high-
Digilink: “78% of network related density solutions, higher bandwidth PLANNING
problems occur because of a wrong
decision in deploying an efficient
cabling, and cable management that
ensures reliability, flexibility and
WHILE GOING
structured cabling solution. The irony scalability,” says Dileep Kumar, Director FOR CABLING IS
is that many organisations in India still of Product Management, ADC Krone, A PREREQUISITE
do not understand this logic.” India & SAARC.
Another high-gig copper standard
TO AVOID ANY
Identifying the right is Cat 7, which is a shielded technology, ISSUES IN THE
solution PERFORMANCE
”
aimed at supporting 10G for high-speed
Given lower TCO as a top priority, the bandwidth intensive applications. —S Ojha, IT-Head, Birla
need is to identify solutions that facilitate However, the adoption Cat 7 standard Tyres, Balasore Unit
F E B R U A R Y 2 0 1 0 | IT NEXT 47
Sticking to standards
IT managers often have to deal with the
problem of network going down due TRAINING
CALENDER
to cabling-related problems. In most
cases, according to the industry experts,
the problem lies with the substandard
cabling systems, rather than with the Career booster
hardware or the applications. To mini- courses for you
mise this, experts strongly advocate
installing standards-compliant based
solution (such as TIA/EIA and ISO)
rather than proprietary solutions.
“If the solution is dependable and
adheres to standards, substantial
amount of operating expenditure (opex)
can be saved on its upkeep over a long PROGRAMME DATES INSTITUTE
run, thus giving a better ROI for any
IT manager,” says Ajay Kumar Pandey, Innovation strategy Feb 01 - 03, 2010 MDI, Gurgaon
DGM (IT) at BL Kashyap. Collaboration and networking Feb 01 - 05, 2010 IIM Calcutta
In this context, it is also important
to ask for a performance certification Computerised OR models Feb 01 - 05, 2010 IIM Indore
from the vendor to be certain of the Customer Relationship
actual delivery of the network. Such Feb 08 - 10, 2010 IIM Ahmedabad
Management
certification assures that the system
will industry industry standard Project management Feb 08, 2010 IIM Lucknow
performance, as well as ensure the
support for emerging applications. Advanced analytics for
Feb 11 - 14, 2010 IIM Ahmedabad
Last but not the least, a consultation management
from cabling design engineers will
International negotiating skills Feb 11 - 13, 2010 IIM Bangalore
be helpful in designing the network
in a way that it is not only able to Work life balance for
accommodate future active networking Feb 15 - 16, 2010 FORE School, Delhi
managerial wellbeing
equipment and technologies, but also
accommodate planned changes in the Effective communication for
Feb 15 - 19, 2010 MDI, Gurgaon
easiest possible way. managers and leaders
And of course, who would be better
than you—the IT manger with the
Lean operations for business
Feb 15 - 19, 2010 MDI, Gurgaon
ground view of the organisation’s IT excellence
requirements—to cut through the hype
Finance for non-finance
and judge which solutions will be the Feb 18 - 20, 2010 FORE School, Delhi
executives
right fit for your organisation.
This ground view, combined Managing IT projects Feb 22 - 25, 2010 IIM Ahmedabad
with an informed selection process,
will help you arrive at the right Service operations
cabling recommendations for your management for competitive Feb 22 - 24, 2010 IIM Kozhikode
I LLUSTRATIO N: ANO OP PC
organisation! advantage
Growth strategies for
Feb 22 - 26, 2010 IIM Indore
ITNEXT<space><your feedback> businesses
567678
and send it to
Business Intelligence Feb 25 - 27, 2010 IIM Kozhikode
*Special rates apply
48 IT NEXT | F E B R U A R Y 2 0 1 0
BY M O H I T C H H A B R A
S
arvesh Rana was befuddled. He
had just stepped out of the third
presentation on a foggy winter
morning in Delhi. He had been
looking for advice from consul-
tants to help him enhance productivity at
his Rs 150-crore auto ancillary company.
All the presentations that day
suggested adding a new CRM
application and tweaking the existing
supply chain system with some
additional hardware and more software.
Most of these systems would pay back
for themselves within a year or two,
promised the guys in blue suits.
Somehow, Sarvesh felt this approach
to enhancing productivity was
counterintuitive. He desired simplicity.
Unknown to Sarvesh, something
similar, at a far larger scale, happened
a few years ago.
MANAGE IT
FROM FAT
Mark Hurd took over the reins of HP
in early 2005. His single-minded focus to
trim costs was as clear then, as it is now.
TO FIT
Some of the ‘hard’ decisions he took then
seem so simple and commonsensical,
with the advantage of hindsight.
PHOTO GRAPHY: PHOTOS .CO M
Hurd at HP
Hurd came in during good times and
sliced off 15,200 jobs, or almost 10% of Surgical interventions on IT operating
the company’s headcount. He then led
the initiative to slash the company-wide
budget can deliver benefits without
use of applications from 6,000 to 1,500. loss of efficiency
F E B R U A R Y 2 0 1 0 | IT NEXT 49
services (and thus cost) may be doing falls. Count slowly as you exhale.
so in a strategic or tactical drive. That’s
PHOTO GRAPHY: PHOTOS .CO M
50 IT NEXT | F E B R U A R Y 2 0 1 0
FOUR STEPS
TO CONTROLLING IT OPEX
Understand the constitution
1 of operating expenditure.
Use this analysis to list the areas of
opportunity, and potential risks as-
sociated with cost cuts
“THE FIRST STEP TOWARDS COST nally planned for. It can also help IT
managers extract “more juice”. Smart
RATIONALISATION IS TO CREATE AN thinking and configuration can enable
virtualisation software to run eight
INVENTORY OF ALL APPLICATIONS” machines off a single server.
—Sanjay Mittal, Manager (IT), Indofarm Tractors & Motors “IT managers must proactively look
for ways to improve or standardise
procedures. Internal systems and
computing and network infrastructure saved a huge amount of money by just processes must be tailored to reflect
for IT applications, reveals that the standardising applications and support the realities of the outside world,” feels
drive to reduce operating costs is a for all the 44 countries we operate in.” S K Mishra, Regional Manager (IT) at
concern among IT managers at a global In the same study, more than half of Raheja Builders. For example, the pace
level. The study shows that nearly two the IT managers surveyed noted that of technological change is slowing down.
of the five IT managers surveyed felt the greatest cost savings would emanate Most developments taking place are
that standardising IT infrastructure from reducing infrastructure costs and improvements in already established
solutions could help cut costs. introducing a virtualisation strategy. systems. HP’s Hurd feels that most
Confirms Dhiren Savla, CIO at Kuoni Basically, it is the magnified focus on of the R&D investment is actually
India: “We have, in the last one year, reduction of operating expenses. ‘maintenance spend’–expenditure that
F E B R U A R Y 2 0 1 0 | IT NEXT 51
HEALING
Heavy IT users can adopt the same
approach by revisiting all procedures
ACHILLES’
that were developed when the pace of
development was far more scorching.
“Software licenses can total millions
HEEL
of rupees depending on the size of your
workforce. A first step towards costs
rationalisation is to create an inventory
of all applications,” suggests Sanjay
Mittal, Manager (IT) at Indofarm When project requirements are not
Tractors & Motors.
According to him, while this will captured completely and correctly,
help provide clarity about the user and
purpose of applications, it will also help
project budget and timelines go
the management ascertain which licenses haywire. How to keep things on track
and applications are underutilised.
The screws can then be tightened BY S U M A E P
to make necessary adjustments. IT
managers across the board must sit
I
and work with vendors to re-examine
maintenance contracts to make sure all t is often said that 80% of all enterprise projects that fail, do so because
critical needs are covered, expenditure of basic flaws that occur at the time of defining project requirements.
is routed in the right direction and all Numerous instances can be cited when the project, on completion,
wasteful spend is eliminated. turned out to be fairly different from what was desired. The reasons,
more often than not, lie in the ambiguous and unclear project require-
IT-finance wedlock ments formulated by the team.
The final step is reassessment of ser- Here is a compilation of the most common errors while creating a project
vice level agreements. Significant requirement document, and the best way to avoid them.
monies can be saved if the penalty
clauses are removed, and service Inefficient communication
levels are rationalised. The whole Misinterpretation is, by far, the biggest culprit behind the cre-
data service market has seen a huge ation of wrong project requirements. It can start from the top,
buildup in strength and delivery. says Surendra Kapur, a senior business IT analyst with a
Therefore, it is not a bad idea to con- leading financial services company’s India unit. “The CTO
sider what uptimes are being deliv- or the CIO knows what he wants out of the IT project. But
ered at a commoditisation level of he does not have the time to spend with the delivery team and
these services, and then fine-tune work out details. So he assigns a senior IT manager to look after
SLAs accordingly. For example, IT the project and conveys his vision to him,” Kapur explains.
managers could reduce a 99% uptime The senior IT manager then tries to make sense of the
requirement to 95%, and in lieu get a vision to define what is required from the project. This
far more efficient pricing. is often not congruent with what the CIO has in mind.
Cost containment options must If the CIO is involved in intermediate discussions,
move beyond adoption of new then the gaps can be sealed early enough. However,
technologies or improved practices. if the top stakeholders come in at a later stage a lot
It must constantly focus on exercising of effort may have been made on the basis of the
sound judgment and identifying senior IT manager’s briefing.
opportunities to save as soon as they Sometimes, a customer may not even have
emerge. An enterprise can make this complete vision of what is required. He may have
possible by involving IT managers in ideas that could evolve as the business analyst
financial planning; one must not forget probes about the business and its various processes.
that IT managers are as concerned The analyst will have to be skilful enough to not
about the colour of the balance sheet just balance technology with solid business sense,
as the finance people. but also be extremely good at eliciting information
52 IT NEXT | F E B R U A R Y 2 0 1 0
“The IT manager
should understand
“...there is no
the business
process for
processes or
requirement
application for
gathering in
which the solution
majority of Indian
is required...”
organisations”
—Shivshankar Singh, DGM —Krishnamurthy Hegde, Founder
(Operations & Trading), BSE India of Interactive Media Worldwide
community on LinkedIn
from various stakeholders. If this does requirements, too many requirements start getting into the details that you
not happen the IT project can land in and unclear requirements.” realise that many aspects of the scope
a mess where must-have features turn Agrees Mohan Verma, Executive have not been covered.
into optional ones, and a debate starts on Director at PricewaterhouseCoopers “The scope issues may be with respect
change requests. when he says many times the definition to business functionality. Or they
“Generally, there is an attempt of certain terms is not clear, and hence could be about the nature of rollouts to
to obtain requirements by asking there could be a difference in their different locations. It could also be about
customers or users what they want. interpretation by the user groups. training the end-users , even though you
Naturally what is actually provided is “For example, when one talks about may have adopted the train-the-trainer
a list of ‘wants’ instead of needs,” says customisation in ERP projects the approach,” says Verma.
Shivshankar Singh, DGM (Operations definition is not clear. Both sides could Another issue with scoping or
& Trading) at BSE India. be responsible for confusion. While the defining the project requirements is
He reiterates that there is no actual solution-provider, in his enthusiasm to trying to define all the requirements
process for requirement gathering in push the sale, may keep some aspects of upfront. According to Johanna Rothman
majority of Indian organisations, or it is the scope blurred, the client, in his bid, of Rothman Consulting Group, “Users
limited due to time constraints, forcing to contain the cost may do the same,” he don’t know what they really want until
the analyst to accelerate interviews and explains. they see it, or at least, some of it. So,
information-gathering sessions to capture using an agile approach to define and
the bare minimum information and then Inadequate scoping implement some requirements will
attempt to interpret what the user needs. More often than not, during a pre-sales work much better than trying to define
“The result,” he adds, “is cycle while doing a scoping study, there all the requirements upfront.”
incorrectly stated requirements, is only so much one can do. It is only “Gathering and defining project
missing requirements, unnecessary when you actually get into delivery and requirements is a continuous process. It
is so critical that many companies treat
this as an independent project within
“The mantra is simple. You should the bigger project,” says Krishnamurthy
Hegde, Enterprise Solutions Architect
and founder of the Interactive Media
define the scope in layman’s Worldwide community on LinkedIn.
“The IT manager has to thoroughly
F E B R U A R Y 2 0 1 0 | IT NEXT 53
Digging better
Verma explains, “Solution architects
play a key role in this process. Hence,
deploying highly experienced solution
architects, who bring in an appropriate
blend of business knowledge and tech-
nology solution expertise, can make this
exercise fruitful.
“Depending on the nature of the
IT solution and the maturity that the
industry has attained in deploying
the solutions around that technology,
the template and methodology used
for capturing scope can range from
being very basic to very advance. The
Clothes indeed make a man. And wearing the right suit more mature the solution, higher the
likelihood of good scoping,” adds Verma.
can spell the difference between success and failure.
Some tips on how to select the right suit
Requirements
document critical
Feel the fabric: Suits in this part of the world are largely bought when
1 winters set in, and thus it is not a bad idea to buy something that is
Finally, it all boils down to the require-
ments documentation. Hegde says,
100% natural wool. Apart from providing you the protection, wool is a natu- “Instead of focusing on actual use cases
ral fibre, that is comfortable and durable. and interactions, people involved in
Select sober shades: Experimentation is for lads. If you are buying requirements gathering often start writ-
2 your first or even second suit, then go for dark shades such as navy ing essays on the requirements. This
blue, gray or black. If, however, the suit is in line with a few others that you leads to problems in interpretation.”
have in your wardrobe, then you could consider pinstripes. But remember He further states that the various
to go for colours and patterns that are classic, and will withstand fashion teams involved—requirements
erosion. elicitation, development, functional
expertise and testing—can interpret
Style it right: If this is your first suit, then opt for a single-breasted
3 one. It has buttons in front in one single row. If you have a heavy
the document in different ways. “They
need to be in complete sync with one
frame, then better avoid a double-breasted suit as it will only add bulk. Don’t another,” he suggests.
forget the vent—the cut in the suit on the back. Side vents are considered Similarly, Kapur points out that
more European and more suave. Never buy a suit without vents. companies use templates to avoid
Fit it and forget it: Make sure the salesperson takes all your meas- misinterpretation. Short and to-the-
4 urements. Ensure that the suit’s shoulder hugs you, and the shoulder point descriptions, flow charts and
pads do not protrude over your shoulders, and that you can button the coat visual explanations are better for this
comfortably. As for the coat’s length, you should be able to cup your fingers kind of a document.
under its sides. The pants should sit on your waist and not hips. Sums up Virendra Deshpande,
Sr Manager (NOC) at Reliance Big
Complement it: The suit is only complete with matching shirt and tie.
5 Entertainment, “The mantra is simple.
PHOTO GRAPHY: PHOTOS. COM
The classic colours for a shirt to accompany a dark suit are light blue You should define the scope in layman’s
or white. A very formal shirt will come with linked cuffs, which are closed language, and avoid jargon. Scope that
using cuff links or silk knots instead of buttons. However, they are going out is set by vendor and well understood by
of fashion. Ties should always be darker than the shirt. customer is the stepping stone to success
of the project. Learn to manage the
—By Mohit Chhabra perception of your customer.”
54 IT NEXT | F E B R U A R Y 2 0 1 0
WHAT
THE CHOKES MY
INTERNET?
BIG EXPERT PANEL
F E B R U A R Y 2 0 1 0 | IT NEXT 55
FIRST ANSWER
The closest analogy to this problem is that your car hit a bottleneck.
That’s because the eight-lane freeway you are driving on has termi-
nated into a two-lane road. The reasons could be many.
Printing a 300-page document over the Internet could be resulting
in massive data flow from the end-user machine to the print spooler,
which can cause the pipe to choke. Since the same content goes to
copying and printing, the server will need time to respond, and it
could be causing the delay. Besides, copying a 300-page document
can also lead to a surge in Common Internet File System (CIFS) traffic,
with huge TCP acknowledgement flowing through the same line.
The other notable point is that all 120 users at FreidCorp and the
entire IT resource are on wireless, which is limited to 54 Mbps.
BASANT Ravinder’s problem could be getting compounded by the fact that a
CHATURVEDI lot of data—file transfers, data backups and printouts—is also flowing
through the same network. Since all the devices in the office are wireless,
Head IT, Perfetti Van such data flows can clog the network.
Melle India
There could be other possible reasons. Since its the beginning of the business hour,
About me: and a Monday, there is a possibility that the security templates are getting applied on user
Consummate tech machines. Also, antivirus and software definition updates could be running when users
professional with
expertise on SAP log-in to the business network. Though the line connectivity is reported to be normal, a
platform. In the past high latency rate could be causing the delay, and thereby choking the pipe.
have been associated
with Basell India and
Seagram India SECOND ANSWER
Ravinder needs to build a wired network for backup, printing and FTP services. The
wires in the FreidCorp office will free the wireless network from a lot of data packets.
The WiFi network can then complement and augment the wired network, instead of
substituting it. He can also prioritise a key user group on wireless rather than putting
everybody on it.
Besides, there is a need to sensitise users that large documents should be downloaded
from remote servers to the local desktops before printing. This will make the printing
traffic local, and save a large amount of Internet bandwidth. Copying of large files
is classified under CIFs traffic, and other methods like portals, FTP, and managed
downloads can be considered to improve speed. He could also explore the option of
payload compression hardware and software that can help reduce the line utilisation
while copying large documents.
In case it is not already done, he should look at securing the wireless network first and
hide the SSID broadcast, so that only legitimate users are able to connect to the wireless
network. Also, the back-up window can be planned in a way that it doesn’t clash with
the peak business hours.
56 IT NEXT | F E B R U A R Y 2 0 1 0
FIRST ANSWER
At times, it is hard to pinpoint the problem till all the issues have
been studied in depth. There could be several factors responsible for
choking the Internet bandwidth at FreidCorp.
In many enterprises like this, the network uses multiple wireless
routers and switches to create a local wireless mesh network, which
is uplinked to the gateway router. This connectivity between internal
and external network needs to be checked. In such cases, local
processes like printing and file sharing will work because there is no
local connectivity problem. Also, connectivity between ISP and the
gateway router will work perfectly, and that is the reason the ISP did
not find any problem in the connectivity. There is a possibility that
the local network is not properly connected to gateway router.
FreidCorp’s network might also be suffering from Denial of FALGUN
Services (DoS), Trojan or worm attacks. In such cases, while the SHUKLA
connectivity to ISP may work fine, the network under hacker attack
or because of internal malicious attacks could experience slow Internet connectivity. Sr General Manager (IT),
Hikal Ltd
Also, it could be a proxy issue—if Ravinder has a proxy or firewall set up then he
should check whether the users are permitted to use it. There could be a possibility of About me: An advance
caching overflow or blocking, so he should initialise the cache and restart the network. accountancy graduate
who ventured into
the field of IT and
SECOND ANSWER technology and stayed
put. Has been in the
To resolve the issue, Ravinder should ensure that the local network is properly con- industry for over two
nected to gateway router, and conduct regular check for proper connectivity strings. decades, of which the
past eight have been with
He should also ping the gateway router and ISP router to verify connectivity, and both Hikal
the networks.
If it is the security issue that is creating the problem, Ravinder should isolate the
problem and clean the network. The communication should be renewed only after
putting in place a mechanism to properly monitor the routing packets. He should also
review the firewall settings and other security rules to avoid such incidents. Ravinder
should also check the DNS resolution on the user’s work station by using NSlookup to
ensure that DNS resolution is happening properly. NEXT
800
744
600
517
400
207 342
200
124
2005-06
2008-09
2006-07
2007-08
2009-10
2010-11
2011-12
80 SO URCE:
42 TO NSE
TELECOM
0
F E B R U A R Y 2 0 1 0 | IT NEXT 57
SECOND ANSWER
SURESH A Ravinder needs to take some basic steps to resolve the problem. First,
SHANMUGAM he should check if there are any connectivity and bandwidth issues
from the service provider’s end, and whether the ISP is indeed pro-
Head-Business IT viding 2 Mbps connectivity. While he needs to check the firewall configuration for proper
Solutions, Mahindra
& Mahindra Financial access control, it is also important to control Internet usage through proper policy imple-
Services (M&MFS) mentation, and ensure that adequate security measures are in place at the user end.
It is also quite possible that FreidCorp has peaked ‘official’ bandwidth usage. In this
About me: Member of the
Shadow Board on IT in case the only way is to upgrade bandwidth and go for a backup link from a different
M&MFS. Was associate vendor. However, Ravinder should certainly map the company’s existing and ‘near
with Appsoft in the past
future‘ requirements before deciding to get a backup link.
NOTES
NOTES
58 IT NEXT | F E B R U A R Y 2 0 1 0
Resolving the
predatory vendor lock-in,” the group
says on its website www.opensource.org.
The claim of open source, while
counter-intuitive, is not without
‘Open’ dilemma
merit. But not all OSS can lay claim
to the above. Only a certain genre of
OSS has lived up to the promise. The
manager, therefore, needs to identify
the characteristics of the right genre
F
of software.
or a few years now, we have The fundamental law that governs
been witnessing a vocif- the quality and reliability of all
erous debate on the use Open Source is the hypothesis that
of Open Source Software “with enough eyeballs all bugs are
(OSS) within enterprises. shallow”. Therefore, the one defining
Juxtaposed against the might of pro- characteristic that a manager must
prietary software, OSS has often been evaluate while making a choice of OSS
portrayed as the right thing to do, more is whether there is a strong and vibrant
from a philosophical rather than a busi- community around the product.
ness point of view. A strong and vibrant community
But what are the business benefits of assures that the OSS in question would
going the open way? be reliable and of high quality. However,
Let us demystify the OSS first. It can these two, in themselves, do not make
be described as a piece of software that OSS the best choice.
is governed by a license that allows the For a given situation, the manager
user to modify and redistribute the must map the “fitness” of Open Source
software without any restrictions. The with needs of the organisation.
10 conditions defining compliance to An IT manager must evaluate (a)
Open Source are listed at http://www. the “fitness of purpose” on whether
opensource.org/docs/osd. the licensing puts any restriction
Initially, the OSS movement was The fundamental law on the way that the product is to be
an expression of the desire to be in that governs the quality commercially exploited, (b) the level
charge. The IT manager too is equally of training required by users, (c) the
eager to control his own destiny. and reliability of all support assistance if any required by
However, the manager seeks to do so Open Source is the the CIO, (d) the security rating of the
more by making vendors responsible product, and (e) the scalability and
for providing a reliable infrastructure hypothesis that functionality of the product.
and less by seeking access to the “with enough eyeballs While the IT manager can look
code and making his own changes. forward to resolving his dilemma with
But using and modifying software all bugs are shallow” OSS, he must remember that what is
written by a multitude of people good for Peter need not be good for
Paul. So, do your homework well before
PHOTO GRAPHY: AJAY CHAW L A
F E B R U A R Y 2 0 1 0 | IT NEXT 59
ASPIRE TO
INSPIRE
“Being a role model for someone is
more satisfying than holding any fancy
designation,” believes Ranganathan N
N, Joint Manager, Business Information
Technology Solutions (BITS) at Mahindra &
Mahindra Financial Services (MFFS)
BY JATIN D E R S I N G H
N
“ othing is impossible in this “My present organisation has shaped and
world. Even the word ‘impos- moulded me, and I will remain indebted to my
sible’ says ‘I’m possible’. Have bosses who offered all the support that I needed,”
faith in your potential and give he comments.
whatever role you play the best When asked about the most challenging project
shot.” This is how aspiring CIO, Ranganathan N he has tackled so far, Ranganathan describes an
N, enunciates his success mantra. ERP implementation project that happened in
Currently working as a Joint Manager, 2004. “We underwent a transition from Fox Pro
Business Information Technology Solutions to Oracle, and during that delicate period, many
(BITS) at Mahindra & Mahindra Financial team members quit the organisation. The challenge
Services Limited (MMFSL), Ranganathan was to make the new team members understand
believes in setting a goal (for himself and his team) the complex algorithms, provide them domain
that is SMART—specific, measurable, achievable, knowledge, and strive for user acceptance,” he
MY SUCESS realistic and time-bound. reminisces. He now heads several projects in the
MANTRA Armed with degrees in commerce and company.
Have faith in your poten- computer science, Ranganathan started his career “We are developing a handheld device that
tial and give your best as a programmer with Satyam Computers before has three levels of authentication to reduce
shot to whatever role moving on to Mahindra & Mahindra Financial chances of frauds or refusal of payments to assist
you play Services in August 2002. the company’s field officers record customer
60 IT NEXT | F E B R U A R Y 2 0 1 0
FACT FILE
NAME
RANGANATHAN N N
CURRENT DESIGN AT I O N
JOINT MANAGER -
BUSINESS INFOR M AT I O N
TECHNOLOGY SO LU T I O N S
(BITS) AT MAHIN D R A &
MAHINDRA FINA N C I A L
SERVICES
CURRENT ROLE
RESPONSIBLE FO R N E W
IT INITIATIVES
PEOPLE MANAGE M E N T,
PROGRESS REVIE W A N D
REGUL AR REPORT I N G TO
THE MANAGEMEN T
PROJECT MANAG E R
FOR MF-BIZ CON N EC T
SOFT WARE PROJ EC T
EXPERTISE
PROJECT MANAG E M E N T,
PEOPLE MANAGE M E N T,
However, spending time with the family “What matters at the end of the day is how MANAGEMENT, M A D R AS
and his toddler during weekends is his top well you manage new responsibilities. I’ve UNIVERSIT Y
priority. For him, relationship-building with always aspired to be a role model for my team
1996 -1999
his peers and team members is an important members, and I guess that’s more important BACHELOR IN CO M M E R C E
exercise that helps to accomplish projects in than any fancy designation,” Ranganathan (COMPUTERS), CA L I C U T
a better way. “Every week I go for lunch with signs off. UNIVERSIT Y
F E B R U A R Y 2 0 1 0 | IT NEXT 61
MANAGING
DECISIONS
BETTER NNA )
I
C HE CEE M B E R 1 5 E
(D
G A L 16)
OR
The IT Next-Sybase ‘Enterprise
Analytics Workshop’ engaged and
B A( DNE C E M B E R
BAI
M EUC EMM B E R 1 7 ) informed more than 200 senior IT
HI
( D
D EE MLB E R 1 8 ) managers on the power and application
( D EC 9
200
of business intelligence solutions
It is often said that when the going gets demand for ad-hoc queries and reporting.
tough, the tough get going. This is even The survey also found out that while
more true for enterprise IT managers who companies were mainly using the analytics
face the double-edged sword of cutting to monitor and manage their business, the
costs even while strategising for growth. access to intelligence was limited to a few—
However, there is one solution that lets top level management, and departments like
them do both—Business Intelligence (BI) finance, accounting, marketing and sales.
and Business Analytics (BA). The interactive workshop was
By implementing BI solutions, IT designed to not only provide insight
managers can not only help improve on how BI solutions can be leveraged
enterprise productivity, but also aid and within the enterprise, but also provide
abet growth by delivering insights to operational nuances that can help IT
the sales and marketing function. These managers in theimplementation process.
and other such issues were discussed, Talking about the Need of Smarter
debated and deliberated at the ‘Enterprise Analytics, Chase Hacker, Senior Technical
Analytics Workshop’ for IT managers. Evangelist (Asia Pacific) at Sybase said,
The event was jointly organised by IT “Owing to the growing competition,
Next and Sybase, and drew over 200 IT the organisations, today, need faster,
practitioners across four cities—Delhi, more accurate answers delivered to all
Bangalore, Chennai, and Mumbai. As a run their decision-makers, from all their
up to the workshop, IT Next had conducted information, on their terms.”
a nation-wide survey of IT managers to He further added that businesses not
understand the usage of technology, and only lose market share and competitive
issues related to BI and BA. The findings advantage, they also lose opportunity
were shared at the workshop. because decision-makers don’t always
H IT managers going through the problem
The survey revealed that the rapid get the right answers and very often the
statement at the interactive Enterprise
increase of data volume and data sources answers are drawn from incomplete Analytics Workshop in New Delhi
amongst enterprises had added to the information.
62 IT NEXT | F E B R U A R Y 2 0 1 0
E
D Sunil Jose, Managing Director, India and
F Sub-continent, Sybase
E Shubhendu Parth, Editor, IT Next in Delhi
F Rajgopalan Giridhar, Group Editor, 9.9
Media in Bangalore
A C G Attentive participants at the Bangalore
workshop
B D
H I
LU C
DRAKWY
WINN
Sunil Jose of Sybase ER
gives away a phone,
Nokia E-71 to a lucky
winner
J
K
F E B R U A R Y 2 0 1 0 | IT NEXT 63
resolution
breakthrough in clean production and recycling policy. It is a very difficult
Memory: 1-GB DDR3 SDRAM expandable to
process with no alternative solution, and we worked with 37 overseas suppliers
maximum 4-GB, 2MB internal L2 Cache
for more than two years to come out with the completely toxin free product,” said
Front Side Bus (FSB): 800 MHz
Anurag Behar, chief executive of Wipro Infrastructure Engineering Ecoeye, Social
Operating System: Linux
and Community Initiatives.
Battery: 6-cell Li-ion Battery, 3.7 hours backup
The company claims that with removal of the toxins, recycling of the electronic
Weight: 2.35 kg
products will be safer. Wipro has 17 e-waste collection centres in India where
products are collected and recycled. PRICE: RS 24,990
64 IT NEXT | F E B R U A R Y 2 0 1 0
Intel unleashes
Fujitsu unveils high Core i3, mobile i5
volume scanner processor power
Intel has introduced more than
dozen new processors, including
Price
the mobile Core i3 and mobile i5
Rs 15,995
processors.
According to the company, the two
mobile processors are built on the
new Arrandale graphic platform,
KEY ADVANTAGES and will offer nearly 70% better
* Image quality checker to integrated-graphics performance
scrutinise irregularities in soft than the old Core2 i3 and i5. With
copy images 20% more pixel shaders, the
* Colour graphics adapter (CGA) processor maintains the same low
board TDP (thermal design power). The
* VRS professional imaging 2010 Core processor family is
software being launched with Intel’s
Fujitsu has launched new fi-6800 colour A3
* Light-emitting diode (LED) new HD Graphics technology,
production scanner to meet the high-volume
lamp for energy savings Turbo Boost Technology (only
centralised scanning demands of enterprises.
* Consumes less than 4W of on i5 and i7) and Intel Hyper-
According to the company, the scanner is able
to digitise documents ranging between A8 and power in sleep mode Threading Technology.
A3 sizes, and up to three meters in length. * Paper protection and multi- The new Core i3 processors
The product also has a Automatic Sorting feed protection to eliminate are all based on the 32nm
feature that enables users to choose between paper jams during scanning fabrication technology, as are most
unique sorting sheets or barcode printed sheets of the Core i5 processors. The top-
to cleanly separate various kinds of office documents. end Core i5 processors, i5-750S
Besides, the Colour Graphics Adapter (CGA) board and VRS professional and i5-750 desktop processors,
imaging software enable quick processing. are the only i5 processors not to
The scanner can be deployed as part of an integrated enterprise content feature Intel’s Hyper-Threading
management or document management solutions. Technology.
F E B R U A R Y 2 0 1 0 | IT NEXT 65
NEW
iHOME iA5
NEW Alarm clock speaker
system for iPhone and
GOOGLE’S NEXUS iPod, touch screen
MOBILE PHONE interface, equipped with
Features a 3.7 inches screen, Bluetooth and a built-in
1 GHz processor, Organic LED microphone
screen, 5MP camera, 4GB PRICE:
TO BE ANNOUNCED
extendable memory and a
dual microphone
PRICE:
INR 27,500
66 IT NEXT | F E B R U A R Y 2 0 1 0
three technologies
for 2010?
Who is a better professional, Mahadeva,
the man who has buried more that
42,000 unclaimed corpse in Banglore
or the thousands of high performer
doctors, engineers, MBAs? This book by
Subroto Bagchi provides examples from
PRABODH CHETAN V UNNI NAIR a cross section of the society to explain
PRABHUGHATE MANJREKAR MANAGER IT, what professionalism is all about.
MANAGER-STAFF SR EXECUTIVE- ARAMEX The Professional is not a manage-
& WEBSITE, IDBI SYSTEMS, SKYPAK Enterprise focus on
ment book. It is not meant to be
FORTIS SECURITIES getting more bang from
one. Instead, it’s a diary of the son
I think cloud and cloud- I see SaaS, and for that the money will ensure
of a small-time government servant
based applications, and matter cloud comput- that cloud computing
and the values that he learnt from
infrastructure will gain ing, reaching maturity continues to lead during
his father that have stood the test of
higher acceptability this during the year. Another the year. Vendors will
time—from his days in Orissa’s tribal
year. The big next thing on movement that might grab come out with new service
district Koraput to Texas and back in
the list is business analyt- attention in 2010 is Green models on this front. On
India—work with integrity of purpose.
ics. The slowdown has IT. The hype surrounding the datacenter and desktop
clearly taught us that any the term seems to have front, virtualisation will The book is divided into six parts,
future investment and capi- finally settled down, and garner much mindshare. and while the first three sections talk
tal outlay has to be backed CIOs and CTOs are looking While virtualisation on about the key attributes that make a
by projections based on at ways and means to the server front has been true professional, the remaining three
Business Intelligence (BI). green their infrastructure, well received, I feel it will are more like DIY tools that can help
This is the reason why BI right from the server to the now move strongly to the any individual manage volume of work,
will find much accept- desk top. And finally, with desktop environment. and complex situations and problems.
ance within the commu- the expansion of enterprise Finally, the focus will shift Bagchi also asks, and gives answers,
nity. Besides, the marriage mobility, I anticipate a big to storage management. to the toughest question every profes-
between social networking change in the way compa- Thanks to the ever increas- sional faces: Is my decision the right
and collaboration tools can nies will reach out to their ing data needs, enterprises professional choice to make?
become a reality in 2010; customers. Overall, 2010 will be compelled to adopt
Google Wave was a good for me looks like a cloudy, solutions to make storage
IT NEXT VERDICT
attempt of the same. green and mobile year. more accessible.
Written in a simple language, the book
provides the explicit and implicit codes of
conduct— the boundaries which separate a
skilled individual from a professional.
Your views and opinion matter to us. Send us your feedback on stories and the
magazine to the Editor at editor@itnext.in STAR VALUE:
F E B R U A R Y 2 0 1 0 | IT NEXT 67
Fly away,
P PC NOO
I L L U S T R AT I O N : A
my love!
Technology-driven communication
has made direct interaction with
fellow beings a rarity
I was hoping against hope that you being. We were soul mates.
would pay a visit, at least, on the New Year We had all the time in the world for each
day, for old time’s sake. But you did not. other in the sylvan surroundings of the
And now that more than a month has gone small town we inhabited. There was no TV, 3 ESSENTIAL
by, I resign myself to a life without your cable, telephone, Internet, and of course, READS
company. An incessant stream of your no cell phone or Blackberry to disrupt our INSIGHT | DATA CENTRE DATA CENTRE | INSIGHT
PUTTINGTHE
one hand, the number of IT hands- management and recovery services. Hence,
on-deck are being rationalised. On savings and efficiencies can be gained by
the other, the team is under greater pres- identifying and classifying data sets into
SQUEEZE
sure to make ‘wise’ decisions about IT their associated levels of service. Certain
infrastructure planning to make the best technologies are helping IT organisations
use of their existing resources. get there faster.
Meanwhile, demands from the business
and mission critical business applications Understanding usage
But that’s not solace enough. It still hurts. However, as I moved to the big metro
are increasing. patterns
On the data centre front, the IT manager Most data centers are sized for peak condi-
can control costs by juggling a range tions that rarely exist. According to a study
ON ENERGY CONSUMPTION of variables. Some of these are delay in by Emerson, in a typical business data cen-
Blade servers
10
capital expenditure, reduction of total cost tre, daily demand progressively increases
of ownership, reduction in risks associated from about 5 a.m. to 11 a.m. and then begins consume about
with remote disaster recovery and lowering to drop at 5 p.m. However, server power
Rationalising power and energy of maintenance expenditure.
In addition, the IT team also has the
consumption remains relatively high even
as server load decreases. In the idle mode,
costs in data centers can help option of cutting cost by reducing energy many servers consume between 70% and
Even as a small child, my favourite to eke out a living, our trysts became
spend in many ways—from introducing 85% of full operational power.
improve resource allocation and efficient cooling systems to decreasing This means that a facility operating
45
But adopting any of these options is of server processors have built-in power
BY MOHIT CHHABRA riddled with huge challenges. Until about management features that can be used to
a few years ago, the key challenge faced by dramatically reduce power consumption
%
a data centre manager was that of space in idle mode. However, many times, for
and availability. Today, with technology the fear of increasing response times, the
becoming robust and efficient, and features remain disabled. It would be
pastime was watching you with awe. You infrequent. The big city boasted of record
mean-time-between-failures nose diving, prudent to analyse usage patterns and
availability is the least of an IT manager’s re-examine the disabling of the power
worries. savings feature in server processors.
Energy efficiency, power density and Another disadvantage of building
of the TCO for a
cooling density are the top issues facing and running data centers for peak loads, typical rack in a high
today’s data centre manager. This is is the cost of cooling. “Computer Room availability 2N data
obvious, considering the fact that nearly Air Conditioners or CRACs are fitted centre is contributed
45% of the total cost of ownership for a with fans that run at constant speed to by power and cooling
20
typical rack in a high availability 2N data deliver a constant volume of air flow. equipment
centre is accounted for by power and Newer technologies can convert these
cooling equipment. fans to variable frequency drive fans.
%
into cost savings thus converging the power consumption,” says Pratik Chube,
objectives of green IT with that of business,” Country General Manager (Product
says Bhairav Kulshrestha, Manager (IT) at Management & Marketing) at Emerson
Atul Group of Companies. Network Power India.
reduction in the fan
Planning, or sharpening the axe, is a And these savings are easily quantifiable. speed of computer
great tool to generate cost efficiencies. Like For instance, a 20% reduction in fan speed room ACs can help
all other asset classes, data and applications results in savings of nearly 50% on power cut over 50% of power
30 IT NEXT | F E B R U A R Y 2 0 1 0 F E B R U A R Y 2 0 1 0 | IT NEXT 31
suddenly take to the skies. Having pierced and the skies, ramrod telecom towers, maze Rationalising power & energy
of electricity poles and wires, and all the cost at data centers can help build a
the low-lying clouds, you would hurtle
greener enterprise. Pg 30
downwards like a shooting star, suddenly paraphernalia that development brings in
shifting into a gentle glide to alight atop its trail. INSIGHT | TELECOMMUTING TELECOMMUTING | INSIGHT
GETTING ’EM
the tree. And as if to congratulate yourself Noxious vapour reigned as numerous WORK
HOME
FROM
at the feat you would break into a celestial humans lived a miserable existence on Telecommuting employees can
deliver big gains only if enterprises
adopt robust technologies and the right
policy measures
song, every note of which still remains pavements and along frothing sewage
BY PRAGYA SINGH
W
ork is something
we do, not some-
proved to be favourable for both
employer and employee.
point to the growing importance of
telecommuting among Indian SMBs.”
Says Dr Deepak Shikarpur of Computer
Society of India: “Telecommuting is possible HOW TO MAKE IT WORK
thing we travel If your company is in a business In small businesses, telecommuting wherever there is clarity in the role, and data
What poise, what grace, what melody, was, obviously, no place for you.
ity. A recent survey conducted by Research Analyst at AMI Partners, deployment, the concept cannot be home and a good telephone instrument with
IDC revealed that 81% of executives “Telecommuting penetration is on rolled out without a proper enterprise speakerphone facility would be ideal.” ■ Frame policies to restrict unauthorised access and
PH OTO GR A PH Y: PHOTO S. CO M
polled across the Asia-Pacific region the rise across Indian enterprises, strategy for telecommuting. IT downloading of files
strongly agree that telecommuting particularly amongst SMBs. While it managers need to understand a Security and performance ■ Help telecommuters understand the tools, and provide special
improves productivity. In 2005, only has increased from 3% in 2006 to 11% host of issues—from security to management handbooks or reference guides to help them use technologies, ac-
61% thought so. in 2008 amongst smaller companies, it performance management, policies for Security becomes a major issue in telecommut- cess information and expertise
For a growing number of has jumped from 8% to 27% amongst data classification and defining access ing. Adopting measures such as secured access
businesses, telecommuting has medium level enterprises. These figures rights—to prepare their organisations. to business data, phone systems, applications
I could never take physically to the becoming a rarity. You too have abandoned
S Ojha, who is the IT Head at Birla more efficient operations, reduced power
Tyres’ Balasore unit says, “Appropriate consumption and lower life cycle costs.
planning for cabling is a prerequisite to IT managers, should, therefore carefully
MAKING
avoid any issues in the performance.” assess the future voice and data require-
Structured cabling indeed has ments of the organisation when planning
come a long, long way from the times for a new cabling system.
when it would attract only peripheral While Cat 5e solutions are still being
involvement of IT managers… considered for environments where the
RIGHT
applications are not very bandwidth
THE
Planning matters intensive in nature, Cat 6 solutions
CON ECTIONS
tured cabling plan, as part of the bigger copper have gained a great deal of
IT infrastructure plan. traction over the last couple of years,
The company wanted to take a holistic
view of the cabling infrastructure, as it
also planned to integrate the networking
especially in data center environments.
For higher requirements, fiber is
still a preferred media, also because
“ISIF THE SOLUTION
DEPENDABLE
infrastructure at their two Orissa- it is immune to electromagnetic AND ADHERES
based production units. Of course, interferences and cross talk. However, TO STANDARDS,
78
“There is always ambiguity over the also helps you accommodate other IT
BY JATINDER SINGH
“
bandwidth needed to support future initiatives such as Fibre Channel over
communication models. Therefore, an Ethernet (FCoE), IP convergence and
46 IT NEXT | F E B R U A R Y 2 0 1 0 F E B R U A R Y 2 0 1 0 | IT NEXT 47
you and my blues would be blown away. But rest assured, you will continue to Follow standards for a perfect
A strange sentiment would suffuse my live in my heart. Till it flutters! structured cabling solution. Pg 46
68 IT NEXT | F E B R U A R Y 2 0 1 0